diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3050.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3050.json index a2d8f2b6569..0b7075b7ebf 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3050.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3050.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3050", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-29T06:18:32.417", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:05:56.890", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Site Reviews de WordPress anterior a 7.0.0 recupera direcciones IP de clientes de encabezados potencialmente no confiables, lo que permite a un atacante manipular su valor. Esto puede usarse para evitar el bloqueo basado en IP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json index 5aa671f6043..bfb85ad6a04 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3059", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.360", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T02:05:57.660", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento ENL Newsletter de WordPress hasta la versi\u00f3n 1.0.1 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los administradores registrados eliminen campa\u00f1as arbitrarias mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json index f853a12b8f2..ccdcb732a9b 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3060", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.397", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T02:05:57.883", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento ENL Newsletter de WordPress hasta la versi\u00f3n 1.0.1 no sanitiza ni escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que permite a admin+ realizar ataques de inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3157.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3157.json index 09ae59e7691..a0f0c900e25 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3157.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3157.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3157", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-10T19:15:49.623", - "lastModified": "2024-04-19T23:15:11.593", + "lastModified": "2024-07-03T02:06:02.227", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El acceso a la memoria fuera de los l\u00edmites en Compositing en Google Chrome anterior a 123.0.6312.122 permit\u00eda a un atacante remoto que hab\u00eda comprometido el proceso de la GPU realizar potencialmente un escape de la zona de pruebas mediante gestos espec\u00edficos de la interfaz de usuario. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32673.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32673.json new file mode 100644 index 00000000000..5d36cb072b6 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32673.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-32673", + "sourceIdentifier": "PSIRT@samsung.com", + "published": "2024-07-03T02:15:10.297", + "lastModified": "2024-07-03T02:15:10.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Validation of Array Index vulnerability in Samsung Open Source Walrus Webassembly runtime engine allows a segmentation fault issue.\n\nThis issue affects Walrus: before 72c7230f32a0b791355bbdfc78669701024b0956." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@samsung.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 0.0, + "baseSeverity": "NONE" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@samsung.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Samsung/walrus/pull/241", + "source": "PSIRT@samsung.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3236.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3236.json index a8cfab22383..75ec4dd89cc 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3236.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3236.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3236", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-17T06:15:08.923", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:06:05.707", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Popup Builder de WordPress anterior a 1.1.33 no sanitiza ni escapa a algunos de sus campos de notificaci\u00f3n, lo que podr\u00eda permitir a usuarios como colaborador y superiores realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a6c2da28-dc03-4bcc-a6c3-ee55a73861db/", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3265.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3265.json index 63b0f313525..d4271abd999 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3265.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3265.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3265", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-25T22:15:09.043", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T02:06:07.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Advanced Search de WordPres hasta la versi\u00f3n 1.1.6 no escapa correctamente a los par\u00e1metros agregados a una consulta SQL, lo que hace posible que los usuarios con funci\u00f3n de administrador realicen ataques de inyecci\u00f3n SQL en el contexto de configuraciones de WordPress multisitio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/", diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json index 5ecbd4eb46f..f4d4ff14b30 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3302", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.310", - "lastModified": "2024-04-24T10:15:07.417", + "lastModified": "2024-07-03T02:06:08.953", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "No hab\u00eda l\u00edmite para la cantidad de frames de CONTINUATION HTTP/2 que se procesar\u00edan. Un servidor podr\u00eda abusar de esto para crear una condici\u00f3n de falta de memoria en el navegador. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183", diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3323.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3323.json index 8aebf6c7f67..7275b5fbcd0 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3323.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3323.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3323", "sourceIdentifier": "security@tibco.com", "published": "2024-04-17T19:15:08.177", - "lastModified": "2024-04-17T20:08:21.887", + "lastModified": "2024-07-03T02:06:09.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://community.tibco.com/advisories/tibco-security-advisory-april-9-2024-tibco-jasperreports-server-cve-2024-3323-r209/", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34461.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34461.json index 0ec49cfb88f..adcfae02c3d 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34461.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34461.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34461", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T05:15:06.600", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:09.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Zenario anterior a 9.5.60437 usa filtros Twig de forma insegura en el complemento Twig Snippet y en los elementos HEAD y BODY de todo el sitio, lo que permite la ejecuci\u00f3n de c\u00f3digo por parte de un dise\u00f1ador o administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://zenar.io/zenario-9/blog/zenario-9560437-patch-released", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json index fd87f93aef4..8f87825f968 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34462.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34462", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T19:15:46.510", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:09.780", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Alinto SOGo hasta 5.10.0 permite XSS durante la vista previa del archivo adjunto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Alinto/sogo/commit/2e37e59ed140d4aee0ff2fba579ca5f83f2c5920", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34470.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34470.json index be665984b91..1712674db19 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34470.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34470.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34470", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T15:15:24.520", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T02:00:10.887", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en HSC Mailinspector 5.2.17-3 hasta v.5.2.18. Existe una vulnerabilidad de path traversal no autenticada en el archivo /public/loader.php. El par\u00e1metro de ruta no filtra adecuadamente si el archivo y el directorio pasados son parte de la ra\u00edz web, lo que permite a un atacante leer archivos arbitrarios en el servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-29" + } + ] + } + ], "references": [ { "url": "https://github.com/osvaldotenorio/CVE-2024-34470", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34471.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34471.json index f3e01d6d5b9..f0ab9a7f25e 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34471.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34471.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34471", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:14.137", - "lastModified": "2024-05-06T19:53:38.797", + "lastModified": "2024-07-03T02:00:12.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en HSC Mailinspector 5.2.17-3. Existe una vulnerabilidad de Path Traversal (que provoca la eliminaci\u00f3n de archivos) en el archivo mliRealtimeEmails.php. El par\u00e1metro de nombre de archivo en la funcionalidad de exportaci\u00f3n HTML no valida correctamente la ubicaci\u00f3n del archivo, lo que permite a un atacante leer y eliminar archivos arbitrarios en el servidor. Esto se observ\u00f3 cuando el archivo mliRealtimeEmails.php fue le\u00eddo y posteriormente eliminado, lo que result\u00f3 en un error 404 para el archivo y la interrupci\u00f3n de la carga de la informaci\u00f3n del correo electr\u00f3nico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/osvaldotenorio/CVE-2024-34471", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34472.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34472.json index 009fdf6f771..8a93000b1b7 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34472.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34472.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34472", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T15:15:24.573", - "lastModified": "2024-05-06T16:00:59.253", + "lastModified": "2024-07-03T02:00:13.630", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en HSC Mailinspector 5.2.17-3 hasta v.5.2.18. Existe una vulnerabilidad de inyecci\u00f3n SQL ciega autenticada en el archivo mliRealtimeEmails.php. El par\u00e1metro ordemGrid en una solicitud POST a /mailinspector/mliRealtimeEmails.php no sanitiza adecuadamente la entrada, lo que permite a un atacante autenticado ejecutar comandos SQL arbitrarios, lo que lleva a la posible divulgaci\u00f3n de toda la base de datos de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/osvaldotenorio/CVE-2024-34472", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34475.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34475.json index 50f3b4320ee..5a228cc11b4 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34475.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34475.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34475", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T00:15:07.280", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:14.950", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Open5GS anterior a 2.7.1 es vulnerable a una afirmaci\u00f3n accesible que puede causar una falla de AMF a trav\u00e9s de mensajes NAS desde un UE: gmm_state_authentication en amf/gmm-sm.c para != OGS_ERROR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/compare/v2.7.0...v2.7.1", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34483.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34483.json index bb79ba43e21..5817bdcc67e 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34483.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34483.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34483", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T02:15:06.613", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:16.293", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "OFPGroupDescStats en parser.py en Faucet SDN Ryu 4.34 permite a los atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de OFPBucket.len=0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/faucetsdn/ryu/issues/193", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34488.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34488.json index fef9c59c969..d144431c4a2 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34488.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34488.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34488", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T03:15:07.207", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:17.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "OFPMultipartReply en parser.py en Faucet SDN Ryu 4.34 permite a atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) mediante b.length=0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://github.com/faucetsdn/ryu/issues/191", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34489.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34489.json index 867eee5f01b..739bb93b62d 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34489.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34489.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34489", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T03:15:07.250", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:18.727", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "OFPHello en parser.py en Faucet SDN Ryu 4.34 permite a los atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) mediante longitud=0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://github.com/faucetsdn/ryu/issues/195", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34490.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34490.json index 0323f7b5e7b..715806c7d3d 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34490.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34490.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34490", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T03:15:07.293", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:19.953", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En Maxima hasta 5.47.0 anterior a 51704c, las funciones de trazado utilizan nombres predecibles en /tmp. Por lo tanto, los contenidos pueden estar controlados por un atacante local que puede crear archivos de antemano con estos nombres. Esto afecta, por ejemplo, a plot2d." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-377" + } + ] + } + ], "references": [ { "url": "https://sourceforge.net/p/maxima/bugs/3755/", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34506.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34506.json index 3e13a83d514..b8230f96b75 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34506.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34506.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34506", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T19:15:07.253", - "lastModified": "2024-06-10T17:16:29.427", + "lastModified": "2024-07-03T02:00:21.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en include/specials/SpecialMovePage.php en MediaWiki antes de 1.39.7, 1.40.x antes de 1.40.3 y 1.41.x antes de 1.41.1. Si un usuario con los derechos necesarios para mover la p\u00e1gina abre Special:MovePage para una p\u00e1gina con decenas de miles de subp\u00e1ginas, entonces la p\u00e1gina exceder\u00e1 el tiempo m\u00e1ximo de solicitud, lo que provocar\u00e1 una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34507.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34507.json index 40d0d672447..552f54cbf82 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34507.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34507.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34507", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T19:15:07.307", - "lastModified": "2024-06-10T17:16:29.483", + "lastModified": "2024-07-03T02:00:22.533", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en include/CommentFormatter/CommentParser.php en MediaWiki antes de 1.39.7, 1.40.x antes de 1.40.3 y 1.41.x antes de 1.41.1. XSS puede ocurrir debido a un mal manejo del car\u00e1cter 0x1b, como lo demuestra Special:RecentChanges#%1b0000000." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34517.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34517.json index e67a5678218..b3326c65c9a 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34517.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34517.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34517", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T18:15:08.467", - "lastModified": "2024-06-05T20:15:13.430", + "lastModified": "2024-07-03T02:00:23.917", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El componente Cypher en Neo4j anterior a 5.19.0 maneja mal los privilegios IMMUTABLES." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-p343-9qwp-pqxv", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34519.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34519.json index cd36e2a5737..692b38c3951 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34519.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34519.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34519", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-05T22:15:07.563", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:25.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Avantra Server 24.x anterior a 24.0.7 y 24.1.x anterior a 24.1.1 gestiona mal la seguridad de los paneles, tambi\u00e9n conocido como XAN-5367. Si un usuario puede crear un panel con un usuario que inicia sesi\u00f3n autom\u00e1ticamente, es posible que se divulguen datos. El control de acceso se puede omitir cuando hay un panel compartido y su usuario de inicio de sesi\u00f3n autom\u00e1tico tiene privilegios que un visitante del panel no deber\u00eda tener." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-289" + } + ] + } + ], "references": [ { "url": "https://docs.avantra.com/release-notes/24/changes.html", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json index ff4722fdbdb..424d2db84ea 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json @@ -2,8 +2,16 @@ "id": "CVE-2024-34523", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T15:15:09.930", - "lastModified": "2024-06-04T19:20:01.453", + "lastModified": "2024-07-03T02:00:26.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", @@ -14,7 +22,42 @@ "value": "AChecker 1.5 permite a atacantes remotos leer el contenido de archivos arbitrarios a trav\u00e9s del par\u00e1metro de ruta download.php utilizando Unuthenticated Path Traversal. Esto ocurre a trav\u00e9s de readfile en PHP. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/inclusive-design/AChecker/blob/main/checker/download.php", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json index 6671ee7ff37..2dbd3505165 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34524", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T00:15:10.073", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:27.283", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En XLANG OpenAgents hasta fe73ac4, el mecanismo de protecci\u00f3n de archivos permitidos se puede omitir utilizando una extensi\u00f3n de archivo incorrecta para la naturaleza del contenido del archivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "https://github.com/xlang-ai/OpenAgents/blob/880e26adfe380e999962fc645fc8fc80bd72f103/backend/utils/utils.py#L31", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json index 7c649633109..b9f62e033e5 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34525", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T00:15:10.143", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:29.427", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "FileCodeBox 2.0 almacena una contrase\u00f1a de OneDrive y una clave de AWS en un archivo env de texto sin cifrar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], "references": [ { "url": "https://github.com/vastsa/FileCodeBox/issues/133", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json index 35abe519e65..1532344bf74 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34529", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T00:15:10.320", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:30.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/nebari-dev/nebari/blob/5463e8df9e8d53a266a7b9d3d4e27353ec43c40b/src/_nebari/deploy.py#L71", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34532.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34532.json index 704953716f0..b4448639dd3 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34532.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34532.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34532", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T21:15:48.637", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-07-03T02:00:31.917", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo Yvan Dotet PostgreSQL Query Deluxe (tambi\u00e9n conocido como query_deluxe) 17.x anterior a 17.0.0.4 permite a un atacante remoto obtener privilegios a trav\u00e9s del par\u00e1metro de consulta para models/querydeluxe.py:QueryDeluxe::get_result_from_query." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34533.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34533.json index f764a5c448c..669c3210e79 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34533.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34533.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34533", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T21:15:48.687", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-07-03T02:00:33.137", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo ZI PT Solusi Usaha Mudah Analytic Data Query (tambi\u00e9n conocido como izi_data) 11.0 a 17.x anterior a 17.0.3 permite a un atacante remoto obtener privilegios a trav\u00e9s de una consulta a IZITools::query_check, IZITools::query_fetch o IZITools. ::query_execute." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34534.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34534.json index a02854287a9..84ed247b8fc 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34534.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34534.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34534", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T21:15:48.737", - "lastModified": "2024-05-07T13:39:32.710", + "lastModified": "2024-07-03T02:00:34.370", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo Text Commander de Cybrosys Techno Solutions (tambi\u00e9n conocido como text_commander) 16.0 a 16.0.1 permite a un atacante remoto obtener privilegios a trav\u00e9s del par\u00e1metro de datos para models/ir_model.py:IrModel::chech_model." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34538.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34538.json index 455462a2efe..4ae81de66fe 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34538.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34538.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34538", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T03:15:10.010", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:00:35.197", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Mateso PasswordSafe hasta 8.13.9.26689 tiene criptograf\u00eda d\u00e9bil." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] + } + ], "references": [ { "url": "https://hansesecure.de/2023/02/schwachstelle-in-passwordsafe-mateso/", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34539.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34539.json index 78fda06be6a..3e8c71868e3 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34539.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34539.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34539", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.537", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:00:36.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Las credenciales codificadas en el firmware TerraMaster TOS hasta la versi\u00f3n 5.1 permiten que un atacante remoto inicie sesi\u00f3n con \u00e9xito en el servidor de correo o webmail. Estas credenciales tambi\u00e9n se pueden utilizar para iniciar sesi\u00f3n en el panel de administraci\u00f3n y realizar acciones privilegiadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://shinnai.altervista.org/exploits/SH-20240611-CVE-2024-34539.html", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34580.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34580.json index 25669ed538a..dbafb0b5118 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34580.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34580.json @@ -2,8 +2,16 @@ "id": "CVE-2024-34580", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T05:15:51.093", - "lastModified": "2024-06-26T16:15:11.437", + "lastModified": "2024-07-03T02:00:39.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -14,7 +22,42 @@ "value": "Apache XML Security para C++ hasta 2.0.4 implementa la especificaci\u00f3n de procesamiento y sintaxis de firma XML (XMLDsig) sin protecci\u00f3n contra un payload SSRF en un elemento KeyInfo. NOTA: el proveedor cuestiona este Registro CVE con el argumento de que est\u00e1 implementando la especificaci\u00f3n \"correctamente\" y no tiene \"culpa\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://cloud.google.com/blog/topics/threat-intelligence/apache-library-allows-server-side-request-forgery", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34581.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34581.json index 1892dbd2e24..334256714c9 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34581.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34581.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34581", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T05:15:51.227", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:00:40.357", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La especificaci\u00f3n W3C XML Signature Syntax and Processing (XMLDsig), a partir de 1.0, se public\u00f3 originalmente con una declaraci\u00f3n \"RetrievalMethod es un URI... que puede usarse para obtener informaci\u00f3n de clave y/o certificado\" y sin informaci\u00f3n adjunta sobre los riesgos de SSRF, y esto puede haber contribuido a implementaciones vulnerables como las analizadas en CVE-2023-36661 y CVE-2024-21893. NOTA: esto se mitig\u00f3 en 1.1 y 2.0 a trav\u00e9s de un documento de Mejores Pr\u00e1cticas al que se hace referencia directamente y que pide a los implementadores que tengan cuidado con la SSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2024-21893.md", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34582.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34582.json index 7b63605115e..334be288c19 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34582.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34582.json @@ -2,15 +2,51 @@ "id": "CVE-2024-34582", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-16T15:15:47.760", - "lastModified": "2024-05-16T15:44:44.683", + "lastModified": "2024-07-03T02:00:41.190", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sunhillo SureLine through 8.10.0 on RICI 5000 devices allows cgi/usrPasswd.cgi userid_change XSS within the Forgot Password feature." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/silent6trinity/CVE-2024-34582", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json index bab69f6b350..13a0b9ba426 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34852.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34852", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.303", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:00:50.907", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "F-logic DataCube3 v1.0 se ve afectado por la inyecci\u00f3n de comandos debido a un filtrado inadecuado de cadenas en el punto de ejecuci\u00f3n del comando en el archivo ./admin/transceiver_schedule.php. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad enviando un nombre de archivo que contenga una inyecci\u00f3n de comando. La explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir al atacante ejecutar comandos del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json index 527d02bd9c8..518538bc424 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34854.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34854", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:10.373", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:00:51.720", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "F-logic DataCube3 v1.0 es vulnerable a la carga de archivos a trav\u00e9s de `/admin/transceiver_schedule.php.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json index 3995c229cb9..f60eec79b4d 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34909", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:13.570", - "lastModified": "2024-05-23T20:56:30.393", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:00:52.603", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34914.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34914.json index c9cc7d55ba3..1b5e8e049f1 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34914.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34914.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34914", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:30.530", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:00:53.427", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que php-censor v2.1.4 y corregido en v.2.1.5 utiliza un algoritmo hash d\u00e9bil para su valor Remember_key. Esto permite a los atacantes aplicar fuerza bruta al valor de recordar_clave para obtener acceso a cuentas que han marcado \"recordarme\" al iniciar sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-328" + } + ] + } + ], "references": [ { "url": "https://chmod744.super.site/redacted-vulnerability", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34919.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34919.json index 8202f1a7268..199b4eeda54 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34919.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34919.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34919", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T14:15:10.963", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T02:00:54.243", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Una vulnerabilidad de carga de archivos arbitrarios en el componente \\modstudent\\controller.php de Pisay Online E-Learning System usando PHP/MySQL v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/20", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json index cb2608d7e63..bd6c2c6793f 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34921", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:37.937", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T02:00:55.040", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK X5000R v9.1.0cu.2350_B20230313 conten\u00eda una inyecci\u00f3n de comando a trav\u00e9s de la funci\u00f3n de desconexi\u00f3nVPN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/cainiao159357/x5000r_poc/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34927.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34927.json index 5db1322abbb..c0f47494d9a 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34927.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34927.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34927", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:29.373", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:00:55.873", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/update_classroom.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de nombre." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2021.pdf", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34928.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34928.json index fe67a8fa9cc..6c5d15a4c26 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34928.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34928.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34928", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:29.460", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:00:56.653", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/update_subject_routing.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de calificaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2025.pdf", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34930.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34930.json index e38fae9d18d..8cda21825f6 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34930.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34930.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34930", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:29.830", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:00:57.490", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/all_events1.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro mes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2026.pdf", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34933.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34933.json index 5bcd05aeb76..d193f223c31 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34933.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34933.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34933", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.107", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:00:58.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/update_grade.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro admission_fee." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2023.pdf", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json index 22435ee6b05..4819821c4f3 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34943", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.153", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T02:00:59.257", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro de p\u00e1gina en ip/goform/NatStaticSetting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromNatStaticSetting-fae26e1bfbe64b49a46230a629b6d198", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json index c880793d8cf..e03fd799b14 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34945", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.660", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T02:01:00.147", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro PPW en ip/goform/WizardHandle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromWizardHandle-98e188c072984620a907ea5df0d80ad5", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json index 2034fb6e174..52c19464442 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34946", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.767", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T02:01:00.960", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro de p\u00e1gina en ip/goform/DhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromDhcpListClient_page-c9ee71f670534555a5ef2d99320da48e", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json index 186590de39b..f1a80709b50 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34950", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:30.633", - "lastModified": "2024-05-15T16:15:10.333", + "lastModified": "2024-07-03T02:01:01.753", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-822+ v1.0.5 contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n SetNetworkTomographySettings. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-822-v1-0-5-Stack-Overflow-e77ff3d9c31f4a98bfa0fa71eca54000", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34953.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34953.json index 6cea0624b16..9595233d78e 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34953.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34953.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34953", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T14:15:09.580", - "lastModified": "2024-05-20T15:17:54.513", + "lastModified": "2024-07-03T02:01:02.633", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en taurusxin ncmdump v1.3.2 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el agotamiento de la memoria al proporcionar un archivo .ncm manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json index fc8a85dcbf9..a1388c08fbc 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json @@ -2,15 +2,51 @@ "id": "CVE-2024-34954", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:08.193", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:01:03.443", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Budget Management 1.0 is vulnerable to Cross Site Scripting (XSS) via the budget parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json index b530afe97cf..85fafe3f025 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json @@ -2,15 +2,51 @@ "id": "CVE-2024-34955", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:08.287", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:01:04.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Budget Management 1.0 is vulnerable to SQL Injection via the delete parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34958.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34958.json index 52d3fcfa914..df9a65cb0e2 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34958.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34958.json @@ -2,15 +2,51 @@ "id": "CVE-2024-34958", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-16T15:15:48.050", - "lastModified": "2024-05-16T15:44:44.683", + "lastModified": "2024-07-03T02:01:05.013", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/banner_deal.php?mudi=add" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Gr-1m/cms/blob/main/2.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34959.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34959.json index 9307999171a..04afed26d4e 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34959.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34959.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34959", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T20:15:07.243", - "lastModified": "2024-05-20T13:00:34.807", + "lastModified": "2024-07-03T02:01:05.837", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " DedeCMS V5.7.113 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de sys_data_replace.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gitee.com/upgogo/s123/issues/I9MARO", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json index be549fa37c3..4b14c66aa40 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34974", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.873", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T02:01:06.613", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tenda AC18 v15.03.05.19 es vulnerable al desbordamiento del b\u00fafer en la funci\u00f3n formSetPPTPServer a trav\u00e9s del par\u00e1metro endIp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34988.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34988.json index ac1ee20cb72..928271bb06d 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34988.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34988.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34988", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T23:15:10.527", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:01:07.437", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo \"Completo para crear una cotizaci\u00f3n en Frontend + Backend Pro\" (askforaquotemodul) <= 1.0.51 de Comprar complementos para PrestaShop permite a atacantes ver informaci\u00f3n confidencial y causar otros impactos a trav\u00e9s de los m\u00e9todos `AskforaquotemodulcustomernewquoteModuleFrontController::run() `, `AskforaquotemoduladdproductnewquoteModuleFrontController::run()`, `AskforaquotemodulCouponcodeModuleFrontController::run()`, `AskforaquotemodulgetshippingcostModuleFrontController::run()`, `AskforaquotemodulgetstateModuleFrontController::run().`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/askforaquotemodul.html", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34989.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34989.json index 63f8b1b54c6..3a54b344b52 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34989.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34989.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34989", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T22:15:10.947", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T02:01:08.240", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo Evoluci\u00f3n del cat\u00e1logo RSI PDF/HTML (prestapdf) <= 7.0.0 de RSI para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `PrestaPDFProductListModuleFrontController::queryDb().'" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34991.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34991.json index d0be64eccdb..7fc3445799b 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34991.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34991.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34991", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T22:15:10.290", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:01:09.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"Axepta\" (axepta) anterior a 1.3.4 de Quadra Informatique para PrestaShop, un invitado puede descargar informaci\u00f3n parcial de la tarjeta de cr\u00e9dito (fecha de vencimiento) / direcci\u00f3n postal / correo electr\u00f3nico / etc. sin restricciones debido a la falta de control de permisos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/axepta.html", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34992.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34992.json index 5e832c648d8..b89e65bb70a 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34992.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34992.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34992", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T23:15:10.613", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:01:09.800", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo \"Help Desk - Customer Support Management System\" (servicio de ayuda) hasta la versi\u00f3n 2.4.0 de los m\u00f3dulos FME para PrestaShop permite a atacantes obtener informaci\u00f3n sensible y causar otros impactos a trav\u00e9s de 'Tickets::getsearchedtickets()'" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/helpdesk.html", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34994.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34994.json index 6711b80d0e4..7836d9ae34b 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34994.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34994.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34994", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.130", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:01:10.570", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"Channable\" (channable) hasta la versi\u00f3n 3.2.1 de Channable para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `ChannableFeedModuleFrontController::postProcess()`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-channable.md", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34995.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34995.json index b6a3f86daea..756a25bce25 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34995.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34995.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34995", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T16:15:10.460", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T02:01:11.353", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que svnWebUI v1.8.3 conten\u00eda una vulnerabilidad de eliminaci\u00f3n de archivos arbitraria a trav\u00e9s del par\u00e1metro dirTemps en com.cym.controller.UserController#importOver. Esta vulnerabilidad permite a los atacantes eliminar archivos arbitrarios mediante una solicitud POST manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-57" + } + ] + } + ], "references": [ { "url": "https://github.com/cym1102/svnWebUI/issues/8", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3407.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3407.json index 8f19052797c..1362077669a 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3407.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3407.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3407", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-15T06:15:11.850", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:06:12.480", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento WP Prayer WordPress hasta la versi\u00f3n 2.0.9 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3411.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3411.json index a016cbff686..b98318575da 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3411.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3411.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3411", "sourceIdentifier": "cret@cert.org", "published": "2024-04-30T19:15:23.353", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-07-03T02:06:13.437", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Las implementaciones de sesiones autenticadas de IPMI no proporcionan suficiente aleatoriedad para proteger contra el secuestro de sesiones, lo que permite a un atacante utilizar un ID de sesi\u00f3n de IPMI predecible o un n\u00famero aleatorio de BMC d\u00e9bil para eludir los controles de seguridad utilizando paquetes IPMI falsificados para administrar el dispositivo BMC." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://kb.cert.org/vuls/id/163057", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3472.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3472.json index ae48c4dd1e0..6ea90fce62a 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3472.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3472.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3472", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-02T06:15:50.453", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T02:06:14.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento Modal Window de WordPress anterior a 5.3.10 no tiene activada la verificaci\u00f3n CSRF cuando se eliminan modales de forma masiva, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los elimine mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d42f74dd-520f-40aa-9cf0-3544db9562c7/", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3477.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3477.json index 4bdb7a3e0dc..b887a1dd79e 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3477.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3477.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3477", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-02T06:15:50.950", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T02:06:15.707", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3481.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3481.json index a6b40ba41b2..a486dab9a06 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3481.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3481.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3481", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-02T06:15:51.130", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T02:06:16.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Counter Box de WordPress anterior a 1.2.4 no tiene comprobaciones CSRF en algunas acciones masivas, lo que podr\u00eda permitir a los atacantes hacer que los administradores que han iniciado sesi\u00f3n realicen acciones no deseadas, como eliminar contadores mediante ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35012.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35012.json index 903bfee9fa0..3590e83bba6 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35012.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35012.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35012", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:31.100", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:01:12.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/infoType_deal.php?mudi=add&nohrefStr=close." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Thirtypenny77/cms/blob/main/7.md", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35039.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35039.json index 6da47f51693..779711a12c2 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35039.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35039.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35039", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-16T15:15:48.137", - "lastModified": "2024-05-16T15:44:44.683", + "lastModified": "2024-07-03T02:01:12.907", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -11,6 +12,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/ywf7678/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35048.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35048.json index a8b7bb5b494..061e1c580ac 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35048.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35048.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35048", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.973", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-07-03T02:01:13.607", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en SurveyKing v1.3.1 permite a los atacantes ejecutar un ataque de repetici\u00f3n de sesi\u00f3n despu\u00e9s de que un usuario cambia su contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://github.com/javahuang/SurveyKing/issues/56", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35049.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35049.json index a6e3dbd5d66..05f476758a7 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35049.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35049.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35049", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:39.080", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-07-03T02:01:14.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que SurveyKing v1.3.1 mantiene activas las sesiones de los usuarios despu\u00e9s de cerrar sesi\u00f3n. Relacionado con una soluci\u00f3n incompleta para CVE-2022-25590." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://github.com/javahuang/SurveyKing/issues/55", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35050.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35050.json index e7afb09a22d..c5ee31c685b 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35050.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35050.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35050", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:39.180", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-07-03T02:01:15.190", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en SurveyKing v1.3.1 permite a los atacantes escalar privilegios mediante la reutilizaci\u00f3n del ID de sesi\u00f3n de un usuario que fue eliminado por un administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://github.com/javahuang/SurveyKing/issues/57", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json index f0cacd50334..6c9736ce80c 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35057.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35057", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.820", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T02:01:16.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema en NASA AIT-Core v2.5.2 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json index c2d8d7db394..14e07f9e81c 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35058.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35058", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T18:15:09.903", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T02:01:16.830", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema en la funci\u00f3n de espera de API de NASA AIT-Core v2.5.2 permite a los atacantes ejecutar c\u00f3digo arbitrario proporcionando una cadena manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json index fbbacd6a47c..b1cb2876dfa 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35059.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35059", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.240", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T02:01:17.657", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema en la librer\u00eda Pickle Python de NASA AIT-Core v2.5.2 permite a los atacantes ejecutar comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json index 36d9f347616..af1546aafe2 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35060.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35060", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.313", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-07-03T02:01:18.427", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema en la librer\u00eda YAML Python de NASA AIT-Core v2.5.2 permite a los atacantes ejecutar comandos arbitrarios proporcionando un archivo YAML manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json index 3c4b7ae1082..0674430eb37 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35061.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35061", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T19:15:10.390", - "lastModified": "2024-05-22T18:15:10.133", + "lastModified": "2024-07-03T02:01:19.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que NASA AIT-Core v2.5.2 utiliza canales no cifrados para intercambiar datos a trav\u00e9s de la red, lo que permite a los atacantes ejecutar un ataque man in the middle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], "references": [ { "url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35080.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35080.json index 128e55a29f8..bc560f9bfde 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35080.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35080.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35080", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T19:16:01.470", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:01:19.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el m\u00e9todo gok4 de inxedu v2024.4 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo .jsp manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35080.txt", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35081.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35081.json index d5a90ea8659..4b780811de9 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35081.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35081.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35081", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.457", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:01:20.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que LuckyFrameWeb v3.5.2 conten\u00eda una vulnerabilidad de eliminaci\u00f3n de archivos arbitraria a trav\u00e9s del par\u00e1metro fileName en el m\u00e9todo fileDownload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://www.luckyframe.cn/", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35084.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35084.json index 2dd8026bbac..d3d1ae52263 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35084.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35084.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35084", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.733", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:01:21.793", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de la funci\u00f3n findPage en SysMsgPushMapper.xml." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35084.txt", diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35086.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35086.json index 3cf05101d1f..b36f6b897ac 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35086.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35086.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35086", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.943", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:01:22.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de la funci\u00f3n findPage en BpmTaskFromMapper.xml." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35086.txt", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35108.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35108.json index a1b13218f35..3504176db06 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35108.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35108.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35108", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T02:15:08.143", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:01:23.437", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/homePro_deal.php?mudi=del&dataType=&dataTypeCN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/FirstLIF/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35109.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35109.json index 1d16e724afe..7d72fe6eccc 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35109.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35109.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35109", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T02:15:08.840", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:01:24.210", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /homePro_deal.php?mudi=add&nohrefStr=close." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/FirstLIF/cms/blob/main/2.md", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35110.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35110.json index 8a5f26ac4d7..74e6b61afa2 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35110.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35110.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35110", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-17T08:15:06.073", - "lastModified": "2024-05-17T18:36:05.263", + "lastModified": "2024-07-03T02:01:24.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Se ha encontrado una vulnerabilidad de XSS reflejado en YzmCMS 7.1. La vulnerabilidad existe en yzmphp/core/class/application.class.php: cuando los usuarios que han iniciado sesi\u00f3n acceden a un enlace malicioso, un atacante puede capturar sus cookies." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/yzmcms/yzmcms/issues/68", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json index bbe5101e281..991bb8fce01 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35204", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:42.917", - "lastModified": "2024-05-22T21:15:08.100", + "lastModified": "2024-07-03T02:01:28.703", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Veritas System Recovery anterior a 23.2_Hotfix tiene permisos incorrectos para la carpeta Veritas System Recovery y, por lo tanto, los usuarios con pocos privilegios pueden realizar ataques." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-272" + } + ] + } + ], "references": [ { "url": "https://www.veritas.com/support/en_US/security/VTS24-005", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35298.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35298.json index dd8f636e8cd..b154d61eaf0 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35298.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35298.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35298", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-19T05:15:51.907", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:01:32.613", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La autorizaci\u00f3n inadecuada en el controlador para un problema de esquema de URL personalizado en la aplicaci\u00f3n 'ZOZOTOWN' para versiones de Android anteriores a 7.39.6 permite a un atacante llevar a un usuario a acceder a un sitio web arbitrario a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario. Como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-939" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN37818611/", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35350.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35350.json index 9af3f6aa107..136bfb2b457 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35350.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35350.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35350", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:33.300", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:01:34.357", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 2.3 de Di\u00f1o Physics School Assistant. La vulnerabilidad afecta a un c\u00f3digo no identificado dentro del archivo /admin/?page=borrow/view_borrow. La manipulaci\u00f3n del argumento id puede provocar una inyecci\u00f3n de SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298666/vuln6-blind-sql-injection-time-based", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35351.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35351.json index 388bc96ce5e..8b7e2446a59 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35351.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35351.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35351", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:33.393", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:01:35.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 2.3 de Di\u00f1o Physics School Assistant. Esta vulnerabilidad afecta el c\u00f3digo no identificado dentro del archivo /classes/SystemSettings.php?f=update_settings. La manipulaci\u00f3n del nombre del par\u00e1metro da como resultado Cross-site Scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298534/vuln2-execution-after-redirect-ear-stored-cross-site-scripting-xss", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35352.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35352.json index 1d1c2595031..d0392353bb4 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35352.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35352.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35352", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:33.480", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:01:35.943", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 2.3 de Di\u00f1o Physics School Assistant. Esta vulnerabilidad afecta el c\u00f3digo no identificado dentro del archivo /classes/Users.php?f=save. La manipulaci\u00f3n del par\u00e1metro segundo nombre da como resultado Cross-site Scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298742/vuln7-stored-cross-site-scripting-xss", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json index 0a6bb58c254..068d1aadf11 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35353.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35353", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T17:15:33.580", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:01:36.723", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 2.3 de Di\u00f1o Physics School Assistant. La vulnerabilidad afecta a un c\u00f3digo no identificado dentro del archivo /classes/Users.php?f=save. La manipulaci\u00f3n del argumento id puede dar lugar a una autorizaci\u00f3n inadecuada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298777/vuln8-insecure-direct-object-references-idor", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35356.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35356.json index 1e1a3968243..854d8208333 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35356.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35356.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35356", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T16:15:10.593", - "lastModified": "2024-05-30T18:19:11.743", + "lastModified": "2024-07-03T02:01:36.923", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 2.3 de Di\u00f1o Physics School Assistant. La vulnerabilidad afecta a un c\u00f3digo no identificado dentro del archivo /classes/Master.php?f=save_item. La manipulaci\u00f3n del argumento id puede provocar una inyecci\u00f3n de SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298676/vuln11-error-based-sql-injection", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35357.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35357.json index 792e6cc2b56..3b9254d0cc5 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35357.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35357.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35357", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T16:15:10.690", - "lastModified": "2024-05-30T18:19:11.743", + "lastModified": "2024-07-03T02:01:37.703", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 2.3 de Di\u00f1o Physics School Assistant. La vulnerabilidad afecta a un c\u00f3digo no identificado dentro del archivo /classes/Master.php?f=delete_item. La manipulaci\u00f3n del argumento id puede provocar una inyecci\u00f3n de SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://vuln.pentester.stream/pentester-vulnerability-research/post/2298672/vuln12-error-based-sql-injection", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35361.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35361.json index 57bd5a57c98..7d4c6966cd3 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35361.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35361.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35361", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T13:15:09.057", - "lastModified": "2024-05-21T16:54:35.880", + "lastModified": "2024-07-03T02:01:38.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "MTab Bookmark v1.9.5 tiene una vulnerabilidad de inyecci\u00f3n SQL en /LinkStore/getIcon. Un atacante puede ejecutar declaraciones SQL arbitrarias a trav\u00e9s de esta vulnerabilidad sin requerir ning\u00fan derecho de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/37", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35385.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35385.json index 36bfd64819a..0fbeb1c9799 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35385.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35385.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35385", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T14:15:12.307", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-07-03T02:01:39.520", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema en Cesanta mjs 2.20.0 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n mjs_mk_ffi_sig en el archivo mjs.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/cesanta/mjs/issues/288", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json index 6f3c467e814..dc1243469b5 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35387", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T18:15:08.363", - "lastModified": "2024-05-28T12:39:42.673", + "lastModified": "2024-07-03T02:01:40.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK LR350 V9.3.5u.6369_B20220309 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro http_host en la funci\u00f3n loginAuth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/loginAuth_http_host/README.md", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35388.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35388.json index 8d7d57a7f51..b280e3840bb 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35388.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35388.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35388", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T19:15:10.037", - "lastModified": "2024-05-28T12:39:42.673", + "lastModified": "2024-07-03T02:01:41.110", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK NR1800X v9.1.0u.6681_B20230703 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro de contrase\u00f1a en la funci\u00f3n urldecode" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20NR1800X/README.md", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35395.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35395.json index 64a05363f4b..0c934b954d5 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35395.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35395.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35395", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T16:15:10.670", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T02:01:41.880", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP900L v4.1.5cu.798_B20221228 contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow.sample, que permite a los atacantes iniciar sesi\u00f3n como root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "http://totolink.com", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35396.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35396.json index f917beb76c2..b45e738f884 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35396.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35396.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35396", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T16:15:10.897", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T02:01:42.667", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP900L v4.1.5cu.798_B20221228 conten\u00eda una contrase\u00f1a codificada para telnet en /web_cste/cgi-bin/product.ini, que permite a los atacantes iniciar sesi\u00f3n como root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "http://totolink.com", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35398.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35398.json index 00c269f6147..c3ec86706fc 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35398.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35398.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35398", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T15:15:09.497", - "lastModified": "2024-05-28T17:11:55.903", + "lastModified": "2024-07-03T02:01:43.440", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP900L v4.1.5cu.798_B20221228 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro desc en la funci\u00f3n setMacFilterRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://totolink.com", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35403.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35403.json index 7c1b7432b42..e2b057ad181 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35403.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35403.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35403", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:11.060", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:01:44.377", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP900L v4.1.5cu.798_B20221228 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro desc en la funci\u00f3n setIpPortFilterRules" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK%20CP900L/setIpPortFilterRules/README.md", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35430.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35430.json index 036877fab70..017604afb51 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35430.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35430.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35430", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-30T16:15:10.877", - "lastModified": "2024-05-30T18:19:11.743", + "lastModified": "2024-07-03T02:01:45.150", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En ZKTeco ZKBio CVSecurity v6.1.1, un usuario autenticado puede omitir las comprobaciones de contrase\u00f1a mientras exporta datos desde la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/mrojz/ZKT-Bio-CVSecurity/blob/main/CVE-2024-35430.md", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35475.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35475.json index 6c57619df47..3ecb41c37cf 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35475.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35475.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35475", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:08.860", - "lastModified": "2024-05-22T19:15:09.373", + "lastModified": "2024-07-03T02:01:45.963", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 una vulnerabilidad de Cross-Site Request Forgery (CSRF) en OpenKM Community Edition en la versi\u00f3n 6.3.12 o anterior. La vulnerabilidad existe en /admin/DatabaseQuery, que permite a un atacante manipular a una v\u00edctima con privilegios administrativos para ejecutar comandos SQL arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/carsonchan12345/CVE-2024-35475", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35510.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35510.json index 505b92f55c1..2d1933d16ac 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35510.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35510.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35510", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:35.883", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:01:46.810", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en /dede/file_manage_control.php de DedeCMS v5.7.114 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/QianGeG/CVE/issues/14", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35511.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35511.json index dd3b6717a7f..71bae04e5e5 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35511.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35511.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35511", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T21:16:31.610", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:01:47.583", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "phpgurukul Men Salon Management System v2.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"nombre de usuario\" de /msms/admin/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/efekaanakkar/CVE-2024-35511/blob/main/Men%20Salon%20Management%20System%20Using%20PHP%20and%20MySQL.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35551.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35551.json index dc99e11f9d2..1fb46bbf589 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35551.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35551.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35551", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.040", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:48.753", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/16/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json index 9197680c309..06af1bad9ec 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35554", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.307", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:49.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/19/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35555.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35555.json index c3aadf1f8aa..4c3fb7b4187 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35555.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35555.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35555", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.390", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:50.260", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/share_switch.php?mudi=switch&dataType=newsWeb&fieldName=state&fieldName2=state&tabName=infoWeb&dataID=40." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/18/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35557.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35557.json index 34332204b53..d3d57402b6c 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35557.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35557.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35557", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.563", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:51.060", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/vpsApi_deal.php?mudi=rev&nohrefStr=close." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/27/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json index 9f61a5d53ae..4a91b5cfa0b 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35558", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.653", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:51.867", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/ca_deal.php?mudi=rev&nohrefStr=close." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/24/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35559.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35559.json index ae6da399734..0b61deae0b6 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35559.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35559.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35559", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.750", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:52.063", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/infoMove_deal.php?mudi=rev&nohrefStr=close." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/22/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35560.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35560.json index ecd04246bca..6ba77d19ce8 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35560.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35560.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35560", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.833", - "lastModified": "2024-05-22T14:30:41.953", + "lastModified": "2024-07-03T02:01:52.840", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/25/csrf.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35571.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35571.json index 1a29a564fb9..c2234fd5a3d 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35571.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35571.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35571", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.527", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T02:01:53.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Tenda AX1806 v1.0.0.1 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro iptv.stb.mode en la funci\u00f3n formSetIptv." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formSetIptv-cebf9202122a4582ae86c5253b3f6da3?pvs=4", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35576.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35576.json index 32b255ac6fd..57cd8be5cc9 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35576.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35576.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35576", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.590", - "lastModified": "2024-05-20T19:34:58.277", + "lastModified": "2024-07-03T02:01:54.333", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Tenda AX1806 v1.0.0.1 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro iptv.stb.port en la funci\u00f3n formSetIptv." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formSetIptv-cebf9202122a4582ae86c5253b3f6da3?pvs=4", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35581.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35581.json index 2b7b6a79ed8..64073488077 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35581.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35581.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35581", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:35.960", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-07-03T02:01:55.113", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-site scripting (XSS) en Sourcecodester Laboratory Management System v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de entrada Nombre del prestatario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/r04i7/CVE/blob/main/CVE-2024-35581.md", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35595.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35595.json index 807eea20c15..7d08506de6f 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35595.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35595.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35595", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T14:15:17.487", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T02:01:55.937", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitraria en la funci\u00f3n Vista previa de archivos de Xintongda OA v2023.12.30.1 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Joying-C/Cross-site-scripting-vulnerability/blob/main/Xintongda-OA_Cross_site%20_scripting%20_vulnerability/Xintongda-OA_Cross_site%20_scripting%20_vulnerability.pdf", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json index 43fec76f6c5..c2b9cdbed02 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35618.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35618", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T15:15:24.670", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-07-03T02:01:56.717", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que PingCAP TiDB v7.5.1 contiene una desreferencia de puntero NULL a trav\u00e9s del componente SortedRowContainer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/GaranR/0b75c6f2c0215db39c910022daf6522c", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35627.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35627.json index 10bce03c1ed..489c2f5e1d9 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35627.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35627.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35627", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T19:15:09.453", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:01:57.493", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Tileserver-gl hasta v4.4.10 contiene una vulnerabilidad de Cross-Site Scripting (XSS) a trav\u00e9s del componente /data/v3/?key." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/SaleSlave/e23d49e7f8eb937784d15c2c2fc34fca", diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35799.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35799.json index 1339c895a46..2995dfd9e7a 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35799.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35799.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35799", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:12.420", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T02:02:11.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: evita fallos al deshabilitar la transmisi\u00f3n [Por qu\u00e9] Al deshabilitar el codificador de transmisi\u00f3n se invoca una funci\u00f3n que ya no existe. [C\u00f3mo] Compruebe si la declaraci\u00f3n de funci\u00f3n es NULL al desactivar el codificador de flujo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2b17133a0a2e0e111803124dad09e803718d4a48", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35801.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35801.json index 379c857e0b9..defd4a863d7 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35801.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35801.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35801", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:12.827", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T02:02:12.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/fpu: mantenga xfd_state sincronizado con MSR_IA32_XFD Confirme 672365477ae8 (\"x86/fpu: actualice el estado de XFD cuando sea necesario\") y confirme 8bf26758ca96 (\"x86/fpu: agregue el estado de XFD a fpstate\") introdujo una variable xfd_state por CPU para mantener el valor MSR_IA32_XFD en cach\u00e9, a fin de evitar escrituras innecesarias en el MSR. En la conexi\u00f3n en caliente de la CPU, MSR_IA32_XFD se restablece a init_fpstate.xfd, lo que elimina cualquier estado obsoleto. Pero el valor xfd almacenado en cach\u00e9 por CPU no se restablece, lo que los desincroniza. Como consecuencia, un xfd_update_state() posterior podr\u00eda no actualizar el MSR, lo que a su vez puede provocar que XRSTOR genere un #NM en el espacio del kernel, lo que bloquea el kernel. Para solucionar este problema, introduzca xfd_set_state() para escribir xfd_state junto con MSR_IA32_XFD y util\u00edcelo en todos los lugares que configuren MSR_IA32_XFD." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/10e4b5166df9ff7a2d5316138ca668b42d004422", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35814.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35814.json index 7a9706750d3..005a3926c41 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35814.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35814.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35814", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:15.853", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T02:02:13.390", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: swiotlb: corregida la doble asignaci\u00f3n de ranuras debido a un manejo de alineaci\u00f3n roto. Confirmaci\u00f3n bbb73a103fbb (\"swiotlb: corrija un barino en la correcci\u00f3n de verificaci\u00f3n de alineaci\u00f3n\"), que fue una soluci\u00f3n para la confirmaci\u00f3n 0eee5ae10256 ( \"swiotlb: corregir comprobaciones de alineaci\u00f3n de ranuras\"), provoca una regresi\u00f3n funcional con vsock en una m\u00e1quina virtual mediante el rebote a trav\u00e9s de un grupo DMA SWIOTLB restringido. Cuando virtio asigna las colas virtio para el dispositivo vsock usando dma_alloc_coherent(), la b\u00fasqueda de SWIOTLB puede devolver asignaciones de p\u00e1gina no alineadas si 'area->index' qued\u00f3 desalineado por una asignaci\u00f3n anterior del b\u00fafer: # La direcci\u00f3n final entre par\u00e9ntesis es la direcci\u00f3n de SWIOTLB devuelto a la persona que llama | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: obtuvo la ranura 1645-1649/7168 (0x98326800) | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: obtuvo la ranura 1649-1653/7168 (0x98328800) | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: obtuvo la ranura 1653-1657/7168 (0x9832a800) Esto termina mal (normalmente corrupci\u00f3n del b\u00fafer y/o bloqueo) porque swiotlb_alloc() est\u00e1 esperando una p\u00e1gina -asignaci\u00f3n alineada y, por lo tanto, devuelve ciegamente un puntero a la 'struct page' correspondiente a la asignaci\u00f3n, por lo que asigna dos veces la primera mitad (ranura de 2 KB) de la p\u00e1gina de 4 KB. Solucione el problema tratando la alineaci\u00f3n de asignaci\u00f3n por separado de cualquier requisito de alineaci\u00f3n adicional del dispositivo, utilizando el m\u00e1ximo de los dos como paso para buscar las ranuras del b\u00fafer y teniendo cuidado de garantizar un m\u00ednimo de alineaci\u00f3n de p\u00e1gina para b\u00faferes m\u00e1s grandes que una p\u00e1gina. Esto tambi\u00e9n resuelve las fallos de asignaci\u00f3n de swiotlb que ocurren debido a la inclusi\u00f3n de ~PAGE_MASK en 'iotlb_align_mask' para asignaciones grandes y que resultan en requisitos de alineaci\u00f3n que exceden swiotlb_max_mapping_size()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1055" + }, + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/04867a7a33324c9c562ee7949dbcaab7aaad1fb4", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json index f0c8c0a972c..dc6fc8d022d 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35821", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:17.373", - "lastModified": "2024-06-27T13:15:59.203", + "lastModified": "2024-07-03T02:02:14.487", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: establece la actualizaci\u00f3n de la p\u00e1gina en el lugar correcto. Las lecturas de la cach\u00e9 de la p\u00e1gina no tienen bloqueo, por lo que configurar la actualizaci\u00f3n de la p\u00e1gina reci\u00e9n asignada antes de que la sobrescribamos con los datos que se supone que debe contener lo har\u00e1. permitir que un lector simult\u00e1neo vea datos antiguos. Mueva la llamada a SetPageUptodate a ubifs_write_end(), que es despu\u00e9s de que copiamos los nuevos datos en la p\u00e1gina." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35843.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35843.json index 875dbc3d6a6..78974437546 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35843.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35843.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35843", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:21.313", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-07-03T02:02:16.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/vt-d: use el rbtree del dispositivo en la ruta de informes iopf. El controlador de fallos de la p\u00e1gina de E/S existente actualmente ubica el dispositivo PCI llamando a pci_get_domain_bus_and_slot(). Esta funci\u00f3n busca en la lista de todos los dispositivos PCI hasta encontrar el dispositivo deseado. Para mejorar la eficiencia de la b\u00fasqueda, reempl\u00e1celo con device_rbtree_find() para buscar el dispositivo dentro del rbtree del dispositivo probado. El fallo de la p\u00e1gina de E/S la inicia el dispositivo, que no tiene ning\u00fan mecanismo de sincronizaci\u00f3n con el software para garantizar que el dispositivo permanezca en el \u00e1rbol de dispositivos analizados. En teor\u00eda, el subsistema IOMMU podr\u00eda liberar un dispositivo despu\u00e9s de device_rbtree_find() y antes de iopf_get_dev_fault_param(), lo que causar\u00eda un problema de uso despu\u00e9s de la liberaci\u00f3n. Agregue un mutex para sincronizar la ruta de informe de fallos de la p\u00e1gina de E/S y la ruta del dispositivo de liberaci\u00f3n IOMMU. Este bloqueo no introduce ninguna sobrecarga de rendimiento, ya que el conflicto entre el informe de fallos de la p\u00e1gina de E/S y la liberaci\u00f3n del dispositivo es muy raro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d39238991e745c5df85785604f037f35d9d1b15", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35845.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35845.json index 188ce256296..4b91fc6e6f6 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35845.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35845.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35845", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:21.470", - "lastModified": "2024-06-25T22:15:31.510", + "lastModified": "2024-07-03T02:02:17.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: dbg-tlv: asegurar terminaci\u00f3n NUL. El iwl_fw_ini_debug_info_tlv se usa como una cadena, por lo que debemos asegurarnos de que la cadena termine correctamente antes de usarla." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-134" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35853.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35853.json index 0b1d691089a..16cf0f7532d 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35853.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35853.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35853", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:22.220", - "lastModified": "2024-06-25T22:15:31.740", + "lastModified": "2024-07-03T02:02:18.807", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mlxsw: spectrum_acl_tcam: corrige la p\u00e9rdida de memoria durante el rehash El trabajo retrasado del rehash migra los filtros de una regi\u00f3n a otra. Esto se hace iterando sobre todos los fragmentos (todos los filtros con la misma prioridad) en la regi\u00f3n y en cada fragmento iterando sobre todos los filtros. Si la migraci\u00f3n fallo, el c\u00f3digo intenta migrar los filtros nuevamente a la regi\u00f3n anterior. Sin embargo, la reversi\u00f3n en s\u00ed tambi\u00e9n puede fallor, en cuyo caso se realizar\u00e1 otra migraci\u00f3n por error. Adem\u00e1s de que este ping pong no es una muy buena idea, tambi\u00e9n crea un problema. Cada fragmento virtual hace referencia a dos fragmentos: el que se utiliza actualmente ('vchunk->chunk') y una copia de seguridad ('vchunk->chunk2'). Durante la migraci\u00f3n, el primero contiene el fragmento al que queremos migrar los filtros y el segundo contiene el fragmento desde el que estamos migrando los filtros. Actualmente, el c\u00f3digo supone, pero no verifica, que el fragmento de copia de seguridad no existe (NULL) si el fragmento utilizado actualmente no hace referencia a la regi\u00f3n de destino. Esta suposici\u00f3n se rompe cuando intentamos revertir una reversi\u00f3n, lo que provoca que el fragmento de copia de seguridad se sobrescriba y se filtre [1]. Corrija al no revertir una reversi\u00f3n fallida y agregue una advertencia para evitar casos futuros. [1] ADVERTENCIA: CPU: 5 PID: 1063 en lib/parman.c:291 parman_destroy+0x17/0x20 M\u00f3dulos vinculados en: CPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: GW 6.9.0-rc2- custom-00784-gc6a05c468a0b #14 Nombre del hardware: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 06/01/2019 Cola de trabajo: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work RIP: 0010:parman_destroy+0x17/0x20 [...] : mlxsw_sp_acl_atcam_region_fini +0x19/0x60 mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0 mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470 proceso_one_work+0x151/0x370 trabajador_hilo+0x2cb/0x3e0 kthread+0xd0/0x100 k+0x34/0x50 ret_from_fork_asm+0x1a/0x30 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35854.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35854.json index 8462af3939b..97864edcc49 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35854.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35854.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35854", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:22.450", - "lastModified": "2024-06-25T23:15:30.857", + "lastModified": "2024-07-03T02:02:19.600", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: mlxsw: spectrum_acl_tcam: Corrige posible use after free durante el rehash El trabajo retrasado del rehash migra filtros de una regi\u00f3n a otra seg\u00fan la cantidad de cr\u00e9ditos disponibles. La regi\u00f3n que ha migrado se destruye al final del trabajo si el n\u00famero de cr\u00e9ditos no es negativo, ya que se supone que esto es indicativo de que la migraci\u00f3n se ha completado. Esta suposici\u00f3n es incorrecta ya que una cantidad no negativa de cr\u00e9ditos tambi\u00e9n puede ser el resultado de una migraci\u00f3n fallida. La destrucci\u00f3n de una regi\u00f3n que todav\u00eda tiene filtros que hacen referencia a ella puede resultar en un use after free [1]. Soluci\u00f3n al no destruir la regi\u00f3n si la migraci\u00f3n fallo. [1] ERROR: KASAN: slab-use-after-free en mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230 Lectura del tama\u00f1o 8 en la direcci\u00f3n ffff8881735319e8 por tarea kworker/0:31/3858 CPU: 0 PID: 3858 Comm: kworker/0:31 Tainted : GW 6.9.0-rc2-custom-00782-gf2275c2157d8 #5 Nombre de hardware: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 06/01/2019 Cola de trabajo: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work Seguimiento de llamadas: dump_stack_lvl+ 0xc6/0x120 imprimir_informe+ 0xce/0x670 kasan_report+0xd7/0x110 mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230 mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70 mlxsw_sp_acl_atcam_entry_del+0x81/0x210 _tcam_vchunk_migrate_all+0x3cd/0xb50 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300 Process_one_work+0x8eb/0x19b0 worker_thread+0x6c9/0xf70 kthread+0x2c9/0x3b0 ret_from_fork+ 0x4d/0x80 ret_from_fork_asm+0x1a/0x30 Asignado por tarea 174: kasan_save_stack+0x33/0x60 kasan_save_track+0x14/0x30 __kasan_kmalloc+0x8f/0xa0 __kmalloc+0x19c/0x360 _tcam_region_create+0xdf/0x9c0 mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300 process_one_work+0x8eb /0x19b0 worker_thread+0x6c9/0xf70 kthread+0x2c9/0x3b0 ret_from_fork+0x4d/0x80 ret_from_fork_asm+0x1a/0x30 Freed by task 7: kasan_save_stack+0x33/0x60 kasan_save_track+0x14/0x30 free_info+0x3b/0x60 poison_slab_object+0x102/0x170 __kasan_slab_free+0x14 /0x30 kfree+0xc1/0x290 mlxsw_sp_acl_tcam_region_destroy+0x272/0x310 mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300 process_one_work+0x8eb/0x19b0 worker_thread+0x6c9/0xf70 9/0x3b0 ret_from_fork+0x4d/0x80 ret_from_fork_asm+0x1a/0x30" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/311eeaa7b9e26aba5b3d57b09859f07d8e9fc049", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35869.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35869.json index 12a39f67bda..c99f70eb09f 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35869.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35869.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35869", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:08.340", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-07-03T02:02:21.027", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: garantiza que los hijos recontados desde la sesi\u00f3n principal Evite posibles errores de use after free al recorrer referencias DFS, montar y realizar la conmutaci\u00f3n por error de DFS asegur\u00e1ndose de que todos los hijos del padre @tcon- >ses tambi\u00e9n se cuentan nuevamente. Todos son necesarios en todo el montaje DFS. Deshazte de @tcon->dfs_ses_list mientras estamos en eso tambi\u00e9n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/062a7f0ff46eb57aff526897bd2bebfdb1d3046a", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35899.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35899.json index 56d0601698d..873ca96d17a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35899.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35899.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35899", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:10.807", - "lastModified": "2024-06-25T22:15:32.740", + "lastModified": "2024-07-03T02:02:23.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: vaciado pendiente de destrucci\u00f3n antes del lanzamiento de exit_net. Similar a 2c9f0293280e (\"netfilter: nf_tables: vaciado pendiente de destrucci\u00f3n antes del notificador netlink\") para abordar una carrera entre exit_net y destroy cola de trabajo. El siguiente seguimiento muestra un elemento que se liberar\u00e1 mediante la destrucci\u00f3n de la cola de trabajo, mientras que la ruta exit_net (activada mediante la eliminaci\u00f3n del m\u00f3dulo) ya ha liberado el conjunto que se utiliza en dicha transacci\u00f3n. [1360.547789] ERROR: KASAN: slab-use-after-free en nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables] [1360.547861] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888140500cc0 por tarea kworker/4:1/152465 [1360. 547870] CPU: 4 PID: 152465 Comm: kworker/4:1 No contaminado 6.8.0+ #359 [ 1360.547882] Cola de trabajo: eventos nf_tables_trans_destroy_work [nf_tables] [ 1360.547984] Seguimiento de llamadas: [ 1360.547991] [ 1360.547998] stack_lvl+0x53/0x70 [ 1360.548014] print_report +0xc4/0x610 [1360.548026] ? __virt_addr_valid+0xba/0x160 [1360.548040]? __pfx__raw_spin_lock_irqsave+0x10/0x10 [1360.548054]? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables] [ 1360.548176] kasan_report+0xae/0xe0 [ 1360.548189] ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables] [1360.548312] nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables] [1360.548447] ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables] [1360.548577]? _raw_spin_unlock_irq+0x18/0x30 [ 1360.548591] Process_one_work+0x2f1/0x670 [ 1360.548610] worker_thread+0x4d3/0x760 [ 1360.548627] ? __pfx_worker_thread+0x10/0x10 [ 1360.548640] kthread+0x16b/0x1b0 [ 1360.548653] ? __pfx_kthread+0x10/0x10 [ 1360.548665] ret_from_fork+0x2f/0x50 [ 1360.548679] ? __pfx_kthread+0x10/0x10 [ 1360.548690] ret_from_fork_asm+0x1a/0x30 [ 1360.548707] [ 1360.548719] Asignado por tarea 192061: [ 1360.548726] x20/0x40 [ 1360.548739] kasan_save_track+0x14/0x30 [ 1360.548750] __kasan_kmalloc+0x8f /0xa0 [ 1360.548760] __kmalloc_node+0x1f1/0x450 [ 1360.548771] nf_tables_newset+0x10c7/0x1b50 [nf_tables] [ 1360.548883] nfnetlink_rcv_batch+0xbc4/0xdc0 ] [ 1360.548909] nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink] [ 1360.548927] netlink_unicast+0x367/ 0x4f0 [ 1360.548935] netlink_sendmsg+0x34b/0x610 [ 1360.548944] ____sys_sendmsg+0x4d4/0x510 [ 1360.548953] ___sys_sendmsg+0xc9/0x120 [ 1360.5489 61] __sys_sendmsg+0xbe/0x140 [ 1360.548971] do_syscall_64+0x55/0x120 [ 1360.548982] Entry_SYSCALL_64_after_hwframe+0x55/0x5d [ 1360.548994] Liberado por la tarea 192222: [ 1360.548999] kasan_save_stack+0x20/0x40 [ 1360.549009] kasan_save_track+0x14/0x30 [ 1360.549019] kasan_save_free_info+0x3b/0x60 [ 1360.549028] poison_slab_object+0x100/0x180 [ 1360.549036] __kasan_slab_free+0x14/0x30 [ 1360.549042] kfree+0xb6/0x260 [ 1360.549049] __nft_release_table+0x473/0x6a0 [nf_tables] [ 1360.549131] nf_tables_exit_net+0x170/0x240 [nf_tables] [ 1360.549221] ops_exit_list+0x5 0/0xa0 [ 1360.549229] free_exit_list+0x101/0x140 [ 1360.549236] operaciones_unregister_pernet+0x107/ 0x160 [ 1360.549245] unregister_pernet_subsys+0x1c/0x30 [ 1360.549254] nf_tables_module_exit+0x43/0x80 [nf_tables] [ 1360.549345] [ 1360.549352] do_syscall_64+0x55/0x120 [ 1360.549360] Entry_SYSCALL_64_after_hwframe+0x55/0x5d (gdb) lista *__nft_release_table +0x473 0x1e033 est\u00e1 en __nft_release_table (net/netfilter/nf_tables_api.c:11354). 11349 list_for_each_entry_safe(flowtable, nf, &table->flowtables, lista) { 11350 list_del(&flowtable->list); 11351 nft_use_dec(&table->use); 11352 nf_tables_flowtable_destroy(tabla de flujo); 11353 } 11354 list_for_each_entry_safe(set, ns, &table->sets, list) { 11355 list_del(&set->list); 11356 nft_use_dec(&table->use); 11357 if (set->flags & (NFT_SET_MAP | NFT_SET_OBJECT)) 11358 nft_map_deactivat ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/24cea9677025e0de419989ecb692acd4bb34cac2", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json index dd509718b96..c7e383ab8e8 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35948", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:09.440", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-07-03T02:02:27.897", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bcachefs: comprueba si hay entradas de diario que sobrepasen el final de la secci\u00f3n de limpieza de sb. Corrige una comprobaci\u00f3n de l\u00edmites faltantes en la validaci\u00f3n de superbloque. Tenga en cuenta que todav\u00eda no tenemos un c\u00f3digo de reparaci\u00f3n para este caso; el c\u00f3digo de reparaci\u00f3n para elementos individuales generalmente tiene una prioridad baja, ya que todo el superbloque se suma, se valida antes de escribir y tenemos copias de seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/fcdbc1d7a4b638e5d5668de461f320386f3002aa", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json index 21b0dce8383..411dabde2fd 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:10.850", - "lastModified": "2024-06-27T13:15:59.610", + "lastModified": "2024-07-03T02:02:29.083", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: kprobes: soluciona un posible problema de use after free en el registro de kprobe Al descargar un m\u00f3dulo, su estado cambia MODULE_STATE_LIVE -> MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. Cada cambio llevar\u00e1 un tiempo. `is_module_text_address()` y `__module_text_address()` funcionan con MODULE_STATE_LIVE y MODULE_STATE_GOING. Si usamos `is_module_text_address()` y `__module_text_address()` por separado, existe la posibilidad de que el primero tenga \u00e9xito pero el siguiente falle porque module->state se convierte en MODULE_STATE_UNFORMED entre esas operaciones. En `check_kprobe_address_safe()`, si el segundo `__module_text_address()` falla, se ignora porque esperaba una direcci\u00f3n kernel_text. Pero es posible que haya fallado simplemente porque m\u00f3dulo->estado se cambi\u00f3 a MODULE_STATE_UNFORMED. En este caso, arm_kprobe() intentar\u00e1 modificar la direcci\u00f3n de texto del m\u00f3dulo que no existe (use after free). Para solucionar este problema, no debemos usar `is_module_text_address()` y `__module_text_address()` separados, sino usar solo `__module_text_address()` una vez y hacer `try_module_get(module)` que solo est\u00e1 disponible con MODULE_STATE_LIVE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json index 31a6d9c875d..ebf03a3d045 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.190", - "lastModified": "2024-06-27T12:15:26.787", + "lastModified": "2024-07-03T02:02:30.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5: vincular correctamente nuevas reglas fs al \u00e1rbol. Anteriormente, add_rule_fg solo agregaba reglas reci\u00e9n creadas desde el identificador al \u00e1rbol cuando ten\u00edan un recuento de 1. Por otro lado Por otro lado, create_flow_handle se esfuerza por encontrar y hacer referencia a reglas id\u00e9nticas ya existentes en lugar de crear otras nuevas. Estos dos comportamientos pueden dar lugar a una situaci\u00f3n en la que create_flow_handle 1) crea una nueva regla y hace referencia a ella, luego 2) en un paso posterior durante la creaci\u00f3n del mismo identificador hace referencia a ella nuevamente, lo que da como resultado una regla con un recuento de 2 que no est\u00e1 vinculada a el \u00e1rbol, tendr\u00e1 un padre y una ra\u00edz NULL y provocar\u00e1 un bloqueo cuando se elimine el grupo de flujo porque del_sw_hw_rule, invocado al eliminar la regla, asume que nodo->padre es != NULL. Esto sucedi\u00f3 en la naturaleza, debido a otro error relacionado con el manejo incorrecto de identificadores de pkt_reformat duplicados, lo que llev\u00f3 al c\u00f3digo en create_flow_handle a hacer referencia incorrecta a una regla reci\u00e9n agregada en el mismo identificador de flujo, lo que result\u00f3 en el problema descrito anteriormente. Los detalles completos est\u00e1n en [1]. Este parche cambia add_rule_fg para agregar nuevas reglas sin padres al \u00e1rbol, inicializ\u00e1ndolas correctamente y evitando el bloqueo. Esto lo hace m\u00e1s coherente con la forma en que se agregan reglas a un FTE en create_flow_handle." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json index fbc0787d751..6cfceb2777b 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.273", - "lastModified": "2024-06-25T22:15:34.027", + "lastModified": "2024-07-03T02:02:31.857", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: xsk: validar la entrada del usuario para XDP_{UMEM|COMPLETION}_FILL_RING syzbot inform\u00f3 una copia ilegal en xsk_setsockopt() [1] Aseg\u00farese de validar el par\u00e1metro @optlen setsockopt(). [1] BUG: KASAN: losa fuera de l\u00edmites en copy_from_sockptr_offset include/linux/sockptr.h:49 [en l\u00ednea] ERROR: KASAN: losa fuera de l\u00edmites en copy_from_sockptr include/linux/sockptr.h:55 [en l\u00ednea] ERROR: KASAN: losa fuera de l\u00edmites en xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888028c6cde3 mediante la tarea syz-executor.0/7549 CPU: 0 PID: 7549 Comm: syz-executor.0 No contaminado 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 27/03/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack .c:88 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/ 0x180 mm/kasan/report.c:601 copy_from_sockptr_offset include/linux/sockptr.h:49 [en l\u00ednea] copy_from_sockptr include/linux/sockptr.h:55 [en l\u00ednea] xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420 do_sock_setsockopt+0x3af/0x720 net/socket.c:2311 __sys_setsockopt+0x1ae/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [en l\u00ednea] __se_sys_setsockopt net/socket.c:2340 [en l\u00ednea] x64_sys_setsockopt+0xb5/ 0xd0 net/socket.c:2340 do_syscall_64+0xfb/0x240 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 RIP: 0033:0x7fb40587de69 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 0c8 EFLAGS: 00000246 ORIG_RAX : 0000000000000036 RAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69 RDX: 0000000000000005 RSI: 000000000000011b RDI: 000000000 0000006 RBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000 R10: 0000000020001980 R11: 0000000000000246 R12: 000000000 0000000 R13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08 Asignado por tarea 7549: kasan_save_stack mm/kasan/common.c:47 [en l\u00ednea] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 veneno_kmalloc_redzone mm/kasan/common.c:370 [en l\u00ednea] __kasan_kmalloc+0x98/ 0xb0 mm/kasan/common.c:387 kasan_kmalloc include/linux/kasan.h:211 [en l\u00ednea] __do_kmalloc_node mm/slub.c:3966 [en l\u00ednea] __kmalloc+0x233/0x4a0 mm/slub.c:3979 kmalloc include/linux /slab.h:632 [en l\u00ednea] __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869 do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293 __sys_setsockopt+0x1ae/0x250 334 __do_sys_setsockopt net/ socket.c:2343 [en l\u00ednea] __se_sys_setsockopt net/socket.c:2340 [en l\u00ednea] __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340 do_syscall_64+0xfb/0x240 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 El error la direcci\u00f3n pertenece al objeto en ffff888028c6cde0 que pertenece al cach\u00e9 kmalloc-8 de tama\u00f1o 8 La direcci\u00f3n con errores se encuentra 1 byte a la derecha de la regi\u00f3n asignada de 2 bytes [ffff888028c6cde0, ffff888028c6cde2) La direcci\u00f3n con errores pertenece a la p\u00e1gina f\u00edsica: p\u00e1gina:ffffea0000a31b00 refcount:1 mapcount:0 Mapeo: 00000000000000000000 \u00cdNDICE: 0xffff888028c6c9c0 pfn: 0x28c6c Anon Flags: 0xffff00000000800 (Slab | Node = 0 | Zone = 1 | LastCpupid = 0x7ff) Page_Type: 0xffffffffffff () RAW: 00FFF000000800 0000000000000000 Dead000000000001 Raw: FFFFF888028C6C9C0 000000000080800057 00000001FFFFFFFFFFFFFFF 0000000000000000 P\u00e1gina arrojada porque: Kasan : mal acceso detectado page_owner rastrea la p\u00e1gina como p\u00e1gina asignada por \u00faltima vez mediante orden 0, migrar tipo Inamovible, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223 set _page_owner incluye /linux/page_owner.h:31 [en l\u00ednea] post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533 prep_new_page mm/page_alloc.c: ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0b45c25d60e38f5c2cb6823f886773a34323306d", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json index f2c19ed6d43..646ce1fc86f 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.687", - "lastModified": "2024-06-27T13:15:59.693", + "lastModified": "2024-07-03T02:02:32.940", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json index ed55874372e..85bd01155e0 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json @@ -2,8 +2,9 @@ "id": "CVE-2024-35997", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:13.960", - "lastModified": "2024-06-27T12:15:27.237", + "lastModified": "2024-07-03T02:02:34.990", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-667" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json index c052880639c..b32427bacca 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3508", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T18:15:09.567", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T02:06:18.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-3508", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3515.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3515.json index 86bab25fdaa..de45e12aad3 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3515.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3515.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3515", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-10T19:15:49.670", - "lastModified": "2024-04-19T23:15:11.963", + "lastModified": "2024-07-03T02:06:19.180", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en Dawn en Google Chrome anterior a 123.0.6312.122 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3516.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3516.json index 412f5b16e1d..03a3726262e 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3516.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3516.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3516", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-10T19:15:49.717", - "lastModified": "2024-04-19T23:15:12.003", + "lastModified": "2024-07-03T02:06:20.027", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en ANGLE en Google Chrome anterior a 123.0.6312.122 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3579.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3579.json index 09f9a542274..53268738d77 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3579.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3579.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3579", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T16:17:32.320", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:06:22.743", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El proyecto de c\u00f3digo abierto Online Shopping System Advanced es vulnerable a Cross-Site Scripting (XSS) Reflejado. Un atacante podr\u00eda enga\u00f1ar a alguien para que utilice una URL manipulada, lo que provocar\u00e1 que se ejecute un script en el navegador del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "cvd@cert.pl", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3591.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3591.json index 1e268e4fe52..0d24695895b 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3591.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3591.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3591", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-01T06:15:21.887", - "lastModified": "2024-05-01T13:01:51.263", + "lastModified": "2024-07-03T02:06:23.340", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Geo Controller WordPress anterior a 8.6.5 deserializa la entrada del usuario a trav\u00e9s de algunas de sus acciones AJAX y rutas API REST, lo que podr\u00eda permitir a usuarios no autenticados realizar inyecci\u00f3n de objetos PHP cuando hay un gadget adecuado presente en el blog." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/f85d8b61-eaeb-433c-b857-06ee4db5c7d5/", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json index cc472f7a6ea..868b090d53a 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36013.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36013", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-23T07:15:08.987", - "lastModified": "2024-06-10T17:16:32.087", + "lastModified": "2024-07-03T02:02:37.247", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: corrige slab-use-after-free en l2cap_connect() Amplia una secci\u00f3n cr\u00edtica para evitar que chan se libere anticipadamente. Tambi\u00e9n anule el tipo de retorno l2cap_connect(). Nada utiliza el valor devuelto, pero es feo devolver un puntero potencialmente liberado. Anularlo ayudar\u00e1 con los backports porque los kernels anteriores usaban el valor de retorno. Ahora la compilaci\u00f3n se interrumpir\u00e1 en los n\u00facleos en los que este parche no sea una soluci\u00f3n completa. Resumen de la pila de llamadas: [usar] l2cap_bredr_sig_cmd l2cap_connect ? mutex_lock(&conn->chan_lock); ? chan = pchan->ops->new_connection(pchan); <-alloc chan? __l2cap_chan_add(conexi\u00f3n, chan); ? l2cap_chan_hold(chan); ? list_add(&chan->lista, &conn->chan_l); ... (1) ? mutex_unlock(&conn->chan_lock); chan->conf_state... (4) <- usar despu\u00e9s de gratis [gratis] l2cap_conn_del? mutex_lock(&conn->chan_lock); ? foreach chan en conn->chan_l: ... (2)? l2cap_chan_put(chan); ? l2cap_chan_destroy? kfree(chan) ... (3) <- chan liberado? mutex_unlock(&conn->chan_lock); ==================================================== ================ ERROR: KASAN: slab-use-after-free en instrument_atomic_read include/linux/instrumented.h:68 [en l\u00ednea] ERROR: KASAN: slab-use-after -free en _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [en l\u00ednea] ERROR: KASAN: slab-use-after-free en l2cap_connect+0xa67/0x11a0 net/bluetooth/l2cap_core.c:4260 Lectura del tama\u00f1o 8 en addr ffff88810bf040a0 por tarea kworker/u3:1/311" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/1", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json index 546a3d062e8..46c22c6bdb3 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36016", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-29T19:15:48.297", - "lastModified": "2024-06-27T12:15:27.533", + "lastModified": "2024-07-03T02:02:38.177", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: tty: n_gsm: corrige posibles fuera de los l\u00edmites en gsm0_receive() Suponiendo lo siguiente: - el lado A configura el n_gsm en modo de opci\u00f3n b\u00e1sica - el lado B env\u00eda el encabezado de un mensaje b\u00e1sico trama del modo de opci\u00f3n con longitud de datos 1 - el lado A cambia al modo de opci\u00f3n avanzada - el lado B env\u00eda 2 bytes de datos que exceden gsm->len Motivo: gsm->len no se usa en el modo de opci\u00f3n avanzada. - el lado A cambia al modo de opci\u00f3n b\u00e1sica - el lado B contin\u00faa enviando hasta que gsm0_receive() escribe m\u00e1s all\u00e1 de gsm->buf Motivo: Ni gsm->state ni gsm->len se han restablecido despu\u00e9s de la reconfiguraci\u00f3n. Solucione este problema cambiando gsm->count a gsm->len comparaci\u00f3n de igual a menor que. Tambi\u00e9n agregue comprobaciones de l\u00edmite superior contra la constante MAX_MRU en gsm0_receive() y gsm1_receive() para proteger contra la corrupci\u00f3n de memoria de gsm->len y gsm->mru. Todas las dem\u00e1s comprobaciones permanecen, ya que todav\u00eda necesitamos limitar los datos seg\u00fan la configuraci\u00f3n del usuario y el tama\u00f1o real del payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36031.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36031.json index 0be056bae67..81c375aef58 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36031.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36031.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36031", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:11.410", - "lastModified": "2024-06-27T14:15:14.020", + "lastModified": "2024-07-03T02:02:40.070", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: claves: se corrige la sobrescritura de la caducidad de la clave al crear instancias. El tiempo de caducidad de una clave se sobrescribe incondicionalmente durante la creaci\u00f3n de instancias, y de forma predeterminada se vuelve permanente. Esto causa un problema para la resoluci\u00f3n de DNS ya que la caducidad establecida por el espacio de usuario se sobrescribe en TIME64_MAX, lo que deshabilita m\u00e1s actualizaciones de DNS. Solucione este problema restaurando la condici\u00f3n de que key_set_expiry solo se llama cuando el analizador previo establece una caducidad espec\u00edfica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-324" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/25777f3f4e1f371d16a594925f31e37ce07b6ec7", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json index d0827a1d830..71c6497bb2b 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36037", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-27T18:15:10.407", - "lastModified": "2024-05-31T11:15:09.563", + "lastModified": "2024-07-03T02:02:41.210", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/cve-2024-36037.html", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json index 6618d747fbf..40832ad2b03 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36042", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T06:15:09.293", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T02:02:42.150", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Silverpeas anterior a 6.3.5 permite omitir la autenticaci\u00f3n omitiendo el campo Contrase\u00f1a en AuthenticationServlet, lo que a menudo proporciona a un usuario no autenticado acceso de superadministrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/ChrisPritchard/4b6d5c70d9329ef116266a6c238dcb2d", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36053.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36053.json index 75e663cd221..1a8febbe8dd 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36053.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36053.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36053", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-19T16:15:45.687", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-07-03T02:02:43.043", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En el paquete mintupload hasta 4.2.0 para Linux Mint, el mal manejo del nombre del servicio conduce a la inyecci\u00f3n de comandos a trav\u00e9s de metacaracteres del shell en check_connection, drop_data_received_cb y Service.remove. Un usuario puede modificar el nombre de un servicio en un archivo ~/.linuxmint/mintUpload/services/service." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "http://packages.linuxmint.com/pool/main/m/mintupload/", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36056.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36056.json index 89c11414102..e9df5608d8c 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36056.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36056.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36056", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-26T23:15:21.520", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T02:02:43.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Hw64.sys en Marvin Test HW.exe anterior a 5.0.5.0 permite que procesos en modo de usuario sin privilegios mapeen arbitrariamente la memoria f\u00edsica a trav\u00e9s de IOCTL 0x9c406490 (para IoAllocateMdl, MmBuildMdlForNonPaggedPool y MmMapLockedPages), lo que lleva a una escalada de privilegios NT AUTHORITY\\SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://www.marvintest.com/Downloads.aspx?prodId=12&search=package", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36071.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36071.json index 2c42bd663cb..22829f73706 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36071.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36071.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36071", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T21:15:49.930", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T02:02:44.693", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json index b341dde1e4b..ed2048c7391 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json @@ -2,16 +2,55 @@ "id": "CVE-2024-36075", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.610", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:02:45.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netwrix CoSoSys Endpoint Protector through 5.9.3 and CoSoSys Unify through 7.0.6 contain a remote code execution vulnerability in the application configuration component of the Endpoint Protector and Unify agent which allows a remote, unauthenticated attacker to manipulate the configuration of either their own or another client endpoint resulting in the bypass of certain configuration options. Manipulation of the application configuration can result in local policy bypass and in some scenarios remote code execution." + }, + { + "lang": "es", + "value": "Netwrix CoSoSys Endpoint Protector hasta 5.9.3 y CoSoSys Unify hasta 7.0.6 contienen una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el componente de configuraci\u00f3n de la aplicaci\u00f3n de Endpoint Protector y el agente Unify que permite a un atacante remoto no autenticado manipular la configuraci\u00f3n propia o de otro endpoint del cliente, lo que da como resultado la omisi\u00f3n de ciertas opciones de configuraci\u00f3n. La manipulaci\u00f3n de la configuraci\u00f3n de la aplicaci\u00f3n puede dar como resultado la omisi\u00f3n de la pol\u00edtica local y, en algunos escenarios, la ejecuci\u00f3n remota de c\u00f3digo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://helpcenter.netwrix.com/bundle/z-kb-articles-salesforce/page/kA0Qk0000001E5lKAE.html", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36076.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36076.json index 21d75fba726..1f0be082e04 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36076.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36076.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36076", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-19T20:15:07.970", - "lastModified": "2024-05-21T20:15:08.970", + "lastModified": "2024-07-03T02:02:46.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Syslifters SysReptor anterior a 2024.40 tiene una vulnerabilidad CSRF para conexiones WebSocket." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Syslifters/sysreptor/releases/tag/2024.40", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json index 28a5a4a0081..62573c9c921 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36077", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T17:16:15.377", - "lastModified": "2024-05-22T18:59:20.240", + "lastModified": "2024-07-03T02:02:47.107", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fixes-for-Qlik-Sense-Enterprise-for/ta-p/2452509", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36078.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36078.json index 1e16c595b43..bf7d253e1cc 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36078.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36078.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36078", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-19T20:15:08.043", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-07-03T02:02:47.847", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " En Zammad anterior a 6.3.1, se instala una gema Ruby incluida en Zammad con permisos de archivos de escritura mundial. Esto permiti\u00f3 a un atacante local en el servidor modificar los archivos de la gema, inyectando c\u00f3digo arbitrario en los procesos de Zammad (que se ejecutan con el entorno y los permisos del usuario de Zammad)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://zammad.com/en/advisories/zaa-2024-04", diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36104.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36104.json index 8316bc26a56..8d2ed324c15 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36104.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36104.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36104", "sourceIdentifier": "security@apache.org", "published": "2024-06-04T08:15:10.733", - "lastModified": "2024-06-10T18:15:35.497", + "lastModified": "2024-07-03T02:02:48.717", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Limitaci\u00f3n inadecuada de una vulnerabilidad de nombre de ruta a un directorio restringido (\"Path Traversal\") en Apache OFBiz. Este problema afecta a Apache OFBiz: antes del 18.12.14. Se recomienda a los usuarios actualizar a la versi\u00f3n 18.12.14, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36252.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36252.json index 0789f0d6708..a2a6c70cb96 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36252.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36252.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36252", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-19T07:15:46.200", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:02:59.060", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de restricci\u00f3n inadecuada del canal de comunicaci\u00f3n a los endpoints previstos en Ricoh Streamline NX PC Client versi\u00f3n 3.6.x y versiones anteriores. Si se explota esta vulnerabilidad, se puede ejecutar c\u00f3digo arbitrario en la PC donde est\u00e1 instalado el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN00442488/", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json index 179c1d2c5f8..0cf04089bc0 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36267", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-30T06:15:09.067", - "lastModified": "2024-05-30T13:15:41.297", + "lastModified": "2024-07-03T02:03:00.383", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de Path traversal existe en las versiones del complemento DMSF de Redmine anteriores a la 3.1.4. Si se explota esta vulnerabilidad, un usuario que haya iniciado sesi\u00f3n puede obtener o eliminar archivos arbitrarios en el servidor (dentro del privilegio del proceso Redmine)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/danmunn/redmine_dmsf", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36277.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36277.json index 7745304cbf9..c5b8ae75044 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36277.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36277.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36277", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-17T08:15:48.847", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:01.187", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de verificaci\u00f3n incorrecta de la firma criptogr\u00e1fica en las versiones de la aplicaci\u00f3n \"FreeFrom - the nostr client\" anteriores a la 1.3.5 para Android e iOS. La aplicaci\u00f3n afectada no puede detectar datos de eventos con firmas no v\u00e1lidas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], "references": [ { "url": "https://apps.apple.com/us/app/freefrom-the-nostr-client/id6446819930", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36279.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36279.json index 0a18b742f1a..594cfc509b1 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36279.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36279.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36279", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-17T08:15:48.980", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:01.997", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La dependencia de la ofuscaci\u00f3n o el cifrado de entradas relevantes para la seguridad sin problemas de verificaci\u00f3n de integridad existe en las versiones de la aplicaci\u00f3n \"FreeFrom - the nostr client\" anteriores a la 1.3.5 para Android e iOS. Si se explota esta vulnerabilidad, el contenido de los mensajes directos (DM) entre usuarios puede ser manipulado mediante un ataque de intermediario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-649" + } + ] + } + ], "references": [ { "url": "https://apps.apple.com/us/app/freefrom-the-nostr-client/id6446819930", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36289.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36289.json index b50041937f5..3a2806c3746 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36289.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36289.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36289", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-17T08:15:49.063", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:02.973", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de reutilizaci\u00f3n de un par de claves nonce en el cifrado en las versiones de la aplicaci\u00f3n \"FreeFrom - the nostr client\" anteriores a la 1.3.5 para Android e iOS. Si se explota esta vulnerabilidad, el contenido de los mensajes directos (DM) entre usuarios puede ser manipulado mediante un ataque de intermediario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-323" + } + ] + } + ], "references": [ { "url": "https://apps.apple.com/us/app/freefrom-the-nostr-client/id6446819930", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36302.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36302.json index ad4c1f3179a..345c2b21cd4 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36302.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36302.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36302", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:10.100", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:03:03.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000298063", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36304.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36304.json index 6f6c3ee29f4..97f7e97b382 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36304.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36304.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36304", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:10.480", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:03:04.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000298063", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36307.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36307.json index b72f36c5ba9..15bab4216b5 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36307.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36307.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36307", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:11.043", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:03:05.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000298063", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36360.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36360.json index e3a14bc6a19..e460e1d4b25 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36360.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36360.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36360", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-11T05:15:53.610", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:03:06.327", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo existe en awkblog v0.0.1 (hash de commit: 7b761b192d0e0dc3eef0f30630e00ece01c8d552) y versiones anteriores. Si un atacante remoto no autenticado env\u00eda una solicitud HTTP especialmente manipulada, se puede ejecutar un comando arbitrario del sistema operativo con los privilegios del producto afectado en la m\u00e1quina que ejecuta el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/yammerjp/awkblog/issues/1", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36361.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36361.json index f921f29ee33..acb335746a8 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36361.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36361.json @@ -2,8 +2,16 @@ "id": "CVE-2024-36361", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T06:15:08.947", - "lastModified": "2024-06-06T16:15:12.457", + "lastModified": "2024-07-03T02:03:06.537", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", @@ -14,7 +22,42 @@ "value": "Pug hasta 3.0.2 permite la ejecuci\u00f3n de c\u00f3digo JavaScript si una aplicaci\u00f3n acepta entradas que no son de confianza para la opci\u00f3n de nombre de la funci\u00f3n compileClient, compileFileClient o compileClientWithDependenciesTracked. NOTA: estas funciones son para compilar plantillas de Pug en JavaScript y normalmente no habr\u00eda motivo para permitir llamadas que no sean de confianza." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/pugjs/pug/pull/3428", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json index 6e04b18121d..bdba40492cf 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36426", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-27T22:15:08.507", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T02:03:11.237", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En TARGIT Decision Suite 23.2.15007.0 anterior al oto\u00f1o de 2023, el token de sesi\u00f3n es parte de la URL y puede enviarse en una sesi\u00f3n HTTP de texto sin cifrar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-279" + } + ] + } + ], "references": [ { "url": "https://community.targit.com/hc/en-us/articles/12618082416028-Change-Log-On-prem", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json index 7c25e36ec30..125cdd27959 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36427", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-29T16:15:11.090", - "lastModified": "2024-05-29T19:50:25.303", + "lastModified": "2024-07-03T02:03:12.033", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "La funci\u00f3n de servicio de archivos en TARGIT Decision Suite 23.2.15007 permite a atacantes autenticados leer o escribir en archivos del servidor mediante una solicitud de archivo manipulada. Esto puede permitir la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo .xview." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/DMCERTCE/DecisionSuite_Path_Traversal_SSRF", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36459.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36459.json index 575c1ec9fb2..c9dfcc77c0b 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36459.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36459.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36459", "sourceIdentifier": "secure@symantec.com", "published": "2024-06-14T12:15:09.743", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:12.833", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,64 @@ "value": "Se ha identificado una vulnerabilidad de cross-site scripting CRLF en determinadas configuraciones del Agente web de SiteMinder para el servidor web IIS y del Agente web de SiteMinder para el servidor web Domino. Como resultado, un atacante puede ejecutar c\u00f3digo Javascript arbitrario en el navegador de un cliente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@symantec.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.4, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + } + ] + } + ], "references": [ { "url": "https://datatracker.ietf.org/doc/html/rfc6265#section-4.1.1", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36471.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36471.json index 3f208f4b4ce..b48813a7d4f 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36471.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36471.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36471", "sourceIdentifier": "security@apache.org", "published": "2024-06-10T22:15:11.893", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:03:13.647", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La funcionalidad de importaci\u00f3n es vulnerable a ataques de revinculaci\u00f3n de DNS entre la verificaci\u00f3n y el procesamiento de la URL. Los administradores de proyectos pueden ejecutar estas importaciones, lo que podr\u00eda hacer que Allura lea servicios internos y los exponga. Este problema afecta a Apache Allura desde la versi\u00f3n 1.0.1 hasta la 1.16.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.17.0, que soluciona el problema. Si no puede actualizar, configure \"disable_entry_points.allura.importers = forge-tracker, forge-discussion\" en su archivo de configuraci\u00f3n .ini." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36496.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36496.json index ba17bb4e421..defb5abe959 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36496.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36496.json @@ -2,15 +2,43 @@ "id": "CVE-2024-36496", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-24T09:15:09.860", - "lastModified": "2024-06-25T06:15:11.413", + "lastModified": "2024-07-03T02:03:14.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "The configuration file is encrypted with a static key derived from a \nstatic five-character password which allows an attacker to decrypt this \nfile.\u00a0The application hashes this five-character password with \nthe outdated and broken MD5 algorithm (no salt) and uses the first five \nbytes as the key for RC4. The configuration file is then encrypted with \nthese parameters." + }, + { + "lang": "es", + "value": "El archivo de configuraci\u00f3n est\u00e1 cifrado con una clave est\u00e1tica derivada de una contrase\u00f1a est\u00e1tica de cinco caracteres que permite a un atacante descifrar este archivo. La aplicaci\u00f3n codifica esta contrase\u00f1a de cinco caracteres con el algoritmo MD5 obsoleto y roto (sin semilla) y utiliza los primeros cinco bytes como clave para RC4. Luego, el archivo de configuraci\u00f3n se cifra con estos par\u00e1metros." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36497.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36497.json index 9651da4b756..80d3278f2de 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36497.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36497.json @@ -2,15 +2,43 @@ "id": "CVE-2024-36497", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-24T09:15:09.973", - "lastModified": "2024-06-25T06:15:11.513", + "lastModified": "2024-07-03T02:03:14.280", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "The decrypted configuration file contains the password in cleartext \nwhich is used to configure WINSelect. It can be used to remove the \nexisting restrictions and disable WINSelect entirely." + }, + { + "lang": "es", + "value": "El archivo de configuraci\u00f3n descifrado contiene la contrase\u00f1a en texto plano que se utiliza para configurar WINSelect. Se puede utilizar para eliminar las restricciones existentes y desactivar WINSelect por completo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json index bc9965eedee..ec9c8029104 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36527", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:16.767", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:14.827", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "puppeteer-renderer v.3.2.0 y anteriores es vulnerable a Directory Traversal. Los atacantes pueden explotar el par\u00e1metro URL utilizando el protocolo de archivo para leer informaci\u00f3n confidencial del servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/7a6163/25fef08f75eed219c8ca21e332d6e911", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36532.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36532.json index 15545cad042..ea755ae48c1 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36532.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36532.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36532", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T22:15:11.020", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T02:03:15.647", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Los permisos inseguros en Kruise v1.6.2 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HouqiyuA/43488e1d41110a5610146b87b2e88a02", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json index ee855c41bef..58e8378c7c7 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36543", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T19:15:58.353", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:16.430", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El control de acceso incorrecto en la API REST de Kafka Connect en el proyecto STRIMZI 0.41.0 y versiones anteriores permite a un atacante denegar el servicio de Kafka Mirroring y potencialmente reflejar el contenido de los temas en su cl\u00faster de Kafka a trav\u00e9s de un conector malicioso (evitando Kafka ACL si existe), y potencialmente robar credenciales SASL de Kafka consultando la API REST de MirrorMaker Kafka." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "http://strimzi.com", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json index 3c26ef08ddd..7d316bac536 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36568", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T14:15:09.147", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T02:03:17.227", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sourcecodester Gas Agency Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /gasmark/editbrand.php?id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/debug601/bug_report/blob/main/vendors/mayuri_k/gas-agency-management-system/SQL-1.md", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json index 7e58802055f..a5695893fbb 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36569", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T14:15:09.243", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T02:03:18.013", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Sourcecodester Gas Agency Management System v1.0 es vulnerable a la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de editClientImage.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], "references": [ { "url": "https://github.com/debug601/bug_report/blob/main/vendors/mayuri_k/gas-agency-management-system/RCE-1.md", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36574.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36574.json index 2c097594637..780c7b193a4 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36574.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36574.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36574", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T16:15:15.040", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:18.790", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema de contaminaci\u00f3n de prototipos en flatten-json 1.0.1 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de module.exports.unflattenJSON (flatten-json/index.js:42)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/d5a0c93459599f77557b5bbe78b57325", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36575.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36575.json index 2e14e126757..6dbaebc6632 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36575.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36575.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36575", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T16:15:15.140", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:19.590", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema de contaminaci\u00f3n de prototipos en getsetprop 1.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de global.accessor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/0d830798f20839d634278d7af0155f9e", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36577.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36577.json index 49dfe481ce0..525c16c2369 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36577.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36577.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36577", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T16:15:15.233", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:20.433", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "apphp js-object-resolver < 3.1.1 es vulnerable a la contaminaci\u00f3n de prototipos a trav\u00e9s de Module.setNestedProperty." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/c90189f3d8480a5f267395ec40701373", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36578.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36578.json index 00fcbf37421..a47dda69a34 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36578.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36578.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36578", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T16:15:15.333", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:21.253", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La actualizaci\u00f3n 1.0.0 de akbr es vulnerable a Prototype Pollution a trav\u00e9s de update/index.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/8bc749ec2b5453d887b2f4a362a65897", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36583.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36583.json index 1aa0204b8dc..0466aa75e01 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36583.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36583.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36583", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:10.330", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:03:22.067", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema de contaminaci\u00f3n de prototipo en byondreal accessor <= 1.0.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de @byondreal/accessor/index." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/97bc2fbfbcbde3a54d5536c9adeee34c", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36586.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36586.json index 6c5a708210a..a4d33480b10 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36586.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36586.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36586", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:51.863", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T02:03:22.850", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en AdGuardHome v0.93 a la \u00faltima versi\u00f3n permite a atacantes sin privilegios escalar privilegios sobrescribiendo el binario de AdGuardHome." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36586.md", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36598.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36598.json index 62eca641049..e17a073d603 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36598.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36598.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36598", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T18:15:27.570", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:23.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en Aegon Life v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo de imagen manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36598", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36600.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36600.json index b87faee5833..e912c2ec572 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36600.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36600.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36600", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T19:15:50.967", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:24.687", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en libcdio v2.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo de imagen ISO 9660 manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/gashasbi/My-Reports/tree/main/CVE-2024-36600", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36647.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36647.json index 7e6e595d25a..aafdd61db76 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36647.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36647.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36647", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T14:15:12.590", - "lastModified": "2024-06-13T18:35:19.777", + "lastModified": "2024-07-03T02:03:25.473", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Church CRM v5.8.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre de familia en la p\u00e1gina Registrar una nueva familia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/7029", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json index 1dd90fda9ca..f4230982cee 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36650", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T16:15:29.043", - "lastModified": "2024-06-13T18:36:45.417", + "lastModified": "2024-07-03T02:03:26.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TOTOLINK AC1200 Wireless Dual Band Gigabit Router firmware A3100R V4.1.2cu.5247_B20211129, en la funci\u00f3n cgi `setNoticeCfg` del archivo `/lib/cste_modules/system.so`, la longitud de la cadena de entrada del usuario `NoticeUrl` no est\u00e1 marcada . Esto puede provocar un desbordamiento del b\u00fafer, lo que permite a los atacantes crear solicitudes HTTP o MQTT maliciosas para provocar un ataque de denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36656.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36656.json index 732e2b66508..8227d6780cd 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36656.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36656.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36656", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.873", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:03:27.067", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En MintHCM 4.0.3, un usuario registrado puede ejecutar c\u00f3digo JavaScript arbitrario y lograr un ataque de cross-site scripting (XSS) reflejado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/minthcm/minthcm/issues/67", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json index 9e58371d1e3..353f9745779 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36670", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:15.950", - "lastModified": "2024-06-06T14:17:35.017", + "lastModified": "2024-07-03T02:03:27.853", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente admin/vpsClass_deal.php?mudi=del" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/sigubbs/cms/blob/main/33/csrf.md", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36677.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36677.json index e295603e50b..44b9bf7afc5 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36677.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36677.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36677", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.257", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:03:28.667", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"Iniciar sesi\u00f3n como cliente PRO\" (loginascustomerpro) <1.2.7 de Weblir para PrestaShop, un invitado puede acceder a un enlace directo para conectarse a cada cuenta de cliente de la Tienda si el m\u00f3dulo no est\u00e1 instalado O si hay un secreto accesible para el administrador. robado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/18/loginascustomerpro.html", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36678.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36678.json index 8adb2d9289a..eb9cd81b255 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36678.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36678.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36678", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.363", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:03:29.450", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"Configuraci\u00f3n del tema\" (pk_themesettings) <= 1.8.8 de Promokit.eu para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL. El script ajax.php tiene una llamada SQL sensible que puede ejecutarse con una llamada http trivial y explotarse para falsificar una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36679.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36679.json index 56909faefb6..0cc910076b2 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36679.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36679.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36679", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.470", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:03:30.273", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"M\u00f3dulo Live Chat Pro (Mensajer\u00eda todo en uno)\" (livechatpro) <=8.4.0, un invitado puede realizar la inyecci\u00f3n de c\u00f3digo PHP. Debido a un token predecible, el m\u00e9todo `Lcp::saveTranslations()` sufre de un escritor blanco que puede inyectar c\u00f3digo PHP en un archivo PHP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/18/livechatpro.html", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36680.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36680.json index 56d6f7d57d0..be6d6520ef2 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36680.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36680.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36680", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-19T21:15:57.577", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:03:31.083", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el m\u00f3dulo \"Facebook\" (pkfacebook) <=1.0.1 de Promokit.eu para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL. El script ajax facebookConnect.php tiene una llamada SQL sensible que puede ejecutarse con una llamada http trivial y explotarse para falsificar una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/18/pkfacebook.html", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36681.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36681.json index 5dbeb8f4043..dce87a7be4d 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36681.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36681.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36681", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T23:15:10.690", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:03:31.853", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo \"Isotope\" (pk_isotope) <=1.7.3 de Promokit.eu para PrestaShop permite a atacantes obtener informaci\u00f3n confidencial y causar otros impactos a trav\u00e9s de los m\u00e9todos `pk_isotope::saveData` y `pk_isotope::removeData`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2024/06/20/pk_isotope.html", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json index 4f2d9a64f73..4d84b9d6c82 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36702.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36702", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T19:16:07.697", - "lastModified": "2024-06-13T18:36:09.013", + "lastModified": "2024-07-03T02:03:32.733", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que libiec61850 v1.5 conten\u00eda un desbordamiento del mont\u00f3n a trav\u00e9s de la funci\u00f3n BerEncoder_encodeLength en /asn1/ber_encoder.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "http://libiec61850.com", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json index 9ab8b9f94c9..1bf224c9e2d 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36728", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T14:15:09.330", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T02:03:33.547", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Los dispositivos TRENDnet TEW-827DRU hasta 2.06B04 contienen un desbordamiento de b\u00fafer basado en pila en el binario ssi. El desbordamiento permite a un usuario autenticado ejecutar c\u00f3digo arbitrario PUBLICANDO en apply.cgi mediante la acci\u00f3n vlan_setting con una clave dns1 o dns 2 suficientemente larga." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/HouseFuzz/reports/blob/main/trendnet/TEW827/vlan_setting/vlan_setting.md", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json index e756a9ef414..a9191ab2e32 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36729", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T14:15:09.433", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T02:03:34.353", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/HouseFuzz/reports/blob/main/trendnet/TEW827/wizard_ipv6/wizard_ipv6.md", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36743.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36743.json index d0bbe678f91..fcb0fd58f2e 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36743.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36743.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36743", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T18:15:16.723", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-07-03T02:03:35.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) cuando se procesa una matriz vac\u00eda con oneflow.dot." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36760.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36760.json index 1ae1ed0f0fe..c8a031f2304 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36760.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36760.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36760", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T18:15:10.440", - "lastModified": "2024-06-13T18:35:19.777", + "lastModified": "2024-07-03T02:03:35.990", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de desbordamiento de pila en la versi\u00f3n 1.18.0 de Rhai. La posici\u00f3n del defecto es: (/ SRC/rhai/SRC/eval/STMT. Rs in rhai: : eval: : STMT: : _ $LT $impl $u20 $rhai.. engine.. Engine$GT$::eval_stmt::h3f1d68ce37fc6e96). Debido al desbordamiento de la pila, hay una llamada recursiva/SRC/rhai/SRC/eval/STMT. Funci\u00f3n eval_stmt_block del archivo Rs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36760/info.md", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36782.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36782.json index 3f8899ba85d..0f48b7cb737 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36782.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36782.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36782", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T21:15:08.453", - "lastModified": "2024-06-04T16:57:41.057", + "lastModified": "2024-07-03T02:03:36.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK CP300 V2.0.4-B20201102 contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow.sample, que permite a los atacantes iniciar sesi\u00f3n como root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20cp300/README.md", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36792.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36792.json index 7c20a7dba7d..c0045e0b2b6 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36792.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36792.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36792", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T15:15:50.493", - "lastModified": "2024-06-07T19:24:09.243", + "lastModified": "2024-07-03T02:03:37.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en la implementaci\u00f3n de WPS en Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 permite a los atacantes obtener acceso al pin del enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-316" + } + ] + } + ], "references": [ { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json index 0f174251be9..c52ef442c69 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36837", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T15:15:11.803", - "lastModified": "2024-06-18T18:54:51.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:03:38.687", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36840.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36840.json index 4f8798489a4..06897abf17d 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36840.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36840.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36840", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T15:15:52.493", - "lastModified": "2024-06-13T18:36:09.010", + "lastModified": "2024-07-03T02:03:39.517", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Boelter Blue System Management v.1.3 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro id de news_details.php y location_details.php; y el par\u00e1metro de secci\u00f3n para services.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jun/0", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json index a9196a9946e..b7d93d5a37b 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36845", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T20:15:10.463", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-07-03T02:03:40.363", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un puntero no v\u00e1lido en la funci\u00f3n modbus_receive() de libmodbus v3.1.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un mensaje manipulado enviado al servidor de prueba unitaria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/stephane/libmodbus/issues/750", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json index c0aadedfda6..ac9e23cb0bc 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36886", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:12.150", - "lastModified": "2024-06-27T14:15:14.100", + "lastModified": "2024-07-03T02:03:41.640", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tipc: corrija UAF en la ruta de error Sam Page (sam4k), que trabaja con Trend Micro Zero Day Initiative, inform\u00f3 un UAF en la ruta de error tipc_buf_append(): ERROR: KASAN: slab-use- after-free en kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88804d2a7c80 por tarea poc/8034 CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1 Nombre de hardware : PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 01/04/2014 Seguimiento de llamadas: __dump_stack linux/lib/dump_stack.c:88 dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106 print_address_description linux/mm/kasan/report.c:377 print_report+0xc4/0x620 linux/mm/kasan/report.c:488 kasan_report+0xda/0x110 linux/mm/kasan/report. c:601 kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183 skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026 skb_release_all linux/net/core/skbuff.c:1094 __kfree_skb linux/ net/core/skbuff.c:1108 kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144 kfree_skb linux/./include/linux/skbuff.h:1244 tipc_buf_append+0x425/0xb50 linux/net/tipc/ msg.c:186 tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324 tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824 tipc_rcv+0x45f/0x10f0 linux/net/tipc/node. c:2159 tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390 udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108 udp_queue_rcv_skb+0x131/0xb00 4/udp.c: 2186 udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346 __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422 ip_protocol_deliver_rcu+0x30c/0x4e0 4/ip_input.c:205 ip_local_deliver_finish +0x2e4/0x520 linux/net/ipv4/ip_input.c:233 NF_HOOK linux/./include/linux/netfilter.h:314 NF_HOOK linux/./include/linux/netfilter.h:308 ip_local_deliver+0x18e/0x1f0 linux/ net/ipv4/ip_input.c:254 dst_input linux/./include/net/dst.h:461 ip_rcv_finish linux/net/ipv4/ip_input.c:449 NF_HOOK linux/./include/linux/netfilter.h:314 NF_HOOK linux/./include/linux/netfilter.h:308 ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569 __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534 __netif_receive_skb+0x1f/0x1c 0 linux/net/core/dev.c:5648 Process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976 __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576 napi_poll linux/ net/core/dev.c:6645 net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781 __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553 do_softirq linux/kernel/softirq.c:454 do_softirq +0xb2/0xf0 linux/kernel/softirq.c:441 __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381 local_bh_enable linux/./include/linux/bottom_half.h:33 rcu_read_unlock_bh linux /./include/linux/rcupdate.h:851 __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378 dev_queue_xmit linux/./include/linux/netdevice.h:3169 neigh_hh_output linux/./include/net /neighbour.h:526 neigh_output linux/./include/net/neighbour.h:540 ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235 __ip_finish_output linux/net/ipv4/ip_output.c:313 __ip_finish_output+ 0x49e/0x950 linux/net/ipv4/ip_output.c:295 ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323 NF_HOOK_COND linux/./include/linux/netfilter.h:303 ip_output+0x13b/0x2a0 linux /net/ipv4/ip_output.c:433 dst_output linux/./include/net/dst.h:451 ip_local_out linux/net/ipv4/ip_output.c:129 ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c :1492 udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963 udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250 inet_sendmsg+0x105/0x140 :850 sock_sendmsg_nosec linux/net/socket.c:730 __sock_sendmsg linux/net/socket.c:745 __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191 __do_sys_sendto linux/net/socket.c:2203 __se_sys_sendto linux/red/socket .c:2199 __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199 do_syscall_x64 linux/arch/x86/entry/common.c:52 do_syscall_ ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36888.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36888.json index 1e99e768a40..4d5c87fd8c2 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36888.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36888.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36888", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:12.323", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:03:42.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: workqueue: Se corrigi\u00f3 la selecci\u00f3n de wake_cpu en kick_pool() Con cpu_possible_mask=0-63 y cpu_online_mask=0-7 se observaron los siguientes errores del kernel: smp: Apareciendo CPU secundarias... smp: abri\u00f3 1 nodo, 8 CPU No se puede manejar la desreferencia del puntero del kernel en el espacio de direcciones virtual del kernel Direcci\u00f3n fallida: 0000000000000000 TEID: 0000000000000803 [..] Seguimiento de llamadas: arch_vcpu_is_preempted+0x12/0x80 select_idle_sibling+0x42/0x560 _rq_fair+0x29a/0x3b0 intenta_despertar_up +0x38e/0x6e0 kick_pool+0xa4/0x198 __queue_work.part.0+0x2bc/0x3a8 call_timer_fn+0x36/0x160 __run_timers+0x1e2/0x328 __run_timer_base+0x5a/0x88 run_timer_softirq+0x40/0x78 irq+0x118/0x388 irq_exit_rcu+0xc0/0xd8 hacer_ext_irq+ 0xae/0x168 ext_int_handler+0xbe/0xf0 psw_idle_exit+0x0/0xc default_idle_call+0x3c/0x110 do_idle+0xd4/0x158 cpu_startup_entry+0x40/0x48 rest_init+0xc6/0xc8 startup_continue+0x3c/0x50 El bloqueo se produce al llamar a arch_vcpu_is_preempted () para una CPU fuera de l\u00ednea. Para evitar esto, seleccione la CPU con cpumask_any_and_distribute() para enmascarar __pod_cpumask con cpu_online_mask. En caso de que no quede ninguna CPU en el grupo, omita la tarea. tj: Esto no soluciona completamente el error ya que las CPU a\u00fan pueden fallar entre la selecci\u00f3n de la CPU de destino y la llamada de activaci\u00f3n. Para solucionarlo, es probable que sea necesario agregar la prueba cpu_online() al c\u00f3digo arch sched o s390. Sin embargo, independientemente de c\u00f3mo se solucione, workqueue no deber\u00eda elegir una CPU que no est\u00e9 en l\u00ednea, ya que eso resultar\u00eda en un comportamiento peor e impredecible." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36894.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36894.json index 66966a72f39..d444ae9a2c6 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36894.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36894.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:12.857", - "lastModified": "2024-06-21T14:15:12.163", + "lastModified": "2024-07-03T02:03:43.843", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_fs: corrige la ejecuci\u00f3n entre aio_cancel() y la solicitud AIO. Las aplicaciones basadas en FFS completas pueden utilizar la devoluci\u00f3n de llamada aio_cancel() para quitar de la cola las solicitudes USB pendientes enviadas al UDC. Existe un escenario en el que la aplicaci\u00f3n FFS emite una llamada de cancelaci\u00f3n de AIO, mientras el UDC maneja una desconexi\u00f3n suave. Para una implementaci\u00f3n basada en DWC3, la pila de llamadas se parece a la siguiente: Aplicaci\u00f3n DWC3 Gadget FFS dwc3_gadget_soft_disconnect() ... --> dwc3_stop_active_transfers() --> dwc3_gadget_giveback(-ESHUTDOWN) --> ffs_epfile_async_io_complete() ffs_aio_cancel() --> usb_ep_free_request () --> usb_ep_dequeue() Actualmente no hay ning\u00fan bloqueo implementado entre el controlador de finalizaci\u00f3n de AIO y la cancelaci\u00f3n de AIO, por lo que el problema ocurre si la rutina de finalizaci\u00f3n se ejecuta en paralelo a una llamada de cancelaci\u00f3n de AIO proveniente de la aplicaci\u00f3n FFS. A medida que la llamada de finalizaci\u00f3n libera la solicitud USB (io_data->req), la aplicaci\u00f3n FFS tambi\u00e9n hace referencia a ella para la llamada usb_ep_dequeue(). Esto puede llevar a acceder a un puntero obsoleto/colgado. commit b566d38857fc (\"usb: gadget: f_fs: use io_data->status consistentemente\") reubic\u00f3 usb_ep_free_request() en ffs_epfile_async_io_complete(). Sin embargo, para implementar correctamente el bloqueo para mitigar este problema, el spinlock no se puede agregar a ffs_epfile_async_io_complete(), ya que usb_ep_dequeue() (si se elimina con \u00e9xito una solicitud USB) llamar\u00e1 al controlador de finalizaci\u00f3n del controlador de funci\u00f3n en el mismo contexto. De ah\u00ed que se llegue a un punto muerto. Solucione este problema moviendo usb_ep_free_request() de nuevo a ffs_user_copy_worker() y asegur\u00e1ndose de que establezca expl\u00edcitamente io_data->req en NULL despu\u00e9s de liberarlo dentro de ffs->eps_lock. Esto resuelve la condici\u00f3n de ejecuci\u00f3n anterior, ya que la rutina ffs_aio_cancel() no continuar\u00e1 intentando sacar de la cola una solicitud que ya ha sido liberada, o ffs_user_copy_work() no liberar\u00e1 la solicitud USB hasta que la cancelaci\u00f3n de AIO termine de hacer referencia a ella. Esta soluci\u00f3n depende de el commit b566d38857fc (\"usb: gadget: f_fs: use io_data->status consistentemente\")" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/24729b307eefcd7c476065cd7351c1a018082c19", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36896.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36896.json index a284be897b1..cece9c0f3a6 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36896.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36896.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:13.023", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:03:44.757", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: USB: core: corrige la infracci\u00f3n de acceso durante la eliminaci\u00f3n del dispositivo del puerto. Las pruebas con KASAN y syzkaller revelaron un error en port.c:disable_store(): usb_hub_to_struct_hub() puede devolver NULL si el hub que el puerto al que pertenece se elimina simult\u00e1neamente, pero la funci\u00f3n no comprueba esta posibilidad antes de desreferenciar el valor devuelto. Resulta que la primera desreferencia es innecesaria, ya que hub->intfdev es el padre del dispositivo portuario, por lo que se puede cambiar f\u00e1cilmente. Agregar una verificaci\u00f3n para hub == NULL evita m\u00e1s problemas. El mismo error existe en la rutina enable_show() y se puede solucionar de la misma manera." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36897.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36897.json index efe188b8dae..461bbf91bd4 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36897.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36897.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:13.330", - "lastModified": "2024-06-10T19:21:20.813", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:03:45.570", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json index 767b82b1e4d..faaec155574 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36905", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:14.030", - "lastModified": "2024-06-27T14:15:14.377", + "lastModified": "2024-07-03T02:03:47.120", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: diferir apagado (SEND_SHUTDOWN) para sockets TCP_SYN_RECV El estado TCP_SYN_RECV es realmente especial, solo lo usan conexiones cross-syn, principalmente usado por fuzzers. En el siguiente fallo [1], syzbot logr\u00f3 activar una divisi\u00f3n por cero en tcp_rcv_space_adjust(). Un socket realiza las siguientes transiciones de estado, sin siquiera llamar a tcp_init_transfer(), lo que significa que tampoco se llama a tcp_init_buffer_space(). TCP_CLOSE connect() TCP_SYN_SENT TCP_SYN_RECV Shutdown() -> tcp_shutdown(sk, SEND_SHUTDOWN) TCP_FIN_WAIT1 Para solucionar este problema, cambie tcp_shutdown() para no realizar una transici\u00f3n TCP_SYN_RECV -> TCP_FIN_WAIT1, lo que de todos modos no tiene sentido. Cuando tcp_rcv_state_process() luego cambie el estado del socket de TCP_SYN_RECV a TCP_ESTABLISH, mire sk->sk_shutdown para finalmente ingresar al estado TCP_FIN_WAIT1 y env\u00ede un paquete FIN desde un estado de socket sano. Esto significa que ahora se puede llamar a tcp_send_fin() desde el contexto BH y debe usar asignaciones GFP_ATOMIC. [1] error de divisi\u00f3n: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 5084 Comm: syz-executor358 No contaminado 6.9.0-rc6-syzkaller-00022-g98369dccd2f8 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 27/03/2024 RIP: 0010:tcp_rcv_space_adjust+0x2df/0x890 net/ipv4/tcp_input.c:767 C\u00f3digo: e3 04 4c 01 eb 48 8b 44 24 38 0f b6 04 10 84 c0 49 89 d5 f 85 a5 03 00 00 41 8b 8e c8 09 00 00 89 e8 29 c8 48 0f c3 31 d2 <48> f7 f1 48 8d 1c 43 49 8d 96 76 08 00 00 48 89 d0 48 c1 e8 03 48 : 0018: ffffc900031ef3f0 EFLAGS: 00010246 RAX: 0c677a10441f8f42 RBX: 000000004fb95e7e RCX: 0000000000000000 RDX: 0000000000000000 RSI: 000000000 0000000 RDI: 0000000000000000 RBP: 0000000027d4b11f R08: ffffffff89e535a4 R09: 1ffffffff25e6ab7 R10: dffffc0000000000 R11: ffffffff8135e920 R12: 802a9f8d30 R13: dffffc0000000000 R14: ffff88802a9f8d00 R15: 1ffff1100553f2da FS : 00005555775c0380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: f2304 CR3: 000000002b9f2000 CR4: 0000000000350ef0 Seguimiento de llamadas: tcp_recvmsg_locked+0x106d/0x25a0 net/ipv4/ tcp.c:2513 tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2578 inet6_recvmsg+0x16a/0x730 net/ipv6/af_inet6.c:680 sock_recvmsg_nosec net/socket.c:1046 [en l\u00ednea] +0x109/0x280 neto /socket.c:1068 ____sys_recvmsg+0x1db/0x470 net/socket.c:2803 ___sys_recvmsg net/socket.c:2845 [en l\u00ednea] do_recvmmsg+0x474/0xae0 net/socket.c:2939 __sys_recvmmsg net/socket.c:3018 [ en l\u00ednea] __do_sys_recvmmsg net/socket.c:3041 [en l\u00ednea] __se_sys_recvmmsg net/socket.c:3034 [en l\u00ednea] __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034 do_syscall_x64 arch/x86/entry/common.c :52 [en l\u00ednea ] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7faeb6363db9 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP:00 007ffcc1997168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faeb6363db9 RDX: 0000000000000001 RSI: 00000000200 00bc0 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000001c R10: 0000000000000122 R11: 000000000000 0246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36910.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36910.json index 2bebb1a5c74..74ee81a7584 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36910.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36910.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:14.457", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:03:48.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio_hv_generic: no liberar memoria descifrada. En las m\u00e1quinas virtuales CoCo, es posible que el host que no es de confianza provoque que set_memory_encrypted() o set_memory_decrypted() falle, de modo que se devuelva un error y el resultado La memoria es compartida. Las personas que llaman deben tener cuidado al manejar estos errores para evitar devolver memoria descifrada (compartida) al asignador de p\u00e1ginas, lo que podr\u00eda provocar problemas funcionales o de seguridad. El controlador UIO del dispositivo VMBus podr\u00eda liberar p\u00e1ginas descifradas/compartidas si falla set_memory_decrypted(). Verifique el campo descifrado en gpadl para decidir si desea liberar la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d788b2fbe6a1a1a9e3db09742b90809d51638b7", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36912.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36912.json index 82065fe93d5..a1bc72f3377 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36912.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36912.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36912", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:14.607", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:03:49.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Controladores: hv: vmbus: Seguimiento del estado descifrado en vmbus_gpadl En m\u00e1quinas virtuales CoCo, es posible que el host que no es de confianza provoque que set_memory_encrypted() o set_memory_decrypted() falle de manera que se devuelva un error y la memoria resultante se comparte. Las personas que llaman deben tener cuidado al manejar estos errores para evitar devolver memoria descifrada (compartida) al asignador de p\u00e1ginas, lo que podr\u00eda provocar problemas funcionales o de seguridad. Para asegurarse de que las personas que llaman a vmbus_establish_gpadl() y vmbus_teardown_gpadl() no devuelvan p\u00e1ginas descifradas/compartidas a los asignadores, agregue un campo en la estructura vmbus_gpadl para realizar un seguimiento del estado de descifrado de los b\u00faferes. Esto permitir\u00e1 a quienes llaman saber si deben liberar o filtrar las p\u00e1ginas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1258" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1999644d95194d4a58d3e80ad04ce19220a01a81", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36913.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36913.json index ebdd3443564..66b35494179 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36913.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36913.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:14.693", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:03:49.870", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Controladores: hv: vmbus: p\u00e1ginas de fuga si falla set_memory_encrypted() En m\u00e1quinas virtuales CoCo, es posible que el host que no es de confianza provoque que set_memory_encrypted() o set_memory_decrypted() falle de manera que se produzca un error se devuelve y la memoria resultante se comparte. Las personas que llaman deben tener cuidado al manejar estos errores para evitar devolver memoria descifrada (compartida) al asignador de p\u00e1ginas, lo que podr\u00eda provocar problemas funcionales o de seguridad. El c\u00f3digo VMBus podr\u00eda liberar p\u00e1ginas descifradas si falla set_memory_encrypted()/decrypted(). Filtre las p\u00e1ginas si esto sucede." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1258" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03f5a999adba062456c8c818a683beb1b498983a", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36926.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36926.json index d43683744c5..0a6d3a861b8 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36926.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36926.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36926", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:15.880", - "lastModified": "2024-06-10T19:20:56.143", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:03:51.367", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36955.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36955.json index fa7836b310f..24ce80d4919 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36955.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36955.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:18.390", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-07-03T02:03:54.210", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: hda: intel-sdw-acpi: corrige el uso de device_get_named_child_node() La documentaci\u00f3n para device_get_named_child_node() menciona este punto importante: \"La persona que llama es responsable de llamar a fwnode_handle_put() en el puntero fwnode devuelto. \"Agregue fwnode_handle_put() para evitar una referencia filtrada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/722d33c442e66e4aabd3e778958d696ff3a2777e", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json index b9ee34db872..97e08b4d06c 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.557", - "lastModified": "2024-06-27T14:15:15.423", + "lastModified": "2024-07-03T02:03:55.203", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0dbfc73670b357456196130551e586345ca48e1b", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json index e2feaaf0cc8..3d118dc2f63 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36972", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-10T15:15:52.617", - "lastModified": "2024-06-16T13:15:52.947", + "lastModified": "2024-07-03T02:03:56.627", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4708f49add84a57ce0ccc7bf9a6269845c631cc3", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json index 073238d35e1..ed3184276cf 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36984", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.480", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:03:57.773", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json index f82acaa1406..e76f812eff3 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36991", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:07.860", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:03:58.577", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-35" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36999.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36999.json index badcaf4911d..d45acd69477 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36999.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36999.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36999", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.147", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:03:59.553", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo 3DM creado con fines malintencionados, cuando se analiza en opennurbs.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3633.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3633.json index 50e145b9b5b..e8a521183f0 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3633.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3633.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3633", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:15.400", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:06:26.000", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento WebP & SVG Support de WordPress hasta la versi\u00f3n 1.4.0 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/2e0baffb-7ab8-4c17-aa2a-7f28a0be1a41/", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json index 2cc130728d2..ad849ddeb0f 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37000", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.463", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:03:59.763", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo X_B creado con fines malintencionados, cuando se analiza en pskernel.DLL a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json index 3c4257bc6bc..3043eba8153 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37001", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.553", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:03:59.960", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "[Un archivo 3DM creado con fines malintencionados, cuando se analiza en opennurbs.dll a trav\u00e9s de aplicaciones de Autodesk, se puede utilizar para provocar un desbordamiento basado en mont\u00f3n. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json index 2c9193f6467..5c68205b7c7 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37002", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.647", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:00.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo MODEL creado con fines malintencionados, cuando se analiza en ASMkern229A.dll a trav\u00e9s de aplicaciones de Autodesk, se puede utilizar para variables no inicializadas. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json index 31747c3685d..0c0971e7a3e 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37003.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37003", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.370", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:00.380", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo DWG y SLDPRT creado con fines malintencionados, cuando se analiza en opennurbs.dll y ODXSW_DLL.dll a trav\u00e9s de aplicaciones de Autodesk, se puede utilizar para provocar un desbordamiento basado en pila. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json index 5f8dc671c7b..ddb8bc102a2 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37004.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37004", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.567", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:00.647", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en ASMKERN229A.dll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de use-after-free. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json index af5d8bdd585..c8b608d6b22 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37005.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37005", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:15.890", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:00.877", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo X_B y X_T creado con fines malintencionados, cuando se analiza en pskernel.DLL a trav\u00e9s de aplicaciones de Autodesk, puede forzar una lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37006.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37006.json index 1c67fb78ebf..5ef0f0f6030 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37006.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37006.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37006", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:16.053", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:01.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo CATPRODUCT creado con fines malintencionados, cuando se analiza en CC5Dll.dll a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de corrupci\u00f3n de memoria por infracci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, puede provocar la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37007.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37007.json index a9b80a5b6c1..04b5698d739 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37007.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37007.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37007", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:16.170", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:01.303", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo X_B y X_T creado con fines malintencionados, cuando se analiza en pskernel.DLL a trav\u00e9s de aplicaciones de Autodesk, puede provocar una vulnerabilidad de use-after-free. Esta vulnerabilidad, junto con otras vulnerabilidades, podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en el proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37014.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37014.json index f03b3741d3f..ecc3a4522cf 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37014.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37014.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37014", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T20:15:15.213", - "lastModified": "2024-06-12T17:57:01.660", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:01.523", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37017.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37017.json index ae68c2becec..69e11364263 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37017.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37017.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37017", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T00:15:08.890", - "lastModified": "2024-05-31T13:01:46.727", + "lastModified": "2024-07-03T02:04:02.337", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "asdcplib (tambi\u00e9n conocido como AS-DCP Lib) 2.13.1 tiene un b\u00fafer basado en mont\u00f3n sobrele\u00eddo en ASDCP::TimedText::MXFReader::h__Reader::MD_to_TimedText_TDesc en AS_DCP_TimedText.cpp en libasdcp.so." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/cinecert/asdcplib/issues/138", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37019.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37019.json index 6b188056fec..31f65514ec8 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37019.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37019.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37019", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T18:15:08.953", - "lastModified": "2024-06-03T19:23:17.807", + "lastModified": "2024-07-03T02:04:03.153", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Northern.tech Mender Enterprise anterior a 3.6.4 y 3.7.x anterior a 3.7.4 tienen autenticaci\u00f3n d\u00e9bil." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://mender.io/blog/cve-2024-37019-account-takeover-using-saml", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37081.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37081.json index 3d9f0447fc1..f491489b0f5 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37081.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37081.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37081", "sourceIdentifier": "security@vmware.com", "published": "2024-06-18T06:15:11.900", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:05.970", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-556" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453", diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37124.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37124.json index 18cdbc06c20..1aebc9879dc 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37124.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37124.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37124", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-19T07:15:46.547", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:07.457", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de uso de funciones potencialmente peligrosas en Ricoh Streamline NX PC Client. Si se aprovecha esta vulnerabilidad, un atacante puede crear un archivo arbitrario en la PC donde est\u00e1 instalado el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN00442488/", diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json index 25422c992ed..c4cbb528a11 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37289", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:12.893", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:04:12.080", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000298063", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37364.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37364.json index 28634928fa7..39295b2b647 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37364.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37364.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37364", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:58.900", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-07-03T02:04:15.133", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://news.ycombinator.com/item?id=40582475", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json index a357bfbabf1..10b872219d9 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37383", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T04:15:30.463", - "lastModified": "2024-06-17T15:15:51.517", + "lastModified": "2024-07-03T02:04:16.250", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Roundcube Webmail anterior a 1.5.7 y 1.6.x anterior a 1.6.7 permite XSS a trav\u00e9s de atributos animados SVG." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/roundcube/roundcubemail/commit/43aaaa528646877789ec028d87924ba1accf5242", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json index 53160415f5d..f4b2a61cc96 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37384", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T04:15:30.597", - "lastModified": "2024-06-17T15:15:51.640", + "lastModified": "2024-07-03T02:04:17.060", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/roundcube/roundcubemail/commit/cde4522c5c95f13c6aeeb1600ab17e5067a536f7", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37387.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37387.json index 2ccf6a16fbc..224857b2e8b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37387.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37387.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37387", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-19T07:15:46.647", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:17.790", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe un problema de uso de funciones potencialmente peligrosas en Ricoh Streamline NX PC Client. Si se aprovecha esta vulnerabilidad, es posible que se modifiquen los archivos del PC donde est\u00e1 instalado el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-676" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN00442488/", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37393.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37393.json index dbcfbd82c23..bbbb6ecfc62 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37393.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37393.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37393", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T20:15:15.293", - "lastModified": "2024-06-12T17:56:23.390", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:18.707", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-319" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37535.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37535.json index efa124dadfb..84bd413f37b 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37535.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37535.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37535", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-09T15:16:00.940", - "lastModified": "2024-06-10T17:16:32.753", + "lastModified": "2024-07-03T02:04:19.710", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "GNOME VTE anterior a 0.76.3 permite a un atacante provocar una denegaci\u00f3n de servicio (consumo de memoria) mediante una secuencia de escape de cambio de tama\u00f1o de ventana, un problema relacionado con CVE-2000-0476." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/06/09/1", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37569.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37569.json index 427e70f3ca2..269b2da9168 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37569.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37569.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37569", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-09T20:15:09.377", - "lastModified": "2024-06-12T16:32:56.203", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:20.517", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37622.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37622.json index e30beb88bcd..c24e7bfc2df 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37622.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37622.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37622", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:11.480", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:21.550", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Xinhu RockOA v2.6.3 contiene una vulnerabilidad de cross site scripting (XSS) reflejado a trav\u00e9s del par\u00e1metro num en /flow/flow.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/rainrocka/xinhu/issues/4", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37623.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37623.json index 81a17c843b5..d337eccb8d4 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37623.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37623.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37623", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:11.580", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:22.347", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que Xinhu RockOA v2.6.3 contiene una vulnerabilidad de cross site scripting (XSS) reflejado a trav\u00e9s del componente /kaoqin/tpl_kaoqin_locationchange.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/rainrocka/xinhu/issues/5", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37626.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37626.json index 65bb1a66f0e..901ebe6e213 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37626.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37626.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37626", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T17:15:52.353", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T02:04:23.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema de inyecci\u00f3n de comando en el firmware TOTOLINK A6000R V1.0.1-B20201211.2000 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro iface en la funci\u00f3n vif_enable." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://a6000r.com", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37631.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37631.json index 64753c5670c..d63d72f379a 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37631.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37631.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37631", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.270", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T02:04:24.127", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro Archivo en la funci\u00f3n UploadCustomModule." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/UploadCustomModule/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37633.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37633.json index a343e2e0742..9c718d3080c 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37633.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37633.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37633", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.443", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T02:04:24.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 contiene un desbordamiento de pila a trav\u00e9s de ssid en la funci\u00f3n setWiFiGuestCfg" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json index 5ecb55191bf..a97d8966a2e 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37634", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.537", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-07-03T02:04:25.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 conten\u00eda un desbordamiento de pila a trav\u00e9s de ssid en la funci\u00f3n setWiFiEasyCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37637.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37637.json index c059af8127d..825123040b3 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37637.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37637.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37637", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T14:15:10.883", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:26.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 conten\u00eda un desbordamiento de pila a trav\u00e9s de ssid5g en la funci\u00f3n setWizardCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37639.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37639.json index ab8bbb2336b..367a6bbca52 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37639.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37639.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37639", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T14:15:10.990", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:27.370", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 conten\u00eda un desbordamiento de pila mediante eport en la funci\u00f3n setIpPortFilterRules." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setIpPortFilterRules/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37640.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37640.json index 632691a7161..497c712408c 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37640.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37640.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37640", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T14:15:11.080", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:28.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK A3700R V9.1.2u.6165_20211012 conten\u00eda un desbordamiento de pila a trav\u00e9s de ssid5g en la funci\u00f3n setWiFiEasyGuestCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/tree/main/TOTOLINK/A3700R/setWiFiEasyGuestCfg", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37641.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37641.json index bd5b0153f2f..4598aa0d374 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37641.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37641.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37641", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T16:15:12.283", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:28.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TRENDnet TEW-814DAP v1_(FW1.01B01) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro de URL de env\u00edo en /formNewSchedule" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formNewSchedule/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37642.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37642.json index aac3569a81c..def72e9e43a 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37642.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37642.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37642", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T16:15:12.387", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:29.797", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TRENDnet TEW-814DAP v1_(FW1.01B01) contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ipv4_ping, ipv6_ping en /formSystemCheck." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSystemCheck/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37643.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37643.json index b019b21d8a4..fb0bbbe86d4 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37643.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37643.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37643", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T16:15:12.487", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:30.600", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TRENDnet TEW-814DAP v1_(FW1.01B01) contiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro de env\u00edo de URL en /formPasswordAuth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formPasswordAuth/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37644.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37644.json index 883a68cc23d..29c65d0abbe 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37644.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37644.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37644", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:52.363", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:31.457", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TRENDnet TEW-814DAP v1_(FW1.01B01) contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow.sample, que permite a los atacantes iniciar sesi\u00f3n como root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/hardcode/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37645.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37645.json index c1fcaa9b997..18d20b8b04e 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37645.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37645.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37645", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T16:15:12.603", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:04:32.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que TRENDnet TEW-814DAP v1_(FW1.01B01) contiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro de env\u00edo de URL en /formSysLog." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSysLog/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json index c04b821dfff..9a11fb84b31 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37661", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.463", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:33.177", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "TP-LINK TL-7DR5130 v1.0.23 es vulnerable a ataques de mensajes de redireccionamiento ICMP falsificados. Un atacante en la misma WLAN que la v\u00edctima puede secuestrar el tr\u00e1fico entre la v\u00edctima y cualquier servidor remoto enviando mensajes de redireccionamiento ICMP falsificados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], "references": [ { "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37673.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37673.json index ea6165a146d..42ce0f3ee7d 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37673.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37673.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37673", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T17:15:11.053", - "lastModified": "2024-06-24T19:41:19.880", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:34.020", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37674.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37674.json index 5aec95c1430..a3b03380d63 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37674.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37674.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37674", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-20T18:15:12.833", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T02:04:34.857", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en Moodle CMS v3.10 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del nombre de campo (par\u00e1metro de nombre) de una nueva actividad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://moodle.com", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37677.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37677.json index 608cc09fd4c..e86c67e70eb 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37677.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37677.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37677", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T19:15:15.527", - "lastModified": "2024-06-26T17:43:11.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:35.833", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37678.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37678.json index 5392ac957d0..ade2a45d077 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37678.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37678.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37678", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T20:15:10.660", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:36.657", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Hangzhou Meisoft Information Technology Co., Ltd. Finesoft v.8.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/dabaizhizhu/123/issues/3", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37679.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37679.json index b9e6bd7a557..3a8af8827c0 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37679.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37679.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37679", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T19:15:15.617", - "lastModified": "2024-06-26T17:48:30.970", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:37.457", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37680.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37680.json index a24d34b8e65..7e347f9dd81 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37680.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37680.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37680", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T19:15:15.697", - "lastModified": "2024-06-26T17:48:43.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:38.277", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37732.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37732.json index d5b255af198..496c684335d 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37732.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37732.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37732", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T19:15:15.780", - "lastModified": "2024-06-26T17:49:36.837", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:04:38.513", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json index f1039612e30..c4a18025348 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37734", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T22:15:10.533", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-03T02:04:39.343", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema en OpenEMR 7.0.2 permite a un atacante remoto escalar privilegios mediante una solicitud POST manipulada utilizando el par\u00e1metro noteid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-279" + } + ] + } + ], "references": [ { "url": "https://github.com/A3h1nt/CVEs/tree/main/OpenEMR", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json index 68d2c06b850..c0cefbc9376 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37741", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T13:15:02.860", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T02:04:40.153", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenPLC 3 through 9cd8f1b allows XSS via an SVG document as a profile picture." + }, + { + "lang": "es", + "value": "OpenPLC 3 a 9cd8f1b permite XSS a trav\u00e9s de un documento SVG como imagen de perfil." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://1d8.github.io/cves/cve_2024_37741/", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json index 7d7fd318c85..1071f4b6060 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37759.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37759", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:25.940", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:04:41.510", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que DataGear v5.0.0 y versiones anteriores conten\u00edan una vulnerabilidad de inyecci\u00f3n de expresi\u00f3n SpEL (Spring Expression Language) a trav\u00e9s de la interfaz de visualizaci\u00f3n de datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], "references": [ { "url": "https://github.com/crumbledwall/CVE-2024-37759_PoC", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37764.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37764.json index 9e2c3bbda8d..69f3eb2e8fb 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37764.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37764.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37764", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T22:15:03.113", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:04:42.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "MachForm hasta la versi\u00f3n 19 se ve afectado por un cross-site scripting almacenado y autenticado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Atreb92/cve-2024-37764", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json index b2d5525b388..2355fc0f640 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37794", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.853", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:43.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La validaci\u00f3n de entrada incorrecta en CVC5 Solver v1.1.3 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de entrada SMT2 manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://github.com/cvc5/cvc5/issues/10813", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json index 4dac3262b47..1e1bae1f4f7 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37795", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.953", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:43.927", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una falla de segmentaci\u00f3n en CVC5 Solver v1.1.3 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de entrada SMT-LIB manipulado que contiene el comando `set-logic` con errores de formato espec\u00edficos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/cvc5/cvc5/issues/10813", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37799.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37799.json index 2f7eee255f0..3b97991e264 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37799.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37799.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37799", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T17:15:51.910", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:44.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que CodeProjects Restaurant Reservation System v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro reserv_id en view_reservations.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/restaurant-reservation-system-in-php-with-source-code/", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37800.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37800.json index f0ff105ecc1..e2c45dc6a90 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37800.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37800.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37800", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T17:15:52.027", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:45.520", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que CodeProjects Restaurant Reservation System v1.0 contiene una vulnerabilidad de cross-site scripting (XSS) reflejado a trav\u00e9s del par\u00e1metro Fecha en index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/restaurant-reservation-system-in-php-with-source-code/", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json index 00d88bcf62e..71d05293f1c 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37802", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T17:15:52.133", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:46.857", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que CodeProjects Health Care hospital Management System v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo de informaci\u00f3n del paciente a trav\u00e9s del par\u00e1metro servalu." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/health-care-hospital-in-php-css-js-and-mysql-free-download/", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json index 961919e9d5c..257b01d7502 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37821.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37821", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T20:15:13.640", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:48.313", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Cargar plantilla de Dolibarr ERP CRM hasta v19.0.1 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo .SQL manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://dolibarr.com", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json index 7233e576bd0..86d2f581040 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37840", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T19:15:58.470", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:49.190", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Processscore.php en Itsourcecode Learning Management System Project In PHP With Source Code v1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro LessonID." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ganzhi-qcy/cve/issues/4", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37848.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37848.json index dd39fde04e2..48d746d1f1c 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37848.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37848.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37848", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:11.890", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:04:49.977", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Online-Bookstore-Project-In-PHP v1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente admin_delete.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/13", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37855.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37855.json index a1c9e9b2ede..4f522708dc8 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37855.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37855.json @@ -2,8 +2,9 @@ "id": "CVE-2024-37855", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T21:15:59.867", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:04:50.817", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, la versi\u00f3n de hardware 1.0, firmware 2.0.1, permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del puerto Telnet 2345 del enrutador sin requerir credenciales de autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/sudo-subho/nepstech-xpon-router-rce", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3746.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3746.json index 134cef975f1..55cb1f9c1fc 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3746.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3746.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3746", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-04-30T20:15:08.827", - "lastModified": "2024-05-28T17:15:11.570", + "lastModified": "2024-07-03T02:06:31.490", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + } + } + ], "cvssMetricV31": [ { "source": "ics-cert@hq.dhs.gov", @@ -35,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3748.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3748.json index e3c6d1a8903..785720b03c4 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3748.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3748.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3748", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-15T06:15:13.690", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:06:31.737", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento SP Project & Document Manager de WordPress hasta la versi\u00f3n 4.71 le falta validaci\u00f3n en su funci\u00f3n de carga, lo que permite al usuario manipular el `user_id` para que parezca que un archivo fue subido por otro usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3749.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3749.json index bf2a92cfb27..52d14e4167a 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3749.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3749.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3749", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-15T06:15:14.040", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-07-03T02:06:31.950", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento SP Project & Document Manager de WordPress hasta la versi\u00f3n 4.71 carece de controladores de acceso adecuados y permite que un usuario que haya iniciado sesi\u00f3n vea y descargue archivos que pertenecen a otro usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3756.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3756.json index c2e31ca7fc0..5f33e0a0feb 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3756.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3756.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3756", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-06T06:15:07.197", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-07-03T02:06:32.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento MF Gig Calendar de WordPress hasta la versi\u00f3n 1.2.1 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los Colaboradores registrados y superiores eliminen eventos arbitrarios mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38275.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38275.json index 704da001c68..891708a6726 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38275.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38275.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38275", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-06-18T20:15:13.970", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:53.613", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El contenedor cURL en Moodle retuvo los encabezados de solicitud originales al seguir redirecciones, por lo que la informaci\u00f3n del encabezado de autorizaci\u00f3n HTTP podr\u00eda enviarse involuntariamente en solicitudes para redireccionar URL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json index dc43f4299a1..33e712cb142 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38293.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38293", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T05:15:50.517", - "lastModified": "2024-06-13T18:36:09.010", + "lastModified": "2024-07-03T02:04:54.487", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "ALCASAR anterior a 3.6.1 permite CSRF y la ejecuci\u00f3n remota de c\u00f3digo en Activity.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://adullact.net/frs/download.php/file/8930/CHANGELOG.md", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38348.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38348.json index 62d8da3a01f..ea4554ae125 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38348.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38348.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38348", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T17:15:52.677", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:04:55.710", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que CodeProjects Health Care hospital Management System v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo de informaci\u00f3n del personal a trav\u00e9s del par\u00e1metro servalu." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://code-projects.org/health-care-hospital-in-php-css-js-and-mysql-free-download/", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38384.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38384.json index 6d842329e30..8ae26c41b6e 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38384.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38384.json @@ -2,15 +2,55 @@ "id": "CVE-2024-38384", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-24T14:15:12.547", - "lastModified": "2024-06-24T19:26:47.037", + "lastModified": "2024-07-03T02:04:57.820", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix list corruption from reorder of WRITE ->lqueued\n\n__blkcg_rstat_flush() can be run anytime, especially when blk_cgroup_bio_start\nis being executed.\n\nIf WRITE of `->lqueued` is re-ordered with READ of 'bisc->lnode.next' in\nthe loop of __blkcg_rstat_flush(), `next_bisc` can be assigned with one\nstat instance being added in blk_cgroup_bio_start(), then the local\nlist in __blkcg_rstat_flush() could be corrupted.\n\nFix the issue by adding one barrier." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-cgroup: corrupci\u00f3n de la lista de arreglos debido al reordenamiento de WRITE ->lqueued __blkcg_rstat_flush() se puede ejecutar en cualquier momento, especialmente cuando se est\u00e1 ejecutando blk_cgroup_bio_start. Si la ESCRITURA de `->lqueued` se reordena con la READ de 'bisc->lnode.next' en el bucle de __blkcg_rstat_flush(), se puede asignar `next_bisc` agregando una instancia de estad\u00edstica en blk_cgroup_bio_start(), entonces el La lista local en __blkcg_rstat_flush() podr\u00eda estar da\u00f1ada. Solucione el problema agregando una barrera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/714e59b5456e4d6e4295a9968c564abe193f461c", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38395.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38395.json index f88d039d2e0..e77a4f75d6b 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38395.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38395.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38395", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T01:15:48.537", - "lastModified": "2024-06-17T15:15:51.900", + "lastModified": "2024-07-03T02:04:58.833", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En iTerm2 anterior a 3.5.2, la configuraci\u00f3n \"La terminal puede informar el t\u00edtulo de la ventana\" no se respeta y, por lo tanto, puede ocurrir la ejecuci\u00f3n remota de c\u00f3digo, pero \"no es trivialmente explotable\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38396.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38396.json index 96fa61a84b8..0b273117d97 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38396.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38396.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38396", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T21:15:50.730", - "lastModified": "2024-06-17T15:15:52.007", + "lastModified": "2024-07-03T02:04:59.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en iTerm2 3.5.x anterior a 3.5.2. El uso sin filtrar de una secuencia de escape para informar el t\u00edtulo de una ventana, en combinaci\u00f3n con la funci\u00f3n de integraci\u00f3n tmux incorporada (habilitada de forma predeterminada), permite a un atacante inyectar c\u00f3digo arbitrario en la terminal, una vulnerabilidad diferente a CVE-2024-38395." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38427.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38427.json index 47775969a53..ec88e7358e2 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38427.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38427.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38427", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T02:15:08.557", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:05:00.507", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En International Color Consortium DemoIccMAX anterior a 85ce74e, una falla l\u00f3gica en CIccTagXmlProfileSequenceId::ParseXml en IccXML/IccLibXML/IccTagXml.cpp da como resultado un retorno falso incondicional." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + } + ], "references": [ { "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json index 23220efde72..41f88800b3c 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38441.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38441", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T13:15:53.230", - "lastModified": "2024-06-30T12:15:02.427", + "lastModified": "2024-07-03T02:05:01.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Netatalk 3.2.0 tiene un error uno por uno y el resultado es un desbordamiento del b\u00fafer basado en el mont\u00f3n debido a la configuraci\u00f3n de ibuf[len] en '\\0' en FPMapName en afp_mapname en etc/afp/directory.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38443.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38443.json index 4db231a6d99..ae340972326 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38443.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38443.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38443", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T13:15:53.483", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:05:02.417", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "C/sorting/binary_insertion_sort.c en Los algoritmos: C hasta e5dad3f tiene un error de segmentaci\u00f3n para la recursividad profunda, lo que puede afectar casos de uso comunes, como ordenar una matriz de 50 elementos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/TheAlgorithms/C/issues/1394", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38448.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38448.json index d5459eec369..8d2a1fa7865 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38448.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38448.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38448", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T14:15:09.180", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:05:03.433", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "htags en GNU Global hasta 6.6.12 permite la ejecuci\u00f3n de c\u00f3digo en situaciones en las que dbpath (tambi\u00e9n conocido como -d) no es de confianza, porque se pueden usar metacaracteres de shell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://cvs.savannah.gnu.org/viewvc/global/global/htags/htags.c?revision=1.236&view=markup", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38459.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38459.json index 5f90895454b..33c15f382c2 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38459.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38459.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38459", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T15:15:51.840", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:05:04.377", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "langchain_experimental (tambi\u00e9n conocido como LangChain Experimental) anterior a 0.0.61 para LangChain proporciona acceso a Python REPL sin un paso de suscripci\u00f3n. NOTA; Este problema existe debido a una soluci\u00f3n incompleta para CVE-2024-27444." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/langchain-ai/langchain/commit/ce0b0f22a175139df8f41cdcfb4d2af411112009", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38467.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38467.json index 09e54bd2393..2eb11cea176 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38467.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38467.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38467", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T16:15:09.877", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:05:05.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El sistema de im\u00e1genes Shenzhen Guoxin Synthesis anterior a 8.3.0 permite la recuperaci\u00f3n de informaci\u00f3n de usuarios no autorizados a trav\u00e9s de la API queryUser." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/Pumpkin-ito/Cve-Vuln/blob/main/Guosen%20synthetic%20imaging%20system%20vulnerability.pdf", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38469.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38469.json index 50f61ccd9a6..93fbda45f74 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38469.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38469.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38469", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:12.070", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:05:06.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que zhimengzhe iBarn v1.5 conten\u00eda una vulnerabilidad de cross site scripting (XSS) reflejado a trav\u00e9s del par\u00e1metro $search en /pay.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://github.com/zhimengzhe/iBarn", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38470.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38470.json index 4e6a855537e..5cbc55c6899 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38470.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38470.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38470", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:12.183", - "lastModified": "2024-06-20T12:44:22.977", + "lastModified": "2024-07-03T02:05:07.477", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que zhimengzhe iBarn v1.5 conten\u00eda una vulnerabilidad de cross site scripting (XSS) reflejado a trav\u00e9s del par\u00e1metro $search en /own.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/zhimengzhe/iBarn", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38541.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38541.json index ce96c9c76a5..545c08e4bfe 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38541.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38541.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38541", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:14.383", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:05:10.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: of: m\u00f3dulo: agregar control de desbordamiento del b\u00fafer of_modalias() En of_modalias(), si el b\u00fafer es demasiado peque\u00f1o incluso para la primera llamada a snprintf(), el par\u00e1metro len se vuelve negativo y el par\u00e1metro str (si no es NULL inicialmente) apuntar\u00e1 m\u00e1s all\u00e1 del final del b\u00fafer. Agregue la verificaci\u00f3n de desbordamiento del b\u00fafer despu\u00e9s de la primera llamada a snprintf() y corrija dicha verificaci\u00f3n despu\u00e9s de la llamada strlen() (teniendo en cuenta el car\u00e1cter NUL de terminaci\u00f3n)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38548.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38548.json index 36c7a392c8e..458812c1073 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38548.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38548.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38548", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.063", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:05:11.107", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32fb2ef124c3301656ac6c789a2ef35ef69a66da", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38550.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38550.json index fa79fe62e6e..f3045c0fe6a 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38550.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38550.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38550", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.270", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:05:11.837", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1a7254525ca7a6f3e37d7882d7f7ad97f6235f7c", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38573.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38573.json index 773161ec001..0b0813dd0a4 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38573.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38573.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38573", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:17.420", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:05:13.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cppc_cpufreq: se corrige la posible desreferencia del puntero nulo. cppc_cpufreq_get_rate() y hisi_cppc_cpufreq_get_rate() se pueden llamar desde diferentes lugares con varios par\u00e1metros. Entonces cpufreq_cpu_get() puede devolver nulo como 'pol\u00edtica' en algunas circunstancias. Corrija este error agregando una verificaci\u00f3n de devoluci\u00f3n nula. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/769c4f355b7962895205b86ad35617873feef9a5", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json index df80d81ab3e..c7dd734b085 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38576", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:17.700", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:05:14.340", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3758f7d9917bd7ef0482c4184c0ad673b4c4e069", diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38605.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38605.json index 06e89cdf2ff..ac55e6a216d 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38605.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38605.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38605", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:20.443", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:05:15.990", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: n\u00facleo: corrige la asignaci\u00f3n del puntero del m\u00f3dulo NULL en el inicio de la tarjeta el commit 81033c6b584b (\"ALSA: n\u00facleo: Advertencia sobre m\u00f3dulo vac\u00edo\") introdujo un WARN_ON() para un puntero de m\u00f3dulo NULL pasado en la creaci\u00f3n del objeto snd_card, y tambi\u00e9n envuelve el c\u00f3digo a su alrededor con '#ifdef MODULE'. Esto funciona en la mayor\u00eda de los casos, pero los problemas siempre est\u00e1n en los detalles. \"M\u00d3DULO\" se define cuando el c\u00f3digo objetivo (es decir, el n\u00facleo de sonido) se construye como un m\u00f3dulo; pero esto no significa que la persona que llama tambi\u00e9n est\u00e9 integrada o no. Es decir, cuando solo el n\u00facleo de sonido est\u00e1 integrado (CONFIG_SND=y) mientras el controlador es un m\u00f3dulo (CONFIG_SND_USB_AUDIO=m), el puntero del m\u00f3dulo pasado se ignora incluso si no es NULL, y tarjeta->m\u00f3dulo permanece como NULL. Esto dar\u00eda como resultado que la referencia del m\u00f3dulo faltante suba o baje en la apertura o cierre del dispositivo, lo que provocar\u00eda una ejecuci\u00f3n con la ejecuci\u00f3n del c\u00f3digo despu\u00e9s de la eliminaci\u00f3n del m\u00f3dulo. Para solucionar el error, mueva la asignaci\u00f3n de tarjeta->m\u00f3dulo nuevamente fuera de ifdef. WARN_ON() todav\u00eda est\u00e1 incluido en ifdef porque el m\u00f3dulo puede ser realmente NULL cuando todos los controladores de sonido est\u00e1n integrados. Tenga en cuenta que mantenemos 'ifdef MODULE' para WARN_ON(); de lo contrario, se producir\u00eda una verificaci\u00f3n de m\u00f3dulo NULL falsamente positiva. Es cierto que no se detectar\u00e1 perfectamente, es decir, no se realiza ninguna verificaci\u00f3n cuando CONFIG_SND=y. Pero no es un problema real ya que es solo para depurar y la condici\u00f3n es bastante rara." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1", diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json index bf77be28870..8c3e2684e07 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38612", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:21.060", - "lastModified": "2024-06-27T13:16:01.530", + "lastModified": "2024-07-03T02:05:17.077", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipv6: sr: corrige la ruta de error de cancelaci\u00f3n de registro no v\u00e1lida La ruta de error de seg6_init() es incorrecta en caso de que CONFIG_IPV6_SEG6_LWTUNNEL no est\u00e9 definido. En ese caso, si seg6_hmac_init() falla, no se llama a genl_unregister_family(). Este problema existe desde que el commit 46738b1317e1 (\"ipv6: sr: agregar opci\u00f3n para controlar la compatibilidad con lwtunnel\") y el commit 5559cea2d5aa (\"ipv6: sr: corregir posible use-after-free y null-ptr-deref\") reemplaz\u00f3 unregister_pernet_subsys() con genl_unregister_family() en esta ruta de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c", diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38616.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38616.json index 559ede8f71b..3d6a2379ac3 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38616.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38616.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38616", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:21.403", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:05:18.007", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: carl9170: volver a corregir la advertencia de memset fortificado La funci\u00f3n carl9170_tx_release() a veces activa una advertencia de memset fortificado en mis compilaciones de randconfig: en el archivo incluido en include/linux/string. h:254, de drivers/net/wireless/ath/carl9170/tx.c:40: en la funci\u00f3n 'fortify_memset_chk', insertado desde 'carl9170_tx_release' en drivers/net/wireless/ath/carl9170/tx.c:283:2 , incluido desde 'kref_put' en include/linux/kref.h:65:3, incluido desde 'carl9170_tx_put_skb' en drivers/net/wireless/ath/carl9170/tx.c:342:9: include/linux/fortify-string .h:493:25: error: llamada a '__write_overflow_field' declarada con advertencia de atributo: escritura detectada m\u00e1s all\u00e1 del tama\u00f1o del campo (primer par\u00e1metro); \u00bfQuiz\u00e1s usar struct_group()? [-Werror=advertencia-atributo] 493 | __write_overflow_field(p_size_field, tama\u00f1o); Kees anteriormente intent\u00f3 evitar esto usando memset_after(), pero parece que esto no soluciona completamente el problema. Me di cuenta de que memset_after() aqu\u00ed se realiza en una parte diferente de la uni\u00f3n (estado) de la que proven\u00eda la conversi\u00f3n original (rate_driver_data), lo que puede confundir al compilador. Desafortunadamente, el truco memset_after() no funciona en driver_rates[] porque es parte de una estructura an\u00f3nima y tampoco pude lograr que struct_group() hiciera esto. Sin embargo, el uso de dos llamadas memset() separadas en los dos miembros soluciona la advertencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/042a39bb8e0812466327a5102606e88a5a4f8c02", diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38623.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38623.json index e3c54447b49..028cfdca709 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38623.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38623.json @@ -2,15 +2,55 @@ "id": "CVE-2024-38623", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:11.277", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T02:05:19.197", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Use variable length array instead of fixed size\n\nShould fix smatch warning:\n\tntfs_set_label() error: __builtin_memcpy() 'uni->name' too small (20 vs 256)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fs/ntfs3: use una matriz de longitud variable en lugar de un tama\u00f1o fijo. Deber\u00eda corregirse la advertencia de coincidencia: error ntfs_set_label(): __builtin_memcpy() 'uni->name' demasiado peque\u00f1o (20 vs 256)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1997cdc3e727526aa5d84b32f7cbb3f56459b7ef", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json index c703abc90d6..b925a0f31c3 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json @@ -2,12 +2,17 @@ "id": "CVE-2024-38873", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T07:15:09.110", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-03T02:05:21.267", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the friendlycaptcha_official (aka Integration of Friendly Captcha) extension before 0.1.4 for TYPO3. The extension fails to check the requirement of the captcha field in submitted form data, allowing a remote user to bypass the captcha check. This only affects the captcha integration for the ext:form extension." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en la extensi\u00f3n amigablecaptcha_official (tambi\u00e9n conocida como Integraci\u00f3n de Friendly Captcha) antes de la versi\u00f3n 0.1.4 para TYPO3. La extensi\u00f3n no verifica el requisito del campo captcha en los datos del formulario enviado, lo que permite a un usuario remoto omitir la verificaci\u00f3n de captcha. Esto solo afecta la integraci\u00f3n de captcha para la extensi\u00f3n ext:form." } ], "metrics": { @@ -34,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-004", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38892.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38892.json index 50c14efb37b..8023bfa60a0 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38892.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38892.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38892", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.050", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:22.090", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en Wavlink WN551K1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente ExportAllSettings.sh." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-202" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/Wavlink/WN551K1/ExportLogs.sh/README.md", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38894.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38894.json index 67a97373820..cfcc95a656b 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38894.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38894.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38894", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.137", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:22.937", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "WAVLINK WN551K1 encontr\u00f3 una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro IP de /cgi-bin/touchlist_sync.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/Wavlink/WN551K1/touchlist_sync.cgi/README.md", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38895.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38895.json index 41b254d6670..208eb750131 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38895.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38895.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38895", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.213", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:23.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "WAVLINK WN551K1'live_mfg.shtml permite a los atacantes obtener informaci\u00f3n confidencial del enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-202" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/tree/main/Wavlink/WN551K1/live_mfg.shtml", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38896.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38896.json index 4b118dfa208..0769af3ea25 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38896.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38896.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38896", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.293", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:24.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "WAVLINK WN551K1 encontr\u00f3 una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro start_hour de /cgi-bin/nightled.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/tree/main/Wavlink/WN551K1/nightled.cgi", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38897.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38897.json index 2400a047f0b..a8844ff7827 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38897.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38897.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38897", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.377", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:25.367", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "WAVLINK WN551K1'live_check.shtml permite a los atacantes obtener informaci\u00f3n confidencial del enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-202" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/Wavlink/WN551K1/live_check.shtml/README.md", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json index 145732bb309..072c906a6a9 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38902", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.457", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:26.170", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 que H3C Magic R230 V100R002 contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow, que permite a los atacantes iniciar sesi\u00f3n como root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/H3C/Magic%20R230/hardcode/README.md", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38903.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38903.json index 4561185f848..08154c62edc 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38903.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38903.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38903", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.543", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:05:26.943", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El udpserver del H3C Magic R230 V100R002 abre el puerto 9034, lo que permite a los atacantes ejecutar comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/H3C/Magic%20R230/UDPserver_97F/README.md", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json index da671f28f74..7647438b720 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38990", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.807", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:27.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tada5hi sp-common v0.5.4 was discovered to contain a prototype pollution via the function mergeDeep. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tada5hi sp-common v0.5.4 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n mergeDeep. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/ae5f6b0d8f5d7de716e6af6d189b2169", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json index 57863caddb3..4239ce14070 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38991", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.863", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:28.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "akbr patch-into v1.0.1 was discovered to contain a prototype pollution via the function patchInto. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que akbr patch-into v1.0.1 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n patchInto. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/8851413e3b33a96f191f0e9c81706532", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json index b0a3a23e19e..1527c65ec11 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38992", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.930", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:29.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "airvertco frappejs v0.0.11 was discovered to contain a prototype pollution via the function registerView. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que airvertco frappejs v0.0.11 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n RegisterView. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/10c88b9069229979ac7e52e0efc98055", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json index 403456484fa..8ad62d580e2 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38993", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.987", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:30.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "rjrodger jsonic-next v2.12.1 was discovered to contain a prototype pollution via the function empty. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que rjrodger jsonic-next v2.12.1 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n vac\u00eda. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/9a2b522d59c53f31f45c1edb96459693", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json index 2520586fb48..e0a59e74feb 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38994", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.047", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:31.113", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "amoyjs amoy common v1.0.10 was discovered to contain a prototype pollution via the function extend. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que amoyjs amoy common v1.0.10 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n extender. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/02091aa86c6c14c29b9703642439dd03", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json index 6004bcf676d..e5982ca665e 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38996", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.103", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:31.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ag-grid-community v31.3.2 and ag-grid-enterprise v31.3.2 were discovered to contain a prototype pollution via the _.mergeDeep function. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que ag-grid-community v31.3.2 y ag-grid-enterprise v31.3.2 conten\u00edan un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n _.mergeDeep. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json index fb09510b93d..6f623d63e5c 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38997", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.160", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:32.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "adolph_dudu ratio-swiper v0.0.2 was discovered to contain a prototype pollution via the function extendDefaults. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que adolph_dudu ratio-swiper v0.0.2 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n extendDefaults. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/840f5d160aab4151bd0451cfb822e6b5", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json index 4200797eb85..db6972175c9 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38998", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.223", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:33.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que jrburke requirejs v2.3.6 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n config. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3834.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3834.json index e2d94c52e2f..0962b0220a2 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3834.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3834.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3834", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.293", - "lastModified": "2024-05-03T04:15:09.043", + "lastModified": "2024-07-03T02:06:36.447", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3837.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3837.json index 0ba90fc73a7..e91f4d148e8 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3837.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3837.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3837", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.340", - "lastModified": "2024-05-03T03:16:29.010", + "lastModified": "2024-07-03T02:06:37.303", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3838.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3838.json index cdef3b01a35..cfeec682b7f 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3838.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3838.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3838", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.383", - "lastModified": "2024-04-23T18:15:15.410", + "lastModified": "2024-07-03T02:06:38.383", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3839.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3839.json index 91c98360b6d..303a8abf943 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3839.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3839.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3839", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.433", - "lastModified": "2024-05-03T04:15:09.127", + "lastModified": "2024-07-03T02:06:38.637", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3840.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3840.json index ec543072a11..d9a6756407d 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3840.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3840.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3840", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.483", - "lastModified": "2024-05-03T03:16:29.067", + "lastModified": "2024-07-03T02:06:39.663", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La aplicaci\u00f3n insuficiente de pol\u00edticas en Site Isolation en Google Chrome antes de 124.0.6367.60 permiti\u00f3 a un atacante remoto eludir las restricciones de navegaci\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3841.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3841.json index 3e83fca2414..55197f1db87 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3841.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3841.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3841", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.530", - "lastModified": "2024-05-03T04:15:09.563", + "lastModified": "2024-07-03T02:06:40.900", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La validaci\u00f3n de datos insuficiente en Browser Switcher en Google Chrome anterior a 124.0.6367.60 permiti\u00f3 a un atacante remoto inyectar scripts o HTML en una p\u00e1gina privilegiada a trav\u00e9s de un archivo malicioso. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3843.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3843.json index 819a9ee42a1..473dbe6ad4a 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3843.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3843.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3843", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.573", - "lastModified": "2024-05-03T03:16:29.117", + "lastModified": "2024-07-03T02:06:41.770", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La validaci\u00f3n de datos insuficiente en Descargas en Google Chrome anterior a 124.0.6367.60 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3844.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3844.json index a265b0e54a3..8a42f44bd9e 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3844.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3844.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3844", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.620", - "lastModified": "2024-05-03T03:16:29.163", + "lastModified": "2024-07-03T02:06:42.643", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La implementaci\u00f3n inapropiada en Extensiones en Google Chrome anteriores a 124.0.6367.60 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de interfaz de usuario a trav\u00e9s de una extensi\u00f3n de Chrome manipulada. (Severidad de seguridad de Chrome: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3845.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3845.json index f4f010831fd..45ff9653b03 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3845.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3845.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3845", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.673", - "lastModified": "2024-05-03T03:16:29.210", + "lastModified": "2024-07-03T02:06:42.887", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "La implementaci\u00f3n inapropiada en Redes en Google Chrome anterior a 124.0.6367.60 permiti\u00f3 a un atacante remoto eludir la pol\u00edtica de contenido mixto a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1068" + }, + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3846.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3846.json index 1514c0f3c11..3a21da07694 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3846.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3846.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3846", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.720", - "lastModified": "2024-05-03T03:16:29.250", + "lastModified": "2024-07-03T02:06:43.703", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La implementaci\u00f3n inapropiada de Avisos en Google Chrome anteriores a 124.0.6367.60 permiti\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos de IU espec\u00edficos para realizar una suplantaci\u00f3n de IU a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3847.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3847.json index 07f2acd44a2..afe25ad1373 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3847.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3847.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3847", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T08:15:10.767", - "lastModified": "2024-05-03T03:16:29.293", + "lastModified": "2024-07-03T02:06:43.977", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "La aplicaci\u00f3n insuficiente de pol\u00edticas en WebUI en Google Chrome antes de 124.0.6367.60 permiti\u00f3 a un atacante remoto eludir la pol\u00edtica de seguridad de contenido a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + }, + { + "lang": "en", + "value": "CWE-691" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json index edc228441e1..6acd4370213 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3852", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.357", - "lastModified": "2024-04-22T10:15:07.430", + "lastModified": "2024-07-03T02:06:44.987", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "GetBoundName podr\u00eda devolver la versi\u00f3n incorrecta de un objeto cuando se aplicaron optimizaciones JIT. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-386" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3853.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3853.json index 03adc135789..d27d088510e 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3853.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3853.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3853", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.400", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-03T02:06:45.877", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Podr\u00eda producirse un use-after-free si un dominio de JavaScript estaba en proceso de inicializaci\u00f3n cuando comenz\u00f3 una recolecci\u00f3n de basura. Esta vulnerabilidad afecta a Firefox < 125." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884427", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json index 0149c467d63..fabeaf21c4a 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3854", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.440", - "lastModified": "2024-04-22T10:15:07.470", + "lastModified": "2024-07-03T02:06:46.110", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "En algunos patrones de c\u00f3digo, el JIT optimiz\u00f3 incorrectamente las declaraciones de cambio y gener\u00f3 c\u00f3digo con lecturas fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884552", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json index fd88a11a044..29c16ac1381 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3857", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.573", - "lastModified": "2024-04-22T10:15:07.520", + "lastModified": "2024-07-03T02:06:46.957", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El JIT cre\u00f3 c\u00f3digo incorrecto para los argumentos en ciertos casos. Esto provoc\u00f3 posibles fallos de use-after-free durante la recolecci\u00f3n de basura. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886683", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json index 2ade698f910..9415e44fef2 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3859", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.663", - "lastModified": "2024-04-22T10:15:07.573", + "lastModified": "2024-07-03T02:06:47.757", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "En las versiones de 32 bits hab\u00eda desbordamientos de enteros que conduc\u00edan a una lectura fuera de los l\u00edmites que potencialmente podr\u00eda ser provocada por una fuente OpenType con formato incorrecto. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874489", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json index 2417f3a4d2d..288ef93b212 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3861", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.770", - "lastModified": "2024-04-22T10:15:07.620", + "lastModified": "2024-07-03T02:06:48.590", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Si se asignara un AlignedBuffer a s\u00ed mismo, el movimiento autom\u00e1tico posterior podr\u00eda dar como resultado un recuento de referencias incorrecto y, posteriormente, un use-after-free. Esta vulnerabilidad afecta a Firefox < 125 y Firefox ESR < 115.10." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883158", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json index 5fbf487ef2b..1712adbfe2f 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3893", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-25T08:15:07.490", - "lastModified": "2024-04-25T13:18:13.537", + "lastModified": "2024-07-03T02:06:50.403", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3073754/classified-listing/trunk/app/Controllers/Ajax/FormBuilderAjax.php", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json index 8a24e11a93f..13bdaadd6e9 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39000", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.340", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:34.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "adolph_dudu ratio-swiper v0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que adolph_dudu ratio-swiper v0.0.2 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n de an\u00e1lisis. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/840f5d160aab4151bd0451cfb822e6b5", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json index 4b4a5228cce..1a3628c67a0 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39003", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.513", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:35.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "amoyjs amoy common v1.0.10 was discovered to contain a prototype pollution via the function setValue. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que amoyjs amoy common v1.0.10 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n setValue. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/02091aa86c6c14c29b9703642439dd03", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json index 856ba0fe213..0c816bd4645 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39015", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.767", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:35.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "cafebazaar hod v0.4.14 was discovered to contain a prototype pollution via the function request. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que cafebazaar hod v0.4.14 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la solicitud de funci\u00f3n. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/7ab061d9eb901cc89652e7666ca3ef52", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json index c0ade55e7e7..a110844541a 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39016", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.823", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:36.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "che3vinci c3/utils-1 1.0.131 was discovered to contain a prototype pollution via the function assign. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que che3vinci c3/utils-1 1.0.131 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n asignar. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/865a957857a096221fe6f8b258b282ac", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json index 2f9c81dd62f..531b4bd0af5 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39017", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.893", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:37.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "agreejs shared v0.0.1 was discovered to contain a prototype pollution via the function mergeInternalComponents. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Accordjs Shared v0.0.1 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n mergeInternalComponents. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/039e3e337642e6bb7f36aeddfde41b8b", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json index 67f733ddfa2..9812812c21c 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39130", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.370", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:05:38.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL Pointer Dereference discovered in DumpTS v0.1.0-nightly allows attackers to cause a denial of service via the function DumpOneStream() at /src/DumpStream.cpp." + }, + { + "lang": "es", + "value": "Una desreferencia de puntero NULL descubierta en DumpTS v0.1.0-nightly permite a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n DumpOneStream() en /src/DumpStream.cpp." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/wangf1978/DumpTS/issues/20", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json index 23cd4c4398b..8ccc5748719 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39133", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.463", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:05:39.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap Buffer Overflow vulnerability in zziplib v0.13.77 allows attackers to cause a denial of service via the __zzip_parse_root_directory() function at /zzip/zip.c." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer de mont\u00f3n en zziplib v0.13.77 permite a atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n __zzip_parse_root_directory() en /zzip/zip.c." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/gdraheim/zziplib/issues/164", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json index 1313b005ee8..4c6170677bc 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39134", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.883", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:05:40.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows attackers to cause a denial of service via the __zzip_fetch_disk_trailer() function at /zzip/zip.c." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer de pila en zziplibv 0.13.77 permite a atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n __zzip_fetch_disk_trailer() en /zzip/zip.c." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/gdraheim/zziplib/issues/165", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39153.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39153.json index 5a9ebc4a665..8d80e6f3710 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39153.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39153.json @@ -2,15 +2,55 @@ "id": "CVE-2024-39153", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T14:15:15.717", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-07-03T02:05:40.930", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/info_deal.php?mudi=del&dataType=news&dataTypeCN." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/info_deal.php?mudi=del&dataType=news&dataTypeCN." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Thirtypenny77/cms2/blob/main/50/csrf.md", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39156.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39156.json index b6b1208c198..d451a52080a 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39156.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39156.json @@ -2,15 +2,55 @@ "id": "CVE-2024-39156", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T14:15:16.007", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-07-03T02:05:41.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/keyWord_deal.php?mudi=add." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/keyWord_deal.php?mudi=add." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Thirtypenny77/cms2/blob/main/55/csrf.md", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39157.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39157.json index 8f06183ed22..e2e6721fc6d 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39157.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39157.json @@ -2,15 +2,55 @@ "id": "CVE-2024-39157", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T14:15:16.103", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-07-03T02:05:42.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/ipRecord_deal.php?mudi=del&dataType=&dataID=1." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/ipRecord_deal.php?mudi=del&dataType=&dataID=1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Thirtypenny77/cms2/blob/main/57/csrf.md", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json index 2306187337e..44354053848 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39208", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.650", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:05:43.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "luci-app-lucky v2.8.3 was discovered to contain hardcoded credentials." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que luci-app-lucky v2.8.3 conten\u00eda credenciales codificadas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/yanggao017/9e64b97f4de708360db08db01f0bb980", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json index 627003f2c44..ce6542a9bca 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39236", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T19:15:05.420", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:05:44.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Gradio v4.36.1 contiene una vulnerabilidad de inyecci\u00f3n de c\u00f3digo a trav\u00e9s del componente /gradio/component_meta.py. Esta vulnerabilidad se activa mediante una entrada manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/Aaron911/PoC/blob/main/Gradio.md", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json index 3aada3e1e7b..fe87175aa47 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39243", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.610", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-03T02:05:45.213", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " Un problema descubierto en skycaiji 2.8 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud POST manipulada para /index.php?s=/admin/develop/editor_save." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], "references": [ { "url": "https://fushuling.com/index.php/2024/06/11/test/", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39331.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39331.json index e3acc72d3f1..5106a6934fe 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39331.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39331.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39331", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-23T22:15:09.370", - "lastModified": "2024-06-29T07:15:02.060", + "lastModified": "2024-07-03T02:05:47.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Emacs anterior a 29.4, org-link-expand-abbrev en lisp/ol.el expande una abreviatura de enlace %(...) incluso cuando especifica una funci\u00f3n no segura, como shell-command-to-string. Esto afecta al modo de organizaci\u00f3n anterior a 9.7.5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39462.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39462.json index 17dbc8293da..3c9cec84423 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39462.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39462.json @@ -2,15 +2,55 @@ "id": "CVE-2024-39462", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.580", - "lastModified": "2024-06-25T18:50:42.040", + "lastModified": "2024-07-03T02:05:49.283", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: bcm: dvp: Assign ->num before accessing ->hws\n\nCommit f316cdff8d67 (\"clk: Annotate struct clk_hw_onecell_data with\n__counted_by\") annotated the hws member of 'struct clk_hw_onecell_data'\nwith __counted_by, which informs the bounds sanitizer about the number\nof elements in hws, so that it can warn when hws is accessed out of\nbounds. As noted in that change, the __counted_by member must be\ninitialized with the number of elements before the first array access\nhappens, otherwise there will be a warning from each access prior to the\ninitialization because the number of elements is zero. This occurs in\nclk_dvp_probe() due to ->num being assigned after ->hws has been\naccessed:\n\n UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-bcm2711-dvp.c:59:2\n index 0 is out of range for type 'struct clk_hw *[] __counted_by(num)' (aka 'struct clk_hw *[]')\n\nMove the ->num initialization to before the first access of ->hws, which\nclears up the warning." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: bcm: dvp: Assign ->num before accessing ->hws Commit f316cdff8d67 (\"clk: Annotate struct clk_hw_onecell_data with __counted_by\") anot\u00f3 el miembro hws de 'struct clk_hw_onecell_data' con __counted_by, que informa al sanitizante de los l\u00edmites sobre la cantidad de elementos en hws, para que pueda advertir cuando se accede a hws fuera de los l\u00edmites. Como se se\u00f1al\u00f3 en ese cambio, el miembro __counted_by debe inicializarse con la cantidad de elementos antes de que ocurra el primer acceso a la matriz; de lo contrario, habr\u00e1 una advertencia de cada acceso antes de la inicializaci\u00f3n porque la cantidad de elementos es cero. Esto ocurre en clk_dvp_probe() debido a que ->num se asigna despu\u00e9s de que se haya accedido a ->hws: UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-bcm2711-dvp.c:59:2 El \u00edndice 0 est\u00e1 fuera del rango para el tipo 'struct clk_hw *[] __counted_by(num)' (tambi\u00e9n conocido como 'struct clk_hw *[]'). Mueva la inicializaci\u00f3n ->num antes del primer acceso de ->hws, lo que borra la advertencia. ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0dc913217fb79096597005bba9ba738e2db5cd02", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json index a4bd96d7bc4..46eb312d465 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39573", "sourceIdentifier": "security@apache.org", "published": "2024-07-01T19:15:05.760", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:05:50.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El potencial SSRF en mod_rewrite en Apache HTTP Server 2.4.59 y versiones anteriores permite a un atacante provocar que RewriteRules inseguras configuren inesperadamente URL para que sean manejadas por mod_proxy. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.60, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39669.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39669.json index 91c4194fa4a..9d0541db225 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39669.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39669.json @@ -2,15 +2,55 @@ "id": "CVE-2024-39669", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T16:15:12.007", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-07-03T02:05:50.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Console in Soffid IAM before 3.5.39, necessary checks were not applied to some Java objects. A malicious agent could possibly execute arbitrary code in the Sync Server and compromise security." + }, + { + "lang": "es", + "value": "En la consola de Soffid IAM anterior a 3.5.39, no se aplicaron las comprobaciones necesarias a algunos objetos Java. Un agente malicioso podr\u00eda ejecutar c\u00f3digo arbitrario en Sync Server y comprometer la seguridad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bookstack.soffid.com/books/security-advisories/page/cve-2024-39669", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json index b6df45bbd94..7b5a6310c4d 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39705", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T22:15:10.543", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:05:51.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python code, and the integrated data package download functionality is used. This affects, for example, averaged_perceptron_tagger and punkt." + }, + { + "lang": "es", + "value": "NLTK hasta 3.8.1 permite la ejecuci\u00f3n remota de c\u00f3digo si los paquetes que no son de confianza tienen c\u00f3digo Python encurtido y se utiliza la funcionalidad de descarga de paquetes de datos integrada. Esto afecta, por ejemplo, a Averaged_perceptron_tagger y punkt." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/nltk/nltk/issues/2522", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39840.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39840.json index 4545719b74e..48ddc77cc6c 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39840.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39840.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39840", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-29T17:15:09.857", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-03T02:05:52.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Factorio anterior a 1.1.101 permite que un servidor manipulado ejecute c\u00f3digo arbitrario en clientes a trav\u00e9s de un mapa personalizado que aprovecha la capacidad de ciertas funciones del m\u00f3dulo base de Lua para ejecutar c\u00f3digo de bytes y generar objetos falsos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://memorycorruption.net/posts/rce-lua-factorio/", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39848.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39848.json index 8a0a3a975dd..e3499f0125e 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39848.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39848.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39848", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-29T22:15:02.263", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-03T02:05:53.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Internet2 Grouper anterior a 5.6 permite omitir la autenticaci\u00f3n cuando la autenticaci\u00f3n LDAP se utiliza de ciertas maneras. Esto est\u00e1 relacionado con internet2.middleware.grouper.ws.security.WsGrouperLdapAuthentication y el uso de la contrase\u00f1a UyY29r para la cuenta M3vwHr. Esto tambi\u00e9n afecta a \"Grouper for Web Services\" anteriores a 4.13.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://spaces.at.internet2.edu/display/Grouper/Grouper+bug+-+GRP-5515+-+web+services+LDAP+authentication+security+vulnerability", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json index 7dfe88e810c..de67cf6c78a 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39853", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:06.013", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-03T02:05:53.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "adolph_dudu ratio-swiper 0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que adolph_dudu ratio-swiper 0.0.2 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n de an\u00e1lisis. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/840f5d160aab4151bd0451cfb822e6b5", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39891.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39891.json index c813239afaf..3c9606de309 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39891.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39891.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39891", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T18:15:03.447", - "lastModified": "2024-07-02T18:15:03.447", + "lastModified": "2024-07-03T02:05:54.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/203.html", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json index c8282dc4dcb..1ded821795b 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3911.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3911", "sourceIdentifier": "info@cert.vde.com", "published": "2024-04-23T13:15:46.770", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-03T02:06:52.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-1021" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3914.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3914.json index 8797bb8f8b5..6c228088172 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3914.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3914.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3914", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-04-17T18:15:16.400", - "lastModified": "2024-05-03T03:16:29.340", + "lastModified": "2024-07-03T02:06:52.980", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en V8 en Google Chrome anterior a 124.0.6367.60 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3917.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3917.json index 6bf2ba5ba0b..4f0c1848b99 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3917.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3917.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3917", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-23T06:15:10.930", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:06:53.877", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Pet Manager de WordPress hasta la versi\u00f3n 1.4 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/88162016-9fc7-4194-9e81-44c50991f6e9/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3955.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3955.json index c073440891b..bb70a965730 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3955.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3955.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3955", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-02T10:15:08.630", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-07-03T02:06:56.087", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El par\u00e1metro GET de URL \"logtime\" utilizado dentro de la funci\u00f3n \"downloadlog\" de \"cbpi/http_endpoints/http_system.py\" se pasa posteriormente a la funci\u00f3n \"os.system\" en \"cbpi/controller/system_controller.py\" sin validaci\u00f3n previa que permita ejecutar c\u00f3digo arbitrario. Este problema afecta a CraftBeerPi 4: desde 4.0.0.58 (commit 563fae9) antes de 4.4.1.a1 (commit 57572c7)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cvd@cert.pl", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3965.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3965.json index dc29a9fc11d..7e0079f1265 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3965.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3965.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3965", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.060", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:06:56.690", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Pray For Me de WordPress hasta la versi\u00f3n 1.0.4 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0e1ba2b3-5849-42f6-b503-8b3b520e4a79/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3993.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3993.json index 2441f443bb0..caa478f12e4 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3993.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3993.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3993", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.680", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:06:58.160", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento AZAN Plugin de WordPress hasta la versi\u00f3n 0.6 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/19cd60dd-8599-4af3-99db-c42de504606c/", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json index 421595c03c9..688d7e644b0 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3999", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:04.050", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:06:58.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento EazyDocs de WordPress anterior a 2.5.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4030.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4030.json index 498ee93709b..65daa3e6e1c 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4030.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4030.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4030", "sourceIdentifier": "cna@python.org", "published": "2024-05-07T21:15:09.467", - "lastModified": "2024-06-13T20:15:15.570", + "lastModified": "2024-07-03T02:07:00.540", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "En Windows, un directorio devuelto por tempfile.mkdtemp() no siempre tendr\u00eda permisos configurados para restringir la lectura y escritura en el directorio temporal por parte de otros usuarios, sino que normalmente heredar\u00eda los permisos correctos de la ubicaci\u00f3n predeterminada. Es posible que las configuraciones alternativas o los usuarios sin un directorio de perfil no tengan los permisos previstos. Si no est\u00e1 utilizando Windows o no ha cambiado la ubicaci\u00f3n del directorio temporal, esta vulnerabilidad no le afecta. En otras plataformas, el directorio devuelto solo el usuario actual puede leerlo y escribirlo constantemente. Este problema se debi\u00f3 a que Python no admite permisos de Unix en Windows. La soluci\u00f3n agrega soporte para Unix \u201c700\u201d para la funci\u00f3n mkdir en Windows que utiliza mkdtemp() para garantizar que el directorio reci\u00e9n creado tenga los permisos adecuados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "cna@python.org", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4057.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4057.json index 9269bdba252..665b0707940 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4057.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4057.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4057", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-04T06:15:10.737", - "lastModified": "2024-06-04T16:57:41.053", + "lastModified": "2024-07-03T02:07:02.197", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Gutenberg Blocks with AI by Kadence WP WordPress anterior a 3.2.37 no valida ni escapa algunos de sus atributos de bloque antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross-Site Scripting almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/da4d4d87-07b3-4f7d-bcbd-d29968a30b4f/", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json index ed57443f7e8..e6b8bfcfe45 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4060", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-01T13:15:52.300", - "lastModified": "2024-05-03T04:15:09.620", + "lastModified": "2024-07-03T02:07:02.533", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El use after free en Dawn en Google Chrome anterior a 124.0.6367.78 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4068.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4068.json index bf258299dc6..2ec880490ca 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4068.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4068.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4068", "sourceIdentifier": "596c5446-0ce5-4ba2-aa66-48b3b757a647", "published": "2024-05-14T15:42:48.660", - "lastModified": "2024-05-22T12:15:10.983", + "lastModified": "2024-07-03T02:07:03.943", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -48,6 +49,16 @@ "value": "CWE-1050" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json index 92a3de431a3..10dea4d13f9 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4145", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-13T06:15:11.920", - "lastModified": "2024-07-02T14:44:45.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:07:08.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4163.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4163.json index 03b055b2b24..8ee2375feb2 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4163.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4163.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4163", "sourceIdentifier": "cve_disclosure@tech.gov.sg", "published": "2024-04-26T03:15:06.740", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-03T02:07:10.047", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://govtech-csg.github.io/security-advisories/2024/04/25/CVE-2024-4163.html", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4216.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4216.json index 4fb2ece060c..9d255a2e203 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4216.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4216.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4216", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-05-02T18:15:07.757", - "lastModified": "2024-06-10T18:15:36.523", + "lastModified": "2024-07-03T02:07:14.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/pgadmin-org/pgadmin4/issues/7282", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4232.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4232.json index 41f27283d3d..0f6796247be 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4232.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4232.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4232", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-05-14T15:43:08.453", - "lastModified": "2024-06-05T13:15:13.190", + "lastModified": "2024-07-03T02:07:15.740", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,74 @@ "value": "Esta vulnerabilidad existe en Digisol Router (DG-GR1321: versi\u00f3n de hardware 3.7L; versi\u00f3n de firmware: v3.2.02) debido a la presencia de acceso al terminal ra\u00edz en una interfaz serie sin el control de acceso adecuado. Un atacante con acceso f\u00edsico podr\u00eda aprovechar esto identificando los pines UART y accediendo al shell ra\u00edz del sistema vulnerable. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial en el sistema objetivo. Esta vulnerabilidad existe en Digisol Router (DG-GR1321: versi\u00f3n de hardware 3.7L; versi\u00f3n de firmware: v3.2.02) debido a la falta de cifrado o hash en almacenamiento de contrase\u00f1as dentro del firmware/base de datos del enrutador. Un atacante con acceso f\u00edsico podr\u00eda aprovechar esto extrayendo el firmware y aplicando ingenier\u00eda inversa a los datos binarios para acceder a las contrase\u00f1as de texto sin formato en el sistema vulnerable. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante obtener acceso no autorizado al sistema objetivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "vdisclose@cert-in.org.in", @@ -25,6 +93,16 @@ "value": "CWE-256" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4271.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4271.json index 16fa56c7616..ad38a99ff78 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4271.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4271.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4271", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.907", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:07:19.577", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento SVGator de WordPress hasta la versi\u00f3n 1.2.6 no sanitiza el contenido del archivo SVG, lo que permite a los usuarios con al menos el rol de autor de SVG con JavaScript malicioso realizar ataques XSS almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/c1fe0bc7-a340-428e-a549-1e37291bea1c/", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4291.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4291.json index 2745ed4eb25..ce3f1d1a4f0 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4291.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4291.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4291", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T20:15:07.170", - "lastModified": "2024-06-04T19:20:34.997", + "lastModified": "2024-07-03T02:07:20.773", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4308.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4308.json index 4184b429480..23be4b2fb22 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4308.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4308.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4308", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-04-29T13:15:31.687", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-07-03T02:07:22.320", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4331.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4331.json index e0002699d82..4733f891aad 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4331.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4331.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4331", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-01T13:15:52.343", - "lastModified": "2024-06-10T18:15:36.607", + "lastModified": "2024-07-03T02:07:25.070", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El use after free en Picture In Picture en Google Chrome anterior a 124.0.6367.118 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4368.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4368.json index aaff4ddbd58..8f97d93f9c9 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4368.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4368.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4368", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-01T13:15:52.390", - "lastModified": "2024-06-10T18:15:36.693", + "lastModified": "2024-07-03T02:07:28.557", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El use after free en Dawn en Google Chrome anterior a 124.0.6367.118 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4388.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4388.json index 43fe8e55966..37554277a0a 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4388.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4388.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4388", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-23T06:15:11.493", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:07:30.200", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Esto no valida una ruta generada con la entrada del usuario al descargar archivos, lo que permite a un usuario no autenticado descargar archivos arbitrarios desde el servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json index 649fc2e0cae..de2f2a51e57 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4395", "sourceIdentifier": "67325c3f-c596-46c5-a235-e1a1e73abe4e", "published": "2024-06-27T22:15:10.653", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:07:30.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XPC service within the audit functionality of Jamf Compliance Editor before version 1.3.1 on macOS can lead to local privilege escalation." + }, + { + "lang": "es", + "value": "El servicio XPC dentro de la funcionalidad de auditor\u00eda de Jamf Compliance Editor anterior a la versi\u00f3n 1.3.1 en macOS puede provocar una escalada de privilegios locales." } ], "metrics": { @@ -55,8 +59,42 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/Jamf-Concepts/jamf-compliance-editor/raw/v1.3.1/Jamf%20Compliance%20Editor%20-%20User%20Guide.pdf", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4399.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4399.json index 1366eb08681..8a4ceedf58b 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4399.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4399.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4399", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-23T06:15:11.577", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:07:31.827", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "No valida un par\u00e1metro antes de realizarle una solicitud, lo que podr\u00eda permitir a usuarios no autenticados realizar un ataque SSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4423.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4423.json index ce44ba45377..b678a5e0c54 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4423.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4423.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4423", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T15:43:40.150", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-07-03T02:07:32.943", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El control de acceso en el software CemiPark no valida adecuadamente los datos ingresados por el usuario, lo que permite omitir la autenticaci\u00f3n. Un atacante que tenga acceso de red al panel de inicio de sesi\u00f3n puede iniciar sesi\u00f3n con derechos de administrador en la aplicaci\u00f3n. Este problema afecta al software CemiPark: 4.5, 4.7, 5.03 y potencialmente a otros. El vendedor se neg\u00f3 a proporcionar la gama espec\u00edfica de productos afectados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cvd@cert.pl", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4425.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4425.json index abde495e0b1..b6db249a83b 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4425.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4425.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4425", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T15:43:42.633", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-07-03T02:07:33.267", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El control de acceso en el software CemiPark almacena las credenciales de integraci\u00f3n (por ejemplo, FTP o SIP) en texto plano. Un atacante que obtuvo acceso no autorizado al dispositivo puede recuperar las contrase\u00f1as de texto plano utilizadas por el sistema. Este problema afecta al software CemiPark: 4.5, 4.7, 5.03 y potencialmente a otros. El vendedor se neg\u00f3 a proporcionar la gama espec\u00edfica de productos afectados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "cvd@cert.pl", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4439.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4439.json index cca69393581..030e4ecf9ea 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4439.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4439.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4439", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-03T06:15:14.947", - "lastModified": "2024-05-03T12:48:41.067", + "lastModified": "2024-07-03T02:07:34.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], "references": [ { "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json index 3a01e127924..336391065fc 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4529", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-27T06:15:09.840", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T02:07:42.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Business Card WordPress hasta la versi\u00f3n 1.0.0 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios registrados realicen acciones no deseadas, como eliminar categor\u00edas de tarjetas mediante ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json index 60a08f22eba..7d9ced0efd4 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4531", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-27T06:15:10.017", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-07-03T02:07:42.610", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Business Card WordPress hasta la versi\u00f3n 1.0.0 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas, como editar tarjetas mediante ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/18c1b3bb-9998-416f-a972-c4a51643579c/", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4549.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4549.json index ce609b5da51..e685d584fc2 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4549.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4549.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4549", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-05-06T14:15:08.717", - "lastModified": "2024-05-06T21:15:48.783", + "lastModified": "2024-07-03T02:07:44.057", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://www.tenable.com/security/research/tra-2024-13", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4558.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4558.json index 0e626406149..844bbdb19e3 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4558.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4558.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4558", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-07T19:15:08.577", - "lastModified": "2024-06-10T18:15:36.760", + "lastModified": "2024-07-03T02:07:45.140", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en ANGLE en Google Chrome anterior a 124.0.6367.155 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4559.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4559.json index 9fe402685d5..b08e409324a 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4559.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4559.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4559", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-07T19:15:08.633", - "lastModified": "2024-06-10T18:15:36.837", + "lastModified": "2024-07-03T02:07:46.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en WebAudio en Google Chrome anterior a 124.0.6367.155 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4565.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4565.json index 3f9595f96e8..72188fe11a6 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4565.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4565.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4565", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-20T06:15:09.950", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:07:47.217", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Advanced Custom Fields (ACF) WordPress anterior a 6.3, el complemento de Advanced Custom Fields Pro WordPress anterior a 6.3 le permite mostrar valores de campo personalizados para cualquier publicaci\u00f3n mediante un c\u00f3digo corto sin verificar el acceso correcto" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4610.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4610.json index 10a61a5b333..83c7914066d 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4610.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4610.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4610", "sourceIdentifier": "arm-security@arm.com", "published": "2024-06-07T12:15:09.077", - "lastModified": "2024-06-13T01:00:02.087", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:07:50.390", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-06-12", "cisaActionDue": "2024-07-03", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json index 5c6283a9465..e92067ae945 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4621.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4621", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-07T06:15:11.840", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-07-03T02:07:50.963", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento ARForms - Premium WordPress Form Builder para WordPress anterior a 6.6 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json index eea3b588246..6b517e75cd8 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4627", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:04.400", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-03T02:07:51.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Rank Math SEO de WordPress anterior a 1.0.219 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a los usuarios acceder a la Configuraci\u00f3n general (de forma predeterminada, administrador, sin embargo, dicho acceso se puede otorgar a roles inferiores a trav\u00e9s de la funci\u00f3n Administrador de roles de el complemento Rank Math SEO de WordPress anterior a 1.0.219) para realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4671.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4671.json index 9969a6f8015..6944f463617 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4671.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4671.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4671", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-14T15:44:15.573", - "lastModified": "2024-06-10T18:15:36.890", + "lastModified": "2024-07-03T02:07:53.880", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-13", "cisaActionDue": "2024-06-03", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json index 359f0898417..f88b4a30b60 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4704", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:14.697", - "lastModified": "2024-06-28T13:27:26.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:07:57.433", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4755.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4755.json index 86b7783ae57..2785499f301 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4755.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4755.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4755", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-21T06:15:12.507", - "lastModified": "2024-06-24T19:31:03.263", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:08:01.477", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.4 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4757.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4757.json index f21883a769b..558f07e93aa 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4757.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4757.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4757", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-25T06:15:11.607", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:08:02.463", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Logo Manager For Enamad WordPress hasta la versi\u00f3n 0.7.0 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenados a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b54b55e0-b184-4c90-ba94-feda0997bf2a/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4758.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4758.json index 8f357c34b59..c515322fe74 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4758.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4758.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4758", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:16.133", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:08:02.707", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Muslim Prayer Time BD de WordPress hasta la versi\u00f3n 2.4 no tiene activada la verificaci\u00f3n CSRF al restablecer su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los restablezca mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/64ec57a5-35d8-4c69-bdba-096c2245a0db/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4759.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4759.json index 76955beeb82..1041d1c2cb5 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4759.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4759.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4759", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-25T06:15:11.727", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-03T02:08:02.923", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Mime Types Extended WordPress hasta la versi\u00f3n 0.11 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1c7547fa-539a-4890-a94d-c57b3d025507/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4761.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4761.json index ba0d215f03d..c3aff72da39 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4761.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4761.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4761", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-14T16:17:35.810", - "lastModified": "2024-06-10T18:15:36.997", + "lastModified": "2024-07-03T02:08:03.270", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-16", "cisaActionDue": "2024-06-06", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4764.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4764.json index 3f2c9831dd1..c55deedb2d7 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4764.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4764.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4764", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:12.820", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:08:04.193", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "M\u00faltiples subprocesos WebRTC podr\u00edan haber reclamado una entrada de audio reci\u00e9n conectada que condujera a un use-after-free. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879093", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4767.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4767.json index ff50819da7b..3f90d213083 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4767.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4767.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4767", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:13.683", - "lastModified": "2024-06-10T17:16:33.823", + "lastModified": "2024-07-03T02:08:05.290", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Si la preferencia `browser.privatebrowsing.autostart` est\u00e1 habilitada, los archivos IndexedDB no se eliminaron correctamente cuando se cerr\u00f3 la ventana. Esta preferencia est\u00e1 deshabilitada de forma predeterminada en Firefox. Esta vulnerabilidad afecta a Firefox < 126, Firefox ESR < 115.11 y Thunderbird < 115.11." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1878577", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4769.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4769.json index ee9cced2c49..13ec317cd87 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4769.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4769.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4769", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:14.297", - "lastModified": "2024-06-10T17:16:33.950", + "lastModified": "2024-07-03T02:08:05.617", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Al importar recursos utilizando Web Workers, los mensajes de error distinguir\u00edan la diferencia entre respuestas `aplicaci\u00f3n/javascript` y respuestas sin script. Se podr\u00eda haber abusado de esto para aprender informaci\u00f3n de origen cruzado. Esta vulnerabilidad afecta a Firefox < 126, Firefox ESR < 115.11 y Thunderbird < 115.11." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-351" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886108", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4771.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4771.json index c43faf84454..f7cf354257c 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4771.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4771.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4771", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:14.830", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:08:06.447", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Faltaba una verificaci\u00f3n de asignaci\u00f3n de memoria, lo que dar\u00eda lugar a un use-after-free si la asignaci\u00f3n fallaba. Esto podr\u00eda haber provocado una falla o potencialmente aprovecharse para lograr la ejecuci\u00f3n del c\u00f3digo. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1893891", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4775.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4775.json index 554d1f17e65..63e037de2cf 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4775.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4775.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4775", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:15.890", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:08:07.390", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Faltaba una condici\u00f3n de detenci\u00f3n del iterador al manejar el c\u00f3digo WASM en el generador de perfiles integrado, lo que podr\u00eda provocar un acceso no v\u00e1lido a la memoria y un comportamiento indefinido. *Nota:* Este problema solo afecta a la aplicaci\u00f3n cuando el generador de perfiles se est\u00e1 ejecutando. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-431" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887332", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4776.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4776.json index 2d0913ca5a5..5d86c823cb4 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4776.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4776.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4776", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:16.157", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:08:08.187", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un cuadro de di\u00e1logo de archivo mostrado en modo de pantalla completa podr\u00eda haber provocado que la ventana permaneciera deshabilitada. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887343", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json index 2e59460586d..9e162142664 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4778", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:16.720", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-07-03T02:08:09.053", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Errores de seguridad de la memoria presentes en Firefox 125. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de la memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1260" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4899.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4899.json index dd493425cde..6a4704bbd43 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4899.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4899.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4899", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-24T06:15:11.307", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-03T02:08:16.280", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento SEOPress WordPress anterior a 7.8 no sanitiza ni escapa a algunas de sus configuraciones de publicaci\u00f3n, lo que podr\u00eda permitir a usuarios con altos privilegios, como los contribuyentes, realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/15346ae9-9a29-4968-a6a9-81d1116ac448/", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json index 80b9bb4e1e9..79584070b31 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4947", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.273", - "lastModified": "2024-06-10T18:15:37.447", + "lastModified": "2024-07-03T02:08:19.620", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-20", "cisaActionDue": "2024-06-10", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json index 3fdd0e939fe..b3448690fc9 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4948", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.347", - "lastModified": "2024-06-10T18:15:37.577", + "lastModified": "2024-07-03T02:08:20.437", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en Dawn en Google Chrome anterior a 125.0.6422.60 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json index 227b9d4ed3f..adfb3726fe0 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4949", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.430", - "lastModified": "2024-06-10T18:15:37.743", + "lastModified": "2024-07-03T02:08:21.370", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en V8 en Google Chrome anterior a 125.0.6422.60 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json index c825c62ffa5..011fd1a6a82 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4950", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.493", - "lastModified": "2024-06-10T18:15:37.830", + "lastModified": "2024-07-03T02:08:22.150", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "La implementaci\u00f3n inapropiada en Descargas en Google Chrome anterior a 125.0.6422.60 permiti\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos espec\u00edficos de la interfaz de usuario para realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4957.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4957.json index 4ca215e5d95..a45f6bb8f0e 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4957.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4957.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4957", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:16.237", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:08:22.473", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Frontend Checklist de WordPress hasta la versi\u00f3n 2.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0a560ed4-7dec-4274-b4a4-39dea0c0d67e/", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4959.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4959.json index 1acc01cddf3..1c6ad7d89d3 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4959.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4959.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4959", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:16.347", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:08:22.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Frontend Checklist de WordPress hasta la versi\u00f3n 2.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/449e4da8-beae-4ff6-9ddc-0e17781c0391/", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4988.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4988.json index 888ec66e698..d7490ee16dc 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4988.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4988.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4988", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2024-05-21T10:15:11.240", - "lastModified": "2024-05-21T12:37:59.687", + "lastModified": "2024-07-03T02:08:24.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " La interfaz de la aplicaci\u00f3n m\u00f3vil (com.transsion.videocallenhancer) tiene un control de permisos inadecuado, lo que puede generar riesgo de filtraci\u00f3n de archivos privados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://security.tecno.com/SRC/blogdetail/250?lang=en_US", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5091.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5091.json index a60445636ff..b3218b809cf 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5091.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5091.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5091", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-08T07:15:08.280", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-07-03T02:08:29.633", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3098599/skt-addons-for-elementor", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5155.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5155.json index de91b5ce0bb..0e3df73b9b3 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5155.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5155.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5155", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:13.373", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:08:34.117", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Inquiry cart de WordPress hasta la versi\u00f3n 3.4.2 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenados a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/f1e90a8a-d959-4316-a5d4-e183854944bd/", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json index 4702f2e7052..7570b47873b 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5157", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-22T16:15:10.863", - "lastModified": "2024-06-10T18:15:37.893", + "lastModified": "2024-07-03T02:08:34.407", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json index 0cd06de1688..e66a6a3432f 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5158", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-22T16:15:10.947", - "lastModified": "2024-06-10T18:15:37.953", + "lastModified": "2024-07-03T02:08:35.143", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Type Confusion en V8 en Google Chrome anterior a 125.0.6422.76 permit\u00eda a un atacante remoto realizar potencialmente lectura/escritura arbitraria a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json index ea04795d824..327a36da52d 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5159", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-22T16:15:11.013", - "lastModified": "2024-06-10T18:15:38.010", + "lastModified": "2024-07-03T02:08:35.967", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en ANGLE en Google Chrome anterior a 125.0.6422.76 permit\u00eda a un atacante remoto realizar una lectura de memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json index 96203eb91d4..8ec5e0eddd1 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5160", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-22T16:15:11.087", - "lastModified": "2024-06-10T18:15:38.067", + "lastModified": "2024-07-03T02:08:36.807", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en Dawn en Google Chrome anterior a 125.0.6422.76 permit\u00eda a un atacante remoto realizar una escritura en memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5163.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5163.json index 13502a76b71..1b73022d684 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5163.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5163.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5163", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2024-06-17T03:15:09.057", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-07-03T02:08:37.670", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La configuraci\u00f3n incorrecta de permisos para aplicaciones m\u00f3viles (com.transsion.carlcare) puede provocar riesgos de seguridad de la cuenta y la contrase\u00f1a del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], "references": [ { "url": "https://security.tecno.com/SRC/blogdetail/267?lang=en_US", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5172.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5172.json index 9294c1e4269..76470a3657e 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5172.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5172.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5172", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-18T06:15:12.440", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-07-03T02:08:38.770", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento Expert Invoice de WordPress hasta la versi\u00f3n 1.0.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/65d84e69-0548-4c7d-bcde-5777d72da555/", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json index 4754053fa6a..00398b6ed57 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5229", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-25T03:15:08.377", - "lastModified": "2024-05-28T12:39:42.673", + "lastModified": "2024-07-03T02:08:42.827", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/primary-addon-for-elementor/trunk/elementor/widgets/basic/nabasic-pricing-table.php#L775", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5246.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5246.json index 21c2d57697e..6add66d3a18 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5246.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5246.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5246", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-23T22:15:14.200", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-07-03T02:08:44.767", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json index 4ba579bd2d2..4cd5c0a8ed6 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5274", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-28T15:15:10.443", - "lastModified": "2024-06-10T17:16:34.257", + "lastModified": "2024-07-03T02:08:46.527", "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-05-28", "cisaActionDue": "2024-06-18", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5447.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5447.json index 7fbcdf77d8a..5e57889e974 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5447.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5447.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5447", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-21T06:15:12.757", - "lastModified": "2024-06-24T19:27:17.300", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:08:56.630", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5448.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5448.json index c2364bf0746..63e01b78a01 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5448.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5448.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5448", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-21T06:15:12.837", - "lastModified": "2024-06-24T19:26:43.517", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:08:56.850", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5473.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5473.json index 86df7a6954f..fac57f04147 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5473.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5473.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5473", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-26T06:15:17.197", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-03T02:08:57.860", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Simple Photoswipe de WordPress hasta la versi\u00f3n 0.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9c70cfc4-5759-469a-a6a3-510c405bd28a/", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5475.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5475.json index 9eb4ee78ccb..3b9759c95aa 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5475.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5475.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5475", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-20T06:15:10.077", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:08:58.050", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Responsive video embed de WordPress anterior a 0.5.1 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde se incrusta el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/cee66543-b5d6-4205-8f9b-0febd7fee445/", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json index 573dccadfc2..532d7670a7e 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5493", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.283", - "lastModified": "2024-06-10T17:16:34.603", + "lastModified": "2024-07-03T02:08:58.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El desbordamiento del b\u00fafer del mont\u00f3n en WebRTC en Google Chrome anterior a 125.0.6422.141 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json index e3816a00349..0ca6d8bc6bd 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5494", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.367", - "lastModified": "2024-06-10T17:16:34.680", + "lastModified": "2024-07-03T02:08:59.420", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en Dawn en Google Chrome anterior a 125.0.6422.141 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json index a27a46e5bd8..b6df92db6c9 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5496", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.497", - "lastModified": "2024-06-10T17:16:34.800", + "lastModified": "2024-07-03T02:09:00.193", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Use after free en Media Session en Google Chrome anterior a 125.0.6422.141 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de una sandbox a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json index a00234e2212..0e4be7ca57f 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5497", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.560", - "lastModified": "2024-06-10T17:16:34.907", + "lastModified": "2024-07-03T02:09:01.003", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El acceso a la memoria fuera de los l\u00edmites en las entradas de teclado en Google Chrome anteriores a 125.0.6422.141 permiti\u00f3 a un atacante remoto que convenci\u00f3 a un usuario para realizar gestos de interfaz de usuario espec\u00edficos para explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json index ff14b1d19f3..c0e29c6682c 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5499", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.697", - "lastModified": "2024-06-10T17:16:35.033", + "lastModified": "2024-07-03T02:09:01.860", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La escritura fuera de los l\u00edmites en Streams API en Google Chrome anterior a 125.0.6422.141 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de una sandbox a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5522.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5522.json index 866044d80bd..1c29cd460be 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5522.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5522.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5522", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-20T06:15:10.197", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-07-03T02:09:03.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento HTML5 Video Player de WordPress anterior a 2.5.27 no sanitiza ni escapa un par\u00e1metro de una ruta REST antes de usarlo en una declaraci\u00f3n SQL, lo que permite a usuarios no autenticados realizar ataques de inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json index 622e3e727cb..79556346b61 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5535", "sourceIdentifier": "openssl-security@openssl.org", "published": "2024-06-27T11:15:24.447", - "lastModified": "2024-06-28T19:15:07.060", + "lastModified": "2024-07-03T02:09:04.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Resumen del problema: llamar a la funci\u00f3n API de OpenSSL SSL_select_next_proto con un b\u00fafer de protocolos de cliente compatible vac\u00edo puede provocar una falla o que se env\u00ede contenido de la memoria al igual. Resumen de impacto: una lectura excesiva del b\u00fafer puede tener una variedad de consecuencias potenciales, como un comportamiento inesperado de la aplicaci\u00f3n o un bloqueo. En particular, este problema podr\u00eda provocar que se env\u00eden hasta 255 bytes de datos privados arbitrarios de la memoria al par, lo que provocar\u00eda una p\u00e9rdida de confidencialidad. Sin embargo, este problema solo afecta a las aplicaciones que llaman directamente a la funci\u00f3n SSL_select_next_proto con una lista de longitud 0 de protocolos de cliente compatibles. Normalmente, esto nunca ser\u00eda un escenario v\u00e1lido y normalmente no est\u00e1 bajo el control de un atacante, pero puede ocurrir por accidente en el caso de un error de configuraci\u00f3n o programaci\u00f3n en la aplicaci\u00f3n que realiza la llamada. La funci\u00f3n API de OpenSSL SSL_select_next_proto suele ser utilizada por aplicaciones TLS que admiten ALPN (negociaci\u00f3n de protocolo de capa de aplicaci\u00f3n) o NPN (negociaci\u00f3n de siguiente protocolo). NPN es m\u00e1s antiguo, nunca se estandariz\u00f3 y est\u00e1 en desuso en favor de ALPN. Creemos que ALPN est\u00e1 mucho m\u00e1s implementado que NPN. La funci\u00f3n SSL_select_next_proto acepta una lista de protocolos del servidor y una lista de protocolos del cliente y devuelve el primer protocolo que aparece en la lista de servidores que tambi\u00e9n aparece en la lista de clientes. En caso de que no haya superposici\u00f3n entre las dos listas, devuelve el primer elemento de la lista de clientes. En cualquier caso, indicar\u00e1 si se encontr\u00f3 una superposici\u00f3n entre las dos listas. En el caso de que se llame a SSL_select_next_proto con una lista de clientes de longitud cero, no detecta esta condici\u00f3n y devuelve la memoria inmediatamente despu\u00e9s del puntero de la lista de clientes (e informa que no hubo superposici\u00f3n en las listas). Esta funci\u00f3n normalmente se llama desde una devoluci\u00f3n de llamada de la aplicaci\u00f3n del lado del servidor para ALPN o una devoluci\u00f3n de llamada de la aplicaci\u00f3n del lado del cliente para NPN. En el caso de ALPN, libssl garantiza que la lista de protocolos proporcionados por el cliente nunca tendr\u00e1 una longitud cero. La lista de protocolos del servidor proviene de la aplicaci\u00f3n y normalmente nunca se debe esperar que tenga una longitud cero. En este caso, si la funci\u00f3n SSL_select_next_proto se llam\u00f3 como se esperaba (con la lista proporcionada por el cliente pasada en los par\u00e1metros client/client_len), entonces la aplicaci\u00f3n no ser\u00e1 vulnerable a este problema. Si la aplicaci\u00f3n se configur\u00f3 accidentalmente con una lista de servidores de longitud cero y accidentalmente pas\u00f3 esa lista de servidores de longitud cero en los par\u00e1metros client/client_len y adem\u00e1s no pudo manejar correctamente una respuesta \"sin superposici\u00f3n\" (que normalmente dar\u00eda como resultado una falla en el protocolo de enlace en ALPN) entonces ser\u00e1 vulnerable a este problema. En el caso de NPN, el protocolo permite al cliente seleccionar de manera oportunista un protocolo cuando no hay superposici\u00f3n. OpenSSL devuelve el primer protocolo de cliente en el caso de que no haya superposici\u00f3n para respaldar esto. La lista de protocolos de cliente proviene de la aplicaci\u00f3n y normalmente nunca se debe esperar que tenga una longitud cero. Sin embargo, si la funci\u00f3n SSL_select_next_proto se llama accidentalmente con un client_len de 0, se devolver\u00e1 un puntero de memoria no v\u00e1lido. Si la aplicaci\u00f3n utiliza esta salida como protocolo oportunista, se producir\u00e1 la p\u00e9rdida de confidencialidad. Este problema se ha evaluado como de gravedad baja porque es m\u00e1s probable que las aplicaciones sean vulnerables si utilizan NPN en lugar de ALPN, pero NPN no se utiliza ampliamente. Tambi\u00e9n requiere una configuraci\u00f3n de la aplicaci\u00f3n o un error de programaci\u00f3n.-- truncada---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "openssl-security@openssl.org", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5565.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5565.json index 9ab8989270a..ee5b19a6beb 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5565.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5565.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5565", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-05-31T15:15:09.673", - "lastModified": "2024-05-31T19:14:47.793", + "lastModified": "2024-07-03T02:09:05.567", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5687.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5687.json index 4a73e2cddd8..e04d2e06cc7 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5687.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5687.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5687", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.260", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-07-03T02:09:09.507", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Si se realiza una secuencia espec\u00edfica de acciones al abrir una nueva pesta\u00f1a, es posible que el principal desencadenante asociado con la nueva pesta\u00f1a haya sido incorrecto. El principal de activaci\u00f3n se utiliza para calcular muchos valores, incluidos los encabezados `Referer` y `Sec-*`, lo que significa que existe la posibilidad de que se realicen controles de seguridad incorrectos dentro del navegador, adem\u00e1s de informaci\u00f3n incorrecta o enga\u00f1osa enviada a sitios web remotos. *Este error s\u00f3lo afecta a Firefox para Android. Otras versiones de Firefox no se ven afectadas.* Esta vulnerabilidad afecta a Firefox < 127." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1889066", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json index 11078cde19f..27fd67bc8af 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5688", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.347", - "lastModified": "2024-06-19T10:15:11.017", + "lastModified": "2024-07-03T02:09:10.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Si se activ\u00f3 una recolecci\u00f3n de basura en el momento adecuado, podr\u00eda haberse producido un use-after-free durante el trasplante de objetos. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895086", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json index 41181c866cb..fc08f3bed78 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5693", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.850", - "lastModified": "2024-06-19T10:15:11.360", + "lastModified": "2024-07-03T02:09:11.353", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Offscreen Canvas no realiz\u00f3 un seguimiento adecuado de la contaminaci\u00f3n de origen cruzado, que podr\u00eda usarse para acceder a datos de im\u00e1genes de otro sitio en violaci\u00f3n de la pol\u00edtica del mismo origen. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891319", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json index 24376dc4ec1..08fadbb4dd3 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5700", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.417", - "lastModified": "2024-06-19T10:15:11.510", + "lastModified": "2024-07-03T02:09:12.470", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,46 @@ "value": "Errores de seguridad de la memoria presentes en Firefox 126, Firefox ESR 115.11 y Thunderbird 115.11. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-786" + }, + { + "lang": "en", + "value": "CWE-788" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json index a8339a2ca37..6f11543c679 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json @@ -2,16 +2,55 @@ "id": "CVE-2024-5727", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-28T06:15:06.673", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:09:13.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Widget4Call WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Widget4Call de WordPress hasta la versi\u00f3n 1.0.7 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/5f677863-2f4f-474f-ba48-f490f9d6e71c/", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json index 03c5bd9d18d..79126bba484 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json @@ -2,16 +2,43 @@ "id": "CVE-2024-5730", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-28T06:15:06.867", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-03T02:09:14.303", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Pagerank tools WordPress plugin through 1.1.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Pagerank tools de WordPress hasta la versi\u00f3n 1.1.5 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/17482b2c-c9ba-480a-8000-879baf835af7/", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5830.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5830.json index 7cccd3f8c9d..f945f170935 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5830.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5830.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5830", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.203", - "lastModified": "2024-06-20T16:06:51.777", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:17.023", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5831.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5831.json index 1743ddb645b..3971cd97616 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5831.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5831.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5831", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.277", - "lastModified": "2024-06-20T16:07:02.127", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:17.847", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5832.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5832.json index b86ea071138..0e361ed687a 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5832.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5832.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5832", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.350", - "lastModified": "2024-06-20T15:09:08.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:18.747", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5833.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5833.json index ace2ed1b67a..c22de2d9160 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5833.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5833.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5833", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.430", - "lastModified": "2024-06-20T15:09:20.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:19.737", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5834.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5834.json index 820af24f44f..ff67bead4b6 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5834.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5834.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5834", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.513", - "lastModified": "2024-06-20T15:07:28.820", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:20.643", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5835.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5835.json index 6f7793875f7..375d67bbca1 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5835.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5835.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5835", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.583", - "lastModified": "2024-06-20T15:08:20.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:21.673", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5837.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5837.json index f723a37f930..dc241e84192 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5837.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5837.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5837", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.723", - "lastModified": "2024-06-20T15:04:00.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:22.720", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5838.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5838.json index c0001d5fac3..64cb928fb61 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5838.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5838.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5838", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.790", - "lastModified": "2024-06-20T15:04:22.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:23.820", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5839.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5839.json index 2fa264b0908..0ec6a7d97b7 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5839.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5839.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5839", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.860", - "lastModified": "2024-06-20T15:06:42.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:24.927", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-474" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5841.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5841.json index 282813451b8..90ee6ad2dfd 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5841.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5841.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5841", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.003", - "lastModified": "2024-06-20T14:55:42.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:26.067", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5842.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5842.json index 15ce4626a44..696d0b6f749 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5842.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5842.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5842", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.080", - "lastModified": "2024-06-20T14:55:51.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:27.080", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5843.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5843.json index 136effe042c..8fdd681b7a9 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5843.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5843.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5843", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.150", - "lastModified": "2024-06-20T13:22:50.317", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:28.160", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5844.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5844.json index 77ca2b12a28..5d07fef5752 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5844.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5844.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5844", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.227", - "lastModified": "2024-06-20T13:23:18.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:29.187", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5845.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5845.json index 96f1c5a2a87..e43b6b4b827 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5845.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5845.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5845", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.317", - "lastModified": "2024-06-20T13:24:38.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:29.493", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5846.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5846.json index d10db69cf55..c980cf34f04 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5846.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5846.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5846", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.397", - "lastModified": "2024-06-20T13:05:14.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:30.583", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5847.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5847.json index 7d274f94d23..328cf9d4877 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5847.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5847.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5847", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:55.500", - "lastModified": "2024-06-20T13:05:43.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-03T02:09:31.730", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json index de002ab297b..fff3b5a5bbd 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6100", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-20T00:15:09.810", - "lastModified": "2024-06-21T13:15:13.077", + "lastModified": "2024-07-03T02:09:40.497", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -58,6 +79,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json index 18692efe41f..1be0208dae9 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6101", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-20T00:15:09.967", - "lastModified": "2024-06-21T13:15:13.187", + "lastModified": "2024-07-03T02:09:41.493", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json index 65f963b441a..354d1fc616d 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6102", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-20T00:15:10.053", - "lastModified": "2024-06-21T13:15:13.277", + "lastModified": "2024-07-03T02:09:42.810", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -48,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json index c0506b57b78..628cacbe833 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6103", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-20T00:15:10.133", - "lastModified": "2024-06-21T13:15:13.350", + "lastModified": "2024-07-03T02:09:43.923", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json index 7979b89578c..7dddd5b37bb 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6290", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.460", - "lastModified": "2024-06-27T03:15:51.093", + "lastModified": "2024-07-03T02:09:49.960", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": " Use after free en Dawn en Google Chrome anterior a 126.0.6478.126 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -25,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json index a3e4bc4ad0f..7ed6a91880b 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6291", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.577", - "lastModified": "2024-06-27T03:15:51.167", + "lastModified": "2024-07-03T02:09:50.740", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Use after free en Swiftshader en Google Chrome anterior a 126.0.6478.126 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -25,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json index 725349eda98..596d77bd31d 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6292", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.660", - "lastModified": "2024-06-27T03:15:51.230", + "lastModified": "2024-07-03T02:09:51.530", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": " Use after free en Dawn en Google Chrome anterior a 126.0.6478.126 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -25,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json index d8ad1cc1336..eb1a3ba05d9 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6293", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.740", - "lastModified": "2024-06-27T03:15:51.293", + "lastModified": "2024-07-03T02:09:52.323", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Use after free en Dawn en Google Chrome anterior a 126.0.6478.126 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -25,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json index d3748dd7720..646a04a9f54 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6354", "sourceIdentifier": "security@devolutions.net", "published": "2024-06-26T17:15:27.497", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-03T02:09:53.917", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1262" + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0010", diff --git a/README.md b/README.md index b9b64d9be7d..8a17ea99836 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-03T02:00:33.205262+00:00 +2024-07-03T04:01:59.096372+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-03T02:00:08.547000+00:00 +2024-07-03T02:15:10.297000+00:00 ``` ### Last Data Feed Release @@ -33,44 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255786 +255787 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +- [CVE-2024-32673](CVE-2024/CVE-2024-326xx/CVE-2024-32673.json) (`2024-07-03T02:15:10.297`) ### CVEs modified in the last Commit -Recently modified CVEs: `1203` +Recently modified CVEs: `465` -- [CVE-2024-34222](CVE-2024/CVE-2024-342xx/CVE-2024-34222.json) (`2024-07-03T01:59:42.050`) -- [CVE-2024-34225](CVE-2024/CVE-2024-342xx/CVE-2024-34225.json) (`2024-07-03T01:59:42.910`) -- [CVE-2024-34241](CVE-2024/CVE-2024-342xx/CVE-2024-34241.json) (`2024-07-03T01:59:43.687`) -- [CVE-2024-34244](CVE-2024/CVE-2024-342xx/CVE-2024-34244.json) (`2024-07-03T01:59:44.530`) -- [CVE-2024-34246](CVE-2024/CVE-2024-342xx/CVE-2024-34246.json) (`2024-07-03T01:59:45.300`) -- [CVE-2024-34249](CVE-2024/CVE-2024-342xx/CVE-2024-34249.json) (`2024-07-03T01:59:46.180`) -- [CVE-2024-34250](CVE-2024/CVE-2024-342xx/CVE-2024-34250.json) (`2024-07-03T01:59:47.113`) -- [CVE-2024-34251](CVE-2024/CVE-2024-342xx/CVE-2024-34251.json) (`2024-07-03T01:59:48.090`) -- [CVE-2024-34255](CVE-2024/CVE-2024-342xx/CVE-2024-34255.json) (`2024-07-03T01:59:48.913`) -- [CVE-2024-34256](CVE-2024/CVE-2024-342xx/CVE-2024-34256.json) (`2024-07-03T01:59:49.690`) -- [CVE-2024-34274](CVE-2024/CVE-2024-342xx/CVE-2024-34274.json) (`2024-07-03T01:59:50.460`) -- [CVE-2024-34308](CVE-2024/CVE-2024-343xx/CVE-2024-34308.json) (`2024-07-03T01:59:51.267`) -- [CVE-2024-34313](CVE-2024/CVE-2024-343xx/CVE-2024-34313.json) (`2024-07-03T01:59:52.040`) -- [CVE-2024-34315](CVE-2024/CVE-2024-343xx/CVE-2024-34315.json) (`2024-07-03T01:59:52.883`) -- [CVE-2024-34332](CVE-2024/CVE-2024-343xx/CVE-2024-34332.json) (`2024-07-03T01:59:53.650`) -- [CVE-2024-34338](CVE-2024/CVE-2024-343xx/CVE-2024-34338.json) (`2024-07-03T01:59:54.407`) -- [CVE-2024-34402](CVE-2024/CVE-2024-344xx/CVE-2024-34402.json) (`2024-07-03T01:59:58.723`) -- [CVE-2024-34403](CVE-2024/CVE-2024-344xx/CVE-2024-34403.json) (`2024-07-03T01:59:59.493`) -- [CVE-2024-34405](CVE-2024/CVE-2024-344xx/CVE-2024-34405.json) (`2024-07-03T02:00:00.383`) -- [CVE-2024-34408](CVE-2024/CVE-2024-344xx/CVE-2024-34408.json) (`2024-07-03T02:00:01.550`) -- [CVE-2024-34453](CVE-2024/CVE-2024-344xx/CVE-2024-34453.json) (`2024-07-03T02:00:06.540`) -- [CVE-2024-34454](CVE-2024/CVE-2024-344xx/CVE-2024-34454.json) (`2024-07-03T02:00:07.617`) -- [CVE-2024-34455](CVE-2024/CVE-2024-344xx/CVE-2024-34455.json) (`2024-07-03T02:00:08.547`) -- [CVE-2024-4467](CVE-2024/CVE-2024-44xx/CVE-2024-4467.json) (`2024-07-03T00:15:02.313`) -- [CVE-2024-5037](CVE-2024/CVE-2024-50xx/CVE-2024-5037.json) (`2024-07-03T00:15:02.640`) +- [CVE-2024-5830](CVE-2024/CVE-2024-58xx/CVE-2024-5830.json) (`2024-07-03T02:09:17.023`) +- [CVE-2024-5831](CVE-2024/CVE-2024-58xx/CVE-2024-5831.json) (`2024-07-03T02:09:17.847`) +- [CVE-2024-5832](CVE-2024/CVE-2024-58xx/CVE-2024-5832.json) (`2024-07-03T02:09:18.747`) +- [CVE-2024-5833](CVE-2024/CVE-2024-58xx/CVE-2024-5833.json) (`2024-07-03T02:09:19.737`) +- [CVE-2024-5834](CVE-2024/CVE-2024-58xx/CVE-2024-5834.json) (`2024-07-03T02:09:20.643`) +- [CVE-2024-5835](CVE-2024/CVE-2024-58xx/CVE-2024-5835.json) (`2024-07-03T02:09:21.673`) +- [CVE-2024-5837](CVE-2024/CVE-2024-58xx/CVE-2024-5837.json) (`2024-07-03T02:09:22.720`) +- [CVE-2024-5838](CVE-2024/CVE-2024-58xx/CVE-2024-5838.json) (`2024-07-03T02:09:23.820`) +- [CVE-2024-5839](CVE-2024/CVE-2024-58xx/CVE-2024-5839.json) (`2024-07-03T02:09:24.927`) +- [CVE-2024-5841](CVE-2024/CVE-2024-58xx/CVE-2024-5841.json) (`2024-07-03T02:09:26.067`) +- [CVE-2024-5842](CVE-2024/CVE-2024-58xx/CVE-2024-5842.json) (`2024-07-03T02:09:27.080`) +- [CVE-2024-5843](CVE-2024/CVE-2024-58xx/CVE-2024-5843.json) (`2024-07-03T02:09:28.160`) +- [CVE-2024-5844](CVE-2024/CVE-2024-58xx/CVE-2024-5844.json) (`2024-07-03T02:09:29.187`) +- [CVE-2024-5845](CVE-2024/CVE-2024-58xx/CVE-2024-5845.json) (`2024-07-03T02:09:29.493`) +- [CVE-2024-5846](CVE-2024/CVE-2024-58xx/CVE-2024-5846.json) (`2024-07-03T02:09:30.583`) +- [CVE-2024-5847](CVE-2024/CVE-2024-58xx/CVE-2024-5847.json) (`2024-07-03T02:09:31.730`) +- [CVE-2024-6100](CVE-2024/CVE-2024-61xx/CVE-2024-6100.json) (`2024-07-03T02:09:40.497`) +- [CVE-2024-6101](CVE-2024/CVE-2024-61xx/CVE-2024-6101.json) (`2024-07-03T02:09:41.493`) +- [CVE-2024-6102](CVE-2024/CVE-2024-61xx/CVE-2024-6102.json) (`2024-07-03T02:09:42.810`) +- [CVE-2024-6103](CVE-2024/CVE-2024-61xx/CVE-2024-6103.json) (`2024-07-03T02:09:43.923`) +- [CVE-2024-6290](CVE-2024/CVE-2024-62xx/CVE-2024-6290.json) (`2024-07-03T02:09:49.960`) +- [CVE-2024-6291](CVE-2024/CVE-2024-62xx/CVE-2024-6291.json) (`2024-07-03T02:09:50.740`) +- [CVE-2024-6292](CVE-2024/CVE-2024-62xx/CVE-2024-6292.json) (`2024-07-03T02:09:51.530`) +- [CVE-2024-6293](CVE-2024/CVE-2024-62xx/CVE-2024-6293.json) (`2024-07-03T02:09:52.323`) +- [CVE-2024-6354](CVE-2024/CVE-2024-63xx/CVE-2024-6354.json) (`2024-07-03T02:09:53.917`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 318715a819e..98e53409733 100644 --- a/_state.csv +++ b/_state.csv @@ -26369,7 +26369,7 @@ CVE-2007-3480,0,0,7de4dd0ab5b49b85376510832cb6f3f7fb3b1d5cb517bcf28856b37796278a CVE-2007-3481,0,0,c80c85415ffef6b56314ef8e2db3b395adee7f1cb304a926ff45d43670a579e8,2024-05-17T00:34:41.360000 CVE-2007-3482,0,0,4d1cabba4b551e13aaf116de8ce2c839b101aefd06dbb5d930ec2f0f9bd84a9c,2008-11-15T05:00:00 CVE-2007-3483,0,0,269cf38e43d4edcda238622991fd070bc9b10aed77677953afd93d31666fdbe2,2017-07-29T01:32:18.817000 -CVE-2007-3484,0,1,ad247a745bd846453399507d7b4856d2ddcc0068b545c942d97258115ef6c70f,2024-07-03T01:35:02.900000 +CVE-2007-3484,0,0,ad247a745bd846453399507d7b4856d2ddcc0068b545c942d97258115ef6c70f,2024-07-03T01:35:02.900000 CVE-2007-3485,0,0,9643d6dff6d3148371915c1d070c10f7c00b446e185fe58fbbc00cb77c86fd64,2008-11-15T06:52:49.610000 CVE-2007-3486,0,0,0d622fe49e34156223b725d17f06092ba97e23f8a5173fe534bb90fbf462792a,2008-11-15T06:52:49.797000 CVE-2007-3487,0,0,a7c56715d853c5247766965a3dc12d11ab682568978c0f5f8a4e39d731e431e0,2018-10-16T16:50:08.913000 @@ -46762,18 +46762,18 @@ CVE-2010-5149,0,0,f4074c5914c3257c79085b187120879be27c7d7684e2e1c70bf52a9bf8aaff CVE-2010-5150,0,0,818455badcb568bdab14c19861431ceb4fcb83daec5e8cdf49c7d1f613a835aa,2024-05-17T00:48:26.437000 CVE-2010-5151,0,0,c42cf532b187d91dda673a5b831a9a5312653f42f397715b3fce85bfa66cadd2,2024-05-17T00:48:26.587000 CVE-2010-5152,0,0,f519d7cd997fadea4110907fc3d39e18f10c27981fbd443564d43704782cc77f,2024-05-17T00:48:26.693000 -CVE-2010-5153,0,1,78b8c8fb92ffd4de600d0d29c1d02644fc5d85e41cd4fe98e0ae92de1904dab0,2024-07-03T01:35:04.330000 +CVE-2010-5153,0,0,78b8c8fb92ffd4de600d0d29c1d02644fc5d85e41cd4fe98e0ae92de1904dab0,2024-07-03T01:35:04.330000 CVE-2010-5154,0,0,b8325868ef8f261b72b2e55a26508ed1e50e459e77350d91bf14160581023d1f,2024-05-17T00:48:26.887000 CVE-2010-5155,0,0,61b700c331884d286f5ff865450f4f584346f5db4c8dc72c8cb8b39e4f4f98dd,2024-05-17T00:48:26.973000 CVE-2010-5156,0,0,ebffc9ffa145e5a9e51e16a52ff81c248fb098bb27aaaa5660991f7f59191d7b,2024-05-17T00:48:27.073000 CVE-2010-5157,0,0,1366eb99763dc3ec620120d88a4a5975fa2a438385600e09d0a199c400a8ff24,2012-08-27T04:00:00 CVE-2010-5158,0,0,0dcb5e2114962d5bcd92b44ceac9701326c6d2a159c2065bb46518674a80c185,2024-05-17T00:48:27.213000 CVE-2010-5159,0,0,bb372e4c138b5da60c1a4898d8e0834aac29ea34023c6c3ddb835b6632f8f737,2024-05-17T00:48:27.300000 -CVE-2010-5160,0,1,da5f1a66736e9b0566def6da157c3a1769a235d72bf15b0cd721e5e5d52b478d,2024-07-03T01:35:06.877000 +CVE-2010-5160,0,0,da5f1a66736e9b0566def6da157c3a1769a235d72bf15b0cd721e5e5d52b478d,2024-07-03T01:35:06.877000 CVE-2010-5161,0,0,5e676bcb13690cf82b0066901173c095c26494cacfc3e12c3e78530ffd8c1e29,2024-05-17T00:48:27.480000 CVE-2010-5162,0,0,e602e1f9d296ef3d6bfc4cbc52215bb0971b4ddf94b63a9277bfb7dc9a1bcc67,2024-05-17T00:48:27.573000 CVE-2010-5163,0,0,d799de5d48def4143473b920eb8544d7816bf68957c7fc7e79f426a54703bcc7,2024-05-17T00:48:27.660000 -CVE-2010-5164,0,1,5d405ae9f591d4b08de8edc9c6c7c663c94b6534988b6dfebabee1c010821445,2024-07-03T01:35:07.733000 +CVE-2010-5164,0,0,5d405ae9f591d4b08de8edc9c6c7c663c94b6534988b6dfebabee1c010821445,2024-07-03T01:35:07.733000 CVE-2010-5165,0,0,0464131efc6668ec8de460c7ed04262434b67511ed694a332460e02be2fc19fb,2024-05-17T00:48:27.833000 CVE-2010-5166,0,0,bc3cd3e9eb5fcae91c79ef490a13057adc3e68fb53d29806e1b032da2bd8086a,2024-05-17T00:48:27.927000 CVE-2010-5167,0,0,5d91c79d5bd7376e93ae2fae4f6c5832307f85c588861697519715bb62171775,2024-05-17T00:48:28.013000 @@ -46784,7 +46784,7 @@ CVE-2010-5171,0,0,36786707f9ff5af00d142a757c7bc424b134ac6c9ffb4fa67864a553caa626 CVE-2010-5172,0,0,e46aba6f0d585dc896ffa64403d93a92db2a44cf5347661cbacd29a9f06c4273,2024-05-17T00:48:28.537000 CVE-2010-5173,0,0,3edbe2c96792a8f4fe465dd4f7a6d2627d8bffcc549a12ad6fcab8c35cd8fbed,2024-05-17T00:48:28.623000 CVE-2010-5174,0,0,9357e1484c1ff64e7068e4f94bb688f80338100e5e10efce55db7a520c684497,2024-05-17T00:48:28.713000 -CVE-2010-5175,0,1,2b9bf9c38d2285eff498426bfab6dae1e01c98f76efed89c218d7719f28e733b,2024-07-03T01:35:08.560000 +CVE-2010-5175,0,0,2b9bf9c38d2285eff498426bfab6dae1e01c98f76efed89c218d7719f28e733b,2024-07-03T01:35:08.560000 CVE-2010-5176,0,0,b8a468773bb50e60f60a03b20ac651f1a627acdaaec4382f2577467b1799dc53,2024-05-17T00:48:28.887000 CVE-2010-5177,0,0,97b0d687f43e481278fe65e276a02eb27d4698add271f46ad62927a5aa584a98,2024-05-17T00:48:28.970000 CVE-2010-5178,0,0,1d2c75e74f0933d9687f9749b3e8bee309d7655d25f45e43d78584745780dbcd,2024-05-17T00:48:29.073000 @@ -47501,7 +47501,7 @@ CVE-2011-0607,0,0,34dae17e937ee80370facfa36e3fd70c92a5a0fee51b087a28002da2992a5a CVE-2011-0608,0,0,8934fb8e569fb4c1f54cc32e56890b5cf9ed6d756fa77ded0f58527d19aff8ee,2018-10-30T16:26:24.687000 CVE-2011-0609,0,0,d26d4363f8c440ef4d7a84dacf00d8b961324f342cff92f01dd5d12371f4ba24,2024-06-28T14:20:56.560000 CVE-2011-0610,0,0,c467e8a59910e980aa6ce8828f3680bbc6417e12d6d1f4fb713d5d3d04a72c79,2017-09-19T01:32:07.817000 -CVE-2011-0611,0,1,46a90db973edaf687a6e15dfeaf375885621c958cff47f3dd33091b8fca97089,2024-07-03T01:35:09.403000 +CVE-2011-0611,0,0,46a90db973edaf687a6e15dfeaf375885621c958cff47f3dd33091b8fca97089,2024-07-03T01:35:09.403000 CVE-2011-0612,0,0,a63028b54ff15e3d1fd0e40392f1af950157f3cc76c979998036409a8967027c,2011-05-25T04:00:00 CVE-2011-0613,0,0,e74a45acedabec4e51238cbb33dc9af72df658accd484240584b61bc1e8f7226,2011-05-25T04:00:00 CVE-2011-0614,0,0,7662bc34cf9a9d73243e2b3f35e8fbfcf6c62b9dcbfe3d1a2f76f2ce9a50c90a,2011-09-22T03:28:33.693000 @@ -47618,7 +47618,7 @@ CVE-2011-0733,0,0,af25a917692871ade89631350a24fd65fa3b5b7d14b81d8cef1b9817120ada CVE-2011-0734,0,0,d8ea9b66108383b6b046e07bd891a594df875da3c1534cce2f97d7055a611d3c,2011-11-08T04:18:45.373000 CVE-2011-0735,0,0,356056c565423ea16216106c55034c4d12f9cecb7688c47a038c79a811bd49c9,2011-11-08T04:18:45.577000 CVE-2011-0736,0,0,245a12476cdfd3cc5452edfcb421eef4c13bdf56ffd672d534612237d54e1b86,2024-05-17T00:48:56.413000 -CVE-2011-0737,0,1,fa966c759aba14742526c78142d59cbc1c20c5de307346d96540930fa2cc2b1a,2024-07-03T01:35:10.423000 +CVE-2011-0737,0,0,fa966c759aba14742526c78142d59cbc1c20c5de307346d96540930fa2cc2b1a,2024-07-03T01:35:10.423000 CVE-2011-0738,0,0,64de30e62cd3d3e3e6892a8d017d6460a1fd361ba89742e36b22d657be388d66,2017-08-17T01:33:42.837000 CVE-2011-0739,0,0,276c7ff05f5a086b51c8641bd120f0fe2c0508ec7c33ef6a14a39e6d4c8d04fd,2017-08-17T01:33:42.900000 CVE-2011-0740,0,0,9f24a5947a2102f4196116192daa28cde5104fa873e28b89bc3afb84ce0bae25,2017-08-17T01:33:42.963000 @@ -56610,7 +56610,7 @@ CVE-2012-5376,0,0,64786e4442a8bbfc15f2cedfc2200130c317247c3f207dd4fddaa1474651a8 CVE-2012-5377,0,0,b818e6da07f22077fe50eba798f8ac4dc36f9c6952f09a44017fee0367782806,2013-03-02T04:47:09.330000 CVE-2012-5378,0,0,746b1e03b7325c16601ecd437f2315648bd42ae7ad88d86b31360ac39c94b256,2013-03-02T04:47:09.497000 CVE-2012-5379,0,0,3c275dd252316d15f45698e1b1538572146745c5eee22cc22b7552a839f9f045,2024-05-17T00:53:45.903000 -CVE-2012-5380,0,1,5e4c1d586d03ff10e5ce1c175fe614eb87d7f1544771728c26cc651802432bc2,2024-07-03T01:35:11.640000 +CVE-2012-5380,0,0,5e4c1d586d03ff10e5ce1c175fe614eb87d7f1544771728c26cc651802432bc2,2024-07-03T01:35:11.640000 CVE-2012-5381,0,0,da70925921b5cd1bc34435129516e5edf16ba68613e7b5768bc6c17113dac739,2024-05-17T00:53:46.083000 CVE-2012-5382,0,0,05c20441255c6d3c776a4d34d1bacbf6cd08cb70da188ad4b14ce0524fb64800,2024-05-17T00:53:46.170000 CVE-2012-5383,0,0,c13d8a8e9d80f9058bb026bfaaae5f0cfce38a85f6fc34179a0a365ab9fd7f37,2024-05-17T00:53:46.250000 @@ -57657,7 +57657,7 @@ CVE-2012-6660,0,0,4204af3ea712772dc4d2606f2cf6e50a4341f1ad86d3a699d4638987ff7995 CVE-2012-6661,0,0,f39755d71d5dcc549a8db5e512206dba577042eda0dc3867bbe57bd93b2c2a66,2014-11-05T03:32:38.557000 CVE-2012-6662,0,0,1e751bc515057f0a0c08389a90d61351cc4d3ce27e4b7bbe699da54113df605c,2018-07-14T01:29:00.267000 CVE-2012-6663,0,0,3f87372a88dc5ad47844a9ccc94a467ebb7601db36607697bda1bc45ab17e576,2020-01-28T20:10:46.747000 -CVE-2012-6664,0,1,8b94b621b0d9209b8828be318274ba77a928b6737a74b13b02e08a462dc13c48,2024-07-03T01:35:12.607000 +CVE-2012-6664,0,0,8b94b621b0d9209b8828be318274ba77a928b6737a74b13b02e08a462dc13c48,2024-07-03T01:35:12.607000 CVE-2012-6665,0,0,4c489dc740807bb39593fa609a1515059c128f2ac44b714b33a3cf55b66a3194,2014-11-18T16:54:06.737000 CVE-2012-6666,0,0,962b7cb2904b2d0ca796b3fd595fd8726e2100a0e8fd30af14539bc437b2ae26,2020-02-11T17:40:31.837000 CVE-2012-6667,0,0,41abfcc68b31ea0d99df1ebdea5c67ae9abb0258c45c1107f8327c663f06ea92,2018-01-29T13:07:10.593000 @@ -60707,7 +60707,7 @@ CVE-2013-3241,0,0,81f61c2b8787357efc0d29ab00cf698b3c728d06997f02fe2608209ecdbf55 CVE-2013-3242,0,0,b818b43955440eb2e5a9a4f980d57e1156da28bd0f4f946938d8aae27e39d5de,2014-03-07T13:46:53.637000 CVE-2013-3243,0,0,0a1a97ab72712e3f2c332fa2d34698c40881d8191209adadb3acce8023f911f3,2013-11-22T19:53:56.653000 CVE-2013-3244,0,0,f7f8da6bc794877387a72a3300b8115be5c478a613e45881cb8118076fda14e3,2013-10-25T15:18:40.540000 -CVE-2013-3245,0,1,aabaef180996b7524eccbfa825092606b40c031e80cfece8f88eb85c69148d10,2024-07-03T01:35:13.413000 +CVE-2013-3245,0,0,aabaef180996b7524eccbfa825092606b40c031e80cfece8f88eb85c69148d10,2024-07-03T01:35:13.413000 CVE-2013-3246,0,0,2164853e75b6dbcd4cf59697dd439ed6c89b5b2b0d88f6b72f3e043abcb89eba,2020-01-03T21:16:33.960000 CVE-2013-3247,0,0,db7df97ac6c6aa8874509566e50e38e0c6a7f80346b386b5a57cc89040bf7792,2020-01-03T20:43:10.653000 CVE-2013-3248,0,0,9d201fe8d4faa7e35a30d6606067e88f9a9d4e146446bf0895ca4419251f7fbe,2013-10-04T16:37:29.077000 @@ -65252,7 +65252,7 @@ CVE-2014-0804,0,0,64f7bcd62c09feae210ed04317dd3c363bf64429ff0d6cc82e25aa05b441d8 CVE-2014-0805,0,0,64ffdc7602e5834fa9b3519c18d42dd7b07d229d431db1ea7d9952fad9ee621e,2014-01-14T04:49:19.543000 CVE-2014-0806,0,0,0f5d623ba97d2afe2377f45b01521ed33883dbba85dc359bb516719da4f3d8f9,2014-08-11T15:04:43.700000 CVE-2014-0807,0,0,f009d972ec55433ad7f1cd0b29e7cbdba3753adab49339cad8b728a428899860,2014-01-23T18:10:13.500000 -CVE-2014-0808,0,1,f76fdbd1aac4f64484329f0f8673371ce487cd3954d2e5c776d36e70f7f159b4,2024-07-03T01:35:14.373000 +CVE-2014-0808,0,0,f76fdbd1aac4f64484329f0f8673371ce487cd3954d2e5c776d36e70f7f159b4,2024-07-03T01:35:14.373000 CVE-2014-0809,0,0,ea31d36adc72e3733e28eeb6bfacf81b8f998d70f553d482caf7c863538e6e07,2017-08-29T01:34:15.467000 CVE-2014-0810,0,0,45fb5c84f4f5cfdebd55044c843a5258a6f94a800107fdc85390866929ef99a4,2014-01-29T18:39:45.720000 CVE-2014-0811,0,0,c0c381561c327e70759153bf230a2a174504949fe49060ef9f4430788889edad,2015-08-13T17:50:46.333000 @@ -69393,7 +69393,7 @@ CVE-2014-5464,0,0,8deeb0281b9db4f212ca4efdc66134ce9c70ee9145596f228ca92cc47c5e63 CVE-2014-5465,0,0,e8b4208809e03f584a6bb3cd21c0f2caf8fc4911bc0406369f6e78ca20d1fd36,2014-09-03T20:15:36.530000 CVE-2014-5466,0,0,db9eafbbaf858dce0cad9d969bef5c12f1cdb630be454ce3009b8131d8762879,2014-12-17T19:31:00.807000 CVE-2014-5468,0,0,812685be9ec8145ad2039b5d3daf489a0510c1859c48812122bc52998a08515c,2020-02-11T16:02:39.280000 -CVE-2014-5470,0,1,186b2f7c3788bcb00ae4c1c74dddc5d71ce3047a724197f35ade0c1fa27857ff,2024-07-03T01:35:15.277000 +CVE-2014-5470,0,0,186b2f7c3788bcb00ae4c1c74dddc5d71ce3047a724197f35ade0c1fa27857ff,2024-07-03T01:35:15.277000 CVE-2014-5471,0,0,511c8895ca38af1a8d65229a32673dc6b2ea2427c860430ddaa267c61dd3f125,2023-11-07T02:20:50.287000 CVE-2014-5472,0,0,a2fdef957a40c099c9f524e19471baf211bdbb59c08d4930abb8cfc2e4fbac0d,2023-11-07T02:20:50.383000 CVE-2014-5500,0,0,d3411653c84229d5b2a0ee341eae110722fede3a1b2b0df5c988c79a9ce8736e,2020-01-28T21:17:09.127000 @@ -75528,7 +75528,7 @@ CVE-2015-2047,0,0,f520385424497d896879a9bba5d7c98d0b045d559380dbbfdaa25116d7e67e CVE-2015-2048,0,0,be6b830b4bcf4a242fbf47e76d67b8782971a050369af6f8295f6a574416d408,2023-04-26T19:27:52.350000 CVE-2015-2049,0,0,a4e7ee15d2f2e9ee170086a5cd16d4b1f56f3eee7e10ee37f3be68fc01e311f9,2023-04-26T19:27:52.350000 CVE-2015-2050,0,0,1b8bd60107a2a2a89cdbbcb2caec4386ee0ada5b56b0db54abdff5f52313a80f,2023-04-26T19:27:52.350000 -CVE-2015-2051,0,1,e044525e83d7a0d0243a08aab3fdd41bf0ebb2ec6cb8e7fb0f0ce9ff67c75703,2024-07-03T01:35:16.440000 +CVE-2015-2051,0,0,e044525e83d7a0d0243a08aab3fdd41bf0ebb2ec6cb8e7fb0f0ce9ff67c75703,2024-07-03T01:35:16.440000 CVE-2015-2052,0,0,15bedaa4810fc76374f6619a1341ef4403a7704758b77bf6ec017fb2cb92f6b9,2023-04-26T19:27:52.350000 CVE-2015-2053,0,0,b300bbf505a241c2c015579c59d13aeb8a834ca5fff23124563c66079322b690,2016-11-30T03:00:45.767000 CVE-2015-2054,0,0,d36926d2c1b6ea62ba573c9c552f0dab350a9abe45cc4916f7201e66bd4c9d9f,2016-11-30T03:00:46.893000 @@ -83392,7 +83392,7 @@ CVE-2016-10069,0,0,c6f86705793134392d3e3a4b1acc49c278dc92cde9427ac523aa759820063 CVE-2016-1007,0,0,bc6c466a2a12c7ad4f73429684ee8b7cf3eda973ea51815c4882babdbd820427,2016-12-03T03:19:30.003000 CVE-2016-10070,0,0,26e8edf7e7905fd3983da8e7fd55ecc6fb97c66501c07f2a8552ffa831d072bf,2020-11-16T19:44:19.990000 CVE-2016-10071,0,0,f0fbec0b41a419853d7c2c8e04716d64920e05dc6592ff49bf4b6911568adf20,2020-11-16T19:43:42.800000 -CVE-2016-10072,0,1,0d1509ea15cedcaa00278f2089f66114baa4b8dde4c244f34ec4f573309dbdc4,2024-07-03T01:35:17.340000 +CVE-2016-10072,0,0,0d1509ea15cedcaa00278f2089f66114baa4b8dde4c244f34ec4f573309dbdc4,2024-07-03T01:35:17.340000 CVE-2016-10073,0,0,a0f05aefd35fcd7e849631a4e68d07781dd62d3b554a70d49a326d22d0c34867,2019-07-11T12:45:44.207000 CVE-2016-10074,0,0,3d66474bec87704d1afb288a1ed65348ebc6e217425889c52b9636ac8a671e04,2017-11-04T01:29:15.287000 CVE-2016-10075,0,0,cd41506b4f4f8c378fdc8458eab8cd4066a6c978fcb4d8e949a04de94828655b,2018-10-21T10:29:01.503000 @@ -86981,7 +86981,7 @@ CVE-2016-3717,0,0,df334f2cae8cd072b75ef71e463097db5f835905f9717004bb368a99916409 CVE-2016-3718,0,0,430c768ce8519758c274fd50c03d67ad0f9401d5f7b67983d04cd1d775ecfb45,2023-02-12T23:20:05.733000 CVE-2016-3719,0,0,6ea015930dae25aa7a12329274d6abd4dc14250ae579a99a072665c1acc4f256,2023-11-07T02:32:25.260000 CVE-2016-3720,0,0,b4f018e88701f3fb82c319c5ab09fb7dd1af769658e41a2a706154e0a06eb237,2019-10-10T12:18:55.307000 -CVE-2016-3721,0,1,6cc746b94821579f0d3c9319f6f27904b973426ad3ff9de0a6339c3d6d45b074,2024-07-03T01:35:18.193000 +CVE-2016-3721,0,0,6cc746b94821579f0d3c9319f6f27904b973426ad3ff9de0a6339c3d6d45b074,2024-07-03T01:35:18.193000 CVE-2016-3722,0,0,410dcfc040cc72e5f898c1531cd9e1034da088710bf551f56663281d550e62b9,2018-01-05T02:30:43.430000 CVE-2016-3723,0,0,8b5d55c51776e8c99c693ef4b357cec74332f45a7f651f5bd4866712af5d65d9,2018-01-05T02:30:43.510000 CVE-2016-3724,0,0,5067455123a06c47a42d835b98d61c428c852c957d58ca9c36bd5b82932b2b0b,2018-01-05T02:30:43.573000 @@ -89526,7 +89526,7 @@ CVE-2016-6525,0,0,a9796fda095cefbfa578ad1ee4208bcff31b8e026c69960c35e8edeb8f1fb1 CVE-2016-6526,0,0,654c73f6c91d3ac43c5b77f442dea5dbddcb47de5c7b228ac2f75a8f6d865a17,2017-01-27T16:05:28.567000 CVE-2016-6527,0,0,b623f4d236e5a56796488c0e1f4e75223b87ac198fd2dcf9075ffec5901bd4ee,2017-01-27T16:09:13.133000 CVE-2016-6530,0,0,e15aa22b3a4ef8432f4aa2f2358b8096fe74924852e9f802807a6fa20ffc2e0e,2016-11-28T20:33:33.830000 -CVE-2016-6531,0,1,f94e9648fb641b848400fee0b7bfde89f0aebac54cbf2fbe12db2016570facb0,2024-07-03T01:35:18.510000 +CVE-2016-6531,0,0,f94e9648fb641b848400fee0b7bfde89f0aebac54cbf2fbe12db2016570facb0,2024-07-03T01:35:18.510000 CVE-2016-6532,0,0,7c4456539892c0a5d8cba61820bf7ffa0f4b2b3f915e47cb572716f955195a6e,2016-11-28T20:33:35.970000 CVE-2016-6534,0,0,f45c03acd2404f6a9161aaa76ddf906e2aaaa39edf2ac4ab6099684207dbebc8,2017-04-14T15:11:43.223000 CVE-2016-6535,0,0,c7b6841574de451eff29a66507ef5572f6c5407105fe5937a01add6407c2b371,2016-11-28T20:33:36.970000 @@ -97920,7 +97920,7 @@ CVE-2017-14519,0,0,6ff7c369dbcd4e229cf72e4ed4ce4ee073d0343791e48cc61b32547a5a6e3 CVE-2017-1452,0,0,83a01aeb90410d4f0aa7bd6004c7bb884e86b4cca0dab370d6383cd6c62b6f39,2019-10-03T00:03:26.223000 CVE-2017-14520,0,0,7ee548a0e440257328a1e04e36e212b5b0c24609a1b1962e848d9e3186cd55b2,2018-01-09T02:29:06.287000 CVE-2017-14521,0,0,c44f2072a9da98437b0622133a8c991023033cd9761f82d99329468b0c520ac3,2019-04-26T19:58:57.437000 -CVE-2017-14522,0,1,7c8c8961cc253a98aa1da734556e5b11192ae4872a6988b82da35bc9326e6f78,2024-07-03T01:35:18.887000 +CVE-2017-14522,0,0,7c8c8961cc253a98aa1da734556e5b11192ae4872a6988b82da35bc9326e6f78,2024-07-03T01:35:18.887000 CVE-2017-14523,0,0,09f1401e98982943254dc26408713c76f58aa982a61955ffc8967471578c3219,2024-05-17T01:14:41.643000 CVE-2017-14524,0,0,c659fb4002e480cef610f5c57c335f3795e95aa5f2c14af0b31189072d99959f,2017-10-06T15:28:41.983000 CVE-2017-14525,0,0,cacd4b5696ccc1a50387560040fe8d50673e140e1db1b988f4d0f518a563778b,2017-10-06T15:29:44.187000 @@ -100795,7 +100795,7 @@ CVE-2017-1751,0,0,a1b6ee7aded64e47920f96c52527fc60cc46fe6def5ce65e186154edae004a CVE-2017-17511,0,0,85a579a3e8d0dfbe2d340392b821413e5f3c53a5f704de927d2e958e28c0c1e1,2019-04-26T15:15:51.500000 CVE-2017-17512,0,0,06c04691b0662394b75007c694f8bdaa65878c854ce94176bb3106ca52b3e176,2018-03-16T01:29:07.267000 CVE-2017-17513,0,0,8d907902f598cd75bcf3168e200f86b787568fdb04b2401376f0d4109b69836a,2018-01-02T17:44:58.497000 -CVE-2017-17514,0,1,0ce724fd010071d4c7c25a35f3ec31fb169eff2f6bb170625b70b9f562af58e4,2024-07-03T01:35:19.223000 +CVE-2017-17514,0,0,0ce724fd010071d4c7c25a35f3ec31fb169eff2f6bb170625b70b9f562af58e4,2024-07-03T01:35:19.223000 CVE-2017-17515,0,0,f31a83d369b1af133b5c59b1f4588f974e6dbdb5505acec02319d9909e49f1f0,2024-05-17T01:16:07.810000 CVE-2017-17516,0,0,de31d64c0c1d02f120eeec63ec4e7d0f2cce53340006f89806ffd2d016c047c0,2017-12-29T15:39:15.297000 CVE-2017-17517,0,0,349296ca6151efd72f856b31794da1da4a09966e6e362f9b4a133f7f26d18387,2017-12-29T15:39:03.310000 @@ -101182,7 +101182,7 @@ CVE-2017-17914,0,0,160a4ae47aa8c873e4cfc3e46e0dcc59cc260ed61af9895292a3ad260b3ee CVE-2017-17915,0,0,3b8a33cae9c5bf40ea23be22676635fb3fa831a0a41a8240c24870685b829c75,2020-02-10T16:15:12.063000 CVE-2017-17916,0,0,c79dc5fcf40815522b0ad74b78c3cf433407422e9c531086d1f8aa3a9a891efd,2024-05-17T01:16:21.577000 CVE-2017-17917,0,0,352da608d8bb944e7938d8746c91ded8def75e9bcccef306d05beb4c42bedfc5,2024-06-26T20:15:12.240000 -CVE-2017-17919,0,1,0e7013a1348fb54a17ab5304e8bcb2331819b91b1bbc4f8dec28e3a5d890766e,2024-07-03T01:35:20.180000 +CVE-2017-17919,0,0,0e7013a1348fb54a17ab5304e8bcb2331819b91b1bbc4f8dec28e3a5d890766e,2024-07-03T01:35:20.180000 CVE-2017-1792,0,0,31789e9993e85bf202eb139e5853c1a7ec9742386a07633adc65a36e009fffb0,2019-10-09T23:26:31.397000 CVE-2017-17920,0,0,d776a703dbf96edf7d314ec29b2159aa7f5e4ee3f8bd53825e213fca7a555a2c,2024-05-17T01:16:21.870000 CVE-2017-17924,0,0,9d1b2fb046e9c1564ec23f873d49d544a6f12fc071f03f96d4681b1c466d1851,2018-01-10T15:13:50.037000 @@ -101230,7 +101230,7 @@ CVE-2017-17969,0,0,a02c67f592c5397c5a0d2e986f3d882be645feb1dc59073018384b59c0cab CVE-2017-17970,0,0,a312c04363f721078dcff17b964c38cc0d1ec161135093a257b734ffe8a044f6,2018-01-31T18:09:20.977000 CVE-2017-17971,0,0,7163b5950fedf29b973a980216165f6029f0e6bc80e759da1894cd4dd88adbc3,2022-11-17T17:21:59.260000 CVE-2017-17972,0,0,d62a634b08988226b15d8568986b3c731f57ae8dab9aef5f3b185c0362078973,2019-07-07T21:52:41.413000 -CVE-2017-17973,0,1,ae01a644fec802b49b795a3f4856d0d57df4af08c7ba246030ef169c9d6491f0,2024-07-03T01:35:21.047000 +CVE-2017-17973,0,0,ae01a644fec802b49b795a3f4856d0d57df4af08c7ba246030ef169c9d6491f0,2024-07-03T01:35:21.047000 CVE-2017-17974,0,0,fbce9b72e2fc16271c661e5c7d626f68da86548cbcc2b3afd4cfdc6ab9bfd813,2019-10-03T00:03:26.223000 CVE-2017-17975,0,0,030859f97a345682f7be0c5de98ee359f166b888d462c016fd54fc542d4babe0,2018-05-24T01:29:00.723000 CVE-2017-17976,0,0,2b3674555df962ab654ce30b67c666e363d8540dba54477b94effa3e5f040af6,2018-02-08T16:24:17.930000 @@ -103940,7 +103940,7 @@ CVE-2017-3502,0,0,40f615a995b9167301e5ebbcad92bb38e9e0bcd49d5cf7c0b1f81bc49a5958 CVE-2017-3503,0,0,d7791ebdde8a62a572f9829e1009473c85c07ddaf8a21c2bfaff92c6c5062356,2019-10-03T00:03:26.223000 CVE-2017-3504,0,0,b49b1f93c22d9e565cbe057985231e7197c72ba2e8d0718b90201cfc398088ed,2019-10-03T00:03:26.223000 CVE-2017-3505,0,0,bdbf2a14c55f32b4e54ec0b3d3579478aad1c444210303092c061b8a6b479d42,2019-10-03T00:03:26.223000 -CVE-2017-3506,0,1,ce56eab238ed809b8a251f9337488078d0473dac23a822be702eee75efce62cc,2024-07-03T01:35:21.677000 +CVE-2017-3506,0,0,ce56eab238ed809b8a251f9337488078d0473dac23a822be702eee75efce62cc,2024-07-03T01:35:21.677000 CVE-2017-3507,0,0,008c4dc8574d486a0f06cbb430498c99597c21e6048da1f0aab1920e70aa5574,2019-10-03T00:03:26.223000 CVE-2017-3508,0,0,65ea463405d662343f3a23fb3c3e88d2fa18434966ec8f4595c13b65acd39e73,2019-10-03T00:03:26.223000 CVE-2017-3509,0,0,fe56b4379238c94dcfbaf40b7c17d0ddea9e6691a7eafd5cb58fbad36200389f,2019-10-03T00:03:26.223000 @@ -107299,7 +107299,7 @@ CVE-2017-7301,0,0,9dc184e7dc858f5e80e3696feb412f667b1a0112592651d053f5e6663e8d9a CVE-2017-7302,0,0,405186c44caf39ae969d1188f5829b6fc9dad47b4e5336759fb8883150d6996b,2017-03-31T16:28:29.987000 CVE-2017-7303,0,0,7d714feb4d5331f7be7bfc6478f990e4ff0a522e4d86b9b27a267c96cbd38b9f,2017-03-31T17:00:51.633000 CVE-2017-7304,0,0,fac78ee19cce796c5d3b1a8fb26927ffe2268575557255dc246f6ab70b646eb1,2017-03-31T17:06:40.837000 -CVE-2017-7305,0,1,d739678bba8185dee45364bf3e1cf7ecbc55473862a823851d277f19c45f23b3,2024-07-03T01:35:22.590000 +CVE-2017-7305,0,0,d739678bba8185dee45364bf3e1cf7ecbc55473862a823851d277f19c45f23b3,2024-07-03T01:35:22.590000 CVE-2017-7306,0,0,1117c18f1515fec030127c67427e23aabe26b4dcc09b44b29d66319d2d462299,2024-05-17T01:19:43.030000 CVE-2017-7307,0,0,e24de956d653ef7d76f2be51b34e8ac2312e759664077712e15bc829010eb8ae,2019-10-03T00:03:26.223000 CVE-2017-7308,0,0,f69bce2324ebad4b0bad57be61dee5ae37ef1228111cc259f8fb17b189534a7d,2023-02-14T18:32:40.287000 @@ -107880,7 +107880,7 @@ CVE-2017-7934,0,0,6509ad1210147a2f37f99de18e77bec245bc09c56f84bb9b94b5fbcaa5a1c2 CVE-2017-7935,0,0,c5b12e45bd362aa8b8c96239cac3088010c77b7957ce01a05282debacb0084a6,2019-10-09T23:30:01.030000 CVE-2017-7936,0,0,ee771e0b581393ddde2c1929f0985e971498f5b2e1fb63d557fd8cf900b8544c,2019-10-09T23:30:01.157000 CVE-2017-7937,0,0,22c3662b5698f152a3ca69e20a068cacf1bc487977b467bca5a0881756320ef8,2019-10-09T23:30:01.593000 -CVE-2017-7938,0,1,74ded71a02603c9baeb93d5391ddbca64c6c39f7df9c7d79b141e4313a93f282,2024-07-03T01:35:23.457000 +CVE-2017-7938,0,0,74ded71a02603c9baeb93d5391ddbca64c6c39f7df9c7d79b141e4313a93f282,2024-07-03T01:35:23.457000 CVE-2017-7939,0,0,cc88ad4617c70e129da4ca01930c326cd1795f28efd38af7e0b79c0cb9c73bb6,2019-10-03T00:03:26.223000 CVE-2017-7940,0,0,e6315dda7bb4159979b6f2383fb2002b6137e1a073f8f8a41fedc549a7f15f90,2019-09-16T14:33:28.640000 CVE-2017-7941,0,0,046b4e9e2f5936b9dee3468621e77878134ca79650e8b0d28f3d271668fd2ebb,2019-10-03T00:03:26.223000 @@ -107897,7 +107897,7 @@ CVE-2017-7952,0,0,acacef7f7dd5e16a975089a2abf8dff18dcbc1fbe08ac3c99aa6d18bf5c048 CVE-2017-7953,0,0,da0169278275adc681f8f6d59ad87e4128f79c2273a95d76b8b8aa156bf1047d,2017-08-13T01:29:21.867000 CVE-2017-7957,0,0,81f1cf07e35a2e65d46eec07dfcdc5ca23e86e18fb64666b383ff6bba9e23bb3,2019-03-26T17:15:49.980000 CVE-2017-7960,0,0,a0242ae4c18130e71690ae4d6ef55739c650edd1fb44c0a875d76532fea53622,2019-10-03T00:03:26.223000 -CVE-2017-7961,0,1,db4d20904f602bc13745044e76050c24bf7721c38b57aa7b1ca2642aa89abba9,2024-07-03T01:35:23.737000 +CVE-2017-7961,0,0,db4d20904f602bc13745044e76050c24bf7721c38b57aa7b1ca2642aa89abba9,2024-07-03T01:35:23.737000 CVE-2017-7962,0,0,5dfdf21cb89041b4240fb4e605644d2d14cca104b87730a95c47ad9582b228d6,2019-09-16T14:33:28.640000 CVE-2017-7963,0,0,bdf67cbcc8a98608a2b9f061eb82a8d70ff3e3fb166c389c6db8bf6550cabe6e,2024-05-17T01:20:04.830000 CVE-2017-7964,0,0,465e5ad9a0f7cde3d48acc772e2bf0f2d9d26888ea1e27da7c65ba219dad2b47,2019-10-03T00:03:26.223000 @@ -108343,7 +108343,7 @@ CVE-2017-8453,0,0,1ade74bf622e1eee81f0c15e76eee991be9e77bb313a78930ab85c0915aa16 CVE-2017-8454,0,0,2e0a864e37ca6392a4216a194ee8a0783cbe6219bd71d5afa7b14161184034f9,2017-05-12T13:25:35.123000 CVE-2017-8455,0,0,1961b2a9e3724d43b332c98943a27326f5f1db172693a1c4d958d19267928d8f,2017-05-12T14:57:27.523000 CVE-2017-8458,0,0,eca132dbac5ae60abae89c6e78f7f1d10bf815437ad5c9feb3ab493ba9601cf4,2019-10-03T00:03:26.223000 -CVE-2017-8459,0,1,6b77909343869be5d866514afaf5d7fd889b270efec54476e2ebcf99a8a0550e,2024-07-03T01:35:24.003000 +CVE-2017-8459,0,0,6b77909343869be5d866514afaf5d7fd889b270efec54476e2ebcf99a8a0550e,2024-07-03T01:35:24.003000 CVE-2017-8460,0,0,0107d1432fbc7b9b0cb183cc6032573bfe4f99b9c33617d09a1df29c07281c5c,2019-10-03T00:03:26.223000 CVE-2017-8461,0,0,d2fa9842795b751f8291127da3d24e8366a5133dc64d62044067d0ad4dad75df,2021-03-29T14:07:07.087000 CVE-2017-8462,0,0,2901bcb730e7b2e3dc91a123f364891095148cad94ce9252a43354b875f4432f,2019-03-19T19:48:30.877000 @@ -109051,7 +109051,7 @@ CVE-2017-9226,0,0,2764b6aad4c765e6175a96ae4be6d6ad9d6c47acf9477eadd5193c9aff927c CVE-2017-9227,0,0,74ab63bb9709fc0179731c0ead9bf70ab5dc3cd649d37caffe649ba2e9223630,2022-07-20T16:34:01.827000 CVE-2017-9228,0,0,afb241de52aebe45cc897da45863db1964ddb8c0eae36d9ca4d6c547d7e2dd1d,2022-07-20T16:34:30.863000 CVE-2017-9229,0,0,b8f3f6a018e98654c6f65fa839817aecfc502092d761c0e3bb6b0ea155f7f3ea,2022-09-01T16:20:47.960000 -CVE-2017-9230,0,1,da979458691ec3cea074fe0593889181d023978b93250330134a9403f1092108,2024-07-03T01:35:24.270000 +CVE-2017-9230,0,0,da979458691ec3cea074fe0593889181d023978b93250330134a9403f1092108,2024-07-03T01:35:24.270000 CVE-2017-9231,0,0,b630102d12d2aefb45269239e3a944b9228f5ba4d116277530fe696a17b9d87b,2017-07-07T01:29:05.807000 CVE-2017-9232,0,0,9afe228b167724d95510ba92693c240a464fddac356da4b242a4f72f304bb83a,2019-10-03T00:03:26.223000 CVE-2017-9233,0,0,ec9091e3b522f96b7a11b58deb8fe238a1e05497703ab63355ccd831ae902daa,2023-11-07T02:50:37.820000 @@ -109605,8 +109605,8 @@ CVE-2017-9851,0,0,73d99d2f011d5989d4ac4319d19143433665e70995cfb8589778e84237c7a6 CVE-2017-9852,0,0,f66720559e067630f471cefd3358fd4ff705966b6b19164e8c7f28207b232d74,2024-05-17T01:21:02.543000 CVE-2017-9853,0,0,eb71e8bbd47ca5cfb4ab87686c246566f1a0a8310b31dddeb6becee6e88c7bbd,2024-05-17T01:21:02.750000 CVE-2017-9854,0,0,406b4fd12e2181d2c7ac2f08af2729d60001cbc68b627349905ece6e70d5379f,2024-05-17T01:21:02.920000 -CVE-2017-9855,0,1,5ab25d19a67fc4462eba01b4bb65c0080ac877ea125791d5ddbe2241dcff270d,2024-07-03T01:35:25.410000 -CVE-2017-9856,0,1,df27b68242ae1225d7f531b7ab68e0775a1f70bd48b6824f63ff61e6c8ef56a6,2024-07-03T01:35:26.443000 +CVE-2017-9855,0,0,5ab25d19a67fc4462eba01b4bb65c0080ac877ea125791d5ddbe2241dcff270d,2024-07-03T01:35:25.410000 +CVE-2017-9856,0,0,df27b68242ae1225d7f531b7ab68e0775a1f70bd48b6824f63ff61e6c8ef56a6,2024-07-03T01:35:26.443000 CVE-2017-9857,0,0,0c4078ccd2daa00d013a61b192335277ffa814abcb6e5011b38470c9b35570bb,2024-06-04T19:16:55.880000 CVE-2017-9858,0,0,4b820b3e22085401984bda701b121f0b5a9201c4dcace70481deb06431747472,2024-05-17T01:21:03.430000 CVE-2017-9859,0,0,7328ead9e5d724c0ad1850a6f155dd99f81eddc60b99717531657ab9c99eb37f,2024-05-17T01:21:03.563000 @@ -111779,7 +111779,7 @@ CVE-2018-10718,0,0,3a7267c5002bac9a078ba4487918dd3b39c0cbba1da9f5edd34c1f51d81cc CVE-2018-1072,0,0,328901f86245546c0e7b6a8285ffd79a8162d521a14b64f2a6c4f4e6f5647cba,2019-10-09T23:38:02.943000 CVE-2018-10722,0,0,8624e8d6b732238fa5087cf8246211dfbffcc77aabc2d83996cef428cf152f82,2018-06-13T15:27:20.230000 CVE-2018-10723,0,0,1fe81e0c0301e5a97a121e0240b19b167b85941f5745d48ff34cba0ad6fc0bc5,2018-06-12T12:44:59.213000 -CVE-2018-10726,0,1,46a3dddff69d6bdce31f26de14d6107b68e1b37aa0a992709741f46f19addf7d,2024-07-03T01:35:27.627000 +CVE-2018-10726,0,0,46a3dddff69d6bdce31f26de14d6107b68e1b37aa0a992709741f46f19addf7d,2024-07-03T01:35:27.627000 CVE-2018-10727,0,0,f3788a63768ad567d6911224d1aed914c07eb6610b393b66d3d89b8c3e16f828,2019-10-31T01:07:46.510000 CVE-2018-10728,0,0,e06c02cdbe87d564067845bce20aaee0ad8ec25cc302f2d4d7cee9d49833067a,2018-06-20T15:47:39.513000 CVE-2018-10729,0,0,ac1492149049093ebf005d73236820e1a65bbd80d5a066303dbd55c9d0853594,2018-06-20T17:36:34.497000 @@ -112136,7 +112136,7 @@ CVE-2018-11103,0,0,bf255ab7414041c299e21a27bf80d28c2dae16466a8dce9683675a16ef3ed CVE-2018-11105,0,0,16a167a51004f736f454241b048beb1854bb38aaae0e89ac5697b5654db17d92,2023-05-26T18:55:47.037000 CVE-2018-11106,0,0,683f9db071e16d88ee404b51047105cbe40afeab2cc75c8d49e32841e493b409,2023-11-07T02:51:37.613000 CVE-2018-1111,0,0,0e384f909d6e0915d972d3a054dfad9fdb57dbd15ef4489722e78dc6d080f07f,2023-02-12T23:32:38.430000 -CVE-2018-11116,0,1,0fc53ee1a3094d7c5fe0aec9cdb822fb4093a5b2c60dc87cb6ecaa104888eb3f,2024-07-03T01:35:28.467000 +CVE-2018-11116,0,0,0fc53ee1a3094d7c5fe0aec9cdb822fb4093a5b2c60dc87cb6ecaa104888eb3f,2024-07-03T01:35:28.467000 CVE-2018-11117,0,0,e263645a46012b1f1dfe656879af3bd479bfd18559d697113375cb07ff01e0a7,2018-06-15T19:37:42.600000 CVE-2018-11118,0,0,f39d17641dc82b5e726dd4ea2d43c56be4eacbdf4ec33af20a5087f650ca1ac6,2018-06-15T19:43:24.957000 CVE-2018-11119,0,0,e857e42b163872989c1139dd6a81d06e748d74a09eef5f4b357f98a11e230087,2018-06-15T19:39:10.197000 @@ -112666,8 +112666,8 @@ CVE-2018-11678,0,0,c27072c55d5a8a8249addf9b97e89023d87ddcf1277048f86246c8759cacb CVE-2018-11679,0,0,81afff03e103cbfa71cf74be7dac6aa8a71793b0c7cee7dc2eaf379a7909d634,2018-07-09T14:11:02.133000 CVE-2018-1168,0,0,54c9a3a72cf05c567caaf57a38cd19192d1ef75da359b274f8be84e4ee28a192,2023-05-16T21:04:23.433000 CVE-2018-11680,0,0,3bb381b99a8a5d08872ea2018f2617b5ba8b32aed492f0971aa2d2358c05d160,2018-07-09T14:08:11.580000 -CVE-2018-11681,0,1,3f0b8c48009fbdc20cef75d855010ab0aa7c4244e7c83795bb058c81add9d474,2024-07-03T01:35:29.537000 -CVE-2018-11682,0,1,c9387aadf19432af035992697ccc4e2dd5e29f5e3ef8c164c058f35a10694745,2024-07-03T01:35:30.440000 +CVE-2018-11681,0,0,3f0b8c48009fbdc20cef75d855010ab0aa7c4244e7c83795bb058c81add9d474,2024-07-03T01:35:29.537000 +CVE-2018-11682,0,0,c9387aadf19432af035992697ccc4e2dd5e29f5e3ef8c164c058f35a10694745,2024-07-03T01:35:30.440000 CVE-2018-11683,0,0,fe8b15a12919f95dd69dec09c23f9866189a8afdaa40eef3b2b6f4ce0ff21d51,2020-08-24T17:37:01.140000 CVE-2018-11684,0,0,4bdd889d1950bbfb049eae9924920c51c4168ada5a76409071db63cc604aeca2,2020-08-24T17:37:01.140000 CVE-2018-11685,0,0,7d49f414bb3d3f1470daa43bbded9753700558fed264ac486272aef1a7e47078,2020-08-24T17:37:01.140000 @@ -112712,7 +112712,7 @@ CVE-2018-11723,0,0,cda15fb3aa79b90511415bc830e6e8e8e51122ecc046217c28420d7a79fd8 CVE-2018-11724,0,0,28afff45ace5826a5ab942878a6517dbcdf9fd83da45d70943d9fc50b9c67203,2019-10-03T00:03:26.223000 CVE-2018-11725,0,0,9475f7c9a632c6d5970d7314402f347d451d790de16c4763a0ba8a02c9892208,2018-08-08T15:18:46.960000 CVE-2018-11726,0,0,f31d62e50210c389d4e7fe3ea3d400b089f682115c34e9d3a3fb570922549ced,2020-08-24T17:37:01.140000 -CVE-2018-11727,0,1,4f7f02237c8041686b9317f11213e3f397ff89dd4dbd4e4c7a17101a5274cb56,2024-07-03T01:35:31.443000 +CVE-2018-11727,0,0,4f7f02237c8041686b9317f11213e3f397ff89dd4dbd4e4c7a17101a5274cb56,2024-07-03T01:35:31.443000 CVE-2018-11728,0,0,818b757a132ce2d0a3816ef01b92d9563612687a852fe5556cdb510a0fae473b,2024-05-17T01:22:41.027000 CVE-2018-11729,0,0,a1052064371b2b2d423a58f380c6c483fed94056f09ad06abc284ebdfc84b75b,2024-05-17T01:22:41.120000 CVE-2018-1173,0,0,0ac3d6c68e3401c24f4b98bbb5f29154bf40841ee68e222c685cd05ef82460f2,2019-10-09T23:38:13.507000 @@ -116656,7 +116656,7 @@ CVE-2018-16307,0,0,ee7d16b48a5908a6fe4d010b1ec6f48e61dd35daeec0b655f4238550b39be CVE-2018-16308,0,0,cca3c5e9fe3f5b5c65b3b0f605c483f4c66a4df5776bcb3e7c569977669540fb,2020-08-24T17:37:01.140000 CVE-2018-16309,0,0,97f4855a6b1d2999e448269389c0e10c40c60d07543d9b9c8bc93bd59c4752f1,2023-11-07T02:53:44.803000 CVE-2018-1631,0,0,6fef9cddd7513d50990f2db9a88f0f29e66dfca28c44392db923ceefb5d4f893,2023-02-24T00:14:33.947000 -CVE-2018-16310,0,1,b205db3dd50a6fe80121b0d0e254a854c6ded6ef2cdb7eb43765a7ff3cd6e78d,2024-07-03T01:35:33.430000 +CVE-2018-16310,0,0,b205db3dd50a6fe80121b0d0e254a854c6ded6ef2cdb7eb43765a7ff3cd6e78d,2024-07-03T01:35:33.430000 CVE-2018-16313,0,0,345f1265583b15b7ca3762839747a90370be255eb7ce11ea0de201d2dc612d4d,2018-11-02T22:17:43.130000 CVE-2018-16314,0,0,1c1996c24716d12b4fff3eaf7dfb967623bbffac2c20760f03996ab4b778bf7e,2018-11-13T17:48:15.513000 CVE-2018-16315,0,0,2f5272a167f9e975a7a50bada8213454bf1029bc05adfbea6449241d8b7b6c4c,2018-10-25T13:40:09.570000 @@ -118050,7 +118050,7 @@ CVE-2018-18008,0,0,f17521d1f57ea353b0fd658b337d965a3f36b007173fa44d25bf59cd63339 CVE-2018-18009,0,0,588c4bc76bfb55c7992134582d181d8711029d3bd5b217f0c4aeda6038891750,2021-04-23T13:40:34.740000 CVE-2018-1801,0,0,b6311108331fcf0d894cf88fd10fe257504420f7bee2556aa8c6b4f3b78c7e34,2019-10-09T23:39:07.633000 CVE-2018-18013,0,0,3730fe6165476eb6f05205ed8afd90663696c816652614ebdd5900bffd6aea92,2024-05-17T01:25:25.320000 -CVE-2018-18014,0,1,5222f72f0b39ecea508f3706b83817e794af6d1a18744f6a0e858f9fee51a8e3,2024-07-03T01:35:33.810000 +CVE-2018-18014,0,0,5222f72f0b39ecea508f3706b83817e794af6d1a18744f6a0e858f9fee51a8e3,2024-07-03T01:35:33.810000 CVE-2018-18016,0,0,3ee2eb029d5869a4b3a16ee844835b037ce14260e25d9fd9c4696ba095f07e32,2019-10-03T00:03:26.223000 CVE-2018-18017,0,0,f44dcf63f3d0ae5df82aa9143876453570e7a723a1f89b72c6905e62ab2cc8c0,2019-04-16T13:30:33.967000 CVE-2018-18018,0,0,64c7ffaa953496b489b8314b64574533fbe58934b6f391b10ce4a84898284ddf,2019-04-16T14:18:39.613000 @@ -118944,7 +118944,7 @@ CVE-2018-19089,0,0,de087063105ee8a84ceddf6f01d8b791a91578120be7af58c5169b7a5122a CVE-2018-19090,0,0,de03bd6ab8661327957205e5bc74503d92d62bb9a506f543ffaaa0fddeb4e939,2018-12-11T16:29:55.810000 CVE-2018-19091,0,0,c30178498c7c0c5d0f8e845ae4b162fbb557a24c95ae99dadd7a606094c52f9c,2018-12-11T16:30:18.560000 CVE-2018-19092,0,0,ac92fd91545557f44c4733325b1edd04a3a2688f037f49de2a8c2ee3e65217d1,2018-12-13T15:58:33.597000 -CVE-2018-19093,0,1,458a6df14bacf3fe2f259990fe77461de757976f82aa4a8b0b16a7b99b994506,2024-07-03T01:35:34.453000 +CVE-2018-19093,0,0,458a6df14bacf3fe2f259990fe77461de757976f82aa4a8b0b16a7b99b994506,2024-07-03T01:35:34.453000 CVE-2018-1910,0,0,7c27c661a01b5e172ba368d1b1b9aab10c077a84e34b1e5e63d9276cdf84f088,2019-10-09T23:39:20.010000 CVE-2018-19104,0,0,e7491cbe4cecfdcd40c0d7ec11afd7c18a64487629123cb41d141ef36b13df86,2018-12-11T21:23:16.840000 CVE-2018-19105,0,0,e65452c87e27ba5f146f94c4170487eaf752829b430f56469a00a51d99126f54,2019-05-06T00:29:00.263000 @@ -120083,7 +120083,7 @@ CVE-2018-20432,0,0,4a2811fa0199676ef59abf875991e44b9674d40db9feb116e0784400f2108 CVE-2018-20433,0,0,7f4b6156b8a700a8192757ab08a68fb4a1af2c0489855b89d03bab11822f5c96,2023-11-07T02:56:17.210000 CVE-2018-20434,0,0,50353a8a78e7516bfca93bb1e9906d2092cf16c31b4a929b2c21b6b6fea8e11a,2019-06-04T23:29:00.360000 CVE-2018-20436,0,0,9a99ce6910d1f5c0013d9f41795e911898630375a2eb1dd93d9b9ca1eac55c02,2024-05-17T01:26:54.527000 -CVE-2018-20437,0,1,468d6e6dc6fe7afa818480aa8dab4258562a0f73a045fa9843adc5bf361773e1,2024-07-03T01:35:35.440000 +CVE-2018-20437,0,0,468d6e6dc6fe7afa818480aa8dab4258562a0f73a045fa9843adc5bf361773e1,2024-07-03T01:35:35.440000 CVE-2018-20438,0,0,46b406b1b5c5d024c91cbf163cc48f210a1976b0f1c6a0d9526b3d33ff4b023c,2019-10-03T00:03:26.223000 CVE-2018-20439,0,0,be9615e722246ca58f438b827cc202346928ec4f96b8e718f900c807230a2c8c,2019-10-03T00:03:26.223000 CVE-2018-2044,0,0,0c3e7978a7192ab53e89f50be97c7b6a64becd46860c12ddc9a73cf740d0840e,2023-11-07T02:56:38.123000 @@ -121382,7 +121382,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000 CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000 CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000 -CVE-2018-25103,0,1,9dfc21f1a82dd6ea6c50fd8da379acadae36d409a2223f5b4b3b6b024d5e8a3f,2024-07-03T01:35:36.127000 +CVE-2018-25103,0,0,9dfc21f1a82dd6ea6c50fd8da379acadae36d409a2223f5b4b3b6b024d5e8a3f,2024-07-03T01:35:36.127000 CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000 @@ -122744,7 +122744,7 @@ CVE-2018-4228,0,0,36ba0e9324d60dcb6e2d20d52eae4806e45fcad091546bcfe020c86e05f320 CVE-2018-4229,0,0,3350d9afef186ace65add58367e2a00f6ced3518e099703db9c54a5fa56a2559,2020-08-24T17:37:01.140000 CVE-2018-4230,0,0,08a5aa4deaf617a7dfbceed0b772978e34876452fd7e38a922da1fa6544c14fc,2018-07-13T17:58:29.330000 CVE-2018-4232,0,0,ce6f8b36af32291448fe502906bf8d0a4faecc03cb56ca2208423628cc6a1dc9,2019-10-03T00:03:26.223000 -CVE-2018-4233,0,1,6f8ff254df1dbc6c45d622e94808351dcb9e6f30f5aa197bacba4b2a18036332,2024-07-03T01:35:36.460000 +CVE-2018-4233,0,0,6f8ff254df1dbc6c45d622e94808351dcb9e6f30f5aa197bacba4b2a18036332,2024-07-03T01:35:36.460000 CVE-2018-4234,0,0,427d663f51eb4d2598c91da5361e8b2885bbbd67feef111294a736be5f7b5f5f,2018-07-13T17:58:08.237000 CVE-2018-4235,0,0,0aff306383aa22030b5130a2fd127ff9956fcfa26ac871fd2ace7bff8df708f6,2018-07-17T16:11:39.100000 CVE-2018-4236,0,0,ef6436e1fb5fca61c0e62474704a59dd11086b5237f97d26feaef8b1382220c0,2018-07-13T17:57:49.703000 @@ -122906,7 +122906,7 @@ CVE-2018-4400,0,0,699dfc3ec1640885642b679bcf93e5d36be7a53bee9a6f903253eb84810e40 CVE-2018-4401,0,0,c4d63b847af3c2d30e1ba61953c16bbf33253a67f0da24faac36753c84e0e7c0,2019-04-05T20:31:04.127000 CVE-2018-4402,0,0,2c9b5577874477f38323ce1c390ca4bca397c3b2d39bd153c894ef44734c9b12,2019-04-05T16:15:47.827000 CVE-2018-4403,0,0,8906e685a98ec4a30330144cb86d50b62f53b108c5059172d2716c2d22ecc5df,2019-04-05T16:14:37.693000 -CVE-2018-4404,0,1,259e20ca678106606326c5e161235b331a616ff95b80d05efba94e169011994d,2024-07-03T01:35:37.820000 +CVE-2018-4404,0,0,259e20ca678106606326c5e161235b331a616ff95b80d05efba94e169011994d,2024-07-03T01:35:37.820000 CVE-2018-4406,0,0,c9930473c49cbd3f23d5ede7b893a252ab043810b2b768c5c2d5af7f18e96ea6,2019-04-05T14:07:49.350000 CVE-2018-4407,0,0,fbb04c6073d90420ce2340a9660e4248f7237d4ed1d9b6d4ed70a53109b76972,2023-06-12T07:15:10.957000 CVE-2018-4408,0,0,b227fd52c7d928aaf5564e38e9f65c4c5fdfda9e50448a21f4e174d3f5eba118,2019-04-05T14:02:29.847000 @@ -123753,7 +123753,7 @@ CVE-2018-5274,0,0,f0f19ec1ceaf5b9769f67990b0fcb8c8ecacf84437ba06d197ff9c72a69f32 CVE-2018-5275,0,0,690238cde44790e68a6a792a6a26aa4bd8f1932c4ec253f633fa79b41cc82d7d,2024-05-17T01:28:43.913000 CVE-2018-5276,0,0,fcbce7047357467b176d718cdf504d09e7c73b5958442d6d8045be0dce650c72,2024-06-26T20:15:12.850000 CVE-2018-5277,0,0,204edff53a328edc98ee4a272c47cf815b6b0201a8d3ceeb890c6c2287b54b95,2024-05-17T01:28:44.083000 -CVE-2018-5278,0,1,44f54c917ae67ea183a1f5bf9a6df3d3ef75bdd878461985ea281f0f5b629de8,2024-07-03T01:35:39.040000 +CVE-2018-5278,0,0,44f54c917ae67ea183a1f5bf9a6df3d3ef75bdd878461985ea281f0f5b629de8,2024-07-03T01:35:39.040000 CVE-2018-5279,0,0,d0031ea2b182fffceab5699a9e7e971285920f95eb65d8923b7b60f383f9e32f,2024-05-17T01:28:44.267000 CVE-2018-5280,0,0,c70e86a0e74d4ea613c9f406dbcf39d92c5e39f9192d649874554b48b37fe937,2022-06-16T16:18:23.657000 CVE-2018-5281,0,0,d10744e49f3b763d131fc56c23f104b9cdb913c5bbd579ab9c026d16946d30ff,2022-06-16T16:18:39.807000 @@ -128140,7 +128140,7 @@ CVE-2019-1010016,0,0,b659b9d3d9dcbf6a428750004f68702620ceca34c94d09df855db51a705 CVE-2019-1010017,0,0,1093f1a5629a91c39b4a965fdcdfb39eddb9f0bb05507c391aaaeab8e241de70,2019-07-17T18:55:01.707000 CVE-2019-1010018,0,0,622fa23478b7e8d628a69251fccec66fcbcf4ffe5d59544983c4319c0a4dd9f8,2019-10-09T23:44:12.930000 CVE-2019-1010022,0,0,d20efb51f5415f1e8500dbdce89e3ed0a854795819b89e0ba6a131000a095e27,2024-05-17T01:30:58.973000 -CVE-2019-1010023,0,1,f07119c4dfbf7ca6953a921f1d4ea4c8e524caab070da982b9ec89fb5068dca0,2024-07-03T01:35:40.327000 +CVE-2019-1010023,0,0,f07119c4dfbf7ca6953a921f1d4ea4c8e524caab070da982b9ec89fb5068dca0,2024-07-03T01:35:40.327000 CVE-2019-1010024,0,0,bdac636646c945c153c2eff3a90b9b3df1f79eaa4bbbe29cdb7ec01d000b14f4,2024-05-17T01:30:59.183000 CVE-2019-1010025,0,0,f42d3de4f064a72a4159a7fd14205d6b66fb437f5b575e19c7b093f77ed23f14,2024-05-17T01:30:59.273000 CVE-2019-1010028,0,0,52616deab1af39b72035c93517b4fdb9398b8cbe68ab2302cc009b5610844401,2019-07-15T14:26:34.140000 @@ -128799,7 +128799,7 @@ CVE-2019-10566,0,0,7cbd0d2f867edea708f0f82f1c1299b62c889bad4db1ce257b174e8df735d CVE-2019-10567,0,0,3f606b7778a201cbd18db5c694aa85ed8bb2d27828d35ded4af30a434f1721bb,2020-02-10T01:15:56.953000 CVE-2019-10568,0,0,c22cdf3b34ab079ee8ce1915e46df359c7bbcff864be8f17b80e131c122dd678,2023-11-07T03:02:30.390000 CVE-2019-10569,0,0,c88d0b12ebb7161da1346392dd94936249767540cc4a5c065469760f5e3179b0,2020-03-09T12:14:44.897000 -CVE-2019-1057,0,1,792f5c187f6cc5642fcfb3086d9db495e7a5778e677a1aac0db552b43c79327d,2024-07-03T01:35:49.753000 +CVE-2019-1057,0,0,792f5c187f6cc5642fcfb3086d9db495e7a5778e677a1aac0db552b43c79327d,2024-07-03T01:35:49.753000 CVE-2019-10571,0,0,72ebecd8884c104b077c943b43ef13a67a7c9302c6d964dfc3242bfa18da7d74,2019-12-13T20:48:35.070000 CVE-2019-10572,0,0,02a3a9e3826456af1f9fdf968d689ddefa8ca1097f92f711fea7c9ff21bbf28d,2019-12-23T15:07:13.210000 CVE-2019-10573,0,0,41e8e97d511e224a5a926a1665c7b88f71dcdba10f1874223aa001a197aeb2c5,2023-11-07T03:02:30.673000 @@ -129673,7 +129673,7 @@ CVE-2019-11496,0,0,f65c093c5c0de5586313dc7dd23f7a29db0b49e2f23a810e65fa905d41109 CVE-2019-11497,0,0,44f73da5e37a7b5dbf40e71f8952c4c13114f2c4028db322a7493b86c45b4c7a,2019-09-26T19:15:11.777000 CVE-2019-11498,0,0,e184ace1c72691b9580f51c6ff2827f89735242ef1122ac12da792976bb657a2,2023-11-07T03:03:02.423000 CVE-2019-11499,0,0,cb4441d4ca6115e0c0f637370fa5492f0f1d357b45adfe091afa7afa44319148,2023-11-07T03:03:02.500000 -CVE-2019-1150,0,1,19cf43d27c8c7896d693621bd6138c84e3e652dff9cc628e5125354637d06422,2024-07-03T01:35:51.453000 +CVE-2019-1150,0,0,19cf43d27c8c7896d693621bd6138c84e3e652dff9cc628e5125354637d06422,2024-07-03T01:35:51.453000 CVE-2019-11500,0,0,da02cdd53ad7cdc600440ed1d457a35e90a9598b0207ba171c84967bb894b061,2023-11-07T03:03:02.563000 CVE-2019-11502,0,0,7e281013589e1bc42d7c1532b0566f6a86587307cfc53872b34900e11313c227,2019-05-02T13:35:31.683000 CVE-2019-11503,0,0,15b71a24b6bec23f4178e283037c533d3570a80587fde80542c53a710bca26f0,2023-11-07T03:03:02.650000 @@ -129738,7 +129738,7 @@ CVE-2019-11565,0,0,a0d195e1bb3535191d06705e3b3b1708f3718b584eb2d99a14d90df4b865d CVE-2019-11567,0,0,f347db5d3025b5be8256c34a201b7d0e1b4464e4b3c2df1c6ffdea18eb34f471,2019-04-29T18:35:11.860000 CVE-2019-11568,0,0,d5e3a7af4ab230df8f1aed2bd073f0bcc3c3e3e0372a478c2bae38b4b766b231,2019-04-29T18:35:41.330000 CVE-2019-11569,0,0,171be400180fad42535da9c5adf16f7475af5b104386658af07dc922d43eb34d,2019-05-07T12:02:42.783000 -CVE-2019-1157,0,1,de252cd7aa49962debeb42a72e4e0167582e4a84e400190752c6fa4237fd6d30,2024-07-03T01:35:52.550000 +CVE-2019-1157,0,0,de252cd7aa49962debeb42a72e4e0167582e4a84e400190752c6fa4237fd6d30,2024-07-03T01:35:52.550000 CVE-2019-11574,0,0,32bf6902ba76a19217e4776950561d1fcd9eebe859f15eca91322044dac05f89,2020-03-25T13:22:40.687000 CVE-2019-11576,0,0,949248c944d8b7450e2d1d570a99dc143103ade04b617578c6a58abb8c74db9b,2020-08-24T17:37:01.140000 CVE-2019-11577,0,0,30f3967c894aa9c593b853f8a45b349a95fbf8bce5af5a7830f2e3607c0eb2a9,2019-04-29T16:59:06.933000 @@ -129788,7 +129788,7 @@ CVE-2019-11616,0,0,77b550f4c86c2dd4e30d32173f876fa3b7a54ee215d081b9d9b27018b3f90 CVE-2019-11617,0,0,07a6eb00b71a1985c8d138104e91fa398c1e7fe065a9300b6c6e3e9de3514843,2019-05-01T19:38:28.360000 CVE-2019-11618,0,0,e2d0c1ffec0f2f2320f4bea0ba759572d6b3f7e5df6efa770abeabcbf41349e9,2020-08-24T17:37:01.140000 CVE-2019-11619,0,0,75dca83183e9f7ff97a00c89d483ab7c07045ff2a1b97dda2ba8ae6844c42d8a,2019-05-01T16:19:01.133000 -CVE-2019-1162,0,1,09e74de2c2a58e959feb14a9fb1f7a08e75885ba3cb5e8e2f2cf9fe81c2456c5,2024-07-03T01:35:53.940000 +CVE-2019-1162,0,0,09e74de2c2a58e959feb14a9fb1f7a08e75885ba3cb5e8e2f2cf9fe81c2456c5,2024-07-03T01:35:53.940000 CVE-2019-11620,0,0,8abf597423f1cdb2ec46146487880d2b1ed1ecdb6cff5c302dce34667db34ad7,2019-05-01T19:25:21.450000 CVE-2019-11621,0,0,7fd56ddd28157686eb95a87e325a17cec072568e20f95a77c2adbf9d7ec9ea1d,2019-05-01T19:20:06.553000 CVE-2019-11622,0,0,dc6acf0d8ddf509a8dec3337c6679691cab626a270ba6360708cb295470029c6,2019-05-01T19:14:31.203000 @@ -129906,7 +129906,7 @@ CVE-2019-11736,0,0,c7296d4ddbea469e3b7329b23d6e6fb741bb7f9e9d743f89ceafc294c5a7f CVE-2019-11737,0,0,e6990b9c640e937356880d094912d5e86d48beeb94783b42662312c7d224c37d,2019-10-02T13:40:03.773000 CVE-2019-11738,0,0,6e7309e9536c245d43d0b7a6eb0a4852f8963ba3be92f4d36cda4bffd3687387,2022-03-31T18:07:13.633000 CVE-2019-11739,0,0,88e3e84774a7dc9069b615a45dfbf76d2e618212c67ed532b33f9cd5d33c8322,2020-08-24T17:37:01.140000 -CVE-2019-1174,0,1,0fede09deda1ac476813fe53b600604d2f56e2c06833aa0335078fa71f5546b3,2024-07-03T01:35:55.440000 +CVE-2019-1174,0,0,0fede09deda1ac476813fe53b600604d2f56e2c06833aa0335078fa71f5546b3,2024-07-03T01:35:55.440000 CVE-2019-11740,0,0,2cf463388880dd9485304249be69b7e6448bf22c10c69bb3b07980914de79653,2022-03-31T17:49:18.060000 CVE-2019-11741,0,0,352f659e03a246f783f53f1329ce9991b67e8116b30f840ee70fb34c0836e43a,2019-10-02T17:31:48.873000 CVE-2019-11742,0,0,11680436fdcf7540da174949193b774999b41dd84c0303954f1e095f36305c1e,2019-10-04T18:15:13.753000 @@ -129917,7 +129917,7 @@ CVE-2019-11746,0,0,dfdbe549aad8e8976c5554ff3055684a498d10a8b24b6862cecf0b9b077ed CVE-2019-11747,0,0,af15beea3481bb58a0aa023bb17a89f9f2c2ac7e604495b2f36e495404eab32b,2019-10-05T06:15:14.083000 CVE-2019-11748,0,0,ddbe92e5c96f3bfa46c2b5bcaff5cdcc7161718ea196ef3b3a2ed9650f9e05de,2020-08-24T17:37:01.140000 CVE-2019-11749,0,0,35186eb259d4ed508ac9c2590d2a2a7fd8c41ed4ba87762da2038dd92f6d8392,2020-08-24T17:37:01.140000 -CVE-2019-1175,0,1,4a7bbfc2ae22ee473d7e8adc4a68d17ffa618d1eb4b614c8c858d12a68129899,2024-07-03T01:35:56.507000 +CVE-2019-1175,0,0,4a7bbfc2ae22ee473d7e8adc4a68d17ffa618d1eb4b614c8c858d12a68129899,2024-07-03T01:35:56.507000 CVE-2019-11750,0,0,f984031a3655c8fa8fba476042468fe9b7ab9640943ff774a801d28a435cb15f,2020-08-24T17:37:01.140000 CVE-2019-11751,0,0,5a74d98808778802a14c63dfd24521ab51609acc272785dc6f97e46acf164a16,2020-08-24T17:37:01.140000 CVE-2019-11752,0,0,ddd40897f3402a4a3edfcf700990119f17d84303bc38f146e5933dadc4ba2bbf,2019-10-04T18:15:14.237000 @@ -129939,7 +129939,7 @@ CVE-2019-11766,0,0,70ed151528adf6b6a685f9baab66a27e78263e9d297c4a6ee62c2306504bc CVE-2019-11767,0,0,207051fb4687ff50f185000cca66ef8726260f442d81f6e9ab13919e2126a715,2019-05-06T15:57:29.780000 CVE-2019-11768,0,0,ec80d4c26f596b078a3c1bc6b72e66c254f78cc69a7f10c2af3214860a607abc,2023-11-07T03:03:11.800000 CVE-2019-11769,0,0,3d51a11f9fbe49ebff27cd27ace85e1d2ea01245576f90f7c1f3e1111dc6f00f,2019-09-13T16:29:57.637000 -CVE-2019-1177,0,1,93040aee1c46244a94e72f98d06df60cec811f9a4013de6e264832cc0850ac6a,2024-07-03T01:35:57.300000 +CVE-2019-1177,0,0,93040aee1c46244a94e72f98d06df60cec811f9a4013de6e264832cc0850ac6a,2024-07-03T01:35:57.300000 CVE-2019-11770,0,0,f40f9487a5169c75ec51585661d224a0ccbf53ef1c58de58dc37ac53a428524b,2023-03-24T17:48:41.007000 CVE-2019-11771,0,0,23e98d48dacf43bc985551af39733986051fca4a2a011fc43bf128a045fd7dad,2023-03-24T17:48:52.927000 CVE-2019-11772,0,0,2ea7f5315bf7acf461ff05751ed6244c9a2e542f091ef3bac76ead3813af0aac,2019-09-02T10:15:13.240000 @@ -130025,7 +130025,7 @@ CVE-2019-11846,0,0,2b196815de29a1e04c1093a26fcb121082239a954febeb471919de512d20a CVE-2019-11847,0,0,99cfb074b7635ba796e57ce2c442c9fcd9377f0b703259d603158a50d8a46d30,2020-10-19T18:38:21.800000 CVE-2019-11848,0,0,8f97233a10ebbdd47b91dc9fd634d7a7aaea697bf4f6f106ceae02b4e77de7cc,2022-02-09T19:26:12.647000 CVE-2019-11849,0,0,583dc99f2f7192cd3014eb7f1283b16ee9f0fd3ee417403636184b722019c563,2022-02-09T19:26:29.637000 -CVE-2019-1185,0,1,e8b2712c7242cd9011d3f9e1cbb080386a48fb6b215a295620f5dfc3671e0959,2024-07-03T01:35:58.330000 +CVE-2019-1185,0,0,e8b2712c7242cd9011d3f9e1cbb080386a48fb6b215a295620f5dfc3671e0959,2024-07-03T01:35:58.330000 CVE-2019-11850,0,0,85ef5ec9e1d6df3e0a0b61fa2d8e4e8167d25a8a9f737e5ee242b676ea9791b8,2022-02-09T19:26:45.310000 CVE-2019-11851,0,0,a79e4c8b96e92c000470dc136eb4aa5c9d91414d2c0bdf4bb862dd7fd93f77cd,2023-01-06T02:00:37.547000 CVE-2019-11852,0,0,e1ec5139c83f867243abd03da64b59cb01dfe072d8374dd6a5c6b2ebdbc904cf,2022-02-09T19:27:05.883000 @@ -130050,7 +130050,7 @@ CVE-2019-11876,0,0,21fe107ec12da4e6d8b965de48a8e966291d7ffe9a96e9b0525d786d78d6b CVE-2019-11877,0,0,414b71292959652680e943719563f6d7360477a93d7b9081584447645fc0009d,2023-11-07T03:03:17.643000 CVE-2019-11878,0,0,82c469b4580586d9d8b71f1f722dd6e05ab466091f7b63b0895b2e349b5fdad3,2019-05-13T14:06:45.330000 CVE-2019-11879,0,0,517f60c5cf19c544c059b4783f7c6c5013a6a9f91d45e14bb4a8203d06e0311e,2024-05-17T01:31:57.620000 -CVE-2019-1188,0,1,bf7964416dbc774063dfa047603f7946fdef595fa1ccaac92bbb2a408358027b,2024-07-03T01:35:59.260000 +CVE-2019-1188,0,0,bf7964416dbc774063dfa047603f7946fdef595fa1ccaac92bbb2a408358027b,2024-07-03T01:35:59.260000 CVE-2019-11880,0,0,48af937e6448ef3adc76176826e8e1bf10f06778a670ef78573fdae9a02c9f34,2019-05-23T12:23:08.497000 CVE-2019-11881,0,0,e8c437bf5bbe253c1171872adbe463d7c774c17a8b73ecc7a7c122bde2bacb11,2022-04-13T23:44:10.453000 CVE-2019-11884,0,0,fb32415eeda68ffc58495accd330708612f4f21dda0422b7a52a081187f7d04b,2023-11-07T03:03:17.790000 @@ -130082,7 +130082,7 @@ CVE-2019-11926,0,0,2ae2259d9385ca90884119fc78155834705fc66b792a5a83da0b38e8dcda2 CVE-2019-11927,0,0,0e1ac80867c5eee1ad0fab812a4c9a1f7d94ae5b1ab01e209bb904ac8928b7ac,2020-10-08T14:44:23.100000 CVE-2019-11928,0,0,a2ffc7dc329456abeb01e13bdf426e822c2ae243ec95144ad345880088b7675d,2020-09-11T18:30:52.303000 CVE-2019-11929,0,0,38d7ea4480eb23a3eb8ff0515cb597f7c7d6e8f8663a6c7ec9dcc7ac2e95b5d8,2019-10-10T17:14:58.233000 -CVE-2019-1193,0,1,f67fe1ad8de69ecdf266ce1aeeec06914a1a95ae5e29e4140db2027f5a5d1c3c,2024-07-03T01:36:00.023000 +CVE-2019-1193,0,0,f67fe1ad8de69ecdf266ce1aeeec06914a1a95ae5e29e4140db2027f5a5d1c3c,2024-07-03T01:36:00.023000 CVE-2019-11930,0,0,86612730a04c629b15a3ab99817f514aeb4f09a269360926a94341e6c1841710,2024-02-08T20:12:24.120000 CVE-2019-11931,0,0,28cf121490b03d619181188d348b71ec24fc1113bc9c62430f1c6d7c59bbb854,2019-11-19T13:39:00.187000 CVE-2019-11932,0,0,317fc10cfcf728c08cc315144f50409e612551ceaaebcfb39723f9bdb33fb42b,2023-03-01T17:58:13.130000 @@ -130093,7 +130093,7 @@ CVE-2019-11936,0,0,32032636edb10b551208dc3367105d7342ed925d5c584d98d7d27c73025b9 CVE-2019-11937,0,0,cf5f698c4a18f407418b991372382f62d0da236dca5bc16ab42a6a226e874dc8,2020-08-24T17:37:01.140000 CVE-2019-11938,0,0,4c487a2b4c3b9b16408a6de12f90d8a962964cc09304bb70da010abc7daedbf0,2020-03-11T16:21:00.180000 CVE-2019-11939,0,0,75ae64f0310d98b540c512138396d63d86c222debda12a4457b202e30609ceb0,2020-03-20T17:15:15.843000 -CVE-2019-1194,0,1,7fe9675dd18d5f46c761eb424364291df8c63ced421ee1392c20e7c0bfdcd3e6,2024-07-03T01:36:00.767000 +CVE-2019-1194,0,0,7fe9675dd18d5f46c761eb424364291df8c63ced421ee1392c20e7c0bfdcd3e6,2024-07-03T01:36:00.767000 CVE-2019-11940,0,0,0015c108e4e355876725734ec8a8ff36ebf15bc72455bc05bcbc06e9ae4dc3e1,2019-12-17T20:18:50.240000 CVE-2019-11941,0,0,2f7885a220d2c89ec11c4a6fb9fc19d195c51485c43c7102217bf454d8c3c856,2020-08-24T17:37:01.140000 CVE-2019-11942,0,0,d11c37671b4949b7a946ca4b07fe31d5cb11a6dd47ffc42b5c71f31cb07dfceb,2020-08-24T17:37:01.140000 @@ -130211,7 +130211,7 @@ CVE-2019-12043,0,0,1483d9273fe6286173d9c571264da751a4c545adf63142d2b55acf9bea28a CVE-2019-12044,0,0,d2d8f7540a3bd0f7dcb1aa3defa9f40c378506b3b010b5d4a92d7ef4fd0d65ae,2019-05-24T19:55:04.177000 CVE-2019-12046,0,0,5c59bd7292018b8b5ec2761e997ac78c23c7d91b401e9fa570a838d87b4684c1,2020-08-24T17:37:01.140000 CVE-2019-12047,0,0,51f1ee9ea24352a9c5d04fc77b386fd539eb8e31f262887b92c3d67d3e244adf,2019-05-13T16:24:01.007000 -CVE-2019-1205,0,1,1ecff39ea61bb669ff0e74e453c1ff3e5eb3a229efbb773f4048370ce62eaa4c,2024-07-03T01:36:01.620000 +CVE-2019-1205,0,0,1ecff39ea61bb669ff0e74e453c1ff3e5eb3a229efbb773f4048370ce62eaa4c,2024-07-03T01:36:01.620000 CVE-2019-1206,0,0,1470952df53a9b6b2298e0b039b6e8cb44d8637ffcd3f2da91c5fe9212045c55,2024-05-29T17:16:13.443000 CVE-2019-12067,0,0,383c1ff6e1f676c3f605bdda6ed7d13a60f1f9880588a729c707076e59a09f69,2022-05-13T17:28:43.707000 CVE-2019-12068,0,0,a8d0a360a14f97018ef259b4b4fd145a3351d7cba3e64a41b88e9e9e8a409b21,2023-11-07T03:03:28.070000 @@ -130375,7 +130375,7 @@ CVE-2019-12264,0,0,f68030caa5ae0703e1fb48b17f6872dbd93fe1212014214dbd091140392c2 CVE-2019-12265,0,0,4b371d2a787a47132d71ad34225ee2266cbcf0d3a68a208d649e0864e5a39358,2022-08-12T18:44:44.460000 CVE-2019-12266,0,0,66f7307e8480f9363142ba82c71f09cdeda204aa9fbe900988cc982d6a6b0710,2022-04-05T21:21:36.460000 CVE-2019-12269,0,0,d912d65a9560b4c74e9f4e1a475d3ea6df6c5ee6b15763e10f4e25ae7ec233f7,2023-11-07T03:03:30.620000 -CVE-2019-1227,0,1,e532088e11d4c0fb2150e508a43f06238b905512f60ab48b64cf50419a497320,2024-07-03T01:36:02.340000 +CVE-2019-1227,0,0,e532088e11d4c0fb2150e508a43f06238b905512f60ab48b64cf50419a497320,2024-07-03T01:36:02.340000 CVE-2019-12270,0,0,87a8e700c989c5c8eae3802130df3be7a964a1a4da63b8b6566617a73fa36d92,2020-08-24T17:37:01.140000 CVE-2019-12271,0,0,a7393142a074ee4d25c8423ce448303df8ecd43aeb2672debaf9f7e41bca48f6,2019-11-21T14:43:57.893000 CVE-2019-12272,0,0,75953f1be491a27e8ca150a1f0df59f1846c0a93845adbb6b4c04933d30198c5,2020-08-24T17:37:01.140000 @@ -130385,7 +130385,7 @@ CVE-2019-12276,0,0,239af9bb04c8066f4cc77373d211951d0afae6eee09558c16ee349a6f79bd CVE-2019-12277,0,0,3346e571c2923e6b877521f47be89c7fd42df874d2a70a5d0a12c44a9ddb34dc,2020-08-24T17:37:01.140000 CVE-2019-12278,0,0,86014793e04e9c29f543b7d410b4bf36f5c97b4ba2c63dbb9310bca63c87f1a2,2020-08-24T17:37:01.140000 CVE-2019-12279,0,0,f129cc628f2b3bab2d4f96804f22ddf566a41fed8066d58aa167b152a8c92493,2024-05-17T01:32:07.820000 -CVE-2019-1228,0,1,82b17493cd5756a48499c9a600e5abc400a299a12e553c0e36804f85fa08e564,2024-07-03T01:36:03.077000 +CVE-2019-1228,0,0,82b17493cd5756a48499c9a600e5abc400a299a12e553c0e36804f85fa08e564,2024-07-03T01:36:03.077000 CVE-2019-12280,0,0,0ca794aec379b9039519f16d3e67e574f93328405694796020d39d701e8e91e2,2019-06-26T17:27:34.290000 CVE-2019-12288,0,0,472d49831196bbed87811ae982841dd4f16882a3dced5b43f1d740b8cc538e1b,2021-09-13T11:38:56.497000 CVE-2019-12289,0,0,cf2241041fa1437e3f04992c7b78e02990215b9e62251e2ef66e8f3b9e0e2c3a,2020-08-24T17:37:01.140000 @@ -130825,7 +130825,7 @@ CVE-2019-12757,0,0,f687c5d5c4c255ec0bbcf17804c97f82386baed36eb157d4e7fc6a20e3b30 CVE-2019-12758,0,0,3c17162d0ff62e4971cf85d0bc866512f3b725616fd9c729233881f838cfe674,2020-08-24T17:37:01.140000 CVE-2019-12759,0,0,0f7bb9c723516741f1c61aaba4d259b83f1859534b8dcefcaaceac0081ed8d9b,2020-08-24T17:37:01.140000 CVE-2019-1276,0,0,daa1bb7861a768c3482ea34e2d0b31a4b4658fe9725100c05d3812cac82a7b41,2023-11-07T03:08:00.707000 -CVE-2019-12760,0,1,51837a5d82f02788bbc14f1a05677551c8cb6c5de9e8fa4cc34274d04b098920,2024-07-03T01:35:41.783000 +CVE-2019-12760,0,0,51837a5d82f02788bbc14f1a05677551c8cb6c5de9e8fa4cc34274d04b098920,2024-07-03T01:35:41.783000 CVE-2019-12761,0,0,9e10740652a7839a7498c10b211d6eeb2fe5d8683c3ac89c1b143714cbe3c87e,2021-08-03T15:15:08.047000 CVE-2019-12762,0,0,6df893e272a846d8878dfbdf98fb92c121e440dd777be6d32a4f7f74395a280b,2023-11-07T03:03:40.433000 CVE-2019-12763,0,0,feae6a1c16dec94964602f6b3b01cf783249c8aa9048b652926f7cd5abbe37f7,2021-07-21T11:39:23.747000 @@ -131629,7 +131629,7 @@ CVE-2019-13638,0,0,3929d8db3142d73c08e48d9672ca7631a8925fac91d6472c6f209414cf829 CVE-2019-1364,0,0,68252dd7056f67db2daff28c6f8be7866e301e68a1b0209f6488ea39139a1430,2020-08-24T17:37:01.140000 CVE-2019-13640,0,0,56f95f0554f5ae8474ca508fad0023180031bdc51c4699ee8d58c237a3ec248f,2023-11-07T03:03:54.030000 CVE-2019-13643,0,0,279c0a94beb2c88ecea565a3f7846e1946bae75788be46180d49fe2f363a0f26,2019-07-23T16:43:02.673000 -CVE-2019-13644,0,1,cad5d4d6086b8d2e53d7b79e7218758c30e412c72917a80b4f55449aa5d7cb7c,2024-07-03T01:35:42.100000 +CVE-2019-13644,0,0,cad5d4d6086b8d2e53d7b79e7218758c30e412c72917a80b4f55449aa5d7cb7c,2024-07-03T01:35:42.100000 CVE-2019-13645,0,0,47c3557b2606e7b253f0dfb998793a72f84bb8a3882971d6a4d2e703c6a8f806,2024-05-17T01:32:50.263000 CVE-2019-13646,0,0,fd054bac87abd16472def70b1922af1a5e3b0d08e4624062faf5ec3ed6a3b9ac,2024-05-17T01:32:50.350000 CVE-2019-13647,0,0,51b92d174e8894c3805530cffdd38e352ce3a7b9b747266e969ae011acc5369b,2024-05-17T01:32:50.440000 @@ -132104,7 +132104,7 @@ CVE-2019-14228,0,0,39cda72e09ff4abc467e804a00a685bb40e5cbba8e418677fae43574b88e9 CVE-2019-1423,0,0,1df3942a017bf096d3cfc32a86d8af5b8a392fcade709e8ff7f3b31ffce7bac8,2020-08-24T17:37:01.140000 CVE-2019-14230,0,0,a834a2a83b8e7263e597fe1139b3b1531a21c67d85ee25bfcd95e1a796e4e547,2019-07-23T18:55:15.377000 CVE-2019-14231,0,0,d0f633ffe1ff95d5d33151ce469c5cd6e457bda186b122f4fa774bb6c534fefb,2019-07-23T19:20:11.447000 -CVE-2019-14232,0,1,a7aaf80c55cfdfa6c64fb7144517386a2c8204612457ddd8b879c8f83311da01,2024-07-03T01:35:42.547000 +CVE-2019-14232,0,0,a7aaf80c55cfdfa6c64fb7144517386a2c8204612457ddd8b879c8f83311da01,2024-07-03T01:35:42.547000 CVE-2019-14233,0,0,2e69c723e5beac3de56f5148e599edc0c0b2cd57f38d5900bd520af10c61f0e7,2023-11-07T03:04:51.850000 CVE-2019-14234,0,0,987322a9571ecb30b73af9c37cd4ef931a3f73b1c9208538cf1aacff44532c1b,2023-11-07T03:04:51.923000 CVE-2019-14235,0,0,df2c5de8456bd171072db4762ffce0de65bd411c848d5b72cac1a5a6486e9a25,2023-11-07T03:04:52.010000 @@ -136574,7 +136574,7 @@ CVE-2019-19583,0,0,92aaa160852ed67c7a6cf3e744762baf4c5bc7452e210fcc788d3d87b13e5 CVE-2019-19585,0,0,30b88ac7fd830ce01bdf80a1e33329e8a5dbef1e4d59a678953034abd6a0bbbf,2023-01-31T20:46:45.367000 CVE-2019-19587,0,0,7f6e16417dc9f15817bf1c1ed83742ff8bf13a3a414e5f7b7ffd0cbd4e7e3ac4,2019-12-06T17:47:23.397000 CVE-2019-19588,0,0,eac68a7e022cefcf32a1011d48747efb9976e1d181bbb307b4c3227ca2bfecc1,2020-08-24T17:37:01.140000 -CVE-2019-19589,0,1,7062403f1a155a75bfd14870988c168e03b96f57cc7459f9e4d256077b1285cc,2024-07-03T01:35:45.240000 +CVE-2019-19589,0,0,7062403f1a155a75bfd14870988c168e03b96f57cc7459f9e4d256077b1285cc,2024-07-03T01:35:45.240000 CVE-2019-1959,0,0,13121ee34c6369c694a176d38efb98e3d43e6d4b11fd16b9a1086d9aae5dcad7,2020-10-16T14:43:26.960000 CVE-2019-19590,0,0,f2241bf7b74d156ae15fcbfb8359a8fcc95b93e930332a9a6d1c8db9adac4598,2023-11-07T03:07:43.043000 CVE-2019-19592,0,0,7024a05733eedda8e93ff558f9761417cfdf0608e6f2ae8ea132262d897bcd1b,2020-01-28T17:31:36.363000 @@ -136711,11 +136711,11 @@ CVE-2019-19746,0,0,7496dbb7701f079fb861542a8268868f4ce34c0bcaa82c3f8ce824c47836b CVE-2019-19747,0,0,e4d055d4e13a340b85243a2e1ebc118c37ba99de09a620117e3d033feedaa2ac,2020-01-03T16:21:05.267000 CVE-2019-19748,0,0,e70c2bdc7244c49603d02a6d1b7d6c46ceed54dd81a456dfefd903920efd3dfd,2019-12-13T13:34:04.483000 CVE-2019-1975,0,0,8ebe91cd136ef9f649067e00c81bd549551eb5b0112e0b690422ffed67ca50ba,2021-11-02T20:03:38.680000 -CVE-2019-19750,0,1,6d810aefe05e2924b202e94ea3b33f6e56245239530b0ad7a6266669ab22c56c,2024-07-03T01:35:46.357000 -CVE-2019-19751,0,1,333e2228e5359aa9aa6607b9b93a13db1e1e4a3afd8a27e1b0809b961a7ade91,2024-07-03T01:35:47.590000 +CVE-2019-19750,0,0,6d810aefe05e2924b202e94ea3b33f6e56245239530b0ad7a6266669ab22c56c,2024-07-03T01:35:46.357000 +CVE-2019-19751,0,0,333e2228e5359aa9aa6607b9b93a13db1e1e4a3afd8a27e1b0809b961a7ade91,2024-07-03T01:35:47.590000 CVE-2019-19752,0,0,dfe9c1df0a680d1561153b191102a594f6d317df7ea9df43ba32d8dbec04c3b6,2024-04-30T19:35:36.960000 CVE-2019-19753,0,0,3ccdf4a6e040eb77e3741e3e2fdfe10f25b5beb0c35bbe1d95862e288ea52202,2024-04-30T19:35:36.960000 -CVE-2019-19754,0,1,cea16ae880519bbe1d98fa9bfa11e9d2b0fb7aed20d6d73373e4fe599034df53,2024-07-03T01:35:48.790000 +CVE-2019-19754,0,0,cea16ae880519bbe1d98fa9bfa11e9d2b0fb7aed20d6d73373e4fe599034df53,2024-07-03T01:35:48.790000 CVE-2019-19755,0,0,37035b7734253d64f3c91a48c186318fb5da18e51dc2cafe38b526cdbeee8569,2024-04-30T19:35:36.960000 CVE-2019-19756,0,0,7f008bf0df7cd341019a0ca12092f2bebc077861b764b1f2e41153e961e981ef,2021-11-02T19:16:30.403000 CVE-2019-19757,0,0,3fb6636c3c4c4520c83d7d95a0bd50df6cb961a31e5298a5b5c721d326e59bde,2020-02-24T17:53:03.400000 @@ -141827,7 +141827,7 @@ CVE-2019-7252,0,0,867184020b08f3fc709306c75a2c692cefc343ba6b5fd49a37a531f1cdf36f CVE-2019-7253,0,0,fad52b53282803d4d4d5e4e473135d9e4346b8ca3d896ff1b05ae3d9f491a8b9,2019-07-03T17:19:15.327000 CVE-2019-7254,0,0,f01c4cdeab11b9ee74f295802daff28c7992564c5d93a420f6f97a384f4473f8,2021-10-04T17:15:57.257000 CVE-2019-7255,0,0,d0345945117860857123641eb29c7700e1e9f797af57bb14c8b9d8b6af6257bb,2022-10-14T01:21:44.847000 -CVE-2019-7256,0,1,14b4138b3293797f26382877efae69f5fc1e1a68710e578d84f5e0f410906836,2024-07-03T01:36:04.380000 +CVE-2019-7256,0,0,14b4138b3293797f26382877efae69f5fc1e1a68710e578d84f5e0f410906836,2024-07-03T01:36:04.380000 CVE-2019-7257,0,0,c12bc70a2706aa0b1a235996b97baa21edcbdbf4fa73b5dff9cad9d98f3e95db,2022-10-14T01:32:10.637000 CVE-2019-7258,0,0,871837c4692b71db165da95382f732357ce210cf9527f590a57fa413b26df05a,2022-10-14T01:33:11.630000 CVE-2019-7259,0,0,46f6a86727161a6a5d745e3c1fecd80f0957dd84595b021b3c0adac240e889d9,2022-10-14T01:13:17.953000 @@ -145635,8 +145635,8 @@ CVE-2020-10669,0,0,ca180d01384ad04211e88b90747df0627ef485a81d37f2bb8db8060c8dd1e CVE-2020-1067,0,0,cba45e175cb0f0af5d654f778f97d1af9f501d95d704e7058e011b36065c6ac2,2021-07-21T11:39:23.747000 CVE-2020-10670,0,0,ef0a633832ae1ca45856ae10f6b9ba4ffb97d4d1fc3cc5be00209c2b638db391,2020-03-23T17:03:14.620000 CVE-2020-10671,0,0,b82ba2c53c108dc3e8bbf691d0cee73d71d98ceb0d16a6f21aa6c5dc5b274392,2020-03-23T17:01:31.067000 -CVE-2020-10672,0,1,56835e004683f5ecf74c0f32f01633e8b341a8f4c52eaccbf82eb3fe1e1a84b9,2024-07-03T01:36:05.477000 -CVE-2020-10673,0,1,49946108bcc66fc635cf0574a751942b0b59464362ddcc07a037d56372419304,2024-07-03T01:36:08.040000 +CVE-2020-10672,0,0,56835e004683f5ecf74c0f32f01633e8b341a8f4c52eaccbf82eb3fe1e1a84b9,2024-07-03T01:36:05.477000 +CVE-2020-10673,0,0,49946108bcc66fc635cf0574a751942b0b59464362ddcc07a037d56372419304,2024-07-03T01:36:08.040000 CVE-2020-10674,0,0,859a4999220ce9f0d901a775804f7753d41501bc260a029f8134f02b1bf7919b,2020-03-20T18:49:20.243000 CVE-2020-10675,0,0,72c9638ade8e468e4ab12470847853fb84bf9317a75be409f0563da6d6910b8b,2023-11-07T03:14:11.810000 CVE-2020-10676,0,0,fdf7aed059478f7b29b03a739d64d1da62f291cdb9617d598f7993690c9c7e1d,2023-12-14T20:43:09.407000 @@ -145937,8 +145937,8 @@ CVE-2020-10964,0,0,789daf866b4cea0ad7c47cb0af6a4a6f5bddf436f8039c48d5677f470c727 CVE-2020-10965,0,0,b29cbabedf8f07f4b5028c7e876e76e9500743ae3c0731522bef3a7430c26ba0,2021-07-21T11:39:23.747000 CVE-2020-10966,0,0,2e788631c0a069733b98e8a42e09f1ca0fadb43cfe103322fbb528ab81f1b408,2022-07-12T17:42:04.277000 CVE-2020-10967,0,0,3afe2f47594a5f145c1f672b478c4d780ad66ef175814ed89bdd884d6e20c61d,2023-11-07T03:14:26.377000 -CVE-2020-10968,0,1,f599a069efc70252dfee9bb03ee205e042965aac96cccc2ed6ec39ab8964a5e4,2024-07-03T01:36:08.923000 -CVE-2020-10969,0,1,e9212f9376de482f002b50a6d538c2ce2fd8555382b098d5d5a929571d76d6a1,2024-07-03T01:36:09.833000 +CVE-2020-10968,0,0,f599a069efc70252dfee9bb03ee205e042965aac96cccc2ed6ec39ab8964a5e4,2024-07-03T01:36:08.923000 +CVE-2020-10969,0,0,e9212f9376de482f002b50a6d538c2ce2fd8555382b098d5d5a929571d76d6a1,2024-07-03T01:36:09.833000 CVE-2020-1097,0,0,e6d083bca31c50a4178d18048befc674230cf885e8b99d1626f7ca9d2a1932a9,2023-12-31T22:15:56.483000 CVE-2020-10971,0,0,480232982d571aa27978514624b28209cd445aa6b479b2abe0bd553ccce4f8d5,2020-12-04T20:15:12.457000 CVE-2020-10972,0,0,8e2f24cb04672f00c2d5487f900f2f40e6426cd790274bfc42e8f768ed887db7,2022-04-29T13:26:17.740000 @@ -146090,9 +146090,9 @@ CVE-2020-11107,0,0,234d4afcfe2da914e7311fa76a7145ad1984ec19d982195bcd88cfa4623cf CVE-2020-11108,0,0,612ccc5af55f3277e008d4fe0c713113038aa744877ac65a45cdbeb536ad0003,2020-05-27T18:15:12.877000 CVE-2020-1111,0,0,94693c5467c80e8119c002c3657b6b41315d5bd60168637ef8c8c3fcb85d5dc0,2021-07-21T11:39:23.747000 CVE-2020-11110,0,0,8413f7ff7453a9361141dcde9f8dd8f071bc38d977a54eccb8a1f77f3c5f6a28,2023-02-10T18:04:39.533000 -CVE-2020-11111,0,1,c1b9e1068ed1042d9fa47d36acac752e4c4a38570f7026f99233be2e521503d9,2024-07-03T01:36:10.713000 -CVE-2020-11112,0,1,3b9cba4c70d9c218d61e553e0613e84e49c867f4a920ebe05ff8b12d7d48249c,2024-07-03T01:36:11.610000 -CVE-2020-11113,0,1,4f61752188f30358c7ba5f84100ef4cbc37de0014e8ea29a6b7124414cb31051,2024-07-03T01:36:12.463000 +CVE-2020-11111,0,0,c1b9e1068ed1042d9fa47d36acac752e4c4a38570f7026f99233be2e521503d9,2024-07-03T01:36:10.713000 +CVE-2020-11112,0,0,3b9cba4c70d9c218d61e553e0613e84e49c867f4a920ebe05ff8b12d7d48249c,2024-07-03T01:36:11.610000 +CVE-2020-11113,0,0,4f61752188f30358c7ba5f84100ef4cbc37de0014e8ea29a6b7124414cb31051,2024-07-03T01:36:12.463000 CVE-2020-11114,0,0,471860a51c3eb980b75f4bbf7582476bfded90dd273b52b8aa8ccbfdd440f3e3,2020-11-09T15:53:08.420000 CVE-2020-11115,0,0,f31d58b5f3099cfe3485029d85b455a04ac89b0b35cac74a122f80b04f3c4516,2020-09-11T16:50:52.697000 CVE-2020-11116,0,0,27ff1607d791666f6536537da0e97ebe7e410ae99e867726b5c402280280cf1b,2020-09-11T16:45:56.233000 @@ -146825,7 +146825,7 @@ CVE-2020-11872,0,0,b5192f35ade26ae7b6d9340eed7d7bcbd14ddaccd0a3e643f65abf820e9fd CVE-2020-11873,0,0,9529d5617866f0edcdb90f9535fc045cb78258e51f0fa7e106fada731d8cc097,2020-04-22T18:00:12.197000 CVE-2020-11874,0,0,6119315304de60f0e01b30236326d368426e0b5f9e3e549957cf8b0dd9f6a83a,2020-04-24T14:33:38.877000 CVE-2020-11875,0,0,0528c15a7a16c7d6eba47b4f13976efb17c6b8c56559848df161fbb8f954b311,2022-10-05T16:54:28.790000 -CVE-2020-11876,0,1,dc8638b13cdde6b23736ccc1a119415afa07ed7852fafc98a53b970c0c8fa83a,2024-07-03T01:36:13.627000 +CVE-2020-11876,0,0,dc8638b13cdde6b23736ccc1a119415afa07ed7852fafc98a53b970c0c8fa83a,2024-07-03T01:36:13.627000 CVE-2020-11877,0,0,07beec8f166536dd7a800282e5deee8bff661c08cd99530e5ee36198cb117bf1,2024-05-17T01:41:47.333000 CVE-2020-11878,0,0,a9d992d688915ee32ba14077f1669a6391a1d5eacefec9896f80816c2c207a69,2020-04-29T19:10:17.993000 CVE-2020-11879,0,0,a9518de536873369c2911a4347ce729006a3713b3899c6414aa0b8ee67dc3ded,2020-09-04T15:00:27.887000 @@ -147501,7 +147501,7 @@ CVE-2020-1266,0,0,be568c62410ad866d9e5ce6f856285eef36527344ae35a531c0ace60bf4aa7 CVE-2020-12662,0,0,a50202a22e5fd6ca70e2ddc132c2e601eb50d5054d053a8739f12375441ac6cf,2023-11-07T03:15:42.370000 CVE-2020-12663,0,0,75beb77ebadaa78b84642c5f4c9f19cfe75a93733a1e1b2a433185b1f5b74682,2023-11-07T03:15:42.447000 CVE-2020-12666,0,0,fe755727c03d8130c7fd2ed15e9ba86f693d12f15275354037125d23793eaa13,2023-11-07T03:15:42.550000 -CVE-2020-12667,0,1,414678b138cbfb1bbb2d578be2c93f5a9af489ffb004114f9d6370837eedba98,2024-07-03T01:36:14.667000 +CVE-2020-12667,0,0,414678b138cbfb1bbb2d578be2c93f5a9af489ffb004114f9d6370837eedba98,2024-07-03T01:36:14.667000 CVE-2020-12668,0,0,76729c036030ac405133032ed3ea2891f1f66ef07a3eb7665de76e2610c0bcfd,2021-07-21T11:39:23.747000 CVE-2020-12669,0,0,74ee601d98fd6ad7039430102906960989d828cf9bd6e4c06ed3d687ff46d97d,2021-07-21T11:39:23.747000 CVE-2020-1267,0,0,05789cc17c6058015a629047859d2317dbbb98762c770905ae60901f6166798e,2021-07-21T11:39:23.747000 @@ -148443,7 +148443,7 @@ CVE-2020-13650,0,0,dba55786a9ea124bbd14220955a280022e0ce1a3e8d672a7904b5f66d94ec CVE-2020-13651,0,0,50c746ffb71ca84b046d757a7848f7175786e0869d05d2cc239657edf730421c,2021-07-21T11:39:23.747000 CVE-2020-13652,0,0,cff0704a1fbefa6f723a5cb2989b219f95d9103cd07641cc750232a604786c0f,2020-06-19T20:59:55.207000 CVE-2020-13653,0,0,9fef6b45a0a781f00b6828e1f457e89fe2cdde8f5c218d1d160eaf76a53c6a7f,2020-07-09T20:29:57.623000 -CVE-2020-13654,0,1,81a0537524936069ce9943df110188f2140b759f7b45537dd33d093232dddaf0,2024-07-03T01:36:15.643000 +CVE-2020-13654,0,0,81a0537524936069ce9943df110188f2140b759f7b45537dd33d093232dddaf0,2024-07-03T01:36:15.643000 CVE-2020-13655,0,0,cfff03f7dbb0df535a07fb959ac7512a05926b864d92d1c47cf259888aa91aee,2020-09-03T17:46:54.660000 CVE-2020-13656,0,0,f55cc4f8690e2d2f608187ea1c0bdb574220f80af769fac7330ad9cddcc2e272,2020-06-22T14:30:03.077000 CVE-2020-13657,0,0,99601111e23533f43a07e7bc67e19a627db3fc9f179bd54ec8629d70e39bab60,2021-07-21T11:39:23.747000 @@ -148743,7 +148743,7 @@ CVE-2020-13961,0,0,1fe463453099b23513150647de34a505435c3e49bfb1bd37008a666a6fd18 CVE-2020-13962,0,0,73efb252eadcc56a142d208d0445dc25a58d319b90a52e53e0c7ef8825dcf6b3,2023-11-07T03:17:04.313000 CVE-2020-13963,0,0,5a2208f871acab2397f31e74f10b59d9b44e43f17a6c3a1b3c64f29aa547891c,2022-11-05T02:04:33.607000 CVE-2020-13964,0,0,4164273b77e227c4c8f846f5383d7c8a507930d52d88ee08b556d2b4408e2e82,2023-11-07T03:17:04.400000 -CVE-2020-13965,0,1,b04e91d8ea362586bb8f8dcbf311dea1d4e8a30a5c488066eff65e7714f6d3d0,2024-07-03T01:36:16.497000 +CVE-2020-13965,0,0,b04e91d8ea362586bb8f8dcbf311dea1d4e8a30a5c488066eff65e7714f6d3d0,2024-07-03T01:36:16.497000 CVE-2020-13968,0,0,31f2705e5110608578328547025f665cb791c3bf95647fd72cce63dd0efb9c76,2020-12-23T19:23:28.590000 CVE-2020-13969,0,0,ef7ada27dc8f94a96c31abd823098e38b638d6e725d18bf5b8b998ea32c4422f,2020-12-23T19:21:31.573000 CVE-2020-1397,0,0,e79ab87fef1aa5c692c9714693118d984c5317843a4a8b70d569e39bb4504ccc,2021-07-21T11:39:23.747000 @@ -149028,13 +149028,13 @@ CVE-2020-14314,0,0,11f037baceaa255bebdcf1ccb895640bda674f2f00e67ea6d8dae6acdab91 CVE-2020-14315,0,0,316b042e84fa6bb45845d0aa3fe5dd7e4b5e86324465cb8665189319a204d9d0,2022-01-01T18:38:25.567000 CVE-2020-14316,0,0,e80af924cebb78b9cf35cf5905e163a83b5cb62d9dba60cb94af15eb84b444bb,2021-07-21T11:39:23.747000 CVE-2020-14317,0,0,cdda4d77e183f0751e3a94da2ba7e99b403e8098cf3058c236e7c7cc9f3c4edd,2021-06-10T19:34:49.500000 -CVE-2020-14318,0,1,c04c201e8d2aec53f91e89b0f5d6357f4ee790e376413118559a7523c6f28c4b,2024-07-03T01:36:17.507000 +CVE-2020-14318,0,0,c04c201e8d2aec53f91e89b0f5d6357f4ee790e376413118559a7523c6f28c4b,2024-07-03T01:36:17.507000 CVE-2020-14319,0,0,0705adf5d12c3d901038f515df6ac33f815666de2227a60ec76c6d99ec1ae006,2020-08-12T14:16:48.007000 CVE-2020-1432,0,0,38bd03d5c139278aa3aa8dd6915ff2181722853e76c94ca4a8be7d79e85cb97c,2021-07-21T11:39:23.747000 CVE-2020-14320,0,0,067327c76855c6973adab6e64127421729a695bd5e5149a5d881e487234d4cc2,2022-08-17T15:17:47.090000 CVE-2020-14321,0,0,a78f441212fdcd3943e422c0afe71b6576b7c0cd09dfba842fd604e11346c92e,2022-12-08T03:19:52.513000 CVE-2020-14322,0,0,dd031b3adefed2f31c576493d7ea59ec6008cb796e713a80407cff1d9e3d7b0a,2022-12-07T02:55:05.243000 -CVE-2020-14323,0,1,3445b5d9b53bf562c58c32ea74333ff45b304ec443f45235d8bcd733c1f9a164,2024-07-03T01:36:18.413000 +CVE-2020-14323,0,0,3445b5d9b53bf562c58c32ea74333ff45b304ec443f45235d8bcd733c1f9a164,2024-07-03T01:36:18.413000 CVE-2020-14324,0,0,7fbdea3533007b8b583e2fa55e5c4cf6c4d42fc8194bab55378516d60684a539,2020-08-13T16:46:55.333000 CVE-2020-14325,0,0,24693bbc5060f44409b40d7b0f0a06ced2e9c286fd0530c97ddf949c8e827486,2021-07-21T11:39:23.747000 CVE-2020-14326,0,0,bf7b27e7ba1344e88c33495f802fd065f8633f8a4b9392d86d299759bfb78c26,2022-07-15T17:38:28.783000 @@ -149647,7 +149647,7 @@ CVE-2020-14926,0,0,db4e55043a7b6d0ab2a53d74f9adaf601ce2fe836ae320a6ea2b788354e87 CVE-2020-14927,0,0,2f106dc8fb4a619ece51c6fb69ae04d863a6bd4a7623316c29837214fb44b40e,2020-06-24T12:44:32.627000 CVE-2020-14928,0,0,263191a132f641387ddd05882e3af334a2e1aea264e79ce6cb8754d1ef3ef37f,2023-11-07T03:17:22.757000 CVE-2020-14929,0,0,35bcea656d2973ea5f7d0e8fa22943f1ed53585d2305d1cd692c52f28c2ed4db,2023-11-07T03:17:22.837000 -CVE-2020-1493,0,1,6926336219310eaa2d8722c85b7db2ddbd0b10505ec0944a03865b33089c04f1,2024-07-03T01:36:22.230000 +CVE-2020-1493,0,0,6926336219310eaa2d8722c85b7db2ddbd0b10505ec0944a03865b33089c04f1,2024-07-03T01:36:22.230000 CVE-2020-14930,0,0,fe9db2c89ba65e31cad0bca48b53eb500e2f8c5bb839a55f12cd15224bdaeeda,2021-07-21T11:39:23.747000 CVE-2020-14931,0,0,e897bbad88afece8061022c6ccf7db080495022a9b61b11630ab834013b3442f,2020-06-26T18:47:20.987000 CVE-2020-14932,0,0,5e08de888f262f4b4cdb20a772958e13162ae4326a121481dc399903a6a1e398,2020-06-26T19:03:39.820000 @@ -150477,7 +150477,7 @@ CVE-2020-15774,0,0,7f669c74d4a450851527c36b8ccd034885afba84a49fad252ecac3b24b384 CVE-2020-15775,0,0,16dc699c12ee8715f35173c89ff9ca93a846b39f589d4ad8c84ee2eb1808e2dc,2022-09-30T03:38:56.237000 CVE-2020-15776,0,0,83011097c7d543255a913e4959a8fbe15ce1d5c55410d53b547d64de792da90b,2022-09-30T03:39:31.617000 CVE-2020-15777,0,0,fff83a2e8ead54e2c6e308797a62a0646f12295ed75fbe496761aa37f2772a62,2023-05-16T10:53:55.200000 -CVE-2020-15778,0,1,f6c6f840023664934ad53b2c20a82e90e3515e55f7e97837622538d882948497,2024-07-03T01:36:18.793000 +CVE-2020-15778,0,0,f6c6f840023664934ad53b2c20a82e90e3515e55f7e97837622538d882948497,2024-07-03T01:36:18.793000 CVE-2020-15779,0,0,bc6409af642c369c1174ce8617de74bd300ad9386b23f60b61fc6d1f6a76e8eb,2020-07-22T17:06:55.403000 CVE-2020-1578,0,0,a18f82251171f635f0d3275c3c425b4aa23a8e88b94eb335a3ed501d4a1876bd,2024-01-19T00:15:19.627000 CVE-2020-15780,0,0,699270fed47a8454a4711fc9cb455314cd285aeab3a82e6610f5ed1ef34a4255,2022-04-27T15:44:41.210000 @@ -151712,7 +151712,7 @@ CVE-2020-17515,0,0,b9ea468468ff921fe86bb29317afe15999bb9e8acd56c04de22c44a3c44e1 CVE-2020-17516,0,0,aec899ffce214285b5fc00810f926119a3b2a0e5b9234fe4df0136b5e9ee6c2c,2023-11-07T03:19:12.413000 CVE-2020-17517,0,0,e57f8498c8e6974eebe301708a418fa30210de71584034ce279b24f095df3efe,2022-08-05T17:12:46.173000 CVE-2020-17518,0,0,daa2c88d02dd0aa54a186f84810417e21874c98a0279b98c0b237cdcb62e335d,2023-11-07T03:19:12.540000 -CVE-2020-17519,0,1,ee5431afe97b51aaac491e61ff0e3d4572f4f3f2cff1f25f528c484097433479,2024-07-03T01:36:20.030000 +CVE-2020-17519,0,0,ee5431afe97b51aaac491e61ff0e3d4572f4f3f2cff1f25f528c484097433479,2024-07-03T01:36:20.030000 CVE-2020-1752,0,0,2e8d828892809fece2039127c34a2042793c9d5fc1907e321ded9d79de475846,2023-11-07T03:19:33.337000 CVE-2020-17520,0,0,7b53e64eb7d9b93274b75df4e0956be00e02218d21c5618af95f2af576e8f301,2021-07-21T11:39:23.747000 CVE-2020-17521,0,0,ad3f32118d1f52088c1208d11c2f8e5a04ae0f368a8398ed10f42ca8c6165c50,2023-11-07T03:19:12.847000 @@ -151878,7 +151878,7 @@ CVE-2020-18280,0,0,f572efa78737139e378997143345ebcbe7d680f8ec8f30d9e6db57e161ed5 CVE-2020-18282,0,0,829d96b0a674e14506a6a9ffa89aae374a349439b328984134ba89b922820e92,2023-05-11T17:53:25.337000 CVE-2020-1829,0,0,14375d49f5ca4b48644883646cf93382161f5f31c7c3252b7a611b13c9396b74,2020-02-20T19:39:27.533000 CVE-2020-1830,0,0,cc344be753badd3618990beb6b93749b1175539d4edc1848241fea50a93f8cf0,2020-02-20T19:37:59.400000 -CVE-2020-18305,0,1,4c6564b5ce52fb4fc88556a5239b2e92e4049ca8d9f8b8abe3638ad7e20ebb5b,2024-07-03T01:36:20.330000 +CVE-2020-18305,0,0,4c6564b5ce52fb4fc88556a5239b2e92e4049ca8d9f8b8abe3638ad7e20ebb5b,2024-07-03T01:36:20.330000 CVE-2020-1831,0,0,c951921907f752352eb7f724df92f8ff0efe9d828b4db0d7022e5f244a6f2372,2020-06-02T17:25:31.950000 CVE-2020-1832,0,0,2fb508bbc7ecec29eea154fe537e9f7e439a0e4d11011ee7f4acaf0e3bc17e86,2020-06-02T14:50:52.420000 CVE-2020-18324,0,0,47a53b7208913a7317b437f45ce32872ca1fb7a8a91930b053c72f8b7ed48b3a,2022-03-11T14:44:15.817000 @@ -152057,7 +152057,7 @@ CVE-2020-18897,0,0,673ef3e9eafe06b09ce86d015e8cd9e0db49d33b6e0dcd25325855b7313d1 CVE-2020-18898,0,0,66cfc8a38f2073824892187b68493877a2f0d61208a31db863f20a0c6c51a899,2022-10-26T19:09:58.010000 CVE-2020-18899,0,0,712ef9c472a719306990f6053779bd42098bcf2ff480d608376c279d5c665d1f,2023-12-22T10:15:08.330000 CVE-2020-1890,0,0,3cdb951463da8abe5ea297907b86e151c4a443bc103c9f6cdb79e1153cc757e6,2020-09-11T18:05:56.863000 -CVE-2020-18900,0,1,5ba78fa974661e6726324b92704e4116ffcb0b3a00580e956afd92df9ebb8ca1,2024-07-03T01:36:21.130000 +CVE-2020-18900,0,0,5ba78fa974661e6726324b92704e4116ffcb0b3a00580e956afd92df9ebb8ca1,2024-07-03T01:36:21.130000 CVE-2020-1891,0,0,03402ddca00426d38b239a4f1a38abf1d7da8b71f29359b01f87f9faed2a9b42,2020-09-11T17:53:14.820000 CVE-2020-18912,0,0,266315262e21eb8446000c55e1c63eca0739df02b6aebd058ee92cf79b90ed27,2023-08-31T20:34:31.370000 CVE-2020-18913,0,0,af2e5cd6795f909ec6726415570b2c734f280b060926d8f507a9b68fde087926,2021-09-01T20:59:18.617000 @@ -154732,7 +154732,7 @@ CVE-2020-25566,0,0,67c7dae13f4b90e8c4d52e2816b9ac7efcdd96fd8c10702721374b1c3f7cd CVE-2020-2557,0,0,65114866a5d0c57368eca07bc96e1f090929809a615afc4a341c487168d48101,2022-10-25T17:57:21.693000 CVE-2020-25573,0,0,7a25910a7ab815890aa0a8a93657f2f73996ba3d859976e94b28f2be9710c2e8,2020-09-22T17:47:51.177000 CVE-2020-25574,0,0,567efd5875951c4e78573a8f2bc11f8af6ad8dc48a01b592566283efcf37e9ac,2021-07-21T11:39:23.747000 -CVE-2020-25575,0,1,399c2f9ad768ce46d2151034f247fa80fda45b447ee3028166e3915ae7d1002a,2024-07-03T01:36:23.557000 +CVE-2020-25575,0,0,399c2f9ad768ce46d2151034f247fa80fda45b447ee3028166e3915ae7d1002a,2024-07-03T01:36:23.557000 CVE-2020-25576,0,0,345c0c46875b3ee90df1f162173f032b35466da7801ea26fd3a301a79f49777f,2020-09-22T17:38:58.223000 CVE-2020-25577,0,0,25047294b24f503e4ed5bbddf2a93b4988862148f53ad5f4c612f090a1ca1fd2,2021-06-03T19:12:25.530000 CVE-2020-25578,0,0,f106ef3c849f981b7dc94d7ee5e69bf45f39abaa86e689c08d0dd377cd5161cf,2022-06-28T14:11:45.273000 @@ -156515,7 +156515,7 @@ CVE-2020-27980,0,0,830e0577abb68165c9c35cfee8a51a6c60b275961913eacc553537d4de1e9 CVE-2020-27981,0,0,3bf1cf696baed293d6f1c494649e96f73f2b4efb503676e9261e973789bcf998,2023-11-07T03:21:05.573000 CVE-2020-27982,0,0,70ca59fb1385b23162e90bbdce886489f3ca652b5a09f2b283acf812a05b7f88,2022-06-29T19:26:58.403000 CVE-2020-27985,0,0,a9fa671040ba0d03eb80352920f757134e4910d5a213c85f82de8aa9c0ebf9f9,2021-07-21T11:39:23.747000 -CVE-2020-27986,0,1,cc5e7329ab11785b75655e2c2419f81239734db3e4347bdbeb7bd534a6842cec,2024-07-03T01:36:24.937000 +CVE-2020-27986,0,0,cc5e7329ab11785b75655e2c2419f81239734db3e4347bdbeb7bd534a6842cec,2024-07-03T01:36:24.937000 CVE-2020-27988,0,0,9ab79366c3ed68b76b66778fd7f6c57d888326736f4fa82fc9799e7aa6b4af17,2020-11-17T17:32:48.473000 CVE-2020-27989,0,0,3c3e6dc04c4234121f699bdd521cd7d0f355fd8ce641076508fcbeb790e32104,2020-11-17T17:32:47.300000 CVE-2020-2799,0,0,7d72c312cfb2fb0910af2d8f59bd0858966d4f8190716eb8e73ddd03b3a31f1f,2020-04-16T16:26:49.680000 @@ -156676,7 +156676,7 @@ CVE-2020-2824,0,0,1b3839e690239e450ef59e3ea9ce79ec653bbbd631a6c0510b497b249f8111 CVE-2020-28241,0,0,2118c7a09bd70d775b0c7b5012205a38632906f6eb54c3a3b193c9a6d0339ed1,2023-11-07T03:21:08.773000 CVE-2020-28242,0,0,a991398b2a2de3e82e9526dd86cfec431befdc15722d23a2d322ac76a63478ea,2023-11-07T03:21:08.837000 CVE-2020-28243,0,0,c34f2b4d09890f3ab1d571b65534f37170456ebf56bb4b342197109455d8ffe4,2023-12-21T18:31:01.147000 -CVE-2020-28246,0,1,352212eb398939f43a14d09ec0345c80a2c6b356422ba209ee6de81d8fbbd058,2024-07-03T01:36:25.867000 +CVE-2020-28246,0,0,352212eb398939f43a14d09ec0345c80a2c6b356422ba209ee6de81d8fbbd058,2024-07-03T01:36:25.867000 CVE-2020-28247,0,0,746f877bb001e17d44affe5c44ffa78d2b337205523a4e4f405079cf6652a2e1,2021-01-29T01:00:46.653000 CVE-2020-28248,0,0,cef6e3d5bee771e4a44b7fb8a23466a07d115803d24dd3f38876d0e696b9dfb7,2021-07-21T11:39:23.747000 CVE-2020-28249,0,0,c320854d40e07ad6da93ecb085c4a2a5a23620de069fa64a6444a115124b1629,2020-11-12T18:34:15.967000 @@ -158283,7 +158283,7 @@ CVE-2020-35582,0,0,ee5284a7a3cca5f67b4bdc6cf6f76e8cc75b5ec0259dc2c8d0abaf6ad990c CVE-2020-35584,0,0,288906065e688dd2dbae1754b70b86bfad18dfd34985a87d8671a59eaf3caba3,2021-07-21T11:39:23.747000 CVE-2020-35585,0,0,585ac6de2dc64bac03f29d6c23beaa404c60dcb9405f249d8b8a3f36aafc6aed,2020-12-23T19:38:55.317000 CVE-2020-35586,0,0,9b76047f8ab5a4bc95aabe6b4c27837eb6133fa9ae245aab96d902336d66debd,2020-12-23T19:28:56.907000 -CVE-2020-35587,0,1,548418e097a8b76c91c475e45b2825b69ffc84b4a3b6c50c9822467ba7417691,2024-07-03T01:36:27.170000 +CVE-2020-35587,0,0,548418e097a8b76c91c475e45b2825b69ffc84b4a3b6c50c9822467ba7417691,2024-07-03T01:36:27.170000 CVE-2020-35588,0,0,f584e4ea74dbd372544ac65900975a31ed047b271e7b5435dcaee28e08046e6f,2023-11-07T03:21:59.303000 CVE-2020-35589,0,0,a04322dd757c2b9d97ab16eaaa6f39a43fa088fac6586c52e6df3d809080c05d,2020-12-22T19:53:04.990000 CVE-2020-3559,0,0,12a81b914b6e5cf162bce38c73dd82249c107ac88e61c39554430e6caa32d35b,2021-04-16T15:01:40.010000 @@ -158744,13 +158744,13 @@ CVE-2020-36175,0,0,0a3a78d3b88526d95fcb0e696145d83042adc30007ed742f17a7201888eb9 CVE-2020-36176,0,0,5040060b1db6bd0137382ae500c991980c9f0199ed91ce2eb790ccde00cc268f,2021-07-21T11:39:23.747000 CVE-2020-36177,0,0,4fc45580793ff2ee449a8fa285b83146ba72b5a56b467a82d99e90330f293a6a,2021-01-12T14:39:36.797000 CVE-2020-36178,0,0,db89e6b9ce80608954ad24ee3470265cd88d6d4931957966113dfb706314b3cd,2021-01-12T14:38:08.807000 -CVE-2020-36179,0,1,f045d92dd53e1814b942e81769535a0d827ae50652f4ae7edddaea2f0a3568c7,2024-07-03T01:36:28.273000 +CVE-2020-36179,0,0,f045d92dd53e1814b942e81769535a0d827ae50652f4ae7edddaea2f0a3568c7,2024-07-03T01:36:28.273000 CVE-2020-3618,0,0,2698cfcfd7e15c327cbe009624a7b57aa8c44350fc24872851ce97d1ea2889cb,2020-06-02T20:10:29.827000 -CVE-2020-36180,0,1,dc0d00d1270454f711cfdff33ab819127143777b3fdfb18b8706596c83a63b7e,2024-07-03T01:36:30.047000 -CVE-2020-36181,0,1,d28a252045b033efb3b18219221e17301a852b05c24069670f11410b7a582941,2024-07-03T01:36:30.900000 -CVE-2020-36182,0,1,9d71e33e669156090438f2281ede2715bd63745247a5d71d8a731bec5afc247a,2024-07-03T01:36:31.760000 +CVE-2020-36180,0,0,dc0d00d1270454f711cfdff33ab819127143777b3fdfb18b8706596c83a63b7e,2024-07-03T01:36:30.047000 +CVE-2020-36181,0,0,d28a252045b033efb3b18219221e17301a852b05c24069670f11410b7a582941,2024-07-03T01:36:30.900000 +CVE-2020-36182,0,0,9d71e33e669156090438f2281ede2715bd63745247a5d71d8a731bec5afc247a,2024-07-03T01:36:31.760000 CVE-2020-36183,0,0,204d335c01e864ee22d4f404d8242d8c90b118def3dcab060d1914a1f0af2462,2023-09-13T14:56:58 -CVE-2020-36184,0,1,2156cd89b54daa5b8fcf1d4925f4ec18c8bf29ebfbc8565c9b76bb495008c878,2024-07-03T01:36:32.620000 +CVE-2020-36184,0,0,2156cd89b54daa5b8fcf1d4925f4ec18c8bf29ebfbc8565c9b76bb495008c878,2024-07-03T01:36:32.620000 CVE-2020-36185,0,0,1a7e6470cd0339cd0a1ba367ee1b1b75bab2e9598e2c9663281dfebaeb8dd1a5,2023-09-13T14:57:03.383000 CVE-2020-36186,0,0,fcf534fd391ccd5697893d31531ea0ed8aeec1653dc9728df8739cb9172edaba,2023-09-13T14:57:19.297000 CVE-2020-36187,0,0,9c501fa00e50458e9d073bd23f9f2a5e4b91b0bd0da1f7042f398336da2a4438,2023-09-13T14:57:25.667000 @@ -171089,7 +171089,7 @@ CVE-2021-25298,0,0,4e2a2cef7fb187f31aec2c6106381e4e90369f82e0869f0b34713fc8a0961 CVE-2021-25299,0,0,0cd1ae6e3300fe32daf5c8170b35397490d3a53545adbb8365265915ef462ba5,2021-03-04T21:18:50.673000 CVE-2021-25306,0,0,78beb965b82385615cb6b1debb2c33cf1e1670b8cd308089737a6b638979a9df,2021-03-08T15:41:17.123000 CVE-2021-25309,0,0,774f95526e769f8074cb452190513c1166cff42c409c34b68a09f282b5e1631b,2022-04-26T16:00:33.177000 -CVE-2021-25310,0,1,73daf729ca79adcfbec252eb58ea1ebe9ba279c2dcfc6c3375e1f6cba2e8ad9d,2024-07-03T01:36:36.343000 +CVE-2021-25310,0,0,73daf729ca79adcfbec252eb58ea1ebe9ba279c2dcfc6c3375e1f6cba2e8ad9d,2024-07-03T01:36:36.343000 CVE-2021-25311,0,0,cd30cca65ad296a257f2ee7fbab3e3ee2f2c06484d0c89f28e3f3b4461066596,2021-08-12T21:26:41.997000 CVE-2021-25312,0,0,c456ec9c00d24efed743372a3dd2cc2f06097b20ac34f97ed7c56447c2e762f1,2021-02-04T15:08:11.440000 CVE-2021-25313,0,0,03380da599d4a21980f9a2d0f8d6e69dbb49dace79293da56209df3af84f5ecd,2022-04-13T23:44:10.187000 @@ -172083,7 +172083,7 @@ CVE-2021-26914,0,0,7a97e468922848ffeae92013a625692c6392af7ad54168fecfacf439b6712 CVE-2021-26915,0,0,2d1fea0cc250f241b0eba573baed0fa49e626de9cdc94715b7402f766451a8ee,2021-02-24T12:31:30.977000 CVE-2021-26916,0,0,92666a548f00b18b687a9af3fe0339f99997850d946bc596762dea3a11adf5cf,2021-02-11T15:44:56.757000 CVE-2021-26917,0,0,99af4b7b84c118799629ce9ac1e2aa5cb2204243fc9344f9f172b0bfdd139dc3,2024-05-17T01:55:16.787000 -CVE-2021-26918,0,1,7eb6c0ffc0a3f5999605ea6d28b8f4fa4c92a4af174352e94fd22c90befe2bc0,2024-07-03T01:36:37.450000 +CVE-2021-26918,0,0,7eb6c0ffc0a3f5999605ea6d28b8f4fa4c92a4af174352e94fd22c90befe2bc0,2024-07-03T01:36:37.450000 CVE-2021-26919,0,0,a4f844127325a28ab47c51549e18d702fb69781ff1a9040733cc9935e353446c,2023-11-07T03:31:49.750000 CVE-2021-26920,0,0,e11963e2127778e27917fda4aa51caf61b2571fff19939add99220e4654b5841,2023-11-07T03:31:49.833000 CVE-2021-26921,0,0,e2becb808e07b4ea4c8fa92cee994e1c3f58d2f5912d0194987f6ceb43054890,2021-03-22T15:49:44.830000 @@ -172092,7 +172092,7 @@ CVE-2021-26924,0,0,55a4a4769cab429ba3fc8ba31bcae73cb83a99c2d0fbd7c6cbe5ce24f078a CVE-2021-26925,0,0,b7e4416c55967ba561aadf52c042f82c8a15ecb12470df27e179123cc76a6422,2023-11-07T03:31:49.940000 CVE-2021-26926,0,0,9b96bc09bd3ac92fa5f6ddd6b5b9efc9294ebb2e8ed2294be7ffcd4e87617a95,2023-11-07T03:31:50.017000 CVE-2021-26927,0,0,8374de74b34073c3a1d18857b67512b9b1c565cda5477edf891ae9e22a58f885,2023-11-07T03:31:50.107000 -CVE-2021-26928,0,1,135e147845f5812e2ce17e9a284f0822f8509c1be698fbd52cd7665e2091389e,2024-07-03T01:36:38.313000 +CVE-2021-26928,0,0,135e147845f5812e2ce17e9a284f0822f8509c1be698fbd52cd7665e2091389e,2024-07-03T01:36:38.313000 CVE-2021-26929,0,0,5e60371ad60753408c70253000048bdcea8b945a075b36b35a5da14794bfcc2d,2021-04-19T20:21:24.513000 CVE-2021-26930,0,0,f4a522c19ef1684f71f92b159161f50f320250c5d0176dd1634bca3a35c34c16,2024-03-25T01:15:50.033000 CVE-2021-26931,0,0,37e6298a8caaaae796edf0e37f080d2e86e319ef938062c8901566b2f1af9121,2024-03-25T01:15:50.217000 @@ -173012,9 +173012,9 @@ CVE-2021-28236,0,0,4e5c799d22e43086f6b24f445af444f847b6ffb8b5619b4a45c2c80b1a91f CVE-2021-28237,0,0,6c96fe8231373ce61575901ddfb90aefb075353fae4043387036f047e3f78b46,2021-12-06T19:08:37.600000 CVE-2021-28242,0,0,0011e5be4142b01e4b00c5d1c3b7d81672f4d836802c3bfdb9f9d142afdf7e2c,2022-05-03T16:04:40.443000 CVE-2021-28245,0,0,82e289351fa17d594c4cc8bd026051652448d15d25177220a543b94996cdfba7,2021-04-05T18:04:38.610000 -CVE-2021-28246,0,1,d1734d2a7bb6ef20f8c18d0dadf01f62bc5ca9d8bd05c1a3c0a65e8d4fb4e855,2024-07-03T01:36:39.333000 +CVE-2021-28246,0,0,d1734d2a7bb6ef20f8c18d0dadf01f62bc5ca9d8bd05c1a3c0a65e8d4fb4e855,2024-07-03T01:36:39.333000 CVE-2021-28247,0,0,3b3b0af814aeeef960ee4a7c9b04a15defbd8db53a402fc82af33718203091f1,2024-06-04T19:17:03.890000 -CVE-2021-28248,0,1,ed6074cf1af76f55aadab78e285abd1c2d4d2eb3dd8a2cff211bb65b35bb5913,2024-07-03T01:36:40.460000 +CVE-2021-28248,0,0,ed6074cf1af76f55aadab78e285abd1c2d4d2eb3dd8a2cff211bb65b35bb5913,2024-07-03T01:36:40.460000 CVE-2021-28249,0,0,4fa1b4393c894561d86d2b4b6bc90bbc3ddb7a67cdf2814a039b21562ef1c01f,2024-05-17T01:55:49.290000 CVE-2021-28250,0,0,f9257dddf3ecf9eef0c65257b3d1a224000b1677cc99e1d09db385ffcbc289c7,2024-05-17T01:55:49.383000 CVE-2021-28254,0,0,a540741741560bcc53138cace6dec585c57238e5554e68b7dff94501dd4fd31f,2023-04-28T03:50:18.003000 @@ -174507,7 +174507,7 @@ CVE-2021-3049,0,0,346f6dc518f626b13b82b5bb8a0ca0504b5d02be1c598373dd1cf7a705f72d CVE-2021-30490,0,0,0ce8ed6d16cf36fda6e259887cf82fa1d0adf3419f3b557fb483a54328e5d39c,2022-08-17T20:47:57.200000 CVE-2021-30493,0,0,ec012902dd7b74eb41cda05ba64be1371721248339df7372739a90e8a97aa34d,2021-04-22T15:11:04.050000 CVE-2021-30494,0,0,947734facd5f13b80dc96719ed3e6dcae9ed29494eaa7dfee45f492c91396bdc,2021-04-22T15:12:15.667000 -CVE-2021-30496,0,1,58660c16f0f3eb00d477f8207a73bef53eaa546286e287901eec46df7bb13337,2024-07-03T01:36:41.530000 +CVE-2021-30496,0,0,58660c16f0f3eb00d477f8207a73bef53eaa546286e287901eec46df7bb13337,2024-07-03T01:36:41.530000 CVE-2021-30497,0,0,e21c62c97a3f287c50b4c1b86c6ff0f89b5ca2f2e9a8d3577ade0de35166e02d,2022-04-13T17:44:42.277000 CVE-2021-30498,0,0,c6250d39980949210a498c9b678f4217a96268e3769072bf7bb0e92c69be414c,2024-04-07T10:15:07.870000 CVE-2021-30499,0,0,c4c2ba7ad25b9ea1bb964220d3e24b1fd08152f83c9fa38e09b1c6936e45e86f,2024-04-07T10:15:08.593000 @@ -175806,8 +175806,8 @@ CVE-2021-31950,0,0,6083519c50a9938ad046d0bfab8973c51b9e76907524b94249f7123a9596c CVE-2021-31951,0,0,4b87722df375dd02fd619c07f08192112e04e4e84f0cfe57d944c1e71c799742,2023-08-01T23:15:13.190000 CVE-2021-31952,0,0,8e9a0350f78cb4edd7d938badddb70a8b305f74f04880782acf49d2e948929ad,2023-08-01T23:15:13.287000 CVE-2021-31953,0,0,649c521f1d81d85c689c56d1606a99c790b46ed41084fc3fcb22d10e319beef7,2023-08-01T23:15:13.377000 -CVE-2021-31954,0,1,e80b5d49b3744c0eb4eb6e41a2d80a1beefbe874dbf46434283c287384a0f087,2024-07-03T01:36:42.700000 -CVE-2021-31955,0,1,53e588b041c55a76a663b1d517c7d914118e42edd8514467c5788efa258ae831,2024-07-03T01:36:43.470000 +CVE-2021-31954,0,0,e80b5d49b3744c0eb4eb6e41a2d80a1beefbe874dbf46434283c287384a0f087,2024-07-03T01:36:42.700000 +CVE-2021-31955,0,0,53e588b041c55a76a663b1d517c7d914118e42edd8514467c5788efa258ae831,2024-07-03T01:36:43.470000 CVE-2021-31956,0,0,d4b28657492c93157d62bcd5b048b9d9301d97cdac12c65cdc76277a983bc076,2023-08-08T14:22:24.967000 CVE-2021-31957,0,0,e67aa6639757235ebbe9ee32f8662c5810aedcafa8316bcac6c37803048246a0,2024-05-29T15:15:43.553000 CVE-2021-31958,0,0,1df5ad750c19bf3dd9522238426d63736b56b744be6a17320ce1ed312489c034,2023-08-01T23:15:13.887000 @@ -175824,7 +175824,7 @@ CVE-2021-31967,0,0,3a9bc380911b24cbc029470ecc6965402e1eef912664de2f63c7f3ac6769d CVE-2021-31968,0,0,a444f2b0ad596ecc4a077dae0d7e09612bb0d31ccf6cda709749df75d93f232d,2023-08-01T23:15:14.640000 CVE-2021-31969,0,0,c23bee10b38ad4a17f87ab5c5c01ecaf28efbd74e659d4ff34ffbbb131144d31,2023-08-01T23:15:14.737000 CVE-2021-3197,0,0,504e1bb2cbcfbe3b3a0214c892832bd0a126baa3a4c0081ec26bbe04f3ff0c0d,2023-12-21T18:29:48.660000 -CVE-2021-31970,0,1,0fd1b99e8c550b07cdc64cb96d1a2087803d50bb56568a297b442f8e50ac9107,2024-07-03T01:36:44.367000 +CVE-2021-31970,0,0,0fd1b99e8c550b07cdc64cb96d1a2087803d50bb56568a297b442f8e50ac9107,2024-07-03T01:36:44.367000 CVE-2021-31971,0,0,3e04cc0aac4a6c843a0f9e226eeb5c3d38463d112269c0495dd4006998fbc297,2023-12-30T00:15:18.927000 CVE-2021-31972,0,0,249e81721809c647cc1252cac865d6c334358eb53e12c511b82d46baf57a15f3,2023-08-01T23:15:14.990000 CVE-2021-31973,0,0,f14c76c7ed4f43da543c76be7bae51af46e34691fecf696aef91f23c4945612e,2023-08-01T23:15:15.090000 @@ -176704,8 +176704,8 @@ CVE-2021-33141,0,0,3da10fd09067c4e805b35ee6dba49a4cc42965d808471542759ec4a6218aa CVE-2021-33142,0,0,e4c1cb5588de061e79531c415b4266c4a37c33466b6a43746d5f12b784e4c257,2024-05-17T18:36:31.297000 CVE-2021-33143,0,0,f151a42a3e3258f959bb97eef6e9cae0b6ec5a9edc199e5e9c961b82157120a2,2024-05-17T01:57:50.467000 CVE-2021-33144,0,0,e4c1412702ce1e66744905dbed082a548a063dc1a541dea63c16b7757b481b85,2024-05-17T01:57:50.507000 -CVE-2021-33145,0,1,fa8c9843e7b9fcca7c562a7add034c5c8e68695955e92bb0c378acd44a9f83dd,2024-07-03T01:36:45.387000 -CVE-2021-33146,0,1,1b10b1154ea12dfba2ef43c2271cc4baf012ccc3e3f0df488ec84bb305233130,2024-07-03T01:36:46.133000 +CVE-2021-33145,0,0,fa8c9843e7b9fcca7c562a7add034c5c8e68695955e92bb0c378acd44a9f83dd,2024-07-03T01:36:45.387000 +CVE-2021-33146,0,0,1b10b1154ea12dfba2ef43c2271cc4baf012ccc3e3f0df488ec84bb305233130,2024-07-03T01:36:46.133000 CVE-2021-33147,0,0,57354ef4bd70b821fbb2a79791566fe2d751ac5d5a290ace335b48279922a6e4,2022-02-15T16:51:32.753000 CVE-2021-33148,0,0,30ac282827e2798495c25f9fd4306fbb25357880eaca446beb5ac81a22e8ef15,2024-05-17T01:57:50.630000 CVE-2021-33149,0,0,cd66588fc37f759ac8036ed76d11a30809cfa8765427b545706872b99e702a6d,2022-10-26T22:48:29.373000 @@ -176721,7 +176721,7 @@ CVE-2021-33157,0,0,2047921840cef2b00b60cfbd0966529b2bc1c6d94447595668ccb0da70067 CVE-2021-33158,0,0,799d26f8647af5ffb3a9c61ab38419d0434e114f7c20156e8c22efd8211797d5,2024-05-17T18:36:31.297000 CVE-2021-33159,0,0,0383115ca416c3b8d0fb9b8673f03e833c4978aa275450a43c7e15fc730d7b0d,2023-05-22T15:27:24.463000 CVE-2021-33160,0,0,67702ec12ee046471d9ce49d8311526fc7bea9a043e1d476853a5fdec9221448,2024-05-17T01:57:51.020000 -CVE-2021-33161,0,1,a77024a69037bc23b25f320b1c43a23c22e20df88d144fe5f4a4729837b91cfd,2024-07-03T01:36:47.010000 +CVE-2021-33161,0,0,a77024a69037bc23b25f320b1c43a23c22e20df88d144fe5f4a4729837b91cfd,2024-07-03T01:36:47.010000 CVE-2021-33162,0,0,360dcb4685181f7fa2dfa5d71c7ddd974907b344e2ac32da199ecb312a109390,2024-05-17T18:36:31.297000 CVE-2021-33163,0,0,cc937dde891593672047a764e95fe775f3b5ac6a96698dc735cb38c781d74a3a,2024-05-17T01:57:51.117000 CVE-2021-33164,0,0,cadfa2577d8706b044d88825166867b5cfd9047bb2fc6288db277ba0a2968eff,2022-11-17T13:53:14.713000 @@ -178135,7 +178135,7 @@ CVE-2021-3498,0,0,9db04db7fa73b3a1d604a88a21add474c43d170fe2a85578e0a339a540e923 CVE-2021-34980,0,0,695d450ac3010085055af6f4c8015c9a5a99f4cbd53d27536267deac44ef250c,2022-01-19T20:09:51.213000 CVE-2021-34981,0,0,a86c7a2b8999d98fb3cff07db08d72432f44527c148646cacd0001e7ee781074,2024-05-08T13:15:00.690000 CVE-2021-34982,0,0,4a2b26920c2e3bf27a87a0154230c8ea58f21f56e8aaaddf18f7211819a6d859,2024-05-08T13:15:00.690000 -CVE-2021-34983,0,1,f80c83722ee9cd915ef57178cfbbc7d7c420eb0219cb1c53255b5a5b6b93dfa5,2024-07-03T01:36:50.850000 +CVE-2021-34983,0,0,f80c83722ee9cd915ef57178cfbbc7d7c420eb0219cb1c53255b5a5b6b93dfa5,2024-07-03T01:36:50.850000 CVE-2021-34984,0,0,ed1596c3833443a873e7d02bebcfed85bd0444d4a8d914b244eb5c80f1614178,2022-01-20T18:19:58.510000 CVE-2021-34985,0,0,4b3f317c382d7c1092261fe5dc1b7226e47650b7fb394ae8588db8e05c896d21,2022-01-20T18:20:32.257000 CVE-2021-34986,0,0,24560d4aa489c4308ce32c4030da8089bd5fc75cf6cb58858d651dbb454ae7ab,2022-07-22T14:01:25.817000 @@ -178500,7 +178500,7 @@ CVE-2021-35554,0,0,3ca9f094ff3eef00b454a55c71be19e5dcee7b5f2212ae630996e5d1ee31c CVE-2021-35556,0,0,08b749ef20463efe34603e042681a87b616272c73daf05a6e5629a454630eed3,2024-06-21T19:15:18.310000 CVE-2021-35557,0,0,816fbd94394a1633d784e9a02fe05f438f2df4b3bad4d62d9e4a83c8e3b5c4e4,2021-10-25T16:12:49.827000 CVE-2021-35558,0,0,81a6b8dc32a265b854803d242b282113312ee51e74b221c6dbe8374ce9485377,2021-10-25T15:29:59.433000 -CVE-2021-35559,0,1,64f7de352874fca4aee1fde8b6b101dd69a14760da098310a87ca87d60e69520,2024-07-03T01:36:51.900000 +CVE-2021-35559,0,0,64f7de352874fca4aee1fde8b6b101dd69a14760da098310a87ca87d60e69520,2024-07-03T01:36:51.900000 CVE-2021-3556,0,0,64ddf8f47dcde2902fe38b63497bd430264ebcf3dcb103f47bf340a3e93b4045,2023-11-07T03:38:06.500000 CVE-2021-35560,0,0,938d4b43fa820a94c1d66c81e297966ffeeacbef41d8accd0ed53c73e52ca4c0,2024-06-21T19:15:18.643000 CVE-2021-35561,0,0,16ffdb623e4ffdda9223d3afb3b31cb10a0baba10fe8192f4dc2ee76dee806b3,2023-11-07T03:36:34.780000 @@ -178803,7 +178803,7 @@ CVE-2021-36084,0,0,1943efc4f356b9aee63e2eb0ed82127d1fa17fe6cbdfbc137cee1dfc9d566 CVE-2021-36085,0,0,8b0b318340c0cfa9377b40b05889171387eef025025d4786abcdf87b01d4dac7,2023-11-07T03:36:42.577000 CVE-2021-36086,0,0,7a03bdc520004ea7495646f8abc513cf5e257dc64059a1a188df6af204d9818d,2023-11-07T03:36:42.637000 CVE-2021-36087,0,0,1f1eb59215453aeafe92c770fc46207bdcbf6ff56c352be49e57008075153005,2023-11-07T03:36:42.693000 -CVE-2021-36088,0,1,97aaa4399e23b860c7d141e35cbc93e43f35e2cabf903f75c19c82d0292e8051,2024-07-03T01:36:52.800000 +CVE-2021-36088,0,0,97aaa4399e23b860c7d141e35cbc93e43f35e2cabf903f75c19c82d0292e8051,2024-07-03T01:36:52.800000 CVE-2021-36089,0,0,640f9942350bea8f21ae3b71210f665b377699c21a1d3083aeb271653d318cd8,2021-07-06T21:04:08.783000 CVE-2021-3609,0,0,e0ed8226661b0941186f50d52d52ac4837f1545f3698081026c3faebf3817dc4,2023-08-11T19:44:29.540000 CVE-2021-36090,0,0,14f14d2c78a07fa46898d109e1cad7365fec7e87d402ec6b9d012fd7f8704552,2023-11-07T03:36:42.777000 @@ -179015,7 +179015,7 @@ CVE-2021-36363,0,0,9c7e946b0e593bfa10d58c5987c9dc6c01780c4b9923cc103d4cb128f35e8 CVE-2021-36364,0,0,fb78ec70a79b4b1f410775a640c128add1c96a5037bda837e1230a0192056792,2021-10-04T14:49:01.790000 CVE-2021-36365,0,0,f8116594f76dcea6ed946d84fa8dac4c4054d489b534fc9a820f5a4fcefd8714,2021-10-01T14:08:13.040000 CVE-2021-36366,0,0,14f747bcd9faacaf8ccce43b232b9e72330e1aace70178013b0c6db806eba8ed,2021-10-04T14:49:40.537000 -CVE-2021-36367,0,1,0c437d1a92b028b783c1404735df08f0b56561aa800e259cd9084dd5343a5dcf,2024-07-03T01:36:53.610000 +CVE-2021-36367,0,0,0c437d1a92b028b783c1404735df08f0b56561aa800e259cd9084dd5343a5dcf,2024-07-03T01:36:53.610000 CVE-2021-36368,0,0,a5df8936c71246f5bb821a6ec6092ad596e2e597a2ef0e2ecb24b5c64cd76320,2024-05-17T01:58:53.237000 CVE-2021-36369,0,0,5c39b9c95cf0ff043116161777344c2dc7dc4d316a11790eec9bf55602f8e2ed,2023-01-20T13:31:40.710000 CVE-2021-3637,0,0,b1fd2f79313dc74a8787be58177fc25c7ac7d38f797058033b26f7211de6750c,2021-07-13T17:56:24.283000 @@ -179028,13 +179028,13 @@ CVE-2021-36376,0,0,6ea9989cb7aae95ea4b74fb4a339b3f9eb2d635138b6fe8f237a6147a6ad7 CVE-2021-36377,0,0,1158342462d76ee7bb84cafa9ecbfb93c350781a38425a55422e0f2c47212be8,2023-11-07T03:36:45.603000 CVE-2021-36379,0,0,42363e23407c555143ec4a28d26c0d8126b787648e1edf57744934ae5fed7fb6,2023-11-07T03:36:45.670000 CVE-2021-3638,0,0,6452193313ca7acd41690530e88dbd7c21aef6ce5f75c7b4036781969bc8049a,2023-02-23T20:23:21.053000 -CVE-2021-36380,0,1,c887aabb723b2c8587cdd130900fb23a21a37490a03afc721ac7e0a56c5c252a,2024-07-03T01:36:54.480000 +CVE-2021-36380,0,0,c887aabb723b2c8587cdd130900fb23a21a37490a03afc721ac7e0a56c5c252a,2024-07-03T01:36:54.480000 CVE-2021-36381,0,0,45e999eea09634f1fd06952c5a0018e8dbe9eca11695531b1aebc6179b92e9e5,2021-07-14T19:45:34.997000 CVE-2021-36382,0,0,c8ff1399fa23f25dff8ff9c0e474a069dd23b91b993bceb9a6a94e1e85304204,2022-07-12T17:42:04.277000 CVE-2021-36383,0,0,3eaaf900c2ccce33c848a9998f0ad22cf238a3beeb13bdd9019aad12e498ffb5,2022-07-12T17:42:04.277000 CVE-2021-36385,0,0,c7e99a8699434a382344be24f88195d53db576a7ae370b785888562c0512f22d,2021-08-31T01:59:25.897000 CVE-2021-36386,0,0,1931f1511ec60b5b8870d09ebdbc9a30c4a9191f00cb871b4258143140e70103,2023-11-07T03:36:45.747000 -CVE-2021-36387,0,1,986c85714f1d3e79d698156de97e0d3c23689e2518439a32cc1c2bf5b74e4d18,2024-07-03T01:36:55.290000 +CVE-2021-36387,0,0,986c85714f1d3e79d698156de97e0d3c23689e2518439a32cc1c2bf5b74e4d18,2024-07-03T01:36:55.290000 CVE-2021-36388,0,0,6def676ea066346c61d9ba5756a2f18b7c73ae63bc3a85990c44ec10d5493415,2024-05-14T20:15:12.353000 CVE-2021-36389,0,0,ebac8c8f66f6f704908f43736fc7ee3ab0c8df07d5596f0271a4b319567c822d,2024-05-14T20:15:13.290000 CVE-2021-3639,0,0,1739d2d02c3e9f49d382137f96fb66698616622f3caabbf1fd195b57e647e69f,2023-02-12T23:41:41.270000 @@ -180218,7 +180218,7 @@ CVE-2021-37997,0,0,9d3e3fbd1b196dca12ff255a95d8cb37b9efc66b29ffb222185e9eee9018c CVE-2021-37998,0,0,d8d4d691edd934e31d47f9ae49a9c7d1af2eed5033c380952c8fe30ea3f28756,2023-11-07T03:37:07.433000 CVE-2021-37999,0,0,1be1701d51ad2821e449a2518aca569200947e16584809bda604c11f067bbd29,2023-11-07T03:37:07.510000 CVE-2021-3800,0,0,343139414231f8fe58af1f06144762ff09ee3011cd885c612762d6418643b1a0,2023-04-25T15:42:47.950000 -CVE-2021-38000,0,1,a3604e5a08a3f5a5decd8f7643831caadcc929d25fc124e438ab8fe3fa9d556e,2024-07-03T01:36:56.643000 +CVE-2021-38000,0,0,a3604e5a08a3f5a5decd8f7643831caadcc929d25fc124e438ab8fe3fa9d556e,2024-07-03T01:36:56.643000 CVE-2021-38001,0,0,c7ae98917628c2f28a2e374c8a35172319f2d09871dd57812991e55d7e90e22f,2023-11-07T03:37:07.727000 CVE-2021-38002,0,0,49ba5cd2fdc9382f8390ea116bf250a2c80ea2d2cf533aa54eef0c83b7f10fa1,2023-11-07T03:37:07.790000 CVE-2021-38003,0,0,488156580497427de3316ee56eee6f30f75052c68a26356d79e83895216a1ac2,2023-11-07T03:37:07.900000 @@ -182333,7 +182333,7 @@ CVE-2021-4065,0,0,d1c2dee1cceec2a47ed46ae13670cb804e448d31b858772090684213a0e3e6 CVE-2021-40650,0,0,da2cf6be4a7856150d7d6a37a5bd557704b5042eb34774dc1111b9c733840443,2022-06-22T20:28:50.433000 CVE-2021-40651,0,0,d0d1e150724603ddbc53e71d2e422eb56717bc29db07af2c6c7fd1f081acea31,2021-10-07T15:33:47.493000 CVE-2021-40654,0,0,dd92544ffa979c86aeb15a276793324b64da9bf8e4fa374d7f3aae66aa3c5021,2022-07-12T17:42:04.277000 -CVE-2021-40655,0,1,4383421c5cb49581eaeb549e2240d2364219233b459cf404dbafbd647540b315,2024-07-03T01:36:58.373000 +CVE-2021-40655,0,0,4383421c5cb49581eaeb549e2240d2364219233b459cf404dbafbd647540b315,2024-07-03T01:36:58.373000 CVE-2021-40656,0,0,772d17f6c68174c6efe9ea7b2c2c3d0660b5c0daea6c415882fd90faa9cc3920,2022-04-14T17:12:14.893000 CVE-2021-40658,0,0,1a6cef94fbdf0d4ce12fec2dbc5bfbe2f21db2c8b1a373445d6312fbc728e1d9,2023-08-08T14:21:49.707000 CVE-2021-4066,0,0,264208dc008eaf0ff726ad3e5039031cfc74c0c015a70d61b6acc58a0317cf26,2023-11-07T03:40:09.250000 @@ -182941,7 +182941,7 @@ CVE-2021-41340,0,0,e5de8d13db3f0f5428a47ef9d4f3ef339f3a9bb088c8c0d4b2b16d3eefbd3 CVE-2021-41342,0,0,f313edff84a756cc29e77dfaebfea6401a779a2c9f1a3ab18651403cece4a595,2023-12-28T19:15:13.903000 CVE-2021-41343,0,0,c6ed1f3a4f351a067142481c385b2324a89ab08efa26350fb9f6995e79f9b792,2023-08-01T23:15:24.397000 CVE-2021-41344,0,0,d158d99e63cb1986b1b10940ca097baa5f23437ff0a1781673950fc1ff9d90c2,2023-08-01T23:15:24.577000 -CVE-2021-41345,0,1,0595afc1b096b215013abfd69418bd77891d7283ea8074a161dd98264085608a,2024-07-03T01:36:59.773000 +CVE-2021-41345,0,0,0595afc1b096b215013abfd69418bd77891d7283ea8074a161dd98264085608a,2024-07-03T01:36:59.773000 CVE-2021-41346,0,0,84209c1a0a5c2b3ff2d10f5cca251b1e8805aed671abed9fd8d1bc94cc40a4e8,2023-08-01T23:15:25.023000 CVE-2021-41347,0,0,b8c81ec9fbe4a15c84fca5da28b0b9494a324bbfd32206dd3cf2712b8c6786f4,2023-08-01T23:15:25.287000 CVE-2021-41348,0,0,d30bf29de07a1c7ae88b01ad4c8be1962531aecda34fe806d8de2ae88a1b7127,2023-08-01T23:15:25.577000 @@ -183205,7 +183205,7 @@ CVE-2021-41728,0,0,a3789485638c88d2400450abddfc232076a7dfa934f9a92b1e7f558b651e7 CVE-2021-41729,0,0,cff3f07d47889ab028d200a74ff5c5ce12bb4f514327a69ebef09c138c39447f,2021-10-08T03:19:02.667000 CVE-2021-4173,0,0,8fd0b0247facc31d3bbc27e1e0ee4a4f049922d7754b9864c43aa27019a6ce60,2023-11-07T03:40:18.087000 CVE-2021-41731,0,0,8aa02496d90c865b3ecc8077018b5c25d8db67c63dda87ef9a3c1e52c855a227,2022-09-20T18:21:52.703000 -CVE-2021-41732,0,1,cc8708fe533967116104e123363e66001fe681b603f3faaa95e4641e472c1631,2024-07-03T01:37:00.860000 +CVE-2021-41732,0,0,cc8708fe533967116104e123363e66001fe681b603f3faaa95e4641e472c1631,2024-07-03T01:37:00.860000 CVE-2021-41733,0,0,ff581ebd5cf65f5415271d4f0165ae2407cf552807e2e54f5698089fce6066cf,2021-11-09T19:59:21.390000 CVE-2021-41736,0,0,03c05ea87be190c9b32f7f1c1562a04df5649899a6c4690fe19cee4727a806f5,2022-03-28T20:52:06.847000 CVE-2021-41738,0,0,b31dd907761d044b7768b4c22b2c7b7d1df9effc46b1626fbac2101f7c9b2f5a,2023-11-07T03:38:59.843000 @@ -183236,7 +183236,7 @@ CVE-2021-41771,0,0,69ab09373dc6c960f67a1679aa671a561e8dea989ba5f0cf444812ebac6cf CVE-2021-41772,0,0,9f417c1c813b1ee8136b01e2ae0ce30a9fde54cc892e5902702e6a7f0dba059a,2023-11-07T03:39:00.470000 CVE-2021-41773,0,0,825529a2015c160c0b7d9bab558b4712dba1a6c46aae282927a021796549a7a8,2023-11-07T03:39:00.550000 CVE-2021-4178,0,0,8c5898c38215a01aa38e42397ceda4c7b55c507cd171afb838d25e681a03081a,2022-10-04T17:55:01.783000 -CVE-2021-41780,0,1,258a9638b33a433252dee0fdedd3d524593db2f532009665bf1792fbc6fe5099,2024-07-03T01:37:01.927000 +CVE-2021-41780,0,0,258a9638b33a433252dee0fdedd3d524593db2f532009665bf1792fbc6fe5099,2024-07-03T01:37:01.927000 CVE-2021-41781,0,0,4d99965fc3f918f10b14de7a1e0acf9f1fe5d52e67ea7d08ccc0253009941754,2022-09-02T13:17:21.697000 CVE-2021-41782,0,0,d06da8ec99c4f1d8a6d78b974ddb04c6e27bc43fe2d48d770cf00f0373424781,2022-09-02T13:18:50.193000 CVE-2021-41783,0,0,ee4bdf2b6fb17e7a3745ed63d14834d830354355881c583c9ff75c274ceceee2,2022-09-02T12:54:28.320000 @@ -185128,7 +185128,7 @@ CVE-2021-44396,0,0,7c0ba48df549e25e005295bbe627041950189a573d8758add2ca397b502be CVE-2021-44397,0,0,aeede1d53bd2f94396aba7592014a0f445309317bb79c0c7fdefa09f8e68a5cc,2022-10-25T17:40:14.183000 CVE-2021-44398,0,0,555e554f6904e149f92b31d145cec3fd8d8d4f433c4c7cb018d9ef385828e3b5,2022-10-25T17:40:21.837000 CVE-2021-44399,0,0,8351d48ef470fa1034a9534b3958230b5279d3245a336ecc1fca4eba670b40e9,2022-10-25T17:40:29.917000 -CVE-2021-4440,0,1,1cc601a0d6d7cce892d500d0c755a441444f3fafdfb5d5d8299bb852442c5c49,2024-07-03T01:38:13.980000 +CVE-2021-4440,0,0,1cc601a0d6d7cce892d500d0c755a441444f3fafdfb5d5d8299bb852442c5c49,2024-07-03T01:38:13.980000 CVE-2021-44400,0,0,4bf726c514ec568544515b2748f948e99c81db36c2c66f97b411537a96b3cae0,2022-10-25T17:40:36.487000 CVE-2021-44401,0,0,68d7d93d9e3f406a7ab164303254465fd18dc424fd00d011aee0e99433fcfe2c,2022-10-25T17:40:42.937000 CVE-2021-44402,0,0,145a71ca0f99e2e160a739601e598a913b8350298bfa2d402e99094a1715380d,2022-10-25T17:40:50.610000 @@ -185244,12 +185244,12 @@ CVE-2021-44525,0,0,6b820d6919c2d01943d46896ef5d6de9c8c53a79d403084c5f83cd6fb10a4 CVE-2021-44526,0,0,4be7addced5f72bd938dfe4bd5492d583504564efebf82406f0d9921c5cfc79e,2022-07-12T17:42:04.277000 CVE-2021-44527,0,0,98b3636af3a764d7983306b650bb91fa37d3b37d05975e372f8078c17f77c2ca,2021-12-07T18:10:20.033000 CVE-2021-44528,0,0,5a8247318a415d998cb5e2d939fb63ae0febaa2fed8b5a9926e9c8471a8f4a25,2024-02-08T10:15:08.973000 -CVE-2021-44529,0,1,0176eed7be92d13995ef043a69c09fc75b3de8c13cbc8c93fe5cfefc1fcc39c0,2024-07-03T01:37:04.553000 +CVE-2021-44529,0,0,0176eed7be92d13995ef043a69c09fc75b3de8c13cbc8c93fe5cfefc1fcc39c0,2024-07-03T01:37:04.553000 CVE-2021-44530,0,0,3f15c3b556169eb703ccfc6a06993cf774ed0372e7c3519d18d62ee61b373c60,2022-08-09T00:51:27.147000 CVE-2021-44531,0,0,22ecb4a37716a1bf13ecdc1523488af8d10da410c337855b860416b5b01f58f9,2022-10-05T13:56:24.620000 CVE-2021-44532,0,0,7b5f8e61434a78460bfc37ba9d479a188a39d971b9fd7242c8d12e0bad426243,2022-10-05T14:00:39.580000 CVE-2021-44533,0,0,8f37b375f097f3ed857ec0e06e863398c8b05412951caf6897b1620ae5918b20,2022-10-06T02:28:19.260000 -CVE-2021-44534,0,1,c84f5084dcdea8544eca5eabd8d7ce1047de900b56a3fb3dcc2bdc8db73b0bd7,2024-07-03T01:37:04.873000 +CVE-2021-44534,0,0,c84f5084dcdea8544eca5eabd8d7ce1047de900b56a3fb3dcc2bdc8db73b0bd7,2024-07-03T01:37:04.873000 CVE-2021-44537,0,0,98221955cc68c6f1f55c32aeedda94c05474da3662de0ae882a622ac4c426cc3,2023-11-07T03:39:39.547000 CVE-2021-44538,0,0,71f8964aa4274805978905df27b61842b00bfac427d5404f43e606aa91713840,2023-08-08T14:22:24.967000 CVE-2021-44540,0,0,8fd25b5ed3868cf9651982d0cbc8ed01ac5a03b91ac14ac45aa4451192fc3753,2023-11-07T03:39:39.620000 @@ -185972,7 +185972,7 @@ CVE-2021-45780,0,0,c2acc4e8ea62851f02f413f686106c08db88cc5e74d12bbcfb54ecec84421 CVE-2021-45781,0,0,71fc3abd11a86d35826ebd5425e72352a00780701dbe1bdafd5e49f93809c748,2023-11-07T03:39:55.377000 CVE-2021-45782,0,0,5767e61d831de627e0208b575115f6cc8e1083b2a6d45ca28b912ed2c19daf5c,2023-11-07T03:39:55.407000 CVE-2021-45783,0,0,1f04495fd021672f1e434e8f202fca396c95781d91a0ef836832d5708c2f7e39,2022-05-13T15:28:41.320000 -CVE-2021-45785,0,1,0790804ca91aa7565386021c142c52aee1767eea753cfb3861ae0938a4cb9d2d,2024-07-03T01:37:05.873000 +CVE-2021-45785,0,0,0790804ca91aa7565386021c142c52aee1767eea753cfb3861ae0938a4cb9d2d,2024-07-03T01:37:05.873000 CVE-2021-45786,0,0,507c3725d8722cb8b1acbbebd8f8ed42cc62fb5aeded56d3509c1990522e5514,2022-03-22T17:13:51.327000 CVE-2021-45787,0,0,eb6a4144390b6a06bbb5accdca97c8bd9dbe9b8c3cf218c6a8e23ec5c725008b,2022-03-22T17:11:54.300000 CVE-2021-45788,0,0,725b65b79eece406eae184685956d92a26ade5e0d647ecf1c40d4d5dc9028aaa,2022-09-30T16:52:12.237000 @@ -187046,19 +187046,19 @@ CVE-2021-47226,0,0,dfff3ac9224a40a84fbf83ac1f899cbe607393c70b0fbb42696731b830bfe CVE-2021-47227,0,0,bf1f6724458af60a80f55e8b0c660742d5a99476825b2411dc7b10ba592833dc,2024-05-21T16:54:26.047000 CVE-2021-47228,0,0,d48ec2372953f698344a964b2854c22c0c2b3b4b3683e67379a0cb1a8ae1b604,2024-05-21T16:54:26.047000 CVE-2021-47229,0,0,673729027f70ec70ccec01160608d9b980fe5694b7d6864f8148ab1d2910b755,2024-05-21T16:54:26.047000 -CVE-2021-47230,0,1,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000 +CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000 CVE-2021-47231,0,0,5bd20e846b4ae9f7c09498f4244df8fd3f4a7278eca17a511816838bbf218e1c,2024-05-21T16:54:26.047000 -CVE-2021-47232,0,1,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000 +CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000 CVE-2021-47233,0,0,15379da1b0cc3479acf24657c0dcec4b5422c55e1190c39e2fc2adcf95660e28,2024-05-21T16:54:26.047000 CVE-2021-47234,0,0,230b49dc9bf3f3acdcfe7e4098687f92d7286fb76c190d76f26169ab3a857766,2024-05-21T16:54:26.047000 CVE-2021-47235,0,0,1e83e084706d4a517910bdeb0dcbd1b4c7a8e2e90e23ac8b3b5cb07454958039,2024-05-21T16:54:26.047000 CVE-2021-47236,0,0,3d9f91b8210616b4e0f69493adde5ce7501e7f32d1be4368225a7fb3a6ea136a,2024-05-21T16:54:26.047000 CVE-2021-47237,0,0,e014c700239684b4a13b1638f6c3209c77c4843714b2e15060767c3d6d1aa5b7,2024-05-21T16:54:26.047000 -CVE-2021-47238,0,1,3b5749e66c4a66ce2e47c8ef5276271531a3af5b310ad862877c7f81486d1043,2024-07-03T01:37:26.920000 +CVE-2021-47238,0,0,3b5749e66c4a66ce2e47c8ef5276271531a3af5b310ad862877c7f81486d1043,2024-07-03T01:37:26.920000 CVE-2021-47239,0,0,ce84c18ea31d0ab0a744f18fa6468b5c275a6126c345de40ea10bc0c9ef1512f,2024-05-21T16:54:26.047000 CVE-2021-47240,0,0,c908e42d41ddb74ebfabf665149eeda7ad5350206d9381261030bbec24bb393a,2024-05-21T16:54:26.047000 -CVE-2021-47241,0,1,2764d87dbbdd945bdac610894ac6ec0ada98f0ab6455df88dafa8f522308ff27,2024-07-03T01:37:27.850000 -CVE-2021-47242,0,1,60a4600e7db813cddf859854f1e469858cbbdfee61f04b28efff60c5ccb535c8,2024-07-03T01:37:28.667000 +CVE-2021-47241,0,0,2764d87dbbdd945bdac610894ac6ec0ada98f0ab6455df88dafa8f522308ff27,2024-07-03T01:37:27.850000 +CVE-2021-47242,0,0,60a4600e7db813cddf859854f1e469858cbbdfee61f04b28efff60c5ccb535c8,2024-07-03T01:37:28.667000 CVE-2021-47243,0,0,d8ccb729b2c6d36fa70626aac46a95b79fb678f1a0becdc51ea04f82d34d9c39,2024-05-21T16:54:26.047000 CVE-2021-47244,0,0,862a44f59bca0b52c8ba78c02a97b1e91d96611d758b9d59455d6ffc3702b8ba,2024-05-21T16:54:26.047000 CVE-2021-47245,0,0,5afc4c1705ee784bd6d51252482d4d6e4343e98d07c4ba22248c5016340461e1,2024-05-21T16:54:26.047000 @@ -187075,7 +187075,7 @@ CVE-2021-47255,0,0,bce11706dcb5c1f410908baa3f7755eae932a6445ee4b6c0ca9a31d83ba30 CVE-2021-47256,0,0,8fc72f0773c1cfad3659a4caaf8d09ce84e03d304cdb03583bd7264c7478c213,2024-05-21T16:54:26.047000 CVE-2021-47257,0,0,2f92d930263afa538453fe93781374bbaea1ee906a03567456cc5a3243cd3e68,2024-05-21T16:54:26.047000 CVE-2021-47258,0,0,a7074f40c57891610cce5dbf2e5a676cb53fe7438fa4dace7e1fab48abc5eca6,2024-05-21T16:54:26.047000 -CVE-2021-47259,0,1,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000 +CVE-2021-47259,0,0,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000 CVE-2021-47260,0,0,6145603297b5d5ccbe986e33d375d41b5ef0ab7450ec772dfabd33375586aaba,2024-05-21T16:54:26.047000 CVE-2021-47261,0,0,f2a2bd8d3f73be143675d5448b64b49bb9f36be040ae47cdda0fe44933674c0a,2024-05-21T16:54:26.047000 CVE-2021-47262,0,0,8f00c4f74f39492cae03cb7be3c05e766856c640973a57bb1d563234ef8c909c,2024-05-21T16:54:26.047000 @@ -187090,7 +187090,7 @@ CVE-2021-47270,0,0,80bde03174d58f604b378825626f187ac4718b72879ab08c81588cd54cf89 CVE-2021-47271,0,0,9c844b92bc394d22804fb32c956b70577751c38e0c1641b8fd1a852707556779,2024-05-21T16:54:26.047000 CVE-2021-47272,0,0,b61b258a5bd83b591b5c8af5dcdb8102f177c3fb12702c52c65b3b57d712f28d,2024-05-21T16:54:26.047000 CVE-2021-47273,0,0,aebaaa0ac27d96654fa6ee79cc158afc75cd4ad557c9c5608468def7e6d35dcf,2024-05-21T16:54:26.047000 -CVE-2021-47274,0,1,5e6b9f71d6b39e786c1e9484a9a5c1020a127cc111bfd1e3867b25c1d707414c,2024-07-03T01:37:32.447000 +CVE-2021-47274,0,0,5e6b9f71d6b39e786c1e9484a9a5c1020a127cc111bfd1e3867b25c1d707414c,2024-07-03T01:37:32.447000 CVE-2021-47275,0,0,3bc679da1b883a9609fd05ead135185a06b8d4786c43c60a0d05b5924d388c45,2024-05-21T16:54:26.047000 CVE-2021-47276,0,0,44b76a47c7d9a2b7fa6ddc56d4c04c3b0c0449accad78f3c086ba0d0d1732460,2024-05-21T16:54:26.047000 CVE-2021-47277,0,0,9afe3ee7a74aef283083def5a86fd9b3f2b542588fa2c533458a1d50693270c3,2024-05-21T16:54:26.047000 @@ -187100,7 +187100,7 @@ CVE-2021-47280,0,0,cc54728787d3b6ce4b457d4a5b2b5120747429d79e47d276990656d98e3ae CVE-2021-47281,0,0,593aea6f832a6c532eeb85f4c4c58c4c07715365e7ef8e62c7d3ce5ea69f76f8,2024-05-21T16:54:26.047000 CVE-2021-47282,0,0,62215ebff03dbff1784bc17c7de1c05aee2b7455f65ee32fbef82e14b765e992,2024-05-21T16:54:26.047000 CVE-2021-47283,0,0,0ff0fec851130d9f4c124e66410697fa89f2725fd5fbd9a87a792eabb7ae2619,2024-05-21T16:54:26.047000 -CVE-2021-47284,0,1,ec827ed0cabfe70b5d0ef63cd6c2c3e8abb482399cd323f8dddc1f3e08f33d60,2024-07-03T01:37:33.787000 +CVE-2021-47284,0,0,ec827ed0cabfe70b5d0ef63cd6c2c3e8abb482399cd323f8dddc1f3e08f33d60,2024-07-03T01:37:33.787000 CVE-2021-47285,0,0,996ea18361ebd04fd45b1694fe1d9404484a2740395fd8ca2c06e472a7098e5f,2024-07-02T20:15:04.637000 CVE-2021-47286,0,0,b15e11781385fad96e49b76e139430d572cbbf1b8011cb250a6bdc2187552ec2,2024-05-21T16:54:26.047000 CVE-2021-47287,0,0,4414a4e5dfd31932f41a2b5e5bf416a5a7bb5ecb095d728c8b74b53d52aa09c1,2024-05-21T16:54:26.047000 @@ -187111,7 +187111,7 @@ CVE-2021-47291,0,0,0f09361065204eaf98af1a7ec3102f09cd5053efaf21452787b53341f12b2 CVE-2021-47292,0,0,884b26d9f4d0c8371412774628022356dc3ca0e6345b551899796164a53d0ca8,2024-05-21T16:54:26.047000 CVE-2021-47293,0,0,84909c003f4783fd8104b631c24e0ed3b6a3aa68cd954d7e57a53efa52fd05b2,2024-05-21T16:54:26.047000 CVE-2021-47294,0,0,e32e19bf4d5e397c2b28fb7e298970fe72354b4466592457edd00a04af2eaac4,2024-05-21T16:54:26.047000 -CVE-2021-47295,0,1,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000 +CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000 CVE-2021-47296,0,0,80747d122807638681cd78223e1f1d9c65f79d7f7a7fa0dee0b4d460825e4195,2024-05-21T16:54:26.047000 CVE-2021-47297,0,0,055b83978b758fb05ccea8ed283eb453303a0fc72e0e958fe624ac4723725a12,2024-05-21T16:54:26.047000 CVE-2021-47298,0,0,601d6d581ba9b174d93330c9f71ce461d6051ac51582d134303f94766622fd8c,2024-05-21T16:54:26.047000 @@ -187129,7 +187129,7 @@ CVE-2021-47309,0,0,d5ec391627f024718de98698e635f107d6d9b623709437e5dce76601f922b CVE-2021-47310,0,0,4338f2e27a9d1bd793e55bde33f8aad31a68068301274ddd13e3400401484b8a,2024-05-21T16:54:26.047000 CVE-2021-47311,0,0,059c98e9fdcc37e440474c8e9821aa3d69b3d2b23b4f838e3850243d86db350c,2024-05-21T16:54:26.047000 CVE-2021-47312,0,0,aa0ede717e303fa4324ffafae41ec98de36567130568b52e5020f2201265c24b,2024-05-21T16:54:26.047000 -CVE-2021-47313,0,1,f899276267ff4ce19db080468438f4559d2826fb2a0a89d3d3d9f6eb20a3c33b,2024-07-03T01:37:36.997000 +CVE-2021-47313,0,0,f899276267ff4ce19db080468438f4559d2826fb2a0a89d3d3d9f6eb20a3c33b,2024-07-03T01:37:36.997000 CVE-2021-47314,0,0,01849966294520f593862058f8d85fdb0c23c85e9c4fe391213aedb8c7a2857a,2024-05-21T16:54:26.047000 CVE-2021-47315,0,0,b0ed028c87560ee4efb67f205dc89d17424d8d4048bb835b3d65a798b7e5371a,2024-05-21T16:54:26.047000 CVE-2021-47316,0,0,5deb7a57ca84ca173cacff542e0482bad719b4557b39d3ef0b2903d1acceb07d,2024-06-21T14:15:10.777000 @@ -187139,13 +187139,13 @@ CVE-2021-47319,0,0,36b0f40dc1f652e0a64c910bbdfd73ed37fab9e83fbbbef01b1c38287fe18 CVE-2021-47320,0,0,41ba6898e9108696a49582f00b03b0681abf412c541960b9d7fe3f4b3ef11fda,2024-05-21T16:54:26.047000 CVE-2021-47321,0,0,4f9e19b15788a2b41df81cb31b4962cc6f7a5f2928795f609c0184c42e7f5f13,2024-05-21T16:54:26.047000 CVE-2021-47322,0,0,fffd510c4c1162ae358631ced81df3b754aabcdda687d3b076a37c077f2dc055,2024-05-21T16:54:26.047000 -CVE-2021-47323,0,1,30e05c967e404a3e5f5da00ae218abea7b53ded88fd1c5cde072add466e68d19,2024-07-03T01:37:38.240000 -CVE-2021-47324,0,1,61363a6b10f2a0291220f63a7e46539121593857110cd909ea3918bfb26707f6,2024-07-03T01:37:39.060000 +CVE-2021-47323,0,0,30e05c967e404a3e5f5da00ae218abea7b53ded88fd1c5cde072add466e68d19,2024-07-03T01:37:38.240000 +CVE-2021-47324,0,0,61363a6b10f2a0291220f63a7e46539121593857110cd909ea3918bfb26707f6,2024-07-03T01:37:39.060000 CVE-2021-47325,0,0,df65236e4d563e7ff40e631bb087f4bffde6b04c02f22e6d89d972b900e594a5,2024-05-21T16:54:26.047000 CVE-2021-47326,0,0,effcfe425dd2a39d7ea0ddc982e859be643afc1e8970fc98319f837a9ad1e665,2024-05-23T14:15:09.033000 -CVE-2021-47327,0,1,78fe46e7b5a404eb7e59347255c542e9c2d4ea6efaa9017008334a63c8727f23,2024-07-03T01:37:39.993000 +CVE-2021-47327,0,0,78fe46e7b5a404eb7e59347255c542e9c2d4ea6efaa9017008334a63c8727f23,2024-07-03T01:37:39.993000 CVE-2021-47328,0,0,ea662e4c22d9a90044e61a948217e3ec770783fe36a77cb55bf5b53a2d5b3a74,2024-05-21T16:54:26.047000 -CVE-2021-47329,0,1,9617f023b4c58539ce1aedb7e8c3a8b0044bc4a95894a91243feb803784966d7,2024-07-03T01:37:40.793000 +CVE-2021-47329,0,0,9617f023b4c58539ce1aedb7e8c3a8b0044bc4a95894a91243feb803784966d7,2024-07-03T01:37:40.793000 CVE-2021-47330,0,0,19aba1f8e4607c38713bc65bea897cde962efe1f35ac57c33cec53e0e52823c1,2024-05-21T16:54:26.047000 CVE-2021-47331,0,0,78d7d9b0c5c5996321cf12646cf0f40d109083aeaceb84c7f1d3ee50c66fa206,2024-05-21T16:54:26.047000 CVE-2021-47332,0,0,16a2df91496625038f10eda37f3bdc13675ed49e64f7d79bd5101d04b8bd9eb8,2024-05-21T16:54:26.047000 @@ -187164,15 +187164,15 @@ CVE-2021-47344,0,0,454605af2b98a31ee92e34d4553d6d02dcffc3b60eb83aeea0bb5bfcbb72f CVE-2021-47345,0,0,0959039bb6546cf25cd3301ded9fbdb02eed0060a3530d77080fcdfc11b6d57a,2024-05-21T16:54:26.047000 CVE-2021-47346,0,0,32acc5c4daa85ee10040e4ad6c8d73e891d222187ef63fb42316fdaa164c681b,2024-05-21T16:54:26.047000 CVE-2021-47347,0,0,47c9a56975a9e565b238c0d86b504ae1d807db272528b6de0efb6e254a9dc097,2024-05-21T16:54:26.047000 -CVE-2021-47348,0,1,cbd7050f60b6d34998fac30b0c35a9199cb24117e7667e7c425da37d327e3490,2024-07-03T01:37:42.580000 +CVE-2021-47348,0,0,cbd7050f60b6d34998fac30b0c35a9199cb24117e7667e7c425da37d327e3490,2024-07-03T01:37:42.580000 CVE-2021-47349,0,0,1c15153e4b43e137bbe01c5628413b6582923189bf7d965709fdf5a2a2b0ceed,2024-05-21T16:54:26.047000 CVE-2021-47350,0,0,d84d756b3cec2d63f3b5c6ccc5964510a529693037698c2f59eb60e975521dd4,2024-05-21T16:54:26.047000 CVE-2021-47351,0,0,d4a33d41fb7cefd313b5d152e8e4ce08a152a31e512191681e7bf30a942cc6a7,2024-05-21T16:54:26.047000 CVE-2021-47352,0,0,337412fd38315995ff38f1168ed9ea202f160e7fb292085921ae46945ed16965,2024-05-21T16:54:26.047000 CVE-2021-47353,0,0,82449286bf035dd3365bef654a1c42f79bd8fc32b3386f5fdcfea11a6530f9e4,2024-05-21T16:54:26.047000 -CVE-2021-47354,0,1,16f6caca4e2b6bd67c382986a9d1bf3512aea61bbf81736934541f547aaa382b,2024-07-03T01:37:43.623000 +CVE-2021-47354,0,0,16f6caca4e2b6bd67c382986a9d1bf3512aea61bbf81736934541f547aaa382b,2024-07-03T01:37:43.623000 CVE-2021-47355,0,0,8bfd8f049bebd0860d5d2443170e6d8ffc040ed38ec26b429d8d98267100f53e,2024-05-21T16:54:26.047000 -CVE-2021-47356,0,1,241336664cee555206ad4da6f912d6ab75b0d43ba2647bab4f438c253fb46ca3,2024-07-03T01:37:44.487000 +CVE-2021-47356,0,0,241336664cee555206ad4da6f912d6ab75b0d43ba2647bab4f438c253fb46ca3,2024-07-03T01:37:44.487000 CVE-2021-47357,0,0,7004334f5b9c82df9b5d7baf5595b9ff5c28e09d9eeddef3e30f9d5c432da5ad,2024-05-21T16:54:26.047000 CVE-2021-47358,0,0,be038918bea32d62c3fa62b309869d32a95cf69a6c87880f27e5143486b51efe,2024-05-21T16:54:26.047000 CVE-2021-47359,0,0,95fc2ad70ea57831546526186c6a0d9fde77fd47f516e73031cb14018a41a458,2024-05-21T16:54:26.047000 @@ -187183,18 +187183,18 @@ CVE-2021-47363,0,0,451cdd7364ca5bb4efb829c4788dd40cbcbb6746f764979ca242e60d95b58 CVE-2021-47364,0,0,a359c0821ddec86a5ec45c24f5ca9b471348d9b0ab67d37b811ff9e91cc9f727,2024-05-21T16:54:26.047000 CVE-2021-47365,0,0,cc4189fbcffc5971bf13fada3d5b9812a0f8df36d75145a9ac2100acf8b6e7e7,2024-05-21T16:54:26.047000 CVE-2021-47366,0,0,952c14013292cbd66020cc6442b5f0a722aec92c17cf6354c36f9cf97af07ff8,2024-05-21T16:54:26.047000 -CVE-2021-47367,0,1,0bb1b92b77584979835ac49cf2a174823760722ee7f760f1bba8c9c0b01e084b,2024-07-03T01:37:45.997000 -CVE-2021-47368,0,1,ca5abd62423948cde41220042d443084f74a0a14e425a935b6e1bd78153e1e2f,2024-07-03T01:37:46.787000 -CVE-2021-47369,0,1,3c47d880305925a50771bb15516bcb189c4ef17bd942d5a576934350dcffa438,2024-07-03T01:37:47.597000 +CVE-2021-47367,0,0,0bb1b92b77584979835ac49cf2a174823760722ee7f760f1bba8c9c0b01e084b,2024-07-03T01:37:45.997000 +CVE-2021-47368,0,0,ca5abd62423948cde41220042d443084f74a0a14e425a935b6e1bd78153e1e2f,2024-07-03T01:37:46.787000 +CVE-2021-47369,0,0,3c47d880305925a50771bb15516bcb189c4ef17bd942d5a576934350dcffa438,2024-07-03T01:37:47.597000 CVE-2021-47370,0,0,85a1587c7c7e04b19d536647b3526a2dda2c907d012c10e22f12812bde0ab56b,2024-05-21T16:54:26.047000 -CVE-2021-47371,0,1,f5f3185ca08086598a7c7c2e5704eb1083d48bd9cf99d7b12b38889b099feb89,2024-07-03T01:37:48.470000 +CVE-2021-47371,0,0,f5f3185ca08086598a7c7c2e5704eb1083d48bd9cf99d7b12b38889b099feb89,2024-07-03T01:37:48.470000 CVE-2021-47372,0,0,d7d358c9f491fe46df3242764ec03f41b929d96e02108c7ae13ce0539b9ea407,2024-05-21T16:54:26.047000 CVE-2021-47373,0,0,90ac7e16c6ddaf6f2c0fd5ac595c1ad46d623c766835184609352179898a2519,2024-05-21T16:54:26.047000 CVE-2021-47374,0,0,27260b37185e1bbe54cc591e43efaea256e9a8dab676902371a34b7d39627f94,2024-05-21T16:54:26.047000 CVE-2021-47375,0,0,fbe14b57b08a23fef4021bd7deaedc125938e16d164fcbd5a03e5e90187873b7,2024-05-21T16:54:26.047000 CVE-2021-47376,0,0,5758126c634cac5445211629bf4de556fb2ff8a22d38acd4da90c5c69c9d320c,2024-05-21T16:54:26.047000 CVE-2021-47377,0,0,cf358ffde0362061df1698cd1aecfeffad2dd4cd7b6e43e6e493ba351d7ed661,2024-05-28T19:15:08.857000 -CVE-2021-47378,0,1,5ea5e826dec8b76b410756090c46d1d228123900ca6f5676dcdceb9701ef0e95,2024-07-03T01:37:49.463000 +CVE-2021-47378,0,0,5ea5e826dec8b76b410756090c46d1d228123900ca6f5676dcdceb9701ef0e95,2024-07-03T01:37:49.463000 CVE-2021-47379,0,0,355ccf1026d45dfe8372730ffc02b05885def1eaa5fd74af6346a3f16202a040,2024-05-21T16:54:26.047000 CVE-2021-47380,0,0,d07b04e895db0b550c891d25b79b3be85d73be1eefc3bc0dd2d02ec1b8243012,2024-05-21T16:54:26.047000 CVE-2021-47381,0,0,ff9ed10e5eb606d4e4565d76a77446f0b56ae82ac3dbcce44c7852c76e0f1a0c,2024-05-21T16:54:26.047000 @@ -187205,7 +187205,7 @@ CVE-2021-47385,0,0,07eaed946a2a9d232c10ed4b0efe6bdf93e4f06b333db4eb289bd51a15464 CVE-2021-47386,0,0,44f1997d9cfeae54f6351b256ca991e2a6811de804a0722fee92cf555cdcddd4,2024-05-21T16:54:26.047000 CVE-2021-47387,0,0,6677a3ada1b90e26c087f5398695729cd49832bb12507b95bd0abd8cbe36f0c1,2024-05-21T16:54:26.047000 CVE-2021-47388,0,0,a2597a8082e6e7cfdc0a6885efcb2572358e29c5f700e35d61444e39d998c2f4,2024-05-21T16:54:26.047000 -CVE-2021-47389,0,1,ba875602e685e7335d08aef441b03bcd6c8778ebb815b60f4684d02c07f45205,2024-07-03T01:37:51.067000 +CVE-2021-47389,0,0,ba875602e685e7335d08aef441b03bcd6c8778ebb815b60f4684d02c07f45205,2024-07-03T01:37:51.067000 CVE-2021-47390,0,0,03c3564822ed1b7d876d50188b9c1ed1fb70ad73fcfdf2688c04d92b1ab95e21,2024-05-21T16:54:26.047000 CVE-2021-47391,0,0,cdc33f7c82603c94f36855422da7ddc848f1baeb16de5abf5385d9e35324c0a3,2024-05-21T16:54:26.047000 CVE-2021-47392,0,0,bb0e9ce9c96c156603b802686e332e3fc41735c81d7e887d2a01c5f3adef3945,2024-05-21T16:54:26.047000 @@ -187219,7 +187219,7 @@ CVE-2021-47399,0,0,cc68c09478e6c5eec983e1cebd0146a06a6502d1c0db75df5b32a5ff8a835 CVE-2021-47400,0,0,237afca36d8c00d0bb96d18349d83399fc064531391f52a74971929070a9c511,2024-05-21T16:54:26.047000 CVE-2021-47401,0,0,472b96e05aa3c77ed20d2122aa9930b3e1d9a5cc0808562aecfcc5ff8b64b81c,2024-05-21T16:54:26.047000 CVE-2021-47402,0,0,e0ef990aee7d555c2830e62f234c5eb41973383cc813065222f79da5004afef0,2024-05-21T16:54:26.047000 -CVE-2021-47403,0,1,08ee4ab563474f56852b2719b7b0bf75a748c36a1cf828e0ac8f1681f2363b1e,2024-07-03T01:37:52.627000 +CVE-2021-47403,0,0,08ee4ab563474f56852b2719b7b0bf75a748c36a1cf828e0ac8f1681f2363b1e,2024-07-03T01:37:52.627000 CVE-2021-47404,0,0,1e991f1a5a586ed7518f189a2e970eacf8609f95e050741874e23fa92a3095d8,2024-05-21T16:54:26.047000 CVE-2021-47405,0,0,9f71f45d34e0f9d60127ba4a920143ed9775e9d9ee7b2e35b04b7affdc0fdeb1,2024-05-21T16:54:26.047000 CVE-2021-47406,0,0,520cfff5f8c639e7ccb7f4a6f56f26231f2ce6030ff7d0ef78330f9e70bc2e08,2024-05-21T16:54:26.047000 @@ -187257,7 +187257,7 @@ CVE-2021-47437,0,0,400b2cfefeb28742e9cd9fa413ed008739dd199187af17d7cd4841d253d63 CVE-2021-47438,0,0,4df07f3c7f29d04799cea214a1d9a838ba17b31a9fa844f55807934e0ce96c9b,2024-05-22T12:46:53.887000 CVE-2021-47439,0,0,caf21942e898095d87bc284c58f9bd5666ba2ec0a29a0407146e84a77566d303,2024-05-22T12:46:53.887000 CVE-2021-47440,0,0,ac4af7b294baada150b51095a15aa2b8a0ff9132986ab7a375e2b531e64ddb95,2024-05-22T12:46:53.887000 -CVE-2021-47441,0,1,0f3b983feef84ab521b403aca7907c792115b545aee8b57acd22e8325593d7f9,2024-07-03T01:37:55.917000 +CVE-2021-47441,0,0,0f3b983feef84ab521b403aca7907c792115b545aee8b57acd22e8325593d7f9,2024-07-03T01:37:55.917000 CVE-2021-47442,0,0,c0d589ef75e72a0d696fe161badbd1b51079d08ade8f58fc1ab499030c22c105,2024-05-22T12:46:53.887000 CVE-2021-47443,0,0,ef2ff3871b1da15e2de22e234297e1b9b29a0d228d33ad609eb671f21d791a06,2024-05-22T12:46:53.887000 CVE-2021-47444,0,0,424d403222ef2e4f27f7c7e5c0dbbf9311c57e242b9cef695a5f5a4a946b84c4,2024-05-22T12:46:53.887000 @@ -187272,7 +187272,7 @@ CVE-2021-47452,0,0,94d947e053e167550dab7d76dbd08b03c34bc4853fafc8f8f90d074d6d488 CVE-2021-47453,0,0,f05c40506f4880d9d9f9d79d0dfd3a548f7d8fe135be0b5cce8bbae2b8a7db7a,2024-05-22T12:46:53.887000 CVE-2021-47454,0,0,c081b145297617f91a670f00c37bfb7e93f7532376ba05b45ec343c4766cf022,2024-05-22T12:46:53.887000 CVE-2021-47455,0,0,9fe08ace3f648aeda48f38cf2685bb483a333db0fc9cfc5d9a14bcb6955b1d59,2024-05-22T12:46:53.887000 -CVE-2021-47456,0,1,701327b2cb7120b48f1f4f39e6ace0a12c0220da4ceae15cd175605f4bc81153,2024-07-03T01:37:57.757000 +CVE-2021-47456,0,0,701327b2cb7120b48f1f4f39e6ace0a12c0220da4ceae15cd175605f4bc81153,2024-07-03T01:37:57.757000 CVE-2021-47457,0,0,247cd67a2c4bff8a87584f64b2100a0b4c3d5a8cd7dae84e54a875703952cb9f,2024-05-22T12:46:53.887000 CVE-2021-47458,0,0,8c60ddf5aa7c82cec253d5b9af258047a16466592a2d4d351dc8c946d3a073a9,2024-05-22T12:46:53.887000 CVE-2021-47459,0,0,9d7485ffc288401c62b17c99bd70aa862aec0e04be1f585bf7eb9aa88d4bdc36,2024-05-22T12:46:53.887000 @@ -187280,7 +187280,7 @@ CVE-2021-47460,0,0,3a86c1e69a33e1154ba95a2c4288da5f08e33431a303e020a1e6e75e0585f CVE-2021-47461,0,0,953190ae79f27312c4ff2e7b70def700ee40bff2756bbe748e8ba2824aaa3a74,2024-05-22T12:46:53.887000 CVE-2021-47462,0,0,b9377e39468fbe7c0422e61916da4905368c8e4e7b4e53c7866a68db6d61c893,2024-05-22T12:46:53.887000 CVE-2021-47463,0,0,f36b51722c9f6335983acc2ce4cb10a632ab09e39e6dc56d4afa7896f287ecae,2024-05-22T12:46:53.887000 -CVE-2021-47464,0,1,b2b22ef044e2823e1c45ba446b02f98fa45320b044f27af3461aacaeab3078b5,2024-07-03T01:37:59.053000 +CVE-2021-47464,0,0,b2b22ef044e2823e1c45ba446b02f98fa45320b044f27af3461aacaeab3078b5,2024-07-03T01:37:59.053000 CVE-2021-47465,0,0,9046453dcb263a9f567fe4b81a67e32f086601b8041f4d7e408e620156865611,2024-05-22T12:46:53.887000 CVE-2021-47466,0,0,14671d77f280c4a95c5219d4cf385422c37e1903f0001d7e87ce68909a5f1f08,2024-05-22T12:46:53.887000 CVE-2021-47467,0,0,8545acd7f0207ff792fbe479b106f9fba8d4e8125bc3422e61d5eeda847bf3a4,2024-05-22T12:46:53.887000 @@ -187292,17 +187292,17 @@ CVE-2021-47472,0,0,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113d CVE-2021-47473,0,0,a06d0b2b3fb2a56155409742cc763e481118233c333bae60fb67e17923573646,2024-05-22T12:46:53.887000 CVE-2021-47474,0,0,5aa7ee22ccceebf8afc658dcaeb529c380fd6398ba5a5b4aacbae80a3d788859,2024-05-22T12:46:53.887000 CVE-2021-47475,0,0,bda5bd6370629486bc328ef4919cd6bc566c5d10fcc12f7f374913a6b12c2f04,2024-05-22T12:46:53.887000 -CVE-2021-47476,0,1,1b42c81eb7f29ec566104afdaff00d3344433b6b6aa94d52090f3f923099e39a,2024-07-03T01:38:00.540000 +CVE-2021-47476,0,0,1b42c81eb7f29ec566104afdaff00d3344433b6b6aa94d52090f3f923099e39a,2024-07-03T01:38:00.540000 CVE-2021-47477,0,0,ffa7fb4c0919de71df07b8a012dfae46b4022776fa495a6ae239269875bb2af6,2024-05-22T12:46:53.887000 CVE-2021-47478,0,0,4b50f486053497bd64fced5c8414d2dfddc1d755bf91ba9f59173a416ff3c781,2024-05-22T12:46:53.887000 CVE-2021-47479,0,0,0d3cc8b3eae551511a3ebf95a6c1f3ca768cd3c6e99810dc993588d732622622,2024-05-22T12:46:53.887000 CVE-2021-47480,0,0,8300f17f999611b05708b693aa44ae8ca4973b78df7f104e1fae5389d87097fe,2024-05-22T12:46:53.887000 CVE-2021-47481,0,0,f289cc9077ce4e88b482fcaee94e98c93450cc4918238d5746979b1092f15fb8,2024-05-22T12:46:53.887000 -CVE-2021-47482,0,1,d3ac9665d27e7dd3222f790be23a9da91a7f3170d9af3ce2e3bb8b397a84081d,2024-07-03T01:38:01.587000 +CVE-2021-47482,0,0,d3ac9665d27e7dd3222f790be23a9da91a7f3170d9af3ce2e3bb8b397a84081d,2024-07-03T01:38:01.587000 CVE-2021-47483,0,0,73d06bef52378cc35c2ffe4b1d76ff6f1275047b38dd5bc503ebf8b86d40598e,2024-05-22T12:46:53.887000 CVE-2021-47484,0,0,5a88077a15611f8cc4f7ac814b49c5c5f94e79780e3e80e1c63803e3e6eb8df2,2024-05-22T12:46:53.887000 CVE-2021-47485,0,0,58109945935784f50d631a560cff62e533deeb63b75664b236f89f8794d6a0dc,2024-05-22T12:46:53.887000 -CVE-2021-47486,0,1,41d64af05f9f7e7f079d43365667fcc12c2bdc11c6514c521a628dc553dcbe93,2024-07-03T01:38:02.550000 +CVE-2021-47486,0,0,41d64af05f9f7e7f079d43365667fcc12c2bdc11c6514c521a628dc553dcbe93,2024-07-03T01:38:02.550000 CVE-2021-47487,0,0,1b569f2ae9600bd68c50b1cf935e085fa6762f0c6e5998fb0afef48e32dd7a6d,2024-05-28T19:15:08.983000 CVE-2021-47488,0,0,1224776e91c5a7612aad87d9026a02a5b19f103da745e1910b889fdfd0f43876,2024-05-22T12:46:53.887000 CVE-2021-47489,0,0,1333520ac3e371cd74d9375a514ddb772a332c275dc176d18b61aeff278bd492,2024-05-22T12:46:53.887000 @@ -187319,7 +187319,7 @@ CVE-2021-47499,0,0,3cb729b337901a00284a6dd8db82736ddaad024f1e9640e5f0e8d08e16ff2 CVE-2021-47500,0,0,74d2ead562c7a8cfb658c85619b684d056ae8dccec63a611bf0d1e925d8673e4,2024-05-24T18:09:20.027000 CVE-2021-47501,0,0,870af4a08d4b55f1863c12c327b2e2029b90dc310e8487386f6cf347cc93a9cb,2024-05-24T18:09:20.027000 CVE-2021-47502,0,0,489b6623b8c74dccbb6f028d20f48ac852f8eb858f83457824f15fb8ec72420a,2024-05-24T18:09:20.027000 -CVE-2021-47503,0,1,982249576876f88d1d9fdb452c39fb8005b1d89a5d75bffcabb4371bf452e2c0,2024-07-03T01:38:04.253000 +CVE-2021-47503,0,0,982249576876f88d1d9fdb452c39fb8005b1d89a5d75bffcabb4371bf452e2c0,2024-07-03T01:38:04.253000 CVE-2021-47504,0,0,86ff96cbd43f598a097462fee3a551a48e47e19d4c10d9021f9e31268d12d647,2024-05-24T18:09:20.027000 CVE-2021-47505,0,0,587d3c086ee291d7c3e4beeb005ab056c8aea3f2dfe0551edd8752e747b91e8d,2024-05-24T18:09:20.027000 CVE-2021-47506,0,0,8a036ea0bea3481775866f7cfac3fb39167e0258c06e62a11d0cb551000c32cc,2024-05-24T18:09:20.027000 @@ -187335,7 +187335,7 @@ CVE-2021-47515,0,0,4b0fe86c41ea131834566251cc2153f1aa2bacf98ee647015efe82de1a8fd CVE-2021-47516,0,0,15a9786f5620e3f86f14762bfeb0fd9b540c19e7b529f56cc4fe31072e97df0d,2024-06-10T18:43:51.307000 CVE-2021-47517,0,0,68d4b1f8179ad17d7741942e291913e77725f4cf220062ae984f0faae86bf9ed,2024-05-24T18:09:20.027000 CVE-2021-47518,0,0,6a1b8b570ae85bb8e3e3588fc7474f748dcff56362c577e6e39173de9dbc2cfb,2024-06-10T18:43:43.857000 -CVE-2021-47519,0,1,9d7cf0436a168eed94651f9f97570e76fac4f252f1de05082c2e8b81fbc9c269,2024-07-03T01:38:05.877000 +CVE-2021-47519,0,0,9d7cf0436a168eed94651f9f97570e76fac4f252f1de05082c2e8b81fbc9c269,2024-07-03T01:38:05.877000 CVE-2021-47520,0,0,d817bd4893be3bdef11401ab78c52bfe74ddeadbb3cf4e676b0de08a6efcf54a,2024-06-10T18:42:47.233000 CVE-2021-47521,0,0,ce9a91bed88014d5860697812b196996d6863014fc1671941612911524323b30,2024-06-10T18:41:35.017000 CVE-2021-47522,0,0,6a61ffb9002b23f7e225a7981a99e895e51a61ab4b5bcf936f0cba05ba0896db,2024-06-10T18:42:19.167000 @@ -187364,10 +187364,10 @@ CVE-2021-47544,0,0,f79795d45ec86024adc669e638f18860bcf298c02a6d3b83525f67512e199 CVE-2021-47545,0,0,7a729950c7b53801bcb4ccb943c7fd94366f722c2f1058fe3d0c7e067590cdcf,2024-06-13T14:15:10.783000 CVE-2021-47546,0,0,3af84ddd9fcd49edabe8726c0dd363f371de5b18d210c52c0f4f7bffa0beee4b,2024-06-10T18:30:20.320000 CVE-2021-47547,0,0,3055a8c1ecdaf1bebf0a74bb41eaf039135dbbab3ff1f7d004351f8f6b5ee172,2024-05-24T18:09:20.027000 -CVE-2021-47548,0,1,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000 +CVE-2021-47548,0,0,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000 CVE-2021-47549,0,0,a406083d84ba06ddf9b4bef66a889518dc29d66b05024c086f82e52467b59744,2024-05-24T18:09:20.027000 CVE-2021-47550,0,0,9fbf03d21b1e8a0f1003489b58f442ad23c18337e12097df9ffbbe17502eb9e9,2024-06-10T19:23:10.227000 -CVE-2021-47551,0,1,2037ebec9cd8406c75a4393d26ee8abf9ff4a8ae48c5458cedcbca08f15f44c0,2024-07-03T01:38:09.747000 +CVE-2021-47551,0,0,2037ebec9cd8406c75a4393d26ee8abf9ff4a8ae48c5458cedcbca08f15f44c0,2024-07-03T01:38:09.747000 CVE-2021-47552,0,0,97438f0e765b4e7960628f69c2b687bd556499171ecebfda3b09ccea176fc134,2024-05-24T18:09:20.027000 CVE-2021-47553,0,0,bf93bad92ccd11f0c351029d4dcbf970003f138802655bd44b126a6452abb59d,2024-05-24T18:09:20.027000 CVE-2021-47554,0,0,25c7d016ddc87fe8274bff744d76b6654441341e9799b78378e10bf6b5223787,2024-05-24T18:09:20.027000 @@ -187402,7 +187402,7 @@ CVE-2021-47582,0,0,2ce9440ba1c9bfa4fce1eb9f2a968e9bc20efa09fbaf77bbb876f9900c96b CVE-2021-47583,0,0,71356b902fbeb2a7776e143f0558c2a21afa193a7877d36978558eb4ad0c8da2,2024-06-20T12:43:25.663000 CVE-2021-47584,0,0,f95da46e379be35effbdbebd9c6dde440fb79cefcfd0cac47c33424036e8bc62,2024-06-20T12:43:25.663000 CVE-2021-47585,0,0,bbaab35a282507692a0e9407f1122cd2043f21129de9b01fb025cb4462f32c58,2024-06-20T12:43:25.663000 -CVE-2021-47586,0,1,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e203743018315a0,2024-07-03T01:38:11.913000 +CVE-2021-47586,0,0,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e203743018315a0,2024-07-03T01:38:11.913000 CVE-2021-47587,0,0,fa5cb28cf70ca95dc26ec4c09cc77bfd665285ce3c772fcd3808b6fd3d20fbf0,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,c08c3b4d8b14513f30d473c1f08b7308f5086c05ad9135336496a653214077ac,2024-06-20T12:43:25.663000 CVE-2021-47589,0,0,4149af2da59a86f91b3e41a07765832c87ebf4b81bee8efe27a599bbee03fbd4,2024-06-20T12:43:25.663000 @@ -187918,7 +187918,7 @@ CVE-2022-0551,0,0,e08f293b37e5f46391e4160f101b09ea5cff3fcbd38854b7db6f22155314b8 CVE-2022-0552,0,0,a3069e6a15248853b7dddc1f1ff07a24f38a97fb381cb5305a8cbb8b63666717,2023-02-12T22:15:20.927000 CVE-2022-0553,0,0,55817ed9980527bf2084443781acf52b0b4e8ea97ad2c0ecd38394d896b038ca,2023-07-21T17:13:15.200000 CVE-2022-0554,0,0,206c02c2c048e081bd0cc1e097927865a34adb033310eeaa2a52fce943c03409,2023-11-07T03:41:22.640000 -CVE-2022-0555,0,1,cf5d29e4aab187d9be51ba052de37fe9bcc280d9dbb0e255fac324c60c53cffb,2024-07-03T01:38:14.863000 +CVE-2022-0555,0,0,cf5d29e4aab187d9be51ba052de37fe9bcc280d9dbb0e255fac324c60c53cffb,2024-07-03T01:38:14.863000 CVE-2022-0556,0,0,6e6573ffaf259f6b836774745100afc166cfd1857d2ce580fd0eaff17a386504,2023-06-26T19:38:49.617000 CVE-2022-0557,0,0,c1dc62dbfe92704b7ae486f9a6c5148b91440c0bbddff6576f96f85dbd654f15,2022-03-18T21:00:13.693000 CVE-2022-0558,0,0,540ea40562eb2bf5f69bd24d6ba8845f7f5baa4987556f791a63253d6491e5a7,2022-02-17T13:54:33.137000 @@ -194358,7 +194358,7 @@ CVE-2022-25477,0,0,d20a27df31d38af0afc20c681228c4a914eabe55303b966622f4ed5bb1b1c CVE-2022-25478,0,0,70e7c014b7b7f01e5419065792c5e0879950224514b5eee9a13a25f85d4890c3,2024-07-02T19:15:11.870000 CVE-2022-25479,0,0,bbcbe3ce2d31a511def7cbae6b0c5276bdbdd0c47a66e512186e701cee1954bd,2024-07-02T19:15:11.957000 CVE-2022-25480,0,0,b85c1709cb146bb1b0393a679e804a8c10249abb28f64a7e7994dfbec0265b6b,2024-07-02T19:15:12.037000 -CVE-2022-25481,0,1,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000 +CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000 CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000 CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000 CVE-2022-25486,0,0,f49d709b52c7d7fce93d2631d774ac42d59ac75a64d7eb0b86f75b827afbefeb,2022-10-27T19:24:47.267000 @@ -194888,11 +194888,11 @@ CVE-2022-26121,0,0,4817365b3bafeb84d119c418106e525a51ee13efbb3dbeff4f67392c24807 CVE-2022-26122,0,0,164e09a43d54baa84f677905fe92592c3975ef059fd5c9aad24fb02dab655a90,2022-11-04T13:20:04.217000 CVE-2022-26123,0,0,1787ce5646f40762dea206165529e10857c399b1641402cf9a38d3372b8e1c52,2023-11-07T03:44:55.963000 CVE-2022-26124,0,0,e20bb143cce5026d61c911367e43a77e98b0573f5e60aa8ccd3e2b66894fc66e,2022-11-17T15:30:49.277000 -CVE-2022-26125,0,1,582316c4ef30c4c58e084f484da8323c1453b9e25ca9a09299e1cae3081bdb5f,2024-07-03T01:38:21.020000 +CVE-2022-26125,0,0,582316c4ef30c4c58e084f484da8323c1453b9e25ca9a09299e1cae3081bdb5f,2024-07-03T01:38:21.020000 CVE-2022-26126,0,0,32dfa62d61a5d16f68bd723c2983b613f1a7c7b8e207663a6170c469abb99101,2024-04-28T07:15:07.730000 CVE-2022-26127,0,0,162a6115c253725d88345b3571e46cb238048a196a7344dc52efb4e4459ecb24,2024-04-28T07:15:07.867000 CVE-2022-26128,0,0,4149c1ef554e8b47bab5fb405b73b0533394c6970d1244b41e94f3318f660640,2024-04-28T07:15:07.963000 -CVE-2022-26129,0,1,be0cc07a4702becddd3794850dbc57a0064de81f4cb4bfe11e1098fab3d87289,2024-07-03T01:38:21.390000 +CVE-2022-26129,0,0,be0cc07a4702becddd3794850dbc57a0064de81f4cb4bfe11e1098fab3d87289,2024-07-03T01:38:21.390000 CVE-2022-2613,0,0,2705769156bba6f27f784ac788bc68d117dccf546508708f0b6cf796aa748101,2023-11-07T03:46:44.133000 CVE-2022-26130,0,0,e3cfbac27b943eb46061ce2deac038d92c7f0bb2ed8b82045deb01a11bdc767d,2022-05-16T12:34:17.893000 CVE-2022-26131,0,0,e201a577539ce448fa5c37858b58af9176e209c969b7e93a64a87874412b5ef2,2022-03-23T18:37:02.983000 @@ -195227,9 +195227,9 @@ CVE-2022-26572,0,0,01c797f9a77e6e2b9279647e62838ffa3e2a27c62fdfb7bc4bedeae68df4f CVE-2022-26573,0,0,9f167d5a94f2530d8e6c43911a2d982d77df738c06c1b7368ae74c71c695f90a,2022-03-30T13:21:27.910000 CVE-2022-26579,0,0,34b379c12b5d03dfbaec21616363cb5826febae928d39efa804828796a8d5a94,2024-04-23T14:15:07.533000 CVE-2022-2658,0,0,152df8f2a13fa84f4559eae28af444eb0d81dfa93cd10d6d7431b9f674479e1e,2023-11-07T03:46:49.523000 -CVE-2022-26580,0,1,f543894f2f75ac368db1151522cde06bb943ac19596b2e1c9cf1cfb514549d90,2024-07-03T01:38:21.617000 -CVE-2022-26581,0,1,174108667d340651719ef5f66fff4f38b8122b06cc9eea26de8fccf3397a38d8,2024-07-03T01:38:22.477000 -CVE-2022-26582,0,1,e4f10cd55660a637b07cb5ff153889c32c9d119539c8752bb8398394b57ee532,2024-07-03T01:38:22.713000 +CVE-2022-26580,0,0,f543894f2f75ac368db1151522cde06bb943ac19596b2e1c9cf1cfb514549d90,2024-07-03T01:38:21.617000 +CVE-2022-26581,0,0,174108667d340651719ef5f66fff4f38b8122b06cc9eea26de8fccf3397a38d8,2024-07-03T01:38:22.477000 +CVE-2022-26582,0,0,e4f10cd55660a637b07cb5ff153889c32c9d119539c8752bb8398394b57ee532,2024-07-03T01:38:22.713000 CVE-2022-26585,0,0,cefb1ad72e785c7e7ecf73600bb23b412fbb7fef5fe7531babf9c249998f62e7,2022-04-12T09:37:17.017000 CVE-2022-26588,0,0,8195e99d6dd05d1581cfc3f4163d469b39955563cb6b6d19490e2f825fea9f89,2023-11-07T03:45:04.337000 CVE-2022-26589,0,0,61c95cbdf519db7c8bde3a668b533cb90d0d1c1bcf85dc941779e875a17ea627,2023-11-07T03:45:04.600000 @@ -196305,7 +196305,7 @@ CVE-2022-27944,0,0,7e417e1e7e2bf65c062ed500719f749b95d6a9ace155dd430cafec7e1fcfc CVE-2022-27945,0,0,239925ab507025f2c54c4b0fc5a716be01a92ca1981af1955b43c7b1ec519991,2022-03-31T01:01:29.273000 CVE-2022-27946,0,0,5347d3c82d0da0f956d76a34a42b617b89894dcf6da906a0243ab1fbd8673eda,2022-03-31T01:00:49.037000 CVE-2022-27947,0,0,ea376bf30641c63aae1ce823ecf36bf2adc6a3dd9a76e9bd00c871fe4e649450,2022-03-31T00:59:20.323000 -CVE-2022-27948,0,1,a53fd08aee714839d7d9f3d1a1cfda951b9fdfd6ea78ac2558f68344115ee043,2024-07-03T01:38:25.163000 +CVE-2022-27948,0,0,a53fd08aee714839d7d9f3d1a1cfda951b9fdfd6ea78ac2558f68344115ee043,2024-07-03T01:38:25.163000 CVE-2022-27949,0,0,784d5fbe8a68ae965db6aba31257ffb3272a7ca9a5fa2e4fbc860454d0253f69,2022-11-16T18:52:04.637000 CVE-2022-2795,0,0,49588383ad557395a4f15b6eb17882563ba8a7a281bfa39d2ac141c631198817,2023-11-07T03:46:53.600000 CVE-2022-27950,0,0,c7f46baa9749906a7bbe17c4acd2ce63e0af0b0df0facb02e4597fac1d286f97,2022-04-05T13:08:56.440000 @@ -196859,7 +196859,7 @@ CVE-2022-28652,0,0,175f00525a87dceb7a234c5311850586afb57155f0eba4be3b8fca1c044bc CVE-2022-28654,0,0,bd5b11f0530d7b1f2f227dc48086186c6ed13ebed1cd8a9485ef386ed1c85e82,2024-06-11T17:04:47.620000 CVE-2022-28655,0,0,69c04d36f6023b198a9f94ddaa234c34c62ba3c3283b0e3c84b5ec96a611a116,2024-06-11T17:04:20.947000 CVE-2022-28656,0,0,10ed4078111225055fc73e8d5c93bacba765e9be1bd5927b0ca5a032ed105fa9,2024-06-11T17:02:46.767000 -CVE-2022-28657,0,1,06fc2415c033b6ca9a7ef6f695583d44086aec51b4b1923db9e5850171d149c1,2024-07-03T01:38:25.937000 +CVE-2022-28657,0,0,06fc2415c033b6ca9a7ef6f695583d44086aec51b4b1923db9e5850171d149c1,2024-07-03T01:38:25.937000 CVE-2022-28658,0,0,0e63e959545e5e1f31bf991eb041fb7c708844e024447417ac0d2441a507b62e,2024-06-11T16:56:43.970000 CVE-2022-2866,0,0,39936636c7b18b74703b9b6f9b14aacde95244838843f9eb43e74857aedd50d3,2022-09-02T22:02:57.273000 CVE-2022-28660,0,0,56c6ace0e4d9c9af155b31cd3cc2403dccde1c6848618344b9372c4d85c50f7f,2022-10-07T15:45:37.153000 @@ -198279,7 +198279,7 @@ CVE-2022-30329,0,0,1e4dd5a55573e7e5a013b63f922cccbee97ab466e2a60437c8ca4ae025888 CVE-2022-3033,0,0,04d6f731ac8bfa74ecd44970b9b4139094e5c3f9a2dccd741e7f3aaf386e9788,2023-08-08T14:22:24.967000 CVE-2022-30330,0,0,876c82068abdcf186aa7b3e8a5f8616f863cc3d82cca821d376d16d4b07af7ee,2023-08-08T14:22:24.967000 CVE-2022-30331,0,0,b59f313d8f3ba3a246834807358e04b85d223642f4ad3f5d1588020d00fc8d4a,2024-05-17T02:09:04.580000 -CVE-2022-30332,0,1,c101b05288b71e38fad6a64517c7456bf7788930b89b4f27c13db023f289ea64,2024-07-03T01:38:27.583000 +CVE-2022-30332,0,0,c101b05288b71e38fad6a64517c7456bf7788930b89b4f27c13db023f289ea64,2024-07-03T01:38:27.583000 CVE-2022-30333,0,0,55300acd01befeaf7a91f569ccd8af135dbdc96ed4ccbe77000e577c74150005,2024-06-28T14:12:45.617000 CVE-2022-30334,0,0,cd25538698a372e38cded8a3faa0ddac856c8de83bfb793bc0c3db012023959f,2023-08-08T14:22:24.967000 CVE-2022-30335,0,0,f793ef292c40aa9629afac7f2d724bbe8c9406a4419beea8dad8af24e5cd174a,2022-05-17T19:15:34.883000 @@ -198304,7 +198304,7 @@ CVE-2022-30375,0,0,e332890859c56dcfe5a6b8701700d0e06d4a661dd4b04ab8582794681d383 CVE-2022-30376,0,0,2f15d0767febb438935bd574cb5691032de5b5860b997c4b39555abb4825ea92,2022-05-23T17:11:19.630000 CVE-2022-30378,0,0,c0b82b4e3286c616bf4771f0e6afe61660b7771be1e95a5db6c3146a5a53e67b,2022-05-23T17:11:01.687000 CVE-2022-30379,0,0,406a6b36b3be7d7e33d681ec295bce38da0c7073fc6b4a86196b523f835d3158,2022-05-23T17:09:03.923000 -CVE-2022-3038,0,1,cf8e656dc05bc180104c1539a60d0f56fa26e9cc9a7119d78970b2f0e321a7e5,2024-07-03T01:38:43.383000 +CVE-2022-3038,0,0,cf8e656dc05bc180104c1539a60d0f56fa26e9cc9a7119d78970b2f0e321a7e5,2024-07-03T01:38:43.383000 CVE-2022-30381,0,0,bcdd96ae4df6372bdae86d919c4b8843f6e880893a867237882b64198f43f345,2022-05-23T18:02:46.847000 CVE-2022-30384,0,0,5a4ed52707188c5a36e98b161cc45869d9528166765143596e0fa54aeb89b7bc,2022-05-23T18:04:10.067000 CVE-2022-30385,0,0,ad44945b47f058a58f9030d235daab30b9074079c5eeec09caa5cc8bd7d26887,2022-05-23T18:04:30.260000 @@ -198680,7 +198680,7 @@ CVE-2022-30795,0,0,d0afae6b28561907e08e2963502bbae872b588976d360924ac68a79aa50b4 CVE-2022-30797,0,0,ae7e005adcbfb38dbaab6123d22ff93d4b659d1f3a472bd2307807f4b633e525,2022-06-10T20:36:51.240000 CVE-2022-30798,0,0,8be9505911799c127a304bd3fcbb609eb716e100110ff3b89d8d5b2851332370,2022-06-10T20:38:56.497000 CVE-2022-30799,0,0,fabe6cec1e20208ca3bc15977ff4f8fd1df073ef498bf1a7586cb522e4a42184,2022-06-10T20:57:51.350000 -CVE-2022-3080,0,1,946ca10978ab642b4374b3c035e430d06fa82d8d91b5814e555a8547309b7e20,2024-07-03T01:38:44.257000 +CVE-2022-3080,0,0,946ca10978ab642b4374b3c035e430d06fa82d8d91b5814e555a8547309b7e20,2024-07-03T01:38:44.257000 CVE-2022-30804,0,0,5676975de26e9c8bc92b48c568bb46bc5cb3d391499f631e1bf74d20be5360cb,2023-08-08T14:22:24.967000 CVE-2022-30808,0,0,e93dfc501b28f491b755845b8900661c5fe62bbb60ec70c39559280db3e20f7f,2022-06-10T14:47:00.813000 CVE-2022-30809,0,0,623aa735d4f96341d0f16ac639869e6d5c195afb856a144a7ab7f104301e883e,2022-06-10T14:41:31.080000 @@ -199546,7 +199546,7 @@ CVE-2022-31808,0,0,a9b5adcb1cbf57448d4754888c6d0a2e2adeae6958ec7a5c06b412439f2ce CVE-2022-3181,0,0,c0e551ec256e0b4dcebdb7d7ffd4438a390baae8c12a5cf470be82263a004724,2023-11-07T03:50:56.520000 CVE-2022-31810,0,0,3a734843782c1a61aa965152632f6604e0c3c6f24d4914a2e3fa2caa9d34aeec,2023-07-19T14:41:04.087000 CVE-2022-31813,0,0,df3b0a1f72f0b0119f7b950f2fdf2dc9e701be98dd4afa23c271cff4b4d42dec,2023-11-07T03:47:42.113000 -CVE-2022-31814,0,1,6cbc1b4477b1236662c89ab49d263616c38df0276d7a2eb2391f2ecbfb3409f5,2024-07-03T01:38:28.430000 +CVE-2022-31814,0,0,6cbc1b4477b1236662c89ab49d263616c38df0276d7a2eb2391f2ecbfb3409f5,2024-07-03T01:38:28.430000 CVE-2022-3182,0,0,77198b1b7f0d25b2761674d7500044aa2eca35e83ab6395f7e42e5a1b4dc3487,2022-09-20T19:09:43.470000 CVE-2022-31827,0,0,f53b8d3e16db7ab42ba9462051b73c9785cbe75d5b5fa09f3bedd02e1abdb642,2022-06-15T17:55:47.803000 CVE-2022-3183,0,0,aec626c36c170416185eda3829c503344d8797c0e7dd3346930be0cab89db5ad,2023-11-07T03:50:56.953000 @@ -199868,7 +199868,7 @@ CVE-2022-32271,0,0,f91a809a45aa1334650a473ac5f65456fca4868edbcb75c338ac23b8cf864 CVE-2022-32272,0,0,56190bbc7af934772fc708f9ef383de6197d73f8d32f8c2ce29a532f4649135c,2023-03-28T17:15:11.453000 CVE-2022-32273,0,0,89055a972aa081f8ac177f480aaa792aa0052d747db15cc67554ba63abf7a95a,2022-06-15T14:51:59.957000 CVE-2022-32274,0,0,ed4b3b35e055002cf7f2f360916410db44e0ff1b3dc342e47e68335bd1efe2f2,2022-07-26T10:20:03.307000 -CVE-2022-32275,0,1,deb62146fbd782911f2d9038ca7c0fd978d9b14fc944e6cb9f4a00b8f8df79c1,2024-07-03T01:38:29.250000 +CVE-2022-32275,0,0,deb62146fbd782911f2d9038ca7c0fd978d9b14fc944e6cb9f4a00b8f8df79c1,2024-07-03T01:38:29.250000 CVE-2022-32276,0,0,ab4e8943bdc56710c860e4b6f1e1abdedefd94a4ec9b2461d6e70ff3160bbb33,2024-05-17T02:09:54.600000 CVE-2022-32277,0,0,075b0c9f67aff6c6738a9f4becff639765c931f1519efc5a74741489a7912c02,2024-05-17T02:09:54.693000 CVE-2022-32278,0,0,dba070cb697d21a95dbf009b53f96329651c357a84432fa6611190fa0a8e2103,2022-07-08T16:46:06.147000 @@ -200051,13 +200051,13 @@ CVE-2022-32496,0,0,5a7e62ff7cb6a6820cfb109eaf351a8361842dd7987c2aa5041c8e594eb1e CVE-2022-32497,0,0,ade8e224378cedef31903a8de3bff4489d1ed831c984b6cb549a5284d237c86c,2023-11-07T03:47:50.543000 CVE-2022-32498,0,0,5ba50e2e5f495efe36b157febed2f9aeb8e46b983dff6b21b466844eec402f3a,2022-07-30T01:24:17.157000 CVE-2022-3250,0,0,fbcdc8d2496a6ea80a56c106db7a35d772c41695a76d66908aa618ebc896f83c,2022-09-23T17:00:34.603000 -CVE-2022-32502,0,1,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b88f,2024-07-03T01:38:30.257000 -CVE-2022-32503,0,1,f57183dbef2543b9f63dcf473a4267a67a4ba901286e8bc05468ac8a81f43f5a,2024-07-03T01:38:31.060000 -CVE-2022-32504,0,1,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 +CVE-2022-32502,0,0,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b88f,2024-07-03T01:38:30.257000 +CVE-2022-32503,0,0,f57183dbef2543b9f63dcf473a4267a67a4ba901286e8bc05468ac8a81f43f5a,2024-07-03T01:38:31.060000 +CVE-2022-32504,0,0,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 CVE-2022-32505,0,0,77d3fa3e009e6a469d7813bdcaf5b038df2d68f523ef734964e2f14be10c3762,2024-05-14T16:13:02.773000 CVE-2022-32506,0,0,739325b4b5ccc18b1252783c7e34b3ed907901a55943034438438db03f993eb9,2024-05-14T16:13:02.773000 CVE-2022-32507,0,0,1c12ff48ffcf657cbc6fe182911360d733342b45e08662f91df2b0b30cf36c62,2024-05-14T16:13:02.773000 -CVE-2022-32508,0,1,a82e6070d51429707c08716a8f4c6bc4c23bc87bd713671d9f9c95e952ee7b45,2024-07-03T01:38:32.660000 +CVE-2022-32508,0,0,a82e6070d51429707c08716a8f4c6bc4c23bc87bd713671d9f9c95e952ee7b45,2024-07-03T01:38:32.660000 CVE-2022-32509,0,0,2426eaffc80b093787f731f6e410f9c119b75c46ec3ccb8017af3e9de9cbdb32,2024-05-14T16:13:02.773000 CVE-2022-3251,0,0,031bdfee899a2701c89c75c36f3087b8bc560e9d6e5e3a7aa4a82daf3c759fdf,2022-09-23T16:56:54.663000 CVE-2022-32510,0,0,9081216e6c6a2685d4ed8d8af1fc541bb2ce3ca18ecb43575857fae9c02c1544,2024-05-14T16:13:02.773000 @@ -200295,7 +200295,7 @@ CVE-2022-32739,0,0,315ae5b8454cbd4fe600e02bcbdcfa719c96a706ec94a57d44c4c9af98c21 CVE-2022-3274,0,0,6f79ba87ede54d24f0edf49b0b70078b6ddc0d5b11cd5d60d5665f9e1993e41f,2022-09-26T14:05:38.923000 CVE-2022-32740,0,0,1421b70287d9f57f4df6659ad7c1e2a7a0c2efaee128af981713d361fecbf561,2022-06-22T12:42:36.647000 CVE-2022-32741,0,0,b0c95053a325d3b04555e964911ce6522f5ddd4018929080efb7444104d0f65d,2022-06-22T13:41:06.453000 -CVE-2022-32742,0,1,91e1575d63a607cdbd585c40aaa750f3be10191c42d762564cfef7a090a2b463,2024-07-03T01:38:33.443000 +CVE-2022-32742,0,0,91e1575d63a607cdbd585c40aaa750f3be10191c42d762564cfef7a090a2b463,2024-07-03T01:38:33.443000 CVE-2022-32743,0,0,a35927822b8b1cd64483e08c3e1b86277897a8089c644666ebbb2f740b9ad312,2023-11-07T03:48:10.633000 CVE-2022-32744,0,0,19b84c4d4fa814744c604f8c7c8876997f08058bba7d9e274310062dca294c70,2023-09-17T09:15:10.790000 CVE-2022-32745,0,0,eb4e71a3b53baf6ad3e64634c9bdba0c220070c1e87f0abbe7802079bc995be7,2023-11-07T03:48:10.707000 @@ -200457,7 +200457,7 @@ CVE-2022-32893,0,0,d94366aeae31f2dc5d0a6f0c277dae91ad53f4a7936b122b0c8a85cb2b6b7 CVE-2022-32894,0,0,258579e09971ddea3b4815a13f4b228f09b463853438998782e99d4d4a74b2e8,2022-12-07T03:02:55.287000 CVE-2022-32895,0,0,a866a4ecd54090d59826e47060c2fe31da4fd60afa522dd3d88fdd6339a97c2f,2022-11-03T14:38:33.867000 CVE-2022-32896,0,0,17fd28355dac713cc35d13c78c58dc3e1c8b430c0015f022b283eda11acef2f1,2023-08-08T14:22:24.967000 -CVE-2022-32897,0,1,d3d6c939e90fb5f7f4e2b153c4cdf90d943957a76a34501fa289e2ad32993494,2024-07-03T01:38:33.783000 +CVE-2022-32897,0,0,d3d6c939e90fb5f7f4e2b153c4cdf90d943957a76a34501fa289e2ad32993494,2024-07-03T01:38:33.783000 CVE-2022-32898,0,0,dc4c5dc9a5f3f10252df3b48ee72cd91d41244a4d9e1d63ef2e7b84b757e902a,2023-01-09T16:41:59.350000 CVE-2022-32899,0,0,afe99f73cfd08bcbacadec410d0fe2bcc62f7d2c73f75e55f14d8746d172f152,2023-01-09T16:41:59.350000 CVE-2022-3290,0,0,2598192fd9d11269a3309ca73acf9adcc0a3e7182df9deebc35808ec4cc8523b,2022-09-28T13:54:11.263000 @@ -200746,7 +200746,7 @@ CVE-2022-33242,0,0,a91e1e8cebe0d25eaf3c677f8ca5a1b4701f474e25d2503162b030fee6ad9 CVE-2022-33243,0,0,d55d737fb6bfc0caa4cea887c8886f5d2db34651e9d244f7d01822adc93e6053,2024-04-12T17:16:08.560000 CVE-2022-33244,0,0,3ee08aa09a045fd91f9a2932cccc9fbadd4b205e5b277acbb287b3371664056d,2024-04-12T17:16:09.260000 CVE-2022-33245,0,0,22f4e7335f05655004ec8051dc645052e4325cf7be478f789344f6b21a569dae,2024-04-12T17:16:09.680000 -CVE-2022-33246,0,1,71cbd60d3cc45c35a37dbdd021a27eb16750ec7bf40fa5641eaa1f2a28b066fa,2024-07-03T01:38:35.110000 +CVE-2022-33246,0,0,71cbd60d3cc45c35a37dbdd021a27eb16750ec7bf40fa5641eaa1f2a28b066fa,2024-07-03T01:38:35.110000 CVE-2022-33248,0,0,db26acbf366eb7afdc81fbccde376a7cefe22b6727c744bc64f02804e24dc177,2024-04-12T17:16:10.593000 CVE-2022-3325,0,0,dd195acbe719e05394cbed0f080aa81ff8523914e8030666b0a42fdc0ee0377d,2023-08-08T14:21:49.707000 CVE-2022-33250,0,0,7e16f301ec38c138c511b21aedd28e32c8a4a6604045b36000b48431820d15fb,2024-04-12T17:16:11.233000 @@ -201606,7 +201606,7 @@ CVE-2022-34557,0,0,eecc8b4bc07828b9b1046bebce9f29c4e5bf4a70e8e91f5056094a302147e CVE-2022-34558,0,0,fbe60d47fc8f6f689dbf168e606cdea671312f94d428e8ee9c8ecf061888f6d0,2022-08-04T18:14:00.777000 CVE-2022-3456,0,0,b8ac2735d87fb3428674d1a6a5c18dac0738f373459ad6b97d466d7c80e95ab6,2022-10-14T09:18:29.033000 CVE-2022-34560,0,0,e91d51c2883781c533c5a1902138bcfefc9afc3404c46a9ecd9b9328f3d71189,2024-04-22T19:24:12.920000 -CVE-2022-34561,0,1,7a1d876593aca947858cbf9ce774fe978316dedeefc5275fb7c9ba221e2f79ac,2024-07-03T01:38:38.140000 +CVE-2022-34561,0,0,7a1d876593aca947858cbf9ce774fe978316dedeefc5275fb7c9ba221e2f79ac,2024-07-03T01:38:38.140000 CVE-2022-34562,0,0,9ade501ca25f94b5887ae7ee8ff2f0e48455417107d579d0eb7087214d71a829,2024-04-22T19:24:12.920000 CVE-2022-34567,0,0,c7081cacbea5c4bf7e640ccd7be62566ef6f65f476c142672c62d14de0fec3d5,2022-08-09T15:16:01.133000 CVE-2022-34568,0,0,7d7e21cf0f762a871ae8e12be991913f168ecf5cf382ff57f18f7a6cb3db8140,2023-08-08T14:21:49.707000 @@ -202426,7 +202426,7 @@ CVE-2022-35493,0,0,3fbd6e82bbdf46b2fc6829f415a2cc90121509376addf5102172805f20f63 CVE-2022-3550,0,0,756957ccd55359b7c0978f68036f94b6b7a1a89f37ba4fbd76e88b0c1375bad5,2023-11-07T03:51:25.593000 CVE-2022-35500,0,0,e4a3e6aaf78e4048d7dd258306698c8f6c2483fa0c0e3adbb5e1e15607e82bd5,2022-11-28T15:26:40.780000 CVE-2022-35501,0,0,0f02773590d7a16f97f67c931824c201f7e648389cd66dfda888e1343e91f455,2022-11-28T18:14:00.097000 -CVE-2022-35503,0,1,78b337d66b660c134bf977e18ed937eefcd19739330fc6789be3bfd04de5b06d,2024-07-03T01:38:39.057000 +CVE-2022-35503,0,0,78b337d66b660c134bf977e18ed937eefcd19739330fc6789be3bfd04de5b06d,2024-07-03T01:38:39.057000 CVE-2022-35505,0,0,6c78edaa4497d167f87abd11a1b8b8aa506854460361fcf9259c1dc57318c246,2022-08-10T15:48:34.157000 CVE-2022-35506,0,0,43651b2bf00b655a27022bdb0fe35c1cce7134fb3dcfbf8b5fc5c0c25002da17,2023-08-08T14:22:24.967000 CVE-2022-35507,0,0,e86eac31135a1e76950fd89549b8296eb5af137be3ef8ade737d6ee342e0e457,2023-11-07T03:49:18.840000 @@ -203749,7 +203749,7 @@ CVE-2022-37015,0,0,26ac84e20527e936bb600212843b8f28317497b7cf5774ac209ffd3574ba5 CVE-2022-37016,0,0,af22d1a738a017c331839a2ce3a7b82ff4cb1c516c429af17730fc70dbbd928b,2023-08-08T14:22:24.967000 CVE-2022-37017,0,0,7dbbb2db383a65e34cfecd910337739e41614ef36b7e475c8358204ab8b1fca2,2023-08-08T14:22:24.967000 CVE-2022-37018,0,0,8cf3ca0e518e3ee0e2fa7290fc1879e49deefc718751e150a277388265762a6a,2022-12-20T19:30:46.703000 -CVE-2022-37019,0,1,7cff26cf17d9c4f08e037c921ad6ecad5294a5f236afc7ba7e9d80b7f76b7c14,2024-07-03T01:38:40.297000 +CVE-2022-37019,0,0,7cff26cf17d9c4f08e037c921ad6ecad5294a5f236afc7ba7e9d80b7f76b7c14,2024-07-03T01:38:40.297000 CVE-2022-3702,0,0,7b6c03663b66d4cb07a5c874ce6757b9ee999f9d0b92a04bdb1c2dcd37536a24,2023-11-07T19:48:09.467000 CVE-2022-37020,0,0,62c76d7487d81e0d00ce9884ed6661abc80ac63dee48344d3f4b997438d9d33a,2024-06-11T13:54:12.057000 CVE-2022-37021,0,0,8457916b93c24ba9a7e4ca4fc479cc2e4823ece1b38743970c89cda20001b78b,2022-09-07T00:57:58.920000 @@ -204048,7 +204048,7 @@ CVE-2022-37406,0,0,fbdd149ad63023ba8de7832926e0ff0db7c8a46d931054e7f55cea54ab409 CVE-2022-37407,0,0,156baf94556463331abf1cc9614f6e7da38ccbef3879796f93c7cbc2fe670bf0,2022-09-10T03:39:20.550000 CVE-2022-37409,0,0,77033a962ea4c09422012ff858029b433fecf0270ecd2744c4c0e42112c644aa,2023-11-07T03:49:48.137000 CVE-2022-3741,0,0,ffb9c71793d80e28b322f5564814f73b4a37b59b0d5f16419a808fe0b6f07077,2022-11-01T18:45:08.013000 -CVE-2022-37410,0,1,6987cc70676556b3bbe994ef7db0b33a34a917081523d455e1ae7db68db1126b,2024-07-03T01:38:40.667000 +CVE-2022-37410,0,0,6987cc70676556b3bbe994ef7db0b33a34a917081523d455e1ae7db68db1126b,2024-07-03T01:38:40.667000 CVE-2022-37411,0,0,1bcd26787a54b9196a874682ded35ddf9f1403d90c19a6068c9bf5c768f49a0e,2022-09-14T21:35:49.463000 CVE-2022-37412,0,0,b2bce03cfcaacc79be2a70461b0912eec0656cdc13b38f31f01f3488e7613e7b,2022-09-10T03:38:32.353000 CVE-2022-37415,0,0,d695e7f47fd1fd0357ef75bfa09df31ebdd7591912a5825c6f29245bb74e5f2f,2023-08-08T14:21:49.707000 @@ -204524,7 +204524,7 @@ CVE-2022-3816,0,0,345004d8efc9c5a042aa3b332ad957769af11790ae1a1092bafcd85fa03cfd CVE-2022-38161,0,0,c6e949eea01024dd16b4b0caf69f8df1a0555dc2c6edf25a6260ce5ca216c9f3,2022-09-15T17:08:49.740000 CVE-2022-38162,0,0,a3d634cc9852288db1e49ed0e2ad5f0177fd9f79ca201e09260f41f764c3346f,2023-11-07T03:50:03.920000 CVE-2022-38163,0,0,606d4976fd9ef59bb309b68e4b8b8dbb98aed4fa72eecbf3ebd68c800f4fea7e,2022-11-29T18:07:23.960000 -CVE-2022-38164,0,1,567866c3349a6760f7f32cb4decacc913008f2cee52d37e8d66d3de0e5024e0d,2024-07-03T01:38:42.007000 +CVE-2022-38164,0,0,567866c3349a6760f7f32cb4decacc913008f2cee52d37e8d66d3de0e5024e0d,2024-07-03T01:38:42.007000 CVE-2022-38165,0,0,8ffd75ae2b232d05010b6928dab600e411d9aa9b693a05f9617fa8b8c985632f,2022-11-22T00:41:35.893000 CVE-2022-38166,0,0,cb5a6104982f97dc342b1301fbdeb6ca4b2aa23ce352c39925def6364f8e3b88,2022-11-30T21:10:40.080000 CVE-2022-38167,0,0,01feba81785a679ed7ab94793444f6983d192908ef236a1aa0bda9e53160fc9a,2022-11-17T20:25:27.510000 @@ -204953,7 +204953,7 @@ CVE-2022-38705,0,0,58464e4464999c640433dc31f1c8330cb2c23deda3c39c084ec5a974591fb CVE-2022-38707,0,0,fb094ae991a56c0c795b92715485f656ef83ff68d78429d79cc4722b4bfcb2f3,2023-05-11T14:17:11.117000 CVE-2022-38708,0,0,aecadae88af05d1c96a0043887df11993569751eabbe6505af244121f12692eb,2023-11-07T03:50:11.823000 CVE-2022-38709,0,0,e6e88bea3274f28e2d41d42790eb92f3fa3c687a4752ded25cabcefcd876c1ea,2022-10-14T20:30:32.833000 -CVE-2022-38710,0,1,830e0e94583ffcb8159f179750666649292743dd25ba595d9d9d7fd875daf9ad,2024-07-03T01:38:43.047000 +CVE-2022-38710,0,0,830e0e94583ffcb8159f179750666649292743dd25ba595d9d9d7fd875daf9ad,2024-07-03T01:38:43.047000 CVE-2022-38712,0,0,4b55d3db6ded2fd8dc07767cd59a1d6e8318d653d3d714c522d1c3eeb9f03127,2022-11-04T15:16:45.807000 CVE-2022-38714,0,0,b47899d93b52f94a55f4a4d167a2f32243af9e6db459e546eaafc429ba85cd53,2024-02-12T20:39:15.693000 CVE-2022-38715,0,0,9b2d253f7fa658444f770869b0badf5cc7f24116022485b34ef44200a43fddc1,2023-02-02T17:22:07.650000 @@ -206449,9 +206449,9 @@ CVE-2022-40812,0,0,acf4c5c8a7f13ceef567dd77ac5ac9383f064e5c09aefa2d062af82f8e0c2 CVE-2022-40816,0,0,3d6397b201f81c1a859601be465a6709932746d332fb0c7562520fb70aab7a84,2023-08-08T14:22:24.967000 CVE-2022-40817,0,0,70269ba0c0d21ea973d601b0f5c31051a837a987e8495efea763cfecf48848f5,2022-09-29T14:00:47.583000 CVE-2022-4082,0,0,3298dd92c15c61cb44d7d0149ab60747a9169e1a3fb803ff121df0d1d774e09a,2023-11-07T03:56:52.890000 -CVE-2022-40824,0,1,0a908f47d6358dd339042ed7d70d38d0ff59984114bedc03add6e9e9f620bd7c,2024-07-03T01:38:46.790000 +CVE-2022-40824,0,0,0a908f47d6358dd339042ed7d70d38d0ff59984114bedc03add6e9e9f620bd7c,2024-07-03T01:38:46.790000 CVE-2022-40825,0,0,edd1489cf44a5081ecaddb1e294d6c9017e9a6f0da92b219a5108293cdd9a093,2024-05-17T21:15:06.997000 -CVE-2022-40826,0,1,7f68525eef61266a5d914eb78e686c486efdc7afce66445fc76113f14b1f9e5e,2024-07-03T01:38:47.693000 +CVE-2022-40826,0,0,7f68525eef61266a5d914eb78e686c486efdc7afce66445fc76113f14b1f9e5e,2024-07-03T01:38:47.693000 CVE-2022-40827,0,0,eb4edd6a53ff4276c2eee2413bf40d1cdaf860bb0461923e0a9f798da8115647,2024-06-06T18:15:12.513000 CVE-2022-40828,0,0,a5bdfd07b96cc23f23647af90d22425cea2f201a26db70477a81fcb28c7d8796,2024-06-06T18:15:12.643000 CVE-2022-40829,0,0,167fbdb68e68c6dd17619b3a67d70e7a3aa055b265ccc0034c86dddf062f431f,2024-05-17T21:15:07.330000 @@ -208211,7 +208211,7 @@ CVE-2022-42970,0,0,684351571c726e3643d500eb09cd3f89b360763f0fd695f8bb69c804dc28d CVE-2022-42971,0,0,a1a760e3587785043d9b78a199e09a9c4c8e485ce4f48cc34275b0d788d0cab8,2023-02-08T19:43:51.890000 CVE-2022-42972,0,0,5f3b3d9ac192cbb1a45d6a773c5e886c09251dfb9ca13b3ca9cb8c11930ec490,2023-02-08T19:40:51.330000 CVE-2022-42973,0,0,0f6e1ea59a6d9a4bb4e66c46715b9ab0d86461aefc26a6b95446083a3d658078,2023-02-08T19:00:42.387000 -CVE-2022-42974,0,1,34410008e50058ee3cabe891484832c5d8574ed92a0405b5bf83f51e3dcd3fb9,2024-07-03T01:38:49.800000 +CVE-2022-42974,0,0,34410008e50058ee3cabe891484832c5d8574ed92a0405b5bf83f51e3dcd3fb9,2024-07-03T01:38:49.800000 CVE-2022-42975,0,0,f256f7d52b33ef16660e0ebf6c4ccc6fe1ffaf6c18f82025b01cf1cab52da7cb,2022-10-20T14:12:10.597000 CVE-2022-42977,0,0,4fbf7f5ca129c3ea9e7ba51c6d4ee0d909c52d7d9db35f31f31607b56dc98718,2023-08-08T14:22:24.967000 CVE-2022-42978,0,0,02efb548f6368a021b2a0aa5395451ba1b2aaa35e6f5787da8fad0ffe5e4b189,2022-11-17T04:59:09.643000 @@ -208403,12 +208403,12 @@ CVE-2022-43264,0,0,d09fc6fa78c099bc317b6b60128dc0152eb27c22926ced4f3549db46ffd1b CVE-2022-43265,0,0,4336e51566a8658be82d61a99a11c96697b2520321bc7263cd195efada182c4e,2022-11-17T05:00:09.033000 CVE-2022-4327,0,0,4376b214c9bfd64bdc214ddcd9348400b68d2f4c56d6d84e25650d2819589906,2023-11-07T03:57:33.320000 CVE-2022-43271,0,0,a9c5cf6eb4e96f9c2aa76228aea2c0aa107d65de604ff5ae347aa52f97d080d1,2022-12-29T15:52:43.040000 -CVE-2022-43272,0,1,6ec1fe53be1bd516c25036b2d69e6ca89619461877c4c5006c561d0f8fc99e8d,2024-07-03T01:38:50.747000 +CVE-2022-43272,0,0,6ec1fe53be1bd516c25036b2d69e6ca89619461877c4c5006c561d0f8fc99e8d,2024-07-03T01:38:50.747000 CVE-2022-43275,0,0,d3b33023ef30f64eecc90b7793a13dae1efe9467e99fc0219acb4e2d1372de55,2022-10-28T18:27:46.030000 CVE-2022-43276,0,0,5ee12ee2f860c457919ca9e01f8c2a56bd56801165972697ea6946b09cad6ba5,2022-10-28T18:30:48.927000 CVE-2022-43277,0,0,79defdf3bb022c935512dd1a8f6df33b0351fb0fc7c9f15642f9c3ce93f8691c,2022-11-09T17:03:10.517000 CVE-2022-43278,0,0,ecb8b056e9c5b4005e6c30fb35ea383fcfec95e544aa02a3b6a26c6bb8e0a236,2022-11-09T17:07:03.247000 -CVE-2022-43279,0,1,3d6fc6803cec7261a0240ab729fc0b343259583d5b3ecbecb393cfcd23c6d85f,2024-07-03T01:38:51.027000 +CVE-2022-43279,0,0,3d6fc6803cec7261a0240ab729fc0b343259583d5b3ecbecb393cfcd23c6d85f,2024-07-03T01:38:51.027000 CVE-2022-4328,0,0,ddcc39709df9f2216f6646c388b85636cfebbc8a99afea1f4b46e0b0e6779a05,2023-11-07T03:57:33.557000 CVE-2022-43280,0,0,ec00dc54f31177773c804adfe17f1e31c64265fe3c2c88cfcc1c6e1a50397e7d,2022-11-01T16:35:31.087000 CVE-2022-43281,0,0,01f34dbc0a5db95586be0a2c38f11d0013d6d7d36eb7f617351e43cc71c2d1fe,2022-11-01T16:35:42.713000 @@ -209847,7 +209847,7 @@ CVE-2022-45374,0,0,234bcbe42a398d02916a1144810e73140e49a3f8ec8b20f6e09659996a8bd CVE-2022-45375,0,0,da864e8b34db6ab6a597fd88184987813df60814774dbb456962ae5ebf75ac4e,2023-12-28T19:25:01.977000 CVE-2022-45376,0,0,b57105367642e35382bdd8a9080749d9beec61a989c5635676db7750b0359258,2023-05-26T13:59:21.923000 CVE-2022-45377,0,0,22cbe4252822fe666d39f11f7d395bd49f2da129efb23b521e602cf3f981e012,2023-12-29T03:46:35.557000 -CVE-2022-45378,0,1,e7f02a4f74ad6073cafff51a785be1639b59f958e74ca5d680013ecc4d5b073b,2024-07-03T01:38:54.307000 +CVE-2022-45378,0,0,e7f02a4f74ad6073cafff51a785be1639b59f958e74ca5d680013ecc4d5b073b,2024-07-03T01:38:54.307000 CVE-2022-45379,0,0,c4b81fcf9f58c87a381176e8f2f29306045b684f608fa1fd4b332ebbe1afa8fd,2023-11-22T04:18:00.013000 CVE-2022-45380,0,0,0310d686afffeae499d29644e90f6d0552c0e6d7bfd9c98c7e040efcddb0806d,2023-11-22T04:23:52.063000 CVE-2022-45381,0,0,86d541c10f6f0b87764b3ea9ebf099e0fe6fd9fdad3b1a45134750c065084bc1,2023-11-22T04:23:46.943000 @@ -210259,7 +210259,7 @@ CVE-2022-45925,0,0,fd7051a696b3f22bdc4f0c838abc5ef791297ad80cd0b8eb63f31599526d2 CVE-2022-45926,0,0,fb2fe7a1bc006fa7fb3e239d1549e4c27173c2380f9e46c34dfa5d44f19fa717,2023-01-26T19:16:48.833000 CVE-2022-45927,0,0,2d8121245e6a894c11dd14ab6a2621d053f515cadd318bd586217b7c82d2c519,2023-01-30T15:28:54.280000 CVE-2022-45928,0,0,c9fcbf662fac772bbbe3bf0a462241c586620e0d0c3e7572d8191497c6265236,2023-01-25T21:28:22.397000 -CVE-2022-45929,0,1,e598bcb9fd632f9ee1881028547f5884d69873713e07091464d6e1bf1d707a59,2024-07-03T01:38:55.120000 +CVE-2022-45929,0,0,e598bcb9fd632f9ee1881028547f5884d69873713e07091464d6e1bf1d707a59,2024-07-03T01:38:55.120000 CVE-2022-4593,0,0,eb6ffb8de64998ea2127551b2c0e8bff71c720033be3ec04cd9cfc44b019f521,2023-11-07T03:58:16.583000 CVE-2022-45930,0,0,c421a42777d5939834ae83348afde1ca99d648269378cede4f668e29a1de4f22,2022-11-30T20:47:36.310000 CVE-2022-45931,0,0,4503725956684c17f88fe293de22602f713acbe0d22ac8ff3064c40a2f3edd38,2022-11-30T20:46:53.243000 @@ -210562,7 +210562,7 @@ CVE-2022-46361,0,0,48af788a58afbaf7c68c15682aa1cf23fbbb25599ddca0d79988ec2a2a7e4 CVE-2022-46363,0,0,f60a988c8ffd33f8af77aab20e90e3352e2c47354ba2b0ead6c0d3187e1e4994,2023-11-07T03:55:35.590000 CVE-2022-46364,0,0,e5a91b6cd6bc8bc05a6b37ec9d4813e50e44ac366260b43a7716c9d7b8dd681f,2023-11-07T03:55:35.660000 CVE-2022-46365,0,0,49f12c8346e6acb2bc589dce6d1e7a675c5047f1cc7936e412f2ecb1cd6d8388,2023-05-09T18:04:19.747000 -CVE-2022-46366,0,1,d6a42f095f7db680c8c8cdbafc2c42e0052c60553e6dd107a9265756b43f5a25,2024-07-03T01:38:56.220000 +CVE-2022-46366,0,0,d6a42f095f7db680c8c8cdbafc2c42e0052c60553e6dd107a9265756b43f5a25,2024-07-03T01:38:56.220000 CVE-2022-46367,0,0,fd739109985cc5484b233d9366e5dfa8dcdf235da9e5e882f2fb6e69ad50ed55,2023-01-20T17:37:26.593000 CVE-2022-46368,0,0,59c6ccb9296595ab5d6995c2e8a0ee18b939f83c365c5987b63854ce452d3dd3,2023-01-20T17:37:14.357000 CVE-2022-46369,0,0,59811d25b0b895b77dce4985a59565480c39c2744dcdb353b0549f867db5fd22,2023-01-20T17:37:05.553000 @@ -210964,7 +210964,7 @@ CVE-2022-4689,0,0,1901863d9fa5f21671be7413cf1a4f33dcb9df921b7e51dbfc67c0b983e5ee CVE-2022-46890,0,0,59b348900e16b36a60e6516ec58e9962ae51f5ca9ce2a778654586eb395ebde6,2023-01-25T19:42:31.377000 CVE-2022-46891,0,0,8a376dcbf1698e9d7b7fe4949efda57881620d379cb6db454cc5e201cb5541cd,2023-12-14T20:03:01.073000 CVE-2022-46892,0,0,a56d140c34343ed0f64fb36a782cfa4c680e92acfe5096d3981a9b72a63ee30e,2023-02-24T17:39:20.057000 -CVE-2022-46897,0,1,fe57547f97f17bf88594b7dfabf1162a67ec8bfa3eab2856b5d894212f819333,2024-07-03T01:38:56.470000 +CVE-2022-46897,0,0,fe57547f97f17bf88594b7dfabf1162a67ec8bfa3eab2856b5d894212f819333,2024-07-03T01:38:56.470000 CVE-2022-46898,0,0,583e583a4450019af7906c16806bbd75685154c7a427e0dfd1819b59427aeb9a,2023-08-01T01:21:54.823000 CVE-2022-46899,0,0,a82b09cb63c7c53524c9166ef97cf86c92637442927f77c18c1a5425982d9add,2023-08-01T01:28:42.690000 CVE-2022-4690,0,0,6c562749bf713390fef7e8aad10e54856e0beda67ef25a92956268fab262ffdf,2022-12-30T16:25:52.877000 @@ -211001,7 +211001,7 @@ CVE-2022-46957,0,0,a1d69dd7ded209329cda3c095131afda943c6757285b7cf3dc9db52b87d9d CVE-2022-46959,0,0,4db9327c805a892369b9295e5190ce93e76847af4e4be43860a7588dd3445976,2023-01-30T18:39:34.020000 CVE-2022-4696,0,0,52b7d04508bea231933e8f68dbf29fc8af5d819b2d476d7835fc9b0454a92e61,2023-11-07T03:58:36.397000 CVE-2022-46965,0,0,20e755a6e88190e1cd456602b3456a03d93a7f04cf4e1d102b6a994756960bd5,2023-02-09T18:20:27.117000 -CVE-2022-46966,0,1,e68da19fdccc93c97706b064420d206374084e04c937d12ed5ab06a46a3c42c2,2024-07-03T01:38:57.337000 +CVE-2022-46966,0,0,e68da19fdccc93c97706b064420d206374084e04c937d12ed5ab06a46a3c42c2,2024-07-03T01:38:57.337000 CVE-2022-46967,0,0,48ce65d256b755064cfec8aacf7b990fad5eb5514109cafe07e366d09b78a326,2023-02-03T14:17:09.377000 CVE-2022-46968,0,0,6337fcb7cf8e6e9756ace0855244a520c959b290b83833babca955789ad869db,2023-02-06T15:15:02.717000 CVE-2022-4697,0,0,9870ed438fbb8b321a6538e9874a4439a56d7aa6121810992596ab3d6bae66ba,2023-11-07T03:58:36.550000 @@ -211042,7 +211042,7 @@ CVE-2022-4705,0,0,bd9745f5749f178c7d1e177eae8c5a51ed2a9ffa1d35048aae36d55fe710cc CVE-2022-47052,0,0,cdeb090117f54dd5fa36366253c9272543592c90aa12cd7a11d8cc1c26db7410,2023-08-08T14:21:49.707000 CVE-2022-47053,0,0,148ddc36db4a5d93fe86c3ae287b8ee210435f54dd063fe6928e5b7642969bae,2023-04-19T19:30:39.953000 CVE-2022-4706,0,0,905bc2ad0cdae79a1a9799421d2945489dbfdb1f0526cb0de0b802900858a58e,2023-11-07T03:58:38.607000 -CVE-2022-47065,0,1,a2370a09c2f7e284b10f7b1a01285d8f4d6d319ed5a5c969ea88c029225aa76a,2024-07-03T01:38:58.160000 +CVE-2022-47065,0,0,a2370a09c2f7e284b10f7b1a01285d8f4d6d319ed5a5c969ea88c029225aa76a,2024-07-03T01:38:58.160000 CVE-2022-47069,0,0,80f16216389e52c46901a06b83c4e99fd2d5aafa67654e4f454a0c72eecf6ad7,2023-08-26T02:16:36.260000 CVE-2022-4707,0,0,0732a63b40891a6d7c0504bd759c49a310c556656161411dd1550fd236af307a,2023-11-07T03:58:38.813000 CVE-2022-47070,0,0,3fcdc149be794f646c5affd23a79765cd0b6c53254fa995bd5561df8e06feccc,2023-02-13T15:09:02.843000 @@ -212039,7 +212039,7 @@ CVE-2022-48613,0,0,933d1b28adc9d144ccefdf3525b003f1aeb5987ce03546278c3e696c33dcb CVE-2022-48614,0,0,75c1e3ea7eaa5931eb17de8ec4a37f67747321aa68e7ad765a36e74d4c0b196b,2023-12-13T15:59:51.227000 CVE-2022-48615,0,0,055c9c353d7834832491d320050eaeb4819f21bf0043d973bf54368192621e50,2023-12-15T15:02:28.517000 CVE-2022-48616,0,0,badf219c6cb76117b605813df3a55a6d3fc4257eefc4a446371736bff470f9fc,2023-12-15T15:27:11.247000 -CVE-2022-48618,0,1,85562c41f60a21bba96736b5185b3de187c089c735cf6bf7e366532d5e5649a6,2024-07-03T01:38:59.610000 +CVE-2022-48618,0,0,85562c41f60a21bba96736b5185b3de187c089c735cf6bf7e366532d5e5649a6,2024-07-03T01:38:59.610000 CVE-2022-48619,0,0,b3fb42206d07b24cee31fa3d145164af7bcd66405bae1f4f6e7d73cbdc6a15b3,2024-01-19T15:27:59.073000 CVE-2022-4862,0,0,1b796270d64ccbf1ea7ac394a5f920793c1d2128dc270ca00f899f5edc8ed10e,2023-11-07T03:59:08.013000 CVE-2022-48620,0,0,cbd27ca620fd4c0c404a47f00df16e1e31841607dafabdeec4e089e8bf4e76d4,2024-03-23T03:15:08.797000 @@ -212058,9 +212058,9 @@ CVE-2022-48631,0,0,e86c6e0a4e17a2e96066a2f7bd29beb53cc43608b54ec7e7f562e334cf9e9 CVE-2022-48632,0,0,b7a2e2c435ed6bccb92e28652765522cc691129ab123560a51b9f721fedc20a8,2024-04-29T12:42:03.667000 CVE-2022-48633,0,0,4e64777f01a91bb6df6f7cf0d3c0dfaa4820bd5ea9e429fd52f0f69b8ae9d187,2024-04-29T12:42:03.667000 CVE-2022-48634,0,0,a107b249566e63780278a216e8a150d7eed88df042877785aa08219321ad94fb,2024-04-29T12:42:03.667000 -CVE-2022-48635,0,1,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 +CVE-2022-48635,0,0,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 CVE-2022-48636,0,0,1ddfee184b4515746b3ec63d6697bdc440e9f2a1f46d18d99d76822f8ada6b41,2024-04-29T12:42:03.667000 -CVE-2022-48637,0,1,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 +CVE-2022-48637,0,0,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 CVE-2022-48638,0,0,80adcf713c6f84faba8b13ce11af9ae21b0df62af4cb39554d2b9a0c9a3a841c,2024-04-29T12:42:03.667000 CVE-2022-48639,0,0,271823ba33c91f47a44d03bd0cf6a4661383c8d4cd9e06e476503db055a90deb,2024-04-29T12:42:03.667000 CVE-2022-4864,0,0,d23161698d876889bbe57cc3b493d8a62ae4301980779460573eee0ceb3a8d84,2023-10-11T15:24:48.003000 @@ -212076,11 +212076,11 @@ CVE-2022-48648,0,0,2eda19f274b92bacf2b14dfa81305467ceeb94ded57b0c152ef7964221f14 CVE-2022-48649,0,0,b70a26c9275bd33fc0b5ab517aa6149b599fe1b137f749c5b50c3e8b6121cf74,2024-04-29T12:42:03.667000 CVE-2022-4865,0,0,ca348115ae41e38a1bc69af0c75dfb35364aad74f0d955859af486be9af48649,2023-01-06T21:22:00.620000 CVE-2022-48650,0,0,b2f3ad99d6da16f3b8fbdb0df441f7e80991374606a0ed4425a0c5de23501e9f,2024-04-29T12:42:03.667000 -CVE-2022-48651,0,1,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 +CVE-2022-48651,0,0,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 CVE-2022-48652,0,0,60dcbfe168884e496e7026b25633c34ec1ae5964fa79b80d4189f6571d1744e8,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,af95f04ccaeac0af19b16f99e2946b1817f70437b5dfd9e67e9db7dc2eccefa4,2024-04-29T12:42:03.667000 CVE-2022-48654,0,0,6f2317418c44c3a7aee8fc030c5299b7dce52edbee9470a8ef6e774ee8f36634,2024-05-23T19:01:47.760000 -CVE-2022-48655,0,1,117c1f7933b825ff69775b7174e7dea2fe0670d0f8ada0f09471ea3ef6ecf8ba,2024-07-03T01:39:04.060000 +CVE-2022-48655,0,0,117c1f7933b825ff69775b7174e7dea2fe0670d0f8ada0f09471ea3ef6ecf8ba,2024-07-03T01:39:04.060000 CVE-2022-48656,0,0,1ec5039099009577220507619f62ff2e7b95ec0befd729beab8d6c32c6b58a40,2024-05-16T20:41:09.867000 CVE-2022-48657,0,0,8210fcd373060a1239c3202a06e963524e41a0034e529f67ddac6cb402fee763,2024-05-16T20:31:47.880000 CVE-2022-48658,0,0,fea65c2de99597dc1d2d5a29bcf40302a5535ba0b6839e73e33083e36b201790,2024-04-30T15:07:59.460000 @@ -212092,12 +212092,12 @@ CVE-2022-48662,0,0,d24307670efb9c6fbfb5580d089ccdefd8957c53630d1ae83db33751283a9 CVE-2022-48663,0,0,4f5603eb8d8a10620cb44a161edf7b10adcbaa9a11033f3f7fccb38ef636ef83,2024-04-29T12:42:03.667000 CVE-2022-48664,0,0,b2a6f1e510110b133c772eeb7e365f6142506c4cc5dbfee2d8466f128c52c768,2024-04-29T12:42:03.667000 CVE-2022-48665,0,0,156db0788956a7d9433c7ed45421620e677157f09bf6a503f106337316ce0e1c,2024-04-29T12:42:03.667000 -CVE-2022-48666,0,1,e86ee33dcd763d200fbb6d2a70a4b97f8118d9e6ad1b1596ca673174dca6a215,2024-07-03T01:39:05.427000 +CVE-2022-48666,0,0,e86ee33dcd763d200fbb6d2a70a4b97f8118d9e6ad1b1596ca673174dca6a215,2024-07-03T01:39:05.427000 CVE-2022-48667,0,0,fea320fc30b8e20d03bd29c66176a5d330022cbe5a7c1c17bc4a9da6e49c8174,2024-04-29T12:42:03.667000 CVE-2022-48668,0,0,228d489d1f34a9e09a2e0db1a8ecaeed153a7dbdd673765ef8b5cfd95f8e0655,2024-04-29T12:42:03.667000 CVE-2022-48669,0,0,924a5a271b2b1f1e2b644fe7e0386ec6c2bc9af4df977f70bde60730dd6a3160,2024-05-01T19:50:25.633000 CVE-2022-4867,0,0,df30bf033a8b71c87ccc147259fbbc1d4b447580323b889a3d7676505e257148,2023-01-06T21:26:37.597000 -CVE-2022-48670,0,1,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000 +CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000 CVE-2022-48671,0,0,345b087fdf7a29c2a22f9407913d44a46a6dcb9e2d8bc831170752c9ec2199f8,2024-05-23T20:26:32.357000 CVE-2022-48672,0,0,608a9f4bbdbfeaa5c234d43ea7d6267c5cfed6a3f49f2f595d741d22e8bb0e69,2024-05-23T20:26:40.327000 CVE-2022-48673,0,0,9605618fa7597ed94995f84a27fb057932599afff122e438d60e99636f587007,2024-05-23T20:26:54.160000 @@ -212107,8 +212107,8 @@ CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74 CVE-2022-48681,0,0,87ea3536a125ead12bc84931d58f6cdc8b01f80a07f5daca9e8b795750274574,2024-05-28T12:39:28.377000 CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000 CVE-2022-48683,0,0,231318f64008f2f3695ffe0b49c56b82eb9076a10e27c878281bb8e00293e71f,2024-06-12T18:05:40.943000 -CVE-2022-48684,0,1,4f92efa369cdee66d6f53eb185220c289dbd6040fa52ad2a4c427379f363d035,2024-07-03T01:39:07.940000 -CVE-2022-48685,0,1,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bbbff,2024-07-03T01:39:08.670000 +CVE-2022-48684,0,0,4f92efa369cdee66d6f53eb185220c289dbd6040fa52ad2a4c427379f363d035,2024-07-03T01:39:07.940000 +CVE-2022-48685,0,0,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bbbff,2024-07-03T01:39:08.670000 CVE-2022-48686,0,0,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000 CVE-2022-48687,0,0,154cc9d9f32ec8b0f10de1628955ee37a741d3f226440d234da62eb278afefe6,2024-05-23T20:33:49.117000 CVE-2022-48688,0,0,2b696539b728bee97e44de8c598ffc8f476d756e332df2a283fc8a9074238df0,2024-05-23T20:33:54.213000 @@ -212142,7 +212142,7 @@ CVE-2022-48712,0,0,7f76c44302869b6f00ed94de5892f7f01970a82d79ccd50eee5da4bea7bc8 CVE-2022-48713,0,0,e0e0549ab59879cbb734327af4fdc9f7b6dd1cd6bd79e091f961b99d45f15c0e,2024-06-20T12:43:25.663000 CVE-2022-48714,0,0,db2f69cc1e312e4177f489724ad4fa9c96e69547444a07fce0d7dc3a499eb388,2024-06-20T12:43:25.663000 CVE-2022-48715,0,0,a6ec305f45a9ee598bf1b4b4f7f7299343393213f1103818a96d6e9c196ae7cf,2024-06-20T12:43:25.663000 -CVE-2022-48716,0,1,1288d286656db17c43b8e3c9f6eb25225ae1da1a6ef842eb6115eda843ed17f2,2024-07-03T01:39:11.570000 +CVE-2022-48716,0,0,1288d286656db17c43b8e3c9f6eb25225ae1da1a6ef842eb6115eda843ed17f2,2024-07-03T01:39:11.570000 CVE-2022-48717,0,0,6910aeac97ea8633bf534a324a43bbd67a89fcdac70e84d7a71bbb491b133562,2024-06-20T12:43:25.663000 CVE-2022-48718,0,0,88ae2a5bf302e27d45701b50405269347ec972ac17f70c3a964aa6083259d576,2024-06-20T12:43:25.663000 CVE-2022-48719,0,0,b73c2b7473ad37217e5d14f9c429cb8ecb28d51a7f3db8c97f81f5bc54e2d8ae,2024-06-20T12:43:25.663000 @@ -212176,15 +212176,15 @@ CVE-2022-48743,0,0,224e8eecd97805b2f9ed3a1a7a106c45f401d3117d0f950c673ae6520cc3f CVE-2022-48744,0,0,d2c05955465e3b8e9415925d07607f60549adac7e3d69c42ff9aca7a08f31833,2024-06-20T12:43:25.663000 CVE-2022-48745,0,0,fc8f7e9be39a16e544db23aa6e671605c0afa8849222ec4f65ef1ab4b57e6ef6,2024-06-20T12:43:25.663000 CVE-2022-48746,0,0,4c2c8a0183eaa1f7e85f6d29e59aac11b767fc453d74f18ef197b869b8276657,2024-06-20T12:43:25.663000 -CVE-2022-48747,0,1,aa1cb9efcca7c13891b9cc3d8cd2d307d24734d06b6fc90bb25e227010e2f6e5,2024-07-03T01:39:13.487000 -CVE-2022-48748,0,1,8ceaaf6df6e057efbae67972ff0fd4ea5b5ca2de3f69a0edbfbd5849c7be6738,2024-07-03T01:39:14.287000 +CVE-2022-48747,0,0,aa1cb9efcca7c13891b9cc3d8cd2d307d24734d06b6fc90bb25e227010e2f6e5,2024-07-03T01:39:13.487000 +CVE-2022-48748,0,0,8ceaaf6df6e057efbae67972ff0fd4ea5b5ca2de3f69a0edbfbd5849c7be6738,2024-07-03T01:39:14.287000 CVE-2022-48749,0,0,761352292034513a5608df0f864268c681cfef00532bb0c89c6c6daca4c3cf0a,2024-06-20T12:43:25.663000 CVE-2022-4875,0,0,17c44f8ed61133d49317ef236aeaa7add57a954975b984861ea8fa8f275ad9d2,2024-05-17T02:17:00.353000 CVE-2022-48750,0,0,2954a30ebd42f3feefa9c31697eee77cf8030c891f25783907b2257b92befd2c,2024-06-24T16:15:10.050000 CVE-2022-48751,0,0,ccbe45a6f46ea478f6d2103d0c462b7b927be5c05a337aad0597f6ed69e6258f,2024-06-20T12:43:25.663000 CVE-2022-48752,0,0,9d9a185802f3eb156cd507d10d389a1da8eb659638fb3fdf21cc2b4309cd38b5,2024-06-20T12:43:25.663000 CVE-2022-48753,0,0,a394b42b6cf3cc352557e3c8140aa4d7c71463c650867404c296d9fb853db470,2024-06-20T12:43:25.663000 -CVE-2022-48754,0,1,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000 +CVE-2022-48754,0,0,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000 CVE-2022-48755,0,0,e043097107c305ab62672804380f87fe8e1823a16a03476e7a3b134acdab4e4b,2024-06-20T12:43:25.663000 CVE-2022-48756,0,0,106be3f391c228d430dde34032e5497a387c6774288b1de150fa82711b5332d1,2024-06-20T12:43:25.663000 CVE-2022-48757,0,0,14bc9d85b6d03c1c26df1d21dd635873063f0f4981d5674745a75becadb9420b,2024-06-20T12:43:25.663000 @@ -214551,7 +214551,7 @@ CVE-2023-20593,0,0,5b6de142defa5fdef614fce8bcb40ae6fd853b71ac6d4377311c8e23a0560 CVE-2023-20594,0,0,68af9f73e4098f5a776af9e4c8368d3080debc90a065edce379f1acb9c7e36b2,2023-09-22T19:16:57.037000 CVE-2023-20596,0,0,59ef036923cbf266fad48fa96d89a546be40d77f96542f9062d8c725651f0117,2023-11-21T20:28:27.040000 CVE-2023-20597,0,0,721f84d41857e7602f18a6b757c5b59c2a6c524afca0eab0fc8021e64c097d77,2023-09-22T22:35:09.617000 -CVE-2023-20598,0,1,31d1f72ad8044792b59173cbde7edc73795ce9839aa1e20213bbad8dd73bae38,2024-07-03T01:39:18.680000 +CVE-2023-20598,0,0,31d1f72ad8044792b59173cbde7edc73795ce9839aa1e20213bbad8dd73bae38,2024-07-03T01:39:18.680000 CVE-2023-2060,0,0,d05b43cf43305f69cfc303ebaf6c0d97d71414bd9d28168d6f5727fb07d9879f,2023-06-16T14:56:47.700000 CVE-2023-20602,0,0,7f6f96d9680c751c9f7f8a01d2d31ed1266c349b188d21b24f87bb74e3d1fb2c,2023-02-14T17:12:33.240000 CVE-2023-20604,0,0,7e236b0b0cab5be01044732f3c5ab4456f07599b4fc463d24aa0004d65fb7e08,2023-02-14T17:16:53.203000 @@ -214887,7 +214887,7 @@ CVE-2023-20934,0,0,2acbf14225086937001483242d6a50b70eeb771481395be7d6797f467c3a0 CVE-2023-20935,0,0,512d3416849c7128f01563da17c85598a24194c1289e85e769d3c6b9ccabcebb,2023-04-25T22:10:16.327000 CVE-2023-20936,0,0,c4edeb13d86be924f1723d1ea7c21a3fae32e4268604a2bc7c2fa4eed6c117e1,2023-03-29T07:35:16.100000 CVE-2023-20937,0,0,b85d7cbebd0e309b7e5e0b2a98791856f7d0d5fe7001a13d315b6198d7be0e23,2023-03-06T19:36:21.957000 -CVE-2023-20938,0,1,dac7f70ff61ebb6aa6f6fe91fdf50017fb068df2b04cae218f049550ea1811ba,2024-07-03T01:39:19.567000 +CVE-2023-20938,0,0,dac7f70ff61ebb6aa6f6fe91fdf50017fb068df2b04cae218f049550ea1811ba,2024-07-03T01:39:19.567000 CVE-2023-20939,0,0,e2cee337ede2353f6d99bddf17bed43247628da1ac9370111a6145ca95eb50c9,2023-03-06T19:41:17.620000 CVE-2023-2094,0,0,4f50486f5a209c0a75c963e09ed014e88dc4f5f8247bde94f53bc60c331d7560,2024-05-17T02:22:39.677000 CVE-2023-20940,0,0,bf1d86a4da02a6c965e0578d66035cc5409cc45be3f6be6214ec1da700470af7,2023-03-06T19:40:50.823000 @@ -215233,7 +215233,7 @@ CVE-2023-21263,0,0,6f307de95e3ad8aea972c0afdfa43203d7b9218f92cbf8ef2fc51a0f38bba CVE-2023-21264,0,0,17b22bd5a1758c89932ff426dfb16f5c70f19f90be0c0908b3ea624d7a59c1bb,2023-08-24T15:31:45.313000 CVE-2023-21265,0,0,6778af06e4047b0ed9b4c2e3fd1624630e2c10c35875be23f62fa37b56697ad6,2023-08-24T15:09:04.043000 CVE-2023-21266,0,0,6325982ba6ca9d5e043598097cea55a18e3f2ca76153e5b78fc645f130bc243b,2023-10-11T18:25:58.667000 -CVE-2023-21267,0,1,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000 +CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000 CVE-2023-21268,0,0,e79ff45500f753574c74f6deed9441a450540bd6fc2c735be33819b8962c19f5,2023-11-15T02:55:56.537000 CVE-2023-21269,0,0,7912f0830bb08f735151395b5e169a8adf1e7843f52d1970a2fcc74002cecc61,2023-08-24T15:07:31.833000 CVE-2023-21271,0,0,5b48b78812b670c16202b60708d06b257460b892e78c6d2ed0c42d8a8dfe3e92,2023-08-18T19:54:05.827000 @@ -216433,7 +216433,7 @@ CVE-2023-22523,0,0,769b5f78540ec921fbf74ad89cd6bee0a4a017c6196bbc875d9518dde1767 CVE-2023-22524,0,0,e9fb68c09c50c346eb4d2dc5fdeae5d57f89100980b6b1cca2f61a16b42266ad,2023-12-11T15:14:40.480000 CVE-2023-22525,0,0,d96d1084aef9c25cf9b18732ab149a62a3ae25d305b8aaba4a77302d2b1a84ef,2024-01-16T18:15:09.257000 CVE-2023-22526,0,0,bb9a292063898e8d55e8feb8a20e6814318ba665de441d31be5b07d5bf4d4d3a,2024-01-22T14:52:22.780000 -CVE-2023-22527,0,1,cd7d80e7197119c14610367cd820b40cfbdabd4ab6d0b0d0dc0ee550ee54b359,2024-07-03T01:39:25.327000 +CVE-2023-22527,0,0,cd7d80e7197119c14610367cd820b40cfbdabd4ab6d0b0d0dc0ee550ee54b359,2024-07-03T01:39:25.327000 CVE-2023-2253,0,0,1c8bf38d2b14c2db8de319269a780fd14b6399082e4985b9addd463e2b2470e1,2023-06-29T16:15:09.677000 CVE-2023-2254,0,0,522df819919c4502ad5f10a9de519964085e7b1ba533755e7e903e2853d4e13e,2023-11-07T04:12:16.740000 CVE-2023-2255,0,0,e724c0cc5a73e96de8356a9bd84568eab663ccfa21c122b777c5fe7043a22cf7,2023-11-26T09:15:45.077000 @@ -216515,7 +216515,7 @@ CVE-2023-22652,0,0,22b310772038f08a4e58450ff2cc11ade814694d9e643598182c60a0305bc CVE-2023-22653,0,0,9db7cdbfdf0619b166218142000b543e6474f266e8aa2df68ce9199cba92901b,2023-08-02T15:34:59.683000 CVE-2023-22654,0,0,170dca4af8a053abb14c59bade8c81c32603404d528c2babdac78d55367964dc,2023-05-30T22:22:43.403000 CVE-2023-22655,0,0,1dc704fae6b6099bc993cff4aa0686f77ab8c6bf7ae2328cf1e76079b53178ac,2024-05-04T16:15:14.887000 -CVE-2023-22656,0,1,13fd713a3e9ab2b67c43394a4a250c8506512fa2422b7f30fa1cb4633f19c38f,2024-07-03T01:39:26.087000 +CVE-2023-22656,0,0,13fd713a3e9ab2b67c43394a4a250c8506512fa2422b7f30fa1cb4633f19c38f,2024-07-03T01:39:26.087000 CVE-2023-22657,0,0,50aba77e7826f44f75fd8eca9cdefd06087e1b24472024d8ed2ae2967b0f87b1,2023-11-07T04:07:12.750000 CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000 CVE-2023-2266,0,0,efd39beec0972f4ca6c4e4c2a91a0e0977c9d5cb369dcbe4c78cac976909f512,2023-12-06T00:35:24.197000 @@ -216772,7 +216772,7 @@ CVE-2023-2293,0,0,90ed5899f096be71c2b9ad576c51076dec3c12793695a6938bd11a33d4695c CVE-2023-22931,0,0,46bc66829d61883c5057f64f21605777d9e87cfb4a2b30c2c5c12c7500d2f49b,2024-04-10T01:15:09.737000 CVE-2023-22932,0,0,b6ee3456f6313710215fcacb19ac1865c7f5003b27a62beee218db769a7a8518,2024-04-10T01:15:10.877000 CVE-2023-22933,0,0,22ae54461aa7534c3058ab19cdc73a183f8d11b4cebdbb4a1d5c47caaa0ba97e,2024-04-10T01:15:11.057000 -CVE-2023-22934,0,1,e7ca70d3df1ad016b2f95cc43f4439f28d6e82ecac77e1039c74e2947a90b0dd,2024-07-03T01:39:27.173000 +CVE-2023-22934,0,0,e7ca70d3df1ad016b2f95cc43f4439f28d6e82ecac77e1039c74e2947a90b0dd,2024-07-03T01:39:27.173000 CVE-2023-22935,0,0,c015ee59dfc1edf910d0d33433ae3de9abbb6c4d94a575ed1d231eb40b62f243,2024-04-10T01:15:11.420000 CVE-2023-22936,0,0,46bdd185f80984858e0fefcdf343e9826d24551c041a6a62cadb33df32caa7d1,2024-04-10T01:15:11.613000 CVE-2023-22937,0,0,0ed45c248b0a8a3dde3de032045e875a57f1c143b175fc7b69cc1012e0c7ac46,2024-04-10T01:15:11.810000 @@ -216834,7 +216834,7 @@ CVE-2023-23011,0,0,018eae1babbb9f2575e2bc66b7b0c0358528b7342bfaa1b0900133b447e61 CVE-2023-23012,0,0,cf53a65480831197f15ac2005c38528d1a518c72abb109a549aa43b322009bb0,2023-01-28T03:44:45.493000 CVE-2023-23014,0,0,90de8138a5539a8213b0fcac2e4ea28a7c14d1f646cc6e26745084a133c174fa,2023-01-28T02:47:30.483000 CVE-2023-23015,0,0,507ea8aee7739fe155c6977fc3a2011efbd5d31c42ad0211a9416462e62eb1ab,2023-01-26T18:59:21.923000 -CVE-2023-23019,0,1,cf38fada7abd9875f16ec87b5afd92c33c36dbfcaea5a39ec2c7599eccf79b77,2024-07-03T01:39:28.063000 +CVE-2023-23019,0,0,cf38fada7abd9875f16ec87b5afd92c33c36dbfcaea5a39ec2c7599eccf79b77,2024-07-03T01:39:28.063000 CVE-2023-2302,0,0,9409bd460b4682723c7a4466f5c5d56baec6cae34a6c2de0eb52e1235b15d474,2023-11-07T04:12:22.047000 CVE-2023-23021,0,0,6a7e169d021c19bbb75009f231c12a643001e2553d96e2e5ff324076b043a50f,2024-05-01T19:50:25.633000 CVE-2023-23022,0,0,0ea61fa1ed3ef98b535474e43831625beb1e2df8f29f2db9ee1849d63cd76552,2024-05-01T19:50:25.633000 @@ -217502,7 +217502,7 @@ CVE-2023-2392,0,0,fa218e7012e2b910d0c9a566576aac1b7f67fc91d1b959196a9e2e49aefbdd CVE-2023-23920,0,0,607c4f550d0260c2c398f7d8014f1121f94cb7d04b027b4bef4e787241dafb94,2023-05-03T04:15:09.413000 CVE-2023-23921,0,0,2fff7086333fefa79735fb6cd6cf832ff997abaebcd86506b91977634aa8f7d5,2023-02-28T19:07:06.573000 CVE-2023-23922,0,0,3cc1884b754bc1d301fc4dc78858cf0a2ad1bda68b0f72bdbce929789298962e,2023-02-28T19:08:14.307000 -CVE-2023-23923,0,1,9d569ac6640ca0d6bada54235b3a091ebfb755e420eb641890bd31e75110f8aa,2024-07-03T01:39:31.063000 +CVE-2023-23923,0,0,9d569ac6640ca0d6bada54235b3a091ebfb755e420eb641890bd31e75110f8aa,2024-07-03T01:39:31.063000 CVE-2023-23924,0,0,f80f6bf2b804de6a29ba3eb8bd4e57ae0efefd866c709cd87ca6ff404acb85c0,2023-11-07T04:08:06.033000 CVE-2023-23925,0,0,14c910b59eeed5110caa0488ff60d7e78fa86d97a5696fecefb70f6233224d33,2023-11-07T04:08:06.150000 CVE-2023-23926,0,0,fc15285352dc58675376a0af026e7e06cbe5a7d3f9f4bb389dfd37ee02dc6460,2023-04-14T21:15:08.047000 @@ -217629,7 +217629,7 @@ CVE-2023-2406,0,0,8010042360768bfa7f244c60d934f6bc2326f62c428aae45cb4dc2d3e34f17 CVE-2023-24060,0,0,01b6d6e3850cffe381340593024dccef7ff6262229e563587a91fe67d8e5fc30,2023-02-07T19:13:09.287000 CVE-2023-24065,0,0,b5bd81be3a9f81444344b4cd5fe7d695c9b5ca21605a255f7ae1c70d0fdc8eee,2023-02-07T17:29:25.500000 CVE-2023-24068,0,0,87a0f89fc247dc12889574fbec0208c1b7c8de682dfdbdc8ae9050adb740379f,2024-05-17T02:20:11.750000 -CVE-2023-24069,0,1,8f270c3ae7ca33578a655692c7011772d08c02696b3e1ad234870d150ca3a2b0,2024-07-03T01:39:32.413000 +CVE-2023-24069,0,0,8f270c3ae7ca33578a655692c7011772d08c02696b3e1ad234870d150ca3a2b0,2024-07-03T01:39:32.413000 CVE-2023-2407,0,0,9fcb68551278985b18635d6fb7080fb1ff13872b42fcde02f56cb3c9cab816a5,2023-11-07T04:12:37.020000 CVE-2023-24070,0,0,413ce1aea8abd070ae219722fd1507035c56bfbee289aee775c9118e2adeb4ad,2024-01-09T02:55:33.710000 CVE-2023-24078,0,0,022e8409c67ca786cf3765e8d856e82b1266d66ca0e0a832f619fd63e32cf1a5,2023-07-04T17:15:10.567000 @@ -218635,7 +218635,7 @@ CVE-2023-25392,0,0,6bc4e2db2d4228b1d1a5ccca42fecfc848ef2f401416e096ab51aa4690452 CVE-2023-25394,0,0,aeeb3beb31cb6d41866e902f7427c2f284244ed76c778e848400393c878d178b,2023-08-28T18:15:08.750000 CVE-2023-25395,0,0,c0633b7a10c9a54745d78a021db1c674ebbd0932c411b6d0ca2875ccb4fd90ec,2024-03-08T14:15:52.223000 CVE-2023-25396,0,0,ceb39b67a169d82252bfa90ee34f431530d6902dcc01e0f21c05a3deb46ac9fb,2023-02-18T21:21:51.837000 -CVE-2023-25399,0,1,599a2cac22213c6cf08929681bd7fad1d9ed406963031cd88e514afbe115be3d,2024-07-03T01:39:35.733000 +CVE-2023-25399,0,0,599a2cac22213c6cf08929681bd7fad1d9ed406963031cd88e514afbe115be3d,2024-07-03T01:39:35.733000 CVE-2023-2540,0,0,287e5d9e2e4863b70bfb3b3dff9968760f9f15d98726eada48eb332830375131,2023-11-07T04:12:51.453000 CVE-2023-25402,0,0,01e03b04633651a61f687b61ffd6eb65827e82e1dc3abf91e108b855dbbb97e9,2023-03-10T15:00:34.830000 CVE-2023-25403,0,0,8f26f71dea1a17ec4b38737fe8b6f5eeb1dac06953aa392885dcc8c2b2c5b2a1,2023-03-10T15:02:24.733000 @@ -219300,7 +219300,7 @@ CVE-2023-26126,0,0,67dcdc1a3cc3fc8902e9ba54f6954a17abc89ceda99c0cc113cd591c90812 CVE-2023-26127,0,0,6236517c369a07149faee2a6aab63f4a59cccc8ec9a5d851123c6fef17702c72,2023-11-07T04:09:24.477000 CVE-2023-26128,0,0,a4880daee1bfa268b9583d67005a6ffeccf642e95c41bc32cb205befed5deb09,2023-11-07T04:09:24.700000 CVE-2023-26129,0,0,20bc9cb4312699827e73da7bf77ae453e81c62726f54f4c5cd6c40e6f103a8fc,2023-11-07T04:09:24.900000 -CVE-2023-26130,0,1,33eb095272f3a00a8da36d798cbd7743c68666063dea7de8a55edfb909e77da9,2024-07-03T01:39:37.680000 +CVE-2023-26130,0,0,33eb095272f3a00a8da36d798cbd7743c68666063dea7de8a55edfb909e77da9,2024-07-03T01:39:37.680000 CVE-2023-26131,0,0,14c2413b019a28dbfebe3045b3b81ccd0832fa2f5d0205be699df65a92b1bbdc,2023-11-07T04:09:25.290000 CVE-2023-26132,0,0,f0ea5935c5598d1eb4dddaa3267dcfd5bbb4104bfb3ed080792a7a1004f1f4fa,2023-11-07T04:09:25.510000 CVE-2023-26133,0,0,54e487f52c66a8dcca22566f37bb763d4495864419103360faef064bfe0dc6ca,2023-11-07T04:09:25.713000 @@ -219675,7 +219675,7 @@ CVE-2023-26560,0,0,a6056c56d1a67b9faac17b08ec372723c0882d09ee778f501af40dc67b21d CVE-2023-26562,0,0,bf06cbf1982e6d2ee72b482e135500e7e04aad75268b60cda6cc50d8a161b1d1,2024-02-13T18:23:02.393000 CVE-2023-26563,0,0,ad337a389517e66055efff6190bc1e8f38a6961c1d2790692ca3811e579f5956,2023-07-26T16:23:15.603000 CVE-2023-26564,0,0,1b69f8be4ab3ee18a8f5ea1183aee85cb0648110440bac6ce87e29813b2b1bad,2023-07-26T13:58:32.947000 -CVE-2023-26566,0,1,ae4ea3cf14a7d506042dd39ffbc958f2d012f8a28764a157d6db66e3943cac77,2024-07-03T01:39:39.010000 +CVE-2023-26566,0,0,ae4ea3cf14a7d506042dd39ffbc958f2d012f8a28764a157d6db66e3943cac77,2024-07-03T01:39:39.010000 CVE-2023-26567,0,0,df71d619d6f301d6a9a0dcbbb5904b098ad848dca9fadc7d8d8c9f3fa26a1124,2023-05-05T15:10:19.097000 CVE-2023-26568,0,0,4e7571fb9340e4d0ff3ccb59f0a39dffa3a953316f51c0dbf5f863bc7f00ec4d,2023-10-28T03:20:16.467000 CVE-2023-26569,0,0,fd8fe37fe1f3f9c35e7883c9ff05eaf80ed9b33910b14583243f0f337f44cc71,2023-10-28T03:20:20.530000 @@ -219714,7 +219714,7 @@ CVE-2023-2660,0,0,616af0a832795a9379a99070b85161ed993a8f9425dfa646ec02d8e99104a5 CVE-2023-26600,0,0,082a5a40003457cdcb9bc982343b3a43f4debaf37f4262b90b97fef94c96e25d,2023-03-13T17:47:33.683000 CVE-2023-26601,0,0,7b674f2a8e2bec159e58ffb9e220bc037e134be1a5263b6a67b4cdd33b3e5bbf,2023-03-13T17:44:45.677000 CVE-2023-26602,0,0,6c6999eaefa6818056578b112ce02b6e82b18dba81dc757925a9d9664e372103,2023-03-07T19:07:11.717000 -CVE-2023-26603,0,1,b5920fdafc985390fa2a544b4145e41cd5f87293e4072c9665e851a235b399e1,2024-07-03T01:39:39.820000 +CVE-2023-26603,0,0,b5920fdafc985390fa2a544b4145e41cd5f87293e4072c9665e851a235b399e1,2024-07-03T01:39:39.820000 CVE-2023-26604,0,0,2d88cec2d1d9a7d4a604fb7583adb4176010b0268b5fda597e93dfff8baa2e94,2023-11-07T04:09:41.293000 CVE-2023-26605,0,0,f1d913142ac1d44bc49e2d7d4cb638ad0dbe7ae96775e3b7bd85f589841ca0ce,2024-03-25T01:15:53.723000 CVE-2023-26606,0,0,a1bb89d315dd684fae3bae228622f2bc2356ffe1fa611816e008ca9f62fab2a2,2024-03-25T01:15:53.793000 @@ -219768,7 +219768,7 @@ CVE-2023-26784,0,0,580edc347dec56e62d9aaf0ace6272579bbb199a51ed99d83bd1986a745d3 CVE-2023-26788,0,0,8921f7bfea8679f71dfe8d97c9c14d11dec79d275d2668afcb8098a3ac1c90b5,2023-04-14T03:53:02.843000 CVE-2023-26789,0,0,dd86748eba18e304041d525b8ca38b3dc310acbfcf00a7db85c58214f973c99f,2023-04-11T14:46:38.527000 CVE-2023-2679,0,0,7f2fb551eec22f8dfaba64b9fdfaae1ad50ddd9717d1bbbb9f2d45080e4f7cad,2023-05-25T19:38:25.710000 -CVE-2023-26793,0,1,dad66677bdb4946ac25c0d7162367136f0a4fc78e85166bb9b3fb95ccff5ebba,2024-07-03T01:39:40.663000 +CVE-2023-26793,0,0,dad66677bdb4946ac25c0d7162367136f0a4fc78e85166bb9b3fb95ccff5ebba,2024-07-03T01:39:40.663000 CVE-2023-2680,0,0,8007f22dd00dba59e0b8ff60387f782fdb1f81129a9a8240af19ed80f1da9255,2023-12-28T16:23:09.520000 CVE-2023-26800,0,0,a3636a9c3d747dc8b9e77d2149e12dca633b8eb0697221b400831704c945ed76,2023-04-03T16:33:09.653000 CVE-2023-26801,0,0,c8bf4717f80195da472a540a631ed15f9fc85384e66fc13b058e6991994f19cd,2023-04-03T16:39:03.460000 @@ -220003,7 +220003,7 @@ CVE-2023-27191,0,0,477aca0a6fbad7a9b6b8cfb3fd7814efe37d01994d9cdcb9e4be1ffefe053 CVE-2023-27192,0,0,0b3ee194d607d5bc569bb6bb55a4f5b7387018214e2c4fdb3a0f317a0cebf696,2023-04-20T19:46:04.170000 CVE-2023-27193,0,0,927dfa147c5f81e8f1217f2eca503f81af97abfbd4c06cae83b7cf4e9d35d7a0,2023-04-22T02:00:45.180000 CVE-2023-27197,0,0,226c36fe3af1ef2b1cf32df131f3aaf9429c7056ad14b70bd1d806965d553e91,2024-04-23T14:15:08.123000 -CVE-2023-27198,0,1,d7c5d99d6e1c2d2350e3e97ed6cdfbc824dd778955fb5505c7385cdd6dd3931d,2024-07-03T01:39:41.580000 +CVE-2023-27198,0,0,d7c5d99d6e1c2d2350e3e97ed6cdfbc824dd778955fb5505c7385cdd6dd3931d,2024-07-03T01:39:41.580000 CVE-2023-27199,0,0,07b800e4b3335089249efd966457be92e06d87fe41cd8f4219430dcc44529576,2024-04-23T14:15:08.290000 CVE-2023-27202,0,0,77bc334449af3c3c3034fe35b90a515fac6bc4198ea6906ef099d5106f8f4f3f,2023-03-13T03:51:33.370000 CVE-2023-27203,0,0,dda9e6f0ca6de99d481d7af1e28f518aa426e6be8182cb98d6abf027219d2d86,2023-03-13T03:51:39.573000 @@ -220335,7 +220335,7 @@ CVE-2023-27558,0,0,87ba6982de7c378f24f0e65891bf0ec6161ebd1a5c42c8ca4207593b916e2 CVE-2023-27559,0,0,e5c755de156a10d97aca0977943e22afb069004cc308a9d0638ce362e4ca2253,2024-02-01T14:09:30.907000 CVE-2023-2756,0,0,477770fab46dba9894293194aab78a779bface6cb65c11dbd1b59ebe2d50d5da,2023-05-25T19:15:29.773000 CVE-2023-27560,0,0,fd169f13a98d8e7156ba713cd8b4c730d64b4d7a144c1024928abe78d476c50c,2023-03-10T18:54:55.587000 -CVE-2023-27561,0,1,4d0c127d91cefb6ee7c7f597a55a913b57e532ecaa8ded522d8b5c1a48efc91b,2024-07-03T01:39:46.513000 +CVE-2023-27561,0,0,4d0c127d91cefb6ee7c7f597a55a913b57e532ecaa8ded522d8b5c1a48efc91b,2024-07-03T01:39:46.513000 CVE-2023-27562,0,0,521a7d91c666d328719fa314d653b912626a17c1d95076820a3a5ef2f7d04e13,2023-06-22T15:15:12.007000 CVE-2023-27563,0,0,e4f59cd6829f50ab4c1a2a3645a8220769aaf80c58a1f20c42dc626b11fa626d,2023-06-22T15:15:12.123000 CVE-2023-27564,0,0,46e8539d291bd709c23ace021720193f98ada68d416e1f1629df33fa0f718134,2023-06-22T15:15:12.233000 @@ -221002,13 +221002,13 @@ CVE-2023-28325,0,0,318eece509ac20d5f8b78db5fc12b0752e9b55331a135f3402c370a6ba1b2 CVE-2023-28326,0,0,fc0e72e80c7a90dc1906d35b5db8acf653727ea0915e43a265ecf21af438a885,2023-11-07T04:10:28.880000 CVE-2023-28327,0,0,ccbad673b3596eab7db0da04f3246089fe9386f352f279a45d86580009650c97,2023-04-29T03:12:41.973000 CVE-2023-28328,0,0,24b169db9e51755735a9ba30848459b46dbae25eda16eba92079096dbc90763a,2023-05-03T14:15:33.387000 -CVE-2023-28329,0,1,14bd1237be8c834d2b6903d2022400762656c030012fd364a4d4901ffcc904ce,2024-07-03T01:39:49.640000 +CVE-2023-28329,0,0,14bd1237be8c834d2b6903d2022400762656c030012fd364a4d4901ffcc904ce,2024-07-03T01:39:49.640000 CVE-2023-2833,0,0,4480446c7e0fc380df441064c602d6824d10cf502a5dc1c96156d858d8eba7a4,2023-11-07T04:13:24.363000 -CVE-2023-28330,0,1,485bb14092005ab577833121758bce3d161c59a95731b9926f9cccad1c6a7419,2024-07-03T01:39:49.903000 +CVE-2023-28330,0,0,485bb14092005ab577833121758bce3d161c59a95731b9926f9cccad1c6a7419,2024-07-03T01:39:49.903000 CVE-2023-28331,0,0,26c0ff3ccaabba628aef9726dfdb1352af4a09f863b0a657a20c78cd65328211,2024-04-19T14:15:09.107000 CVE-2023-28332,0,0,3a089716c48f0f690ccc5e4bbceaa12486294da2ed19b74c2d5b1b003b856915,2024-04-19T14:15:09.180000 -CVE-2023-28333,0,1,cdd263ba73d39d67e43868153b27be67dc38b67123627c36c2edd1ed5a4ea9ea,2024-07-03T01:39:50.127000 -CVE-2023-28334,0,1,b8e2746a8d95ae9d870b8bd6563ee5705d5f350051dfd63dfa2b03f76983c976,2024-07-03T01:39:50.350000 +CVE-2023-28333,0,0,cdd263ba73d39d67e43868153b27be67dc38b67123627c36c2edd1ed5a4ea9ea,2024-07-03T01:39:50.127000 +CVE-2023-28334,0,0,b8e2746a8d95ae9d870b8bd6563ee5705d5f350051dfd63dfa2b03f76983c976,2024-07-03T01:39:50.350000 CVE-2023-28335,0,0,a76a647c3a844572ec79d08d95cbc1bd15a530ae1464b638c819080c2b8c0361,2024-04-19T14:15:09.407000 CVE-2023-28336,0,0,a90e3c55e85603912f0d313aa52a80a12b40919a15337b020741ea87b001c767,2024-04-19T14:15:09.473000 CVE-2023-28337,0,0,ce6cf9b0f4b2f263d82dfa1955780cbb836c45f4e38b6cc688b91539c97068ca,2023-03-21T17:40:15.477000 @@ -221058,7 +221058,7 @@ CVE-2023-2838,0,0,d3f6bff56a0380017bb64083ce207cbf5ae73d2f953c61492b83c6eb6a6d11 CVE-2023-28380,0,0,e67e440890fbe92eed00af11bb09e03fed9e6cba9f7525e0039ffc2e9df791e0,2023-11-07T04:10:32.717000 CVE-2023-28381,0,0,3711242bc6f37d6bb3bf39d64693075fb47d3a6dd68df7daade1ecc1bbaaabed,2023-10-18T15:00:34.063000 CVE-2023-28382,0,0,abfb1a49fcabd3c433774b84f11f31c969bb74a05179f46725f71802a61a1f94,2023-06-01T19:20:13.567000 -CVE-2023-28383,0,1,e268f46c52c7dc2f4e894bd60f23419b5adfd4cb0803cf31a4c8c763ead02cf4,2024-07-03T01:39:50.563000 +CVE-2023-28383,0,0,e268f46c52c7dc2f4e894bd60f23419b5adfd4cb0803cf31a4c8c763ead02cf4,2024-07-03T01:39:50.563000 CVE-2023-28384,0,0,94e7b4fc7052325fd40e4636abf68c1e150c0e282d640bb0f9741e05f148f548,2023-11-07T04:10:32.950000 CVE-2023-28385,0,0,fe688d9c8edfac14337b53cfe5693cc7d336a9e23c7854b02e76a9a521a9bec2,2023-11-07T04:10:33.120000 CVE-2023-28386,0,0,30711d5d97d42fb2f8fa351b20a53febbae618d2e8b6bef84760e4a2849772fd,2023-05-27T01:59:16.440000 @@ -221526,7 +221526,7 @@ CVE-2023-28858,0,0,011df0bac04bc87df95994c1b3e55ca3cc5b885a4113b222fc3b46e56f821 CVE-2023-28859,0,0,dd925f6241e4a2be83ea00a786ba6fc5299cfcc8d994f716e443cf718cd5da8b,2023-05-17T17:08:20.883000 CVE-2023-2886,0,0,3aaac5483bfb19901fa58891c6e5a468993f3db4f1bf125792f15c949845c790,2023-11-02T01:46:01.450000 CVE-2023-28862,0,0,170dd9ccbe35ded0e1ff5303e569e23ec7bc3359084c857e1571367bc52605fb,2023-07-14T13:15:09.167000 -CVE-2023-28863,0,1,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000 +CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000 CVE-2023-28864,0,0,b53b9a31e04a18ab26a92d23614ce8825a553be82d95a49cad787677dc09aa8b,2023-07-27T03:47:50.647000 CVE-2023-28866,0,0,7b5ab9a9fd3d718e917316e0046a608e2f5cdf5b502da99441c79802e834fd00,2023-11-07T04:10:55.740000 CVE-2023-28867,0,0,11ed3f93d6faa0d51c3a1b27a8fdcb70e828388dc5f52ca5e989f587124ec7bf,2023-04-03T14:01:07.433000 @@ -222531,7 +222531,7 @@ CVE-2023-30380,0,0,cd9fa796d3c04fde94050bc709ac25e6b3019c8e392c0177ae52fecd76fd4 CVE-2023-30382,0,0,0cff4c021d70d3c623ea73cf13122731f9972bc0fbe1eb7a6d613fe90d399187,2023-05-31T17:19:05.437000 CVE-2023-30383,0,0,1f41f027a76f4b84394d324b506f65bf20ad7b31d7ae79c51f9b5d83365abec9,2023-11-07T04:13:41.537000 CVE-2023-3039,0,0,02805a9efc8a54732f6271aa90d956cf59d7c9138dd3feaed49a24014a9d4e56,2023-09-15T16:34:33.573000 -CVE-2023-30394,0,1,b61d3fb492bce0d1de679771cf6508ff610a45a4544b26a6122f8a133861a9a4,2024-07-03T01:39:54.553000 +CVE-2023-30394,0,0,b61d3fb492bce0d1de679771cf6508ff610a45a4544b26a6122f8a133861a9a4,2024-07-03T01:39:54.553000 CVE-2023-30399,0,0,7447a8c0b487419c48fed9e0da2534db0a292327146c9ccaddf77dee5fb4a442,2023-05-12T17:38:01.150000 CVE-2023-3040,0,0,b52f890f4a60e4f7728aac16550f4fdaf6d93f94b2a81685a9a25b3b1dd04f14,2023-06-28T19:16:52.077000 CVE-2023-30400,0,0,a87a8904964e9d08439aa29fc6cd52be4a78fb77dafeb52e8159f3a295ce4dfb,2023-06-21T14:49:43.397000 @@ -223610,7 +223610,7 @@ CVE-2023-31871,0,0,e85dcda49c93d9576127e7f0280dfcf3a99945dec60cb03b4fab3294bda76 CVE-2023-31873,0,0,b7641dae267be1760a099006461d04c0323149c27d54f0210125b783abb8f528,2023-06-02T03:13:03.820000 CVE-2023-31874,0,0,43a20b383c5faa3696ee91708a9efd2421628ef474f0d749d6aa5b75f8454336,2023-06-03T04:09:10.037000 CVE-2023-3188,0,0,65b1cba06578fe27623cfa3d3ff37b4c1fa034a01a3a81d964ec59f80261a82c,2023-06-16T03:47:37.890000 -CVE-2023-31889,0,1,8da7943f2303142f20a0c6e6b858bccb074c327803ea0c0283b81ea0d271b17b,2024-07-03T01:39:56.557000 +CVE-2023-31889,0,0,8da7943f2303142f20a0c6e6b858bccb074c327803ea0c0283b81ea0d271b17b,2024-07-03T01:39:56.557000 CVE-2023-3189,0,0,7f2a1889cfe0e18660c5ab913f6b063d1d020fa4f01a83643f3f0efddae7f3fa,2024-05-17T02:27:20.717000 CVE-2023-31890,0,0,b6df4f97f276ae2e26e07a832095a8ad1d8a6a8ee131b9381fca9a6c45ca7e7e,2023-05-25T00:31:04.963000 CVE-2023-31893,0,0,5829804df8bf5b2e83c79de7482c34b562d10eb37e29e09770e92e07a2e6fdc2,2023-11-07T04:14:25.490000 @@ -223657,7 +223657,7 @@ CVE-2023-3195,0,0,98bcbad71228d6a709f23c4d92ccf2d260cb35c034c1df4d0e26ba09d444f1 CVE-2023-3196,0,0,12b464f18c4bbf1f0de5b734fccde2168245c9ff981689115c68acc7124ee134,2023-10-05T00:56:33.370000 CVE-2023-3197,0,0,dc7336628eacaf5d546f45114ef9de166606a6b8b1e7ed968a183731613169c9,2023-11-07T04:18:11.597000 CVE-2023-31972,0,0,0634e842df15555134fd3d77f69c296317b288d60194b74716a50d640fd7d816,2024-05-17T02:24:05.100000 -CVE-2023-31973,0,1,f135b1929fd5bbe94ca4d4658a784de17b324310975ce587282d439c5c40a50e,2024-07-03T01:39:57.370000 +CVE-2023-31973,0,0,f135b1929fd5bbe94ca4d4658a784de17b324310975ce587282d439c5c40a50e,2024-07-03T01:39:57.370000 CVE-2023-31974,0,0,9e8decaf2171aaf1bb8736e0d21aaaea87aa9184c68eed56bde1b4df1a38b390,2024-05-17T02:24:05.283000 CVE-2023-31975,0,0,4bffdd046d581c41bd97194808228f804a1e498cd45aff984930626311de3599,2024-05-17T02:24:05.370000 CVE-2023-31976,0,0,9353ec59b03aa0b4f98f53ddbda87329ad4d82bffa6f2304806ebe725a144db2,2023-05-16T15:21:24.530000 @@ -224380,7 +224380,7 @@ CVE-2023-32709,0,0,3f7707e06634e7bfe62f9f7d54349bfd4843588b5f0db0190bffc311dea51 CVE-2023-3271,0,0,a7af40c7c7c2bfaf4b93cedd905cdc7dbf7db087eb0a0dc81f6fd07c52dc7a6c,2023-07-19T17:16:17.150000 CVE-2023-32710,0,0,628e7939bf4968b78fffd579b28064f148933d851580d7f4015ca703c0f8e33e,2024-04-10T01:15:13.780000 CVE-2023-32711,0,0,fb68dc5a419f35a409ec707e4cd0de625d4cdf04a8f3db918fae0158310e2792,2024-04-10T01:15:13.947000 -CVE-2023-32712,0,1,49c6ab0a9fb7ef30eb7f4c7b17aea24232fcbdcc776dd11cf968e303baa52e2e,2024-07-03T01:40:03.950000 +CVE-2023-32712,0,0,49c6ab0a9fb7ef30eb7f4c7b17aea24232fcbdcc776dd11cf968e303baa52e2e,2024-07-03T01:40:03.950000 CVE-2023-32713,0,0,fcbbed6e5672e207edbf5278c99133c26b2d7171931e1e3018ff7b79b459e4b8,2024-04-10T01:15:14.347000 CVE-2023-32714,0,0,1052dcceaab36634ea2982e418448d2a705d5c8b21354300f9562c8998382631,2024-04-10T01:15:14.490000 CVE-2023-32715,0,0,a09d82568b0f9ddcd495a32a98977421390abd28a07292b2acba608d880e0925,2024-04-10T01:15:14.637000 @@ -224541,7 +224541,7 @@ CVE-2023-32886,0,0,a1e0e6e35a82474801d01fee00ed7b713b76cb490c9e009a01e021dd350dc CVE-2023-32887,0,0,48abfa29f65ba36268ecb2732df23027db92d23ebae32c0977ef469c44d687f7,2024-01-05T12:13:33.227000 CVE-2023-32888,0,0,bedec17a23698ccdadb336abf8b29d54162af8ad914a562ab7359fcf8148445a,2024-01-05T12:13:38.553000 CVE-2023-32889,0,0,7cb67259e9340438e5c911944c46393c49874c183ab4a4642ae61b61abc60ead,2024-01-05T12:13:41.860000 -CVE-2023-32890,0,1,eb304c24f18daac453bd54f93398acdc8265ac647e9c71261cf092befb74da5d,2024-07-03T01:40:05.030000 +CVE-2023-32890,0,0,eb304c24f18daac453bd54f93398acdc8265ac647e9c71261cf092befb74da5d,2024-07-03T01:40:05.030000 CVE-2023-32891,0,0,09eecc819ceaf3608a4419e7e5b09cb8d1608302b5880d0698c2eca4637b514e,2024-01-05T12:13:46.007000 CVE-2023-3291,0,0,50ba92d440169e058cabf8272524addfce3b26587de2ca01da6efdc860fd0a1f,2023-07-15T04:15:12.797000 CVE-2023-3292,0,0,3bc36b7adaaa0f48e8f0a081da821bfcf4bfcb185d07c41948cb64a3f47d3581,2023-11-07T04:18:24.753000 @@ -224987,7 +224987,7 @@ CVE-2023-33461,0,0,7a2b014463bbd34f475410ed0ac5de990384aae621e78afc444dffec48dfa CVE-2023-33466,0,0,edb400e1765c8e049d90fabaabe681d7a3f1799525c77d9b7167542116dbab9c,2023-09-12T11:15:07.650000 CVE-2023-33468,0,0,d9e4dab7978126c8da945b9754e1c87cd2541aea620924504d1a3e6d84fa8f27,2023-08-16T18:03:44.977000 CVE-2023-33469,0,0,387b19c0d50f438ab4dc1ed606512c9de33f04198989847c56b1073a99f44fdf,2023-08-17T01:40:13.813000 -CVE-2023-3347,0,1,a723926bed15f7839c499a6cc8847a6e0b8aed6868ff9adee3647f2061979db2,2024-07-03T01:41:00.823000 +CVE-2023-3347,0,0,a723926bed15f7839c499a6cc8847a6e0b8aed6868ff9adee3647f2061979db2,2024-07-03T01:41:00.823000 CVE-2023-33472,0,0,6523bc76d6a00e38e259d21aca93d03253a0f102234024bde438d0d36d5a1858,2024-01-22T19:21:10.370000 CVE-2023-33476,0,0,9e4822aebccc19652dca83ddabc6a1cae3f3bac23653324d76ea4b6817a8903c,2023-11-25T11:15:16.937000 CVE-2023-33477,0,0,e2bcac495623babc236700f7f358107f045123e5fcef695df6a6049a86ee3582,2023-06-13T19:14:00.687000 @@ -225404,7 +225404,7 @@ CVE-2023-34044,0,0,71833bb0b6045cb11c0a7e75c9e5696268019f3c80e76946b19c7d0199c20 CVE-2023-34045,0,0,6b1b2c19fff4633e31b5c8e8f551b8488e58323d60c8ec07a89de4df2d59352e,2023-10-28T03:34:24.963000 CVE-2023-34046,0,0,20e315461df623f727e22674bd60c34dc6d5b9018b104dbe212631cd72c4ffb8,2023-10-28T03:34:15.293000 CVE-2023-34047,0,0,73170c0b6633414290e2ce79d1900c952ed793081a07fae973bb5f95a0019f70,2023-10-18T18:04:30.410000 -CVE-2023-34048,0,1,5e587a3965b61fa3a500d1f7154937c2feebc1aafbedf03eeaa865ef18101733,2024-07-03T01:40:09.093000 +CVE-2023-34048,0,0,5e587a3965b61fa3a500d1f7154937c2feebc1aafbedf03eeaa865ef18101733,2024-07-03T01:40:09.093000 CVE-2023-3405,0,0,cea43164727f36a40b310cd10e0233d79b6e7e47b19b8a661a12ffa184d1c536,2023-07-06T13:43:06.847000 CVE-2023-34050,0,0,3007e72e953efc7f7769088953e86d0e1d31277cf1bd39c060ae6b773dec8536,2023-10-25T16:54:31.770000 CVE-2023-34051,0,0,5b8bbf7afa8561a41e03dda3a943300283b847fb1457e1458ad55a02f9d1aef4,2023-10-30T15:28:40.420000 @@ -225711,7 +225711,7 @@ CVE-2023-34358,0,0,abd90ae8e77faca30e672b5cb90eb2435944614b3bd07c25ef936fa287f43 CVE-2023-34359,0,0,7437dbef21e997bb48063dadca3ee66ab5272480d86dad528bcfc561af3064e6,2023-08-04T17:27:09.303000 CVE-2023-3436,0,0,751a2117b4b957b1f6b95ee6a12c7109c0bc15f6a853fb2f81c6cf6aede67fdd,2023-07-06T16:00:57.783000 CVE-2023-34360,0,0,e3602d57a89565961b5fce50e0630911d37353b27e54bbdb059fac8da0ef93f2,2023-08-04T17:27:01.823000 -CVE-2023-34362,0,1,86a6d7a8ea810c83770d2dcd52b7568f507460b8c193d603091884d2c28635ef,2024-07-03T01:40:13.847000 +CVE-2023-34362,0,0,86a6d7a8ea810c83770d2dcd52b7568f507460b8c193d603091884d2c28635ef,2024-07-03T01:40:13.847000 CVE-2023-34363,0,0,5a8a8a4dbf2b327839d34d4993980daa8b7d6ff2e22666a41fae8eee5a0f6684,2023-06-21T12:54:48.157000 CVE-2023-34364,0,0,352eb4f66acf42acfd78df2cd233eac5f739fe7449b2a38cf3dc2da0dc4b31b8,2023-06-21T01:55:59.977000 CVE-2023-34365,0,0,b673f668278470b045078cbc4733bdcaefa5d4627f2a3a26f3947d29988787ea,2023-10-12T22:48:08.197000 @@ -226411,7 +226411,7 @@ CVE-2023-35698,0,0,1a5f0de9e827e1f26d8ce1a23936779b2a92a9242596f2af26444c4d5f2f3 CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000 CVE-2023-3570,0,0,a3d0980af40216925d7b37ef22d88a52e18ec285675de4b6c57400b6bb6155b1,2023-08-25T07:15:08.680000 CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000 -CVE-2023-35701,0,1,fc1ff5b0f9b77d828775afd11577555332290909e0acc8e685affbc672221c1d,2024-07-03T01:40:17.900000 +CVE-2023-35701,0,0,fc1ff5b0f9b77d828775afd11577555332290909e0acc8e685affbc672221c1d,2024-07-03T01:40:17.900000 CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000 CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000 CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000 @@ -226553,7 +226553,7 @@ CVE-2023-35854,0,0,1c39d442015db1a5acfa66cd5fb6d5559cb80e73215bad6a8c25d21a5feb6 CVE-2023-35855,0,0,1e9be71693fad7cf56d0318b0ba20d6035d9a725b2abbea2fe9539b815203b24,2023-06-30T17:15:06.973000 CVE-2023-35856,0,0,b854da7ee9c64545491e837f868263a8a8f96959c6af9d42f3060318b930132d,2023-06-30T17:08:42.590000 CVE-2023-35857,0,0,0ba70612435f4711dc24f371837dd94c4de0819880c87119106823057668b992,2023-06-27T18:37:38.063000 -CVE-2023-35858,0,1,89c699311d612c7ccd45b078a0938d7b347412bbf450f40451b911ac3920f103,2024-07-03T01:40:22.063000 +CVE-2023-35858,0,0,89c699311d612c7ccd45b078a0938d7b347412bbf450f40451b911ac3920f103,2024-07-03T01:40:22.063000 CVE-2023-35859,0,0,ec5d137d135e921e7969441a22663017694bae7103cd337fb113078f44e9d0fd,2024-06-13T18:35:19.777000 CVE-2023-3586,0,0,3b8bfb800b44b46b4fd2831a9a0b1713654ca4a16af8a763d3e5e779b94349f4,2023-07-27T19:37:49.247000 CVE-2023-35860,0,0,7906db5e30391c8a482047de89f47da74d8d9696854f6d7992900294d7e7a800,2024-06-13T18:35:19.777000 @@ -226741,7 +226741,7 @@ CVE-2023-36049,0,0,5201a118da6748b0eb898e88d966747bfa8420a88e22b4867b9d3191781b4 CVE-2023-3605,0,0,bc42059535f7062d0f5322fb9f942c8c0e20861ebb1e7c121b652581188d5fcf,2024-05-17T02:27:38.087000 CVE-2023-36050,0,0,c5557d8b66949eac251fbfbe218f04d6b26a816d4c1a209d6314d83e7c1f8af4,2024-05-29T02:16:01.060000 CVE-2023-36052,0,0,ad12219548e4aa40413eb80545605b172d3fd9f4450a90222fbe92bd31378a42,2024-05-29T02:16:01.190000 -CVE-2023-36053,0,1,5f4779a3c0e379c8ec9155a0f6d5086aa46002948658a0a046f5bb808018c516,2024-07-03T01:40:24.413000 +CVE-2023-36053,0,0,5f4779a3c0e379c8ec9155a0f6d5086aa46002948658a0a046f5bb808018c516,2024-07-03T01:40:24.413000 CVE-2023-36054,0,0,dbcfaa05975d3e8d5786da873dfb6caf187448c5e6e2536799998c36d4814bb8,2023-11-15T03:23:27.470000 CVE-2023-3606,0,0,5929d4107c45e74b0a8c12934e9ec320c305fbdd477fd98e1c68f34d27626584,2024-05-17T02:27:38.190000 CVE-2023-3607,0,0,ab290eb359ad6661d76751270178dfa49f435c44e956238ad2efa66d5f2b73c5,2024-05-17T02:27:38.307000 @@ -226849,7 +226849,7 @@ CVE-2023-36260,0,0,df1237c6457c1b4206b0d5ad02f97032b3a81e18fce3bd69452c4d79fca18 CVE-2023-36262,0,0,0329ac7656644a7553d710ca8782f80b6527e8ade23f535dbdfe1383401c9bcd,2023-11-07T04:16:25.310000 CVE-2023-36263,0,0,4649624e62df1f3c72417442caed269512009de2869b36a656dd3f389025818b,2023-11-08T16:48:00.990000 CVE-2023-36266,0,0,c1aa488a681cc1956fd75006960cd6c7c828125dd8c47d0a0f508b4841f1fbf5,2024-05-17T02:25:39.600000 -CVE-2023-36268,0,1,d00f4421ac8c751a524ef03b6b6a569cb1bb32c956c895cb4d33f7ebf0e71616,2024-07-03T01:40:25.423000 +CVE-2023-36268,0,0,d00f4421ac8c751a524ef03b6b6a569cb1bb32c956c895cb4d33f7ebf0e71616,2024-07-03T01:40:25.423000 CVE-2023-3627,0,0,34eb25ece400e692d01118e91cdb54357e138708553e491dd2e85d00353848ee,2023-07-18T19:58:32.613000 CVE-2023-36271,0,0,ed782faec3fc64ed9c5c1d539673fb2cac501e252bddbf55d0751af403a70480,2023-06-27T12:18:30.333000 CVE-2023-36272,0,0,0a127fb20debfd02d6d9a91e4212d106baf67f3f214966d88f98ab750ccd33ca,2023-06-27T12:18:19.927000 @@ -227467,7 +227467,7 @@ CVE-2023-3703,0,0,76f02181cf5d80b7f612caff5073f455db91d34ac29ea7817245c12bf8efc7 CVE-2023-3704,0,0,0b7c69bc28e7afdd5dcf10d8a79e926f269c85852f7d6befc01c8a1d3a76f806,2023-09-01T17:12:08.027000 CVE-2023-37049,0,0,4a710d2494270e65f82c9c7a56bded47f634b44df6e778149a2d19ec0778c27d,2023-07-31T18:12:44.960000 CVE-2023-3705,0,0,8c79d499f4e32027bc4150fd363eda1f383550d9e90e93d841777af54adc58f7,2023-08-31T00:37:27.440000 -CVE-2023-37057,0,1,e1223f8efcbaf7ddeedc5d28ed13cdf256cc28b55524c35baa26ced5559f6966,2024-07-03T01:40:30.133000 +CVE-2023-37057,0,0,e1223f8efcbaf7ddeedc5d28ed13cdf256cc28b55524c35baa26ced5559f6966,2024-07-03T01:40:30.133000 CVE-2023-37058,0,0,636eb2ae68c7933ac1c46d0381f4bf470e2c04a0a3fd6f1a4e0652ebcf077f8e,2024-06-20T12:44:22.977000 CVE-2023-3706,0,0,d1d24339f524babb3c5d468291861ac849afd345e41ad883606273b20a797f16,2023-11-07T04:19:25.570000 CVE-2023-37061,0,0,7caa8b5c6907e4b61cbed31197e8664c90d669fbc2f478d5af9b346f52feb24b,2023-07-12T20:58:22.373000 @@ -227837,7 +227837,7 @@ CVE-2023-37520,0,0,9ec8c6e256db9e1ee06e769152b9cef91c832f4ba5e3851d9796e47494f46 CVE-2023-37521,0,0,3934cffb8951e320575f6a6b815a9c54b02e3cf380236fb2314adcd474dfbaac,2024-01-23T14:21:58.337000 CVE-2023-37522,0,0,89fbab1961c5fec16b49a6458f8b85b87e3933becc8a37e74a382fc5fed48963,2024-01-23T19:39:58.380000 CVE-2023-37523,0,0,f16775b843690af37c5baa96c1a69e6d211b410d3226a84e9ac558f09704eb2c,2024-01-23T16:54:43.840000 -CVE-2023-37526,0,1,52c90d7c68b8a7d4b4d80db1072ce180a695c5c2d23e49ef6621eca890ff56f1,2024-07-03T01:40:35.700000 +CVE-2023-37526,0,0,52c90d7c68b8a7d4b4d80db1072ce180a695c5c2d23e49ef6621eca890ff56f1,2024-07-03T01:40:35.700000 CVE-2023-37527,0,0,34e033dc0152166e15bd108d08a7f8bcde8623b7c286325f319cea11762bde0c,2024-02-10T01:19:03.593000 CVE-2023-37528,0,0,9a04f2b25e80543b5559ea592a703fb28ebfa5eb3187654b36de007f07d80c29,2024-02-12T16:55:42.290000 CVE-2023-37529,0,0,43b9461439608a19640517dd2fb8f49614d1e96387514762a901e55fe1c6c583,2024-02-29T13:49:47.277000 @@ -228451,19 +228451,19 @@ CVE-2023-38286,0,0,2ea40158ec9818cea2c111e32a6cdb85ffdb6be90a0776aa260b7c62e0143 CVE-2023-38288,0,0,4e09fe935b211d8976ac35865aa2db8a9a2746aebcba83a2a42f77442b554063,2023-11-07T04:17:14.293000 CVE-2023-38289,0,0,393a3d2cd00bfa282df8ba81ff2cfa497d880c900a7962bc261a38de402aa26a,2023-11-07T04:17:14.330000 CVE-2023-3829,0,0,44de65bbb6caddaf343b6a93c742d880a4f731aa467d5d05aa90e99474cc0738,2024-05-17T02:27:51.307000 -CVE-2023-38290,0,1,ab283de32aa45986b6649e963064f48d5a6d06b634a8759fb47662b8f70e0b78,2024-07-03T01:40:42.817000 +CVE-2023-38290,0,0,ab283de32aa45986b6649e963064f48d5a6d06b634a8759fb47662b8f70e0b78,2024-07-03T01:40:42.817000 CVE-2023-38291,0,0,ec6d184e16f4bac46f45f1d46f62ee6b8547ee4dfeeec30611bb7d22eacc9a26,2024-04-22T19:24:06.727000 -CVE-2023-38292,0,1,76237901d4d96d35a542dc706847504ea3346899e96deafd796b22eb5dea6260,2024-07-03T01:40:43.677000 -CVE-2023-38293,0,1,8a3a9f3603aafbba92f85eed0067f39063fea016c09336499fe81a22b69b6e1c,2024-07-03T01:40:44.480000 +CVE-2023-38292,0,0,76237901d4d96d35a542dc706847504ea3346899e96deafd796b22eb5dea6260,2024-07-03T01:40:43.677000 +CVE-2023-38293,0,0,8a3a9f3603aafbba92f85eed0067f39063fea016c09336499fe81a22b69b6e1c,2024-07-03T01:40:44.480000 CVE-2023-38294,0,0,21221ddf1a7803051eb14bebdda06b9569f089426cd68916403fa7572c21af1f,2024-04-22T19:24:06.727000 -CVE-2023-38295,0,1,4016d9baae518bf0696b020435affdc349f967568dc7494a3b5a7127ee5a64df,2024-07-03T01:40:45.300000 -CVE-2023-38296,0,1,1f7e0b083f1ca97eb24702c1e157c0da38ead63f125398b9dc376080776135ab,2024-07-03T01:40:46.110000 -CVE-2023-38297,0,1,f3b4925769f6f90cc376d3161e09dafe9ca0c7a3591573719fd3fa874dde872e,2024-07-03T01:40:46.927000 -CVE-2023-38298,0,1,debb3ed1b34bb88369bd697dc12620e2bb1654e7205a7f55c40fcc1ad550c50a,2024-07-03T01:40:47.743000 +CVE-2023-38295,0,0,4016d9baae518bf0696b020435affdc349f967568dc7494a3b5a7127ee5a64df,2024-07-03T01:40:45.300000 +CVE-2023-38296,0,0,1f7e0b083f1ca97eb24702c1e157c0da38ead63f125398b9dc376080776135ab,2024-07-03T01:40:46.110000 +CVE-2023-38297,0,0,f3b4925769f6f90cc376d3161e09dafe9ca0c7a3591573719fd3fa874dde872e,2024-07-03T01:40:46.927000 +CVE-2023-38298,0,0,debb3ed1b34bb88369bd697dc12620e2bb1654e7205a7f55c40fcc1ad550c50a,2024-07-03T01:40:47.743000 CVE-2023-38299,0,0,2ad843e1ca4b3819cb79f54716b83572113e1705caef6697b75babe646cd7db6,2024-04-22T19:24:06.727000 CVE-2023-3830,0,0,a066fd993ced00ef511dd9a12b646fda0451d261645238a47451bd78bc920bb6,2024-05-17T02:27:51.403000 -CVE-2023-38300,0,1,21d7bcc0f4d78e8cd7b0e3ff2f4e41777aaed6e081cd5d88be120e8f54bb8f60,2024-07-03T01:40:48.550000 -CVE-2023-38301,0,1,dfbe90eed8465062140ec617f2e8acb915be38e7d4d7c9aea689994df35fc046,2024-07-03T01:40:49.340000 +CVE-2023-38300,0,0,21d7bcc0f4d78e8cd7b0e3ff2f4e41777aaed6e081cd5d88be120e8f54bb8f60,2024-07-03T01:40:48.550000 +CVE-2023-38301,0,0,dfbe90eed8465062140ec617f2e8acb915be38e7d4d7c9aea689994df35fc046,2024-07-03T01:40:49.340000 CVE-2023-38302,0,0,fc26addc0337319d47b29b0123872daf8c10a9fef866971c335055a718db29c8,2024-04-22T19:24:06.727000 CVE-2023-38303,0,0,12954e6b7d49a5b662e015224c39000c66a3dd29e3015d088530a37f229066c7,2023-08-04T03:55:50.193000 CVE-2023-38304,0,0,9e8d5aebcfc08be2edd64e8f958069ec67f79bd58d373fe39daf0d9a39b342c0,2023-08-04T03:55:41.383000 @@ -228562,7 +228562,7 @@ CVE-2023-38403,0,0,4c82680dbfe1caf8b5d8c8edcfd2c46c20a656376490d7aaf03abd30fe546 CVE-2023-38404,0,0,3dc6ba7796bd771a65b22048e59c9ab5fef46da9252fb3726f228bc9dd4b4359,2023-07-27T23:45:52.217000 CVE-2023-38405,0,0,c9debfd5593845ef6520958dbc49abb74fd74ee699fbdda9849aeefe8e69acd0,2023-07-27T03:46:14.810000 CVE-2023-38406,0,0,80db54cfbbd0fa8480b91b9c09dce70943da5a2cae85e18029363308bd7a260e,2024-04-28T07:15:08.367000 -CVE-2023-38407,0,1,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 +CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 CVE-2023-38408,0,0,a5b3564bc29fbafca29af20a4fd1ef12d39f0184d3edb95cb86e49e205895556,2024-04-04T06:15:08.430000 CVE-2023-38409,0,0,6490e149eaf901300003e5cb5fe2beb3e6bba4dd1431a86db788223f5e63097f,2023-07-27T03:49:09.943000 CVE-2023-3841,0,0,e5dcada75c14c3d2d0e09efd87694420b2d5ae1fd7d0416d0d7ea84e5522f02e,2024-05-17T02:27:52.550000 @@ -228573,7 +228573,7 @@ CVE-2023-38417,0,0,e4d439fe8ce17f78791d5bd05dc236aad43db9a860856e3def6ad290deadc CVE-2023-38418,0,0,a6c054982312baead20d4d1062cf45fee2dfc27569de516cd4a4dc27ad7f17ce,2023-08-08T17:14:37.997000 CVE-2023-38419,0,0,8bb4bba34e0c87e1dd765561972406c1898c8bd5b036b7284327d9aec57b9f71,2023-08-07T20:09:41.847000 CVE-2023-3842,0,0,32a83f4378de4a9af9290521186437291f83d6ccf4760a5623df57fb3f577b91,2024-05-17T02:27:52.660000 -CVE-2023-38420,0,1,1924140eb0c8c09a97a94cc5a5050aea35f5a7b78310f3bfcbbc7e8d56c28391,2024-07-03T01:40:51.333000 +CVE-2023-38420,0,0,1924140eb0c8c09a97a94cc5a5050aea35f5a7b78310f3bfcbbc7e8d56c28391,2024-07-03T01:40:51.333000 CVE-2023-38421,0,0,d01e1833911d15e84fe9a94cbca5f8e5431d6afa879b63ce79bce4048c5f7089,2023-08-03T16:17:24.150000 CVE-2023-38422,0,0,c4b3917ceb8323726495000bc0956f846091f8243d4aa87abbdf71549343d6fb,2023-09-05T19:41:08.010000 CVE-2023-38423,0,0,5032f7c6cc898359d5c6eaf8a3ad09912048495a5af214ae581f939445907be5,2023-08-07T18:36:08.147000 @@ -228735,7 +228735,7 @@ CVE-2023-38576,0,0,af8fe57eb812ce53861c61345d0fee8b81c4f54d4d6d4bf17791b20b4197f CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000 CVE-2023-3858,0,0,ee716c980fe92c129f94194c8217b011693419c1374acccc84354823a1228591,2024-05-17T02:27:54.297000 CVE-2023-38580,0,0,b787232fe68f479c14e77ddb87e020a544c96eaf393113e71173ba7c2d4fbf5d,2023-08-03T13:56:23.460000 -CVE-2023-38581,0,1,7eeb6701797b2df9a62cfcb0778a3b61c434b1b853404847e544724396d7a07a,2024-07-03T01:40:52.577000 +CVE-2023-38581,0,0,7eeb6701797b2df9a62cfcb0778a3b61c434b1b853404847e544724396d7a07a,2024-07-03T01:40:52.577000 CVE-2023-38582,0,0,10bcc044fc88ba7dd521c801c2f21225f49af5b2e932eb2a066b2a80d61b9c04,2024-05-17T02:26:37.773000 CVE-2023-38583,0,0,55d73cbaeac796f0ecaa1827bd7c5316e209b5f94d2661b0039ea695c5b500a5,2024-04-09T21:15:13.263000 CVE-2023-38584,0,0,0df06beac1368638581b849d87b47ba188de5635a830c495c1cfa6f89aa535bf,2023-10-26T14:26:11.107000 @@ -228915,7 +228915,7 @@ CVE-2023-38827,0,0,226e0bf0139eb60e20925421a3068041b066bb94746d6e571841462b055fe CVE-2023-38829,0,0,04f40c73ffb9ba15cad2ed194ae915aa7970c67d9d86c7205c8acfde6943d7e4,2023-09-13T14:40:32.463000 CVE-2023-3883,0,0,9c17bd0d4662d0002b70ed07b70fa9cb55984d05dd9cfdc885579fdb04af0803,2024-05-17T02:27:56.350000 CVE-2023-38830,0,0,6fd6692e47403d57826ef5a6317affc9e98c63acb30af4426948d5df3339e89d,2023-11-07T04:17:24.603000 -CVE-2023-38831,0,1,e805252f6f1e0e681a7cd7d3211332eef23b661f36d2d3f3bd59aa867903869e,2024-07-03T01:40:53.693000 +CVE-2023-38831,0,0,e805252f6f1e0e681a7cd7d3211332eef23b661f36d2d3f3bd59aa867903869e,2024-07-03T01:40:53.693000 CVE-2023-38836,0,0,5d1b32ed45b0fd93269246c9025ce8c7a21511cf51485dab2b0261ffee4812db,2023-10-10T17:15:12.397000 CVE-2023-38838,0,0,d6352c5bcb35a2a8dd5214125a90474a2e489343497b559099f2d6bdfd0594cb,2023-08-22T00:57:04.490000 CVE-2023-38839,0,0,44167fbc27f4e87a9e80012672268bd920448f88770b4e1db0a376de160d10ca,2023-08-23T16:59:30.407000 @@ -229611,7 +229611,7 @@ CVE-2023-39710,0,0,4d2f90a91a62621cb130d8826d77dc0cff740004cc52afe3a563b5172fa82 CVE-2023-39711,0,0,d0b40f7326db4495cef1d669a989ff817c844836fc9d8c583768d80178b11552,2023-09-12T00:09:43.303000 CVE-2023-39712,0,0,1dada37a3f3c8d0e3d1bb538a550f03ae599f750eecf6b8742d5ec32b24d2a38,2023-09-12T18:28:56.037000 CVE-2023-39714,0,0,ec44cd11346d68329788caa23e26fb96cc3f9c9520db045a45291569731fa420,2023-09-06T00:04:08.890000 -CVE-2023-3972,0,1,8209573c854ceb65530b6cc2e4f9760bcbb47a40a92cb6ec1c0f3c1ae37a434a,2024-07-03T01:41:02.753000 +CVE-2023-3972,0,0,8209573c854ceb65530b6cc2e4f9760bcbb47a40a92cb6ec1c0f3c1ae37a434a,2024-07-03T01:41:02.753000 CVE-2023-39726,0,0,ea080b8f27bf9f310bc6e62dca2b1d44617416822113f194e9039c3d2b0732bf,2023-11-07T17:15:35.560000 CVE-2023-3973,0,0,cfad4e66279172071f4c450006a1a7bd16548645ddf51196be362ba564e9f938,2023-08-03T13:31:43.900000 CVE-2023-39731,0,0,1712e7f673c614b2e4b4ef0d2812a6b0218e9767b1e13fd18f94bf89b53b2414,2023-10-26T15:33:42.247000 @@ -229674,7 +229674,7 @@ CVE-2023-39849,0,0,3661bb7450cd01a716a9c14b9f8d0e990703ec9a3600cc0da0dcb849361f8 CVE-2023-3985,0,0,335831b7dab920ef3ae13311655671c07dc7b454df30467d7a012aa5b1f5a12e,2024-05-17T02:27:59.550000 CVE-2023-39850,0,0,95a969ffc9e78f8ec75f500587d8c97d32559ecc7999e83511ad61eab6e3c60e,2023-08-18T19:52:43.933000 CVE-2023-39851,0,0,527c772bb1775c16e44ddee4396bf268733712831daba81d1966db45b36c03ce,2024-05-17T02:27:08.520000 -CVE-2023-39852,0,1,9a2491e444acef08c1296607ec69d64b979a12f6a47c0ad5fffaec847f793112,2024-07-03T01:40:59.320000 +CVE-2023-39852,0,0,9a2491e444acef08c1296607ec69d64b979a12f6a47c0ad5fffaec847f793112,2024-07-03T01:40:59.320000 CVE-2023-39853,0,0,4458d863ac70280df8fdc5529ac770e91f33119be3e34a0a54d4f3cb462ca219,2024-01-11T14:47:18.230000 CVE-2023-39854,0,0,a80f9238e5d73a8c38ec6550aa4f8906986a0a30173ca9ea6c2f7b094c11916c,2024-02-01T01:10:05.043000 CVE-2023-3986,0,0,8f70c9ddb10dcb50366d2addbbf0490dd7b3507e8092de7cf9d77bd63015c9b3,2024-05-17T02:27:59.680000 @@ -229838,7 +229838,7 @@ CVE-2023-40062,0,0,3491217f0e22241070482555e8285db81b015ce89081894a1a38c4b2a3d2c CVE-2023-40068,0,0,8d76b6159b50688f2b0b849502fbbd36df38292ac3f63bceb1d45bdd369d8911,2023-08-25T16:10:43.683000 CVE-2023-40069,0,0,8c4f5acaeee0a2e1746073a49f6f05b124a639e6752f2edacd11ac714eb281e7,2023-08-23T16:46:05.750000 CVE-2023-4007,0,0,9b4d6a30ed79b4dc76a79d6914b4e67d4946036e63ad91762a11e5705b51eb91,2023-08-03T19:16:00.417000 -CVE-2023-40070,0,1,93e5570e0ce3746369c7d9e5e18832de1e5e1160a7942cd206a0c0a38ef8be7a,2024-07-03T01:41:03.770000 +CVE-2023-40070,0,0,93e5570e0ce3746369c7d9e5e18832de1e5e1160a7942cd206a0c0a38ef8be7a,2024-07-03T01:41:03.770000 CVE-2023-40071,0,0,751c6ae44120831034765df62ba9ff4b38bf72dbc0f990d79d479cf6ce6c2c5d,2024-05-17T18:36:05.263000 CVE-2023-40072,0,0,d343886608a26ab8610e25ca44f022eccae5e67501b297c05e34f5dba4d21a5b,2024-02-28T23:15:08.150000 CVE-2023-40073,0,0,71e56a69ba402c0bb933309bae4723c246798038c8d2c9a621cc2572f9173152,2024-02-02T16:29:18.777000 @@ -229920,7 +229920,7 @@ CVE-2023-40151,0,0,9431105ce9ddf1090a9e164bea663f282ddc71188eae991a83d3f63e68b00 CVE-2023-40152,0,0,778b4430086c863a477398d0adfa787657686c71f3b9054976130c5c3365342b,2023-11-30T17:28:53.117000 CVE-2023-40153,0,0,78ce117b6fe59a36c45921fccfab6a83e5d546155e92a2fbe5ac7e8bc21ba4bd,2023-10-25T13:39:43.797000 CVE-2023-40154,0,0,4f545c644e9aecae0e7c5e28389e881785371ff348f62485e0fb6636df331841,2024-02-14T15:01:46.050000 -CVE-2023-40155,0,1,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 +CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 CVE-2023-40156,0,0,2dc3277a9fc506eb1d19429ceac7526e918fafd087cb342abdaaffa523257afa,2024-02-14T15:01:46.050000 CVE-2023-40158,0,0,01c68e5522e834fc982e25999e9571716b4c8bd6b6eaded0a57c181f615cd893,2023-08-29T14:35:53.187000 CVE-2023-4016,0,0,834245ffee21f8672464f07d5bd634fb6138dc12258b29f7f1677098eebfeffd,2023-12-15T18:19:03.787000 @@ -230034,7 +230034,7 @@ CVE-2023-40293,0,0,3e91b40761ee299655829605f60c684af2a5be7622d2e61ae3ccedf339529 CVE-2023-40294,0,0,d4bd6509d5c1ac7e980af451b8a70fd7d25239a642ad089d43c8d5295f4c19e4,2023-08-21T17:25:38.010000 CVE-2023-40295,0,0,a743eadcf15cc96af9c3861d2210341230395528d845a64c1ccef9069b916475,2023-08-21T17:35:53.970000 CVE-2023-40296,0,0,6fa5b6a6cc075360dfd806c6ac6e24533f004f65081952e873daa3d057118e65,2023-08-22T16:26:40.227000 -CVE-2023-40297,0,1,ddc0a127a362ed2874074b3bb08e044e355a773cf6e266ecae71001a19880a0c,2024-07-03T01:41:05.987000 +CVE-2023-40297,0,0,ddc0a127a362ed2874074b3bb08e044e355a773cf6e266ecae71001a19880a0c,2024-07-03T01:41:05.987000 CVE-2023-40299,0,0,fea7900b7883bfa0ab97eeb20413c4529da02df6227553717f2d432b6f923309,2023-10-12T17:32:03.607000 CVE-2023-4030,0,0,d357275122959a0f2477f9ecad7a5c2fbfddb1530041a10f12b3e5e5399828d2,2023-08-24T20:29:39.293000 CVE-2023-40300,0,0,12b768d230215ee821727c2018b2bf2ec81a405ef96ae608fc36f431cdf69658,2023-12-12T18:55:01.573000 @@ -230362,7 +230362,7 @@ CVE-2023-40646,0,0,a28e9d22a8f69ac68edbea83771530878b7d9215aae5423985926ed0a7fae CVE-2023-40647,0,0,619ffa47412f522734f842407cb1eca2eab7c5586c90e2c43c017745b68fbc17,2023-10-11T17:36:55.953000 CVE-2023-40648,0,0,58eb5cde4b81ce79622088456c9419c752652dc040d1b82d4c6afa0c958e9eec,2023-10-11T17:35:02.967000 CVE-2023-40649,0,0,ff5cf050848a4f8b27bb659f2fd5e248cad2c7ca463d0faa975067290b3af32d,2023-10-11T17:35:11.907000 -CVE-2023-4065,0,1,53bc1466d2766f535c7082268cfb40c6472a034e603cd2ef9c5c8b38508e12b0,2024-07-03T01:42:41.460000 +CVE-2023-4065,0,0,53bc1466d2766f535c7082268cfb40c6472a034e603cd2ef9c5c8b38508e12b0,2024-07-03T01:42:41.460000 CVE-2023-40650,0,0,a36a7d8907fe2ef555ff83a379d929df8d05dbdb85621340ac0945d1b6754879,2023-10-11T17:35:18.570000 CVE-2023-40651,0,0,9e4a1ec7718a99eb301ca31da77b966a28a59320ff598331e4a828527dac1709,2023-10-11T17:35:31.657000 CVE-2023-40652,0,0,bf07db0083ab20239b128182dd935b4c5f0c1605628044895eb375b375987a67,2023-10-11T17:35:49.427000 @@ -230671,7 +230671,7 @@ CVE-2023-41099,0,0,2f7ed1bfc6b2d8415ebb005a1061cb50a8cd1311e2e59d23dabc0bfb121db CVE-2023-4110,0,0,62dc5e9bf46cc8e619ee56bc7a76f82e9b230f23cc72d0f40c8f22bea091920a,2024-05-17T02:31:19.523000 CVE-2023-41100,0,0,0e98c62233ad8fdc1a0dc794cad2a13de21da53ef316b7fa45391b4c29fb335f,2023-08-28T21:27:36.420000 CVE-2023-41101,0,0,f0e4fcdc25d45660d87e851fa7c8989fc4a8763942368859f18e9d739c0bb2b3,2024-06-20T18:15:11.237000 -CVE-2023-41102,0,1,f216f4c1ebc33324b19da1d1eef6d0bc1892cb58bbc5fedb7a880712f7efd474,2024-07-03T01:41:11.897000 +CVE-2023-41102,0,0,f216f4c1ebc33324b19da1d1eef6d0bc1892cb58bbc5fedb7a880712f7efd474,2024-07-03T01:41:11.897000 CVE-2023-41103,0,0,2e9c5658d8e085314a307e9b4407246c0a83e99822f5631f35e29f67c6ba9aa3,2023-09-15T14:56:53.237000 CVE-2023-41104,0,0,26b88ec397bfc19eae05a7a32b350924bbd51b39b465df386506014eb416e50f,2023-08-28T21:41:07.790000 CVE-2023-41105,0,0,59eff7f6b797aeb7d9435c5dc53e0dfd19084f7897d66a0f230216b00ed68118,2023-11-07T04:20:53.350000 @@ -230887,7 +230887,7 @@ CVE-2023-41316,0,0,030558c60c6503b6d70438c5bdb300cb16b9842b4edc48e67f7200d633961 CVE-2023-41317,0,0,163b2d47bc93051806e40e199b2e98036588f22b34ef85271473d480871454b4,2023-09-08T16:49:51.803000 CVE-2023-41318,0,0,c135e9b5a7eb91826b6c6cd0ca08d480facedbefc2dea57f6210b1a0668c730a,2023-09-13T02:17:59.247000 CVE-2023-41319,0,0,c3710a259e690d5c1d93f6d34f54eea19317ff469273c468750179a9f3af3214,2023-09-13T14:25:28.587000 -CVE-2023-4132,0,1,4a9f5e4e7388d3dfe9faa53c174a12d591d8f06b7f71510ba2eed385105cc552,2024-07-03T01:42:42.327000 +CVE-2023-4132,0,0,4a9f5e4e7388d3dfe9faa53c174a12d591d8f06b7f71510ba2eed385105cc552,2024-07-03T01:42:42.327000 CVE-2023-41320,0,0,20470b220c693f1096084b7c941258d40f3c51db9f154845312b3f1eb74052be,2023-09-29T18:15:45.027000 CVE-2023-41321,0,0,2f7429ec6567a2e66d3e5f71a176d39775c943f130c264e8534cff30a0d298fc,2023-09-29T18:13:40.220000 CVE-2023-41322,0,0,ba43cc3765de21690e0a340d007fe2a7656cfe6f9b2f9eedb75db3ebe0780ad7,2023-09-29T18:13:00.543000 @@ -231360,7 +231360,7 @@ CVE-2023-4199,0,0,f7de59f6b2eff5d85d5c81edbc58bffdc241931d6db8c8ac7e1eecaf7bbbe3 CVE-2023-41990,0,0,4cdf41ae5457182e2854914f83e208b2b103461a48653080b69c6bc694e9ca27,2024-02-16T18:45:01.993000 CVE-2023-41991,0,0,4b1c0cdc591d0ef573393f9cf3eba11f26ef484ab08b6ab13bcc2f3bd1d99d72,2024-06-21T16:15:46.357000 CVE-2023-41992,0,0,18a81c74d0fdc748297772ba130c146157b922f5faa391cf649b430e0926d6e1,2024-06-21T16:15:24.927000 -CVE-2023-41993,0,1,1050389b01ab132e826377a424e70eaf85566934123216a96b945d191d9b80e8,2024-07-03T01:41:20.690000 +CVE-2023-41993,0,0,1050389b01ab132e826377a424e70eaf85566934123216a96b945d191d9b80e8,2024-07-03T01:41:20.690000 CVE-2023-41994,0,0,9d9ed96a7983233cac79f96192d0a87b7a85f153815c6f80ec3cd0d903fdd3d2,2024-01-12T14:42:23.890000 CVE-2023-41995,0,0,e3cc6815d15e6c68ba1ad2369c922ee2a0d1bddabf438d7900aa1668a96a5bd0,2023-12-22T16:15:29.073000 CVE-2023-41996,0,0,4b33e62f353d6c102117ee546f57300f74113d54fc9245a6b2d032ea8b426565,2023-12-22T22:15:07.727000 @@ -231558,12 +231558,12 @@ CVE-2023-42325,0,0,6c1f4ed57f48948ce9cfc30a4377d71ffc4c56d4c9d31f0e6886721ee68d1 CVE-2023-42326,0,0,65cb58c24a100a4b7d7cc1b87107ce8335b9dd2ff9415c116d0324f26015d854,2023-12-12T20:15:07.807000 CVE-2023-42327,0,0,dc17be2b5ae230f12251ba509da7b88646fb5698fd06ebe4ca1f917fc7979d8b,2023-12-12T20:15:07.867000 CVE-2023-42328,0,0,32a02006f7cc2ebca42918038c6b77c8b90ce4ad120066b09bec6b773c3c8adf,2023-09-21T17:48:17.520000 -CVE-2023-4233,0,1,91c127f5b421515d4365de7b10d049ac34f757ffd3f3a9d84fc5cd6308c1e47e,2024-07-03T01:42:43.300000 +CVE-2023-4233,0,0,91c127f5b421515d4365de7b10d049ac34f757ffd3f3a9d84fc5cd6308c1e47e,2024-07-03T01:42:43.300000 CVE-2023-42331,0,0,42653761bad098b0c4327d40791810a1e14184ca77d0408deba71c659e97b6c9,2023-10-13T01:19:51.037000 CVE-2023-42334,0,0,dc85f41ac33c8f46ba5464f6347fdd227b5819cc16d25bf8711c22468f10f42f,2023-09-22T02:10:48.637000 CVE-2023-42335,0,0,e816a9ad9da337f19a12e35c3dc875f6c604f80ee9f24737cd61f20fdb017380,2023-09-22T02:11:00.637000 CVE-2023-42336,0,0,50b89d1dd1d2271f828f4723297f4d3c69a79456b1f998bf3f3f4fa1aec0d82e,2023-09-20T20:55:55.307000 -CVE-2023-4234,0,1,f2e8514e535a37a7165088db67c3e8ffbef5ef65eb0c30251c5d827838f01cc4,2024-07-03T01:42:44.060000 +CVE-2023-4234,0,0,f2e8514e535a37a7165088db67c3e8ffbef5ef65eb0c30251c5d827838f01cc4,2024-07-03T01:42:44.060000 CVE-2023-4235,0,0,82822b1778317f0c464daa60091fba641fe04a5efd228ea89aa7681cb91fee24,2024-04-18T13:04:28.900000 CVE-2023-42358,0,0,6a9ae5d1522b295c400ceb9de3acc488b399e291c07e9743cf6d77112b3cd474,2024-01-10T19:39:10.430000 CVE-2023-42359,0,0,43d5430ef7f42022ff5934174ff6b248d86704598bb7094b6e8db4d10d1b7688,2023-09-19T21:24:04.917000 @@ -231589,7 +231589,7 @@ CVE-2023-42419,0,0,e2fcc77eaa863f71e635a0b9b62635de4a65677cae31fdb25ad8667675011 CVE-2023-4242,0,0,9e6641b32a4726c582bab0ab2ad666c1d22d35d37ff41436ee9d550833c4de53,2023-11-07T04:22:21.677000 CVE-2023-42425,0,0,d103db8ab2cb9fd916409787c5907e84cf193d69b068a942b20e7f729c914b96,2023-11-09T00:06:40.200000 CVE-2023-42426,0,0,f2b27a2bfd49dfdf24a8d2e1d4dd58b678c541239c81fb46ad6d517a97642ae2,2023-09-26T14:39:54.583000 -CVE-2023-42427,0,1,9ff8f679ec88f07b5ed3c0905719baed34f328bf5cbfedcb21632b4e278e5adf,2024-07-03T01:41:29.597000 +CVE-2023-42427,0,0,9ff8f679ec88f07b5ed3c0905719baed34f328bf5cbfedcb21632b4e278e5adf,2024-07-03T01:41:29.597000 CVE-2023-42428,0,0,1a5186fae785f2468c230055be6fba9923a6ee7c94f2b365f251aa993fa249ba,2023-11-22T00:05:52.117000 CVE-2023-42429,0,0,716e6dbe083c19347a98c7e366c8d5f52ecf63acfa5a9c244a2604ac14a72d7d,2024-01-30T14:20:32.207000 CVE-2023-4243,0,0,b240fe9b00ad77e83f43eb1cb37a923cc50a357d33a8359ca23c1bcb45e3c918,2023-11-07T04:22:21.837000 @@ -231882,7 +231882,7 @@ CVE-2023-42753,0,0,3e5b4cb61c42d83c57e20f29810d886d9cfc778a0d313ec6b46dde1aeec06 CVE-2023-42754,0,0,55476c044cc3bb964d92c3897c4c72eb7de4aedaa6aa8e5cfb35de27f7eeb8f6,2024-05-22T17:16:04.360000 CVE-2023-42755,0,0,7a86f3a569c70622ae1cea891d915eb97bfc9f08632fef0a949a20ea6e7e2546,2024-05-22T17:16:04.537000 CVE-2023-42756,0,0,1791119cd49d1f819b757c7a73ec49ac86914ba524bc67f6888a58dd72ac15ca,2024-04-30T14:15:09.243000 -CVE-2023-42757,0,1,53f895ca4b2413554de30c5001e6737fc08818e69f276382dbe276da25387997,2024-07-03T01:41:30.683000 +CVE-2023-42757,0,0,53f895ca4b2413554de30c5001e6737fc08818e69f276382dbe276da25387997,2024-07-03T01:41:30.683000 CVE-2023-4276,0,0,ba81376334b317afdb94ddec1b24db97dd7a21c1b03cf9fb7c1f4917c56320c0,2023-11-07T04:22:23.843000 CVE-2023-42765,0,0,5c07d365916475ee0acf6aefb6b25c6c60ad0df44cdaf01f8edc8d17551c86ed,2024-02-12T16:44:16.617000 CVE-2023-42766,0,0,7a1c88ad4b3ecaadc9dc2ef702cb0eb6552014e74a8c5b82be6b12d8f8816434,2024-01-30T14:28:01.303000 @@ -231891,7 +231891,7 @@ CVE-2023-42769,0,0,08c6effb0b9bd2db90c064eb068ca0e87e7c886660ea1c69e6c082763ddc2 CVE-2023-4277,0,0,60e52b2e35e8d855a36825f1fc83582ab115124202d449cdda94adfa4bd7d825,2023-11-07T04:22:24.093000 CVE-2023-42770,0,0,79a5b3f73b0bb93fdbfc047167fbc2fbfa5fd0d015165e4a58aa9f1ee052af08,2023-11-29T17:11:33.587000 CVE-2023-42771,0,0,b080d5e6a0c6792d8ab92c78c8703f1204893ef2adebdea405218fc54b6970bc,2023-10-04T21:05:00.090000 -CVE-2023-42773,0,1,736d6fa55c636e82886587b5e918da34ad4de8b81b4ecb0ec09664b358c5957d,2024-07-03T01:41:31.007000 +CVE-2023-42773,0,0,736d6fa55c636e82886587b5e918da34ad4de8b81b4ecb0ec09664b358c5957d,2024-07-03T01:41:31.007000 CVE-2023-42774,0,0,ad26d7a9424f012557cc56d244288377b36365c9350d77c503f132a91e83eb4f,2023-11-24T15:39:53.750000 CVE-2023-42775,0,0,e9f63ab8899922f199e6598903f6762d51629030e1b8cdb15253c947e09ffd3a,2024-02-14T18:15:46.060000 CVE-2023-42776,0,0,1393e4a821bb8ccaac5bfa53f6d13f12792bb127de487240ab3fbbc80c3e3c91,2024-02-14T15:01:46.050000 @@ -232025,7 +232025,7 @@ CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e CVE-2023-42913,0,0,fca9e6b4a7bebf8cd0dd440c67f0319697b048295dd7ed33ccca693aa95bb9ee,2024-04-08T22:46:44.747000 CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000 CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000 -CVE-2023-42916,0,1,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000 +CVE-2023-42916,0,0,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000 CVE-2023-42917,0,0,30c946e857d0a5d7bb6ecb0dec2a330c9cce36ed5951ac6c1e695eca41827919,2024-06-26T20:01:23.280000 CVE-2023-42919,0,0,60021fe4d11f6a5bf84bbd1335f9f5851355a857da16393688b92141c112d64b,2023-12-14T14:08:16.317000 CVE-2023-4292,0,0,f5f39697fac4fe73280e30bf9044ef09c04e4c52310b1ec3c758250ceee4e5dd,2023-09-22T13:48:01.647000 @@ -232039,7 +232039,7 @@ CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485d CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000 CVE-2023-4293,0,0,8c3d33cc7fec3d9fd4477f1dbb51347bcd3c3988430a3515a2e389b8d5e05eab,2023-11-07T04:22:25.750000 CVE-2023-42930,0,0,00ba480d92534d8bf16eb0b9b509da978474e6eeba0de572b854069e83b9fb08,2024-04-08T22:46:51.907000 -CVE-2023-42931,0,1,319431b6a467504601fa76bed823464e64a52fea8dd6400a4f241a4408b9cfa3,2024-07-03T01:41:32.827000 +CVE-2023-42931,0,0,319431b6a467504601fa76bed823464e64a52fea8dd6400a4f241a4408b9cfa3,2024-07-03T01:41:32.827000 CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000 CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000 CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000 @@ -232061,7 +232061,7 @@ CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60 CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000 CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000 -CVE-2023-42955,0,1,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 +CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 CVE-2023-42956,0,0,37e2253f9e32ca2eaca96ee5948d673b3082374d721374eeccd56848afaf7c5a,2024-06-12T10:15:27.210000 CVE-2023-4296,0,0,e4697418375e16ece070d7b80c1fefdaf488931fca9a321d519649e0d7ae4f3c,2023-11-07T04:22:26.050000 CVE-2023-42962,0,0,44095971da853f64edd0a62395835f1f770cc82d53ee4c8cc6c9470bceeed50c,2024-04-08T22:47:42.510000 @@ -232113,7 +232113,7 @@ CVE-2023-43087,0,0,667e7a1b851f13b8d758e4ffd78a64f60bdef487b4d73971779373e34b957 CVE-2023-43088,0,0,bde58ececd793b572305255ff13c000c58f6728644880987d5a7e5e5e4a2ee15,2024-01-04T14:53:55.977000 CVE-2023-43089,0,0,fe16bf3ec38df95d79f3e5146964b59b23cf04317e400bdb47572747bad024da,2023-12-06T18:38:41.917000 CVE-2023-4309,0,0,945c454549b9020c789e40f94a9e1dc845de071a566be6891691418533afa203,2024-05-17T02:31:29.167000 -CVE-2023-43090,0,1,507461cef9ce19e274dc5453485eda8431b038cbbad75c2eb7bbbb63602d39d5,2024-07-03T01:41:35.037000 +CVE-2023-43090,0,0,507461cef9ce19e274dc5453485eda8431b038cbbad75c2eb7bbbb63602d39d5,2024-07-03T01:41:35.037000 CVE-2023-4310,0,0,6a0febd7c8617d762d6387e63de58071821195cfb7ca3404cba5806c0dff26e5,2023-11-07T04:22:27.147000 CVE-2023-43102,0,0,c0c41ac96d91b8864e0ed5bfdfd63fb27c6da8bb7156aac474f470834a009a3e,2023-12-12T17:11:13.437000 CVE-2023-43103,0,0,59c410f59c05a5c55d51d0f012acc939e1db664779a2cbc258832432b3d8eb26,2023-12-12T17:10:33.093000 @@ -232170,7 +232170,7 @@ CVE-2023-43203,0,0,89492255a78602a3660bb14c29156ff5d3f1c78d9c5f696957821b2311a48 CVE-2023-43204,0,0,4a4c4d4994b2f884e18726aeca1648bfa11032f7530eed52aae397e60b88aa06,2023-09-22T14:03:57.567000 CVE-2023-43206,0,0,53b089b8d72e932a87f991eeb097f8b081c537207c2cfa523c62acb7d105f551,2023-09-22T14:03:46.960000 CVE-2023-43207,0,0,8d34533c58528826e409ae037f8fc09815bbec54dca957a0332119b691dd4bc7,2023-09-22T14:03:39.580000 -CVE-2023-43208,0,1,7ece583f83d12823f27e37fe4ed7283fb7b9ac811118d20c01637421647fc533,2024-07-03T01:41:35.797000 +CVE-2023-43208,0,0,7ece583f83d12823f27e37fe4ed7283fb7b9ac811118d20c01637421647fc533,2024-07-03T01:41:35.797000 CVE-2023-4321,0,0,30a31ab53fa53fe15c449ae93d43fb2ff1c384fe951606ab3d89bf78f7dc8679,2023-08-22T20:43:55.613000 CVE-2023-43216,0,0,be2ff07bef1ed4a95f5a3833eea5f9ba32b594950eb332bce26f1dff8ec8c9b8,2023-09-27T16:25:34.437000 CVE-2023-4322,0,0,864f4e2e8ced6d046b50f82917512ed1e21dde9d3f0e69edfd9d5977cde60080,2024-01-21T03:03:06.933000 @@ -232522,7 +232522,7 @@ CVE-2023-43741,0,0,5b9fd46db187cda5c77965433c4b5636cb0c24421d652aabbb7f76057d0dc CVE-2023-43742,0,0,185e96498182a5ccaff006f021c4582a206371858aef0a63185bb3aa9e7f6356,2023-12-13T15:41:01.980000 CVE-2023-43743,0,0,2296a97d18de28271ecbaffbadc0a078eb350eef44ff2ba72b978a0db6169b31,2023-12-13T15:38:28.213000 CVE-2023-43744,0,0,f3a79cdb2dbe451ad393caaf1b05906d033b5aa76ecb0a7dbb73688d592149c1,2023-12-13T15:35:02.467000 -CVE-2023-43745,0,1,f3739feda008313a329a871fdc85be21540c352197be82388b2162b709b6f68c,2024-07-03T01:41:38.710000 +CVE-2023-43745,0,0,f3739feda008313a329a871fdc85be21540c352197be82388b2162b709b6f68c,2024-07-03T01:41:38.710000 CVE-2023-43746,0,0,50c4613f72162871059b2b2d4a35f862641097b4c7e14d6164ab3269e20ed152,2023-11-02T01:38:07.017000 CVE-2023-43748,0,0,2e432cdac8f0a63b92bff2807f45a9d2579778da02cf46b18ae9316239de1add,2024-05-17T18:36:05.263000 CVE-2023-43749,0,0,ffc5d45677a6f0ab8bfb9c487dc7e916a9114ef62727dd7e20d0acc2c19f4eaa,2024-02-14T18:15:46.093000 @@ -232543,7 +232543,7 @@ CVE-2023-43766,0,0,c3d94b17d2392ff09b084a320fd1fc8561aef9620231c6123d5d5b274c6c0 CVE-2023-43767,0,0,d64e561a1c17c316e6afd120956b606e2b04bebdf6cf0733e0c8ab3f6dee8101,2023-09-26T14:51:32.377000 CVE-2023-43768,0,0,aafbdf647bae3fcd2bd22968442ecc0c40c5a0132da4cdb5b52caf5aa0b8f805,2024-03-27T12:29:30.307000 CVE-2023-43769,0,0,8a9468590748146a71cded148013655e0f6d836db6406d4cc1576abfe45a1c00,2024-02-29T13:49:47.277000 -CVE-2023-43770,0,1,eaa3bf890c36759a4a5591b7732f56027e80a8b6d5ca30152a007417441a3c30,2024-07-03T01:41:39.790000 +CVE-2023-43770,0,0,eaa3bf890c36759a4a5591b7732f56027e80a8b6d5ca30152a007417441a3c30,2024-07-03T01:41:39.790000 CVE-2023-43771,0,0,b763e3326e80cea8f70a57d10f56b8ce7d4f44b5bc136e95cf6b451d994cda2a,2023-09-26T13:09:31.350000 CVE-2023-43775,0,0,426987aa94272a00d1fff68283ba8b1d7192d0003eed39019bbe2da8e1858bf2,2023-10-02T18:32:56.620000 CVE-2023-43776,0,0,18cad57c6143609fc3801717a686a62a748940101cbe3921e5d85b67391c9da0,2023-10-25T13:38:32.223000 @@ -232603,7 +232603,7 @@ CVE-2023-4384,0,0,164482b10ca75cfd04bb57dc20a55eb524d05072e29f93ed1abbd0bf554dfa CVE-2023-43842,0,0,111feb7401b3e9698079eec4a5a4f30a75b7e383580d68a949241e2d2f924177,2024-05-29T13:02:09.280000 CVE-2023-43843,0,0,dc937277992f748461c4223facf3af5539616a872ae4c298d0d59ea4d52ab7a9,2024-05-29T13:02:09.280000 CVE-2023-43844,0,0,6afa63cd1e452aaeda08144db56bf474b58ad8a388e3b781b7bb8aaf3a5dcae1,2024-05-29T13:02:09.280000 -CVE-2023-43845,0,1,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 +CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 CVE-2023-43846,0,0,ac9581d597c9f44d89c8c4a6580ba0174fb38e6245374deab30fda24162ba39b,2024-05-29T13:02:09.280000 CVE-2023-43847,0,0,737531868fa51d12c3ad9fdf1b2b2f8a68d2c0766e5f6d405e3fc7a77117ac3e,2024-05-29T13:02:09.280000 CVE-2023-43848,0,0,651a934980decc2e99e4b1429951b4f07c18e461667c19d535be0e5f36fc3b02,2024-05-29T13:02:09.280000 @@ -233207,7 +233207,7 @@ CVE-2023-44853,0,0,bf03c230d0b4355dd84043746661e667426fd45ab3b65003e02a2b12657fb CVE-2023-44854,0,0,022cfa266bd41555241c52fee709741d2a44ad3cf7d945d89a15ad185ec4847c,2024-04-12T12:43:46.210000 CVE-2023-44855,0,0,25f61c2b7922b96b8465d95bc00ce7701b948783d451a1e6fcafb1cfa3862d16,2024-04-12T12:43:46.210000 CVE-2023-44856,0,0,e55c1477812be3a3227ba8ae233cc5dc3f767f5e974aca63fee6ab5d3f5eb07f,2024-04-12T12:43:46.210000 -CVE-2023-44857,0,1,26efa4526fba2775c0abb30007c2cd5f8e11cb8211d852c759d226044c613250,2024-07-03T01:41:47.663000 +CVE-2023-44857,0,0,26efa4526fba2775c0abb30007c2cd5f8e11cb8211d852c759d226044c613250,2024-07-03T01:41:47.663000 CVE-2023-4486,0,0,7c8fa42bc051cffd420b5ef55e4a2970270cf57ff76a0f7885fa95967ec6e230,2023-12-19T17:15:07.377000 CVE-2023-44860,0,0,c0b6d0b5ccb7ac2fd592f94105e82e028e7be32a8921f980bc7c99a63cb71cf8,2023-11-07T04:21:40.847000 CVE-2023-4487,0,0,1f836b80619020f29266c245ced151007377272af6eda47c1003f870bd49ebf3,2023-09-09T03:52:35.157000 @@ -233430,7 +233430,7 @@ CVE-2023-45209,0,0,d13548e8ddbbdaac5d3f52671e86030a122df1b714f3b254bf7e83ee6e6f3 CVE-2023-4521,0,0,b688f7ebb4a8ae05081b90dfc2d3e5aa63110c07fe8f0a8aec7d54e7490212fe,2023-11-07T04:22:41.103000 CVE-2023-45210,0,0,015445c8d46db4b328a64a863b4689dd675056770aa7f333e4d9c645a082f231,2023-12-11T17:28:08.023000 CVE-2023-45213,0,0,a2b3d1477a2dfd29fc40134a810140d4b9b048c230f577d5a486c601eff0ad0c,2024-02-12T16:44:57.010000 -CVE-2023-45217,0,1,b242cd4a28367d0d17ee46fefcd9fd963383a0b11fdff04c8576d650db6a0d85,2024-07-03T01:41:49.660000 +CVE-2023-45217,0,0,b242cd4a28367d0d17ee46fefcd9fd963383a0b11fdff04c8576d650db6a0d85,2024-07-03T01:41:49.660000 CVE-2023-45219,0,0,270bb0600a3f55378c55b5ea38799f305c6eb8bb95c5b79f810dab4de3af729a,2023-10-18T01:32:45.897000 CVE-2023-4522,0,0,21c51931efbb0b6a933132cf5b91fe4ef9967ce64c453416b56e884701256728,2024-03-13T02:15:50.700000 CVE-2023-45220,0,0,89f02225b08d53cf6d2310d9295828baf1a8becf9542b9fbe85548c6da689aab,2023-11-06T14:42:32.330000 @@ -233497,13 +233497,13 @@ CVE-2023-45303,0,0,6a4197d9306cf9c8969848abc5c09ad71f64056108f7d036edd2e1fc1a8e8 CVE-2023-4531,0,0,2505356872c1ecc6a3c3abbde06198791dd73fac09425052fd91f18f8dbf680a,2023-09-08T16:51:00.220000 CVE-2023-45311,0,0,c55d5039e08f94d152f20b510f185ee56e0ccf20660af7e24cd17ec077068907,2023-11-28T07:15:43.260000 CVE-2023-45312,0,0,4e2ccd821f75344dd9e0f1b2d16370eba307196e003fc1b10f2595fabda3c96a,2023-11-07T04:21:44.090000 -CVE-2023-45315,0,1,0015d13db4624e57dda596fb704547c049b03e9719ea11b6bef4521d5271356a,2024-07-03T01:41:50.760000 +CVE-2023-45315,0,0,0015d13db4624e57dda596fb704547c049b03e9719ea11b6bef4521d5271356a,2024-07-03T01:41:50.760000 CVE-2023-45316,0,0,d05dfe1f1337f68ddee1af98cca84aab8a6cf78f9140310e00c18d54aa873f2a,2023-12-14T18:58:08.837000 CVE-2023-45317,0,0,3e2aaa72f6fe8552f76fa30f9984cd75b52dedeb9ea5f3006a7faeb25bc78c39,2023-11-07T19:54:46.170000 CVE-2023-45318,0,0,5dd26b0f2c45cbfc38f90aed7c3240384ce42b88d7465553c07958d85607e76c,2024-02-20T19:50:53.960000 CVE-2023-45319,0,0,86650df0833723bbc1971d56ca3efdd449b339b2278f2fe27ae7800625741942,2023-11-15T20:15:50.193000 CVE-2023-4532,0,0,6f2368b2a3fc8c7c4f0e7b6068be73911c444cb8a49a7579ec5af887ef07ee5c,2023-10-03T19:28:34.357000 -CVE-2023-45320,0,1,e20435de8e58fba25528f0899673d8da831ddd5e7582bd8c6d4b1d4cfa65cede,2024-07-03T01:41:51.467000 +CVE-2023-45320,0,0,e20435de8e58fba25528f0899673d8da831ddd5e7582bd8c6d4b1d4cfa65cede,2024-07-03T01:41:51.467000 CVE-2023-45321,0,0,ecd9a1b357498cd394e7fd770f31eebdd46a7877ed3636051ade3b732f299cd2,2023-11-06T14:44:12.273000 CVE-2023-45322,0,0,e8870ea4d2b6b9db0ca67d4898085217fcf562a8965643170e540dbee35386ce,2024-05-17T02:29:45.487000 CVE-2023-45323,0,0,99016fe100ab8d35ba774b06fd45bf3706bc8f516bf776ea8a3e7db25c9c7404,2023-11-09T15:40:37.763000 @@ -233545,7 +233545,7 @@ CVE-2023-45356,0,0,1cf9ec1635445b1e89fc035d1c6658b359fe2f6207c1d6a169e11a2e9183d CVE-2023-45357,0,0,d5601735f3144beca6f68fda4958c26ff2a271f72c71f45e2b7a69a3060f24e5,2023-10-24T19:56:37.377000 CVE-2023-45358,0,0,2ee5762472d76baa8bb96baa9fd868cfa08527d9006291ad728bfa89be014b56,2023-10-24T19:19:29.867000 CVE-2023-4536,0,0,4d2ca0f605005d1efb6986b0e170b2776b19094f26815c0707c494af554f098c,2024-01-23T19:38:31.160000 -CVE-2023-45360,0,1,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 +CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 CVE-2023-45362,0,0,aa35acf4ef1c5b9a2917422d876bbc72be9bb9b98f62b3825cb3dc6a24bcd34f,2024-06-10T17:16:14.220000 CVE-2023-45363,0,0,09559cd0eae3e940983ac6f2d7e3bf8ccee121a75d4c652aace8e4b542c73f54,2023-11-28T13:15:07.313000 CVE-2023-45364,0,0,9aa989440de47fdef43073ef24a6e83a05e6e06e303b33bfed743e867fbb3a97,2023-10-12T16:03:43.650000 @@ -233568,7 +233568,7 @@ CVE-2023-45381,0,0,636ca78eac443cb4f637348d8ee4fee7573f821206a15e9b4f252bf045e55 CVE-2023-45382,0,0,e749ad67c4426048984c6f05c233a1830e3b02d47768e2a2990488263070e4a2,2023-11-25T02:16:09.063000 CVE-2023-45383,0,0,6c000ddfd6441a1c3da2c29134b230f4ee0b5b99ea849d6a70757063a564d1cb,2023-10-25T01:24:51.267000 CVE-2023-45384,0,0,68ffd294aedd1a768c3567558e16eccd5913adcff18912fc360412fcfa9f0f6a,2023-10-25T15:26:34.353000 -CVE-2023-45385,0,1,072d831afcf155a1a098246c8171b23a796730d670060e7e0f202c096e056688,2024-07-03T01:41:53.003000 +CVE-2023-45385,0,0,072d831afcf155a1a098246c8171b23a796730d670060e7e0f202c096e056688,2024-07-03T01:41:53.003000 CVE-2023-45386,0,0,374130a71b25dc67a6870f15ed35a03693b486ed6a765768cf670f637ae4325c,2023-10-23T14:15:43.003000 CVE-2023-45387,0,0,45194877e2f2c310ab8a3e47aa92255ab544f487fbe86f4f4335fc4ee36c6e08,2023-11-25T02:15:57.857000 CVE-2023-4539,0,0,3f1ef5a4dce974f3bd7b99806bac78a9be3898dc33b90833d649bc46cca7bd92,2024-02-15T14:28:31.380000 @@ -233754,7 +233754,7 @@ CVE-2023-45702,0,0,de5d102699bd8c10fd8f0316a6585254fb134a2ff0d9938ccb0037068e910 CVE-2023-45703,0,0,dea19aa7d6a8a6afd2ee4037f85223b782d0f4c3a590d34c9d227990e4e23cff,2024-01-02T16:18:39.287000 CVE-2023-45705,0,0,08c5362f863babc2c1eaf45f307c5df7bbcd696a92fe782bb3c50b132fd68c74,2024-03-28T16:07:30.893000 CVE-2023-45706,0,0,e0385697c332dc3ef5d217fc3035264af0d1f8faaf7ecfd441572d04148ca310,2024-03-28T16:07:30.893000 -CVE-2023-45707,0,1,c9b6196c79b5d00c9329a89273abfc5e4f68dd2d284703e16af7a7bd88eb0240,2024-07-03T01:41:54.823000 +CVE-2023-45707,0,0,c9b6196c79b5d00c9329a89273abfc5e4f68dd2d284703e16af7a7bd88eb0240,2024-07-03T01:41:54.823000 CVE-2023-4571,0,0,a5446c6fc7ea19a5021097a5b731baab9b76b99d147937c6f0c007231d2c5858,2024-04-10T01:15:17.183000 CVE-2023-45715,0,0,ee88768f0065e790f1c75fc2a7a8c50b52683fce9b06dae4e814cd4daafca29c,2024-03-28T16:07:30.893000 CVE-2023-45716,0,0,0a00a1625e10fd10c315dd94d684f341e834c086570f2f1b11bcfdbaa4c3a720,2024-02-26T21:22:54.537000 @@ -233868,7 +233868,7 @@ CVE-2023-45841,0,0,3851f1199922ddfee2c7450031a284a943265a00a94c54d5a485a28382565 CVE-2023-45842,0,0,df4b797914ae37016372d133760e1d4dfdc6387e21b65012e18b6fdd8f49c74b,2023-12-12T01:17:12.297000 CVE-2023-45844,0,0,9939ef4d3a5f92a299f7722960c61b4180b134226dc413b6beda5d202b3d4796,2023-11-06T14:39:14.153000 CVE-2023-45845,0,0,81a781af82db73404d8fd111c4a5b53d7c349c250689e5be02c90f127bf85a19,2024-05-17T18:36:05.263000 -CVE-2023-45846,0,1,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000 +CVE-2023-45846,0,0,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000 CVE-2023-45847,0,0,3a74142613f67f762fa3bb8cbba00b0fc89943c398ed44c13d6b502104a60018,2023-12-14T18:20:40.697000 CVE-2023-45849,0,0,65f4549530a146f83a1a874717e18ac041135712f7b80665012be4b86cbc841f,2023-12-08T00:15:07.350000 CVE-2023-4585,0,0,16f90cbd6ab4b021f3dd1013a5df370bd0b40f37efc4b817c4f885f625b865c1,2023-12-21T00:57:28.747000 @@ -233933,8 +233933,8 @@ CVE-2023-45920,0,0,65d7d2ce0a0262772d3ab5884e97ff83a6493f02729ce45348dc60f1281d5 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 CVE-2023-45922,0,0,f553ee1024e9d6617aab805459a8f8d42a6afe3ed3edac7d3660a9abfa0accf0,2024-06-10T21:15:49.337000 CVE-2023-45923,0,0,5946dd1d30e5db85cc88e2299cbbf78c4c1c23d4d9e7d4f1539852b51a3b5d93,2024-01-30T06:15:45.300000 -CVE-2023-45924,0,1,4696ed2541eaf9609c534370ab6a26af99fa2e76657c715446514e3dcda5c971,2024-07-03T01:41:57.447000 -CVE-2023-45925,0,1,55c2bf5f3cb3b82e5ee8c4d2baa8feca3b5b51cc715103c50deecdc500ed4f9b,2024-07-03T01:41:58.250000 +CVE-2023-45924,0,0,4696ed2541eaf9609c534370ab6a26af99fa2e76657c715446514e3dcda5c971,2024-07-03T01:41:57.447000 +CVE-2023-45925,0,0,55c2bf5f3cb3b82e5ee8c4d2baa8feca3b5b51cc715103c50deecdc500ed4f9b,2024-07-03T01:41:58.250000 CVE-2023-45926,0,0,b31fd162068a0734b2b75498e371bf05938747f0b8d935b26b2fd650b2446211,2024-01-30T06:15:45.480000 CVE-2023-45927,0,0,6aed1e8c1cac976d39372a205b9cf2acc98f0084185486e97f5992573dfcc834,2024-03-27T12:29:30.307000 CVE-2023-45928,0,0,47558c1eca203c24f69589e30fb4f90aaef8f6b0bba4ad813aa029274f5783ce,2024-01-30T06:15:45.520000 @@ -233974,7 +233974,7 @@ CVE-2023-46007,0,0,6d540cf7917d33d1f9d983e500b20f05d5c29bcca54bb5f0e94646ac8afd8 CVE-2023-46009,0,0,1eea79869ff9979be475d14a391a108d5bb4d81ac6b06bd913ba7c8e20cd6553,2024-03-01T06:15:48.187000 CVE-2023-4601,0,0,7e66d916aaa833c26886fbece03518fb3051aa64188e2867c5cc5865d8e4a590,2023-10-28T03:47:10.133000 CVE-2023-46010,0,0,5c3101c7e3486cee898c26544050cd1e4dac93f563bf83b1f90e9001eb81a654,2023-11-01T17:22:21.600000 -CVE-2023-46012,0,1,4c65f81e70f0620db4899567118f905fdf02497ad39bfaa25c1f94bbefb73efd,2024-07-03T01:41:58.970000 +CVE-2023-46012,0,0,4c65f81e70f0620db4899567118f905fdf02497ad39bfaa25c1f94bbefb73efd,2024-07-03T01:41:58.970000 CVE-2023-46014,0,0,d4729429d3274daf3dacb04f38f72ea86d397cc5ddcddf9cf33a1c589166a976,2023-11-16T17:32:08.327000 CVE-2023-46015,0,0,a925f4893e8c378bbe13c70dd87f1a6e101207e6c0972bf6dc467f19c6b90d64,2023-11-16T17:31:55.777000 CVE-2023-46016,0,0,aee2ef485dc27314bd5b66585658e6faf5cbfcbe4e851aa29624c3312fd47461,2023-11-16T17:31:46.947000 @@ -234007,7 +234007,7 @@ CVE-2023-46055,0,0,fdf1d245240a975fe0c288b57f8a59d44c9d185d042258dbbbcef27fafed4 CVE-2023-46058,0,0,60caa10856250aa45ff6a614c1529ac57a3c57157cecbc316e05d8e91d2dc6dc,2023-10-30T11:37:02.710000 CVE-2023-46059,0,0,a648e86cef9cc64c17ea1f3cff43740e568be223396cc2a910edd349ad88eaf5,2023-10-30T11:37:14.247000 CVE-2023-4606,0,0,bb64a605ede1c16aa270e38005c735f3c1784fb2351d43c31d0557d507a7edbc,2023-11-07T19:11:17.050000 -CVE-2023-46060,0,1,4376276787a2ebb1cb93ed196e48be33f88d33d99d1dd919d053ddf0d753774e,2024-07-03T01:41:59.363000 +CVE-2023-46060,0,0,4376276787a2ebb1cb93ed196e48be33f88d33d99d1dd919d053ddf0d753774e,2024-07-03T01:41:59.363000 CVE-2023-46066,0,0,41d6277ab5fd36f484c79eab475c38d0efebc32de61f15e15029ef4998d24622,2023-10-19T18:39:24.183000 CVE-2023-46067,0,0,0d353d912d067e409437742ada4e01ea19d3c1d07f86c5cb09863faef188d615,2023-10-27T19:33:46.597000 CVE-2023-46068,0,0,1729060e36c673691d03be4e10577dd27887fabd355b101ba826ad4931439fb2,2023-11-01T17:22:06.537000 @@ -234207,7 +234207,7 @@ CVE-2023-46289,0,0,eeb8999c1027929e8e1432385e10738220f809cefa40c971cda5d3b70278a CVE-2023-4629,0,0,46099667ebb1d5620c651151fc81b80f7b26e3b0acd8b7bf49782cc690ba95f3,2024-03-12T12:40:13.500000 CVE-2023-46290,0,0,60b800c48e60334c2e69f95b8f0bf14e1eb82a55ac0513b709fcee11b9dfacac,2023-11-07T19:09:56.033000 CVE-2023-46294,0,0,d783b82054408b7c98198cf9de768f7b26016fb2ccfc90ad71b9515834779094,2024-05-02T13:27:25.103000 -CVE-2023-46295,0,1,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000 +CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000 CVE-2023-46297,0,0,05d3c94eb7d68360161ab19a0103507bcacb4db4cbb9057e58019a522e6d5140,2024-05-29T19:50:25.303000 CVE-2023-46298,0,0,b077731bbae2546ee5da04f8027611b1fe7cb45539952cb1927c0319e4c642b7,2023-10-28T03:30:11.740000 CVE-2023-4630,0,0,4ec69a1c8fa3ee9a535125a88ba9d69fb2f86c9491ff178e8c57f885e14fd03b,2023-09-13T16:50:23.250000 @@ -234215,7 +234215,7 @@ CVE-2023-46300,0,0,0717e33737bc41686c733bf7e7fb3f4e87670f94456a3f5f908d9ad680b0f CVE-2023-46301,0,0,4bc065fc0550d760de641e0a5426cb26061bacffa84b2c5d6c474914f7b6e8be,2023-10-31T17:08:30.707000 CVE-2023-46302,0,0,4657366a67d8e79775047138127619bb65dfc4001addca3f3c68fdbe69d1172b,2023-11-30T15:15:48.393000 CVE-2023-46303,0,0,f588576f0391c22f76c1458b98d4818f3afd8a52b7c57a797fbd89390f6e96fd,2023-10-28T03:29:56.570000 -CVE-2023-46304,0,1,bc7df584cc001dfecad7d99844692a6781c859f60b464862787f124b7a502319,2024-07-03T01:42:01.507000 +CVE-2023-46304,0,0,bc7df584cc001dfecad7d99844692a6781c859f60b464862787f124b7a502319,2024-07-03T01:42:01.507000 CVE-2023-46306,0,0,3cc3c3abc132825b0de5e5713618461432ca75d34cf5d6314908b068992c117b,2023-11-02T15:47:02.097000 CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000 CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000 @@ -234225,7 +234225,7 @@ CVE-2023-46311,0,0,0e5573500a39b307b2c60ac16805905b2aa525dda4cdcdcb4966393d23868 CVE-2023-46312,0,0,d9900d295c00c4481ba9b90bea85e05da8631659306e5a8ba168f098d658bd0c,2023-11-08T02:24:43.287000 CVE-2023-46313,0,0,26bdfe7606548277b659acc13ea81113d83bd485148153f8e6f1479f3453c4b8,2023-11-08T02:24:23.733000 CVE-2023-46315,0,0,57a98b2aebce8ecc683c579ecab4f70ccf386cd5d66dd5be60de10a3266ce442,2023-10-30T19:09:47.337000 -CVE-2023-46316,0,1,3c376a76d803d7925f6a44c2a01182f2c03d5cd7f395048cd866af0f844b7ef7,2024-07-03T01:42:02.420000 +CVE-2023-46316,0,0,3c376a76d803d7925f6a44c2a01182f2c03d5cd7f395048cd866af0f844b7ef7,2024-07-03T01:42:02.420000 CVE-2023-46317,0,0,694a297f17ff9207c60fbdce8d22fba527c4634032e046bb6af6efabfc0b5eba,2023-11-01T14:29:58.033000 CVE-2023-46319,0,0,f549a62ac35bc0c2e39528c500aa1a51a1c42b39b43aeeb677284f636cf829e9,2023-10-28T03:24:08.903000 CVE-2023-4632,0,0,2b0fcc254050a731a02634a0d4fae3b9ab4834b9d97199940474ad2ea5c9e74e,2023-11-16T17:33:06.617000 @@ -234256,7 +234256,7 @@ CVE-2023-46357,0,0,7dd1f79e9bc467f3e776df1b5b155279fa6793b1f324f700db4046e6b595f CVE-2023-46358,0,0,56df74669daf1cfc9fa494bb056d07dbc425937077ecfecbb0cd68da1668136d,2023-11-01T18:34:30.390000 CVE-2023-46359,0,0,9bed5d075b18bf2d983f4926b778297bf5eeb0b8ce32fb053ea0cda1d64bf540,2024-02-13T16:06:48.480000 CVE-2023-4636,0,0,562e61f0bdb21a8e9740d1d2cc4470f44b3543b2478b7a0ab69d9b539d930758,2023-11-07T04:22:48.493000 -CVE-2023-46360,0,1,15b7a0bfab198a40fa51898875d8715bef48ca2dde4b0a9c26bf4f4c0eae3a96,2024-07-03T01:42:03.253000 +CVE-2023-46360,0,0,15b7a0bfab198a40fa51898875d8715bef48ca2dde4b0a9c26bf4f4c0eae3a96,2024-07-03T01:42:03.253000 CVE-2023-46361,0,0,7fabfe553960e5b849ed9b73987a4ec0a7e939e62b9cea294ce3da4781666f25,2023-11-06T19:26:57.803000 CVE-2023-46362,0,0,cd4d73c01c5aaf758b43287c22fef256862def3d118db2fdbbe791237cbb0e5a,2023-11-15T19:49:17.137000 CVE-2023-46363,0,0,fb7aaff72d646c72ea119ea9b6602c72606acb2c1787d2b6dcd0052cbe3fedaf,2023-11-15T19:22:31.510000 @@ -234402,7 +234402,7 @@ CVE-2023-46562,0,0,366983b793e3e72c26cde43b82b88e03484e5a1d9b5bbe1b26f0dcf9b2334 CVE-2023-46563,0,0,c446d53d746796f88f77d80d091b9f9c3b598f114302a710d0d5651ee3412bb9,2023-10-27T22:00:00.013000 CVE-2023-46564,0,0,ff998003dc795a8f0291ab89ab2c7139ae1a38507e082a3b1cadc8aaa8efd172,2023-10-27T21:59:51.473000 CVE-2023-46565,0,0,0f34a62dc08c5e9007d8f9098c94c708242c0d964c590d32125573cfc7636cfa,2024-04-30T13:11:16.690000 -CVE-2023-46566,0,1,817c4e8fa759c5542cbea7b815bba4eefb974ca574f472f95baa4f05798e9f10,2024-07-03T01:42:04.097000 +CVE-2023-46566,0,0,817c4e8fa759c5542cbea7b815bba4eefb974ca574f472f95baa4f05798e9f10,2024-07-03T01:42:04.097000 CVE-2023-46569,0,0,ca938e7eb0c27179a5022e9899fd4674404438b92b72d178a4b10062ed4c3ba6,2023-10-31T15:24:49.480000 CVE-2023-46570,0,0,c990920fa786ff502dd8be52f0959107a8f5ed7528be39cbef3eb5f1e6f7f8ec,2023-10-31T15:24:57.817000 CVE-2023-46574,0,0,2b220ba68c36ab806a61c39e7a41d5362c4552fa37a2644713939a967f56e226,2023-10-27T21:59:44.067000 @@ -234493,12 +234493,12 @@ CVE-2023-46683,0,0,a352b3622bfa5b727ee4c9e9990b11035967820b7c86353f993767f535c02 CVE-2023-46686,0,0,6c8587417c6ad35ad5bc9862ffda506549d70ed1e418d96a72befc37ac461ead,2023-12-28T20:08:24.817000 CVE-2023-46687,0,0,4c381fd89a6853349c558c4fb82eeb2b29cd61546ff6e41f902fa36aada3203d,2024-02-15T07:22:46.397000 CVE-2023-46688,0,0,c8cf9dcc97d717964d18601b17175507c314a960f04fee0869b41c8545ba2b52,2023-12-11T17:27:33.120000 -CVE-2023-46689,0,1,3d2176bf10285ea50762ce13a75795e7d4ad97473f4d025a55e049d4ec149203,2024-07-03T01:42:05.130000 +CVE-2023-46689,0,0,3d2176bf10285ea50762ce13a75795e7d4ad97473f4d025a55e049d4ec149203,2024-07-03T01:42:05.130000 CVE-2023-4669,0,0,4e11648cf2978a048ce994fb21f288509f3f783347b59fce6dc9616fed92e00b,2024-05-17T02:31:42.653000 CVE-2023-46690,0,0,f595b5776e3a89d563db4b7c15d5ce1559ff19cfe3c884ee3ac9a6a3f2dcffd0,2023-12-06T18:49:11.797000 -CVE-2023-46691,0,1,fc5ef5914268338aab0f0866378cd8f74ea597c95c3f2599bf44e78e22dd0eb0,2024-07-03T01:42:05.847000 +CVE-2023-46691,0,0,fc5ef5914268338aab0f0866378cd8f74ea597c95c3f2599bf44e78e22dd0eb0,2024-07-03T01:42:05.847000 CVE-2023-46693,0,0,852030708cb5147647dd56ddb7053b52ca5ba36757a864c4a018c226d37a8dfd,2023-12-11T19:14:27.790000 -CVE-2023-46694,0,1,b094ba94bed3b5bd3e80005e362c0d66e3d103652fb4a147c77dfdb913e335ae,2024-07-03T01:42:06.570000 +CVE-2023-46694,0,0,b094ba94bed3b5bd3e80005e362c0d66e3d103652fb4a147c77dfdb913e335ae,2024-07-03T01:42:06.570000 CVE-2023-46695,0,0,f04fde2521ecf7d3eabd0c4fa9f23ae3e2c51de9c5fb9c26fad1bc60bdc368e0,2023-12-14T10:15:08.170000 CVE-2023-46699,0,0,46e2b1dc87b6591b49ea519af5b5ea086c07ebf6ac9e5f3d5f8165a6f1fc4b2c,2024-01-04T17:09:09.933000 CVE-2023-4670,0,0,56ca27d289857fa9cce1a82dd8b06f90d907f35e41e78ba05fca50614d2a3304,2023-09-20T15:24:30.517000 @@ -234605,8 +234605,8 @@ CVE-2023-46802,0,0,81ab742ef444b7c62f7f45fae874a3923600da74bccd6c05821cc0f3c3485 CVE-2023-46803,0,0,6d9acf7fa697eba714f52e6c2563d15daaa62001c85a491829c55db066eb5d2d,2023-12-21T04:49:22.117000 CVE-2023-46804,0,0,303fee7e8ddf7f125b651ea337e3f6426140c80ed6928e8d77bc4dfdbfc39c28,2023-12-21T04:49:19.073000 CVE-2023-46805,0,0,82dafc5ea0b29ca28bb6a9f9e3594fe74c7356bc89f8ec291be9e07cf6b947fd,2024-06-10T15:39:50.823000 -CVE-2023-46806,0,1,49a0b042d8e030d1507dfed8a0c175f6283ca7615330bcadaded676c9bd069b4,2024-07-03T01:42:07.793000 -CVE-2023-46807,0,1,c28cf6fba75d9bfea83f438d6bca59021e282ddfe25b1a9c7a037441645e037f,2024-07-03T01:42:08.520000 +CVE-2023-46806,0,0,49a0b042d8e030d1507dfed8a0c175f6283ca7615330bcadaded676c9bd069b4,2024-07-03T01:42:07.793000 +CVE-2023-46807,0,0,c28cf6fba75d9bfea83f438d6bca59021e282ddfe25b1a9c7a037441645e037f,2024-07-03T01:42:08.520000 CVE-2023-46808,0,0,cbddf0c466af810602e3b5e48604f0a280381993f5e5339e9c62959d89628764,2024-04-01T15:31:56.613000 CVE-2023-4681,0,0,d4b1d47c3f1f541f581a94f5a50c79c85882e6afa6d0d58510fdf4b0129b96ab,2023-09-05T16:22:15.077000 CVE-2023-46810,0,0,f489bc989faca2ffd890051eeca4d29dc1d904b12f4600a012b6b1e3cc582a66,2024-05-31T19:14:47.793000 @@ -234850,7 +234850,7 @@ CVE-2023-47165,0,0,a7b08d2ff3ee802a407abecdc2d2b4f1d37cb7e807eb71f2d519687a57b17 CVE-2023-47166,0,0,e50298cb81fedd5a59e9af388f25468272b5925ff46d386592239fec8ca1c7e9,2024-05-01T19:50:25.633000 CVE-2023-47167,0,0,d6d051dee0bdf619cce5a3865e3675a696da5d8609f3bdcb7762a87f6550e8ba,2024-02-09T02:10:50.633000 CVE-2023-47168,0,0,5fca546f27cbaff058a5661b989d8656bc3335768a7a457ee1d061238e0ace77,2023-12-01T21:24:07.470000 -CVE-2023-47169,0,1,cac3988fd2f00de2c35166f0919f9550facb8d93c531fa714242d48560dac4cd,2024-07-03T01:42:09.907000 +CVE-2023-47169,0,0,cac3988fd2f00de2c35166f0919f9550facb8d93c531fa714242d48560dac4cd,2024-07-03T01:42:09.907000 CVE-2023-47170,0,0,3ca18c10c3994d460f4cb6e6bd4ebf7e655548a4736370cf1d0886d63d7ddc57,2024-02-05T05:15:07.730000 CVE-2023-47171,0,0,65ed9d5abf908e984f90eadcff5bf4ea86edadd55e35071e16c4aaf375e11c63,2024-01-17T15:22:38.970000 CVE-2023-47172,0,0,e6f130f0901d1476a705ea8aeacecc36f6d28d5ab136906ac411a2c4447ed095,2023-11-28T21:57:21.713000 @@ -234884,7 +234884,7 @@ CVE-2023-47204,0,0,b43cf2bc871d7e4c85b23236f9263f9df7624d6ed6d283606c60f635c575d CVE-2023-47207,0,0,282df8dd913e0a92c9ee0c050e772e75cfdc1c98e07c7ef000fa50406702a38f,2023-12-06T18:48:48.427000 CVE-2023-47209,0,0,5a3534375985be4e31c91d5f0346bbc99b438747f524690171e5c5828c27f382,2024-02-09T02:10:45.003000 CVE-2023-4721,0,0,8fb93ec641bf4963e7d43794a0269b710c7d6d3ee34fa94fc0791119016bc173,2023-09-06T00:15:28.960000 -CVE-2023-47210,0,1,e62daede3ddc1b31ef043d527e408f0a9addd65be9bee951a5c14de46ded64d0,2024-07-03T01:42:10.710000 +CVE-2023-47210,0,0,e62daede3ddc1b31ef043d527e408f0a9addd65be9bee951a5c14de46ded64d0,2024-07-03T01:42:10.710000 CVE-2023-47211,0,0,46675d79a2114fd074c88997bc417b337098487627d422dd6af3409458458775,2024-01-12T18:44:45.403000 CVE-2023-47212,0,0,64aec6382f0d92957166487f72b4d228772553ffa26a2bb4e177f4486d3646c5,2024-06-10T17:16:15.040000 CVE-2023-47213,0,0,5f958cd1ac22b1fd7005ac8b063466e688d4f6222ae9f8c29aadfa3678a3f27d,2023-12-05T19:13:43.543000 @@ -234907,7 +234907,7 @@ CVE-2023-47230,0,0,98e54ec85149eb5b7a886246e70faa9789424eff695d2b80f1f18594563dc CVE-2023-47231,0,0,52a0fc4892df54cf36480ba4cd483981c6f7b112e09729fb822f624c1979cdea,2023-11-15T16:21:11.800000 CVE-2023-47233,0,0,f218de1aa213737abb82ac9db8f945feef1a2acc74d030ea2fa8cb512c6ec493,2024-06-27T13:15:52.623000 CVE-2023-47234,0,0,2789fb6053c1e8a11522a688aee6f2a244ebebed599b2e822033da845b9ed62d,2024-04-28T07:15:08.703000 -CVE-2023-47235,0,1,b75caa87f8a3a2600e2a80e9d7122ca67645d01789e6d8aacfb2b04849ef8ebd,2024-07-03T01:42:11.777000 +CVE-2023-47235,0,0,b75caa87f8a3a2600e2a80e9d7122ca67645d01789e6d8aacfb2b04849ef8ebd,2024-07-03T01:42:11.777000 CVE-2023-47236,0,0,b0b312089de1fa4b30acc4988ffca55daee03fe17197415e08738b0e7d2a16c8,2023-12-28T20:07:16.600000 CVE-2023-47237,0,0,300757c13e0afaa0d3ea72a8a7866748846c7ae9f4f522d4cbba9d38a9f2ce25,2023-11-15T02:25:41.300000 CVE-2023-47238,0,0,66d5330fa3782d388bd9bee2a81da2820e2ebb34194b1a721643b50ddf6a49cb,2023-11-15T02:25:33.170000 @@ -234945,7 +234945,7 @@ CVE-2023-47271,0,0,9cc05b4e0b65c52657ed8cdc25e16f6a7fc3036ff1196f68571bcac4e6332 CVE-2023-47272,0,0,6e28ab19abbf3b1b70b10399ba447a3637cdf3f4443fc6db792243e0885fe9db,2023-12-28T17:24:36.373000 CVE-2023-47279,0,0,77443ef453c9d718722250faa2452d8d4368ad781c70a56bce601eb3ebab7163,2023-12-06T18:38:55.820000 CVE-2023-4728,0,0,3739059a9e889248ad0d9a8fd436f1cc6c46a0e5ea28e1d984a31031df86b6c0,2024-03-12T12:40:13.500000 -CVE-2023-47282,0,1,8665c3cbb25e2795a74c32b46946c120e821aa6fc7cfe00e8166e449e7fb5d1d,2024-07-03T01:42:12.093000 +CVE-2023-47282,0,0,8665c3cbb25e2795a74c32b46946c120e821aa6fc7cfe00e8166e449e7fb5d1d,2024-07-03T01:42:12.093000 CVE-2023-47283,0,0,60e1454176bd7ed0a3132a6d52101088fa7d827e2deaf9e097ee2a811ea4a3bb,2023-11-22T00:05:40.857000 CVE-2023-4729,0,0,f59bc19fc36952c25f2ec64c44b945dee977c3f01e1cc7e4cfcaa96c93eb5664,2024-03-12T12:40:13.500000 CVE-2023-47304,0,0,479b5f8959b04d3e08ea0e2ce92de50218c370ec8b84765c36c3ad8d181305aa,2023-12-11T15:37:02.707000 @@ -235013,7 +235013,7 @@ CVE-2023-4742,0,0,92aeeffb12212bb9b1b2758262acfe1726b1713a9e8b6da9a4d202aca12113 CVE-2023-47422,0,0,53e4ba62d7fd0242ce1870b57522bcebcee34260151a2b5b738b7621b64d4019,2024-02-22T19:07:37.840000 CVE-2023-4743,0,0,76ccc52ee34a9ae80e8834c59856d1fd9946d3b8f84225b432ec040f31d7bd6b,2024-05-17T02:31:45.843000 CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000 -CVE-2023-47435,0,1,503cd7afba24087d7278aebbcd258808073035bf713012b8eb8fdd772acdfb43,2024-07-03T01:42:12.810000 +CVE-2023-47435,0,0,503cd7afba24087d7278aebbcd258808073035bf713012b8eb8fdd772acdfb43,2024-07-03T01:42:12.810000 CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000 CVE-2023-47438,0,0,479cbd83c7c1950583b3656496c410334cd711e47d5d8ea1a19ff583debe6d28,2024-03-28T02:01:13.303000 CVE-2023-4744,0,0,8f5ee08e65ddf1a74186e352e89a4e435b37d0ee4d02569cc2726d93ec407dca,2024-05-17T02:31:45.953000 @@ -235138,7 +235138,7 @@ CVE-2023-47616,0,0,a22f1aa8f2324be47acb237238a7748b00a3e23fc1a08f2b5440e88a12377 CVE-2023-47617,0,0,c89037decd9f6e5e190432e4c83df30b66d7682701ac5375032efc55271ef443,2024-02-09T02:10:37.967000 CVE-2023-47618,0,0,46f0d899e3917e2a4f6061d152622b32fadebc153a8fb4ab8b4603df078b5864,2024-02-09T02:10:33.477000 CVE-2023-47619,0,0,4251c6a49f61526865c295203725d8cc3ee5e9f14dcf6fbe027ecd203f82080d,2023-12-19T14:45:12.943000 -CVE-2023-4762,0,1,20474f7c57b0b1d60e14292d42140663cfbf22f40fdb968fb162bdc85078d1fe,2024-07-03T01:42:46.600000 +CVE-2023-4762,0,0,20474f7c57b0b1d60e14292d42140663cfbf22f40fdb968fb162bdc85078d1fe,2024-07-03T01:42:46.600000 CVE-2023-47620,0,0,b018994059aac66c986b6a302a0b5a3a5967fe341f458d5b6d5591b4d0617267,2024-02-13T01:15:07.983000 CVE-2023-47621,0,0,fd6d86d157b39d2b335af4e2e7c195dcf5f3a7411eec2adb2371062b52a70855,2023-11-21T03:10:58.357000 CVE-2023-47622,0,0,e812868eba2c9e547dbcd688af8fb74835c63b8aaaf3d3d8f81bfed4a7fab8ba,2024-04-15T19:12:25.887000 @@ -235194,7 +235194,7 @@ CVE-2023-47672,0,0,fe373617440d9a165f45306f73bd3af1017e4c09f55b8e5854e32ea643087 CVE-2023-47673,0,0,97e8bfa3ac10c2246cef6a5031c56b0303fd0cfb3720ff012a9707e2cea87411,2024-02-06T14:15:55.047000 CVE-2023-47674,0,0,eff3cb202c68310b2428576f99bc8606e52e60dd39a497438300d3052e8e1a2c,2023-12-05T19:11:17.703000 CVE-2023-47675,0,0,b5d30eba1ecc4a944b40987d9ab273e9dbd8543d3842a7a31559cdd3ffabaf24,2023-11-22T00:05:28.373000 -CVE-2023-47678,0,1,1657ec5af66a76b14903f17461c73011e9a72a0e017b8f5746008072f0cbf9c4,2024-07-03T01:42:14.340000 +CVE-2023-47678,0,0,1657ec5af66a76b14903f17461c73011e9a72a0e017b8f5746008072f0cbf9c4,2024-07-03T01:42:14.340000 CVE-2023-47679,0,0,6a7281ce75d88db73ee4644105ec6a35308c3adb3e0a17e43a1be4e968fc5b2b,2024-05-17T18:36:05.263000 CVE-2023-4768,0,0,4a45b9a26a63dda75c659ff661d20422bc870280687842f9433a1cb52a94b57e,2023-11-13T18:28:18.260000 CVE-2023-47680,0,0,92ee1efbc9cf057b2aac6bfa02d096a8847a00df5987488cef44359cea582925,2023-11-17T14:50:40.710000 @@ -235373,7 +235373,7 @@ CVE-2023-48017,0,0,fd3bf91a32865c1a971e0561cd0946a2f9e4af5dd63813c530d38c2581282 CVE-2023-4802,0,0,1c1bbf22a1dbea2c8a7ba6d438156cd528e16c02f15853c542dc5d592be47ba7,2023-10-13T22:15:10.537000 CVE-2023-48020,0,0,dfc11fc8349c5a3499e636901207c479f3338b0ad31c34202a8115aabce58f21,2023-11-17T21:27:51.187000 CVE-2023-48021,0,0,180e5f47429499a40ffab0e193dc1a9e50ea7a91e4cfe3780d5f18d138d445fc,2023-11-18T03:27:32.867000 -CVE-2023-48022,0,1,bb58d121428e91611d58653c9162cc69e4ff34f98854560c837ffb103c3c61e4,2024-07-03T01:42:17.167000 +CVE-2023-48022,0,0,bb58d121428e91611d58653c9162cc69e4ff34f98854560c837ffb103c3c61e4,2024-07-03T01:42:17.167000 CVE-2023-48023,0,0,8e582ca94aff6735b09dd498a3cefb2f7bb3e33e201545fb45c4baf4be7187d3,2024-05-17T02:30:38.467000 CVE-2023-48024,0,0,e6a4e6e166a6ed0ddd0b1739242856ee3c6d68fe8c575122b547ac1b8aaa6a28,2023-11-25T02:23:37.257000 CVE-2023-48025,0,0,936245d7484c699b71ef540588cfc253752d8cb2fd2930a2dd9392e6880b0d70,2023-11-25T01:21:30.640000 @@ -235448,8 +235448,8 @@ CVE-2023-4817,0,0,730dafa0009615726fac3b77b3be7137b9257eb2c70d008758052fa40c3f36 CVE-2023-48172,0,0,5a469e0274433a0ae0c832bd74c7fde63212f4ba8f5394a1cc6402ed0325e021,2023-12-09T04:46:27.490000 CVE-2023-48176,0,0,c3abf7182d832669fb665b5e3a6edfc409b19c925d485b0863dc39013424ec2e,2023-11-30T20:21:54.850000 CVE-2023-4818,0,0,32c4ac875c9fff7c6d3cbfffc06a837d78543029d0a511e26bbd5fea2f1807e9,2024-01-19T16:35:49.683000 -CVE-2023-48183,0,1,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000 -CVE-2023-48184,0,1,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000 +CVE-2023-48183,0,0,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000 +CVE-2023-48184,0,0,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000 CVE-2023-48185,0,0,7ef7d220f1c753558def21f6a3c05b2c9063a72adb28cbfed77d5f1a672c1649,2023-12-02T00:21:40.093000 CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e212,2023-12-01T04:00:46.523000 CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000 @@ -235618,7 +235618,7 @@ CVE-2023-48360,0,0,5f52fe9ee7f393ac321bc47178d905c7234bca1ce2a8a389c4be92357f554 CVE-2023-48363,0,0,1c71f90d086f9a4e8b6a985ba05521a60ebf32c533f9a33e64d0d0c63d0db63f,2024-06-11T12:15:13.450000 CVE-2023-48364,0,0,860ce4c9024f442acd95ce827f4acb0bf80273564e5ad65456d62edfe408ee1a,2024-06-11T12:15:13.600000 CVE-2023-48365,0,0,92b94a01aa64371270f664c267020af715b7d3e08ac6d8798928c922a3dc054c,2023-11-29T20:43:54.133000 -CVE-2023-48368,0,1,14fc972e365681825e25968bdbe284b3728808e51453cd80c5c505a8e3ca41c3,2024-07-03T01:42:20.450000 +CVE-2023-48368,0,0,14fc972e365681825e25968bdbe284b3728808e51453cd80c5c505a8e3ca41c3,2024-07-03T01:42:20.450000 CVE-2023-48369,0,0,476fb784121fe9e74a99fac62bdf0f332197e1520dde9dac0a54fe1ee315c6a7,2023-12-01T21:37:48.153000 CVE-2023-4837,0,0,5eda826768772b37d81ef65011339002d4824ff6d272e0327b36ba8b1b62ed7f,2024-05-17T02:31:48.790000 CVE-2023-48371,0,0,d610201241d12c4cdc64741daa7966450682d7a6dda71ac622cee439a759c926,2023-12-22T17:00:42.830000 @@ -235991,7 +235991,7 @@ CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9 CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000 CVE-2023-48724,0,0,161f36a41465719e133c9dd4fcc3244326e7b46b87de3c4fdce57047eeea7f1b,2024-04-10T13:24:22.187000 CVE-2023-48725,0,0,e6e5b3a3cd78432765b74b2d7360c44fd933c54a4cf2f2334e127b9f4342156b,2024-03-08T14:02:57.420000 -CVE-2023-48727,0,1,9952b30b8ee49262df2f099bc86cddbc0267d3d946019a464bc87fca1aae30d9,2024-07-03T01:42:22.043000 +CVE-2023-48727,0,0,9952b30b8ee49262df2f099bc86cddbc0267d3d946019a464bc87fca1aae30d9,2024-07-03T01:42:22.043000 CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000 CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000 CVE-2023-4873,0,0,465c1e241ee1b198b74a3fc3bb12f674d897060f7573d208dbebf389159d3a67,2024-05-17T02:31:51.323000 @@ -236049,8 +236049,8 @@ CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc CVE-2023-48789,0,0,1e0645fec7ea3fad71b3ca71ed4dc6753766cac9708402fdc1f8d159af41e8e9,2024-06-03T14:46:24.250000 CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 -CVE-2023-48792,0,1,5c2aee35948bf52c45856f04423cf3034c4db1705c4352d4c0ffe18b53f16d95,2024-07-03T01:42:23.563000 -CVE-2023-48793,0,1,e12fc34ba64c9d158dedcc17eac798e8672651aef8eadf95d2da8c11d5f8f26b,2024-07-03T01:42:24.367000 +CVE-2023-48792,0,0,5c2aee35948bf52c45856f04423cf3034c4db1705c4352d4c0ffe18b53f16d95,2024-07-03T01:42:23.563000 +CVE-2023-48793,0,0,e12fc34ba64c9d158dedcc17eac798e8672651aef8eadf95d2da8c11d5f8f26b,2024-07-03T01:42:24.367000 CVE-2023-48795,0,0,9a1b9599bc877327a43d279d8887b2292c9be4a9c871a29ddf35e8d8a742e4bb,2024-05-01T18:15:10.657000 CVE-2023-48796,0,0,9e1a54d61837f1660243218a92f33ab6c093e838cf1a08d33043e191ed76cc35,2023-12-01T20:14:35.870000 CVE-2023-48799,0,0,41b4e4c55be354a73001fc873a1fa0ce0a1c366cc1850043936be8ca9abad6fa,2023-12-07T20:14:48.190000 @@ -236100,7 +236100,7 @@ CVE-2023-48860,0,0,b650f66bd82e10eb24c227258eb0bacd29892b1b7ed9d78489c662c7ad0b6 CVE-2023-48861,0,0,3c29f239b0595edbc180c33fe01576fee5a79874aafac034ecddfba0e2b39602,2023-12-11T17:54:53.557000 CVE-2023-48863,0,0,f97de4feb3b75fe65ed11a9be5544ea7bdc582a61a017b4bceb0d8ebca95c907,2023-12-07T20:51:22.473000 CVE-2023-48864,0,0,e030c3642f5f605cdbe28f176b78801327737c9c3f7a9a7e5bebe5ee2b71bac2,2024-01-17T01:35:05.413000 -CVE-2023-48865,0,1,3cd7555bca8ad7233487cb54ed0d72f203c740126d7cff50faef21a12594eef5,2024-07-03T01:42:25.237000 +CVE-2023-48865,0,0,3cd7555bca8ad7233487cb54ed0d72f203c740126d7cff50faef21a12594eef5,2024-07-03T01:42:25.237000 CVE-2023-48866,0,0,f4f9743675afabccf5b6b1dd4c34a22ac8f4a08a4ba5e7a9d10bd28622ce7cc3,2023-12-07T18:16:40.137000 CVE-2023-4887,0,0,793ecb0244893b4c9ce5a6ff3e0d13a36652a9ee0ae60286c38b9a12736b0c04,2023-11-07T04:23:08.350000 CVE-2023-4888,0,0,7445aea8fbbbdc356ee73ac5d755cb38cd5e4c7b2adfdb09db6e14773a12c91e,2023-11-14T19:20:47.200000 @@ -236230,10 +236230,10 @@ CVE-2023-49107,0,0,0e9af909d621a9c4570185530fdb9aef197de445657f00c33192f11bd7858 CVE-2023-49108,0,0,8b448f813b7f2ff64556bb633e06c1db82194a485a83298972e379416108c845,2023-12-07T17:52:39.950000 CVE-2023-49109,0,0,3bb373d6db941540f9b57f78839d3b030348e834d02ede0d650edc70819635fb,2024-02-20T19:50:53.960000 CVE-2023-4911,0,0,0380760292e65955859c1ea2fd6467a51435ec5fc89240e3b7268906c4542c20,2024-02-22T20:18:58.020000 -CVE-2023-49110,0,1,8b58334ac02dd5b7b1ae35b2a658333276b33522d3c8b5bb0fe8859f970db620,2024-07-03T01:42:26.413000 -CVE-2023-49111,0,1,df0dafd2b2920c0c1ef482d192465048000f9bae0650aaf5841143aa649b80f8,2024-07-03T01:42:26.627000 -CVE-2023-49112,0,1,fa413702068a86fc4c7e36ae8fc0a181d36075b881dffad29e8ffcbd503a5335,2024-07-03T01:42:26.830000 -CVE-2023-49113,0,1,9f18333823936b97e2c8227f5a9e9ed3eb5632dd98baceeb7500bf5382f29091,2024-07-03T01:42:27.633000 +CVE-2023-49110,0,0,8b58334ac02dd5b7b1ae35b2a658333276b33522d3c8b5bb0fe8859f970db620,2024-07-03T01:42:26.413000 +CVE-2023-49111,0,0,df0dafd2b2920c0c1ef482d192465048000f9bae0650aaf5841143aa649b80f8,2024-07-03T01:42:26.627000 +CVE-2023-49112,0,0,fa413702068a86fc4c7e36ae8fc0a181d36075b881dffad29e8ffcbd503a5335,2024-07-03T01:42:26.830000 +CVE-2023-49113,0,0,9f18333823936b97e2c8227f5a9e9ed3eb5632dd98baceeb7500bf5382f29091,2024-07-03T01:42:27.633000 CVE-2023-49114,0,0,1149e9644a812fe979090b00a81f87220fd6ab37816f13bf4a0117849686b510,2024-03-03T03:15:07.170000 CVE-2023-49115,0,0,5521cb202ae5061815fd537e9e2cfdbe31e289a6cd8497886659ee4f090a5b70,2024-06-28T17:15:03.173000 CVE-2023-49117,0,0,532b60b363b961206673339ea571d1dbd7872affd35f7cb4f7e7a5be2e8191ec,2024-01-04T02:42:06.503000 @@ -236321,7 +236321,7 @@ CVE-2023-4922,0,0,7a4053a720178fbf5ce70edceb9e6f8bc04f3e44dde847a94f283d80d99b21 CVE-2023-49221,0,0,b50dd3cb2e90096f94a49181c494c07832236ea17f0d7581eb845989d43ed6aa,2024-06-10T02:52:08.267000 CVE-2023-49222,0,0,d9417ad6738721be2202baa06c85d8a21ffb4ad2c0f5faeabfe36a91f4a94f7b,2024-06-10T02:52:08.267000 CVE-2023-49223,0,0,0a7218c0a5de813ffb956c86470a45ee7c472e44d7ddbdfaf5f94ef38dd1508b,2024-06-10T02:52:08.267000 -CVE-2023-49224,0,1,00cff83598c8c518139faa5c75184294b6f617eeb72a225d37eed61869884f54,2024-07-03T01:42:28.180000 +CVE-2023-49224,0,0,00cff83598c8c518139faa5c75184294b6f617eeb72a225d37eed61869884f54,2024-07-03T01:42:28.180000 CVE-2023-49225,0,0,67ae01b5198a01c140f5deaeaca8526fd2eaf70466f07438af6053aa64cc8dcb,2023-12-12T17:04:37.617000 CVE-2023-49226,0,0,f1a97f1312ace441154176f1d2587ee178c928f3456e9b9c638512f47ae381ae,2024-01-03T22:54:12.677000 CVE-2023-49228,0,0,b37aa175fce7fe3dc61886d1f496eca0de99535cf0452ee346d5f2bbad00baaa,2024-01-04T17:54:01.673000 @@ -236406,12 +236406,12 @@ CVE-2023-49322,0,0,ec573216ebb589a7bde5f243513713e9483d1daf2c07741422a11e58b2466 CVE-2023-49328,0,0,2663afaf0fdc14fbd61676b6a0c189ccd927763de1881d5d7d0168b413a2f270,2024-01-03T20:43:29.493000 CVE-2023-49329,0,0,c639631ea0b01f58ba85dbaa7f0a475b505fb4a877133b9c4e228894b22af3d9,2024-01-26T19:01:44.507000 CVE-2023-4933,0,0,53cb5ff21b4e9bf5c75b3188e0de1a02ee33e8cba99d0c1ae0f005f47daf1a34,2024-02-16T18:57:14.973000 -CVE-2023-49330,0,1,5e4f6cb47609d927ea1410c1c9373a3574d6b84836b654a38d309d07130a3b34,2024-07-03T01:42:29.057000 -CVE-2023-49331,0,1,e56bb4829a12af906f9f6871659deeddbcbb61f190c9255fbcb33ea59401c94f,2024-07-03T01:42:29.803000 -CVE-2023-49332,0,1,eca450298543a1bb3b60419f228582d01112a944a6e91163937afb2a06a49810,2024-07-03T01:42:30.520000 -CVE-2023-49333,0,1,2eeb609e3d15605e1b1c20b57855cb7150b1db2f497ce8ac5071b5a0b4351712,2024-07-03T01:42:31.230000 -CVE-2023-49334,0,1,9ad6eedcb03f7a172221bc2f6a0260009bbad50c9cbb4a0f5dbd937d290a65da,2024-07-03T01:42:31.940000 -CVE-2023-49335,0,1,e7d994af3bf6531f78fd36c6bf9b0b84ca46db68a74be45308869abcb571e682,2024-07-03T01:42:32.677000 +CVE-2023-49330,0,0,5e4f6cb47609d927ea1410c1c9373a3574d6b84836b654a38d309d07130a3b34,2024-07-03T01:42:29.057000 +CVE-2023-49331,0,0,e56bb4829a12af906f9f6871659deeddbcbb61f190c9255fbcb33ea59401c94f,2024-07-03T01:42:29.803000 +CVE-2023-49332,0,0,eca450298543a1bb3b60419f228582d01112a944a6e91163937afb2a06a49810,2024-07-03T01:42:30.520000 +CVE-2023-49333,0,0,2eeb609e3d15605e1b1c20b57855cb7150b1db2f497ce8ac5071b5a0b4351712,2024-07-03T01:42:31.230000 +CVE-2023-49334,0,0,9ad6eedcb03f7a172221bc2f6a0260009bbad50c9cbb4a0f5dbd937d290a65da,2024-07-03T01:42:31.940000 +CVE-2023-49335,0,0,e7d994af3bf6531f78fd36c6bf9b0b84ca46db68a74be45308869abcb571e682,2024-07-03T01:42:32.677000 CVE-2023-49337,0,0,86718fbf647addc1ffa7afba66842634946d6f14a10a1ba39713b41194fe1fa1,2024-02-29T13:49:47.277000 CVE-2023-49338,0,0,2e7514f1a1d95d8adbcb4af72640d5c4afe066a5541734fa443bd47771d4ba41,2024-02-29T13:49:47.277000 CVE-2023-49339,0,0,5e0b0c12f27e752a168c99793f0c0ee1088d5fc0e77c7aa77b0e94e5e50795d6,2024-02-13T14:01:40.577000 @@ -236502,7 +236502,7 @@ CVE-2023-49468,0,0,57d5ec3ccc918036b475b9f54b2e396366451915366ece25a89704668e428 CVE-2023-49469,0,0,cf895a2dc3add24e416ac7bcb0530a971aa2975c73743a17956ace666f5a97e4,2024-01-04T17:14:07.600000 CVE-2023-4947,0,0,22b6b14e8c839e20c9429d0ba7697cdb9ac98a0cca963ad631bd6ecd6354934f,2023-11-07T04:23:12.703000 CVE-2023-49471,0,0,9786a9b85e2a2cfc8ac5810f9b5329581bf752664798422bca39fbc4f46bebdd,2024-01-17T13:41:42.813000 -CVE-2023-49473,0,1,dad30ce72062f68a05a70e37e06e47346cc49eba3f96dc90d30bb523b9481850,2024-07-03T01:42:33.563000 +CVE-2023-49473,0,0,dad30ce72062f68a05a70e37e06e47346cc49eba3f96dc90d30bb523b9481850,2024-07-03T01:42:33.563000 CVE-2023-4948,0,0,fe74618322894acd9d5c196407c8ee7a7b8a3cfef58094beba352735ceb5a1e6,2023-11-07T04:23:12.883000 CVE-2023-49484,0,0,b3bb47b9d3bebe9b919a712e385039470f90ec9024bd9f7aa1a5d970a61e5cfd,2023-12-11T19:11:05.637000 CVE-2023-49485,0,0,48aa9077d57b1d2e7ae05300b0cb802f30139b627a9d2c23d0e1071b24d3a4ae,2023-12-12T17:19:56.587000 @@ -236516,12 +236516,12 @@ CVE-2023-49492,0,0,9c4bd2462efa2df7646c733d775d9d840d2fc245f51cd020c6e395a977ae4 CVE-2023-49493,0,0,5e0822009efb3642e80a93910e9beb8c427c299d5b40190675128087213f18f3,2023-12-12T18:23:26.673000 CVE-2023-49494,0,0,20f2018af131e9761c71797e19c82aa1cea48a88ac53e09531f5cfaf288cdf8e,2023-12-13T16:29:45.553000 CVE-2023-4950,0,0,cfa22e548c13257df3eb2012ab1d52681f07d9b27f1451606b444baef665ec7d,2023-11-07T04:23:13.067000 -CVE-2023-49501,0,1,645917e29a67e528a19c4a043d7875898b0f4fee2f593c517e0baaf3dee3ffd4,2024-07-03T01:42:34.367000 -CVE-2023-49502,0,1,da8e0d36f34c81e431a3c0503a4c8b04107975d42b4eed4873540a19ebc677de,2024-07-03T01:42:35.263000 +CVE-2023-49501,0,0,645917e29a67e528a19c4a043d7875898b0f4fee2f593c517e0baaf3dee3ffd4,2024-07-03T01:42:34.367000 +CVE-2023-49502,0,0,da8e0d36f34c81e431a3c0503a4c8b04107975d42b4eed4873540a19ebc677de,2024-07-03T01:42:35.263000 CVE-2023-49508,0,0,92b43d1e29e41e8f387ba55174b4e5d8a40e7e33b6df860adcf514b0ce52ed12,2024-02-16T13:37:51.433000 CVE-2023-4951,0,0,c076a2463493da9bc3b373429bc0f5c55992a1aa278a23958a81e73c8c3be286,2023-09-22T15:15:14.253000 -CVE-2023-49515,0,1,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000 -CVE-2023-49528,0,1,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000 +CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000 +CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000 CVE-2023-49539,0,0,7ce109109350d274fa4509bc4cf5d34703fed136447f67f16382a2f84ee128a3,2024-03-01T22:22:25.913000 CVE-2023-49540,0,0,0068c2fd4daf40dfc9bb2f3a3b013aea4d48b09eb92a0fb6604787f731ac0e73,2024-03-01T22:22:25.913000 CVE-2023-49543,0,0,6c3c8e82e12cbc074c9b5ec14949b483db3aac2048236dfbf377ab4d4b7e20d2,2024-03-01T22:22:25.913000 @@ -236574,7 +236574,7 @@ CVE-2023-49609,0,0,cfadb254c8ff32da8dcb4f73efed6c3b90ecd1a350b850cb898b392245d84 CVE-2023-4961,0,0,e4aa63ee50fe794744abd71721cecf1e73ef1f06e678ada5c85e909d11885a1b,2023-11-07T04:23:13.490000 CVE-2023-49610,0,0,08d82d3af6f57f27b31cca58f60d1a8d0949fca9c1ffeb3eac6cda419e30856a,2024-05-17T02:31:09.050000 CVE-2023-49611,0,0,cf17ac6bf45b5bb412ac7e187ed615ef9ae3854555947f34f1af970b7cff226c,2024-02-14T18:15:46.413000 -CVE-2023-49614,0,1,febb4bee3f6315670369e5d82d01d40402f43b67a7f99bc5b479c449077f7234,2024-07-03T01:42:38.460000 +CVE-2023-49614,0,0,febb4bee3f6315670369e5d82d01d40402f43b67a7f99bc5b479c449077f7234,2024-07-03T01:42:38.460000 CVE-2023-49617,0,0,d724d3ea25090436122a9ea3921453ed554fa47fed3d3acd31e23d5e4220fec4,2024-05-17T02:31:09.227000 CVE-2023-49619,0,0,b0ca208f7d9cb15d9f697582815956654823cd4b82a4f8585baded6c869a694b,2024-01-17T13:44:55.787000 CVE-2023-4962,0,0,3a1bf533672c5a68cc2c5a0b6854d8452b55565fcfc3cb60757f1c5681a1c9ed,2024-01-17T21:58:45.003000 @@ -236851,11 +236851,11 @@ CVE-2023-49999,0,0,8eb410116f8139237e4d4645132c57f7d4d0a47750131858175f4b02723dd CVE-2023-50000,0,0,edce1177adbc3120490932ad28eb0908ae1d710c5789d4a818c9d8c99725d651,2023-12-09T04:45:09.690000 CVE-2023-50001,0,0,0aa0e453b86689f5ac41c926c58da0d619039ce538304d34e38e5a3692741e33,2023-12-09T04:45:12.637000 CVE-2023-50002,0,0,72b2835024aa8f106fc4b57cc2959a311f3e68c21a6c9a6191613f2ae70454c9,2023-12-09T04:45:15.093000 -CVE-2023-50007,0,1,c2a98c3d87da72b92c324ba3cb08ad35629bf406e9b3c35addda6f10f3816108,2024-07-03T01:42:48.353000 +CVE-2023-50007,0,0,c2a98c3d87da72b92c324ba3cb08ad35629bf406e9b3c35addda6f10f3816108,2024-07-03T01:42:48.353000 CVE-2023-50008,0,0,6430cdc6b54a437d0648221c80becd6ac9249f50de651c80f9e402d6343e69b5,2024-06-10T18:15:23.660000 -CVE-2023-50009,0,1,170dd9930657e166b905729f0ac42a66a8992249c05ebf1d569c0f4eb6cd99b1,2024-07-03T01:42:49.137000 +CVE-2023-50009,0,0,170dd9930657e166b905729f0ac42a66a8992249c05ebf1d569c0f4eb6cd99b1,2024-07-03T01:42:49.137000 CVE-2023-5001,0,0,8d4a70d2ed1fe35121450c787c3bbd11a6bfd8d579c5feb8be884a6f01e781d0,2023-11-07T04:23:17.670000 -CVE-2023-50010,0,1,2cb91c5b0cd0b34eab6d9a9d9e423db72c16e763bec8471e43a8ef97d96dc827,2024-07-03T01:42:49.940000 +CVE-2023-50010,0,0,2cb91c5b0cd0b34eab6d9a9d9e423db72c16e763bec8471e43a8ef97d96dc827,2024-07-03T01:42:49.940000 CVE-2023-50011,0,0,06fd9011277607c300a2f1116cc8f443fed8d39fba75e4e4358f7ede2b673b13,2023-12-19T13:49:18.530000 CVE-2023-50015,0,0,e39c90fe1bcbad7c5cc184a23e5dbf57286511bad672139c5244862778b234ea,2024-03-11T01:32:39.697000 CVE-2023-50017,0,0,94a085d3b9a01b673efd08f3fd6d1c5bd5fec950ce7fd1026d076a4011d3d29a,2023-12-19T02:36:27.887000 @@ -236865,7 +236865,7 @@ CVE-2023-50020,0,0,0420bf44f3192678835af5943c71c435d383debc14787f6862dfd11873466 CVE-2023-50026,0,0,ddb63f64ad9db005831a0adfbb131b3f4a80d06c694a28549975d090519ef096,2024-06-07T14:12:14.943000 CVE-2023-50027,0,0,cc6332349beda48de311c789172519792bf0e1d73915b299358aaf3ebbfbd533,2024-01-11T14:26:14.217000 CVE-2023-50028,0,0,c4dec5d92b9d7082f423a44ec040b850ebf7d261529103270f04a2098eaade81,2024-01-25T19:55:05.850000 -CVE-2023-50029,0,1,5be71ab341cad2392714c91534374e0354d8190466c3a5c7ad66938c666dc7a6,2024-07-03T01:42:50.713000 +CVE-2023-50029,0,0,5be71ab341cad2392714c91534374e0354d8190466c3a5c7ad66938c666dc7a6,2024-07-03T01:42:50.713000 CVE-2023-5003,0,0,2849233ffe4afb30b72aadd62309b165bd2ceffb201a5ac14f68b09d02b2ba14,2023-11-07T04:23:17.990000 CVE-2023-50030,0,0,6c466acfd9c93ba20780248d726b1091908b80e5ee7f2c9d8b4bffa54cf157fa,2024-01-25T17:10:31.103000 CVE-2023-50035,0,0,7af1ae42c48e4a2c0ccb4a35436abe8d24603d49181e707354cb51c037ebe841,2024-01-05T19:14:27.160000 @@ -237113,7 +237113,7 @@ CVE-2023-50441,0,0,9bd760298da517bd28996f023ce7334405dbe92c32aa3c503cc1491615459 CVE-2023-50442,0,0,a057a5b7c26414fc7563d24cb642834802b777e3b23cc824df69ea34217acf4a,2023-12-20T18:29:15.687000 CVE-2023-50443,0,0,274542200fff426927a34d0d27b8cdb3042965648a1dcf389e5eb13576a3b3fd,2023-12-20T18:51:56.390000 CVE-2023-50444,0,0,38c1ada4e0572d58fe6354b6dd2e3bb6174f3b1abe52517e3be8703c30a907d4,2023-12-20T18:31:52.980000 -CVE-2023-50445,0,1,c46c9ed53637e012ae7f341d8f4351d1697f0ce5316f2de804732128a76d9079,2024-07-03T01:42:57.717000 +CVE-2023-50445,0,0,c46c9ed53637e012ae7f341d8f4351d1697f0ce5316f2de804732128a76d9079,2024-07-03T01:42:57.717000 CVE-2023-50446,0,0,b695f5a12568e4d1dcada2df1460b60525412989181e3c9caace1cac4b258d09,2023-12-13T19:46:58.377000 CVE-2023-50447,0,0,4274e15463a664271f217c6353494295c4741fbda8ce5043605a4d94e5999dab,2024-03-27T21:15:48.783000 CVE-2023-50448,0,0,42b0c812ec7d1de171876fa730dde3f7cb36fefe88b892e58aa2486acba50cc7,2024-01-04T23:56:47.930000 @@ -237346,7 +237346,7 @@ CVE-2023-50902,0,0,1513c647ffec3bccc364b057fe7be8ad3f21264b604f6b5475cb44c0c9074 CVE-2023-50905,0,0,c0b30a24d3473e2350b628f1856fc1c117d2f8592d3dde08d565e83b22838670,2024-02-29T13:49:29.390000 CVE-2023-5091,0,0,742357f5a217cf462519eaf750c88817634b0babb2a1ac8228f117003e40bd4b,2024-01-12T13:39:11.443000 CVE-2023-50914,0,0,37b288e4aab9b333f4f2eb5cf9059fe9b4dc0a10b43a591dd3d271890d33cf80,2024-04-30T17:52:35.057000 -CVE-2023-50915,0,1,00a3ea633ae9e4b305c66a6f1d527334c4e7bed6ec1f5b05792ab5b0d7042af6,2024-07-03T01:42:59.473000 +CVE-2023-50915,0,0,00a3ea633ae9e4b305c66a6f1d527334c4e7bed6ec1f5b05792ab5b0d7042af6,2024-07-03T01:42:59.473000 CVE-2023-50916,0,0,8389bab58e732355670227e157a42be931a6ad30ed375a5de2bdca2e8f73b50f,2024-01-19T17:49:52.770000 CVE-2023-50917,0,0,ae02854392d1c9add428acaf26494bf33c678553d73518cd872ace972206aa21,2024-01-22T17:15:09.207000 CVE-2023-50918,0,0,84c5eb6df0deb5d7c5d3c51cf99a8f6fdd461afc97576ca67536170b8d368e90,2023-12-19T17:18:38.713000 @@ -237532,7 +237532,7 @@ CVE-2023-5125,0,0,a1c4b4038cc3b3040fdc552203e289f2b08811b020cfaa60abf15cb6844a5b CVE-2023-51252,0,0,97b0a93e1209328abbb58dc0a45505bee63febd69325e191d1dbc34677553e32,2024-01-16T14:52:36.910000 CVE-2023-51254,0,0,2951fd8f57ef9e178e730cf865fbc6403f9d3f515dca49258f4eef9df3eeaf7a,2024-04-30T13:11:16.690000 CVE-2023-51257,0,0,31bdf7412e4e5acb9a330111da0884c7d96702973921f9850abb00f7ef71c413,2024-01-24T03:15:08.353000 -CVE-2023-51258,0,1,d3e271202376810fcfda0efd55002c29227cc5aae074ae90051f19d88beefced,2024-07-03T01:43:00.690000 +CVE-2023-51258,0,0,d3e271202376810fcfda0efd55002c29227cc5aae074ae90051f19d88beefced,2024-07-03T01:43:00.690000 CVE-2023-5126,0,0,d07370d7f0e13771f12a09e9ace3b5d0cc599f59eef1ce6d7e3a5320e50d0626,2023-11-07T04:23:29.160000 CVE-2023-5127,0,0,15e8847853d54803dead2e3e4891f023b235e0ff9a2e809ba8631cba80a8d144,2023-11-07T04:23:29.330000 CVE-2023-51277,0,0,159ef1229b386571133417e6aeaea94d1d0ad081c0f756b7799ca07f2f64dcfb,2024-01-11T17:01:29.977000 @@ -237626,7 +237626,7 @@ CVE-2023-51432,0,0,4f3fd4cb5623159c289f10a09b810bedac23e66a0d10d08ee4ee670996b21 CVE-2023-51433,0,0,b8dc83f5ab50c43545500f2811d3f45773d2e8a990907e7386902922217ce41f,2024-01-05T16:09:17.817000 CVE-2023-51434,0,0,c18c66478f4f646ecdb1bffd9ab109859696d38a901559a7d2490ec2a2e73028,2024-01-05T16:08:52.337000 CVE-2023-51435,0,0,6886e648ace9ec1e7b1e3588b5169a9e1d93651d8974969f424f6273501f9ead,2024-01-05T16:08:27.370000 -CVE-2023-51436,0,1,c35875997ed2056fea70cee9ee34b76cb7e30017abe9d3ed3aabf7ef3562133e,2024-07-03T01:43:03.210000 +CVE-2023-51436,0,0,c35875997ed2056fea70cee9ee34b76cb7e30017abe9d3ed3aabf7ef3562133e,2024-07-03T01:43:03.210000 CVE-2023-51437,0,0,cff2fa72c6f410b0d66688710679d3379510f0eb38be71b8edcccc6a345e8282,2024-02-15T04:53:10.967000 CVE-2023-51438,0,0,855a9448e478f67c468dcc7663116d45af1608148d1f8960150aa736f11b316d,2024-01-16T16:16:21.633000 CVE-2023-51439,0,0,cc269d06ee3b6379c19a2c90f0a7cb761b566cb78f2db97b1bee392fc7d9ba5b,2024-01-11T20:36:36.063000 @@ -237902,7 +237902,7 @@ CVE-2023-51704,0,0,6072a879b080e6fb033e8ec423231f186d958a65066b901d7febb9355953e CVE-2023-51707,0,0,590aa0b7ca5dffbde59e4aef6b25734ed4bd181b63c1dab2b39387171595b51a,2024-01-09T20:07:58.863000 CVE-2023-51708,0,0,863a3af7e2d76aebe513db0a9f2335334bcb9ea2a792766a29aa2a8a44379ddc,2024-01-09T15:52:37.997000 CVE-2023-5171,0,0,913db5b04f4ceac9626806f4eb63dab596791968e32a0113d235f062fc82b34f,2023-10-12T02:52:09.820000 -CVE-2023-51710,0,1,79ce6e5c96d55165aab5c91dac2a06a015fe7d1749cae928be620bf7f109c0a4,2024-07-03T01:43:17.330000 +CVE-2023-51710,0,0,79ce6e5c96d55165aab5c91dac2a06a015fe7d1749cae928be620bf7f109c0a4,2024-07-03T01:43:17.330000 CVE-2023-51711,0,0,7e881883c8f55aa311ed9a227e318c5afff91457b7833eeef9e535da9f3867fd,2024-01-30T21:10:53.387000 CVE-2023-51713,0,0,907a8c1c025513145041da52429ea23dc549b70249768a5c88d61e100b67a5a3,2024-01-08T19:06:50.837000 CVE-2023-51714,0,0,dd553579ec0002cc6be113fe27e4117d192784ede7fc6cb66b7dfee9b3fbca0c,2024-05-01T01:15:06.390000 @@ -237942,7 +237942,7 @@ CVE-2023-51747,0,0,c29edea4240e179a7c47f1db954eeb18bde8c32cbe4c6a2ceb762a555d949 CVE-2023-51748,0,0,44503024f846564ce6045aaae5d45f243612266681d1c57f6886448ef3e8326b,2024-01-18T19:15:09.460000 CVE-2023-51749,0,0,701ea0cc6b04a83b234fa4516e42232bc43a17a9a57b5743f6480a17b5e34138,2024-05-17T02:32:26.283000 CVE-2023-5175,0,0,52f024310a9cca1f1633a144d94eac9de059c6e7a03ba675890700e275db0374,2024-01-07T11:15:14.073000 -CVE-2023-51750,0,1,63b1adde2fc7cdc2009d9f1f23ef609d165715dafde8b2528d78f4e8fb77690e,2024-07-03T01:43:18.250000 +CVE-2023-51750,0,0,63b1adde2fc7cdc2009d9f1f23ef609d165715dafde8b2528d78f4e8fb77690e,2024-07-03T01:43:18.250000 CVE-2023-51751,0,0,7a2dab1e27d28f618f7d961a0fe8a5e3239ba8655c43686671fcf9f58106eb1b,2024-01-22T18:41:31.690000 CVE-2023-51754,0,0,1316b4249b3be14e7f5edc3479969da72b751bd75e4b72a07fe730baccc3fe5a,2024-02-14T18:15:46.867000 CVE-2023-51755,0,0,f725e97de2464cb69191bf94874954133bb20b3e8fbd0481e11e3eea52e56870,2024-02-14T18:15:46.907000 @@ -237974,14 +237974,14 @@ CVE-2023-51786,0,0,0e567df6d814f1cdbc94ad3dbc17d5fd1cfaa7c36a3e490807031a37bf64f CVE-2023-51787,0,0,63d102c9251f904f2b5484f4649646b9f390213aa14f9875d4d55034c5dfad91,2024-02-15T06:23:39.303000 CVE-2023-5179,0,0,45eb9585edeef4044494871bf68ee2595ee61a9cca8e1bdf6fe79481fd3a39b9,2023-11-14T21:29:41.243000 CVE-2023-51790,0,0,34792c7c9d74f45a3954ab5a202b8afe400253531dd82ed2e2fbf28e9ed3fa97,2024-01-18T19:47:57.360000 -CVE-2023-51791,0,1,87766c92c59658db618453044f42ccf339cd6c1b3df114431d44a1d21e1cad84,2024-07-03T01:43:19.107000 -CVE-2023-51792,0,1,7d8f3e64f0e3a253e4c7a397ca38ef25dc0134afeebb28d2f1443032c2248e98,2024-07-03T01:43:19.913000 -CVE-2023-51793,0,1,f16336383b20e4486ab2bdbaee11737ed89ba61bef56cc3fe1951b13c7e9c182,2024-07-03T01:43:20.733000 +CVE-2023-51791,0,0,87766c92c59658db618453044f42ccf339cd6c1b3df114431d44a1d21e1cad84,2024-07-03T01:43:19.107000 +CVE-2023-51792,0,0,7d8f3e64f0e3a253e4c7a397ca38ef25dc0134afeebb28d2f1443032c2248e98,2024-07-03T01:43:19.913000 +CVE-2023-51793,0,0,f16336383b20e4486ab2bdbaee11737ed89ba61bef56cc3fe1951b13c7e9c182,2024-07-03T01:43:20.733000 CVE-2023-51794,0,0,24e4cdcfff7039fd032bbc3a832b94f95e5e50b76f8017bb84aee66b11d09f08,2024-04-26T15:32:22.523000 -CVE-2023-51795,0,1,41b6f5402a8178a714e5febf29ef36c0df54c514b584c16c16c7e7f627bdcc57,2024-07-03T01:43:21.537000 -CVE-2023-51796,0,1,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2caea4,2024-07-03T01:43:22.343000 -CVE-2023-51797,0,1,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000 -CVE-2023-51798,0,1,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000 +CVE-2023-51795,0,0,41b6f5402a8178a714e5febf29ef36c0df54c514b584c16c16c7e7f627bdcc57,2024-07-03T01:43:21.537000 +CVE-2023-51796,0,0,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2caea4,2024-07-03T01:43:22.343000 +CVE-2023-51797,0,0,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000 +CVE-2023-51798,0,0,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000 CVE-2023-5180,0,0,6648cabc013b52666c2fbe5cf29dcef95c2c9930e7cd33a1d40d20b27536398a,2024-01-04T15:43:40.260000 CVE-2023-51800,0,0,9ebfc58a2eb628f09a96e526516e12240e8bb85fc4e11d2d583c2b2719caabba,2024-02-29T13:49:29.390000 CVE-2023-51801,0,0,8cfe662b5b3598910a81e15e44e4c1d8555947453e63004ea63b5e4fd392069a,2024-02-29T13:49:29.390000 @@ -238008,7 +238008,7 @@ CVE-2023-5184,0,0,bf9550067b063a44f5e2c60f84a5dc2e3934ba6dac9ad3d3d8dec394ee076a CVE-2023-51840,0,0,2e2dc4e56206ef09b07482626c518e6fe03125bc73805e6245582857f1472ad5,2024-02-03T00:29:48.223000 CVE-2023-51842,0,0,e0369b9a49f0cf84587338e1939b6265330f9f97b2fd01f93784be60255c10c5,2024-02-06T17:00:29.330000 CVE-2023-51843,0,0,273c52920383b16344817eb583cc56df030df52ace9d49f8039a41ceed8a76f6,2024-02-05T18:54:19.030000 -CVE-2023-51847,0,1,f496b4676a3a37f14b152aab6efee475f4e72b93dc4870446fabaf50ff48b69a,2024-07-03T01:43:24.980000 +CVE-2023-51847,0,0,f496b4676a3a37f14b152aab6efee475f4e72b93dc4870446fabaf50ff48b69a,2024-07-03T01:43:24.980000 CVE-2023-5185,0,0,386042611b3c261d0b3f5e9b3745929d3ada33035e3086a1e80d8399eec7c66a,2023-09-29T18:54:59.730000 CVE-2023-5186,0,0,36263dcb3f06333f123a325e436cd03c03cbb31f2674173ec0bcfae3d9ef14b5,2024-01-31T17:15:17.980000 CVE-2023-5187,0,0,9dd87329dc229e5fe70944a1f9ce7b1568c1b908fe74eefae61702f0410ac112,2024-01-31T17:15:18.097000 @@ -238105,7 +238105,7 @@ CVE-2023-52075,0,0,849cf25ae1b4e576588db3e9f900c5f9565291ce2cef30c02ade7f33ef0d4 CVE-2023-52076,0,0,96bb30c05a0b24e0b19e11829076e8391e5c9cc1f31cc1ffa3b43447ccb54b0b,2024-06-15T04:15:10.857000 CVE-2023-52077,0,0,7ea9bdcc1b4ed6b7240096b1c1151d23e5ff74fd5076c4fa5ecd11d25ef4132d,2024-01-04T23:11:39.740000 CVE-2023-52079,0,0,82f653e7d5fbd8aa7819b340211d406b5545c82ffb4ccb81c0b1fb33874cea94,2024-01-04T19:24:22.547000 -CVE-2023-52080,0,1,16e1183fdba497f4398000c353592a24caf71cf22049d387f166e50636415004,2024-07-03T01:43:25.923000 +CVE-2023-52080,0,0,16e1183fdba497f4398000c353592a24caf71cf22049d387f166e50636415004,2024-07-03T01:43:25.923000 CVE-2023-52081,0,0,55e9723bd29c5c6eaea3e650db8b2b010214b8854096cec59b7a5b75de2cb4e0,2024-02-29T01:42:06.407000 CVE-2023-52082,0,0,a040644528e65985246fb75c7e95ed66bc16eecf218c443d33c009500d330ea6,2024-01-04T19:31:50.127000 CVE-2023-52083,0,0,847a53600e309c03a5583afaad9ea6ec855c085e2d316e614ff71251e3514cee,2024-01-05T00:01:33.360000 @@ -238186,7 +238186,7 @@ CVE-2023-52155,0,0,2d124c7a3937e95fe09338bcde4297ee381aa5672d319a6218dc245e97278 CVE-2023-52159,0,0,9bf34263569cd9396d2193ed479c2125f1050e109a79c5640609380e6e4e5cf8,2024-03-25T14:15:09.267000 CVE-2023-52160,0,0,3cbe9dbbf23461cc9665f17f1860098398eb52c02e5ead3239a9707fba769c7f,2024-03-10T04:15:06.897000 CVE-2023-52161,0,0,4de9257ef3be21964b4728d6cd7db6e1764586b6317dd49dcb16510f88bf11fe,2024-03-23T03:15:10.210000 -CVE-2023-52162,0,1,1bd9338733b6c2d388fd5a0badb736e81147c7da89aba74926195068a6aea86e,2024-07-03T01:43:27.207000 +CVE-2023-52162,0,0,1bd9338733b6c2d388fd5a0badb736e81147c7da89aba74926195068a6aea86e,2024-07-03T01:43:27.207000 CVE-2023-5217,0,0,7ba5b927181a714978a513b1447492d30b9204770bc875e02b0ddf7485f511cb,2024-02-15T02:00:01.650000 CVE-2023-52173,0,0,653751d06808116187d115997433d85c759b866ee7527f311b397336366ebb4c,2024-01-04T23:34:46.453000 CVE-2023-52174,0,0,79e20d77a07605a892f972d0d5b1fee1a2293c3b3ed991923dbc5981d1985ef0,2024-01-04T23:35:08.563000 @@ -238306,7 +238306,7 @@ CVE-2023-5233,0,0,2c175d98d7f92eb24bffcf137b7e470abfb025cc3ed9a17368756eeaead46a CVE-2023-52330,0,0,e2800780eb3cbc03d4aa6964a6474d9931c1d698241a436d65bb6485bac07f9d,2024-01-29T22:50:14.043000 CVE-2023-52331,0,0,535f0900022808958f12c3c9fbe9fba9ddf6a2e5a13656842cd697778a94e0e0,2024-01-30T20:10:23.003000 CVE-2023-52337,0,0,55fa913fa16a3f0160ce03eb40c23b005cbeaa3ffa6035c50c9b775c51f9b858,2024-01-31T14:15:49.160000 -CVE-2023-52338,0,1,c19a89634d444e8b7418866f672b3a80a92a3dcfedfc6c85a948f1f2cb0e5bd6,2024-07-03T01:43:29.373000 +CVE-2023-52338,0,0,c19a89634d444e8b7418866f672b3a80a92a3dcfedfc6c85a948f1f2cb0e5bd6,2024-07-03T01:43:29.373000 CVE-2023-52339,0,0,4bbe57cf8d5f09dfe60f342a3942dda58e6da98c8314b5c5a36b0823a95b8323,2024-02-05T03:15:07.563000 CVE-2023-5234,0,0,0558a6bed4fe4d192c05a4915c3afbcc280f1387dd5837f40b9ee15558ea5e92,2023-11-29T02:25:14.437000 CVE-2023-52341,0,0,e416d66dc300a1fec35b92634bca599425c1eba7c994f713ffc16aead39c631c,2024-04-08T18:48:40.217000 @@ -238337,7 +238337,7 @@ CVE-2023-52363,0,0,c1dcca60bab229666e09c45cc7bfff29bdd3e5c32ff3551407c4d455c18c8 CVE-2023-52364,0,0,7756465d56e31dace56765c964633284bab49769c738e0b94dd5746a0d4321f2,2024-04-08T18:48:40.217000 CVE-2023-52365,0,0,04f5738027bcccfa061f7a9142086a77386fc2ff6337615b00f39e148b6f5377,2024-02-20T19:50:53.960000 CVE-2023-52366,0,0,20fb8e4fefe4720a53164f57c0f59b13495b47bb9338886bcd384b6b25cb588c,2024-02-20T19:50:53.960000 -CVE-2023-52367,0,1,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000 +CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000 CVE-2023-52368,0,0,94b737df202d05945cd332c165250a9af924d18cbfe14263eb6d260f34e0fc43,2024-02-20T19:50:53.960000 CVE-2023-52369,0,0,3a7a64b10f5d683b617a6254042448548bac384d22a9043d72c2fcb76d9e4b61,2024-02-20T19:50:53.960000 CVE-2023-5237,0,0,eca0605aac0c74be9069660c91fb5d2937b5868fb8e67e103a1da25efd1a9054,2023-11-08T18:36:19.067000 @@ -238441,7 +238441,7 @@ CVE-2023-52486,0,0,9fdf2be55de582f7905e210dff16a1cdee55082a0519ced31c129176372c1 CVE-2023-52487,0,0,3a3e78ea084186adb0371544efb8f82f408d5369c2752062166753139b8af6aa,2024-03-12T12:40:13.500000 CVE-2023-52488,0,0,36d1bcdd5eea0c015d4ea7995b92de787572d11131cea5de38143fd765fb8b1f,2024-06-25T22:15:15.140000 CVE-2023-52489,0,0,4f90b8e08c302884e41cdc6c08a1a5c753a54199d0a445e09422e43dc2c21cdc,2024-06-25T23:15:22.287000 -CVE-2023-5249,0,1,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000 +CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000 CVE-2023-52490,0,0,622c560311948d3ead282b4c85e1584dfa5c2a8b7f9863e5b3204916300680b6,2024-03-12T12:40:13.500000 CVE-2023-52491,0,0,b60db874cba7486f888c4a6b582cc2fdcfe853c36d4329adf458516b4d9ef768,2024-06-25T21:15:53.700000 CVE-2023-52492,0,0,806ef9a4737e3bbe4aadde43ff3cfee809b161cb350c534e4b9069e3fa0418d4,2024-06-25T22:15:15.203000 @@ -238640,9 +238640,9 @@ CVE-2023-52667,0,0,787093db68bf1b9b20596d7ef1261e24adc5e62f6348f729d5ba8574fb3fc CVE-2023-52668,0,0,4d2d993ac1d820e293c0f61b8f61d3d9a89e72171c702092ea81b4ccfb9f39e8,2024-05-17T18:35:35.070000 CVE-2023-52669,0,0,59e6faaa43234715ba02f44d3e31f6bf98121f38bfe4efd79b3ef2ea8b6d5160,2024-06-25T22:15:16.753000 CVE-2023-5267,0,0,d6c1d8912f5615c4494ff19c986e1371086f07b976cd294e8cd11dfb02e20e2c,2024-05-17T02:32:56.563000 -CVE-2023-52670,0,1,cf3c00012a5e88946ca4744de68fe35c4e4cfc458379d7a390c12be7a5327fd7,2024-07-03T01:43:43.890000 +CVE-2023-52670,0,0,cf3c00012a5e88946ca4744de68fe35c4e4cfc458379d7a390c12be7a5327fd7,2024-07-03T01:43:43.890000 CVE-2023-52671,0,0,9b568b898eb29ec8b1b8f319ccba72ec86f17e8b65b1e7de39ab1acd73bbdc8a,2024-05-17T18:35:35.070000 -CVE-2023-52672,0,1,da4010aeac4767d6b145d414fea366ad8d9ee563172792eeed9fe47d9888e26a,2024-07-03T01:43:44.910000 +CVE-2023-52672,0,0,da4010aeac4767d6b145d414fea366ad8d9ee563172792eeed9fe47d9888e26a,2024-07-03T01:43:44.910000 CVE-2023-52673,0,0,112daaa1adde346922d18f1d4baa30002304d5f2de45f82bd50028313b13376a,2024-05-17T18:35:35.070000 CVE-2023-52674,0,0,e974fe95ec64a50e50921de5cfad884096acaaac4bf1480461ec4d9ac4570585,2024-05-17T18:35:35.070000 CVE-2023-52675,0,0,cdd5cda7925b03e3f4f0a647d7269340dcdc034443ae92fca395a3371a973b37,2024-06-25T21:15:54.317000 @@ -238668,7 +238668,7 @@ CVE-2023-52692,0,0,d3a824fff4206452ad3a8c5733a1eefca805babf20e86b0ca829f9c0513bd CVE-2023-52693,0,0,9a4a796f270a85042e718ff10e0b6447ba65a8fec990240bd06d3517c4ea5337,2024-06-27T12:15:16.257000 CVE-2023-52694,0,0,644dbdd18363a3d8dbfc62c48e89109b201700bf5492906c071e0227e8e224a7,2024-06-25T21:15:54.917000 CVE-2023-52695,0,0,314ead98f71d5b192704698752c6f3077c829550a93116d660f4795acf61243e,2024-05-17T18:35:35.070000 -CVE-2023-52696,0,1,f95b3c2eadc20ab855225b4141727cdc729465e4359fc8f0a59c52ad84f59f19,2024-07-03T01:43:47.200000 +CVE-2023-52696,0,0,f95b3c2eadc20ab855225b4141727cdc729465e4359fc8f0a59c52ad84f59f19,2024-07-03T01:43:47.200000 CVE-2023-52697,0,0,2d1eba29fe37a6cc489e274028ede887898bb9ba133424d9e0f857e7dca7dc53,2024-05-17T18:35:35.070000 CVE-2023-52698,0,0,4b851be2c7d3c21992795e6492c16e4e8c32b224aaa5ac4f846d5a363eca8782,2024-06-27T12:15:16.323000 CVE-2023-52699,0,0,7a5287478c931e704f68856082fc996aa72e6f6c685dd11a5c560b10b7729e4b,2024-06-27T13:15:53.990000 @@ -238696,10 +238696,10 @@ CVE-2023-5272,0,0,812d9b2d86101e770022ea5fdc9753e8d0c371cc8c8892a4e2c903d747bdeb CVE-2023-52720,0,0,75bfde3295801a77c4f6473b23346451d10c61a44e23cf0480e483b8b4e9675f,2024-05-14T16:13:02.773000 CVE-2023-52721,0,0,98d08c504cfe7b805234b0d4bd2dac9d9340759f28e2f1a76d8fb0ecc63116c4,2024-05-14T16:13:02.773000 CVE-2023-52722,0,0,1cb69373fa2e3f9acfda8cf3f1059ac59bcd836ce4838b0dffed4f7be87d9c0e,2024-06-28T05:15:10.640000 -CVE-2023-52723,0,1,2fe194d004e97af726d85431e007c3326f52eff7c20e279a9c12c4d1b3f28f1f,2024-07-03T01:43:49.597000 +CVE-2023-52723,0,0,2fe194d004e97af726d85431e007c3326f52eff7c20e279a9c12c4d1b3f28f1f,2024-07-03T01:43:49.597000 CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000 -CVE-2023-52725,0,1,6c8006c6d070845e944a8779fc3ce3ac7e3893f3aa940aa4f5f18ea13a44ba8c,2024-07-03T01:43:50.417000 -CVE-2023-52726,0,1,461e65a6795b13b587912cbbcf2691811a9fedc1284b87ef3001955692c77f7d,2024-07-03T01:43:51.233000 +CVE-2023-52725,0,0,6c8006c6d070845e944a8779fc3ce3ac7e3893f3aa940aa4f5f18ea13a44ba8c,2024-07-03T01:43:50.417000 +CVE-2023-52726,0,0,461e65a6795b13b587912cbbcf2691811a9fedc1284b87ef3001955692c77f7d,2024-07-03T01:43:51.233000 CVE-2023-52727,0,0,1958b69b15c048830f3c4c5db779aefa583c03ebf854ad7308a4e5e62116942b,2024-04-30T13:11:16.690000 CVE-2023-52728,0,0,74d507eb0e35cc6fa3ead987ba4ec40b907dd5b43d9df4005dc274d9ba9c082e,2024-04-30T13:11:16.690000 CVE-2023-52729,0,0,f66898f0cedff9459bb08c0ad4c6a50cee7d49ab64c76e92ba3f6278585c99ef,2024-05-06T12:44:56.377000 @@ -238707,9 +238707,9 @@ CVE-2023-5273,0,0,2102b32da0a88aa454835d5aa17e6415147d836efb048cecd13db4b53f5a51 CVE-2023-52730,0,0,0deb15e6433a877e8b04899b1861c74cfb8da99d66444e96a574c8d842d50dcb,2024-05-21T16:53:56.550000 CVE-2023-52731,0,0,af04438af74546f66706b8db927165ea52d670bdff267ccf7a616906fd780f5b,2024-05-21T16:53:56.550000 CVE-2023-52732,0,0,3c3d16e3893662259f2e4eb94ebdd9bea67a82712fa379b46f5cc9b0aa4fd50c,2024-05-21T16:53:56.550000 -CVE-2023-52733,0,1,5e666bf1bd240a4d6aa89470b389cfffbef5176705346f24aa3877874bff10d8,2024-07-03T01:43:52.120000 +CVE-2023-52733,0,0,5e666bf1bd240a4d6aa89470b389cfffbef5176705346f24aa3877874bff10d8,2024-07-03T01:43:52.120000 CVE-2023-52734,0,0,628cc728186bcf0b7a821aa9aa47bbcf76fcfb297f5910858fd6b82d7e7400ce,2024-05-28T19:15:09.773000 -CVE-2023-52735,0,1,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000 +CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000 CVE-2023-52736,0,0,aef7abdda92948e005474185762f5b04e8dc3faf86a042f2b2ff6617aada2702,2024-05-21T16:53:56.550000 CVE-2023-52737,0,0,8e1d8de4328745723845ff23cac4d2ff0e4cee264b1c62ba7f7fb77be715683d,2024-05-21T16:53:56.550000 CVE-2023-52738,0,0,562ceb2a6aa016c82eeacde0c21fdc7e1657bf0b009c0b5269cb65d2630a007b,2024-05-21T16:53:56.550000 @@ -238728,7 +238728,7 @@ CVE-2023-52749,0,0,5220f21ee6f6e56ec9d22a7fd0d0de1da106a23cdeaa0595f03afa7ec16df CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000 CVE-2023-52750,0,0,e71055bea596efb86a970a1150f15746fae58326b74e8d80b64f42f04b03ca3c,2024-05-21T16:53:56.550000 CVE-2023-52751,0,0,994a147c446c7d64d5d7c400dbed4501a56e9e25f4d68ea4cccfe1f20801eea5,2024-05-21T16:53:56.550000 -CVE-2023-52752,0,1,080f7d3a9c9511b1fa29ecb56aca500b83bcd9e17ca5cbd487e46e625c926cc5,2024-07-03T01:43:54.420000 +CVE-2023-52752,0,0,080f7d3a9c9511b1fa29ecb56aca500b83bcd9e17ca5cbd487e46e625c926cc5,2024-07-03T01:43:54.420000 CVE-2023-52753,0,0,01ad314fc21f348a08f59b0508c438f15217c5b77323cc27c5533e8fcf19711c,2024-05-24T01:12:46.227000 CVE-2023-52754,0,0,6c3f909df442358f10009af2374d307a27574624f35992cb0e89815656c4ead5,2024-05-21T16:53:56.550000 CVE-2023-52755,0,0,363ad3830894b1997ea949ce826bd999a8f15d7d0e03a2a28cfadc8e6277ff11,2024-05-21T16:53:56.550000 @@ -238742,7 +238742,7 @@ CVE-2023-52761,0,0,5dc9a77ce43e271ec7ec3a0f6a89311ebf8dd3294290ba2098a925f57829a CVE-2023-52762,0,0,e051cbe927f0b925f24aa1fd9504bf125ee4f52920bff2547a798b26279e30db,2024-05-21T16:53:56.550000 CVE-2023-52763,0,0,49eda8005639c7fbd3fb15b022dd837521591617583c13802ba975bbc5cef840,2024-05-21T16:53:56.550000 CVE-2023-52764,0,0,8ce90d265c973f8748780e45ed828e9382cffd357d3ad3199e698e1c9de9ba48,2024-05-21T16:53:56.550000 -CVE-2023-52765,0,1,4d08d64e3f368ae7205ec65c2170d2d1dbc59b27b6484cbd71a0d1b8ea1cd2f7,2024-07-03T01:43:55.870000 +CVE-2023-52765,0,0,4d08d64e3f368ae7205ec65c2170d2d1dbc59b27b6484cbd71a0d1b8ea1cd2f7,2024-07-03T01:43:55.870000 CVE-2023-52766,0,0,2626b435866d37bf719baaa860071efd96f875ac7c37514a15d37dde4c63fe91,2024-05-21T16:53:56.550000 CVE-2023-52767,0,0,3e4b39f11d4d37239aaefa8cd9aeacdd3a601585a32160042873f10589f9f28a,2024-05-21T16:53:56.550000 CVE-2023-52768,0,0,a6c8185e75ee1d39f3741a911521ca1fbcfb7326ada62323f3912d9190ba74d1,2024-05-21T16:53:56.550000 @@ -238782,7 +238782,7 @@ CVE-2023-52798,0,0,f4bf40a7b4aec53e30269a85f3eb51a674429f8fb9b496ff5744ac2655c51 CVE-2023-52799,0,0,cde34f1c080e291d19b6bead7c097c43ba74339851e793355ab446b5c7779724,2024-05-21T16:53:56.550000 CVE-2023-5280,0,0,05e6a37f5f9bd5a1bc94abc6e2d70e08893d7b367c610c9b600bbd1ae1bd72af,2024-06-04T19:18:10.060000 CVE-2023-52800,0,0,6094ca9eec86821482714021ea5ff6a4ed14e109d9b84ed733b5609c4c4727b4,2024-05-21T16:53:56.550000 -CVE-2023-52801,0,1,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000 +CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000 CVE-2023-52802,0,0,7a66c54da530bf46ad265c5d3722bf29ac68c9be9672cf77b5fe3d0070a86e8a,2024-06-08T12:15:09.783000 CVE-2023-52803,0,0,d97cd26a8945749301c75b128288d9947cc059912546c7832626e8b531842222,2024-05-21T16:53:56.550000 CVE-2023-52804,0,0,42b607e83ed9029b8db30ea60d460b5ef07801a80958b4f415168da424d1d25d,2024-05-21T16:53:56.550000 @@ -238792,11 +238792,11 @@ CVE-2023-52807,0,0,6bffbfe0aa21a0e57e846bf1410012a012197844ce6b944252226fe58ba8c CVE-2023-52808,0,0,ce263bffe80b34b66d052f9614fd122523d74cc64be4fda2b9472e4e5bd6f215,2024-05-21T16:53:56.550000 CVE-2023-52809,0,0,60cb5069e36c6a606e44c12adef30ddc87db004372ad6da7992313846113a914,2024-05-24T01:14:23.283000 CVE-2023-5281,0,0,3348e062e5900d7608c13be0d6ebb12227074a1c0c0a52ec29086c5132b72d53,2024-05-17T02:32:57.910000 -CVE-2023-52810,0,1,cff498cbe788ab138e0eb34e25fdb80301269d8036021fb508076e7f49de12cd,2024-07-03T01:44:00.357000 +CVE-2023-52810,0,0,cff498cbe788ab138e0eb34e25fdb80301269d8036021fb508076e7f49de12cd,2024-07-03T01:44:00.357000 CVE-2023-52811,0,0,5f7a2cfdaa57bcb58280adbb2c8449f6e74791352a01647e281c22cfdb99f273,2024-05-21T16:53:56.550000 CVE-2023-52812,0,0,a70330260601d4d9158448703f35fbecad422b15f2eb2b0783e7510a153f69ef,2024-05-21T16:53:56.550000 CVE-2023-52813,0,0,7997ac0edbb940366a1f6ced893aa03683f9a80bc6d8c9d7d94663906491cdcb,2024-05-21T16:53:56.550000 -CVE-2023-52814,0,1,7beb37b73115ec81ce0ec04ef14d3c556e989e0aeced84f5749a8521c2300544,2024-07-03T01:44:01.383000 +CVE-2023-52814,0,0,7beb37b73115ec81ce0ec04ef14d3c556e989e0aeced84f5749a8521c2300544,2024-07-03T01:44:01.383000 CVE-2023-52815,0,0,8865097e19f8199bcf614e66daad082004f0941206c02cd02ce614595cdd6bdb,2024-05-24T01:14:29.643000 CVE-2023-52816,0,0,32afdc778740219544c5a36f8ad71efec47925eff397f90fc5b56e8319c3fc6e,2024-05-21T16:53:56.550000 CVE-2023-52817,0,0,6ed2f91f17991dfe3f07963dd3070d17fc622a92351edb2e524768b2dfed8328,2024-05-24T01:14:32.607000 @@ -238816,7 +238816,7 @@ CVE-2023-52829,0,0,5afebfb846e70c655f7ce11830a8f5dc1c086ee7d6922331550e76c859232 CVE-2023-5283,0,0,6bc1f9f5e045837e586f583048ee477c9ac0f83988f1d2acd638608858a2eb2f,2024-06-05T21:15:14.330000 CVE-2023-52830,0,0,ffd8b43d89ab3cf830402c7f9802fc634cff6ffc5ac67317d7e2656bafc923f8,2024-05-22T12:15:09.470000 CVE-2023-52831,0,0,89150521dedfd43c04f52577560d3f35445116958af36ec421c9a9b707bacb48,2024-05-21T16:53:56.550000 -CVE-2023-52832,0,1,696be23cda75223f024d4dfcc59813ef358d3f8b0a5a566a6e57238e1cd47e46,2024-07-03T01:44:03.033000 +CVE-2023-52832,0,0,696be23cda75223f024d4dfcc59813ef358d3f8b0a5a566a6e57238e1cd47e46,2024-07-03T01:44:03.033000 CVE-2023-52833,0,0,2a7327dad43e42597667b837e7a4c79242e34141acfb7fef265997c26a20f909,2024-05-21T16:53:56.550000 CVE-2023-52834,0,0,4c70939223da2ff10f137d3b4e8cfd731a9d6a74b25f653510f2b2b420d51330,2024-05-21T16:53:56.550000 CVE-2023-52835,0,0,d5c80e311812c39002641ed6ce4b30d932a3e6d16ab02e43e5ad247d799ac110,2024-05-21T16:53:56.550000 @@ -238829,7 +238829,7 @@ CVE-2023-52840,0,0,56ae23c9ebec4eaf920aa2ec886a962976622a7ac5ce2ca000dfc390c4872 CVE-2023-52841,0,0,b621be1219ae4a3af1c2432bd7774f69e65afc54dc0178d5ef61af507f60916b,2024-05-21T16:53:56.550000 CVE-2023-52842,0,0,3f432d6ebfb3456acda27ee55f8ca95c54c69810ccc6f9bcfc6576d98405a90a,2024-05-21T16:53:56.550000 CVE-2023-52843,0,0,338eb1a79815546115d509760c806f79b424c44938e36d5cdb0695dd0b109191,2024-05-21T16:53:56.550000 -CVE-2023-52844,0,1,51fa27b0054aa1f73d276f0533cb46b0c7a766a06bc7ba2b439dbc07f79bab2a,2024-07-03T01:44:04.703000 +CVE-2023-52844,0,0,51fa27b0054aa1f73d276f0533cb46b0c7a766a06bc7ba2b439dbc07f79bab2a,2024-07-03T01:44:04.703000 CVE-2023-52845,0,0,7fffe9b735b2bd79171b9c576cca576d7dc78c7ec7e582c224df901fd6d89e4c,2024-05-21T16:53:56.550000 CVE-2023-52846,0,0,8d71ce98ad52bfe497e85d1cd0d9631eaa703871085af182a03b8c1374177910,2024-05-21T16:53:56.550000 CVE-2023-52847,0,0,94f3c11e7250e03f7fa4f2935402235c23cbf0e8dd97c4a399e43cb921621535,2024-05-21T16:53:56.550000 @@ -238844,11 +238844,11 @@ CVE-2023-52854,0,0,21a52d06a636912187d5fb1cc0ca68b12a115d81d2a4b1f2320a734f92a09 CVE-2023-52855,0,0,c3d0d7128c94bc30348e4fe26edbd85bb554ec04d14672b516237dd4070ec0e9,2024-05-21T16:53:56.550000 CVE-2023-52856,0,0,69b75b8af0921929d923f7a396c85fca96f0dee0d8443b852717abff585c5154,2024-05-21T16:53:56.550000 CVE-2023-52857,0,0,0271800c1cf160112ecdd2dd5ee8fca1976bc47199f11f3993894f87bd3f2d46,2024-05-21T16:53:56.550000 -CVE-2023-52858,0,1,c7e1b46a9414c1e8429aa874e28c5485097a335b9f097a0c31407ca6e4a98cfd,2024-07-03T01:44:06.567000 +CVE-2023-52858,0,0,c7e1b46a9414c1e8429aa874e28c5485097a335b9f097a0c31407ca6e4a98cfd,2024-07-03T01:44:06.567000 CVE-2023-52859,0,0,c2c12a316881ec57023089193b586695736ddbfdcd51889918ff2fa95daf8a89,2024-05-21T16:53:56.550000 CVE-2023-5286,0,0,0676effc6f90664843f21b9d4bce8e0799bf64ce1527189f7cccb5d658b67693,2024-05-17T02:32:58.453000 CVE-2023-52860,0,0,a06e985a63c795ddd420b7532beb14d48e7ae03c61d774e2cf294c09ad6725ae,2024-05-21T16:53:56.550000 -CVE-2023-52861,0,1,0ba89c620b53b7997e5b0a5ed7e22a03376017d887df49a75e14b2c691dd945e,2024-07-03T01:44:07.527000 +CVE-2023-52861,0,0,0ba89c620b53b7997e5b0a5ed7e22a03376017d887df49a75e14b2c691dd945e,2024-07-03T01:44:07.527000 CVE-2023-52862,0,0,f8e5573962337110db68643416014395568579ad146dd635ae6f8fc1caa89411,2024-05-21T16:53:56.550000 CVE-2023-52863,0,0,f6c1a229c64d0eb3bb6d9604788c3ed9f324b7606d90fc6686e4ca356a3a931c,2024-05-21T16:53:56.550000 CVE-2023-52864,0,0,806a587c67d2086d128decfad533c3891f6add157cb201b814f8ae252a1fc663,2024-05-21T16:53:56.550000 @@ -238856,7 +238856,7 @@ CVE-2023-52865,0,0,99ec945239f9a662757d39ed9c81b107a566984663dd04c4fe7664417c32c CVE-2023-52866,0,0,224c83b63dfcda7619ca2722daedfaa644ac10f16da0e9deeb7558c4c27cc333,2024-05-21T16:53:56.550000 CVE-2023-52867,0,0,dfcf095d216fa864834a2d0da16ef00b94ef351e6a086a85e2626eb566b6e711,2024-05-21T16:53:56.550000 CVE-2023-52868,0,0,d6696b9f1434275b867a9169deb3204df084d0b01b372a53977314591dc16618,2024-05-21T16:53:56.550000 -CVE-2023-52869,0,1,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000 +CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000 CVE-2023-5287,0,0,be0bda9c159a7195542a144797aa08dbe543bba9949898623f2e62a342f559b5,2024-05-17T02:32:58.597000 CVE-2023-52870,0,0,1bdf081b86fb9580636c15b99fd16dec4a74cf1b8d0e697c0b5151b326360f34,2024-05-21T16:53:56.550000 CVE-2023-52871,0,0,dc3517db9d009fbfcc7591cb9c65c247aa790eb27feeb7a27f58e7bfd719f966,2024-05-21T16:53:56.550000 @@ -238872,7 +238872,7 @@ CVE-2023-5288,0,0,0738994bddf6db9f0b825ffb89279f9130371f293c5b8f6550deac482c5ff7 CVE-2023-52880,0,0,db47fbb82270b913ed21d04b3703922bf0b547a598dbaa8991147465e5956b2f,2024-06-27T12:15:16.400000 CVE-2023-52881,0,0,6f27b572b3e64428644bdda7520544f8cd90fee86a13f8f6a714c131a849a56d,2024-05-29T13:02:09.280000 CVE-2023-52882,0,0,618547f54e650cd3257252cf26d275464ccb6b2e3c001bfe1d26572e4392c548,2024-06-27T14:15:12.840000 -CVE-2023-52883,0,1,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000 +CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000 CVE-2023-52884,0,0,3ab17bbd7764403ee078e65ba1cc3c50e85e943699ba320291de13c4366192b4,2024-06-21T11:22:01.687000 CVE-2023-5289,0,0,e99a2312fffac7e548d9067401ea1735cab5340b5825bd2426e3171dd9b0909d,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,a0eebe139551581f49cfd3b7f68f49883daf2a40bfb5a3949932cb006cd09360,2024-06-13T18:36:09.010000 @@ -238988,7 +238988,7 @@ CVE-2023-5401,0,0,133226cc268c2b40c73ae597723c8452d689f69314a6d40c8d854e4d97b9f7 CVE-2023-5402,0,0,d6ca0e0d138e7f0e18108bc80eb991912358210793d36b8686051b13c8765059,2023-10-11T19:19:54.037000 CVE-2023-5403,0,0,4ec80dee8764393cf6bc6c69896e4f95979827ab7c0a4e3e971d47dce6477b18,2024-04-17T20:08:21.887000 CVE-2023-5404,0,0,511484d9cc75eada2ffc9a9796fff23a0a7ebe0388ab1a4541fcf0781d86075b,2024-04-17T20:08:21.887000 -CVE-2023-5405,0,1,e0839594cb0360764ad0f14fa9080a0641121a81bc0331853c7df504564e24b3,2024-07-03T01:44:14.093000 +CVE-2023-5405,0,0,e0839594cb0360764ad0f14fa9080a0641121a81bc0331853c7df504564e24b3,2024-07-03T01:44:14.093000 CVE-2023-5406,0,0,5582852e19f377e5793a7605bb9d3b0fe400df7b16762ce5a3c179066fc0da08,2024-04-17T20:08:21.887000 CVE-2023-5407,0,0,c25bd4372bb6455ada4a253eda41b4de73403906c5a53571ce0a6abf70ee9078,2024-04-17T20:08:21.887000 CVE-2023-5408,0,0,443628942e473656420f67d7b7b9b3fa498d5d13f709544aa261b0e4696090c6,2024-01-21T01:48:09.767000 @@ -239113,7 +239113,7 @@ CVE-2023-5541,0,0,c7ffa7c396f3c10257d26aa366bb164db4e6d1e7cf5746cb501157ec0970a9 CVE-2023-5542,0,0,00afc45e8703e942ace0a9b3c1e8c17226d7cef9d284b405f04c3986971344f7,2023-11-16T19:02:12.333000 CVE-2023-5543,0,0,62a41283eb9322d2bbc4dcf371d954d0db5f8903fec12ecc5955281890fac303,2023-11-18T03:20:11.913000 CVE-2023-5544,0,0,e397719c1ab3bacb4140adfe3a0187862920fd248a1053fcd386d8e8aa51b878,2023-11-15T14:36:11.500000 -CVE-2023-5545,0,1,1a81f7a5b132baa5b636a14da0d5ccec0dfafc62c20acbea2acab3a02d3e827d,2024-07-03T01:44:15.480000 +CVE-2023-5545,0,0,1a81f7a5b132baa5b636a14da0d5ccec0dfafc62c20acbea2acab3a02d3e827d,2024-07-03T01:44:15.480000 CVE-2023-5546,0,0,bd8bf89a9bcaba83d0ee657de8d38a89d9784a48263d4eb22877fee9560e13d9,2023-11-15T14:35:48.060000 CVE-2023-5547,0,0,b06729e3a4df80d0e31ffa0676f08e433fd5503091fe67d83a7d36d1621ed762,2023-11-15T14:18:41.997000 CVE-2023-5548,0,0,cf5736b417445fd32604fd6a1cec244c4a5ca16e2f2d333519403aa3e276d84b,2023-11-16T19:07:47.660000 @@ -239232,7 +239232,7 @@ CVE-2023-5671,0,0,3cc2b9c1deb62dceb8ed00c2d8762fe59a768998f615d5585f03bd3dd8ce13 CVE-2023-5672,0,0,b606b655dc2985c3ef150964e49693e9c24950f987c8d71991ac4c23768844b2,2024-01-04T17:08:45.617000 CVE-2023-5673,0,0,70e5322ee14dd36a1fef1c30959d5e0c92016645b510b75cfd68b74728b861b6,2024-01-04T17:09:37.303000 CVE-2023-5674,0,0,d18ab2900ed7e529311b11ab81d26d18c239ed8c3d95a148f12ff9fdb604f6d6,2024-01-04T18:49:34.613000 -CVE-2023-5675,0,1,95e8de0bc40b05155482dcdd97fbfc8fc9ae0472c4e1a540ce976bbd424621c2,2024-07-03T01:44:16.897000 +CVE-2023-5675,0,0,95e8de0bc40b05155482dcdd97fbfc8fc9ae0472c4e1a540ce976bbd424621c2,2024-07-03T01:44:16.897000 CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000 CVE-2023-5677,0,0,004c3e3f7004a28a876413d86856f1517cff863998043d0f69b3f9e4b9b898bd,2024-02-13T00:38:00.893000 CVE-2023-5678,0,0,ad85b7f85185cc697ec1f457f396463cbc44a9124905bcb5c855383874eba894,2024-05-01T18:15:12.393000 @@ -239610,7 +239610,7 @@ CVE-2023-6077,0,0,00cb332e84c1cdb0a08d37bede99e9542082ced2d016768c2fc5525fef9cea CVE-2023-6078,0,0,07eb2d7211a7a35cad567f2504930e6ea706e464ee574705a8749f6488aa9d0b,2024-02-09T20:23:01.477000 CVE-2023-6079,0,0,c657f5e2aa1940d462b06edca15d409e8635e96c4f0c0b9d7aa570802bdc6721,2023-11-15T17:15:41.840000 CVE-2023-6081,0,0,615862707d31666fe696ea9a52b36f9c26135f6c10879ec4b59a1dbbf126f06b,2024-02-12T17:31:21.670000 -CVE-2023-6082,0,1,51c624ad920580029fe98684df7d8cf2bd1be9e07e746827001b4e3f04e6cf80,2024-07-03T01:44:19.650000 +CVE-2023-6082,0,0,51c624ad920580029fe98684df7d8cf2bd1be9e07e746827001b4e3f04e6cf80,2024-07-03T01:44:19.650000 CVE-2023-6083,0,0,c176f2f1944a9cc01244ccb97ce0f8eae685eef377596e563a31b2de00ba8302,2023-11-14T00:15:08.847000 CVE-2023-6084,0,0,16d7a7039b6dbd155b6ca7781f3d7df429a1269812ca4c2ad7365d169c693ea9,2024-05-17T02:33:30.967000 CVE-2023-6085,0,0,35b5096e799bfbd6b5c16e62cf5d80bc5db8f4321ce57b047bbff11c1be2052d,2023-11-14T00:15:08.887000 @@ -239987,7 +239987,7 @@ CVE-2023-6511,0,0,6e9c9df66d5d6dc8e4f56e8e2fdba7ec529133e95fcd90f501e771942ada71 CVE-2023-6512,0,0,64d380cef3fda827fb5c24f06d407e7bbe2ae11eddc20026be124aa98b7d5aa7,2024-02-15T20:51:30.973000 CVE-2023-6514,0,0,462d0381adee46f7d1bc8e9e06cc0477813ef83f17d6573090aec4daf5e3641f,2023-12-12T21:20:07.693000 CVE-2023-6515,0,0,f8b5dfeafa02f6ea14895918c71114daa82062d8ee30097654581a5159050496,2024-03-21T02:50:38.423000 -CVE-2023-6516,0,1,2c423d948b9c47297e64a9f334bc2af5ff13514943adfe950fcd08cce2172881,2024-07-03T01:44:22.620000 +CVE-2023-6516,0,0,2c423d948b9c47297e64a9f334bc2af5ff13514943adfe950fcd08cce2172881,2024-07-03T01:44:22.620000 CVE-2023-6517,0,0,3467593a9d1064dca9fbac50097aac110e8ea12ac0f5d56273a5e05aa7052234,2024-03-21T02:50:38.540000 CVE-2023-6518,0,0,701884efa90328aec127750f6d7a617892af73d7d9d1cbf5cfc7a0127e0ae388,2024-03-21T02:50:38.627000 CVE-2023-6519,0,0,1067c6eb2fdb653773710a715d19abe17d72d4948b55787118a707da115fb55e,2024-03-21T02:50:38.713000 @@ -240209,7 +240209,7 @@ CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86 CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000 CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000 CVE-2023-6785,0,0,6032c6c6494d8ab6426166c8858fe7b4f5d0ea17027dec5e421fd5772b1b9f25,2024-03-13T18:16:18.563000 -CVE-2023-6787,0,1,f049a1f35e2aee24f976886d6c66885fd4024d6e89e26b74ded6d29472700286,2024-07-03T01:44:24.660000 +CVE-2023-6787,0,0,f049a1f35e2aee24f976886d6c66885fd4024d6e89e26b74ded6d29472700286,2024-07-03T01:44:24.660000 CVE-2023-6788,0,0,50e116b22f39b4eda80be0e0174e50805515a5317ae162b416827d632334043b,2024-01-11T23:33:05.333000 CVE-2023-6789,0,0,58210ee945774473d3672ef0a5317f3e9fd1821a6536ceabc670f03a82b8c1b1,2023-12-18T18:54:39.670000 CVE-2023-6790,0,0,59d4d6839301f4b4ea57b622791c925b2ceacc81b1978d57ea06e29921fd8384,2023-12-18T18:53:56.697000 @@ -240489,7 +240489,7 @@ CVE-2023-7097,0,0,393d56af626ac19b61da5dc4114ce2ce874e6b1f8cae834c87175dbc31098c CVE-2023-7098,0,0,3190311802c269bc572c8caa8c2e10791e9e466cd89f0ac16ce9b93abb795b89,2024-05-17T02:34:09.450000 CVE-2023-7099,0,0,3f947e491b7832e41b88075391a1226cdc48ad5cf459786eb64f473058479da2,2024-05-17T02:34:09.553000 CVE-2023-7100,0,0,615108e9b211b628f9794b9c92c7d82b695ac2f42301eb20fde060086d41afb7,2024-05-17T02:34:09.663000 -CVE-2023-7101,0,1,08fa6710491663ce9e72ea40e1e6ffe82fb355a851825bc7387528ad39010ece,2024-07-03T01:44:28.913000 +CVE-2023-7101,0,0,08fa6710491663ce9e72ea40e1e6ffe82fb355a851825bc7387528ad39010ece,2024-07-03T01:44:28.913000 CVE-2023-7102,0,0,fc4da897b012dd5882404997a4db8d905c1af55198af6653038a2f751936374c,2024-01-09T20:07:12.283000 CVE-2023-7103,0,0,e8b884e5a1d7c721c22e5b5060188b31b48678e21b13c10c5b3763cb2cd202fd,2024-03-05T13:41:01.900000 CVE-2023-7104,0,0,8a941aa82f7d0c443d56cbb267972310bbfd2dc559d10cd0725c8748eb020dc7,2024-05-17T02:34:09.853000 @@ -240544,7 +240544,7 @@ CVE-2023-7159,0,0,05b26456d9c7e8d8ae16a3e8d37f5c6fa6b140068ec05296dc8a17c61bcf65 CVE-2023-7160,0,0,27c7b58da8e7edad8e3294d4a7ec7e226d14d0f3c01e6e364a112be8228fab48,2024-05-17T02:34:14.753000 CVE-2023-7161,0,0,b3930ab3a97e1d3c27fc99be304904454c6f0d4bcb0814fc27d950acdf3052c3,2024-05-17T02:34:14.867000 CVE-2023-7163,0,0,0f5c35a87fc47051aa08ee9aab448a8efa59bbfa72ee9ee97a6b130cd14ca045,2024-01-04T19:56:45.747000 -CVE-2023-7164,0,1,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000 +CVE-2023-7164,0,0,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000 CVE-2023-7165,0,0,1d97a8a837ff89aac62852f940d39f1fe6be2be70c7e979a7de92240e40591e2,2024-02-27T14:20:06.637000 CVE-2023-7166,0,0,a05c5c3b5e771dd0d783b188143511eee70b2418a0548eb26ff6dbae55fdbae4,2024-05-17T02:34:15.110000 CVE-2023-7167,0,0,2ad0a7fd6f0156359513234ef6a12567866f88d4c0e31ddc963112ef38c1e460,2024-02-27T14:20:06.637000 @@ -240618,11 +240618,11 @@ CVE-2023-7247,0,0,c2c23a7b7393abf86d5128d2c24b59326c78c84a35ee098ee0a06670d40df4 CVE-2023-7248,0,0,73545909515ba9da671114a339e1418b83b4c4cb1fae4d9763595cd55045ee5e,2024-03-17T22:38:29.433000 CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000 CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd1341267135,2024-03-26T12:55:05.010000 -CVE-2023-7252,0,1,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 -CVE-2023-7253,0,1,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 +CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 +CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,291fdf96791c66804d1f0d3fb86a244e544f8112f70bc253658c7b47edf99960,2024-06-04T19:18:14.193000 -CVE-2023-7261,0,1,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 +CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,1c4cfb34070a7ce4966884df1379f77375459d76b20ac1f3cbf195ee6437fa6a,2024-06-11T13:54:12.057000 CVE-2023-7270,0,0,94669c63f2ade4ddfb25257f684257783c88dfab1050378b21b0aca26b8fce28,2024-06-27T12:47:19.847000 CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000 @@ -240640,9 +240640,9 @@ CVE-2024-0020,0,0,10041dfbf81efabcaeebded3d09f521b1a43a499af72b2f92a5be41564fb24 CVE-2024-0021,0,0,195598eeee803724595407e6749c18133eef4a41fdfa20e3801df52f8b02d210,2024-02-16T21:39:50.223000 CVE-2024-0022,0,0,4a467d6471e95818a3d22a3a3b2b0ace1e955edd8938bf07362529e426c48b2a,2024-05-08T13:15:00.690000 CVE-2024-0023,0,0,71da3b12c0926fa4407d7d8b99e783afc4b3b8dca223802c3cbec4fc1454193b,2024-02-16T21:39:50.223000 -CVE-2024-0024,0,1,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000 +CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000 CVE-2024-0025,0,0,af2ba2278c83468f9c9ee0818a23ceb585092240fb112c4e6afc1134d6fd4bad,2024-05-08T13:15:00.690000 -CVE-2024-0026,0,1,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000 +CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000 CVE-2024-0027,0,0,feebb29267eef6b846e635c87d884020111a5d4fbb253c2894c96109d4c1ea4e,2024-05-08T13:15:00.690000 CVE-2024-0029,0,0,095a39a40d263e89af48de4c6c2fad99c624ff9d4486c4388646dda629a45307,2024-02-16T13:37:55.033000 CVE-2024-0030,0,0,13b9ef30b4ddf3dc33f3691e1ffdf43744c22c4945c3db2bbc2cc35ea6de8cb0,2024-02-16T13:37:55.033000 @@ -240657,9 +240657,9 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660 CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000 CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000 CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000 -CVE-2024-0042,0,1,f86d339d4113b5a4769bf21105f85dafb8e05e2676c67a9485f2ba2585631706,2024-07-03T01:44:33.743000 -CVE-2024-0043,0,1,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 -CVE-2024-0044,0,1,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c477c,2024-07-03T01:44:34.730000 +CVE-2024-0042,0,0,f86d339d4113b5a4769bf21105f85dafb8e05e2676c67a9485f2ba2585631706,2024-07-03T01:44:33.743000 +CVE-2024-0043,0,0,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 +CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c477c,2024-07-03T01:44:34.730000 CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000 CVE-2024-0046,0,0,db8b26e423bc7f5764a0a6553823c47d2a6413b4d120bb9d62204abe423b4123,2024-03-12T12:40:13.500000 CVE-2024-0047,0,0,993274a4a1514003e0b4e6f55d530c359898e88fc2cb19719d5752f77b0e4830,2024-03-12T12:40:13.500000 @@ -240709,7 +240709,7 @@ CVE-2024-0099,0,0,922026d11edb09689a5419f4b6981b91f643282898008757d63b84ab582e71 CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000 CVE-2024-0103,0,0,c0f8f807fdf8426bc2106e7af79b6cd7b7308e8ea4f1780be6db3fdc6d1d8cf2,2024-06-17T12:43:31.090000 CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000 -CVE-2024-0153,0,1,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 +CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 @@ -240794,7 +240794,7 @@ CVE-2024-0248,0,0,2c37da61220f65b312245a2221cad9ad4877aec90b17ba5c2a3e9d6be35f78 CVE-2024-0250,0,0,1024a1aee8c07f43ea895a2e7847039d1e10efacdd7ad8bb0a19e5b1e9b5ffab,2024-02-12T17:31:21.670000 CVE-2024-0251,0,0,14956aba5a33632df721b3e529915eceaf50c3d32f322e21763f782642d137c0,2024-01-19T19:55:23.980000 CVE-2024-0252,0,0,0742069b1e41d825214331d01ce9e201ec5268e0275b0cee132c0981d24a8c51,2024-06-07T09:15:09.347000 -CVE-2024-0253,0,1,ddeee69b21b0084e2ba924b18ea5e397f396de8ad90474cf8bfd96614dee6053,2024-07-03T01:44:39.010000 +CVE-2024-0253,0,0,ddeee69b21b0084e2ba924b18ea5e397f396de8ad90474cf8bfd96614dee6053,2024-07-03T01:44:39.010000 CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbde8,2024-02-12T20:53:02.440000 CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000 CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000 @@ -240810,7 +240810,7 @@ CVE-2024-0265,0,0,c92e53ad11d8cc92e384202f84ffb84ebc3a003d44078864509b06cf66d723 CVE-2024-0266,0,0,1f93978b4f9e67732f5b15c0c12c46f0abc642ad41cceb231dfc5cf1f4dd3db0,2024-05-17T02:34:26.760000 CVE-2024-0267,0,0,7bfa7e3e2406c91814fcd34290ef18f2d24d1589bf4eec596441d1f5524f71fb,2024-05-17T02:34:26.867000 CVE-2024-0268,0,0,47456ea67f83d497b23ab66d4eb26e09b3a02ce26d0ebba5362ab64458aec1d3,2024-05-17T02:34:26.973000 -CVE-2024-0269,0,1,1778338e12d66bb0d88ebb267f8fb5d1b0dcb1c97c9c2ef80ca6ec116995ea7e,2024-07-03T01:44:39.930000 +CVE-2024-0269,0,0,1778338e12d66bb0d88ebb267f8fb5d1b0dcb1c97c9c2ef80ca6ec116995ea7e,2024-07-03T01:44:39.930000 CVE-2024-0270,0,0,149ad3058bdac0775166c4ada5886140d2ef7911f78d4ac8cfd20bed2c2a09cf,2024-05-17T02:34:27.107000 CVE-2024-0271,0,0,0babf6d710da9e84fe5f2931459a4e7abc266edc03bc1f216288ddf6b7abe814,2024-05-17T02:34:27.210000 CVE-2024-0272,0,0,7e654e469550a6946514d4b9e4f195a2cdceebadef5efa3588d6ac1e48606e73,2024-05-17T02:34:27.317000 @@ -240926,7 +240926,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3 CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000 CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000 CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000 -CVE-2024-0397,0,1,2e613c278e7a674d938da26e95659aba98bdc0c83250df3e9fb0c402bddb3d09,2024-07-03T01:44:41.987000 +CVE-2024-0397,0,0,2e613c278e7a674d938da26e95659aba98bdc0c83250df3e9fb0c402bddb3d09,2024-07-03T01:44:41.987000 CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000 CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000 CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000 @@ -240955,7 +240955,7 @@ CVE-2024-0423,0,0,7d4a04da13054879f494c098af81e5d1a40dc7a54a7095c9beb9a76b5a7aeb CVE-2024-0424,0,0,abb78097a089ceb004cb5799ce72e0994d7dbde660b904e531496cb79e0b00ad,2024-05-17T02:34:36.843000 CVE-2024-0425,0,0,4bd20ed5f25e41b045b0c15d6fb21aa0a99af5b8225b51cd90bf10afdb3ee6e0,2024-05-17T02:34:36.960000 CVE-2024-0426,0,0,dc2503e487443148dcbdf0fc2befb20491e6bd175db5dc3ad90a2662250ca01b,2024-05-17T02:34:37.057000 -CVE-2024-0427,0,1,338dfef85682a70527a72a07e776fc139be85a70c6b9744e2d313fea8de1af4c,2024-07-03T01:44:43.070000 +CVE-2024-0427,0,0,338dfef85682a70527a72a07e776fc139be85a70c6b9744e2d313fea8de1af4c,2024-07-03T01:44:43.070000 CVE-2024-0428,0,0,37bff535bf2c9e1ae078fb4d60a7c98c748660d27c6ecb91d92b35a3e5480a60,2024-02-13T16:02:08.357000 CVE-2024-0429,0,0,a5dcc970fcf67ff36a86102ddf640d2aa59e10e0dd71eeb43dcc044ba8efc6a0,2024-01-18T17:26:20.573000 CVE-2024-0430,0,0,aba50a31b10197c02d651790a3a56fbe7b065e4109a81ec99f27f92d46566686,2024-01-30T15:19:33.147000 @@ -241043,8 +241043,8 @@ CVE-2024-0514,0,0,18fd727c0557dac7fe8ee5d82335381520160f2d155bc86b399bda86a4184e CVE-2024-0515,0,0,6a5960e824fa1e21fe29e9274febf6c5866f9774504ae5f10a707ba6f8555ecf,2024-02-29T13:49:29.390000 CVE-2024-0516,0,0,6605c01ec045f9e3984e5335f409aa9cf2a09075470f6a0d6ae284b896826390,2024-02-29T13:49:29.390000 CVE-2024-0517,0,0,7d90617c43ba0962c9c0ad896660a79f4481906adb156795af4a7156524b1b73,2024-01-22T19:53:16.533000 -CVE-2024-0518,0,1,06cfe0138669d1b5b40a81316c7b8388ecfb6c3e22ceca04d1f26bac47601569,2024-07-03T01:44:45.150000 -CVE-2024-0519,0,1,8584572e2642603b4ed437d90bfbe5a77cb1e21d05696a519969e2d534951fa0,2024-07-03T01:44:45.993000 +CVE-2024-0518,0,0,06cfe0138669d1b5b40a81316c7b8388ecfb6c3e22ceca04d1f26bac47601569,2024-07-03T01:44:45.150000 +CVE-2024-0519,0,0,8584572e2642603b4ed437d90bfbe5a77cb1e21d05696a519969e2d534951fa0,2024-07-03T01:44:45.993000 CVE-2024-0520,0,0,533588e621d38dd5f7bc0fd1260b41d0b819c833a04365c06209f8439da47c4f,2024-06-07T14:56:05.647000 CVE-2024-0521,0,0,972e3ac07457bb0a501956009e9ab1f31349232a7f575875539533e34d112aef,2024-01-29T15:26:35.300000 CVE-2024-0522,0,0,24ca48a88658b103b93d5731ee46dcb614dfdfdf4fc0486a46b71011716e0971,2024-05-17T02:34:43.397000 @@ -241184,8 +241184,8 @@ CVE-2024-0667,0,0,2681b7becac6d5374ec2219687491519adea78bdc5162cd2d7253f0786abc5 CVE-2024-0668,0,0,3db9a5de6e4dca9e79ecb9554115ef410935372b559bc145d7ca0c6d374ebafc,2024-02-13T16:24:26.927000 CVE-2024-0669,0,0,476d8f93fcd7134fc732a1bd0cd06cc03563cad47067b8fa5ebf76f58a942cc6,2024-01-26T18:52:05.550000 CVE-2024-0670,0,0,1ea636a062af9aa5e99e5a5c7d298851385b5f544f8a313b4c9f392c635877d4,2024-03-13T23:15:45.750000 -CVE-2024-0671,0,1,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000 -CVE-2024-0672,0,1,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000 +CVE-2024-0671,0,0,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000 +CVE-2024-0672,0,0,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000 CVE-2024-0673,0,0,7b92dc7ebac1440bd036f3f010b9fd93c7e175ef616500dc0d0251320f5fab95,2024-03-28T12:42:56.150000 CVE-2024-0674,0,0,9139aa9ed68295af11e7b8aed5b715e6e747bd34139c805f237fd0a45d0b36ba,2024-02-08T16:39:59.450000 CVE-2024-0675,0,0,8bea4fa993c9477b8fb58d2ccef75bd1eb1d23abf07c79567a0ddce8b0191850,2024-02-08T16:39:42.950000 @@ -241469,7 +241469,7 @@ CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9 CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000 CVE-2024-0978,0,0,57707b936b24299b5240c63ec392dd38bc59dc5fe8314fbaf47e7586fd61e0f7,2024-02-29T13:49:29.390000 CVE-2024-0979,0,0,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2c4,2024-07-02T14:51:28.827000 -CVE-2024-0980,0,1,c8c9084fb2baad3341765fe36b79c09c499a2498d7806837427d52160f9ced2a,2024-07-03T01:44:56.397000 +CVE-2024-0980,0,0,c8c9084fb2baad3341765fe36b79c09c499a2498d7806837427d52160f9ced2a,2024-07-03T01:44:56.397000 CVE-2024-0983,0,0,ae05daa2819fc42abf2cc0aed0ec977b40d58c31465549c2cfe7791e8c6cecae,2024-02-29T13:49:29.390000 CVE-2024-0984,0,0,32a53697d4c68794e0f7d534229f2199d1ec3163c027c80a4fc5f01ab0bb8955,2024-02-29T13:49:29.390000 CVE-2024-0985,0,0,6abdc3a2e97e39786284b3bc77a2915cf97149b89c179d3872f3c6717cda4a06,2024-06-20T00:15:09.260000 @@ -241549,7 +241549,7 @@ CVE-2024-1061,0,0,947e75b14694e9a11f0f1cc99c5910bdfa7e7bd5faa6e5b7b033897e8f48ab CVE-2024-1062,0,0,6bed00278c1048f6252097b8c4f513b9734062a2d71abef01442ceb94c03a194,2024-07-02T12:15:02.653000 CVE-2024-1063,0,0,9f783a34601f62d19b147f2fe9fbb48179f2e91e414b112cc308b0e641d38b87,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,54ebccd3b0484c776a35abc0a579ad4dfe5016d375ba9d7ccf7a7253f76d1013,2024-02-12T18:42:14.777000 -CVE-2024-1065,0,1,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 +CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 CVE-2024-1066,0,0,dee5d81e7a0b9b9fb8a137a3449558003e1ae30b794977ba6cb78edfb4b822d2,2024-03-04T21:00:15.267000 CVE-2024-1067,0,0,8b71487d65b84bafea9ebb18e100372da8f5057c406bc15b886e4c9806cd2c75,2024-05-03T14:17:53.690000 CVE-2024-1068,0,0,d3b4b3131376b66b7ece0178ce7734c07daab57c4731b536024565a8c74d6a4c,2024-03-12T12:40:13.500000 @@ -241561,7 +241561,7 @@ CVE-2024-1073,0,0,adaf97fc5155b3c580417fc4779c1ce9fb6459b581a763739c6822c5178eb8 CVE-2024-1074,0,0,633d4c34e54d562a3c8ef166e41f454bd743f2b77196fa371b31e3cbb9b84270,2024-03-13T18:16:18.563000 CVE-2024-1075,0,0,1a2b469e57d35fd84b679f6fccb1281a6feade2a72464af7e7a4de99488a9956,2024-02-13T19:43:13.480000 CVE-2024-1076,0,0,5a9f9042e17a4f18255753cc0108cf3dbe7c5142f87a1141b1768f9f2a5c2e61,2024-05-08T13:15:00.690000 -CVE-2024-1077,0,1,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 +CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 CVE-2024-1078,0,0,6c9dee916fa3df09a1f7e03c1b0577e56d8c16195545070c4376ae3f631ca16e,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,6ac7286a778516cf89549df1a9d53e18b60d41d010ca37479fb08260829225dd,2024-02-14T19:33:09.977000 CVE-2024-1080,0,0,304c0398dc5f4a2caa82c312c98405b7134a29bc39ecd98425df8c836bd99fe1,2024-03-13T18:16:18.563000 @@ -241583,8 +241583,8 @@ CVE-2024-1095,0,0,df3c9b754a366dd4bae7a412155dd92109950a1d3409f2396655e3fd5c46a9 CVE-2024-1096,0,0,0511628751a4d3c33dfebd06790b048648e8a66a1c69f04faa3a9a5040d5bc55,2024-03-21T02:51:34.720000 CVE-2024-1098,0,0,3310ee4a717b92204b72ac7d3b1f5a99add80655b788189450c3415dec3db0a7,2024-05-17T02:35:14.017000 CVE-2024-1099,0,0,b2010c7c960783f169f92fed984856979d82b749d81b332d47244e41b291b4ef,2024-05-17T02:35:14.133000 -CVE-2024-1100,0,1,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 -CVE-2024-1102,0,1,9f788b8998d0881c3a87580c29b86b36fe5ea4d008a4351422134cfe2f1cb098,2024-07-03T01:44:59.757000 +CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 +CVE-2024-1102,0,0,9f788b8998d0881c3a87580c29b86b36fe5ea4d008a4351422134cfe2f1cb098,2024-07-03T01:44:59.757000 CVE-2024-1103,0,0,32c2403b3235f3d51f16a9c0f1555e66ef01d8c80920f98db19da2d6af331543,2024-05-17T02:35:14.273000 CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000 CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000 @@ -241612,7 +241612,7 @@ CVE-2024-1127,0,0,d56eedcfadebd263336bcc9003136ee639f27dd6c46c9263fea0eb8ea044d7 CVE-2024-1128,0,0,a231b73c645395e365defb40ca5d41741520485dac9e62df464e6e1705f68d2e,2024-02-29T13:49:29.390000 CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d93,2024-02-29T13:49:29.390000 CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000 -CVE-2024-1132,0,1,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000 +CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000 CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000 CVE-2024-1134,0,0,2e7c5ee3a71225c7c6e3e9d595fec8d66565da1f8113a13a6b762c5258606aef,2024-05-24T13:03:05.093000 CVE-2024-1135,0,0,c4e807742cebaf6bf696946dfb175a5e42a114f551ef03f8a1a000797bbd864f,2024-06-30T23:15:02.563000 @@ -241681,7 +241681,7 @@ CVE-2024-1200,0,0,34f3327e52268af6598a3ed2e1fe7065c0a7d9b826aea15a86c5ffb2ab105c CVE-2024-1201,0,0,ff74f12e6106529eaffb9117e70c6f3a10b2b8f55039a19edec6d706d4090510,2024-02-09T19:27:29.517000 CVE-2024-1202,0,0,f81c25465162623e375dc607a2453a5b326099ddc8d46c3996f7d092705cb575,2024-06-06T14:15:10.523000 CVE-2024-1203,0,0,fb24c2a27e75750ae607c5c83e02745495de5eedde1bafe986263083a797f7c6,2024-03-13T18:16:18.563000 -CVE-2024-1204,0,1,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000 +CVE-2024-1204,0,0,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000 CVE-2024-1205,0,0,6377c19ab3caf8be6436fa7835c35a6e44c7097e9389c96aef4f0a1e0a912393,2024-03-20T13:00:16.367000 CVE-2024-1206,0,0,2864c05d1536152b20c092c120d96a23f5fd73e20c310a663111eae7ef674b23,2024-02-29T13:49:29.390000 CVE-2024-1207,0,0,f1e39aa9f4fae080615ceb22c991bb5ab1be6b272e49830e77e13729606230d5,2024-02-15T02:05:42.313000 @@ -241695,7 +241695,7 @@ CVE-2024-1215,0,0,d28400af01cf6da0c9ccdf77edda5884abf59abc1579cb18ea8627b70ccffd CVE-2024-1216,0,0,eed4a95a362941ba5542e37a6a2e23d06d62fcaa28ffbb34127aad12c5332aef,2024-03-21T02:51:38.760000 CVE-2024-1217,0,0,7c891522015c867731e112786f8baf0eedff610ff6da66ffe43d61ae316f5a37,2024-02-29T13:49:29.390000 CVE-2024-1218,0,0,5c1e6ad4ced18087b86a14b531fa46181b1159e90a257e95f321211d43b44dc1,2024-02-29T13:49:29.390000 -CVE-2024-1219,0,1,c458cc72658e7a053403f6629df47005daa64a22965acf0ef87a52df05752215,2024-07-03T01:45:05.720000 +CVE-2024-1219,0,0,c458cc72658e7a053403f6629df47005daa64a22965acf0ef87a52df05752215,2024-07-03T01:45:05.720000 CVE-2024-1220,0,0,7fc61962f6d2075b07bb030435da96def1b153ddab02d3c5264f2409e74faa58,2024-03-06T15:18:08.093000 CVE-2024-1221,0,0,0c5ab33b7870e2bf051350fb7acecbf2c6c7fa7a7d7d98825cf22e1a78f68392,2024-03-14T12:52:16.723000 CVE-2024-1222,0,0,a9c51e07b268b389397d67cab327be7600ea5aafbf0fac1c47df16a93f253448,2024-03-14T12:52:16.723000 @@ -241820,7 +241820,7 @@ CVE-2024-1352,0,0,e0b6a716f2e5b0725527c1a8037ed8995ec00af00fdbeed9d4a1021a159725 CVE-2024-1353,0,0,3b2e255ff40ac243863150eaa69490181576d4bc3b445766b9d3d2be6f1c4ad9,2024-05-17T02:35:24.150000 CVE-2024-1354,0,0,7e9a958865e30c89765260c45d4ae133e4c586a23883dff6b33b804192a001d2,2024-03-05T20:22:24.573000 CVE-2024-1355,0,0,dd36a54ac939524c987827d5cb09797409e1063b770f9d9a2dc86b1a7287f5d9,2024-03-05T20:22:38.100000 -CVE-2024-1356,0,1,14b2816357b5b6c8e88a4ebd012b1ee5eac7c6f7a64d8a4c918eb54e55f0353d,2024-07-03T01:45:11.987000 +CVE-2024-1356,0,0,14b2816357b5b6c8e88a4ebd012b1ee5eac7c6f7a64d8a4c918eb54e55f0353d,2024-07-03T01:45:11.987000 CVE-2024-1357,0,0,3e719d1386b68f74bac78fded4c12eb6113d801d07a6b01c6c13cbf093a4f755,2024-04-16T13:24:07.103000 CVE-2024-1358,0,0,59bf1dc2789a9e992220be1d0127dfa83d08d3077a1ea92d6417d6450ac5f1b5,2024-03-13T18:16:18.563000 CVE-2024-1359,0,0,709fa5d5f426354abf236525051c41916ab3da3c1737b61ccd8944f2befceb44,2024-03-05T20:22:49.650000 @@ -241857,7 +241857,7 @@ CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000 CVE-2024-1394,0,0,165f33562f18e63e8a619116a51b597c395907033340f10ab7f53d479f543479,2024-06-27T05:15:50.317000 -CVE-2024-1395,0,1,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 +CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000 CVE-2024-1398,0,0,2b28153468f4d42956e25c3f4649f2a8573b6a6d707501b23def6a1cde88644b,2024-03-04T13:58:23.447000 @@ -242039,7 +242039,7 @@ CVE-2024-1593,0,0,5d762f901a5b7a13ebd19f4f0e91645438720f053707b63d3e7e21f508c31a CVE-2024-1594,0,0,1d62f8d55fb3a974435872bb233738098cc7a319efe1e15acb72ee1c1daae795,2024-04-16T13:24:07.103000 CVE-2024-1595,0,0,0ac9aed2c4ed6b9e7bc181d6ab55412b8033a5bfcbc541a4a4b602392614e428,2024-03-01T14:04:26.010000 CVE-2024-1597,0,0,26859ef531918a7a283641927754cea63a7414240e4caa854088065bd0691f96,2024-06-10T17:16:17.200000 -CVE-2024-1598,0,1,53d65181c5dfe1c31bf5402ab568020e4bee791aaf0f23781c0a55de69756e2c,2024-07-03T01:45:24.367000 +CVE-2024-1598,0,0,53d65181c5dfe1c31bf5402ab568020e4bee791aaf0f23781c0a55de69756e2c,2024-07-03T01:45:24.367000 CVE-2024-1599,0,0,2f7770422da9bff7bed3eef076e29376c9b42774c7fc9bda69a503fd449e3156,2024-06-07T11:15:53.177000 CVE-2024-1600,0,0,a1cf7c20c4c53ecd0ddc2601c3f6df39efaefde9047db784f0058d6905cd6130,2024-04-10T19:49:51.183000 CVE-2024-1601,0,0,5de9e18b0c5a4daa146100818a9ac068a88d159e30320cca5c3c0caf368ddd5c,2024-04-16T13:24:07.103000 @@ -242048,7 +242048,7 @@ CVE-2024-1603,0,0,5d1338246e7eff570937017899def31d469c1473946b1d3e9d827eb4f9c813 CVE-2024-1604,0,0,5eb6bfa2b690cdc5042b3cd6683eec4697c9011ce1615c69d454ffb962b9e2b0,2024-03-18T12:38:25.490000 CVE-2024-1605,0,0,7074df8750d7a162d5543d10d5434be9d2e408e307c5952acb4cd8e797b0b6be,2024-03-18T12:38:25.490000 CVE-2024-1606,0,0,c36cce5ef22cd77fc10abd764d2af4d1af3e80b0452c270d3845af04c4c46ba6,2024-03-18T12:38:25.490000 -CVE-2024-1608,0,1,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000 +CVE-2024-1608,0,0,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000 CVE-2024-1618,0,0,0f299c1a292ffb16d251386c7bde9d0738e4cebbec19e926c886455e5550e1fa,2024-03-12T16:02:33.900000 CVE-2024-1619,0,0,cfc8445e3935906ad1a507b0c5ffd0fe9724e5ada07fa45f6ddb4dad1e58f60a,2024-02-29T13:49:29.390000 CVE-2024-1622,0,0,008d271b6bbf0be364def470530167dff53e33fd04b103e731aac594ad8fe316,2024-03-23T03:15:10.947000 @@ -242158,11 +242158,11 @@ CVE-2024-1733,0,0,0a3bd094d039e642acfbaf43d971fa4ffe129283e1d81d79ef06d054dffc15 CVE-2024-1735,0,0,2da699be929c3e6e7a8ea02e879ac093b8348fa1c03aafb2bff14b57237795a6,2024-06-12T08:15:50.043000 CVE-2024-1736,0,0,4046e84b8490c7f836a95d83a381f1921bdd459ffba2ada5f53ce4a10b9200a6,2024-06-13T18:36:09.010000 CVE-2024-1738,0,0,245548fdb1434c1862c520551a3580b8f1b213c8017bcf448612a1521be9210e,2024-05-15T16:15:09.807000 -CVE-2024-1739,0,1,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000 +CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000 CVE-2024-1740,0,0,a4727f762c1d1efaf400e2db679e98eaa1364e84183339aff737ffb5d021d54f,2024-04-10T19:49:51.183000 CVE-2024-1741,0,0,d588cdec4e1d5da894361b54450023cc90f66f6c8804e8a4beda0263242afb4c,2024-04-15T18:15:09.937000 CVE-2024-1742,0,0,4fbf4a0c921fc3a958c91053411502e81c61e37a288f49d83ab6feab91ed6e07,2024-03-22T12:45:36.130000 -CVE-2024-1743,0,1,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 +CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 CVE-2024-1745,0,0,0c0bf770eedd9092e313b5152244a64d67966fb6a4aa7d030150554ac7159289,2024-03-26T12:55:05.010000 CVE-2024-1746,0,0,3940e769193bb75ecd4efe34f9a17d9557fffd4c4c753ea7f9b1c1be15386399,2024-04-15T13:15:31.997000 CVE-2024-1748,0,0,ce2ee680aa4e05ef3f474327683015e9258b499b794192b6bf695d9c4d2cdeb0,2024-05-17T02:35:34.880000 @@ -242258,7 +242258,7 @@ CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b51 CVE-2024-1846,0,0,ef5b5743243fde26f19bda8d3441988876e0bebaf27eaa4fdca21b8d69d3b82c,2024-04-15T13:15:31.997000 CVE-2024-1847,0,0,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000 -CVE-2024-1849,0,1,00d6444439ba73f9c7a830dd07d737b1f65ea5d9bfffc4a03f13d3870e058393,2024-07-03T01:45:36.280000 +CVE-2024-1849,0,0,00d6444439ba73f9c7a830dd07d737b1f65ea5d9bfffc4a03f13d3870e058393,2024-07-03T01:45:36.280000 CVE-2024-1850,0,0,619cf2eb46834aecbb5c680ea41679eadc7e54936ecf9bc9140e736a3bd02f40,2024-04-10T13:23:38.787000 CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000 CVE-2024-1852,0,0,9f92825b65e6bb9369c1037dcd50c43b1f7e5526ff6359d4256ca25ce4ba1079,2024-04-10T13:23:38.787000 @@ -242402,10 +242402,10 @@ CVE-2024-1999,0,0,f6af60cbfc609ce1a5481b1af111b21c76b0267bc8cc3b99baa03f46180b41 CVE-2024-2000,0,0,108d93fddd41a17ddd3e047596b7f6a0573ec46987e100f3d626f9ebaa3d0da8,2024-03-13T18:15:58.530000 CVE-2024-20001,0,0,8efb1dbe27f5e7618046f10f9b4be42dee6a7bd8241e11b9072ab6e49025782f,2024-02-09T02:02:13.153000 CVE-2024-20002,0,0,46b6afed42316be97368931c2d39434a4c3b4f4412ec2aa11d0d2b3e3bf7e82f,2024-02-09T02:01:37.090000 -CVE-2024-20003,0,1,252c3ca307d160fe322f3e6f3c838ec528b0deb286e51517bf83a2ddeb36c723,2024-07-03T01:45:42.740000 -CVE-2024-20004,0,1,f0724cab7e23c1672343a65224d29c6de9c5ef503ce348d95a653731adbda199,2024-07-03T01:45:43.630000 +CVE-2024-20003,0,0,252c3ca307d160fe322f3e6f3c838ec528b0deb286e51517bf83a2ddeb36c723,2024-07-03T01:45:42.740000 +CVE-2024-20004,0,0,f0724cab7e23c1672343a65224d29c6de9c5ef503ce348d95a653731adbda199,2024-07-03T01:45:43.630000 CVE-2024-20005,0,0,9fc2bf3343a8741d67973894e1598f1d9222d1a794f1fc5bf1012a3bea045463,2024-03-04T13:58:23.447000 -CVE-2024-20006,0,1,17a91c2471e0eca90fb18bbcfea0e3d03ed760ac5103107ae434f69000dabe0f,2024-07-03T01:45:44.467000 +CVE-2024-20006,0,0,17a91c2471e0eca90fb18bbcfea0e3d03ed760ac5103107ae434f69000dabe0f,2024-07-03T01:45:44.467000 CVE-2024-20007,0,0,a7c256a107341f0ce36afa509119aeae8c92b9fd20fd5e357135446be2b5db04,2024-02-09T02:05:10.947000 CVE-2024-20009,0,0,8a3dd19d087c675ed4a06369b3717506a8fbc605930d6e2e550f72cb428b21c9,2024-02-09T02:05:28.177000 CVE-2024-2001,0,0,9d9c4055a068a623a65ab5f6f8115eff6835137ff40d45fdb28a012cdb774cf0,2024-02-29T18:06:42.010000 @@ -242413,72 +242413,72 @@ CVE-2024-20010,0,0,ce5c0e4e356843474710ae52b2ea98e454f1f5137e6aec762a218fd3f8e69 CVE-2024-20011,0,0,6627edd4b73a2cd01e0235883cf3040679db12149efdee6d4cf5fb8ba442dfe0,2024-02-09T02:06:03.160000 CVE-2024-20012,0,0,632cbb17513ceb654ad274eef75e2829b7e381e8bf179a8f5f1390d0abaa74a1,2024-02-09T02:06:22.713000 CVE-2024-20013,0,0,0e897aaa0b6c5b11c722305e684d61e31baa1805e2dc75b67e8eee7409f44ad5,2024-02-09T02:06:40.570000 -CVE-2024-20015,0,1,d1d8bdd6d1fa1f4d1678fcb9177a4ae4da0af52770fa46e26129dd1c299d4bcb,2024-07-03T01:45:45.330000 -CVE-2024-20016,0,1,23d42679a125731e1842dc4827fc98ffaa2afa5f0ebd1d4093677bb31bac3891,2024-07-03T01:45:46.207000 +CVE-2024-20015,0,0,d1d8bdd6d1fa1f4d1678fcb9177a4ae4da0af52770fa46e26129dd1c299d4bcb,2024-07-03T01:45:45.330000 +CVE-2024-20016,0,0,23d42679a125731e1842dc4827fc98ffaa2afa5f0ebd1d4093677bb31bac3891,2024-07-03T01:45:46.207000 CVE-2024-20017,0,0,dfb161f2493dc4c9c4d67e5f43fa0163e6299a3fa9fb242cfc4b241fa6efa012,2024-03-07T03:15:06.853000 CVE-2024-20018,0,0,a9b64a9435b5bc63345cae4ecd28b39a61d7f82c3a2ac625a302e9d9c9f1b435,2024-03-04T13:58:23.447000 CVE-2024-20019,0,0,39a6c56b7e5ee43e38177652e3585ce43be13db3cc946fe944d7eb64d20c92e4,2024-03-04T13:58:23.447000 CVE-2024-2002,0,0,f9538af5e2272cbd0aa160ba82bdd06f169b250031f3e62bc00bccc2e10da541,2024-04-19T23:15:10.720000 CVE-2024-20020,0,0,54f21da7d859fe56eef653e88280a7576539f77f17050a17a46c0dc69cb94b04,2024-03-04T13:58:23.447000 -CVE-2024-20021,0,1,9da6b4090664581723961fe14bfe7a2d90b8c57bd1123df3f77b75a47e068fa3,2024-07-03T01:45:47.187000 +CVE-2024-20021,0,0,9da6b4090664581723961fe14bfe7a2d90b8c57bd1123df3f77b75a47e068fa3,2024-07-03T01:45:47.187000 CVE-2024-20022,0,0,5fea28aa9694d95fb69b0ecbf4c1968d72487f38dd57069f7814e0738000f9a9,2024-03-04T13:58:23.447000 CVE-2024-20023,0,0,3a102728acb4ac1cc7bd3c8526ef188fc726b2d6df358b3c4749c39431589641,2024-03-04T13:58:23.447000 -CVE-2024-20024,0,1,a587bfbae48c7d89e5f8cdf3a4d9f1f662ddb9590db59d2b26f356c2c055895e,2024-07-03T01:45:47.463000 +CVE-2024-20024,0,0,a587bfbae48c7d89e5f8cdf3a4d9f1f662ddb9590db59d2b26f356c2c055895e,2024-07-03T01:45:47.463000 CVE-2024-20025,0,0,2dc8d5861f55cfdb562970c4f547982af20e958dcf2f7992d527caeeb0e6800e,2024-03-04T13:58:23.447000 CVE-2024-20026,0,0,e830b62633c706912ab62dba426d6370828ee334bb3a8ce8a9ce2d95bd832cc5,2024-03-04T13:58:23.447000 CVE-2024-20027,0,0,1bb050a3b71879883abc7ed0b7ca5bc9ff0c930db54aa278b2333abac3671a44,2024-03-04T13:58:23.447000 -CVE-2024-20028,0,1,cfbf4d0a5e915e0bee3fad17577f931af15ec4fffb945f6759a6ae86484e677f,2024-07-03T01:45:48.410000 +CVE-2024-20028,0,0,cfbf4d0a5e915e0bee3fad17577f931af15ec4fffb945f6759a6ae86484e677f,2024-07-03T01:45:48.410000 CVE-2024-20029,0,0,1842a0f8d68497b7d014f95f56186619617c68695c68f0738839c531bcbafccb,2024-03-04T13:58:23.447000 CVE-2024-2003,0,0,2c98e18589071193a30bed6055c24ac0b56c5b82dfe77c2da874dbd049997be8,2024-06-21T11:22:01.687000 CVE-2024-20030,0,0,9d0737a657bdf3e18312d83ef3295a09312da06277325d20791f4dac17b2ef82,2024-03-04T13:58:23.447000 CVE-2024-20031,0,0,be44a648bd8dd0d9a5966ba2d30120c24ff30c168e04ba6c1c2f00bc42e32ec6,2024-03-04T13:58:23.447000 CVE-2024-20032,0,0,9fa8bddb4c531682ee647a7b76d2f6990793752bf987d4eb8877b604bdf2596d,2024-03-04T13:58:23.447000 CVE-2024-20033,0,0,dd7b0d171a78cc9c57411fef24d94e38963c8d068304f0ce024c3a57d34364be,2024-03-04T13:58:23.447000 -CVE-2024-20034,0,1,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000 +CVE-2024-20034,0,0,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000 CVE-2024-20036,0,0,7016446f74f2148ba6dea33766b6827610d502eb9c245e0a1c0d7d040f7a8ae8,2024-03-04T13:58:23.447000 CVE-2024-20037,0,0,01128565246092f61c328423c961d180f319d8569a52c3d96eb198cb92edb3a4,2024-03-04T13:58:23.447000 CVE-2024-20038,0,0,ca6160c9ee802f2f7025c409725accb336619b3068c3b423047000c1c0be64c1,2024-03-04T13:58:23.447000 CVE-2024-20039,0,0,9a1aec6c692c7ea1a32f8f2a06b073157ba8250ebca50606ffe9369bebc6c14d,2024-04-01T12:49:09.583000 -CVE-2024-2004,0,1,986b9069f0e16c9cad75d0af17c842c0acbddb79c7dfed57e096aa6b1b17c80f,2024-07-03T01:52:57.560000 +CVE-2024-2004,0,0,986b9069f0e16c9cad75d0af17c842c0acbddb79c7dfed57e096aa6b1b17c80f,2024-07-03T01:52:57.560000 CVE-2024-20040,0,0,5b510d8ce08224e8d7209fa602ef8f1b04d1879dc497a7da7b4292a3ccd7d3f4,2024-04-01T12:49:09.583000 -CVE-2024-20041,0,1,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 -CVE-2024-20042,0,1,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 +CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 +CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 CVE-2024-20043,0,0,4bb4a7314f2c49db5a5c8f36286a5d15da7c6f286f0afaf5cdabc887325ad2e2,2024-04-01T12:49:09.583000 -CVE-2024-20044,0,1,7b00cd01d330620de78c873c2b5a5d1db703e947cc4fd0c1c90748e651832421,2024-07-03T01:45:52.167000 +CVE-2024-20044,0,0,7b00cd01d330620de78c873c2b5a5d1db703e947cc4fd0c1c90748e651832421,2024-07-03T01:45:52.167000 CVE-2024-20045,0,0,9b277554a663731d919abd21d4fa7693268640d4a1ef69487c4f7d12200e8e99,2024-04-01T12:49:09.583000 -CVE-2024-20046,0,1,2b2346806d601871102b47d1857114a53d4c008a1b72821d4c813d568163c45f,2024-07-03T01:45:53.103000 +CVE-2024-20046,0,0,2b2346806d601871102b47d1857114a53d4c008a1b72821d4c813d568163c45f,2024-07-03T01:45:53.103000 CVE-2024-20047,0,0,5f8d70e1b88970b78b52646725813e6c2a1e2bc7c8d4acd92f09dd6529f8fb58,2024-04-01T12:49:00.877000 -CVE-2024-20048,0,1,20f0a9f9a5cb818fc2b8e857bf930b064e9ba7c6112710d3c0a129a489a821eb,2024-07-03T01:45:54.020000 +CVE-2024-20048,0,0,20f0a9f9a5cb818fc2b8e857bf930b064e9ba7c6112710d3c0a129a489a821eb,2024-07-03T01:45:54.020000 CVE-2024-20049,0,0,fd4b03c8bc4ccc8da37e8b674374aac58f273e3358263c00aad033b79491c106,2024-04-01T12:49:00.877000 CVE-2024-2005,0,0,daea362fffde0fb082d151df2358d46320eb09b5bd7b3280d080d5b1980ab867,2024-04-03T17:15:55.773000 CVE-2024-20050,0,0,95322fe2b16db8b685650311de92e79ad057beee44933003db399869ad7057e9,2024-04-01T12:49:00.877000 CVE-2024-20051,0,0,ac8c6cb03169c225f44030c8338332eae6341083b0dea4fd4f7f7df49a416537,2024-04-01T12:49:00.877000 CVE-2024-20052,0,0,b608de291ef41c7d946e08bcab7170bcded9ac66eae6e962c374ac118bb3436a,2024-04-01T12:49:00.877000 -CVE-2024-20053,0,1,029e5b2ad2abf5e766d734dceb6d55f903a4b3644467cad36d2c8b5267d2d63b,2024-07-03T01:45:55.163000 -CVE-2024-20054,0,1,3b350a0abc5b4af719ed6067f2b39a6126acf9aa30ac8e3ae176e3781b70163c,2024-07-03T01:45:55.993000 +CVE-2024-20053,0,0,029e5b2ad2abf5e766d734dceb6d55f903a4b3644467cad36d2c8b5267d2d63b,2024-07-03T01:45:55.163000 +CVE-2024-20054,0,0,3b350a0abc5b4af719ed6067f2b39a6126acf9aa30ac8e3ae176e3781b70163c,2024-07-03T01:45:55.993000 CVE-2024-20055,0,0,4dd704c095e53d7cf4a2fe7965dfdb1d6d64132f42f0670efc379daf78b59d78,2024-04-01T12:49:00.877000 CVE-2024-20056,0,0,b6b1fd02c7f65676a17715d6b07abf6a4c4976bab2542183e6318957156dd374,2024-05-06T12:44:56.377000 CVE-2024-20057,0,0,990250f8f14d0f92aaa5182dea898467760f130428bbcc4648d47043ada62fe9,2024-05-06T12:44:56.377000 -CVE-2024-20058,0,1,ed8bcd6cd361d5b7f7bbe8a13a97e17b959d3a200e38056f47705aab43dc0ea1,2024-07-03T01:45:57.120000 +CVE-2024-20058,0,0,ed8bcd6cd361d5b7f7bbe8a13a97e17b959d3a200e38056f47705aab43dc0ea1,2024-07-03T01:45:57.120000 CVE-2024-20059,0,0,069a934ceb0aa0ce2c4d5b69ddba8190765f629560d198c71ae0abe51dd90d26,2024-05-06T12:44:56.377000 CVE-2024-2006,0,0,df4bc94ba9e1d1c638a16eca7ef98c4896fe8b4e7cd4dfad87563fdb108addf7,2024-03-13T18:15:58.530000 CVE-2024-20060,0,0,75f7569bafb5a37910c3681015f5a2d8c69cddb76f7a80e23135d23a09480ac6,2024-05-06T12:44:56.377000 CVE-2024-20064,0,0,2591925e496d0a99183c0f63a57deca1e1ee6cc6147c6c9cef55cd369d8dccb5,2024-05-06T12:44:56.377000 CVE-2024-20065,0,0,8ab52ef99ec3cc5757b239673490a11d1ec0d860257f5b5d3dc656099140a331,2024-06-03T14:46:24.250000 CVE-2024-20066,0,0,f48106ad7b4ca43e5987705fe9ab68bb5e05a7ed45f830ed2c0ed90706d533c8,2024-06-03T14:46:24.250000 -CVE-2024-20067,0,1,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec2383790e,2024-07-03T01:45:57.883000 +CVE-2024-20067,0,0,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec2383790e,2024-07-03T01:45:57.883000 CVE-2024-20068,0,0,2f2abfaa08cd0bdd6c93098c81d84704288eb5ba32b8fc9912c23932a1791695,2024-06-03T14:46:24.250000 CVE-2024-20069,0,0,78cbc94c051d996863509570fb7b0483c8280c3196e606c277f7b98186f4acdc,2024-06-06T03:15:08.747000 CVE-2024-2007,0,0,eaadf0f3a9ed7b4e615e29ccca11af1a4d5565e9ea5b62f105dcbfa87f797ec4,2024-05-17T02:37:59.197000 CVE-2024-20070,0,0,c0742d62ad8c435485d2c646bc6e3664615e7c2cd94b9b30ac32d747aa095c1c,2024-06-03T14:46:24.250000 -CVE-2024-20071,0,1,410f42d94adb2ac030a10c212dc2dfbda3e5d2020644b7c1536ad292ae26f08f,2024-07-03T01:45:58.913000 -CVE-2024-20072,0,1,639e86e3d37aa95f3c744b6c3fdbeb01d314bfccd155f1c09f5fa09f8c152367,2024-07-03T01:45:59.183000 -CVE-2024-20073,0,1,b92b89689d99337a33ea65b4b166e8cf9f21aa160cfd841da21a2f3df1963e49,2024-07-03T01:45:59.423000 -CVE-2024-20074,0,1,92cbda2ee994adad88a59787efddc8d0bc527b773105a4e8540b8e425473be3a,2024-07-03T01:45:59.657000 +CVE-2024-20071,0,0,410f42d94adb2ac030a10c212dc2dfbda3e5d2020644b7c1536ad292ae26f08f,2024-07-03T01:45:58.913000 +CVE-2024-20072,0,0,639e86e3d37aa95f3c744b6c3fdbeb01d314bfccd155f1c09f5fa09f8c152367,2024-07-03T01:45:59.183000 +CVE-2024-20073,0,0,b92b89689d99337a33ea65b4b166e8cf9f21aa160cfd841da21a2f3df1963e49,2024-07-03T01:45:59.423000 +CVE-2024-20074,0,0,92cbda2ee994adad88a59787efddc8d0bc527b773105a4e8540b8e425473be3a,2024-07-03T01:45:59.657000 CVE-2024-20075,0,0,c25b515a91dbc89ebe595fac548aad128c5354b0efe2add6f43a7dd87e7c74de,2024-06-03T14:46:24.250000 -CVE-2024-20076,0,1,043a02e00362b41ad4a169900cabc4b373bea5e59c8b7eb2aa47b1c366f92529,2024-07-03T01:46:00 -CVE-2024-20077,0,1,5ac9101dfc5d925867f375757f40d5d4d6e0cc7f8cf8a55648aa9d83a17a5b14,2024-07-03T01:46:00.247000 -CVE-2024-20078,0,1,d5f48505c574c6565f4358009b04f1f8167b5408792fb9d871c2e1d23683448a,2024-07-03T01:46:00.490000 +CVE-2024-20076,0,0,043a02e00362b41ad4a169900cabc4b373bea5e59c8b7eb2aa47b1c366f92529,2024-07-03T01:46:00 +CVE-2024-20077,0,0,5ac9101dfc5d925867f375757f40d5d4d6e0cc7f8cf8a55648aa9d83a17a5b14,2024-07-03T01:46:00.247000 +CVE-2024-20078,0,0,d5f48505c574c6565f4358009b04f1f8167b5408792fb9d871c2e1d23683448a,2024-07-03T01:46:00.490000 CVE-2024-20079,0,0,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000 CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000 CVE-2024-20080,0,0,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000 @@ -242506,7 +242506,7 @@ CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a51416 CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000 CVE-2024-20256,0,0,643357aedff71b916efc28a152bf88a1ecacffa30d979bdd3a58df8bd0acabae,2024-05-15T18:35:11.453000 CVE-2024-20257,0,0,76ffe9a92c93a06325edca86ddf0d31564fbc213598c5ddb9861c391515973e1,2024-05-15T18:35:11.453000 -CVE-2024-20258,0,1,dd86e76a96b4e6a893c0c6ec61ba16ebd8778c22b6c500e3943b86dcf8fd547a,2024-07-03T01:46:01.017000 +CVE-2024-20258,0,0,dd86e76a96b4e6a893c0c6ec61ba16ebd8778c22b6c500e3943b86dcf8fd547a,2024-07-03T01:46:01.017000 CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000 CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000 CVE-2024-20261,0,0,28ae2eaa7fd2c580717dbb491e2368839090c9828bd63ed0d087b1404a2d8648,2024-05-22T18:59:20.240000 @@ -242559,7 +242559,7 @@ CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d78 CVE-2024-20322,0,0,505d656abd2ee0d10812405b8fc5e64f58335921bda14716ed43aa4bb4075f75,2024-03-13T18:15:58.530000 CVE-2024-20324,0,0,8105b558a920362954e59927ed45c499623f22f3987422dccf7aa064c5d5be0c,2024-03-27T17:48:21.140000 CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000 -CVE-2024-20326,0,1,da6640a18213d5341d3d6d6fde35996d9b5364b80a7a8fd68c21380f84c10d82,2024-07-03T01:46:03.803000 +CVE-2024-20326,0,0,da6640a18213d5341d3d6d6fde35996d9b5364b80a7a8fd68c21380f84c10d82,2024-07-03T01:46:03.803000 CVE-2024-20327,0,0,0b0737184be7039f4590b285733309ba156da40401e164ab950277586b5aa24a,2024-03-13T18:15:58.530000 CVE-2024-20328,0,0,13a28c8852ca273b55c1f130423e4a6ac2577a7815aa1061922f9234c0e1ab39,2024-03-01T22:22:25.913000 CVE-2024-2033,0,0,f5fe8db5021f3e22566d05e7fe01aca13f3288ae0aa286203b57a8e2fcfb1f17,2024-04-10T13:23:38.787000 @@ -242588,7 +242588,7 @@ CVE-2024-2036,0,0,8e04d23ebbe0a468fdcd1f86116418146522877c82a0d297361ec20a661cc7 CVE-2024-20360,0,0,01ead87c85ac9daa6d9dc5587bf54cc99118981f1da825db23bf3ff6ee991ac2,2024-05-28T14:29:13.403000 CVE-2024-20361,0,0,0f85246ce19542f4971e629f8d682179d61b7aa25f2b62c267e7838ff8b7ad1f,2024-05-22T18:59:20.240000 CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000 -CVE-2024-20363,0,1,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000 +CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000 CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000 @@ -242603,7 +242603,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 -CVE-2024-20399,0,1,0e6c2648140a4eb958e1147ef290736c299fa556f2d3e49fafe1f717e89dec31,2024-07-03T01:00:01.810000 +CVE-2024-20399,0,0,0e6c2648140a4eb958e1147ef290736c299fa556f2d3e49fafe1f717e89dec31,2024-07-03T01:00:01.810000 CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 @@ -242975,7 +242975,7 @@ CVE-2024-20993,0,0,c76300dcc4585f2fd56825f1fae341382d1cd779fec3e9fb9411c2853b283 CVE-2024-20994,0,0,b3403ec5f8f7e61f7f4af0c6aace34821d061ec3c3a5defb0a1731263df52eb0,2024-04-26T09:15:09.500000 CVE-2024-20995,0,0,b95ab7ba1796a5c7c3d8cca5a05491e5c3405546d94cafab94c4e486e52dbfc6,2024-04-17T12:48:31.863000 CVE-2024-20997,0,0,a0562a98fec8a4ebdffc03b42c8a9bd17be145809ca03786920461d7f7935e0b,2024-04-17T12:48:31.863000 -CVE-2024-20998,0,1,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000 +CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000 CVE-2024-20999,0,0,38d72c1914c2f7cd32bbca38dbf6b31d7cdb66a1301d3d4028479f0594575e11,2024-04-17T12:48:31.863000 CVE-2024-21000,0,0,b798a7a05ed2c5c61deffa53fd920f65f082fefcd1be9dcb2f05765ff755e538,2024-04-26T09:15:09.633000 CVE-2024-21001,0,0,3ea0c4d6e032b3ca8ec16b34404a4967da44fa0d30a3f03ab34610e8d8a28c90,2024-04-17T12:48:31.863000 @@ -242987,7 +242987,7 @@ CVE-2024-21006,0,0,24276fa121e200514fbab563a229066611a958ddf026b368bb42bffc3d6d1 CVE-2024-21007,0,0,5e79b59d23f74227973014469c9c006292d5a48a207617d864ea85e415e8727f,2024-04-17T12:48:31.863000 CVE-2024-21008,0,0,180cac58dafa1a6df58140c22b0eca553c92b315a62e4ef184cd9f39162279ed,2024-04-26T09:15:10.100000 CVE-2024-21009,0,0,18229ce1f393c1090ccc124960e638f3e12f15d4c4376268b2d606e28dd897cc,2024-04-26T09:15:10.177000 -CVE-2024-2101,0,1,f64308a9cf2bd395190830ff176a54d77164cf0faaa20d92ded300e0efbb1c30,2024-07-03T01:53:00.530000 +CVE-2024-2101,0,0,f64308a9cf2bd395190830ff176a54d77164cf0faaa20d92ded300e0efbb1c30,2024-07-03T01:53:00.530000 CVE-2024-21010,0,0,0583ed22b473d6988a741927f390c519f270906aef73a2591d45e4735fe791d0,2024-04-17T12:48:31.863000 CVE-2024-21011,0,0,e51db7fcde12c70e147c567049e27d3541f52ee809a17a8d7464122ff2dfd216,2024-04-26T09:15:10.240000 CVE-2024-21012,0,0,1ba8160029b175c6622d869a0e69ea4e7de662e09959c9853286e890342c833a,2024-04-26T09:15:10.307000 @@ -243010,7 +243010,7 @@ CVE-2024-21027,0,0,a03a9045ad57d10d7d7381e34394d810fee044cf8b77728df056807f4595b CVE-2024-21028,0,0,049e0616b7d859ad56707b59abb10619183c31d144be62290937334d919ca094,2024-04-19T17:34:24.897000 CVE-2024-21029,0,0,36d1c8191d52e2f424fb4e6cb31c2c317e624517495ef4e386b75d183f736507,2024-04-19T17:33:31.747000 CVE-2024-2103,0,0,4357f6f4848f7c5880c727dbfe8b97df3dcf5303e95d5a7ff4fdf7062d775ac8,2024-04-04T16:33:06.610000 -CVE-2024-21030,0,1,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000 +CVE-2024-21030,0,0,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000 CVE-2024-21031,0,0,01618b75017bccb998a097106f7e0cf7a3509b8d8b27a6bafd408750ecc49582,2024-04-19T17:31:50.307000 CVE-2024-21032,0,0,de3dd91f4dfaa3177669b2adbe2eddd36feb749dbcecd07e41c89410fae8c43e,2024-04-17T12:48:31.863000 CVE-2024-21033,0,0,2e7eba3cd8fbe6dbb0ec0022fd0a5d8193fa13f9812c0320780e3b72caa0358e,2024-04-17T12:48:31.863000 @@ -243020,7 +243020,7 @@ CVE-2024-21036,0,0,226d345eb757d5c9c3bb396722f293039f19b42c79013a73d9a9b6230995d CVE-2024-21037,0,0,008daff49abfa82869dc407f37cb56857f5d964e85457a4a91c40eb3b9d694f2,2024-04-17T12:48:31.863000 CVE-2024-21038,0,0,6187fdde74ab2405c9dfaf7ec7f4c53ca2824334351a9b2d9fcd49744494b523,2024-04-17T12:48:31.863000 CVE-2024-21039,0,0,49a2d5d7bc00bf377e585a02f4f5ccfcc2587e8f75fc7c62cf031f2d92057bec,2024-04-17T12:48:31.863000 -CVE-2024-21040,0,1,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 +CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 CVE-2024-21041,0,0,de835777516670f61385f64273b8ad48df5cd361214a943fb968f07cf218636c,2024-04-17T12:48:31.863000 CVE-2024-21042,0,0,55cfa49e541a98c8c46c0984731cf65bd60394e99ffa86b77041311895d8fe86,2024-04-17T12:48:31.863000 CVE-2024-21043,0,0,dc53e5b2fe828c248a1b79bd90c649b6e9d473f8d2bf850bfa71770b33e8828b,2024-04-17T12:48:31.863000 @@ -243033,11 +243033,11 @@ CVE-2024-21049,0,0,7054a195f3429edd9476cd9dfa40257598e09d87ccf8f54b2b49bb0bfb4da CVE-2024-21050,0,0,f98fec72eb6309b4b34ce86a8c3fc1af06635e46cd1cd5c3eb0a8d6c20caca8c,2024-04-26T09:15:10.637000 CVE-2024-21051,0,0,730cfd973bf7091010cd7d085d104e60aabba29ee2a6c8c244aff9d1cbbed2ab,2024-04-26T09:15:10.703000 CVE-2024-21052,0,0,8fcaea640b31493e5de3c6ccb4ebeb658571630df3fef65a5175d6e228e8694b,2024-04-26T09:15:10.767000 -CVE-2024-21053,0,1,7fef0dc012419ed4a2e2c8a891096cd3e5ba1da6901d2a12026f2e7f8894c29a,2024-07-03T01:46:26.233000 -CVE-2024-21054,0,1,835b9f20e0e5a67456e3f5d7374f40411fa327258971531851fde9f6c745e99a,2024-07-03T01:46:26.957000 +CVE-2024-21053,0,0,7fef0dc012419ed4a2e2c8a891096cd3e5ba1da6901d2a12026f2e7f8894c29a,2024-07-03T01:46:26.233000 +CVE-2024-21054,0,0,835b9f20e0e5a67456e3f5d7374f40411fa327258971531851fde9f6c745e99a,2024-07-03T01:46:26.957000 CVE-2024-21055,0,0,2df92d5c8d1855c6d37c903263abdc53486ae44cb92f073c6ae1754af77b63df,2024-04-26T09:15:10.953000 CVE-2024-21056,0,0,579cbfc70c1c9aab939983ee7e32b20bd0bb975794ba9eef2d4101c6cd0ec5ba,2024-04-26T09:15:11.017000 -CVE-2024-21057,0,1,c1217f83633c24cb2e62e95ffd4860f165c284aba6906919eece4336c921ccc6,2024-07-03T01:46:27.783000 +CVE-2024-21057,0,0,c1217f83633c24cb2e62e95ffd4860f165c284aba6906919eece4336c921ccc6,2024-07-03T01:46:27.783000 CVE-2024-21058,0,0,eae646366535f64911b6f5c11cf05f1d61655fe725482e333195d91352108784,2024-04-17T12:48:31.863000 CVE-2024-21059,0,0,d0601741f771540671417f30cde21017e42f48bcbaa909a0b589bd2b89204ba5,2024-04-17T12:48:31.863000 CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000 @@ -243045,7 +243045,7 @@ CVE-2024-21060,0,0,b942e5dad21401bfd1ddb5c1762fba0f27820544c03df6084d9db3684eef1 CVE-2024-21061,0,0,c067c76274d3dd0d768c412c439a785c45be17779bda9b8868cf83195c350110,2024-04-26T09:15:11.143000 CVE-2024-21062,0,0,8c99a8a390e279e41608a032223c81c88432586b692c9bfab98f514db375d2e0,2024-04-26T09:15:11.213000 CVE-2024-21063,0,0,00386ec9dcc1fb2e461a93486ecd091af48c62d800497f6a70a354e04b74b45f,2024-04-17T12:48:31.863000 -CVE-2024-21064,0,1,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 +CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 CVE-2024-21065,0,0,5c383c00c861b9299dc3d8d083a6c7b2ef320b710a4f76187481f80141c2960a,2024-04-17T12:48:31.863000 CVE-2024-21066,0,0,de5f164f54f519fa892c56099d5df7cc21033da5ed96c3454d6c06c478b93607,2024-04-17T12:48:31.863000 CVE-2024-21067,0,0,a54cc3b06c3985193c6346b3dbabf214dd2faeed68c1d4b7f9a909ecc6ea6d17,2024-04-17T12:48:31.863000 @@ -243067,7 +243067,7 @@ CVE-2024-21080,0,0,01811d1f17c04832a5c53ff5c25f7b600d2f5efedad9bc1c4e4ea77f8597e CVE-2024-21081,0,0,8525b7c574e97940ea59e5c3f9b60a1dccb8ad8d7a8590b7c7a54ff25a5e4348,2024-04-17T12:48:31.863000 CVE-2024-21082,0,0,c26bfca8435f62f7a91a96e3ea3770988e364ed37b65c6e9e3c3fa331f2f9538,2024-04-17T12:48:31.863000 CVE-2024-21083,0,0,1bebe608617a7b6c263f2bd12f08aa2fed726df83e43e9cb80226396336525ef,2024-04-17T12:48:31.863000 -CVE-2024-21084,0,1,3ecf39fd228939a2dce5544ec5b78321dcd296bd51eedb006c227a11eff8a7bd,2024-07-03T01:46:30.583000 +CVE-2024-21084,0,0,3ecf39fd228939a2dce5544ec5b78321dcd296bd51eedb006c227a11eff8a7bd,2024-07-03T01:46:30.583000 CVE-2024-21085,0,0,0058a664b0df21c244c1d472b5e2011b273e74051e0bea775e1fbfbea1bb74a2,2024-04-26T09:15:11.447000 CVE-2024-21086,0,0,6225dbda94f0cf6447c5470d5f742e2b6c9860df4608d2672fbec36d7710ddae,2024-04-17T12:48:31.863000 CVE-2024-21087,0,0,f8237848d938fc88482015bdb3b6d1a78dccab6ea7842d043b863cb9cebae2ad,2024-04-26T09:15:11.543000 @@ -243075,11 +243075,11 @@ CVE-2024-21088,0,0,0b47b6e6f749e55fe17c53a0cff2705786e752e1ca3d888cedabbece54b4b CVE-2024-21089,0,0,7ae0e2f140ca265b5d64456eb374dbc3af60cb417339d84d08e68381e3cd98b4,2024-04-17T12:48:31.863000 CVE-2024-2109,0,0,89609790095cc0b59640b182b51cb1ac6a5a02de2cf22383cb4f12d8da91c579,2024-05-02T18:00:37.360000 CVE-2024-21090,0,0,60f046f0a9c5304d80718309bd3f85c9cf0c6185072eb892eff16f11c4191497,2024-04-17T12:48:31.863000 -CVE-2024-21091,0,1,9a3043aa88572c51cb2bee778e3b5eee6044532371caffcb433155119b6a18eb,2024-07-03T01:46:31.737000 +CVE-2024-21091,0,0,9a3043aa88572c51cb2bee778e3b5eee6044532371caffcb433155119b6a18eb,2024-07-03T01:46:31.737000 CVE-2024-21092,0,0,a96f28afb2f79eb08be708f78284cdf08500da8888a0d9699ed9e4b0d6e8e593,2024-04-17T12:48:31.863000 CVE-2024-21093,0,0,3d565421d62fe80376ef2125e9dfb06fdc2a836fda042dda6ad1a1534f2a4f7d,2024-04-17T12:48:31.863000 -CVE-2024-21094,0,1,263056239ff6ad0bc667e8c6542629ef5df05fe8ce26e38409cfe58bcbaf0d28,2024-07-03T01:46:32.570000 -CVE-2024-21095,0,1,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4f33,2024-07-03T01:46:33.287000 +CVE-2024-21094,0,0,263056239ff6ad0bc667e8c6542629ef5df05fe8ce26e38409cfe58bcbaf0d28,2024-07-03T01:46:32.570000 +CVE-2024-21095,0,0,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4f33,2024-07-03T01:46:33.287000 CVE-2024-21096,0,0,f886e9f1346c46c50df462685f956aa1271b364c94bcf6ac8ddc7ccf2fe96a82,2024-06-18T02:15:09.823000 CVE-2024-21097,0,0,8349406a296787533db135239586ab1e354af73ee7e59b17b17098f82af1b697,2024-04-17T12:48:31.863000 CVE-2024-21098,0,0,831ff7ad8d2c7af64e56d89acbf46d4cc91ab5d8748a94e6b6ad4c192afd1308,2024-04-17T12:48:31.863000 @@ -243113,7 +243113,7 @@ CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8 CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000 CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000 CVE-2024-2117,0,0,d94804a9fc0846420aec73bfb7661886dd6c525cbdcae51571bcd3adf1a56a79,2024-04-10T13:23:38.787000 -CVE-2024-2118,0,1,8cc75b149351247ebd9b7f215d921c62e30056d8a3359ddec0c5f6ccbae617de,2024-07-03T01:53:01.593000 +CVE-2024-2118,0,0,8cc75b149351247ebd9b7f215d921c62e30056d8a3359ddec0c5f6ccbae617de,2024-07-03T01:53:01.593000 CVE-2024-2119,0,0,fddfb28891aa483f76592c7c27b82101a08176e818c0033898539a16e1ac7da1,2024-05-22T12:46:53.887000 CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000 CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000 @@ -243319,7 +243319,7 @@ CVE-2024-2150,0,0,cf5a5d3bf641537c55201147042c523c1cbd4d23088b2e4aabb2f5daef8816 CVE-2024-21500,0,0,c7cd747e0f0c4b38d8e4dbe19bee0ca66b1639098d16200b89805bcc371371ae,2024-02-20T19:50:53.960000 CVE-2024-21501,0,0,123be261b7f019199f015b76dce85111faae1f8c46476c73a31f61e53780c904,2024-06-10T18:15:25.273000 CVE-2024-21502,0,0,4303e1ae1b6dcbd72e1c376c19ab8a2359e92d842fa95b6d253e62be71a359d4,2024-02-26T13:42:22.567000 -CVE-2024-21503,0,1,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000 +CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000 CVE-2024-21504,0,0,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46 CVE-2024-21505,0,0,790ab171c9e46ac93718d1bb5680fe990f4ed1edc4d489f5e4dab09077e05267,2024-03-25T13:47:14.087000 CVE-2024-21506,0,0,6b97e4d4a271672352300824f36b76f10f9a4b0847e1f645fc21c5d93ab418f0,2024-06-05T15:15:11.173000 @@ -243331,9 +243331,9 @@ CVE-2024-21511,0,0,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e CVE-2024-21512,0,0,aa76b050e4c93f61d8197b2abb831a8245fb81d83da1143493979b801398852e,2024-06-06T13:15:31.390000 CVE-2024-21514,0,0,e46d2510c7d7d4af2532b103543d4d4cc9a1ce528ea64400d0426ee8dac1b60c,2024-06-24T19:59:16.767000 CVE-2024-21515,0,0,0328aa4c891cdd4af83806c0833511fbd9428103cda9e00c6fd9a5ee4d968daf,2024-06-24T19:58:28.987000 -CVE-2024-21516,0,1,abe3a9cd7507c4a7cc049f342ee17d37e317ed8b9557eb7b4e8fb458fc8f5c80,2024-07-03T01:46:42.813000 +CVE-2024-21516,0,0,abe3a9cd7507c4a7cc049f342ee17d37e317ed8b9557eb7b4e8fb458fc8f5c80,2024-07-03T01:46:42.813000 CVE-2024-21517,0,0,186f90d2088e8e33683da894eb00f6f13b8f4ae5479bdad5267ce001807a583a,2024-06-24T19:56:45.167000 -CVE-2024-21518,0,1,01d6f2ab49352480cf19019c7c7e4b7fa996341e6363bf5c2aff55de9f9b49d0,2024-07-03T01:46:43.670000 +CVE-2024-21518,0,0,01d6f2ab49352480cf19019c7c7e4b7fa996341e6363bf5c2aff55de9f9b49d0,2024-07-03T01:46:43.670000 CVE-2024-21519,0,0,bf9643fa21c9312ad7f9de95a92dae918c8943fd492bc976b0551db532a526a1,2024-06-27T13:15:55.027000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-21520,0,0,719b2dc3254f707e72c103bbdbbe58152dcb2f4bbbb92f02a73b99a9ae3141f8,2024-06-26T12:44:29.693000 @@ -243433,7 +243433,7 @@ CVE-2024-21677,0,0,cd63a9344db53196b5943e582014caefd2ce4c1e61501d807a03293e59d4b CVE-2024-21678,0,0,a74398aed7f752b8a4413bad434f2adf6ab8a95bc47028b48620e299957a54d0,2024-02-20T19:50:53.960000 CVE-2024-2168,0,0,b854878eddfae20c7bf7090b800e5793dbeb1896e489304f1c2dd8d4439ad998,2024-05-17T02:38:05.397000 CVE-2024-21682,0,0,6b4858b4700d4b6ec3ad8145ec0ece417db20d31f4042e4246bb7ce7db07ab15,2024-02-20T19:50:53.960000 -CVE-2024-21683,0,1,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000 +CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000 CVE-2024-21685,0,0,e2cb496c7456474dc422afe7a0ecdd1596dce839e094299685a35eed8de7809e,2024-06-20T12:44:01.637000 CVE-2024-2169,0,0,151ccb2c8e1a2ae0c1ec7f646f803cafe134a2f43c3cebd718a131296f39d84d,2024-03-20T13:00:16.367000 CVE-2024-2170,0,0,ecb9a4c8858b9f58e40341aa169d3b7c37f3c5e40f6e92367b411525d123f7bf,2024-03-26T12:55:05.010000 @@ -243446,7 +243446,7 @@ CVE-2024-21725,0,0,bdf9c93b4a7ea1086142df5e839e5b4f02916d7ec678326728b59bee6aa76 CVE-2024-21726,0,0,f58382291c9f1461cf13ca0d051f8f0f0c9fa0278dc3151fc85e945cfade72ff,2024-02-29T13:49:29.390000 CVE-2024-21727,0,0,b27ab17b4cf9fa0c975b07ecf9db3a828358193d90226e060ebcb50e44b258d3,2024-02-15T14:28:31.380000 CVE-2024-21728,0,0,0d7074802f0bbe539004625d566f506428ee0f00b86885184a6c8af5d1b929ba,2024-02-16T13:38:00.047000 -CVE-2024-2173,0,1,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 +CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 CVE-2024-21732,0,0,7a8bdaaf9609522ec086cb797e1911cb25fd0ba362f1f69c1302646455757ad6,2024-01-08T18:51:23.740000 CVE-2024-21733,0,0,6a822bcba55aae3b24fb21f4cd21d6c25ecbe736276d21ef2a3d97f8f805110a,2024-02-16T13:15:10.190000 CVE-2024-21734,0,0,652c558bfc482936599b7d824ea3a77e00ef63d3b87116475d92e963662baebc,2024-01-12T16:34:40.870000 @@ -243457,7 +243457,7 @@ CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819 CVE-2024-21739,0,0,07f93ee1de6db4cd150e8044f6df8dfeec5c0df6671390dcd392c083d70bdcb1,2024-06-26T12:44:29.693000 CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000 CVE-2024-21740,0,0,80331fbcb4933bf7f4b07b3e6c688ccc6372ad93a7d99105a5d11a968ea5fbe7,2024-06-26T12:44:29.693000 -CVE-2024-21741,0,1,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 +CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000 CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000 CVE-2024-21745,0,0,bf3a505c3e58c8e06145ffd7ba2bd556421c95bc4b61cb5874ba3a8a81e74cc4,2024-01-11T18:45:19.053000 @@ -243491,7 +243491,7 @@ CVE-2024-21785,0,0,46bd06c347f5d7360c065beeb6507b52c4cc85b4c48098eb453bc83e12d33 CVE-2024-21788,0,0,38da0f632cd1fea2a38481fa5d82800cc79d63e45addfec9f74ba1417b51ce70,2024-05-17T18:36:05.263000 CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000 CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000 -CVE-2024-21791,0,1,787b38572829aab753d6cfdda2787bc47cd39c47a22a59d3029267970cc9daab,2024-07-03T01:46:48.367000 +CVE-2024-21791,0,0,787b38572829aab753d6cfdda2787bc47cd39c47a22a59d3029267970cc9daab,2024-07-03T01:46:48.367000 CVE-2024-21792,0,0,f0ad507f0eb84dd7d85ebb6df20be3f06e6ebf8ecfb2115a3ca7d7445f51f11c,2024-05-17T18:36:05.263000 CVE-2024-21793,0,0,b55902d470d37a2479e376b66a185ed8b4afdd3b18a61089b937f4c3059f5d26,2024-05-08T17:05:24.083000 CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000 @@ -243505,7 +243505,7 @@ CVE-2024-21805,0,0,0cc71f66658f89ba3aa136c4707e117e9b180b89a5ccd9ebabe7b07f7d2cf CVE-2024-21809,0,0,f76a941a1ff5266e5377b205eec9435b0913d9cc5f891c8ba5bc78c4548798bb,2024-05-17T18:36:05.263000 CVE-2024-2181,0,0,a2fd878694432bbeda0e10d1053b12e99b3f48073d2428b435e4e90241d01c63,2024-04-10T13:23:38.787000 CVE-2024-21812,0,0,17aa7837957a8314d8283bcd6803c6ec88b5ca54481af89e2e3321502a717b6c,2024-04-02T15:15:52.650000 -CVE-2024-21813,0,1,612fc9e5e1b11dee0bfc71c94e5d870ebaf8f3e7e8c28582b4730e725388cfa7,2024-07-03T01:46:49.307000 +CVE-2024-21813,0,0,612fc9e5e1b11dee0bfc71c94e5d870ebaf8f3e7e8c28582b4730e725388cfa7,2024-07-03T01:46:49.307000 CVE-2024-21814,0,0,dddfdfc1e42fcccf3ce7b2bb13840091d318cff72fb9f26cd1ec562ce0c74599,2024-05-17T18:36:05.263000 CVE-2024-21815,0,0,ab91a303e2db960020337e0aa80545ce17eb52c46e86c32df0cef6312db60a85,2024-03-05T13:41:01.900000 CVE-2024-21816,0,0,ed35c1f8ddc7850dea188572415674feef10c1ffe60798b90d7a35a6b1fca0ac,2024-03-04T13:58:23.447000 @@ -243517,9 +243517,9 @@ CVE-2024-21824,0,0,3bddb01433a875d84e1ff57d3fa88062c16a6aea3448fe5a7afcbbae2986d CVE-2024-21825,0,0,1b47c3f0e2bb27ba429b8b0ff73ec4e737b53c8991d881956fe812d8a2d73bd5,2024-02-26T18:15:07.390000 CVE-2024-21826,0,0,db46d5d52cce4b3faca9d1878c694b0b714eba4ae02907457ece6927043134cc,2024-03-04T13:58:23.447000 CVE-2024-21827,0,0,812c74c9ba8d71849167f2a6716a320f7245bf6b8b90ac7020ded0508bcc1dcd,2024-06-25T18:50:42.040000 -CVE-2024-21828,0,1,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000 +CVE-2024-21828,0,0,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000 CVE-2024-2183,0,0,d2fc5903dd12fc59dfdda0bd9c528b50368a6c295b02593ecad0115a711b3755,2024-04-10T13:23:38.787000 -CVE-2024-21831,0,1,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 +CVE-2024-21831,0,0,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 CVE-2024-21833,0,0,d495db7ecc3e5eea6a844ebf68934df72f88808ddb4472cc88d71eac4c0a6284,2024-01-18T18:26:59.627000 CVE-2024-21834,0,0,adfdacc4c0ad7fb798fc6feea300b691936e258291634c57f962c7e425f92b08,2024-04-02T12:50:42.233000 CVE-2024-21835,0,0,fb0916fa42539929733a385b3b3838d919de0dc39f62f3f217cea291341fe53a,2024-06-07T17:48:28.307000 @@ -243529,7 +243529,7 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000 CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000 CVE-2024-21841,0,0,1ef7e6e8b2964a91e0a0a8934574e0d82bee2205fbe548cfb37b58592f6d6e55,2024-05-17T18:36:05.263000 -CVE-2024-21843,0,1,5c410450f108a72387931ae84dd4efc7ecf10bc87d25368775ef5471dda9e3bf,2024-07-03T01:46:52.670000 +CVE-2024-21843,0,0,5c410450f108a72387931ae84dd4efc7ecf10bc87d25368775ef5471dda9e3bf,2024-07-03T01:46:52.670000 CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000 CVE-2024-21846,0,0,512115685a3e2b33a587ce498f8e7a2dc5af4eb1a32f7fb8c1963942429e6055,2024-05-28T17:15:09.287000 CVE-2024-21848,0,0,1fde96dab5128745ee3e4ea7f8cda5cbe7e9c944949a63485c9658d999c137ed,2024-04-05T12:40:52.763000 @@ -243542,7 +243542,7 @@ CVE-2024-21860,0,0,9745cb77a8de410a197a8548750acfeec47533851fdeac14642298bec1ba6 CVE-2024-21861,0,0,02006d6a0a360d33a49963ff9ba036df087b483429a728bf20220dbc980b8012,2024-05-17T18:36:05.263000 CVE-2024-21862,0,0,144c34a99fca2ab2ff29021e426c6fdfebf22e9c643ef01b52bc5b8896c6655d,2024-05-17T18:36:05.263000 CVE-2024-21863,0,0,271dac2898e305fa77d04d20ca85b0dae0a5a0857bbfa85084510f677962f58a,2024-02-07T18:23:11.090000 -CVE-2024-21864,0,1,d598b0e62a067b81caf056567b896db11a3be7faee98cc9eb033e95fd9880608,2024-07-03T01:46:53.603000 +CVE-2024-21864,0,0,d598b0e62a067b81caf056567b896db11a3be7faee98cc9eb033e95fd9880608,2024-07-03T01:46:53.603000 CVE-2024-21865,0,0,7a0c150742a363fb7b1bfb201c6089eca71d87169fcff3d08a3aee9d2d9b45ea,2024-03-25T13:47:14.087000 CVE-2024-21866,0,0,e7c03b05e2d3f94b4b523aca377b349190d980e16c741cbf713751bf3c07dcf0,2024-02-07T17:27:52.793000 CVE-2024-21869,0,0,48ec62155fd9a810461dcd57893eff3c63fc7d7992b6dd94f9f3d8f38382a25c,2024-02-07T17:29:50.927000 @@ -243551,7 +243551,7 @@ CVE-2024-21870,0,0,eb93ddaf02bbc4698ce65f000ac66cf4bffe10c9c37f8f4faeecaca1a0400 CVE-2024-21872,0,0,22239b31aa97c4b593463d4050e00628060c6b9d8d31d97490cfec35d2339863,2024-05-28T17:15:09.413000 CVE-2024-21875,0,0,d88c7fa028650d8c38c644c89741f5c8883fbb1f9fa5219cf2c447a4b53bf374,2024-04-12T07:15:08.283000 CVE-2024-2188,0,0,50073fcb971d8d943a63e1f3e232811ec9a11d1acf3f48e9da561ed8964c30e8,2024-03-05T13:41:01.900000 -CVE-2024-21885,0,1,9068295558a67fe62442995ec6e89d07cfd310e730d45127d8b53a1f17657461,2024-07-03T01:46:54.537000 +CVE-2024-21885,0,0,9068295558a67fe62442995ec6e89d07cfd310e730d45127d8b53a1f17657461,2024-07-03T01:46:54.537000 CVE-2024-21886,0,0,9d88c691c44df7e3c56c69da8cca3e89baff037b02f5cb7b18f748891d376c22,2024-05-22T17:16:14.343000 CVE-2024-21887,0,0,186d8ed16e2e82e2d98d02e1e469da947894827895381adaa2845388c827f41d,2024-06-10T16:21:07.127000 CVE-2024-21888,0,0,9de3f75608c2ffa998f0bcfa0dcc7f6af68bb755862afa34798392c7baa192b3,2024-01-31T19:53:06.303000 @@ -243559,8 +243559,8 @@ CVE-2024-2189,0,0,755678a5bdbb40e2e701e49c726ff2918078208afc7f267cd9073681b3e848 CVE-2024-21890,0,0,a23e39bf178457ea1a62055175acdccf21db560a2e161d84f67585a3aec660a5,2024-05-01T18:15:13.430000 CVE-2024-21891,0,0,a2485cf665b74852ec579d22867079892dab474f76b17a713a8f19b29fc1374c,2024-05-01T18:15:13.500000 CVE-2024-21892,0,0,0a2d4c2722cd9d0c5169a54525f85c8a3a71dec229f64a884ec45af2c9ceefca,2024-05-01T18:15:13.610000 -CVE-2024-21893,0,1,e6c8de16df34a44a76a97b9b1d88a4dad03789192b9eaacf3482dda91a673010,2024-07-03T01:46:55.640000 -CVE-2024-21894,0,1,99d4be035674fd6f5aa2e0bb3c54ccc20c81ba516b5e4a7075a4f68df66ede3d,2024-07-03T01:46:56.430000 +CVE-2024-21893,0,0,e6c8de16df34a44a76a97b9b1d88a4dad03789192b9eaacf3482dda91a673010,2024-07-03T01:46:55.640000 +CVE-2024-21894,0,0,99d4be035674fd6f5aa2e0bb3c54ccc20c81ba516b5e4a7075a4f68df66ede3d,2024-07-03T01:46:56.430000 CVE-2024-21896,0,0,c4faded4836c068721da2d463fea335960350fed751393a368c4ddefc5978706,2024-05-01T18:15:13.687000 CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000 CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000 @@ -243600,7 +243600,7 @@ CVE-2024-21989,0,0,ff0faa596af54ed5ae8099ba628458de998e57d9e93fbba155c9de7f27b73 CVE-2024-2199,0,0,31e85cc8f708ae33d11caf88fb8f95bb65ee9b7c3962b91a3deeeb287e629ff4,2024-07-02T23:15:10.617000 CVE-2024-21990,0,0,0b4ba6f896ec2fdb9c7522d6449f5c0166971932fa2ba6c5f18beb5ae9a5b96a,2024-04-18T13:04:28.900000 CVE-2024-2200,0,0,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000 -CVE-2024-22002,0,1,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 +CVE-2024-22002,0,0,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000 CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000 CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000 @@ -243611,14 +243611,14 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad CVE-2024-22011,0,0,a4e97c7f0f5404ca7a76cbebfc7c0a8de2f95a8e9b552d17a02deebc519bdec2,2024-03-12T12:40:13.500000 CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000 CVE-2024-22014,0,0,79bf9edaea087eb4739d179f2ed69981a390cf89f67c6fe45526acb6cb4887ec,2024-04-15T19:12:25.887000 -CVE-2024-22015,0,1,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 +CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,eda129adeae4ecfa4b275b7bc6bb5638800d036cf47c85fe2baa6a803f743c01,2024-06-10T17:16:18.773000 CVE-2024-22019,0,0,49190872720c4c119c607cdd3cd1206179dcd2b84c9cd0a4595a1040743a11fe,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000 CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000 -CVE-2024-22023,0,1,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000 +CVE-2024-22023,0,0,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000 CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000 CVE-2024-22025,0,0,8df8368d53c6b0aa2e92c5a6d4608e201433aebd46fd17e0cf5482211e1088ef,2024-06-10T18:15:25.577000 CVE-2024-22026,0,0,3bdc95eb798660b93c55f5c4cd51e979b7b2ea5880fd0a7947a517a2a1795f62,2024-05-23T15:17:25.833000 @@ -243639,13 +243639,13 @@ CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c621957 CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000 CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000 CVE-2024-22052,0,0,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000 -CVE-2024-22053,0,1,fcc7090aebe2df352917521dee947feb77d6dc39631742e8018d520fad4e92a3,2024-07-03T01:47:01.167000 +CVE-2024-22053,0,0,fcc7090aebe2df352917521dee947feb77d6dc39631742e8018d520fad4e92a3,2024-07-03T01:47:01.167000 CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000 CVE-2024-22058,0,0,2edaa6959cbfe6a9fa9d45e5111a81d4ebaa88dfee56fd716b2def1fcb46404e,2024-05-31T19:14:47.793000 -CVE-2024-22059,0,1,50d90b3cb7f9bf66ee5ba944e169106caf70e42a039b7301c7281a7acc269806,2024-07-03T01:47:02.030000 +CVE-2024-22059,0,0,50d90b3cb7f9bf66ee5ba944e169106caf70e42a039b7301c7281a7acc269806,2024-07-03T01:47:02.030000 CVE-2024-2206,0,0,89bb78f285eca92521ddf90479f409077fb3db3aa39188b40e35723bcbb7e9a7,2024-04-16T12:15:10.187000 CVE-2024-22060,0,0,8196312ba8e15fb6a16f27d7e77100a283cd190872d1648c8877d6e45bc67f8c,2024-05-31T19:14:47.793000 -CVE-2024-22061,0,1,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 +CVE-2024-22061,0,0,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 CVE-2024-22064,0,0,c629ceda13b1d36f0f60a6ea95a2c77f87751465f007aa3a59355e800a89dfe9,2024-05-14T16:13:02.773000 CVE-2024-22074,0,0,959aaae231895ad1dab22cc5268e854f7f776fc321d5804e91f78b08ec2f5391,2024-06-07T14:56:05.647000 CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000 @@ -243666,7 +243666,7 @@ CVE-2024-2209,0,0,eeaa5baaa32a49eda6878a59f2ebb6696131e5d9ac6771a3c4e8da4f915f93 CVE-2024-22091,0,0,dc570940b7ab49002875ff65e39f32c1969cc3886a9c720bac1bdb544d2393e3,2024-04-26T12:58:17.720000 CVE-2024-22092,0,0,35cd11c9c07a47737b4e29cb95e656383a3704154bd1a4578e67800eda161eb7,2024-04-02T12:50:42.233000 CVE-2024-22093,0,0,b7c449b9319413a66024fe7dcdb8bf0035d00dbeef636282eb761ad13794295d,2024-02-14T18:04:45.380000 -CVE-2024-22095,0,1,626bfaf44345bbe4e9983a24af7501d010f455b3385d9a6f62ce99af00466cf4,2024-07-03T01:47:03.793000 +CVE-2024-22095,0,0,626bfaf44345bbe4e9983a24af7501d010f455b3385d9a6f62ce99af00466cf4,2024-07-03T01:47:03.793000 CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000 CVE-2024-22097,0,0,dc5034d6090bb42f5640214b5fe568fb1a52ad7dbb7e8b0261ed05bfcaebecb1,2024-04-02T15:15:52.733000 CVE-2024-22098,0,0,143b86afbf5a983f03c2f584969195c0ed3a1e44177534377f9bd3d74e39f2b3,2024-04-02T12:50:42.233000 @@ -243674,10 +243674,10 @@ CVE-2024-22099,0,0,1ca221f767509ed389320bf6e17bb08d430c1bb802873593e5ee88df116cf CVE-2024-2210,0,0,5a03f758877779e9677ec1f83746a6fce63214add6c369b78804c38534e8d822,2024-03-27T12:29:30.307000 CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000 CVE-2024-22102,0,0,d95547a89c084be0eb15a34268c23156cd9dcb017353433ab47ab8013a00898c,2024-07-02T17:44:45.700000 -CVE-2024-22103,0,1,df31d6a9f48aa48f01b40433d5c00619bb455399975aab2700dd8183ff7ea955,2024-07-03T01:47:04.630000 +CVE-2024-22103,0,0,df31d6a9f48aa48f01b40433d5c00619bb455399975aab2700dd8183ff7ea955,2024-07-03T01:47:04.630000 CVE-2024-22104,0,0,0c00a222c49023fb7d23209c7a2e23d50832446a91f69f43dbf37e749397fc53,2024-07-02T17:44:45.700000 CVE-2024-22105,0,0,af1c58cbed2ba7357c4b3cb20ef053301db567530bde3b44f88c2c6bacb21416,2024-07-02T17:44:45.700000 -CVE-2024-22106,0,1,52a43b0c9b783aa52ea821e92300a8c5acd357122ee7e7081d92784e9bb2abf6,2024-07-03T01:47:05.580000 +CVE-2024-22106,0,0,52a43b0c9b783aa52ea821e92300a8c5acd357122ee7e7081d92784e9bb2abf6,2024-07-03T01:47:05.580000 CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000 CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0793,2024-02-09T19:39:12.853000 CVE-2024-2211,0,0,f252c5769fd953dc08095bc92fa002da1e59442805565547bd754c92279eb026,2024-03-06T15:18:08.093000 @@ -243715,7 +243715,7 @@ CVE-2024-22148,0,0,eb4d4a193f2153f5fe3df79c79a6ba27f52e6d1edc409f8c9f4419f061b12 CVE-2024-22149,0,0,993c76a1c016f836df9d96f9ff69fb5ecade44a2c16fb44ee1e8795031628948,2024-03-27T12:29:30.307000 CVE-2024-2215,0,0,bab2a3391ec80ee40463865cb86e61a9df2c78bd495d21727bd044393f96dc6c,2024-05-01T18:15:19.133000 CVE-2024-22150,0,0,73a6449bdd862cb4aceb7dfcabf00926f0730684d1b40796cd1922a1d89122f5,2024-02-06T15:42:52.927000 -CVE-2024-22151,0,1,dd28f3ab075e860268614df2897be6953e355259213176a1b898c65c31ebd23d,2024-07-03T01:47:07.170000 +CVE-2024-22151,0,0,dd28f3ab075e860268614df2897be6953e355259213176a1b898c65c31ebd23d,2024-07-03T01:47:07.170000 CVE-2024-22152,0,0,77741f5ed7ba0cff2726117ba8b408bddeb0ad8028c0019d800ba91134fb10eb,2024-01-30T17:36:20.533000 CVE-2024-22153,0,0,183cafa541cc9d6796e6f60d4f84cc3fefe9e93bd9495a8b813ab36c05739148,2024-02-06T15:43:49.957000 CVE-2024-22154,0,0,c5d6f5ccc259910245679ed3525d0fea5ed728e2e4ec972b00aa2e1bbd5206eb,2024-01-31T20:20:56.647000 @@ -243737,7 +243737,7 @@ CVE-2024-2217,0,0,07b67ca85e13a2c6962db1475a9d0f8a931b674f51497121f9a33c8078bd4b CVE-2024-22177,0,0,1ff2297e612a95969b8693bc6a53ecafa7223eba267b1cfe298d3bc1fedfbe99,2024-04-02T12:50:42.233000 CVE-2024-22178,0,0,894383da751aaa1046c611146ada59662a01e512644efee9e31c744bf34674c7,2024-04-03T17:24:18.150000 CVE-2024-22179,0,0,077a89cd90d357917ee36a8e199f939ad2a69cb604b53e3f5f34bba5fb27b47b,2024-05-28T17:15:09.547000 -CVE-2024-2218,0,1,5b034e25a8a8d43ef39f575ebdde025e2af6f0733566077f07a201f593a25e73,2024-07-03T01:53:05.340000 +CVE-2024-2218,0,0,5b034e25a8a8d43ef39f575ebdde025e2af6f0733566077f07a201f593a25e73,2024-07-03T01:53:05.340000 CVE-2024-22180,0,0,19e9318ece70bb0e88968bad696b07798db0b84c54153f426e33acb6b2d89f93,2024-04-02T12:50:42.233000 CVE-2024-22181,0,0,aa4f7fc8e8236ce5a2a5625d560e720bca0124d088633712af3a8c63643e6bd8,2024-06-10T17:16:18.890000 CVE-2024-22182,0,0,33412ce4ff69d7e4ec2fcd049c27451f4c9a424792b679659080bdcd047dcd32,2024-05-17T02:36:15.670000 @@ -243755,7 +243755,7 @@ CVE-2024-22196,0,0,4bcfd4815ebe8b8ac03d174d4f1a94c36139d4fdd43fce25d3760cfd5295f CVE-2024-22197,0,0,a31ca1c384eec2a677476912822646145621e94067b0724bef0f1faae8385d2c,2024-02-29T01:44:05.423000 CVE-2024-22198,0,0,9a6bcb1ffad51ec0771f4ce3c1b7886e912e42c7538e92dc9b11917bc0812a1c,2024-01-18T19:14:25.667000 CVE-2024-22199,0,0,77eb611a7b277cb248918b51763a94c433dcad8aa85fdccb191ccbbd344bf772,2024-01-18T16:54:56.383000 -CVE-2024-2220,0,1,5af099dd8defb36fcecf9c835f2050bc314a5c4729a60014994ecad4b361ccff,2024-07-03T01:53:05.537000 +CVE-2024-2220,0,0,5af099dd8defb36fcecf9c835f2050bc314a5c4729a60014994ecad4b361ccff,2024-07-03T01:53:05.537000 CVE-2024-22200,0,0,2d2dc6aa2d6e67d6ce2d4538edbff74b41b0708f1b4ceb17fe23c3c985c7a985,2024-02-08T17:01:25.927000 CVE-2024-22201,0,0,6f117e6246b1dc90ddcd71a7294d55f574229c0f2f36a0c40df2284de244b48a,2024-05-01T18:15:13.847000 CVE-2024-22202,0,0,e1aee0413d2fb0642bc93b11c1c7a422f2cb02fde5420d88a13d06e7e36aba6b,2024-02-13T18:30:53.013000 @@ -243799,8 +243799,8 @@ CVE-2024-22241,0,0,496f061bf551a3619640a70a8bba0bd7b22a646ffcd7631f69738ec433aa1 CVE-2024-22243,0,0,6324ece72c10b2aa24e493775157f043a82a34dd2651ccf585a3e747b1c10c65,2024-06-10T18:15:25.757000 CVE-2024-22244,0,0,dba693b18f33ed082209a3d3f3d2de08ada28a695c46abcbcc3a38f60d7e7b06,2024-06-11T13:54:12.057000 CVE-2024-22245,0,0,927c448062746f597b41ffcf29cd16f5426f577e5bde39a0c34f8f665ebf4695,2024-05-17T02:36:17.103000 -CVE-2024-22246,0,1,76171b54a9144a796e871026656a5c18298d50d46b7b4fd57d1a0e8c44956850,2024-07-03T01:47:08.260000 -CVE-2024-22247,0,1,5dceb0753aeffb2a61cefe474810b3d4538fb7426596059650e37c1a32336c77,2024-07-03T01:47:08.997000 +CVE-2024-22246,0,0,76171b54a9144a796e871026656a5c18298d50d46b7b4fd57d1a0e8c44956850,2024-07-03T01:47:08.260000 +CVE-2024-22247,0,0,5dceb0753aeffb2a61cefe474810b3d4538fb7426596059650e37c1a32336c77,2024-07-03T01:47:08.997000 CVE-2024-22248,0,0,2ece3a07f4990d2b2cb3328c0a925fd71ff67cafea8fa1b3490e8b19789ebd51,2024-04-02T18:12:16.283000 CVE-2024-22250,0,0,d256c1ae83efcb4fd0767134e7c2a7cbb8c79785a1e10a237d283f4bb314783d,2024-05-17T02:36:17.283000 CVE-2024-22251,0,0,2c97f940db42ae011ed6a48babf352df0cd9a0c6766b6bcecb43c6a36d93a587,2024-02-29T13:49:29.390000 @@ -243811,22 +243811,22 @@ CVE-2024-22255,0,0,505a899b5cd44111ec51f06319a556c9dfde5553a6ebdfc520dd74bd3e8c9 CVE-2024-22256,0,0,7ccfa1d456f911dd1ae59428e390bb74a9bd8e0f03e6ec12672c279cdd5bf898,2024-03-12T15:01:32.347000 CVE-2024-22257,0,0,874ff0a72fdff7945c5fa3fbbe0cdd5ca05cc513db9be5811beb7a84e897ff09,2024-04-19T07:15:09.223000 CVE-2024-22258,0,0,73834c066fffbf1ceac081ac0d8fd511b8fd9e870301a54667895cd45741a179,2024-03-20T13:00:16.367000 -CVE-2024-22259,0,1,1619807ca0dd0d25e590483ba5fe046c92691b86131dda52a5fc321e717fd519,2024-07-03T01:47:10.080000 +CVE-2024-22259,0,0,1619807ca0dd0d25e590483ba5fe046c92691b86131dda52a5fc321e717fd519,2024-07-03T01:47:10.080000 CVE-2024-2226,0,0,ee8f1ca60db458688b285f09c24138ba2af43e7eda48e7abf64d7861f3a6fd0e,2024-04-10T13:23:38.787000 CVE-2024-22260,0,0,1800eaba107462f56167bed05f6ecba42f4ea33d7ec01a035d5fd1b4f699d4b8,2024-06-28T10:27:00.920000 CVE-2024-22261,0,0,becda971f9fe2bc0796e849a1ca6efcee98df6406cf540f6a7792c4f11b5b746,2024-06-11T13:54:12.057000 CVE-2024-22262,0,0,f19b1c11ec8069ac727f7996014f3456fd5a6417d431b01d11ac200419a9bbec,2024-06-10T18:15:25.940000 -CVE-2024-22263,0,1,f896fa0a79a81d0e9a59972a76bdb3f38491a193f39dfa7074f7f8bf4c5f9aad,2024-07-03T01:47:11.083000 +CVE-2024-22263,0,0,f896fa0a79a81d0e9a59972a76bdb3f38491a193f39dfa7074f7f8bf4c5f9aad,2024-07-03T01:47:11.083000 CVE-2024-22264,0,0,96bdae8486634c5f71f7c0824f656da1157e383d5f4bd5d08e042b1398b50bf7,2024-05-08T13:15:00.690000 CVE-2024-22266,0,0,00ca0b0bb686e5de0808c372a0dca387ad248949c8bb90b3dfb3008d90a00e7f,2024-05-08T13:15:00.690000 CVE-2024-22267,0,0,727e40be0aa0227d7b476a6c5d7d557ff3749d3281a0273fd0cde6d1d2dc7d37,2024-05-14T19:18:31.490000 CVE-2024-22268,0,0,8ac3cbde6056dd76380b18daea36d084eaf68822fc6e2befa66f62359bde99b8,2024-05-14T19:18:31.490000 -CVE-2024-22269,0,1,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000 +CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000 CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000 CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac1fc,2024-05-14T19:18:31.490000 CVE-2024-22272,0,0,adae0aee6ad029e4fd483a8691d818f9453c2dae8103d6feb214d470c1deea16,2024-06-28T10:27:00.920000 CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000 -CVE-2024-22274,0,1,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 +CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 CVE-2024-22275,0,0,d091ffc8d821e68d75dc2e136f38c753791a1420e1604ca18001c3ee3e374585,2024-05-22T12:46:53.887000 CVE-2024-22276,0,0,84ef821328733e6d2023f2ca9295825f754ca59ef6a3ea10fbc3d2996560b9b8,2024-06-28T10:27:00.920000 CVE-2024-22279,0,0,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000 @@ -243917,12 +243917,12 @@ CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe CVE-2024-22388,0,0,c4d155a1650cf8d6f3af35aa33a3624b01d880288d632870cec483f12be1e88c,2024-02-14T20:59:09.660000 CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000 CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000 -CVE-2024-22390,0,1,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000 +CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000 CVE-2024-22391,0,0,62341b5152aa1a774d6fbe2b0ec3f90eb73f70a9c84602a13eb88c5ee62936fb,2024-05-05T03:15:06.950000 CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000 CVE-2024-22394,0,0,e453a8f525f8738202a11eba022f3eade3114cf25a7a2366a64db19b418e37dc,2024-02-14T21:46:40.537000 CVE-2024-22395,0,0,6711e106c8c4c38c682ec5a4d729c0e15c9677b5ef0302671313a8f4838fafc1,2024-02-26T13:42:22.567000 -CVE-2024-22396,0,1,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 +CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 CVE-2024-22397,0,0,1449e8939a0a6c79b850fc1dae16eaf04b2e6b2c8511d86f8174b4699c258b21,2024-03-14T12:52:09.877000 CVE-2024-22398,0,0,edf5338da9ca4f3a2eb32b53996533281c3dcfaf909d9756219f2a6e236d1091,2024-03-14T12:52:09.877000 CVE-2024-22400,0,0,75e98c1f1edd6beccc5653abbccb406114df98ae36ae20c7db97671271c6d967,2024-01-26T20:55:37.543000 @@ -244015,7 +244015,7 @@ CVE-2024-22533,0,0,84ada03ee37935d281b6ef02f8758f6d805bf66c7cac8fad1d52934fdf1b6 CVE-2024-22543,0,0,4bbc43f5b3e2685d1c9696fcc6499264d266d040456549b4c4eb8710fde430af,2024-02-27T14:20:06.637000 CVE-2024-22544,0,0,d4860d160590ae20dbc5d6de1bfe49fdfc11d59a0cfbde30c670036465a08e6a,2024-02-27T14:20:06.637000 CVE-2024-22545,0,0,21a44afa77ff3bc1528d0f92d9dbe45aaebe8c2d773e6d661e586abe7a9ac385,2024-03-05T18:15:48.443000 -CVE-2024-22546,0,1,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000 +CVE-2024-22546,0,0,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000 CVE-2024-22547,0,0,435aee4ac29e540430ed8124a6d3ce7be57829e1b8ca6167335ef3bc4b085e52,2024-02-23T02:42:58.253000 CVE-2024-22548,0,0,7d281051e3f1672a0e8c6ae82119054f50e0c0cf80064dc21e880381f007b189,2024-01-20T18:51:21.163000 CVE-2024-22549,0,0,9d125f13584b8e9a98c7ba04ebcdd0c32883b8ff51ce2ca12c4e35cf1c2f09cf,2024-01-20T18:51:14.307000 @@ -244029,7 +244029,7 @@ CVE-2024-22563,0,0,e68d7fb0548f09a5ec2c02ea3bc2e400b99a4a7ece951a19b220371a41585 CVE-2024-22567,0,0,37499b14fc95be5de51f415505f023a34c878497b34bd94665d0d5d9fc0f3959,2024-02-14T19:54:19.663000 CVE-2024-22568,0,0,b7d805911224b1ae0c1c8858ee61b49b9c11cc28a75ce32a84caadcf77d4e108,2024-01-20T18:49:52.490000 CVE-2024-22569,0,0,bee3ca02120bb4729d62660d17afd0816ef9535b004ff125be13883d678f5fb9,2024-02-06T18:07:39.733000 -CVE-2024-2257,0,1,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000 +CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000 CVE-2024-22570,0,0,c41ee5b58f7f6a9dd8b89c3af365a9d60dc2b413d2b344b295ffdf6e10d67e91,2024-02-02T23:32:46.897000 CVE-2024-2258,0,0,0a2d974520f3aded55b51d15a5993f56250b1aed189d20a50869de8aedadc1c1,2024-04-29T12:42:03.667000 CVE-2024-22588,0,0,a2c6cd05590470f0279e75fb12dad64f1e0ed398a983cfaa98608323ce35b7b6,2024-05-24T18:09:20.027000 @@ -244055,7 +244055,7 @@ CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f CVE-2024-22638,0,0,60058d6cb515c8aa3a8ab899f954be18d8e911ef19644ca8cbcf96f8a8fef453,2024-04-23T20:15:07.290000 CVE-2024-22639,0,0,d147d90780a694ff1383e30f52d6dbe1e7da032a2cc352a3c7766915866417f2,2024-01-29T15:57:50.477000 CVE-2024-2264,0,0,ac80bb0c3113d5753bfebf327d65c058c1a7083afb4e44aaee012c5bbd89ffb0,2024-05-17T02:38:07.433000 -CVE-2024-22640,0,1,102e2d28349ae3c03a07486f025247cff5be73b09510fcc21313c4b6c8ce55b1,2024-07-03T01:47:19.810000 +CVE-2024-22640,0,0,102e2d28349ae3c03a07486f025247cff5be73b09510fcc21313c4b6c8ce55b1,2024-07-03T01:47:19.810000 CVE-2024-22641,0,0,0c05c49df58d834d722a2d36cad576d99157e542f5a058c380c89067d3f5b959,2024-05-29T13:02:09.280000 CVE-2024-22643,0,0,acc61f08a1073b7993a535a7dc4ecf3492177f02866390d4f33a88b7ebfb7b1f,2024-02-03T00:28:40.073000 CVE-2024-22646,0,0,3a86f6cf8b5df97f2d3aadd50de49f432e2c6ccdb28c2bf8f4f8ba9395ea6ba2,2024-02-03T00:28:48.987000 @@ -244084,7 +244084,7 @@ CVE-2024-22719,0,0,aaa66993ee37f29c20b14223b821b03b5d493f183b96f427d11d296868ca1 CVE-2024-2272,0,0,20cc5b74c21ce330c57966463b39c63d1c5d5be281d00278d0950c30b3bcdc65,2024-05-17T02:38:08.237000 CVE-2024-22720,0,0,038b3febcbb5c10efe83cdd43116a146b0f8fc2b785e2d6c2bedf080ee4dce1e,2024-01-30T20:51:16.247000 CVE-2024-22721,0,0,7905b4e3cc2db104ef010b5c0c631d984fa4f3d297ab2c2ea62f2468b547701d,2024-04-12T12:43:57.400000 -CVE-2024-22722,0,1,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000 +CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000 CVE-2024-22723,0,0,85f1b081b17479287a97ddf9df11ce1719fb0f8d5476d86f18383abbb6aff1e5,2024-02-28T14:06:45.783000 CVE-2024-22724,0,0,a38074ce3c98995a05ae2567149e27464bc7056d5dc8da246b430c02271d6fda,2024-03-21T12:58:51.093000 CVE-2024-22725,0,0,386223ddf5bd359b392565f888fa17c656c4159abf859639a21b41119e3cd376,2024-01-30T20:42:46.143000 @@ -244105,29 +244105,29 @@ CVE-2024-22770,0,0,f2a2a69cf9ce7d556b6b228c10722f7f9528f890b579414a4469048f6692b CVE-2024-22771,0,0,0dd34dafcdaa309c8637826e95d97aeb9822548d77b388b6c8b8378fb56f1e0c,2024-01-29T15:53:04.917000 CVE-2024-22772,0,0,7b07baabcd2a25eaa93c8a3a6e55d6143f69fb79e8629b89561882c2cb32d998,2024-01-29T15:52:25.997000 CVE-2024-22773,0,0,3aba96c911c7d73db03474bcda5543c0564d460038cf19cf729bddcf3e7c9cc0,2024-04-29T20:15:08.227000 -CVE-2024-22774,0,1,853beb0389c513470cd58906aafec7d14c972ce0d4386b56f01ffafcb0357503,2024-07-03T01:47:21.717000 +CVE-2024-22774,0,0,853beb0389c513470cd58906aafec7d14c972ce0d4386b56f01ffafcb0357503,2024-07-03T01:47:21.717000 CVE-2024-22776,0,0,90ee7d73ff2ea3165d0ee53642fafcade627122c4deabb0ceebf5f729ef60456,2024-02-23T16:14:43.447000 CVE-2024-22778,0,0,b51d89db366702e623e9ffcc2087e24c0edaa0d76ed8dc9f0f78dc0d88754ad8,2024-02-22T19:07:27.197000 -CVE-2024-22779,0,1,da7d6977832dc3c77efd0828b12672e5165d77aed4664eb8e25534e23467c0f0,2024-07-03T01:47:22.543000 +CVE-2024-22779,0,0,da7d6977832dc3c77efd0828b12672e5165d77aed4664eb8e25534e23467c0f0,2024-07-03T01:47:22.543000 CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000 CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000 CVE-2024-2279,0,0,840779d3b8dde5a422cda59c3e85c02ce57b31f4846ea3c8574f9bd433ec61e7,2024-04-12T12:43:57.400000 CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000 CVE-2024-2280,0,0,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000 -CVE-2024-22807,0,1,a580199af0b24a15f866ec5a74a185471ee1f26b8c57c1b2fc09fc1c09da3690,2024-07-03T01:47:23.287000 -CVE-2024-22808,0,1,b7a5aa8a22094453a9d6da6ca906feec6515eab5ea3c97e56f8c2898e1e92f7b,2024-07-03T01:47:24.097000 -CVE-2024-22809,0,1,afebd17c1e8cd42b36ec9ebebc6c487b6a24e5a21164f1b103a87d2176ee2be1,2024-07-03T01:47:24.930000 +CVE-2024-22807,0,0,a580199af0b24a15f866ec5a74a185471ee1f26b8c57c1b2fc09fc1c09da3690,2024-07-03T01:47:23.287000 +CVE-2024-22808,0,0,b7a5aa8a22094453a9d6da6ca906feec6515eab5ea3c97e56f8c2898e1e92f7b,2024-07-03T01:47:24.097000 +CVE-2024-22809,0,0,afebd17c1e8cd42b36ec9ebebc6c487b6a24e5a21164f1b103a87d2176ee2be1,2024-07-03T01:47:24.930000 CVE-2024-2281,0,0,678591f1662b2466c636da3b7ea8d4aecc69271c2cc3e9520b9377148c2d1287,2024-05-17T02:38:08.820000 -CVE-2024-22811,0,1,7fd67adbf482683e7c42965a6d24dc2241e5261fbe35e982d93c2d300a43b572,2024-07-03T01:47:25.797000 -CVE-2024-22813,0,1,d84c3545183972fb46dbe44d2e2d57fc4a1c3e486bb78d857906c2011155d504,2024-07-03T01:47:26.623000 -CVE-2024-22815,0,1,ee087337930e11018ffcef6c1087bd381adf7141f63872cbdf5df42f054b9f7e,2024-07-03T01:47:27.470000 +CVE-2024-22811,0,0,7fd67adbf482683e7c42965a6d24dc2241e5261fbe35e982d93c2d300a43b572,2024-07-03T01:47:25.797000 +CVE-2024-22813,0,0,d84c3545183972fb46dbe44d2e2d57fc4a1c3e486bb78d857906c2011155d504,2024-07-03T01:47:26.623000 +CVE-2024-22815,0,0,ee087337930e11018ffcef6c1087bd381adf7141f63872cbdf5df42f054b9f7e,2024-07-03T01:47:27.470000 CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000 CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000 CVE-2024-22819,0,0,0eb9b3434533fedaa8cbae17f2a15bb53110d617baacce71ff390d25b5e6cc78,2024-01-23T14:23:51.943000 CVE-2024-2282,0,0,c1ae030d788a4d8e10e3d7755235dea662a549e692bd46e5b5ce60e281999ba8,2024-05-17T02:38:08.927000 CVE-2024-22824,0,0,0e57a7333dd925b9e9a776e0a7ccc63af630d522cf4936742b2123d54c73c6ad,2024-02-20T19:50:53.960000 CVE-2024-2283,0,0,51044cd2dc7315a5113c29d77a70333663a2eb1afc00d45611079e000d888488,2024-05-17T02:38:09.023000 -CVE-2024-22830,0,1,a6f77720269d5397aba86bc0fa5dc72ef95b239e52ec057218738fed180c27f0,2024-07-03T01:47:28.283000 +CVE-2024-22830,0,0,a6f77720269d5397aba86bc0fa5dc72ef95b239e52ec057218738fed180c27f0,2024-07-03T01:47:28.283000 CVE-2024-22836,0,0,62c651f90ba1b8c08871776c5eb787f2963ec144dbd08e02b7b6c9de6c156ef9,2024-02-15T16:00:38.090000 CVE-2024-2284,0,0,fbd40eff77fbd9078ba9c0d39ae77d6bf7e4a071aa6dd9c76f513ac90c869d7f,2024-05-17T02:38:09.120000 CVE-2024-2285,0,0,d598e8e82ab18256cdda62cdf9c434814416ade091e9d74340549bdb3966ca87,2024-05-17T02:38:09.217000 @@ -244136,7 +244136,7 @@ CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df87 CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000 CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000 CVE-2024-22855,0,0,1ea53d8c3efe191d3641b8f5d52ec06bd00349e74446b7b408dab6756f559628,2024-06-13T18:36:09.010000 -CVE-2024-22856,0,1,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 +CVE-2024-22856,0,0,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000 CVE-2024-22859,0,0,b948ee8fe798cbf01c18cac852f304ecb9e81e6d367124ad19db38465396c137,2024-05-17T02:36:25.953000 CVE-2024-2286,0,0,657861131740076699183211e8ffc4b18c067668bfd7d2635b81e0ec9c54a21c,2024-03-13T18:15:58.530000 @@ -244160,7 +244160,7 @@ CVE-2024-22900,0,0,254e082003561180ecd392f3a9c102fc841e1bde56aa59cbf964fe2817289 CVE-2024-22901,0,0,8a50b23cdceca6b003b10fb1d10a0eb69c8b3f5c24256d493c5ce2629f318cde,2024-02-07T17:37:28.593000 CVE-2024-22902,0,0,fbf1665f8a0c495bb4c5734518bdb188f14e0ba8d35feaea9e626f6d31bec387,2024-02-07T17:37:40.617000 CVE-2024-22903,0,0,b065e43b3567286ff1c11abbe22fe1f66bcb052a0745b0d35654b96ab7e2d4be,2024-02-07T17:37:48.350000 -CVE-2024-22905,0,1,09732b6a64758cf91423735af54193632b7a0df1e6e43f31234cfa11b4179080,2024-07-03T01:47:30.227000 +CVE-2024-22905,0,0,09732b6a64758cf91423735af54193632b7a0df1e6e43f31234cfa11b4179080,2024-07-03T01:47:30.227000 CVE-2024-2291,0,0,5a0d8dd1dccfcea1bdf6701723096db89286716c354b8745f8eab33b1e17acb9,2024-03-20T17:18:21.343000 CVE-2024-22910,0,0,f81ed92ed3df2208879820818c283e795606947a0eb3a19b60106e6202f734d1,2024-05-14T16:13:02.773000 CVE-2024-22911,0,0,2c6bed04bf2f4f5833b6ceb73482cd6c764a8005f6b7e06026bae5b9181bc291,2024-01-25T15:26:07.957000 @@ -244204,7 +244204,7 @@ CVE-2024-2304,0,0,002885016cb6de20a7ac74c3320e64b475ced64cf41e23553cf72ac590e02c CVE-2024-23049,0,0,0b53d9fcaa3d982fbaba3ce5ecc9aca5fa97b026cc60aeb6562fcda76003228f,2024-02-12T17:17:31.967000 CVE-2024-2305,0,0,67ddd3b17ba89a100104a555d07abbc0e6c698f4bcfe4bdd3aaeaec76405ba20,2024-04-10T13:23:38.787000 CVE-2024-23052,0,0,77bed15b5f7e3314dd1881600e0ebeeaf755dc8617c95300b8711f94c23a9aaa,2024-02-29T13:49:29.390000 -CVE-2024-23054,0,1,7a4436b0ce2b8f811851624479923281ac594f0e57d9c7febac6e9ac0a1c183e,2024-07-03T01:47:31.317000 +CVE-2024-23054,0,0,7a4436b0ce2b8f811851624479923281ac594f0e57d9c7febac6e9ac0a1c183e,2024-07-03T01:47:31.317000 CVE-2024-23055,0,0,54124e9a9a97d45f754e7c71f6e5d2e241045f3c06b3c7fed8b9e56023ee1e70,2024-02-02T17:05:51.857000 CVE-2024-23057,0,0,adc1796cef08e8d149e4ec26b93b507eb10ee425914261b35693ce21283d0912,2024-01-18T15:16:24.097000 CVE-2024-23058,0,0,5c41cad6af95abe6a7917f0dfb22027d597dfaf2d1d65add1f47a86773bcf588,2024-01-18T15:16:50.140000 @@ -244225,9 +244225,9 @@ CVE-2024-23083,0,0,2c8dec299330d14018a11785cefe558a96fda4422c8b3a8ec3351387ca462 CVE-2024-23084,0,0,67a8177594fece41c5c3f5327481804111bb6cdb8d6e219dd88915d9de8dd42c,2024-05-17T02:36:28.667000 CVE-2024-23085,0,0,c8bd84e6f4d26add24174616b5668bfc1e08e303e79f277fd83e1d8beeac61ba,2024-05-17T02:36:28.720000 CVE-2024-23086,0,0,86eb4b3b7b34189b0ee349784eea514a120500e757a3b65a5b5319d9d9b41675,2024-05-17T02:36:28.767000 -CVE-2024-2309,0,1,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 +CVE-2024-2309,0,0,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 -CVE-2024-2310,0,1,499b89515ad327ded91d404511ae8dcfd3fae99d14d1816e5fc98cd9421d4da6,2024-07-03T01:53:09.113000 +CVE-2024-2310,0,0,499b89515ad327ded91d404511ae8dcfd3fae99d14d1816e5fc98cd9421d4da6,2024-07-03T01:53:09.113000 CVE-2024-23105,0,0,4f4ecfc1737be07823bcaafc96e8879d6b5c3ae1db58c428ada8e62f19153579,2024-05-23T15:52:39.123000 CVE-2024-23107,0,0,322e47dd821fc1fd2d2c1cca77300d8b32f4ff697feaa94db5e3454edd4583a0,2024-06-03T14:46:24.250000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 @@ -244266,26 +244266,26 @@ CVE-2024-23137,0,0,a3dfbd98c2dc1ba45435d76ef85744b5c19037c4a2624aa7d2b0ff334bf9c CVE-2024-23138,0,0,6b090492cd013e3e650e24e59443f58d52996df0034c406247881d7acc03e3d0,2024-03-18T01:13:31.203000 CVE-2024-23139,0,0,3d593be31839f5d86966b7965df31cd04e51b507bda09669a8893d4214cfafec,2024-03-18T01:13:31.203000 CVE-2024-2314,0,0,ed96f7e1946840e93c2198da1169aca1bfa11c5d8065acfea02e9fe912a3e6df,2024-03-11T01:32:29.610000 -CVE-2024-23140,0,1,5880ade88028c79d39a927f070e37e0f639c65305e423ff522539ca095faa88c,2024-07-03T01:47:32.750000 -CVE-2024-23141,0,1,4fb29a5afa16fb29b24bc9f0691e8fab3bca8453a3f652aef89ff8f784397309,2024-07-03T01:47:33.010000 -CVE-2024-23142,0,1,a2dcb08f3a105c5a38d15a1e4c7fd1b92d9adeed645056e0e830a118bd33d309,2024-07-03T01:47:33.247000 -CVE-2024-23143,0,1,f0d2b13bb8e56e7c3d343e4cd2799c9e735166b687ba7c6b3cca5388ea44f6ed,2024-07-03T01:47:33.480000 -CVE-2024-23144,0,1,47993f9f00354d95111396e368861b1aea8133c817c749ab9b7413e9b3d05d7f,2024-07-03T01:47:33.713000 -CVE-2024-23145,0,1,8ea13e97df27b66102973a2f35f0e884ddede3e94a7bd4b932c7e1bda11397ef,2024-07-03T01:47:33.940000 -CVE-2024-23146,0,1,c9ab3b2b65b697d473465cd7dcbbd37ee7743393b6257d030c7d43f735d4eb7a,2024-07-03T01:47:34.180000 -CVE-2024-23147,0,1,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e043a,2024-07-03T01:47:34.407000 -CVE-2024-23148,0,1,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 +CVE-2024-23140,0,0,5880ade88028c79d39a927f070e37e0f639c65305e423ff522539ca095faa88c,2024-07-03T01:47:32.750000 +CVE-2024-23141,0,0,4fb29a5afa16fb29b24bc9f0691e8fab3bca8453a3f652aef89ff8f784397309,2024-07-03T01:47:33.010000 +CVE-2024-23142,0,0,a2dcb08f3a105c5a38d15a1e4c7fd1b92d9adeed645056e0e830a118bd33d309,2024-07-03T01:47:33.247000 +CVE-2024-23143,0,0,f0d2b13bb8e56e7c3d343e4cd2799c9e735166b687ba7c6b3cca5388ea44f6ed,2024-07-03T01:47:33.480000 +CVE-2024-23144,0,0,47993f9f00354d95111396e368861b1aea8133c817c749ab9b7413e9b3d05d7f,2024-07-03T01:47:33.713000 +CVE-2024-23145,0,0,8ea13e97df27b66102973a2f35f0e884ddede3e94a7bd4b932c7e1bda11397ef,2024-07-03T01:47:33.940000 +CVE-2024-23146,0,0,c9ab3b2b65b697d473465cd7dcbbd37ee7743393b6257d030c7d43f735d4eb7a,2024-07-03T01:47:34.180000 +CVE-2024-23147,0,0,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e043a,2024-07-03T01:47:34.407000 +CVE-2024-23148,0,0,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 CVE-2024-23149,0,0,242d8caf5deb75b9fbd1f60b635cd54b2b743a36dfa977ecbeafb68c5bb6441d,2024-06-25T12:24:17.873000 -CVE-2024-23150,0,1,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 +CVE-2024-23150,0,0,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 CVE-2024-23151,0,0,b29d40e3cefbbec81e68405bffac98bc5e7c10dc76dec3d6cd672fea6115bc13,2024-06-25T12:24:17.873000 CVE-2024-23152,0,0,c5c382b3ba462bda0286084969263304e92f041f435cc9b3b38363a1158fa042,2024-06-25T12:24:17.873000 -CVE-2024-23153,0,1,a9475572f3855658e511a61491406daf3a3db34baa0f7eeec4405b900cc5c36f,2024-07-03T01:47:35.377000 -CVE-2024-23154,0,1,602e96827d2a402dbec8eeda4b14e220087b363940e263d35c0ecc3fd1600d12,2024-07-03T01:47:35.613000 +CVE-2024-23153,0,0,a9475572f3855658e511a61491406daf3a3db34baa0f7eeec4405b900cc5c36f,2024-07-03T01:47:35.377000 +CVE-2024-23154,0,0,602e96827d2a402dbec8eeda4b14e220087b363940e263d35c0ecc3fd1600d12,2024-07-03T01:47:35.613000 CVE-2024-23155,0,0,b5a5ca511786ec9141eb382a511c04b70c91f341a2813d1c1ec6e9c48c8d96b1,2024-06-25T12:24:17.873000 -CVE-2024-23156,0,1,e24cb23ed4ec717877b5c274024621080584b7bbc10a01ea6112a78c48daa1ce,2024-07-03T01:47:35.950000 -CVE-2024-23157,0,1,11b0d8091c8fa8dd11dadbcf1fbb903ad812d8f095800e3ccd96bef2996bf47e,2024-07-03T01:47:36.180000 -CVE-2024-23158,0,1,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb526d,2024-07-03T01:47:36.407000 -CVE-2024-23159,0,1,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000 +CVE-2024-23156,0,0,e24cb23ed4ec717877b5c274024621080584b7bbc10a01ea6112a78c48daa1ce,2024-07-03T01:47:35.950000 +CVE-2024-23157,0,0,11b0d8091c8fa8dd11dadbcf1fbb903ad812d8f095800e3ccd96bef2996bf47e,2024-07-03T01:47:36.180000 +CVE-2024-23158,0,0,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb526d,2024-07-03T01:47:36.407000 +CVE-2024-23159,0,0,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000 CVE-2024-2316,0,0,b19568c74ff3303e21c6f779d3f7251e97a598ce30370572128b37d7e3b8336b,2024-05-17T02:38:09.927000 CVE-2024-2317,0,0,a696c117ae514f4e733f3f16d6619ea5748142dccfe9e4a63d423b5b3c8772c3,2024-05-17T02:38:10.027000 CVE-2024-23170,0,0,13146081a2acee1dfc9938d9131a35ea909e72090f99ea62e52485862035b1b1,2024-02-22T03:15:08.297000 @@ -244303,7 +244303,7 @@ CVE-2024-23182,0,0,f1264713bd57ef4128de6f3045f4c61bebd1bad343f929e4484b785773092 CVE-2024-23183,0,0,93cf9ba468f15615134365f0103ab70e70069d42361d31f584c40ec201d8a9a2,2024-01-29T22:55:48.787000 CVE-2024-23186,0,0,bbede5329e23f6d21fbfd0079911ffff5ce7c8f0feb3eca943a9e45025325b07,2024-05-07T01:15:06.237000 CVE-2024-23187,0,0,ca43fe47ac5e4f8e0837d05960bc85196f0848f99f9621a877a9935d921738d1,2024-05-07T01:15:06.333000 -CVE-2024-23188,0,1,ce1c34d2ff7cdb555552e77ea8d56a52e7e8358bfb4cacf42906fa2a1a9d9495,2024-07-03T01:47:37.067000 +CVE-2024-23188,0,0,ce1c34d2ff7cdb555552e77ea8d56a52e7e8358bfb4cacf42906fa2a1a9d9495,2024-07-03T01:47:37.067000 CVE-2024-23189,0,0,38105a286e29ba4aeb2b7f55c2818d00acb37082743b2ce1bce1b1cce9e3180d,2024-04-11T11:15:48.320000 CVE-2024-2319,0,0,7c418d002244d51b00ca2fafa0c8e14c5cc40641054fa1d4dc85ce7d77674499,2024-03-08T21:19:43.127000 CVE-2024-23190,0,0,add17161c7c8505b6ba715b4898e70540bf15ecced41ee84c2b2e0388a683985,2024-04-11T11:15:48.423000 @@ -244334,10 +244334,10 @@ CVE-2024-23220,0,0,8ac5f8ea712aad989eb58875485617fa914d9322cd1efd90091219b5c7412 CVE-2024-23222,0,0,4721e0650f1741a6181143ce02f8b434bb1555a2f2760565c1ff4ba82e5774fb,2024-06-12T10:15:30.200000 CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000 CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000 -CVE-2024-23225,0,1,845fa2197aa2aade23d73e024a310b4250103bf0ab7bf9bca77212be45861740,2024-07-03T01:47:38.013000 +CVE-2024-23225,0,0,845fa2197aa2aade23d73e024a310b4250103bf0ab7bf9bca77212be45861740,2024-07-03T01:47:38.013000 CVE-2024-23226,0,0,1b82b4673b34cfde627eee1f5d6fa409ed57aa961d24a2b22edaff38026e1585,2024-03-13T23:15:46.243000 CVE-2024-23227,0,0,04e1ce79d1fe22c4b70141c1091acf9b225e65a49459c2665f7c7f4c8cca9f1e,2024-03-13T23:15:46.290000 -CVE-2024-23228,0,1,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000 +CVE-2024-23228,0,0,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000 CVE-2024-23229,0,0,e805dd1682e1632875738dc1ef5498ba908f35fdf996585c4b9c6ef230af458c,2024-06-10T19:15:53.010000 CVE-2024-23230,0,0,55c48b39c3ece7e8bd290abec0554d2fd62bde0178d567ca7f3a9325e643783e,2024-03-13T23:15:46.337000 CVE-2024-23231,0,0,bef797a63304d9f49f7b188b3a4f20b360d10ecbf0da1ccef3327823aca0d323,2024-03-13T22:15:09.780000 @@ -244345,7 +244345,7 @@ CVE-2024-23232,0,0,4b7ad8c1b3903858edb8692c81d95e615006f96097c7aa2a17b9b479bd7a3 CVE-2024-23233,0,0,86946236eb7754c5260f52438b295c9b9017522c2a5c92843819d59d683abc63,2024-03-13T21:15:56.140000 CVE-2024-23234,0,0,e1e8f5ba1d067d79a25f6060929a26b1f03013fee21a9aa8264e6de3dac60114,2024-03-13T23:15:46.387000 CVE-2024-23235,0,0,f40dbea8ffc81789b377e6e56780364f6c13a63f8f0a8176aaa5cabe8eb52e18,2024-03-13T23:15:46.430000 -CVE-2024-23236,0,1,35e1e8394e7b9f6ad4331abd77ccd4bc245703e2c3f094e21b2b9f6f0cc432ae,2024-07-03T01:47:39.753000 +CVE-2024-23236,0,0,35e1e8394e7b9f6ad4331abd77ccd4bc245703e2c3f094e21b2b9f6f0cc432ae,2024-07-03T01:47:39.753000 CVE-2024-23238,0,0,5fa8dfac4eefb425ef52511f8ed7bc7a1c36ea77f79b7679fc51f9c85170adf5,2024-03-13T21:15:56.270000 CVE-2024-23239,0,0,444f1a6a50f397f79f87993b3304cf230fbb95a42c68a4f41ab84193072da8c7,2024-03-13T22:15:09.947000 CVE-2024-2324,0,0,ee033d0044e6a9121f29af0e88ca0be97780518efecb294abff217412bf688a9,2024-05-02T18:00:37.360000 @@ -244355,13 +244355,13 @@ CVE-2024-23242,0,0,d58199cf00cf0bd14e52590b2b275f168602d52e966a0541a985d92d2891b CVE-2024-23243,0,0,be621379a2909602b7af862f42600805a729b4fc88ec3b1873ea1d2a4e240b2e,2024-03-13T21:15:56.460000 CVE-2024-23244,0,0,834563ce88f60d98123b4cd07b42d049909c2500e0219c3a4c10cd45dd2e78fe,2024-03-13T23:15:46.480000 CVE-2024-23245,0,0,eb92890ae09f1beba67fd3fe8c5b93f95441e0d02bf9f3d03f261dec65f51d83,2024-03-13T23:15:46.520000 -CVE-2024-23246,0,1,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000 +CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000 CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a0f0,2024-03-13T23:15:46.613000 CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000 CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000 CVE-2024-2325,0,0,23b75df513c3c155a2acfcf2e34574fcebd08fb3e2a0b9207d1fa3d021e99412,2024-04-10T13:23:38.787000 CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000 -CVE-2024-23251,0,1,092f1229e72a5c3cf728a0733bb73dcf6be0d42bcc4cdd3b35ac4b29d4862c68,2024-07-03T01:47:41.057000 +CVE-2024-23251,0,0,092f1229e72a5c3cf728a0733bb73dcf6be0d42bcc4cdd3b35ac4b29d4862c68,2024-07-03T01:47:41.057000 CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000 CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000 CVE-2024-23254,0,0,f51bdaebdfa7043c82ce44968eb18a23393946054fa5c04d601cb0af5a7300fc,2024-05-07T06:15:07.777000 @@ -244373,7 +244373,7 @@ CVE-2024-23259,0,0,3633304c00d9b61d2276602a4d70f195a2f6d4c5259952b9d8a17acbd0f70 CVE-2024-2326,0,0,12b2206992cd5759fe8aee87c6407370214deede0821de38c8b79b4f8ae58ac1,2024-03-25T01:51:01.223000 CVE-2024-23260,0,0,ac51097be919769185607479bb94f83816dfb0a823a36b798ca92a20e15eff71,2024-03-13T21:15:57.227000 CVE-2024-23262,0,0,a3cc71b13c4680e14b673df2b1c613ebe49f9c48b8a03c413fc86e337ee8ff7f,2024-03-13T23:15:46.790000 -CVE-2024-23263,0,1,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000 +CVE-2024-23263,0,0,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000 CVE-2024-23264,0,0,9964a20888e66392c96c48ccf311158160cfbf4ec169d1a0d4c0b8eb5a95ac52,2024-03-13T23:15:46.883000 CVE-2024-23265,0,0,2ede0506b261d93e08a6a8ab0db637e55925e03c20e9a8ae30d3752777087982,2024-03-13T23:15:46.933000 CVE-2024-23266,0,0,6815b460f7716d52df98ab436e6b42da2e782eedd3a5d15e033e5ba09801dfb0,2024-03-14T19:54:56.477000 @@ -244382,7 +244382,7 @@ CVE-2024-23268,0,0,81165c5c09e8474d57b6891cda51eb4f30eab0837f193e7c4798fe99fd2b9 CVE-2024-23269,0,0,b560efe5c2974c123fc7f649e82a050e1990e700d52c94117e9aef09610b87b2,2024-03-13T23:15:47.147000 CVE-2024-2327,0,0,a7786a53bb7c4df3e66b854b45a310f7f5811391bb9bcee5783d76299a2ec745,2024-04-10T13:23:38.787000 CVE-2024-23270,0,0,9ffc7392eb2f4eff1860dcb80336f5a8cdd382df1e721d75c8ca7db15331f0ca,2024-03-14T19:06:02.210000 -CVE-2024-23271,0,1,6a29a9531f0b7611530f759ed6be3e45e418fbf4ab5efa9d49fa0fca351f3056,2024-07-03T01:47:42.990000 +CVE-2024-23271,0,0,6a29a9531f0b7611530f759ed6be3e45e418fbf4ab5efa9d49fa0fca351f3056,2024-07-03T01:47:42.990000 CVE-2024-23272,0,0,c9da5a5a9448d1badcb55f1bb94ecccfda01d4c50c7c75b1140074bcaecd426e,2024-03-14T19:54:08.100000 CVE-2024-23273,0,0,cb1e92b841add9beb7ff32d91364414d10118c43bd74e233718396f3b8460ec5,2024-03-14T19:54:26.287000 CVE-2024-23274,0,0,662fb9b0795cd70eed82bdcf20d41f74676c2f9885c0d27e476a9f0c92a781b5,2024-03-14T19:54:38.937000 @@ -244409,7 +244409,7 @@ CVE-2024-23292,0,0,1902f1a71fb665c00536465cef16656fbb94decd356fb8bbbf59c91ea3da5 CVE-2024-23293,0,0,3586a96339f859c33a0ba7c3a1765492ff6970f8b37d549d40edcdf59b329d60,2024-03-13T22:15:11.390000 CVE-2024-23294,0,0,c0cdcedc3bcfe664ab02fca520276a0c72a6eafb77125bfc3a4566d618829e43,2024-03-13T21:15:58.733000 CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d3b5,2024-03-13T23:15:47.630000 -CVE-2024-23296,0,1,12a1de3d62ca79ef989249cb1e691420221912e9533cad73e61bbc1dd756eb30,2024-07-03T01:47:43.840000 +CVE-2024-23296,0,0,12a1de3d62ca79ef989249cb1e691420221912e9533cad73e61bbc1dd756eb30,2024-07-03T01:47:43.840000 CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000 CVE-2024-23298,0,0,0db74819ed2b222cfa97f4a2ff3293f59c3a4c8235378608525d7e46421fc5d7,2024-03-17T22:38:29.433000 CVE-2024-23299,0,0,9cbedc1b6c106d21c23b83013b85bcc3f46b28eda4f03d0872450db614ec5b11,2024-06-12T18:03:36.960000 @@ -244542,17 +244542,17 @@ CVE-2024-23522,0,0,7c088d2b09cc2e5e477c07b1d4ef807535495454f574963a9dafd17ab8e96 CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000 CVE-2024-23524,0,0,b4e07bfebc676f16e7c9cc5e0a5f2262c8872797e5d06800ed4ab67d5fef487e,2024-06-10T12:40:41.360000 CVE-2024-23525,0,0,c9ea3f9f05986326992f0c2128558f249961ba75cda273f72dbac98591a6932d,2024-05-05T15:15:49.067000 -CVE-2024-23526,0,1,807e029925542dd0305ba76d2ef112e9c9d0141646231e69bc0a89a5683f9dc3,2024-07-03T01:47:48.580000 +CVE-2024-23526,0,0,807e029925542dd0305ba76d2ef112e9c9d0141646231e69bc0a89a5683f9dc3,2024-07-03T01:47:48.580000 CVE-2024-23527,0,0,024d167c32106440ba360cc7e1648a7e6b4c387298a495a5c7cfd6bef1ff05a9,2024-04-25T13:18:20.370000 -CVE-2024-23528,0,1,e779fcf8fa4180f6f764cd654b708fc7d6b626e2546f7831d3bc246c98ff795d,2024-07-03T01:47:49.403000 -CVE-2024-23529,0,1,408c4c7399e8d26f6b7909fd3f0b70e86354d6eb8f5e40ade28219e78f17f9cb,2024-07-03T01:47:50.133000 +CVE-2024-23528,0,0,e779fcf8fa4180f6f764cd654b708fc7d6b626e2546f7831d3bc246c98ff795d,2024-07-03T01:47:49.403000 +CVE-2024-23529,0,0,408c4c7399e8d26f6b7909fd3f0b70e86354d6eb8f5e40ade28219e78f17f9cb,2024-07-03T01:47:50.133000 CVE-2024-2353,0,0,2a97ff7fa745ca72d26cbc4facf5c67e75b9ea012622d121cc27269746ed1b03,2024-05-17T02:38:11.500000 -CVE-2024-23530,0,1,51dbac4d7a0a33f65b4fc6d03124a2a588d6477cf623dfb112acc41a1865a7d9,2024-07-03T01:47:50.867000 -CVE-2024-23531,0,1,aef12b89405b2c8cac47db31d97672cf83d451706a51c8ad1d16b9761196c85e,2024-07-03T01:47:51.630000 -CVE-2024-23532,0,1,2939af3804bb767bf20911ae3972dbeb56638cfdfebdc62714d1a6dd263a8762,2024-07-03T01:47:52.387000 -CVE-2024-23533,0,1,e86fc5f13e26f2ebdd8a5647a064361100133b87f160955e402e2c31d5725733,2024-07-03T01:47:53.110000 -CVE-2024-23534,0,1,3b36be6636568459b8bd7d7f2d7751e4a293db722b1da1b17a1e8ddab109bd92,2024-07-03T01:47:53.810000 -CVE-2024-23535,0,1,b63d030eea75ecc91481b0806d9679c79835740a552b1450cd7dc42123b41052,2024-07-03T01:47:54.527000 +CVE-2024-23530,0,0,51dbac4d7a0a33f65b4fc6d03124a2a588d6477cf623dfb112acc41a1865a7d9,2024-07-03T01:47:50.867000 +CVE-2024-23531,0,0,aef12b89405b2c8cac47db31d97672cf83d451706a51c8ad1d16b9761196c85e,2024-07-03T01:47:51.630000 +CVE-2024-23532,0,0,2939af3804bb767bf20911ae3972dbeb56638cfdfebdc62714d1a6dd263a8762,2024-07-03T01:47:52.387000 +CVE-2024-23533,0,0,e86fc5f13e26f2ebdd8a5647a064361100133b87f160955e402e2c31d5725733,2024-07-03T01:47:53.110000 +CVE-2024-23534,0,0,3b36be6636568459b8bd7d7f2d7751e4a293db722b1da1b17a1e8ddab109bd92,2024-07-03T01:47:53.810000 +CVE-2024-23535,0,0,b63d030eea75ecc91481b0806d9679c79835740a552b1450cd7dc42123b41052,2024-07-03T01:47:54.527000 CVE-2024-23537,0,0,18692ae32a82ab1e50b0cd580a5ad6559f5b2605ae8b0de3b94c86446075c2d8,2024-05-01T18:15:14.173000 CVE-2024-23538,0,0,92700eb875127c3c26c4961fad027aa1d629dff00f7d623576a56b97f2c72b6a,2024-05-01T18:15:14.250000 CVE-2024-23539,0,0,dacbb0e71f89fa878b5732ed25232ca4892f5a0416acfca069a7ede34e0d4e7f,2024-05-01T17:15:29.230000 @@ -244571,9 +244571,9 @@ CVE-2024-23560,0,0,39262a3d1a015486541c11a9acaae3509226c69e322cbf4650c4cfad43009 CVE-2024-23561,0,0,a22fcf5dfd91b5d6ac506750080d833a3983c3c231b1230f7c5930b307faa639,2024-04-16T13:24:07.103000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,19b2dcf6e3c1e0697b2bea4d3507ea8b750bc4bf3b04f60b20452c989aaf2ffa,2024-05-14T16:13:02.773000 -CVE-2024-23579,0,1,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 +CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 CVE-2024-2358,0,0,a1b0ff86c10dcc0cc90254078c2507c7f215f808024299c95ae7b33a0c1059e0,2024-05-16T13:03:05.353000 -CVE-2024-23580,0,1,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000 +CVE-2024-23580,0,0,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000 CVE-2024-23583,0,0,8045b8b55a9fb922e451a3cdb9c3e44b27bb0ff91f2a1c66c35720ad6820d03a,2024-05-20T13:00:34.807000 CVE-2024-23584,0,0,0a74df816091d3b0eb89fda75cd2dbdfa4a27fc3d1fc7171d6cfed2608adfd53,2024-04-11T01:24:48.327000 CVE-2024-2359,0,0,33fa70e58cb138f001f137996158cf53baff2fc647d26dc120be368c2b10ed74,2024-06-07T14:56:05.647000 @@ -244582,7 +244582,7 @@ CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b6 CVE-2024-23593,0,0,e43cd79f2df730f0b9c8ef9c7ef8b007f3d9ef85731bb4145522b4b6df0d2413,2024-04-15T19:12:25.887000 CVE-2024-23594,0,0,4ee287fb2806b084145e389a1db24a17ecf815a9228bb0d30b732f16b4247731,2024-04-15T19:12:25.887000 CVE-2024-23595,0,0,461be60ee39dcf2e356fd0d37760faca7854d34e9ff334e7c08e774a8c0ee8a5,2024-06-07T19:15:23.570000 -CVE-2024-23597,0,1,1044f570b239ea97c7bd0709961e0bc23dacfc3e4d46ca11165f61566b85cd58,2024-07-03T01:47:57.317000 +CVE-2024-23597,0,0,1044f570b239ea97c7bd0709961e0bc23dacfc3e4d46ca11165f61566b85cd58,2024-07-03T01:47:57.317000 CVE-2024-2360,0,0,d251135115836cbfe30cd2566048479149a1ed2531d2356c2655e3e0c0acbe65,2024-06-07T14:56:05.647000 CVE-2024-23601,0,0,8dbcdb8185734bded21b9bd34be5a747be4e7f42a227254a74e0278058a081d6,2024-06-10T16:15:11.993000 CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000 @@ -244675,16 +244675,16 @@ CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fd CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 CVE-2024-23692,0,0,ee8d47877e8ab9dffb6b0f67245eb523eb65e271e0c42f12e1c102143c73f4cc,2024-06-28T04:15:04.597000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 -CVE-2024-23704,0,1,3ab2415bdb26ba29dae3109785e9f4b7ad9e6e4e471a3ed83e21564f6ce311e3,2024-07-03T01:47:59.750000 -CVE-2024-23705,0,1,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768400,2024-07-03T01:48:00.597000 -CVE-2024-23706,0,1,babe5ff56a1d4a28f81247fdfc7205f6cd9fa2ddbe2826f5bdf18ddb36d0d2f0,2024-07-03T01:48:01.407000 -CVE-2024-23707,0,1,de06c54b01b50c7ee8eaf57e83c8e50f0519388a760daadedf65fa62d4cccb8c,2024-07-03T01:48:02.287000 -CVE-2024-23708,0,1,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68d06,2024-07-03T01:48:03.097000 -CVE-2024-23709,0,1,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 +CVE-2024-23704,0,0,3ab2415bdb26ba29dae3109785e9f4b7ad9e6e4e471a3ed83e21564f6ce311e3,2024-07-03T01:47:59.750000 +CVE-2024-23705,0,0,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768400,2024-07-03T01:48:00.597000 +CVE-2024-23706,0,0,babe5ff56a1d4a28f81247fdfc7205f6cd9fa2ddbe2826f5bdf18ddb36d0d2f0,2024-07-03T01:48:01.407000 +CVE-2024-23707,0,0,de06c54b01b50c7ee8eaf57e83c8e50f0519388a760daadedf65fa62d4cccb8c,2024-07-03T01:48:02.287000 +CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68d06,2024-07-03T01:48:03.097000 +CVE-2024-23709,0,0,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000 -CVE-2024-23710,0,1,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 -CVE-2024-23712,0,1,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 -CVE-2024-23713,0,1,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 +CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 +CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 +CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000 CVE-2024-23721,0,0,4c5a2d52378f8e46ea724b0f797b6d954983df3d251eb4a27defb616bbf83240,2024-03-21T12:58:51.093000 CVE-2024-23722,0,0,a9b0a777e5fe6ce3139b9265b8428b51f6f9a472e3a11168445dfbf933d3ddd3,2024-03-26T17:09:53.043000 @@ -244723,7 +244723,7 @@ CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e3 CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f8dd,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000 CVE-2024-23765,0,0,a9bf9ddaf0ea53521841e4a7d5249d26363bad2b049c64b95ac86a5fafa6d151,2024-06-27T12:47:19.847000 -CVE-2024-23766,0,1,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000 +CVE-2024-23766,0,0,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000 CVE-2024-23767,0,0,c123c2989650a70e6c7d5f568469b1c99b3cb5d77a8ff0fadade34b74ac4b8d2,2024-06-27T12:47:19.847000 CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000 @@ -244731,8 +244731,8 @@ CVE-2024-2377,0,0,3193bacb38964a76865be4cdd2e9adb774f62e3213cbbc5f66850373a4fcad CVE-2024-23770,0,0,d308ea235638520048aecb2f126af743a6f79f00cf88059a602cfd74145feab5,2024-01-26T19:18:29.190000 CVE-2024-23771,0,0,ffb1ffb392a719f610312001c323ebc0b81b01439264d54a4e46f4afbb11b184,2024-01-26T19:24:40.873000 CVE-2024-23772,0,0,7d161a2a1bc845a4be2a35c19c4a877308f37d761990df9b3413f298faaafefe,2024-04-30T17:52:35.057000 -CVE-2024-23773,0,1,68a2baea72cac295ac3164079d63bbdb3d639aae37850380cffc53410ce09a8d,2024-07-03T01:48:07.100000 -CVE-2024-23774,0,1,96f1ad77f319c324f0206e952eb8a5e51b3f4050682ede7a1754b336a786d8e3,2024-07-03T01:48:07.913000 +CVE-2024-23773,0,0,68a2baea72cac295ac3164079d63bbdb3d639aae37850380cffc53410ce09a8d,2024-07-03T01:48:07.100000 +CVE-2024-23774,0,0,96f1ad77f319c324f0206e952eb8a5e51b3f4050682ede7a1754b336a786d8e3,2024-07-03T01:48:07.913000 CVE-2024-23775,0,0,3f14e612f21bf3a005c618e710dfc25be4ed3fed6dcd32f828b01526aab3cc14,2024-02-22T03:15:08.370000 CVE-2024-2378,0,0,3e5adac56d52c45eb09d1bbd05e2a30fa69fd7cb2ee0029f9ae2e536537485fc,2024-04-30T17:52:35.057000 CVE-2024-23782,0,0,6f45eb4b7ce48f87446d0358843a09e5a8ec20837c83d13c1a3b26ddd36a0376,2024-02-02T15:38:55.017000 @@ -244799,7 +244799,7 @@ CVE-2024-2384,0,0,539d389d95c0bbacf4b9526b37bc9ffafada42c0e4afb502dcd629c03479ff CVE-2024-23840,0,0,1ded845e82a305e5f73a094b6796732449ab7d74b497ffaebee95e5d56b36579,2024-02-05T20:56:21.880000 CVE-2024-23841,0,0,d2a4da220caebcf45780e1057f515ab58990e805115b7734955f48097838cd01,2024-02-06T15:20:17.970000 CVE-2024-23842,0,0,2212211bdbb2ca579a147070da65a7a620c66f0c76761387864aa64e079f8f56,2024-01-29T15:51:53.207000 -CVE-2024-23847,0,1,c4eed5a77c2359a39292ae0dca85a080d99c03858d9859ae3c079b97137c2c4f,2024-07-03T01:48:09.197000 +CVE-2024-23847,0,0,c4eed5a77c2359a39292ae0dca85a080d99c03858d9859ae3c079b97137c2c4f,2024-07-03T01:48:09.197000 CVE-2024-23848,0,0,bfa0c8d83f377f5a3a9e67c8800cd93c20c12a8637d3ee4ee062b72b7591a36a,2024-01-30T02:04:25.450000 CVE-2024-23849,0,0,2320aa21cc353546d7dbbd1a8bfdde2281063ba155249762ef0c9618e3748031,2024-06-27T13:15:55.160000 CVE-2024-23850,0,0,eaee80c6a4df06415b75844b5854d1fb017cf0a71c38adc88e28ca7730fea568,2024-06-25T22:15:17.963000 @@ -244862,7 +244862,7 @@ CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a1 CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000 CVE-2024-2391,0,0,de3d6024524cfd3118d436640b62b0ac7f3b4f8e5171fa580bac06e37eaf60b0,2024-05-17T02:38:12.397000 CVE-2024-23910,0,0,aba61cd3a2ae29c18e33a58335fcd90731a0761c8ff2e34ecb287fa079b2c2ef,2024-06-12T01:15:48.943000 -CVE-2024-23911,0,1,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10 +CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10 CVE-2024-23912,0,0,080156a618404e0ca3baa4f7599f1e29c42bf3d6269477605580cfd701bc162f,2024-05-03T12:48:41.067000 CVE-2024-23913,0,0,d5d1f634deeb38dd714043e74c8802abcbf968bda94cd6401f14fcd205b89888,2024-05-03T12:48:41.067000 CVE-2024-23914,0,0,f217a6f0b82dd7b5dcbdb9e211f3f50becfcb615e996156072d08100e14c1a21,2024-05-03T12:48:41.067000 @@ -244886,7 +244886,7 @@ CVE-2024-23975,0,0,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37 CVE-2024-23976,0,0,9685f4f7ec189a5d86ae9e492003126f133b025f9dbebea5b2080780048e5888,2024-02-14T18:04:45.380000 CVE-2024-23978,0,0,8385721845a15c3770957c33eee7ab3b21a901100e361c363180110b0b7503e0,2024-05-17T02:36:41.847000 CVE-2024-23979,0,0,3d911dc61bf5e87f1ad51f604a1f73c131a2123fd076410323dd618c86bb88f2,2024-02-14T18:04:45.380000 -CVE-2024-2398,0,1,0f4a48da0ead4f20c3af2704d87468d8abca50984f056bab845a2786b3e742c6,2024-07-03T01:53:12.523000 +CVE-2024-2398,0,0,0f4a48da0ead4f20c3af2704d87468d8abca50984f056bab845a2786b3e742c6,2024-07-03T01:53:12.523000 CVE-2024-23980,0,0,3f708e24e60241fcb04c41f40502aced7aba4fc920dde1bb909c9b621d60b5d0,2024-05-17T18:36:05.263000 CVE-2024-23982,0,0,d52003f4ccb21aa01a008299898f0d6a9180af3e2a0a80305a9ab57dd3077531,2024-02-14T18:04:45.380000 CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000 @@ -244921,7 +244921,7 @@ CVE-2024-2404,0,0,8479bc256669d7f6da1fce0af005097ec4cab5986897d5ad02003bc96e6be0 CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000 CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ecd1a,2024-03-19T13:26:46 CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46 -CVE-2024-2405,0,1,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000 +CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000 CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000 CVE-2024-24051,0,0,ecd5357adc22831bd3b69ccdcd6affb021471f52c2843fc6a2c7692f187ce829,2024-06-13T18:36:09.010000 CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000 @@ -244950,7 +244950,7 @@ CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4 CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000 CVE-2024-2412,0,0,9da3746de04798c774d1548b9fdc14dcbb04c7bd05255497f31c936724c81211,2024-03-13T12:33:51.697000 CVE-2024-2413,0,0,15a38bc7a67008ff14d882f69f22d9cc77ac428652f07f01e61fdc7dde1a3f0f,2024-03-13T12:33:51.697000 -CVE-2024-24130,0,1,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000 +CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000 CVE-2024-24131,0,0,bac167d4b98c744eda2d1fc405ff0c5eb467a5a3a9f2fd6ec2feeb07e7d79ad5,2024-02-12T14:32:43.777000 CVE-2024-24133,0,0,90f9c85333c4fd5569ecbc14fb2a291cc4ef1ef7dadf481e49035df24a64e9af,2024-05-17T02:36:43.020000 CVE-2024-24134,0,0,a120337ded6b89894c962001172a8dab1d9544a203ea0b8294e89bbc43addb6c,2024-02-22T03:36:42.397000 @@ -244969,7 +244969,7 @@ CVE-2024-2415,0,0,43d65008353e02b0a627c711e477028113011c39db9d3d84b4e86ec05b2fa6 CVE-2024-24150,0,0,bb25001b58b37c3faaa913f21b26ac84ab72443ce7d6507597696a74e7617fa2,2024-03-12T14:59:55.920000 CVE-2024-24155,0,0,114c432258c203679f3415252c50393d032e77f75f3e78118df7ca8b87e1cd84,2024-02-29T13:49:29.390000 CVE-2024-24156,0,0,a35c64ecbf66a175c3792e952f903768ac574ea7ea08ef64210df2e25e380442,2024-03-17T22:38:29.433000 -CVE-2024-24157,0,1,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000 +CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000 CVE-2024-2416,0,0,27e81bce712a3113732c0666078dcb1cab463bfe4b9424d34cd0aa09318f9de2,2024-03-13T12:33:51.697000 CVE-2024-24160,0,0,cfef8a3cb10ac6cf5fe849694fa5021f72cd98bc85770980c25e5b7851a1891e,2024-02-06T20:59:08.493000 CVE-2024-24161,0,0,4562d973369fe14dca9774df5d40611a7dfeda1d9b2131a90de46c2f4f44765f,2024-02-06T21:21:36.413000 @@ -245019,10 +245019,10 @@ CVE-2024-2428,0,0,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd1 CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f8434,2024-04-26T12:58:17.720000 CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000 CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000 -CVE-2024-24294,0,1,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 +CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000 -CVE-2024-24302,0,1,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 +CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 CVE-2024-24303,0,0,ceba5abd46246953377aeeca62d9d959b0441a138ecaac05977ec29895ea28cb,2024-02-14T19:38:18.727000 CVE-2024-24304,0,0,360d35f6c1c59a974e32bf3385aac130f56751bb90d7452c7cffa0763d8c86b2,2024-02-14T19:54:48.247000 CVE-2024-24307,0,0,2f2dad26e52efb490c9c538691b7722d151bd3460907a6c84d9c157b2e42739a,2024-03-04T13:58:23.447000 @@ -245031,8 +245031,8 @@ CVE-2024-24309,0,0,eef7b18f7602fb7202ca3818cf48d865dc53a4e9413ca95deae26e9c7c650 CVE-2024-2431,0,0,09f1ed526805bf98c05e58194567081e16168a26b1474492042fb18dc1072928,2024-03-13T18:15:58.530000 CVE-2024-24310,0,0,4924b11f9c6511ff9bfe2b484cc3ccee18402e2096746433734d2b4b5ac9f2ed,2024-02-26T13:42:22.567000 CVE-2024-24311,0,0,e89824fd7fda28874d73b4a8d50487d03632e9807867517f94590e11715165c2,2024-02-14T21:39:26.980000 -CVE-2024-24312,0,1,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000 -CVE-2024-24313,0,1,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000 +CVE-2024-24312,0,0,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000 +CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000 CVE-2024-2432,0,0,95d50df4a017dece9ed34f3701f7d0d07bad7a8af1c00c7abf68bf89082534a0,2024-03-13T18:15:58.530000 CVE-2024-24320,0,0,7cb23303554f396b6b57d6bd075695abc3acd27016918345466bd347ef7cb20c,2024-06-17T12:42:04.623000 CVE-2024-24321,0,0,ca000380665704431ad3ba708c0d9f4c51234d831950593dbae83135468cb92e,2024-02-15T05:02:58.427000 @@ -245093,7 +245093,7 @@ CVE-2024-2448,0,0,9e30ccfd39b87812540a13d959f2aae1c5a415e25ce2c2852e72d5c6bc3b6d CVE-2024-24482,0,0,d0c5de64fed42524f00b63fd5c9fd6582210b6f756383f7c85fd22e6463f36a5,2024-02-12T17:46:35.760000 CVE-2024-24485,0,0,c7e8c403d6357c5922b5d47216b7ffdcf22e376618ae35637f5f2b9e30ec0927,2024-04-16T13:24:07.103000 CVE-2024-24486,0,0,d7ed2c16e5601f75e195b3cac3961ea438d1470aa390add1505048749d707e17,2024-04-16T13:24:07.103000 -CVE-2024-24487,0,1,61850b43e58031befd51f24dca0d71cabb99802e7eb8c3674186f5ae5bc1c9ee,2024-07-03T01:48:18.013000 +CVE-2024-24487,0,0,61850b43e58031befd51f24dca0d71cabb99802e7eb8c3674186f5ae5bc1c9ee,2024-07-03T01:48:18.013000 CVE-2024-24488,0,0,1834d834c06b744231a786a072c029583b1651fcc4f266317ba3be41edb13e03,2024-02-15T02:23:45.887000 CVE-2024-2449,0,0,81af4b04300933867744fde84b6165c2710bb3d8c358245e7272e559a8ae0dec,2024-03-22T15:34:43.663000 CVE-2024-24494,0,0,81f8461d94de9e292cd8ff42a2c2a5da1fbe2233d78d68b156c60eaf9ab5a816,2024-02-09T01:37:59.330000 @@ -245108,15 +245108,15 @@ CVE-2024-2451,0,0,853c51caa971f14a57f8fab9dbe4cada883118d2f62e8bf781564989c931a9 CVE-2024-24511,0,0,c6be1b7dc4e4419b5c47cd96597e4f754600544541a0f3ad8bce7c662831be50,2024-03-04T13:58:23.447000 CVE-2024-24512,0,0,dc7bbd1e8e3d7fb704deaaad5bd8d5c7e92cb755f835a8b4f37b0a5fb3a90d40,2024-03-04T13:58:23.447000 CVE-2024-2452,0,0,9d1efd8d5c0af40850d1027332ddadc263159fe45095c2497fdd89cc57281119,2024-06-10T19:15:53.417000 -CVE-2024-24520,0,1,3c774368f33e309a9aff5a70713a9d6c94a70066616aae4e879a98640fa83db5,2024-07-03T01:48:18.843000 -CVE-2024-24524,0,1,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9a12,2024-07-03T01:48:19.690000 +CVE-2024-24520,0,0,3c774368f33e309a9aff5a70713a9d6c94a70066616aae4e879a98640fa83db5,2024-07-03T01:48:18.843000 +CVE-2024-24524,0,0,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9a12,2024-07-03T01:48:19.690000 CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000 CVE-2024-24528,0,0,184f3e16e059f6b990b79bbe85c13104f1b7059f71d8a1713060531c24aa2c42,2024-02-26T19:15:07.247000 CVE-2024-2453,0,0,3516619c9d1ad877533ff47d2854d77f923dcb6e13d6b386a451fa313ccb4d47,2024-03-22T12:45:36.130000 CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd69400ec,2024-03-18T12:38:25.490000 CVE-2024-2454,0,0,0b9f095d4355e2ae908fadafa529487790a4decf8d55ba7b4076087a41339237,2024-05-14T16:13:02.773000 CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000 -CVE-2024-24548,0,1,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 +CVE-2024-24548,0,0,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 CVE-2024-24549,0,0,7307c54c0ee6a9a65247489e8d526cb2c7b7a14f1ca835929ecd7a55bbe78415,2024-06-23T09:15:11.213000 CVE-2024-24550,0,0,61ac0958f7c81e21ffc6e212d90df9448e358c246c7d982ac945bf9b3b54c3a6,2024-06-24T12:57:36.513000 CVE-2024-24551,0,0,c09e43903e6a99d3af4df7dea02c9ad73e2d982e9e97e52cd339d3e743832e20,2024-06-24T12:57:36.513000 @@ -245261,9 +245261,9 @@ CVE-2024-24783,0,0,8bc0d7ff7019860b6231b1595f67b432d97124cc86e254463eb84039bf06c CVE-2024-24784,0,0,f5c4e4ed2e33329929985e15b388385fc51516eef30ac3f254a09f278f2575ab,2024-05-01T17:15:29.527000 CVE-2024-24785,0,0,cc84396d420fdc7cd1eec42a211ce9d46ae1b3fd12a46276acc97b91955cfa1d,2024-05-01T17:15:29.610000 CVE-2024-24786,0,0,0112d36d75e12362b0246061d23e3880906a29463bfdcb239d077b99ff2f9c0b,2024-06-10T18:15:26.830000 -CVE-2024-24787,0,1,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab3691270a,2024-07-03T01:48:25.213000 +CVE-2024-24787,0,0,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab3691270a,2024-07-03T01:48:25.213000 CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68f35,2024-06-14T13:15:50.670000 -CVE-2024-24789,0,1,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 +CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000 CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000 CVE-2024-24791,0,0,296f893d4f4d9f7a8b6abcb64bb7c0eaf17d3226917caae92e3b3be9e9ba7cb6,2024-07-02T22:15:04.833000 @@ -245387,8 +245387,8 @@ CVE-2024-24906,0,0,6cea72bb7f9258908c1ed1c3f8325d4f06f0b542821e0483a147e01b51c62 CVE-2024-24907,0,0,df860e0bf6b93f40d4575a350995841695d535878bc5da8a5944cc146004b078,2024-03-01T15:23:36.177000 CVE-2024-24908,0,0,8283d99d7a40754c521eccb4d65696182424210fa0da9643faa3048901b25890,2024-05-08T17:05:24.083000 CVE-2024-2491,0,0,56d5936f32866edf29962cfc16d1b84e21384fb0d36dc5404e3888c50a6878ee,2024-04-01T01:12:59.077000 -CVE-2024-24910,0,1,5fd61dd70d8ecfaf176a8f6d8c2c30bd5b15998ebd0d63a548282cf932846ba7,2024-07-03T01:48:29.673000 -CVE-2024-24912,0,1,062a374f9b828270aaaca83725cc485b3e4124c6c8401ce960438704f1123123,2024-07-03T01:48:29.930000 +CVE-2024-24910,0,0,5fd61dd70d8ecfaf176a8f6d8c2c30bd5b15998ebd0d63a548282cf932846ba7,2024-07-03T01:48:29.673000 +CVE-2024-24912,0,0,062a374f9b828270aaaca83725cc485b3e4124c6c8401ce960438704f1123123,2024-07-03T01:48:29.930000 CVE-2024-24919,0,0,631488eceb3aa7a5b392dcd29a6118459517fd4a65613afe40baee8a3cebfa78,2024-05-31T16:04:09.703000 CVE-2024-2492,0,0,a83da3e7ac12e71f3238f0026df94ba19b3a7e74326df6047a5459c611fae961,2024-04-10T13:23:38.787000 CVE-2024-24920,0,0,0c6e0a299c3dcb3e2c9c47cd3391320c9c9126b8fcb7683d54f65bff941cba09,2024-02-13T14:01:00.987000 @@ -245436,22 +245436,22 @@ CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000 -CVE-2024-24981,0,1,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000 +CVE-2024-24981,0,0,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000 CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,f5f90cfaf231c17880476c2247dc1ebc4c2a99f05fa6baf0600807265bae483b,2024-06-10T17:16:21.607000 CVE-2024-2499,0,0,937cfbbbcabf9a44c0364bd98cffe1d075baa5b58aa206a922d3f920fb87da2d,2024-04-08T18:49:25.863000 CVE-2024-24990,0,0,af094b8cf1e86ab7ac87eef5eef78e8a43482f28ab9103a80890b0937c46b21b,2024-06-10T17:16:21.730000 -CVE-2024-24991,0,1,2900dea50f0db553cefe48171901e23df8de3353302519a3043eb70fb8ed604b,2024-07-03T01:48:33.167000 -CVE-2024-24992,0,1,b64e06396c32ea77485bd57886751b876f5c1a5d86b4810fe1783de0baf1a4e6,2024-07-03T01:48:33.900000 -CVE-2024-24993,0,1,3f477b0d01c1c13b0e5e4e3a41de2765884977e3ce501d188d2df030ffb18a68,2024-07-03T01:48:34.617000 -CVE-2024-24994,0,1,42f2d80bacffedefc75634a19d5bdcf04cc6d212fb826cca85477fe85d0611d4,2024-07-03T01:48:35.360000 -CVE-2024-24995,0,1,994724640a945c1000fc39c7b0f132e31e20015b4a8b29a9d6a77367cacaaa2d,2024-07-03T01:48:36.090000 +CVE-2024-24991,0,0,2900dea50f0db553cefe48171901e23df8de3353302519a3043eb70fb8ed604b,2024-07-03T01:48:33.167000 +CVE-2024-24992,0,0,b64e06396c32ea77485bd57886751b876f5c1a5d86b4810fe1783de0baf1a4e6,2024-07-03T01:48:33.900000 +CVE-2024-24993,0,0,3f477b0d01c1c13b0e5e4e3a41de2765884977e3ce501d188d2df030ffb18a68,2024-07-03T01:48:34.617000 +CVE-2024-24994,0,0,42f2d80bacffedefc75634a19d5bdcf04cc6d212fb826cca85477fe85d0611d4,2024-07-03T01:48:35.360000 +CVE-2024-24995,0,0,994724640a945c1000fc39c7b0f132e31e20015b4a8b29a9d6a77367cacaaa2d,2024-07-03T01:48:36.090000 CVE-2024-24996,0,0,1c280b16d38969c7f4694696d07ee6a3f55a56e58f768c5394ecbdb913e5b2f6,2024-04-19T13:10:25.637000 -CVE-2024-24997,0,1,96eb4bc98ead652d8a74e40e88af7ac14ac55e90b6d09d12a9e3cbed51dc328f,2024-07-03T01:48:36.903000 +CVE-2024-24997,0,0,96eb4bc98ead652d8a74e40e88af7ac14ac55e90b6d09d12a9e3cbed51dc328f,2024-07-03T01:48:36.903000 CVE-2024-24998,0,0,ce4c4f168b0a937a209322576f4019db9a86fed8b1262316955a4b803480e335,2024-04-19T13:10:25.637000 -CVE-2024-24999,0,1,c9900f55e1f00f2949e7c7e8c454bb95b3957fef73e3633271464f0acd65aa92,2024-07-03T01:48:37.637000 +CVE-2024-24999,0,0,c9900f55e1f00f2949e7c7e8c454bb95b3957fef73e3633271464f0acd65aa92,2024-07-03T01:48:37.637000 CVE-2024-2500,0,0,f5c841f144cdfe7169c1d4e3da08b5dd9b9f87140741671656f61d60bd0ec54e,2024-03-22T12:45:36.130000 -CVE-2024-25000,0,1,0b40ba851bdb9ea4a2539d08f7cb1357bdb6189c1e99aa8ea8c9ebc4a54a4498,2024-07-03T01:48:38.350000 +CVE-2024-25000,0,0,0b40ba851bdb9ea4a2539d08f7cb1357bdb6189c1e99aa8ea8c9ebc4a54a4498,2024-07-03T01:48:38.350000 CVE-2024-25001,0,0,c1f11a8c76d43265d10cf34f1d6db6525f3220be11629d1b39a2f52375286f02,2024-02-02T09:15:37.527000 CVE-2024-25002,0,0,5b471b86f2b8e38328babfc3642e60a83c0e02cb964240f5f385287d2af3cff0,2024-03-25T16:43:06.137000 CVE-2024-25003,0,0,81fc44567692de3ff8c7fc733c0c0e2d235894df02bbd6e47e58282e052331c4,2024-02-14T20:15:45.910000 @@ -245473,7 +245473,7 @@ CVE-2024-25041,0,0,7928ae57a8bc2dc3a8c04d59e5aa30b1327837d78f88e428ea9c9bbae0acf CVE-2024-25046,0,0,4397b23573a65e79c16052f58f281291388123ce903b9df7b4059c81aac5ce1a,2024-06-10T18:15:27.350000 CVE-2024-25047,0,0,64419cf1d56aa51442fec48f489740b8b22b015f011042cff3e462c703444ca0,2024-06-21T19:15:30.053000 CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000 -CVE-2024-2505,0,1,47f3647a7f39a1a6bf9463d8b64e750951935a282bf349e6bd3af724e0fc071f,2024-07-03T01:53:18.567000 +CVE-2024-2505,0,0,47f3647a7f39a1a6bf9463d8b64e750951935a282bf349e6bd3af724e0fc071f,2024-07-03T01:53:18.567000 CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000 CVE-2024-25052,0,0,a1c8165788344cec6c26b0ce1cd1c907b8a407a30045684a7d709a32eba309a1,2024-06-13T18:35:19.777000 CVE-2024-25053,0,0,a7c1d494e85c793a8b85597c57f93ed8af694871477cfb34ba8468c39dbbe4ad,2024-07-01T12:37:24.220000 @@ -245484,8 +245484,8 @@ CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525 CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000 CVE-2024-2507,0,0,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000 CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000 -CVE-2024-25078,0,1,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 -CVE-2024-25079,0,1,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 +CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 +CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c62f,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,37094cd80b0e02ee04bd4b4ad310191b35edfe5b1b26bd730c126ade0890fc6e,2024-05-01T19:15:22.183000 CVE-2024-25082,0,0,73cee04ee797f69b5a7d548ce52642d4be8f4f30b151a272c43f273d4c926f75,2024-05-01T19:15:22.237000 @@ -245494,7 +245494,7 @@ CVE-2024-25086,0,0,2486a20dbc230be31b45c0265918e4c1e78343efe8379ef27746c14bbd21d CVE-2024-25087,0,0,189fff92b1879b541729bb27a59416a8cc10248cdc3f2566012939e56a4a869f,2024-07-02T17:44:45.700000 CVE-2024-25088,0,0,35ea77a928ff967f8a8b623f0e595e0ad53ecdc9ed5356569b06ed8430196a2b,2024-07-02T17:44:45.700000 CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000 -CVE-2024-2509,0,1,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 +CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000 CVE-2024-25092,0,0,3532d5e0c56e9f2613e02555af7079338ad04e45b74e242ce5c38f60e8dbf179,2024-06-10T02:52:08.267000 CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000 @@ -245629,7 +245629,7 @@ CVE-2024-25291,0,0,bc77bf07b7f0885dcc53f309d4c8551c9d231ccb3e5075560ca429ae43d29 CVE-2024-25292,0,0,93d2b7f6141fe539a29ae7e5b673c657afb26540dc5e8da909caf90c01b33dc8,2024-02-29T13:49:29.390000 CVE-2024-25293,0,0,0b85db10c32bd0ffaa51c674a448c6fa3593e795a8c8cebcd511335821521f83,2024-03-01T14:04:26.010000 CVE-2024-25294,0,0,f95809dd72d0d29f306e64dc9390645e69b344c0241b1ce90e2194188140d725,2024-03-21T12:58:51.093000 -CVE-2024-25297,0,1,3720ba95083a9c1ee3bb9579b18dcf812e8f1a8183f8ef86b53f57de77baca4a,2024-07-03T01:48:44.367000 +CVE-2024-25297,0,0,3720ba95083a9c1ee3bb9579b18dcf812e8f1a8183f8ef86b53f57de77baca4a,2024-07-03T01:48:44.367000 CVE-2024-25298,0,0,bf85debb0b48c7785ba1fe04e103d557c66dabf290db3d94d61aedde1f0f4cc2,2024-04-11T14:02:27.920000 CVE-2024-2530,0,0,840de7776d49b53a5f9e7a995946ebd7a23aba1a427105027b273205f3f0273b,2024-05-17T02:38:17.580000 CVE-2024-25300,0,0,00d5a1baa6ea777d5242d82c3fcea6510e4f7a3fadd8d373439ff775edc53ce1,2024-04-26T16:06:22.873000 @@ -245662,7 +245662,7 @@ CVE-2024-2535,0,0,5003a806af9fd722d81a3ae38c9ab95ad0fd8018f3974e8238a7f92af2686e CVE-2024-25350,0,0,4025b81199a224e7878ebb894cfce4cd4a7613ab77d81e491781294f349534f6,2024-02-29T13:49:47.277000 CVE-2024-25351,0,0,b34112a1dde05e9e9b4f5cfa676ebc0f3ddbf68e11e3555b3133c6ff3fc419ef,2024-02-29T13:49:47.277000 CVE-2024-25354,0,0,f42efd766ea7de269c602d96eef2e737ebc201c930b7678451ec9c71ead98d82,2024-03-28T02:01:13.303000 -CVE-2024-25355,0,1,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 +CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 CVE-2024-25359,0,0,e52a0991ba8548dff26799e463bd4b47a9488509a0199d8c2e3284055fd171da,2024-03-21T12:58:51.093000 CVE-2024-2536,0,0,671f61d8f69f123ac0a044d4939347c45ec1c01a8fc8620d0ca3b16f74cc8685,2024-04-10T13:23:38.787000 CVE-2024-25360,0,0,1c224af52aa70bed49a607a4215cecfbab2aa2b1075dbd9a5d0950bdddee46dc,2024-02-12T17:31:21.670000 @@ -245676,14 +245676,14 @@ CVE-2024-25381,0,0,2fbf6a4c7caf83717eb116c843eb9d06446ef20fab32ebaa59c38b740fd20 CVE-2024-25385,0,0,3d2189f37c69e02ce7f2d6f668e9f0e15554305edf58754347a8471b02d03f2f,2024-02-23T02:42:54.547000 CVE-2024-25386,0,0,b3e34473858eb8e804a89ab203abac2433271329bd78e7f08fb63dfed4e84395,2024-03-13T04:15:07.960000 CVE-2024-25388,0,0,cee77ee0bae8e1ef7305910968331b1d7b6c7e617890c334f730f40dc433dd01,2024-05-01T18:15:15.110000 -CVE-2024-25389,0,1,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000 +CVE-2024-25389,0,0,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000 CVE-2024-2539,0,0,f25f12532940b515866968371aba8ed1356f3c8da800c6922f39d9ae9e60a0cf,2024-04-10T13:23:38.787000 CVE-2024-25390,0,0,4a40525265aafe069c1e8004d164376033591b97208ef196787395d0e2292107,2024-05-01T18:15:15.223000 CVE-2024-25391,0,0,ead1e68bdcf1fea9b38ad40fe7f23c53788078af7d30e7999204d9377643d440,2024-05-01T18:15:15.270000 -CVE-2024-25392,0,1,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000 -CVE-2024-25393,0,1,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000 -CVE-2024-25394,0,1,be9935f7dc1f2a9ef5bc4751361c0c48070487f3d65e34adb53e8eab07ac227f,2024-07-03T01:48:48.800000 -CVE-2024-25395,0,1,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000 +CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000 +CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000 +CVE-2024-25394,0,0,be9935f7dc1f2a9ef5bc4751361c0c48070487f3d65e34adb53e8eab07ac227f,2024-07-03T01:48:48.800000 +CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000 CVE-2024-25398,0,0,5f9177c45e78128f47bee33d155348e7281adb4722b60ad3313c147682b88eac,2024-02-28T14:07:00.563000 CVE-2024-25399,0,0,b681bbee2f606a57716a8b8a1ed6ef4fd1407c61ce2bf8ffff233f88dd45b3ba,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,dd915a440ac73df2132a6cf61c1461d16e0e6c674a077089d357fa7024e90617,2024-06-17T20:15:12 @@ -245699,7 +245699,7 @@ CVE-2024-2542,0,0,6c077f2bb629a1c1fb1163538212f04d947edadd7bbedc6294899ac59ba5b1 CVE-2024-25420,0,0,e0d5ccadb914dda205f82e80c0a7aee5f6fc17ec37e5b4a46d9fe90c72482659,2024-03-27T12:29:30.307000 CVE-2024-25421,0,0,541431fb721c49167084cbc501b059961969c28902a19d56e08bf6556ad2cfe9,2024-03-27T12:29:30.307000 CVE-2024-25422,0,0,9045d15a9a7aafc5aaaae0629255ad0c09af460732a4878c1110a6bd32d7e5a3,2024-02-29T13:49:47.277000 -CVE-2024-25423,0,1,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000 +CVE-2024-25423,0,0,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000 CVE-2024-25428,0,0,c9a4a68822ce56f9f70c0633568698e7786e1f54738d13d0ca759099f302c24e,2024-02-22T19:07:37.840000 CVE-2024-2543,0,0,948700ae15fbd5c1866509dc944be18a443427fe1c4b177507ba1136d9b34fa6,2024-04-10T13:23:38.787000 CVE-2024-25434,0,0,697a02c9c4f985f6fefec935d860bbe4ed3c1b769b3e0509b4ac3ebf45248c8e,2024-03-04T13:58:23.447000 @@ -245731,33 +245731,33 @@ CVE-2024-25501,0,0,bf285c0d0f063e749fd3088de6d5fd4b5fa405fe4b880c9267b8673a65457 CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000 CVE-2024-25503,0,0,90dfcc14a3c7a010a114348a2bfe63fa0b75dea73044dfc564baa777268ada75,2024-04-04T12:48:41.700000 CVE-2024-25506,0,0,2f20dc186d5013a60c5a0662addaebb91bb2fda284189b786801332d38fe3fb9,2024-03-28T20:53:20.813000 -CVE-2024-25507,0,1,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 +CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,b5eb0c8705dabcc5e77ea6a4b149e04b9b5058a9f695e22b13a1ef1202156e3b,2024-05-07T20:07:58.737000 -CVE-2024-25509,0,1,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 -CVE-2024-25510,0,1,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000 -CVE-2024-25511,0,1,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000 -CVE-2024-25512,0,1,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000 -CVE-2024-25513,0,1,e5062eb724e28d313633d42f841b561d08be5c78f711f7ea5efe756559893d6d,2024-07-03T01:48:55.660000 -CVE-2024-25514,0,1,23a6d7786b07c6d4165763f38cdb7f2d9493690fa965d572cf69d30d82f34603,2024-07-03T01:48:56.460000 -CVE-2024-25515,0,1,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb31209ba,2024-07-03T01:48:57.273000 -CVE-2024-25517,0,1,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000 -CVE-2024-25518,0,1,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000 -CVE-2024-25519,0,1,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000 -CVE-2024-25520,0,1,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000 -CVE-2024-25521,0,1,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000 -CVE-2024-25522,0,1,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000 -CVE-2024-25523,0,1,beefb80737df4ab8caaa870d04de106a9b1b2b2e0c0621a221e2cb789f06070f,2024-07-03T01:49:03.080000 -CVE-2024-25524,0,1,48003a3df0f0b9027037f7b2a5987e318382c4cf2a4cd2e1a9068d21e6785c7d,2024-07-03T01:49:03.920000 -CVE-2024-25525,0,1,40a61381f3700d580572257b27d7896530e1f40138bd2f98e8bbeb02315818db,2024-07-03T01:49:04.777000 -CVE-2024-25526,0,1,3c2f647419e510f91e589593c4f997246867311b54f7c9006f9890f2c867a5e1,2024-07-03T01:49:05.593000 +CVE-2024-25509,0,0,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 +CVE-2024-25510,0,0,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000 +CVE-2024-25511,0,0,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000 +CVE-2024-25512,0,0,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000 +CVE-2024-25513,0,0,e5062eb724e28d313633d42f841b561d08be5c78f711f7ea5efe756559893d6d,2024-07-03T01:48:55.660000 +CVE-2024-25514,0,0,23a6d7786b07c6d4165763f38cdb7f2d9493690fa965d572cf69d30d82f34603,2024-07-03T01:48:56.460000 +CVE-2024-25515,0,0,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb31209ba,2024-07-03T01:48:57.273000 +CVE-2024-25517,0,0,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000 +CVE-2024-25518,0,0,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000 +CVE-2024-25519,0,0,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000 +CVE-2024-25520,0,0,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000 +CVE-2024-25521,0,0,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000 +CVE-2024-25522,0,0,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000 +CVE-2024-25523,0,0,beefb80737df4ab8caaa870d04de106a9b1b2b2e0c0621a221e2cb789f06070f,2024-07-03T01:49:03.080000 +CVE-2024-25524,0,0,48003a3df0f0b9027037f7b2a5987e318382c4cf2a4cd2e1a9068d21e6785c7d,2024-07-03T01:49:03.920000 +CVE-2024-25525,0,0,40a61381f3700d580572257b27d7896530e1f40138bd2f98e8bbeb02315818db,2024-07-03T01:49:04.777000 +CVE-2024-25526,0,0,3c2f647419e510f91e589593c4f997246867311b54f7c9006f9890f2c867a5e1,2024-07-03T01:49:05.593000 CVE-2024-25527,0,0,24cf0f52ffc1df88afef5722e1e82dddc045101bdf1eb2e5a656344144c7466f,2024-05-08T17:05:24.083000 -CVE-2024-25528,0,1,eb181ff279c84d91717021c2fea760cf8cb6e8cbaff1cf9b78043b6022c5d472,2024-07-03T01:49:06.467000 +CVE-2024-25528,0,0,eb181ff279c84d91717021c2fea760cf8cb6e8cbaff1cf9b78043b6022c5d472,2024-07-03T01:49:06.467000 CVE-2024-25529,0,0,fffddf60fd90501de0d014a56389b4118b58f6a9fe74915fdb6a1257ab535c42,2024-05-08T17:05:24.083000 CVE-2024-2553,0,0,f7edc7d57f34fb804725f8ce94b00e22a7734877755df3504eccbf037d689709,2024-05-17T02:38:18.470000 -CVE-2024-25530,0,1,114f13be12205b5e8e078f769103c74d2951fd25a93df8266ab8b89213f79502,2024-07-03T01:49:07.270000 -CVE-2024-25531,0,1,bd85456fb7927acce04fe7a9bc7cdc00ebec612fe72b4d084a7b6d36f2668c40,2024-07-03T01:49:08.077000 -CVE-2024-25532,0,1,e49a0b06aa42ebeb681466a026e650a02f7f003c3c52a351a3b30566efcaa78c,2024-07-03T01:49:08.880000 -CVE-2024-25533,0,1,2874c2bc34cbfc664239f45f2595adead46a71c8191985e29a283c134de2ce3a,2024-07-03T01:49:09.687000 +CVE-2024-25530,0,0,114f13be12205b5e8e078f769103c74d2951fd25a93df8266ab8b89213f79502,2024-07-03T01:49:07.270000 +CVE-2024-25531,0,0,bd85456fb7927acce04fe7a9bc7cdc00ebec612fe72b4d084a7b6d36f2668c40,2024-07-03T01:49:08.077000 +CVE-2024-25532,0,0,e49a0b06aa42ebeb681466a026e650a02f7f003c3c52a351a3b30566efcaa78c,2024-07-03T01:49:08.880000 +CVE-2024-25533,0,0,2874c2bc34cbfc664239f45f2595adead46a71c8191985e29a283c134de2ce3a,2024-07-03T01:49:09.687000 CVE-2024-2554,0,0,4552a796c9ee85b6ef29110dc12b6fdb2bc1c1c6991b4eed32c798f6675b6182,2024-05-17T02:38:18.567000 CVE-2024-25545,0,0,8526ed8de9098a72565cdcc04fa7aedeb1b9a5c07e5de61b39c48fe6223c15e6,2024-04-15T13:15:51.577000 CVE-2024-2555,0,0,1ccd9e64964f5792668bd459afb6e731d8426585bc7d41154044abff86d56e8e,2024-05-17T02:38:18.663000 @@ -245772,7 +245772,7 @@ CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593 CVE-2024-25568,0,0,c3930e2ab541535f4ac48d47d06821e2cee1eed8bbcbd00dd0856e41d7aafc24,2024-06-12T01:15:49.033000 CVE-2024-25569,0,0,4638448a8546825fa9e00c3ff94a077ca9cbdaa5d8882a201d353ede23041668,2024-05-05T03:15:07.033000 CVE-2024-2557,0,0,7033022bd95c620bc17bec08414220fdfdd18b2ab9f776b8e336562f8180ee53,2024-05-17T02:38:18.850000 -CVE-2024-25572,0,1,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000 +CVE-2024-25572,0,0,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000 CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000 CVE-2024-25575,0,0,5af0aa3097d78d1504ce01f6ae14ec7e5926b1b9756fc2644e591f5a22c7fdfb,2024-04-30T17:52:35.057000 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 @@ -245804,9 +245804,9 @@ CVE-2024-25608,0,0,777906eeb0a5b0a9c86f59255c54f56d84853d1b7a72669bef6a4f4e08ea2 CVE-2024-25609,0,0,70b2abe4f6b07d14dd1eaed8f77b182b189fc3d24fbd2fcce03d566544ebecbb,2024-02-20T19:50:53.960000 CVE-2024-2561,0,0,e70e3d297a5cfcf73280f39c37fc0e34bc702bf39d4cc7a0f97dd902309c51c9,2024-05-17T02:38:19.233000 CVE-2024-25610,0,0,32d42c7fcf60736021dc24b7a8ddbe346dbc5974b75a910934a4ff892eb9f8d0,2024-02-20T19:50:53.960000 -CVE-2024-25611,0,1,c46de1e524e793cc86eb0bdc5cbe2ad34eb76119a0ea8cb24d1cb4a5d6d9cd72,2024-07-03T01:49:12.103000 -CVE-2024-25612,0,1,992b930be46b09503820d0b6f1a3d60846959dd7632bae760537040765476509,2024-07-03T01:49:12.820000 -CVE-2024-25613,0,1,518989afe4200072598a83066099c13cd3429e215fba7075062ef659312e601e,2024-07-03T01:49:13.593000 +CVE-2024-25611,0,0,c46de1e524e793cc86eb0bdc5cbe2ad34eb76119a0ea8cb24d1cb4a5d6d9cd72,2024-07-03T01:49:12.103000 +CVE-2024-25612,0,0,992b930be46b09503820d0b6f1a3d60846959dd7632bae760537040765476509,2024-07-03T01:49:12.820000 +CVE-2024-25613,0,0,518989afe4200072598a83066099c13cd3429e215fba7075062ef659312e601e,2024-07-03T01:49:13.593000 CVE-2024-25614,0,0,40870767459011e297497de817aef42d74930f89baf5f764fcc19618de4a7138,2024-03-06T15:18:08.093000 CVE-2024-25615,0,0,acf89427f3010b7007b44229a1d165cabfd84113acd72ac65a4b2696544988f2,2024-03-06T15:18:08.093000 CVE-2024-25616,0,0,08e7e92a31b8175954afe7fe6329cd6c1ab805b72ac96ece1d0fb03d1064f703,2024-03-06T15:18:08.093000 @@ -245886,7 +245886,7 @@ CVE-2024-25718,0,0,bb40d9a7c3627957c0a8684f79fde7f1f2d52dca2e08e3b7ada94b1f5660b CVE-2024-2572,0,0,bda2e78923efb2e80e48abe37f879d2bccb5f3875e6afb96342c33b2d570ec5a,2024-05-17T02:38:20.357000 CVE-2024-25722,0,0,e703a271dc38d4f8d963c274b2985e5e8af09acb3f7e3b10f6e36bda19fd7082,2024-02-11T22:29:15.837000 CVE-2024-25723,0,0,f5e48ae195e8428328f05db62baab9ea4ea7e3efac70245f05a45f8f26aeeb9e,2024-02-28T14:07:00.563000 -CVE-2024-25724,0,1,6c3ef472ec3fdf4e4f5e27a3bc11b2436df6b7d677ccade72728fd545179cc6f,2024-07-03T01:49:15.880000 +CVE-2024-25724,0,0,6c3ef472ec3fdf4e4f5e27a3bc11b2436df6b7d677ccade72728fd545179cc6f,2024-07-03T01:49:15.880000 CVE-2024-25728,0,0,89e7ab8efb6550f3630b9bd068d82cee0ea2b2673bf3b1c3df3c1a4a7ca27daa,2024-02-11T22:29:15.837000 CVE-2024-25729,0,0,184930f04b43901bc1f4566a359e2a59bf4139503b85debe12ca335f06305c1a,2024-03-08T14:02:57.420000 CVE-2024-2573,0,0,8794bf8374457a16a6e1849ae018a87dce48fb499e80c0f948b02eb3b1cff67b,2024-05-17T02:38:20.443000 @@ -246050,7 +246050,7 @@ CVE-2024-25971,0,0,228018ab5fef0c3ed939f781a64df1faee82a7c7248157c7097bf7afb03a0 CVE-2024-25972,0,0,03be68c424c2117dfe63b169d17d7f8ada85eec42d35f349ee6876cb9f658b31,2024-03-01T14:04:04.827000 CVE-2024-25973,0,0,fca2cd3fc869e318a8dbf83dd06094ef0c34286b7d421da7c64a9a5612af38b9,2024-02-21T07:15:58.040000 CVE-2024-25974,0,0,455908519f9c0b510f9276a34d5bc0fdc3808298a4e41e75f9e5535d39103827,2024-02-21T07:15:58.427000 -CVE-2024-25975,0,1,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000 +CVE-2024-25975,0,0,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000 CVE-2024-25976,0,0,af013f5d7124558455739bd8657fdb41692f515ee3e85b934d818e8fa4a1a90e,2024-06-10T17:16:22.307000 CVE-2024-25977,0,0,2b6afc810557db726576499354b60b46e97d0658cd69cbff27c2298f880b45c2,2024-06-10T17:16:22.373000 CVE-2024-25978,0,0,6077c79891dbc19bf922b49d852065c4a1dfd37d10fb26a09b28d42f35261fd6,2024-02-29T03:15:07.067000 @@ -246093,7 +246093,7 @@ CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50 CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000 CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000 CVE-2024-26029,0,0,73b1b2a7a164f2d1b52c68fceca6c2cc8b7181b78e4f3a2dcaf477ebe79168d6,2024-06-20T16:03:36.843000 -CVE-2024-2603,0,1,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000 +CVE-2024-2603,0,0,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000 CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000 CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000 CVE-2024-26032,0,0,d12b1deafb7f503f2da2b6f08ed3ffc2b0c3783c86e2506252b03bfbb01459b8,2024-03-18T19:40:00.173000 @@ -246147,7 +246147,7 @@ CVE-2024-26076,0,0,dd253dd02ca5cdf33476fa07aa48b0d3b8afaffb5fcaa6203628f4bd44edf CVE-2024-26077,0,0,9ad69f54bc1eb0ff6be907095f4d102577daf5f12eb9866764b78a91a829950d,2024-06-14T19:35:14.353000 CVE-2024-26078,0,0,070fd8f14d3101afe8a2249032d64b596c2af3ab88dc9e96b41587d3a7b93214,2024-06-14T19:35:02.233000 CVE-2024-26079,0,0,d38ad5703492e3d5955769f8da924f53fd7fefeb38650250cfec3e979713edbc,2024-04-10T13:23:38.787000 -CVE-2024-2608,0,1,034c3f0d69de46d9ba7a73a0532d7d80b727b4c71250c7f2c3749a641f69ef8b,2024-07-03T01:53:22.600000 +CVE-2024-2608,0,0,034c3f0d69de46d9ba7a73a0532d7d80b727b4c71250c7f2c3749a641f69ef8b,2024-07-03T01:53:22.600000 CVE-2024-26080,0,0,985369cd20039768ffb9e0a343ef3ec94259ec110458f9976172d6fbd3da993c,2024-03-18T19:40:00.173000 CVE-2024-26081,0,0,c72f7c9f4be196347838ee307769204199a6cbfb17a050e9a8f3ac2863295699,2024-06-14T19:34:47.583000 CVE-2024-26082,0,0,56a13f29a2e8ddbfc7e70df0673c54a7fca13e31cd226d69d2cc85615a83a09f,2024-06-14T19:34:37.370000 @@ -246235,7 +246235,7 @@ CVE-2024-26166,0,0,f391c4b0db733d40148db48047d4241707d804226a4057e01c2cdc7ed3c4a CVE-2024-26167,0,0,df41d27f07d121d47403423e03cb5d0669d0be17e49911f76c8b08032270ca64,2024-06-11T16:15:19.920000 CVE-2024-26168,0,0,949af59ee3b8c1baa60afaabce6faf5f018a8b72d7b8397412fa4ad69b2f274a,2024-04-10T13:24:00.070000 CVE-2024-26169,0,0,876220a6addf603249aab5a8d380045e5fae4595204990ceaffb72e1d0ad1afc,2024-06-14T17:36:18.710000 -CVE-2024-2617,0,1,c735ab59fafbabeeafc878072d5ef91a88b0cb8e9dc08af938860e93db5c996f,2024-07-03T01:53:23.587000 +CVE-2024-2617,0,0,c735ab59fafbabeeafc878072d5ef91a88b0cb8e9dc08af938860e93db5c996f,2024-07-03T01:53:23.587000 CVE-2024-26170,0,0,f2c772370ea374610349e86e1f764806e1b8901d9cb2b50e74b95ca0709a0820,2024-05-29T00:15:37.043000 CVE-2024-26171,0,0,9585df40c5f7289258f98464992d6f7b36d924236a4b679b88371a3376d72c9d,2024-04-10T13:24:00.070000 CVE-2024-26172,0,0,c6f278d7e7fafad9e920f5166d13c7edaac3efa6dc535e1f3334920cb3dd37e9,2024-04-10T13:24:00.070000 @@ -246325,7 +246325,7 @@ CVE-2024-26254,0,0,07a4b81b26bc3f1c97cbd450d7200968eabb824affdc4e125ab1428b8b376 CVE-2024-26255,0,0,85638effedfaf37162394543c2ea8be3fea3cadc51d4bb0413585c9f3e228970,2024-04-10T13:24:00.070000 CVE-2024-26256,0,0,3e9fd5f0cea24d911e8a5503fa19177642b096dc511ef1b7b5f746aab8cc55a7,2024-06-12T02:15:09.700000 CVE-2024-26257,0,0,05a28d03660a848990668904555214fae6f00026d23d1677e03b07f5dc8dee4e,2024-04-10T13:24:00.070000 -CVE-2024-26258,0,1,56e6cbff63319419d28919e5ab94a9d137eaeced96f06dc8fcae1f1b4a33af9f,2024-07-03T01:49:34.870000 +CVE-2024-26258,0,0,56e6cbff63319419d28919e5ab94a9d137eaeced96f06dc8fcae1f1b4a33af9f,2024-07-03T01:49:34.870000 CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000 CVE-2024-26260,0,0,65643e0ce4f84c48cec78b438df5085c99da999075d065c3a4c15ac8e9f87e0c,2024-06-28T02:15:03.190000 CVE-2024-26261,0,0,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d8a0,2024-06-28T02:15:03.423000 @@ -246364,20 +246364,20 @@ CVE-2024-26301,0,0,2608c1cecd8361b3b47bfbbf59c86957def061e4e57f0dcf17ead87df4592 CVE-2024-26302,0,0,06ca396cc01c14d2ae0f6244893f0725bb4301aac5cbbab64c89dda4aad3860e,2024-02-28T14:06:45.783000 CVE-2024-26303,0,0,e8a32302234eae79d15cd650de94083a6eecd6414f858c459fb16f2cfc29e3a0,2024-03-27T12:29:30.307000 CVE-2024-26304,0,0,0b20334eea94fd7542c192fe2b31f743af7a584e97ca17063369a172ed015faa,2024-05-01T19:50:25.633000 -CVE-2024-26305,0,1,a65ba50eb26a2c8cd8116833b01ccff155f5f99454b54473ac13d25eeaae6554,2024-07-03T01:49:36.833000 +CVE-2024-26305,0,0,a65ba50eb26a2c8cd8116833b01ccff155f5f99454b54473ac13d25eeaae6554,2024-07-03T01:49:36.833000 CVE-2024-26306,0,0,0ad788973fbbd4d8625f41ad93584f6b3d96f58b918c8ac5d2726ff31f3ddf40,2024-05-14T16:13:02.773000 -CVE-2024-26307,0,1,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592e62,2024-07-03T01:49:37.557000 +CVE-2024-26307,0,0,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592e62,2024-07-03T01:49:37.557000 CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000 CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000 CVE-2024-2631,0,0,ef53dc4c0236fb1eb623bfb36f2824e0ea2259d5ae6edb826dc04699165fea4c,2024-04-01T15:23:45.590000 CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000 CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000 -CVE-2024-26312,0,1,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000 +CVE-2024-26312,0,0,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000 CVE-2024-26313,0,0,307927a31aa9525f579ecee601093796b34c0481bc031cf5fc7cd7d3e73f1218,2024-03-08T14:02:57.420000 CVE-2024-26314,0,0,0d34c3ef9621fd978ad0be298f858bcd5d61c687de97df8a2778efccfa284634,2024-07-02T17:44:45.700000 CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000 CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46 -CVE-2024-26327,0,1,30d08d577d44d38c98e8d09a3ca2e28a354f8d84b13e8b7475d667e0aa1a602c,2024-07-03T01:49:38.810000 +CVE-2024-26327,0,0,30d08d577d44d38c98e8d09a3ca2e28a354f8d84b13e8b7475d667e0aa1a602c,2024-07-03T01:49:38.810000 CVE-2024-26328,0,0,70bb62dee22bd65978afbda4aa44a7dcc2acba975045b0300cec412005d5eda5,2024-04-19T07:15:09.770000 CVE-2024-26329,0,0,6eec7b644c4867f186846a122998b4350a4dc0459882c3ea663ee6d77c6e1117,2024-04-05T12:40:52.763000 CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46 @@ -246396,7 +246396,7 @@ CVE-2024-26350,0,0,94fde44080954984b73836ed416075677e0fc24eadc0bc6ed473bcf70a41b CVE-2024-26351,0,0,ca59fd7de6fb4b8be3d1dd63bf1340c6e097ec7efd2f74728f2b6d3782e5af9c,2024-02-22T19:07:27.197000 CVE-2024-26352,0,0,a91e9b827b34ff74d03de6eecd5ed6a244c3125227e96fd7536e6e0fc75fc75e,2024-02-22T19:07:27.197000 CVE-2024-2636,0,0,2136f31c86bb7a335e516e0265dfb7c3eee5b1d10cfc06f1391b5375fe684311,2024-03-19T13:26:46 -CVE-2024-26362,0,1,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000 +CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000 CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ecf83,2024-05-14T19:18:31.490000 CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46 CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000 @@ -246439,8 +246439,8 @@ CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41 CVE-2024-26495,0,0,bbb6b231bf109fc8acfd5241f02faec1361b46bca779b6926f0190dbd5a53c19,2024-04-03T12:38:04.840000 CVE-2024-2650,0,0,e5741f6c9edd36c8ab868274b7c5445ec4657874106d32e2eb21c1d38ec57aa0,2024-04-10T13:23:38.787000 CVE-2024-26503,0,0,67af53e4079744ca59c487303c5ff1417327cd875b9be966624dba59813771c0,2024-03-15T12:53:06.423000 -CVE-2024-26504,0,1,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000 -CVE-2024-26507,0,1,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000 +CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000 +CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000 CVE-2024-2651,0,0,0d048908653e9857526dde0003f34c423314d600b67c7d845e0b43f056ba9c85,2024-05-14T16:13:02.773000 CVE-2024-26517,0,0,bd4763012c70279fd682115754eb1a354519ae29026816c007044315383dfe51,2024-05-14T16:13:02.773000 CVE-2024-26521,0,0,cd304afd2135ea7b8ef2211742c7b93ec84446277e098ef9dbbecd48d38b35d0,2024-03-12T12:40:13.500000 @@ -246761,7 +246761,7 @@ CVE-2024-26850,0,0,dab640da12df724b0a3e304a986a85e4251ea2bf463c19dbbcb16aaddef82 CVE-2024-26851,0,0,17abdfa7553c9586287186cf7930189d90be563de8a21e88abcb269bc4ef19f5,2024-06-27T13:15:56.800000 CVE-2024-26852,0,0,929805d418e0925118a949e72844d455001fdcb146e5b9be74c860c17b87c399,2024-06-27T12:15:21.490000 CVE-2024-26853,0,0,5c1d6d0e3fff92a472dae6bdc4a94a39e8c365023f2aa19dd97627908917e416,2024-04-17T12:48:07.510000 -CVE-2024-26854,0,1,71382c729dcbfb61122fea21c2172ded949fa87a0f12accbe08dbcfd7b75a577,2024-07-03T01:49:55.907000 +CVE-2024-26854,0,0,71382c729dcbfb61122fea21c2172ded949fa87a0f12accbe08dbcfd7b75a577,2024-07-03T01:49:55.907000 CVE-2024-26855,0,0,886ddc3721adf95f88b9bbfc2e5477192b0a984b817d6e8f089c87f8f71b32f9,2024-06-25T22:15:24.110000 CVE-2024-26856,0,0,d2ecc22abb6a286e1e94e314d6222b6a396e97380332e1141586776671c270c3,2024-04-17T12:48:07.510000 CVE-2024-26857,0,0,ce7325075365245fd95cf133db6fd5d7000c600dc3e76e7125131211de098e3d,2024-06-27T13:15:56.880000 @@ -246772,7 +246772,7 @@ CVE-2024-26860,0,0,955f045170883df7e16a3327bfda3dbef0b53bfbdc290182b2ade36cd0a20 CVE-2024-26861,0,0,8f8500ff35b5ba7c52edf0020fa7734eb1cc56b05f96c4080397501db239088f,2024-06-25T22:15:24.310000 CVE-2024-26862,0,0,a4798f87cc3af6d50bb3d0861f8abe3759900dcd5c97bdebd3438bf13ad928fa,2024-06-25T22:15:24.387000 CVE-2024-26863,0,0,0209e47ff9cfcec7c1fe274a2511fb6024826a5951f1df017809b69e9034c675,2024-06-27T12:15:21.633000 -CVE-2024-26864,0,1,cde86c845159def7daa507d75fbf654ff0f83d93de2d59c846972031136c89fd,2024-07-03T01:49:57.117000 +CVE-2024-26864,0,0,cde86c845159def7daa507d75fbf654ff0f83d93de2d59c846972031136c89fd,2024-07-03T01:49:57.117000 CVE-2024-26865,0,0,d1702cc240e430cbb6f254e98b3323917b6e3e54d44bbaeb519424848b98254b,2024-04-17T12:48:07.510000 CVE-2024-26866,0,0,9cf2c6dd16558c41d4e9bc85a931c7250d9dd5f5522c8eca13890782afc35a08,2024-04-17T12:48:07.510000 CVE-2024-26867,0,0,e76b2b0f326d3e35d47859522bdb2881a58f9e936a4a2a6027a052a6a2082706,2024-04-17T12:48:07.510000 @@ -246807,7 +246807,7 @@ CVE-2024-26892,0,0,688376c4324ea6e95054950a543b4e29e1ce33115f8cd0779143841c3bda1 CVE-2024-26893,0,0,1f6a9cc5570b4cc20166e056fbbe56ac59e2bccce9acb4ad6f8361f3f40f222e,2024-04-17T12:48:07.510000 CVE-2024-26894,0,0,511c8af8a1aae3705ce71f019d1e232a006324960f8d3d953c567e5a4353572d,2024-06-27T12:15:22.177000 CVE-2024-26895,0,0,db3f834083271c88a2daa1aa14eb5f61bf8f4edfa34b6bcb164297fe50ac444e,2024-06-25T23:15:27.080000 -CVE-2024-26896,0,1,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000 +CVE-2024-26896,0,0,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000 CVE-2024-26897,0,0,6bcf13dce11b85f353022bbc8fc5f6986fcb0b78458e3fa86db5590c08c6f073,2024-06-25T23:15:27.180000 CVE-2024-26898,0,0,9e525eab1c9e8995de7e43db178036926cea6bb5d20e70c586b397918eaa4357,2024-06-27T12:15:22.257000 CVE-2024-26899,0,0,021eca8ea6a81120cb7c81a3d3bdb18e09f0d17f90de09091ca22a9d038b6b84,2024-04-29T19:34:10.080000 @@ -246837,29 +246837,29 @@ CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9 CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000 CVE-2024-26922,0,0,ea9e0a3791a3b37f43c13160be5c02289544ce9e8ec20d8e53b5453592702b96,2024-06-27T12:15:22.813000 CVE-2024-26923,0,0,b461fe01e06fb707cd15b897f191eea1bdccd90b00b363d7aa1c5f6a9f6a5876,2024-06-27T12:15:22.923000 -CVE-2024-26924,0,1,4995bf418ad040001a9127f17d0754d5e3fc34b1ab969f823d8ebf3fc8141c89,2024-07-03T01:50:00.957000 +CVE-2024-26924,0,0,4995bf418ad040001a9127f17d0754d5e3fc34b1ab969f823d8ebf3fc8141c89,2024-07-03T01:50:00.957000 CVE-2024-26925,0,0,c80e18dae334fcb4312a5252981fb94870f3e4932fef1f9fc7f6178d6b1fef71,2024-06-25T21:15:58.627000 CVE-2024-26926,0,0,efa4d9f5b99e592708f9a5ef1ea162339d7a56f0818c92044e9abb2fcb35c80c,2024-06-25T23:15:27.893000 -CVE-2024-26927,0,1,4116dbe7df52a1c2d9850cca2fd6397392bdbeda2c2b84e268cf9d86129f791b,2024-07-03T01:50:01.863000 +CVE-2024-26927,0,0,4116dbe7df52a1c2d9850cca2fd6397392bdbeda2c2b84e268cf9d86129f791b,2024-07-03T01:50:01.863000 CVE-2024-26928,0,0,356749b5efd3e51950b32012233c612b93e1c25f21b750fb61ffd2aaf8554d2d,2024-04-29T12:42:03.667000 CVE-2024-26929,0,0,bbb851a79a93a363e352bb5d96ddf71c38e37b9f175f55319aa1039600b887ab,2024-05-23T19:07:27.803000 CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000 CVE-2024-26930,0,0,3885fe1fa73799da895810b44f93f3951c708b35b460f991f25484a478614d7a,2024-05-23T19:10:49.540000 CVE-2024-26931,0,0,2cdf8e04feaa44739b4bdcdd7f8ff95110c37b6b478bd37402a6a0b6da093d4f,2024-06-27T13:15:57.053000 -CVE-2024-26932,0,1,a7582335e50b6e1a72f82df662a334c5ee8442e98bc313740f04373597dd30db,2024-07-03T01:50:02.753000 +CVE-2024-26932,0,0,a7582335e50b6e1a72f82df662a334c5ee8442e98bc313740f04373597dd30db,2024-07-03T01:50:02.753000 CVE-2024-26933,0,0,74ecb5d6388685ffacbea1351beb1f6d860ac3447041ba550ec0df60bf844fa0,2024-05-23T19:12:43.773000 CVE-2024-26934,0,0,bf6e546596921728acfe319c516bea1e1abf8b1196f18535cded4e1ddbafaedf,2024-06-27T13:15:57.133000 CVE-2024-26935,0,0,e73d92e1aa9b37641485ddd30110986ec457a10279231ad37da824c924ed1239,2024-06-25T21:15:58.710000 CVE-2024-26936,0,0,ac3611a024cce1dc29fc377a7f2aca0292c14e6592911fdbd080f60f2117c044,2024-05-17T11:15:08.257000 CVE-2024-26937,0,0,13ddbdb7deacac9c8664659994e91c378253f75f957ac64f7f94e46370a06239,2024-06-25T22:15:26.440000 CVE-2024-26938,0,0,321e927ef910319074b978288ce15e9ebcbbcafa9b2849cd294ce5472307acb5,2024-05-01T13:02:20.750000 -CVE-2024-26939,0,1,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000 +CVE-2024-26939,0,0,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000 CVE-2024-26940,0,0,0f7b60c7074169eef5b0805dc07f3f012de89cf52283f43c6fb864cb8061acc6,2024-05-01T13:02:20.750000 CVE-2024-26941,0,0,d5edb0519d12495e38c26375af70fb76a969a5da638017008bfea75e4a0468ef,2024-05-01T13:02:20.750000 -CVE-2024-26942,0,1,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000 +CVE-2024-26942,0,0,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000 CVE-2024-26943,0,0,28c15f250470f99abb4044cea0ff718e86e66a59267e92211de026301eb61abf,2024-05-01T13:02:20.750000 CVE-2024-26944,0,0,95cb3bf01235c272219e76e8386a7bba4aabd1011dab496d9c06632c2a39819d,2024-05-01T13:02:20.750000 -CVE-2024-26945,0,1,ceea5ef58ad54d0a792ae170098830605013e0d3f4d8eb0315b8ddad809a5bda,2024-07-03T01:50:05.433000 +CVE-2024-26945,0,0,ceea5ef58ad54d0a792ae170098830605013e0d3f4d8eb0315b8ddad809a5bda,2024-07-03T01:50:05.433000 CVE-2024-26946,0,0,03955d0f2bc318bb8984ca0ab6d4535e3edab8a455147eb89f589c2cd541c436,2024-05-01T13:02:20.750000 CVE-2024-26947,0,0,9675f42687fbcf2f6cc20529b1558a892788f21cf57028b5f39f7df35aa2717e,2024-05-13T08:15:10.313000 CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643df1,2024-05-01T13:02:20.750000 @@ -246867,15 +246867,15 @@ CVE-2024-26949,0,0,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3 CVE-2024-2695,0,0,8a09fd0fbbc0e6aad9f600099af217153dcb87824db83615c89c25b3d512d1ef,2024-06-17T12:42:04.623000 CVE-2024-26950,0,0,3dc1f7bf7e9e6267c2bcffe3bb557dc394f0c1c2ab76d79961eda90eb74502ca,2024-06-25T22:15:26.520000 CVE-2024-26951,0,0,0f8ea3bcc3485368c7aaf5f7c1ab72347a950fda68c6016016f8dd78003a1fd0,2024-06-25T22:15:26.583000 -CVE-2024-26952,0,1,47ebebbcdab3581e41cc5107a6b3f0472a8676645b0ea70ac7b8109d2eee0964,2024-07-03T01:50:06.420000 +CVE-2024-26952,0,0,47ebebbcdab3581e41cc5107a6b3f0472a8676645b0ea70ac7b8109d2eee0964,2024-07-03T01:50:06.420000 CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000 CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000 CVE-2024-26955,0,0,f3682ec6a42ed9fad15d4ad94f0afc24f8f82991e5d90ea0d9ac427041d25652,2024-06-27T13:15:57.220000 CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2937,2024-06-27T13:15:57.290000 -CVE-2024-26957,0,1,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000 +CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000 CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000 CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000 -CVE-2024-26960,0,1,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000 +CVE-2024-26960,0,0,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000 CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000 CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000 CVE-2024-26963,0,0,889457b3fe1d29054f2c173859213556de5ffec87e40d507efafbf347da7e76d,2024-05-01T13:02:20.750000 @@ -246885,23 +246885,23 @@ CVE-2024-26966,0,0,988d3836d88dc653d434c39d37ea05ba90773acadabefa49a68922d719606 CVE-2024-26967,0,0,3f8ba2525e4f63fd5e4a12d535e0b4f15bc370694291b91bd2baa1315d6d7195,2024-05-01T13:02:20.750000 CVE-2024-26968,0,0,385865acf42afbe5d6d9407148d078a33fc4bbdf230b0f52e55a8fe947965732,2024-05-01T13:02:20.750000 CVE-2024-26969,0,0,d00ce9b06a03c713518bd3eb23ecc51ac3ce412faa9cd03f86e60da072aa6f54,2024-06-27T13:15:57.397000 -CVE-2024-2697,0,1,f8c842b96914534995a7f6c1541ce43d05eddbe65424b582cf5dfaf951722d70,2024-07-03T01:53:28.700000 -CVE-2024-26970,0,1,3c35fe8319cb49f9fc9255264025a882fc92fbc6a7b0648c8516887eea16225d,2024-07-03T01:50:09.343000 +CVE-2024-2697,0,0,f8c842b96914534995a7f6c1541ce43d05eddbe65424b582cf5dfaf951722d70,2024-07-03T01:53:28.700000 +CVE-2024-26970,0,0,3c35fe8319cb49f9fc9255264025a882fc92fbc6a7b0648c8516887eea16225d,2024-07-03T01:50:09.343000 CVE-2024-26971,0,0,6b41071d6836bf413ec0d9a17a0b6d0e444914fad9b95723f69c2aeb1ca1ca5b,2024-05-01T13:02:20.750000 CVE-2024-26972,0,0,2ea7fa74cfe98c165c3e419a6f2631ccb110e153161fee98058a6b4579c8bf52,2024-05-01T13:02:20.750000 CVE-2024-26973,0,0,ff95881471f628307c43018b0d4a9aaf4c18e0565bd184d6ab78743fbeb0040e,2024-06-27T12:15:23.210000 CVE-2024-26974,0,0,40f15b142d902b780f0ed9a5e7d2b9362ae9f273032eec29fbfa853a02fb1645,2024-06-27T12:15:23.293000 CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d0ec,2024-05-01T13:02:20.750000 -CVE-2024-26976,0,1,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4baec7c,2024-07-03T01:50:10.377000 +CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4baec7c,2024-07-03T01:50:10.377000 CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000 -CVE-2024-26978,0,1,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000 +CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000 CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000 CVE-2024-2698,0,0,758579b568a4887d746dcbadeb9e5d5dbe9c948ed21f398b8dd22a95a4fd3e38,2024-06-27T03:15:49.860000 CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000 CVE-2024-26981,0,0,78b7e7c683bce4836c9547c018e0cc1c1614c35cf0899c3a1d961f61b36bdfc3,2024-06-27T12:15:23.460000 CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000 CVE-2024-26983,0,0,d3d7f9f5caf4e079a71f70f8bc14c3d32922ad02f616d250213454d5ce4002ce,2024-05-13T08:15:10.750000 -CVE-2024-26984,0,1,3242ef5633b232011b368edbcc114d10037a576fda03267e797bc4436c77737b,2024-07-03T01:50:12.193000 +CVE-2024-26984,0,0,3242ef5633b232011b368edbcc114d10037a576fda03267e797bc4436c77737b,2024-07-03T01:50:12.193000 CVE-2024-26985,0,0,7a740fe69951ccfc3b1e74b7db3fbfca448128a35ad090b49ba3486012aceb7d,2024-05-13T08:15:10.823000 CVE-2024-26986,0,0,3a04da6776d5b30be98a9a3456a9602e44e9b692af32172ae4d107260563fc81,2024-05-23T19:14:25.180000 CVE-2024-26987,0,0,8c26013d98bcf2e4e743c73d724873f3f29d66506454e1cf0da9933616dab821,2024-05-23T19:15:23.693000 @@ -246957,7 +246957,7 @@ CVE-2024-27033,0,0,e817cc98b5190793135c3bd18ab65a167e608cc8f3ca593ad6d803d03c216 CVE-2024-27034,0,0,5b1c4c72c15b589bb88da4f2c0040f3c36b27bc8d226ace8f4cb0b859be1d61e,2024-05-01T19:50:25.633000 CVE-2024-27035,0,0,75ce8cd999fde49c8a49584c5335f6d3bd679a43b32b236e19ac09e9b9e84acf,2024-05-01T19:50:25.633000 CVE-2024-27036,0,0,45f7528031da5f17cc420714d80b032cc0196c8ac3fff06f0bba88cdf0a47bd1,2024-05-01T19:50:25.633000 -CVE-2024-27037,0,1,135591b5e8a55eb5ce962bd98bf8d946730dde849976aa38e9a7607fe8478094,2024-07-03T01:50:15.890000 +CVE-2024-27037,0,0,135591b5e8a55eb5ce962bd98bf8d946730dde849976aa38e9a7607fe8478094,2024-07-03T01:50:15.890000 CVE-2024-27038,0,0,aac6f128a2b7cc671e89f6cd496a68a255a07d87d810a6dd8cbdd74ecbd09d6f,2024-06-25T21:15:58.793000 CVE-2024-27039,0,0,ed4ba32d17a0fd7f637f45995d661ac555d159fb46dd379e6c3c8b1f723bc7a2,2024-05-01T19:50:25.633000 CVE-2024-2704,0,0,9d106e2a42025ec8fa45d69b5c0a0b5cdbec180ff9fcd6a29154d0957359da10,2024-05-17T02:38:25.980000 @@ -246972,10 +246972,10 @@ CVE-2024-27047,0,0,79816067c09291199a2b02cd8ce910c0433db186878f016a7a73a27b920c4 CVE-2024-27048,0,0,45eaaaa13fad0bf72d0089e8a3dfef271de46ff51485852bb2d39923a5177cb9,2024-05-01T19:50:25.633000 CVE-2024-27049,0,0,65cc558c22a88b2154202b4b806f620f51b51904f97b3aa60c73da128c7087c4,2024-05-01T19:50:25.633000 CVE-2024-2705,0,0,3e666a308898abd217bf65b86a46d45692dd7d1d908a3e27e105a106e339abbb,2024-06-18T20:15:12.870000 -CVE-2024-27050,0,1,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9a9f,2024-07-03T01:50:17.020000 +CVE-2024-27050,0,0,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9a9f,2024-07-03T01:50:17.020000 CVE-2024-27051,0,0,f538d49dea09fc8e046e115a414b4c9b26c5f0665b004bffd98fe051abc7a52b,2024-06-25T22:15:29.110000 -CVE-2024-27052,0,1,5def08a6dfc2bf471175fd717e5b1cca3b49d17960d50bf8264f2c735a7ef219,2024-07-03T01:50:17.917000 -CVE-2024-27053,0,1,0e94f9e68df85347a12572424dfaa9f95370b522d5c7b0199d58c0cc4a3d2a3b,2024-07-03T01:50:18.727000 +CVE-2024-27052,0,0,5def08a6dfc2bf471175fd717e5b1cca3b49d17960d50bf8264f2c735a7ef219,2024-07-03T01:50:17.917000 +CVE-2024-27053,0,0,0e94f9e68df85347a12572424dfaa9f95370b522d5c7b0199d58c0cc4a3d2a3b,2024-07-03T01:50:18.727000 CVE-2024-27054,0,0,b3828feb26e7193e98004950722f954a0d27ddf6659e10f6d54fdf8a21f5d085,2024-05-01T19:50:25.633000 CVE-2024-27055,0,0,b139ffaada6869cacbe2977f7f53e69927c3cb7015f4f2f7e113c5331af5815e,2024-05-01T19:50:25.633000 CVE-2024-27056,0,0,07f62717c62a9735eb3c1bd93c9c65c098d48d4d06f9016f7ee847ea7bbf1fa9,2024-05-01T19:50:25.633000 @@ -247039,7 +247039,7 @@ CVE-2024-2711,0,0,80eecb09bc786c349f171557dbca1f01daa7603122f867515e5e3d12bb6df6 CVE-2024-27110,0,0,1f459ce0397f3bd5ab00416d5a98f7fa5e01cb8abb8ffd0034d459fd88eae9d6,2024-05-14T19:17:55.627000 CVE-2024-2712,0,0,8a318e35bf229c3f0dd5db5ecabd652818c52f2a8d11afdd3e709877412ead7f,2024-06-27T19:15:13.167000 CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000 -CVE-2024-27124,0,1,26db67db3453e1dd267c91698f9b1417c8d160e52aa7cf62e0f7bdbf1310db55,2024-07-03T01:50:21.947000 +CVE-2024-27124,0,0,26db67db3453e1dd267c91698f9b1417c8d160e52aa7cf62e0f7bdbf1310db55,2024-07-03T01:50:21.947000 CVE-2024-27127,0,0,0dd5e397c474a9ffd4753312393a0a29d3669dbc8ea3d16e7bfbb9019919a563,2024-05-21T16:53:56.550000 CVE-2024-27128,0,0,1bce392fa9d2a689b9ca5f77f13a07b6f5de5cdaff6f1fdec225d9014cd0146a,2024-05-21T16:53:56.550000 CVE-2024-27129,0,0,63822593b737c1f7d1321e2bde68830f9b7bb468d4be611abb41f975e7936bff,2024-05-21T16:53:56.550000 @@ -247159,7 +247159,7 @@ CVE-2024-27255,0,0,1a87ed865e33969bd25e1a85296cce48c9cd6a59a0cfe097079e825c89c05 CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af2c,2024-03-22T15:34:43.663000 CVE-2024-27260,0,0,522ae8ef6f299c11a8fcb1cc5ace09319fb6956211b0f4d544d2205a4b18cf0a,2024-05-17T18:36:31.297000 CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000 -CVE-2024-27264,0,1,5b05058cab01af78485d8e87f447d715fe24de200504b4a03b12082b6abc7ab2,2024-07-03T01:50:28.290000 +CVE-2024-27264,0,0,5b05058cab01af78485d8e87f447d715fe24de200504b4a03b12082b6abc7ab2,2024-07-03T01:50:28.290000 CVE-2024-27265,0,0,a52bbd360a6e47490ba11a2331048d18c2ebad63cb5bd9c43f26e021577a44df,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 CVE-2024-27268,0,0,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000 @@ -247172,7 +247172,7 @@ CVE-2024-27277,0,0,6c09ef572e665868238fb6d81d7d941702112e8d7fb954bfa230fe4edfeb4 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000 CVE-2024-2728,0,0,7421d8c55e6957a53bf73010cf85ba08bc0e32ff69843b7d1d465cfe4b69908c,2024-03-22T15:34:43.663000 -CVE-2024-27280,0,1,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 +CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 CVE-2024-27281,0,0,3e7909b4ec22b1800139a5d6363ad5f7d4604c5ed61c884f67f94e877ee84ba4,2024-05-14T16:13:02.773000 CVE-2024-27282,0,0,6c498d8d3ca11839f8304e51870fb0650c23b00e373c0afe7416efbaa99cc19e,2024-05-14T16:13:02.773000 CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000 @@ -247182,7 +247182,7 @@ CVE-2024-27286,0,0,dc5e3eb074fb45a698b8815c2cfdfbf8ad2c6a1a603a9be18fc4332e22258 CVE-2024-27287,0,0,d39a5a81bba12832000063f3b9581e0b7d6775f42d5ae8b4ab36f6d9201b4612,2024-03-06T21:42:48.053000 CVE-2024-27288,0,0,972b8881fdda4caea1ce2e8251f4902d5d9c956c56f59d23bb4c51d8ee2f2790,2024-03-06T21:42:48.053000 CVE-2024-27289,0,0,94a320fc3e3b519521594a16d2cd589eda8024b7301f94db72ff8831b436ae41,2024-03-06T21:42:48.053000 -CVE-2024-2729,0,1,014913c07d07a7d30dcd939763c2e1443102e2977a3cd1720a301d0534e829c0,2024-07-03T01:53:30.393000 +CVE-2024-2729,0,0,014913c07d07a7d30dcd939763c2e1443102e2977a3cd1720a301d0534e829c0,2024-07-03T01:53:30.393000 CVE-2024-27290,0,0,46afcd058e69ddd463d55bd6114c2bf186c2c4e4a355006dc3d58bec7a9da571,2024-03-21T12:58:51.093000 CVE-2024-27291,0,0,c4d0ad0c0399c8997dec37bc4474b8774cfe2b824eca646ed305114cc011e11b,2024-03-21T12:58:51.093000 CVE-2024-27292,0,0,d01fe4db95f9c2e2ecef918b2a428f31ae89268ce31a396edf76121b103b1264,2024-03-21T12:58:51.093000 @@ -247207,7 +247207,7 @@ CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540 CVE-2024-27310,0,0,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000 CVE-2024-27312,0,0,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000 CVE-2024-27313,0,0,abfc55e858edef62cf245a012f5c8675eea16323079fcd802a4ef8e6ddc5d69c,2024-06-07T09:15:11.917000 -CVE-2024-27314,0,1,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 +CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000 CVE-2024-27316,0,0,b47ae7ed2f6b6d0404e92040d827962fa7519af4fad78f5cadf42a3a74fb9b8f,2024-06-10T17:16:22.980000 CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000 @@ -247241,13 +247241,13 @@ CVE-2024-27343,0,0,45c7ed1c4eed9ea624ee8b5def6c8c375e3f0f3011b69d57beef7384d6bbc CVE-2024-27344,0,0,8aefe242670cc36dda0dce3798a7acb646a2bde29ffc66b45e4357a4348e3048,2024-04-03T17:24:18.150000 CVE-2024-27345,0,0,fe911dc85212419c00cd206bd5ce379cb6ba140e18be3c5480a17f10aedd8eb1,2024-04-03T17:24:18.150000 CVE-2024-27346,0,0,386b701029626639fdc143fc77e569108911d00594cd7781652dc458bf9d469e,2024-04-03T17:24:18.150000 -CVE-2024-27347,0,1,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000 +CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000 CVE-2024-27348,0,0,d98966d101bef8f3ba7865313a7b82f5808acf763b8f01d477948e99d880afd1,2024-05-01T17:15:30.443000 -CVE-2024-27349,0,1,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000 +CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000 CVE-2024-2735,0,0,0fc46982ae2bb65c79d893d71d43586449f915b196de8114a5c92c3c81993284,2024-04-10T13:23:38.787000 CVE-2024-27350,0,0,5597abb0ceda36739a00afc67d358c9c0f6015c501af0eb35c72e1c96465f58f,2024-02-26T16:32:25.577000 -CVE-2024-27351,0,1,5a36bd6e7f8b98dc30dfca7d22b6d4573152d80044f0f10dfc41d8abe078fc7e,2024-07-03T01:50:33.137000 -CVE-2024-27353,0,1,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900afec8,2024-07-03T01:50:33.967000 +CVE-2024-27351,0,0,5a36bd6e7f8b98dc30dfca7d22b6d4573152d80044f0f10dfc41d8abe078fc7e,2024-07-03T01:50:33.137000 +CVE-2024-27353,0,0,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900afec8,2024-07-03T01:50:33.967000 CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624556,2024-03-21T02:52:19.927000 CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000 CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000 @@ -247257,7 +247257,7 @@ CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6 CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000 CVE-2024-27372,0,0,65a4e6083a0e4ea46660ce2ac40164e0a6aada29e2b404abc66d633a42676525,2024-06-27T16:41:21.603000 CVE-2024-27373,0,0,a5f85bf1fd75d6fbe892aeea2fbeb2e36f32ed9ba5cc01854079a9bc49e845d8,2024-06-27T16:41:34.797000 -CVE-2024-27374,0,1,3b34220f69671b36a06fb2439f20f7eba7d2c207b7eb01a9af38b33fbd61591b,2024-07-03T01:50:34.903000 +CVE-2024-27374,0,0,3b34220f69671b36a06fb2439f20f7eba7d2c207b7eb01a9af38b33fbd61591b,2024-07-03T01:50:34.903000 CVE-2024-27375,0,0,6605f9f7094be90dc73fada9dcbe43de56313caed93bade5130eb807c0e7fb79,2024-06-27T16:23:15.020000 CVE-2024-27376,0,0,fed48e9f8125655fdf96661c1312e2c746857548fc664043f2915d6a240e8599,2024-06-27T16:22:54.273000 CVE-2024-27377,0,0,769553f4327ff876a97da185a25006beb31a3bcc617248132a6ba5aa2fab8f09,2024-06-27T16:01:21.063000 @@ -247274,7 +247274,7 @@ CVE-2024-27390,0,0,088d48d2e2c1bcbc528cc1356aa6950519935849f26ef96b1de44cf555978 CVE-2024-27391,0,0,65e70f3aa31d54f10a2175246c716de3159fc241796a5925ea0202b5aca1491a,2024-05-01T19:50:25.633000 CVE-2024-27392,0,0,18daf9b92d6f4a5d902800f45a93c4399e05b57b0a6af86e6495b3c7c8276140,2024-05-01T19:50:25.633000 CVE-2024-27393,0,0,abff7d3b8b6a93c872388469215c515ae6242ed29551d606546cbdc1cadebd04,2024-06-10T17:16:23.223000 -CVE-2024-27394,0,1,67112e71836ab43c8ed49fc976b35d6b12c82b3bc282714292ffbd79ee2fef5b,2024-07-03T01:50:36.103000 +CVE-2024-27394,0,0,67112e71836ab43c8ed49fc976b35d6b12c82b3bc282714292ffbd79ee2fef5b,2024-07-03T01:50:36.103000 CVE-2024-27395,0,0,98f969ef2089a9bfd038e0010d850cce07aa0fbd924ac06a86915809550f6eb8,2024-06-27T12:15:24.577000 CVE-2024-27396,0,0,42553a414ba04e25cb84edcc00ca276fdab11b8b6aa0359262c770174c4693f1,2024-06-27T12:15:24.647000 CVE-2024-27397,0,0,20cdabdacc1a91eb0fa4ef8f472950cd97f44c72e319ec51c8fec0dd6043366e,2024-05-14T16:13:02.773000 @@ -247286,9 +247286,9 @@ CVE-2024-27401,0,0,baf7cf6d1266783f7d59648e66746111df25d32dd02c98387b129cc05c99d CVE-2024-27402,0,0,09147ae02a3a7a2264bac7d60094578346abbac731c3e7adfecab21418aafc37,2024-05-17T18:35:35.070000 CVE-2024-27403,0,0,6a5707a6f954b40be9e3b6c26d5507b4b7f1f5c9197cc64654509565a2ec7207,2024-05-17T18:35:35.070000 CVE-2024-27404,0,0,4237c01d8ab9cf8456ec0aa70f7e9a2f19875e407f4983ea57b89219830052cd,2024-05-17T18:35:35.070000 -CVE-2024-27405,0,1,87e9f55f3568c2487fcf6017cb2d7861f4033217a20084a0c240897fca1b7345,2024-07-03T01:50:37.447000 +CVE-2024-27405,0,0,87e9f55f3568c2487fcf6017cb2d7861f4033217a20084a0c240897fca1b7345,2024-07-03T01:50:37.447000 CVE-2024-27406,0,0,6435bcf8e953210d5be13edfe9d91f7384274892bbfe873bfe41e9b71332ec13,2024-05-17T18:35:35.070000 -CVE-2024-27407,0,1,f3c05cd23d444b53011bcada5eb1e95ae3ca95e51b4457a17eabb9e5ca7c50fa,2024-07-03T01:50:38.343000 +CVE-2024-27407,0,0,f3c05cd23d444b53011bcada5eb1e95ae3ca95e51b4457a17eabb9e5ca7c50fa,2024-07-03T01:50:38.343000 CVE-2024-27408,0,0,0572afe7277c29f5abd1e0f4e403754ad27372e133b70e7aaa80e2448c5b5c7c,2024-05-17T18:35:35.070000 CVE-2024-27409,0,0,a88069aee368bf34a4979a9a3b6d9d7d28d6f70a563fbefdbfa8560ce32534ac,2024-05-17T18:35:35.070000 CVE-2024-2741,0,0,72a13180f65eaa34946651eb5c88084bf0e961149a90b72b29d8dddde47c3326,2024-04-11T12:47:44.137000 @@ -247314,7 +247314,7 @@ CVE-2024-27427,0,0,a5e0bb1eb9dddbe621a76038e97dbb5a1e22ad2d3eee07e0a566bbc8af043 CVE-2024-27428,0,0,ea78bb280f9a53a6b506787004b62c38d567896934657d8b3f5126f855f09118,2024-05-25T14:15:52.687000 CVE-2024-27429,0,0,ec3689eecc91e5ba4faa53ce00f63d5adc063318e2e0b4f5ade93be78bdbcd4a,2024-05-21T15:15:28.810000 CVE-2024-27430,0,0,e8f5f3c3f666b15261835cea03a1b31ed58b3552a000ce08076960981f5e6ac3,2024-05-25T14:15:52.803000 -CVE-2024-27431,0,1,f0b943d0779f4c0250316bc3e4f86930ac87e351769e7377bcc9a253794ae476,2024-07-03T01:50:40.003000 +CVE-2024-27431,0,0,f0b943d0779f4c0250316bc3e4f86930ac87e351769e7377bcc9a253794ae476,2024-07-03T01:50:40.003000 CVE-2024-27432,0,0,bd5937e394f88597ffcbb76a366023ae78d17301b9b0df7b8cd54461933e850c,2024-05-17T18:35:35.070000 CVE-2024-27433,0,0,748a157ff40623987a9ce9e7520b789e1e0da033650e1c52c5ba9d314e1f74bd,2024-05-17T18:35:35.070000 CVE-2024-27434,0,0,d841fd1dcd86a1f8018e08863074d3e441327d97f4f98a84814791f719b18dd7,2024-05-17T18:35:35.070000 @@ -247343,7 +247343,7 @@ CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54 CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000 CVE-2024-2748,0,0,cea6a4ab9c8e50f2f7b04d95a9a3a983480b862f6880d1aa4b59ef11a50c4683,2024-03-21T12:58:51.093000 CVE-2024-27488,0,0,a11ec8781330011d7d2c9111350fb429a691d0d011b5b0ec6e5912d62ef9d791,2024-04-08T18:48:40.217000 -CVE-2024-2749,0,1,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000 +CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000 CVE-2024-27497,0,0,bf2a79c4e0ba614def454bde2dd33c58ed2360c3c6db31ca982c34485458d0c9,2024-03-01T15:23:36.177000 CVE-2024-27499,0,0,390358464fa22ad31b65f9d31827086f66523c12c4d3b7c65414a80ffe5fd4f0,2024-03-01T22:22:25.913000 CVE-2024-2750,0,0,793615775ea67e5aaa15784497f8741f13964297cd422277d144de589da63db5,2024-05-02T18:00:37.360000 @@ -247351,7 +247351,7 @@ CVE-2024-27507,0,0,8c49360d0ef5426050d1f79db1fc5fe5b76497de80bce0c2485f14be48a59 CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef9ee,2024-02-28T14:07:00.563000 CVE-2024-2751,0,0,048a4865e89bf3e291a581857de376753d193bc7f3c741677d219a1ffc0f7e38,2024-05-02T18:00:37.360000 CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000 -CVE-2024-27516,0,1,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000 +CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000 CVE-2024-27517,0,0,eaf81e12deb64dd8d1b2d24380f4196dfb242fbf2c45d957e1074397f4677a35,2024-02-29T13:49:29.390000 CVE-2024-27518,0,0,d767806bfefeb1852934300770c4563b38304048001d8b1ab83b8a57e2574266,2024-04-30T13:11:16.690000 CVE-2024-2752,0,0,7ac7e54b3b6d9b85b342200600a035abc39ba2fc0d9149450b049bc12eee1885,2024-05-02T18:00:37.360000 @@ -247370,22 +247370,22 @@ CVE-2024-27565,0,0,96e6f13815f4c6a293b19a63ca7a0089b2c54f0432c50f30c4cd3de5a637e CVE-2024-27567,0,0,4368e6c3c29630571d47ba92cf82bb82637985666e0ed1ee7f11385613c02512,2024-03-01T15:23:36.177000 CVE-2024-27568,0,0,323797eb146837ccc897ceddbc9a717a6133487b17fde4d619016ddccf714199,2024-03-01T15:23:36.177000 CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd656d1,2024-03-01T15:23:36.177000 -CVE-2024-2757,0,1,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 +CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000 CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000 CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000 CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000 -CVE-2024-27574,0,1,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 -CVE-2024-27575,0,1,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 +CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 +CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-2758,0,0,17991f9023170386d082f67ecd28c59f739c4b241c4acc5ac889665593ad11b4,2024-05-01T18:15:19.300000 CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000 CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000 -CVE-2024-27593,0,1,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 +CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000 CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000 CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000 CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000 CVE-2024-27609,0,0,f5d2fceb3a71c480d99c4c75cd0a83ffe0e0dd3a726d0869ef9aadec6a003cba,2024-04-01T01:12:59.077000 -CVE-2024-2761,0,1,5795ed83fa99c1921b7aae8b1ff040c74f4ad844a04231fed91291049f2adb58,2024-07-03T01:53:33.097000 +CVE-2024-2761,0,0,5795ed83fa99c1921b7aae8b1ff040c74f4ad844a04231fed91291049f2adb58,2024-07-03T01:53:33.097000 CVE-2024-27612,0,0,c510222cc98aeecd84a141efbf806cb4a31be0185bd980ef0ea0993f9e29a425,2024-03-08T14:02:57.420000 CVE-2024-27613,0,0,55e42cf2e4639a6096ea75af39dc974125f1048dbd4b80fc4aa61dc42e00d85d,2024-03-08T14:02:57.420000 CVE-2024-27619,0,0,ac27585ed59a6668049d75158e75afc441f45955e396bf2ead784d9f82b5977e,2024-04-01T01:12:59.077000 @@ -247445,7 +247445,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33 CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000 CVE-2024-2775,0,0,d091a1ccf78d17372f4f84bb820577e82fa0db6e70e795af7b29b14574f220d9,2024-05-17T02:38:29.683000 -CVE-2024-27752,0,1,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 +CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 CVE-2024-27756,0,0,a0b7876d1bcd508f42c19e34f906c00ccf4c6d4fd282b64eb52f33eb0c45850b,2024-03-26T18:15:10.693000 CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000 CVE-2024-27758,0,0,ad62de4aef328e51046fcc2255106ca410bd8ad59c431cc8a168005ae5bd0821,2024-03-12T17:46:17.273000 @@ -247466,70 +247466,70 @@ CVE-2024-27776,0,0,6275d390ba958ed1bba8b1d4de2ca05eb959bf7d338960cf80f1a89694c26 CVE-2024-2778,0,0,42cbc20405f3ee35374ef4ea72808c22dd795c7f7e01e3e442c0f4aa51ec7373,2024-05-17T02:38:29.967000 CVE-2024-27789,0,0,e8af3b8395ebfe2a50ae6a05a1719125fcf49e2fa7ab9962ec195038f09bfe15,2024-06-10T19:15:53.183000 CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000 -CVE-2024-27790,0,1,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 -CVE-2024-27791,0,1,09b0597ca715a1f6ef86184b931742440fb3c3b5a01efc19b59894d859d878db,2024-07-03T01:50:48.290000 +CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 +CVE-2024-27791,0,0,09b0597ca715a1f6ef86184b931742440fb3c3b5a01efc19b59894d859d878db,2024-07-03T01:50:48.290000 CVE-2024-27792,0,0,b95a839f6d92f70e579e6fb1f69e78add1d64a83552f4a2c177f2ea0f9d25269,2024-06-12T18:02:45.480000 -CVE-2024-27793,0,1,1b6a23c11a935c27256b2d5a9880463f95ce349dd6e5eaa7f6bfd705591d7421,2024-07-03T01:50:49.173000 -CVE-2024-27794,0,1,b75d2039b6158a4929ffa606a51b07ea3ce814d9da4d930322d189103f2032cd,2024-07-03T01:50:49.393000 -CVE-2024-27796,0,1,4b7279c3feb336e34123ba67ded6045e38a903dedab1f07b2afe52f0d873a234,2024-07-03T01:50:50.207000 +CVE-2024-27793,0,0,1b6a23c11a935c27256b2d5a9880463f95ce349dd6e5eaa7f6bfd705591d7421,2024-07-03T01:50:49.173000 +CVE-2024-27794,0,0,b75d2039b6158a4929ffa606a51b07ea3ce814d9da4d930322d189103f2032cd,2024-07-03T01:50:49.393000 +CVE-2024-27796,0,0,4b7279c3feb336e34123ba67ded6045e38a903dedab1f07b2afe52f0d873a234,2024-07-03T01:50:50.207000 CVE-2024-27798,0,0,96770d0ca7d69538b21522ed5c1df64fc164bf06c1fda12cf5ffe66287c823eb,2024-06-11T08:15:48.807000 CVE-2024-27799,0,0,884ab3b726e34f80c319ede5bd0049a4beba35406e34d8151ad3d9e6a79e3ee6,2024-07-02T13:38:10.830000 CVE-2024-2780,0,0,ebb4d263bdb4979d90a73abab8050be4d34d6c520d6b3b8fff46d8c73490b44f,2024-05-17T02:38:30.160000 -CVE-2024-27800,0,1,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d37b,2024-07-03T01:50:51.033000 +CVE-2024-27800,0,0,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d37b,2024-07-03T01:50:51.033000 CVE-2024-27801,0,0,4f37242e62570444393eedc0e6b0ad8e8ff66a897bd149ce4d1292d83e4fe3ae,2024-07-02T13:36:50.500000 CVE-2024-27802,0,0,5fa4df8e0fa4e055c45d206bab7fd01f5c4103a30fc3e7d9373406c7aa7c6468,2024-07-02T13:37:19.690000 CVE-2024-27803,0,0,53706579cbd6412d2f61db763826287c31c4944b996a096fc5d655cd875e9fe8,2024-06-10T18:15:28.727000 -CVE-2024-27804,0,1,cc0ff5a5b94c6780767cdc22ac5b7c683a356469ddaa3536697d5bd02fd071c5,2024-07-03T01:50:51.930000 +CVE-2024-27804,0,0,cc0ff5a5b94c6780767cdc22ac5b7c683a356469ddaa3536697d5bd02fd071c5,2024-07-03T01:50:51.930000 CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8980,2024-07-02T13:29:10.397000 CVE-2024-27806,0,0,28c67af34cc68b2a5a6c23ba0a23708c28b0ee7df3bcafd7c779ecd50c264c63,2024-07-02T13:29:21.613000 CVE-2024-27807,0,0,a7b781fd7f96d6bc57a085fc734d11b31dcdd4417a6ae278ff1c40e2b1bf7128,2024-07-02T13:33:44.157000 -CVE-2024-27808,0,1,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000 +CVE-2024-27808,0,0,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000 CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000 -CVE-2024-27810,0,1,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000 -CVE-2024-27811,0,1,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000 -CVE-2024-27812,0,1,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591196,2024-07-03T01:50:55.430000 -CVE-2024-27813,0,1,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000 -CVE-2024-27814,0,1,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000 -CVE-2024-27815,0,1,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000 +CVE-2024-27810,0,0,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000 +CVE-2024-27811,0,0,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000 +CVE-2024-27812,0,0,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591196,2024-07-03T01:50:55.430000 +CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000 +CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000 +CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000 CVE-2024-27816,0,0,796a750f65ffb329e29033d8bba60513b21bc14881ed71a1b811a2e04501ae1b,2024-06-10T18:15:28.970000 -CVE-2024-27817,0,1,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000 +CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000 CVE-2024-27818,0,0,53d578e3a0a5c74afcd3cfe2146b5bdd30d3ee9cca34913d6e2df31ef7d7a6a4,2024-06-11T08:15:49.700000 -CVE-2024-27819,0,1,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000 +CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000 CVE-2024-2782,0,0,91d9b539aa31e7a5bf0be259f7ee77e02d3f24638d700db95962fd57c1db4b96,2024-05-20T13:00:34.807000 -CVE-2024-27820,0,1,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000 +CVE-2024-27820,0,0,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000 CVE-2024-27821,0,0,1de7b9a00e0f15ecd864890bdb004777a3be2018051ca91dd74315d450ee5849,2024-06-10T18:15:29.097000 -CVE-2024-27822,0,1,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000 +CVE-2024-27822,0,0,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000 CVE-2024-27824,0,0,bac18298cb87bbf4437c3c19802ecf7c192a4b0487eb1723234b03d4506aa7e9,2024-06-11T08:15:49.830000 -CVE-2024-27825,0,1,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000 -CVE-2024-27827,0,1,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000 -CVE-2024-27828,0,1,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000 -CVE-2024-27829,0,1,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000 +CVE-2024-27825,0,0,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000 +CVE-2024-27827,0,0,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000 +CVE-2024-27828,0,0,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000 +CVE-2024-27829,0,0,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000 CVE-2024-2783,0,0,5e3d9294a74b759ac7450c1cf79e73d07c944f71ed4c195d3306f256a09a6879,2024-04-10T13:23:38.787000 CVE-2024-27830,0,0,6653b2da5a37d39ef2226e875871935d95521e7b5255b78b4c573dab71498ca2,2024-06-27T18:10:32.247000 -CVE-2024-27831,0,1,d329789678dec21e4f63d88045f001e21097b4a93f4f6c593e93222f147b572c,2024-07-03T01:51:03.627000 -CVE-2024-27832,0,1,1c0abe513a18598fd26800bd617f0bcc215d7bddc730b421b0d506e5f4c6e19c,2024-07-03T01:51:04.443000 -CVE-2024-27833,0,1,88977c443f553604d1509740afb5a1d15d5bfa1b09ae539bfe66a271b80b8f6c,2024-07-03T01:51:05.337000 -CVE-2024-27834,0,1,06794ec44703c3870f34ff1d3005d79fcfa8a16205b060c7ff641078012e5cfc,2024-07-03T01:51:06.170000 +CVE-2024-27831,0,0,d329789678dec21e4f63d88045f001e21097b4a93f4f6c593e93222f147b572c,2024-07-03T01:51:03.627000 +CVE-2024-27832,0,0,1c0abe513a18598fd26800bd617f0bcc215d7bddc730b421b0d506e5f4c6e19c,2024-07-03T01:51:04.443000 +CVE-2024-27833,0,0,88977c443f553604d1509740afb5a1d15d5bfa1b09ae539bfe66a271b80b8f6c,2024-07-03T01:51:05.337000 +CVE-2024-27834,0,0,06794ec44703c3870f34ff1d3005d79fcfa8a16205b060c7ff641078012e5cfc,2024-07-03T01:51:06.170000 CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000 -CVE-2024-27836,0,1,d7e5142ca6fa7487d04f3b56f1546b9e918b549b4e15b6dab3f84f5764bab6bd,2024-07-03T01:51:06.973000 -CVE-2024-27837,0,1,7e4bb4d9cc28d81f3afe01a685bcf2ea16ed26bf202a4b18649d6d977d69ced8,2024-07-03T01:51:08.273000 +CVE-2024-27836,0,0,d7e5142ca6fa7487d04f3b56f1546b9e918b549b4e15b6dab3f84f5764bab6bd,2024-07-03T01:51:06.973000 +CVE-2024-27837,0,0,7e4bb4d9cc28d81f3afe01a685bcf2ea16ed26bf202a4b18649d6d977d69ced8,2024-07-03T01:51:08.273000 CVE-2024-27838,0,0,7572685344f037b7f96c99b7bcecb088c1b65cdf3f7efc49191c8482465b5e8a,2024-06-12T04:15:12.237000 CVE-2024-27839,0,0,dc2551c161bade026d50a7722610913c7d6281d71628fa7705ad0b54f8ad144e,2024-06-10T18:15:29.607000 CVE-2024-2784,0,0,ba1190a588b039c20289ccfefd73f048dc164c370109c9a0315fb7e323728a74,2024-05-24T13:03:11.993000 -CVE-2024-27840,0,1,56fa4740b346bcb911ef828a7fa1d3a0a599df16ab19781ac80272f5dc7a8547,2024-07-03T01:51:09.067000 -CVE-2024-27841,0,1,c196712b25e7bd8d66323b49a59c084563ec41f23c04da910219b17a17279957,2024-07-03T01:51:10.377000 +CVE-2024-27840,0,0,56fa4740b346bcb911ef828a7fa1d3a0a599df16ab19781ac80272f5dc7a8547,2024-07-03T01:51:09.067000 +CVE-2024-27841,0,0,c196712b25e7bd8d66323b49a59c084563ec41f23c04da910219b17a17279957,2024-07-03T01:51:10.377000 CVE-2024-27842,0,0,c2f4ad1e4648fa9ae5110e6bcc4b9d3a34413349e7ab03cdd6ea669b8d6af4f4,2024-06-10T18:15:29.733000 CVE-2024-27843,0,0,caaa2b70673c0fd7a60807026442c43e55ad72502b0f967bc1cef9c19a74b1af,2024-06-11T08:15:50.327000 CVE-2024-27844,0,0,84fbe7cb07be50d1cdab0e609209638f2d6f39906ac0812e2fb3c162808a8348,2024-06-12T04:15:12.407000 CVE-2024-27845,0,0,d4eebf73963a1d2d1c6adb57dd2a336a70657901886f6dbd008cb17709c2b955,2024-06-11T13:54:12.057000 -CVE-2024-27847,0,1,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 -CVE-2024-27848,0,1,1019ee2043aa67690938b0d1fab41d1c381553edfbc383541ecf82e7495fcbfa,2024-07-03T01:51:11.980000 +CVE-2024-27847,0,0,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 +CVE-2024-27848,0,0,1019ee2043aa67690938b0d1fab41d1c381553edfbc383541ecf82e7495fcbfa,2024-07-03T01:51:11.980000 CVE-2024-2785,0,0,f421029e3ad60193115519ce84f2fb34a615c8431383b64062041ee6b872f244,2024-05-14T16:13:02.773000 CVE-2024-27850,0,0,e1d4379d6b3d34c01ebe4dd5e7858f8de64aeb5953240c61d195d17d1f48e9f7,2024-06-12T04:15:12.480000 -CVE-2024-27851,0,1,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000 +CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000 CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000 CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000 -CVE-2024-27857,0,1,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000 +CVE-2024-27857,0,0,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000 CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000 CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 @@ -247620,15 +247620,15 @@ CVE-2024-27970,0,0,400f0279b55b3a379ae4cb2321b0f7168d543425d3ae3678bf6361a1a4e68 CVE-2024-27971,0,0,d8f83462b30f7abea583d1edc858a6bbe9d2ee807d2040001abf90463b63d4fe,2024-05-17T18:36:05.263000 CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000 CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000 -CVE-2024-27975,0,1,628fa6593d5d98fbf43326e7307f982b7a57304446d55cc554f5b8b82b744b9b,2024-07-03T01:51:20.333000 -CVE-2024-27976,0,1,f6d7730a29882f81108291258e14f13d29a2159cf5abda97fb8b7490244dab5e,2024-07-03T01:51:21.030000 -CVE-2024-27977,0,1,09cebd1c563d6c711f33424e2c16188d6c5dfd54056f5a0f51dbb6772ec18b17,2024-07-03T01:51:21.727000 -CVE-2024-27978,0,1,250783b0f69a457469cf7c694c435403bad621cb087de31c6c68f131268a6f51,2024-07-03T01:51:22.450000 +CVE-2024-27975,0,0,628fa6593d5d98fbf43326e7307f982b7a57304446d55cc554f5b8b82b744b9b,2024-07-03T01:51:20.333000 +CVE-2024-27976,0,0,f6d7730a29882f81108291258e14f13d29a2159cf5abda97fb8b7490244dab5e,2024-07-03T01:51:21.030000 +CVE-2024-27977,0,0,09cebd1c563d6c711f33424e2c16188d6c5dfd54056f5a0f51dbb6772ec18b17,2024-07-03T01:51:21.727000 +CVE-2024-27978,0,0,250783b0f69a457469cf7c694c435403bad621cb087de31c6c68f131268a6f51,2024-07-03T01:51:22.450000 CVE-2024-2798,0,0,ef363290583ea8fbea084f3f83308db5f7af67c2905e490208724743ab38649d,2024-04-23T12:52:09.397000 CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000 CVE-2024-27982,0,0,42061925be258b071db85ebd10bb4ff691889b4a60a16c6ca316fce35b36c5b0,2024-05-07T20:07:58.737000 CVE-2024-27983,0,0,b25fa75eaa529fe5fbf704f9217a9d69265c5031797b3ed896ccaf3501376ba4,2024-06-10T17:16:24.277000 -CVE-2024-27984,0,1,ae27a7b8caa0cad11075a3923e9ec947bcb71041ebacbff9045e417bd43dcbe8,2024-07-03T01:51:23.260000 +CVE-2024-27984,0,0,ae27a7b8caa0cad11075a3923e9ec947bcb71041ebacbff9045e417bd43dcbe8,2024-07-03T01:51:23.260000 CVE-2024-27985,0,0,955e6906e119ba8a42b7cac63660ecdcdbf497ae4a9c4abc6cb5033779d5aab5,2024-04-11T12:47:44.137000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000 @@ -247655,7 +247655,7 @@ CVE-2024-28007,0,0,856400479dcdda77e4b92ea6ef968816e66403c31f41c4cf24dafc318e3d2 CVE-2024-28008,0,0,d72d4796ccaf88b2167ea2950481d0bc280f9113b19c229fe97b70a39b77a56b,2024-04-02T06:15:14.930000 CVE-2024-28009,0,0,c2c2436eebdbd7704eab9297f24c9de71f8b14d7fbbd8a1528121414abab2252,2024-04-02T06:15:15.013000 CVE-2024-2801,0,0,087a2faf2cb39a083c3eb84242cefbf2b12fc23d4cbc6e70d1aa13cdadbcdcc0,2024-04-12T12:43:46.210000 -CVE-2024-28010,0,1,99860cf8bf9189a8fb49a5935a3491edc3fdb8468d4665570b920e86cd7975a4,2024-07-03T01:51:25.390000 +CVE-2024-28010,0,0,99860cf8bf9189a8fb49a5935a3491edc3fdb8468d4665570b920e86cd7975a4,2024-07-03T01:51:25.390000 CVE-2024-28011,0,0,72da78acb5d3e75903bb8a28fff758885737a9a35bc760b6b460427c253c5d2d,2024-04-02T06:15:15.187000 CVE-2024-28012,0,0,b601a511e5c3061f586efb79dc5f31b5cd5b0f7397ecd414486a50f8e8994055,2024-04-02T06:15:15.263000 CVE-2024-28013,0,0,09b3d3194605be82a334453e16c64b4fd4730562b24b053d4872b80ba9919073,2024-04-02T06:15:15.350000 @@ -247686,7 +247686,7 @@ CVE-2024-28056,0,0,90e95402cb85f2ac6aeb96939956a4b0fb83eaa680280e3c7780943b8521d CVE-2024-2806,0,0,b62277c5d63601c4bcc81a2e918e4a750bf1a36445b883377dd7b976192345cf,2024-05-17T02:38:30.940000 CVE-2024-28060,0,0,a862e65a45592f53526175ae7b2f45e31eaff0e3e5dd6ff429a8d592d5b677a4,2024-05-29T13:02:09.280000 CVE-2024-28061,0,0,cc1d081ad33f2dafb0011f89af68791d1834366cd78823472243a6941ea341e8,2024-05-29T13:02:09.280000 -CVE-2024-28063,0,1,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000 +CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a6e2,2024-07-03T01:51:26.370000 CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0a6f,2024-05-20T13:00:04.957000 CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000 CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000 @@ -247849,13 +247849,13 @@ CVE-2024-28253,0,0,f5326dd97701553671f20b198d6b4e3bbd7507e645cfcbbef2e0eb0bd68e4 CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697963,2024-03-21T02:52:24.507000 CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000 CVE-2024-2826,0,0,c06816aa9b8cc8bc5652d3f93db7d31520531a1d3c899fdfc04204afd4aff493,2024-05-17T02:38:32.910000 -CVE-2024-28269,0,1,b7dba037dfa057d99dedf14ed710d84a658c9775dd875bb28a1c5e4a54714ee3,2024-07-03T01:51:32.517000 +CVE-2024-28269,0,0,b7dba037dfa057d99dedf14ed710d84a658c9775dd875bb28a1c5e4a54714ee3,2024-07-03T01:51:32.517000 CVE-2024-2827,0,0,25b876aa80a4414249709b2b590feaaa0038d4c537eb2df951e71f023d4496e5,2024-05-17T02:38:33.003000 CVE-2024-28270,0,0,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000 CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000 CVE-2024-28276,0,0,e5d0ca3338b4a8eaebb622a401ae3a8f89176db3eafcb6902453e3abdd94a54b,2024-05-14T16:13:02.773000 CVE-2024-28277,0,0,e80085629182a4156301aa69e3031f688c8f7716267666a9b7d80e876a57f0fa,2024-05-14T16:13:02.773000 -CVE-2024-28279,0,1,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000 +CVE-2024-28279,0,0,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000 CVE-2024-2828,0,0,7529c0cc7391c2a2c2d5cf6a294edb59716c6698bcf758a8b4c9c4bf6d05ed28,2024-05-17T02:38:33.097000 CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0813,2024-03-20T13:00:16.367000 CVE-2024-28285,0,0,5a20b1d0ab2c155ab9dfe9a6a1c2cc6d338651026c05e05f654629eb6596e905,2024-05-14T16:13:02.773000 @@ -247863,33 +247863,33 @@ CVE-2024-28286,0,0,7b760a4769f45c40990c61b4c6dca958dc26708f19d30b01bb3a34dbec61c CVE-2024-28287,0,0,f3e972680aaba746036e0c18fb52d806a7d00f059e355ec696b64bf775ceea80,2024-04-02T18:12:16.283000 CVE-2024-28288,0,0,a02e3d9826d4212dd14a4181934d81e2a653b8135d5e48cc021c9f921b853477,2024-04-01T01:12:59.077000 CVE-2024-2829,0,0,08bec3122d40b09d10127b8a8474b30ecad7c5a3422bf977085189b53f8158fd,2024-04-25T13:18:02.660000 -CVE-2024-28294,0,1,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 +CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 CVE-2024-2830,0,0,d5b60d4e864f39f624f9c75c8c5ccee07e6c5fbd8045c5529f94cb5bf65e5175,2024-04-04T12:48:41.700000 CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8cb98,2024-03-20T13:00:16.367000 CVE-2024-2831,0,0,7d0d1d07ab4c944a6084ef684af8062ca485383fba14ec1c0d0134c80fa05201,2024-05-02T18:00:37.360000 CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000 CVE-2024-28319,0,0,26fe071877c361c1420da78d668cd8bd73e607c2889fe07f596425c3f0efcaf7,2024-03-15T16:26:49.320000 CVE-2024-2832,0,0,7a66d92eabd94c5482fc841b94a91eb19495896ae05b07b20a66e016bb5f43e5,2024-05-17T02:38:33.270000 -CVE-2024-28320,0,1,a2fb23f680e2bb675a224cd66e29bf262110d5410c13985fbfcef1c249b560f1,2024-07-03T01:51:35.080000 -CVE-2024-28322,0,1,57353b76141adc1a21b7e127ac12f2564b2d714c61135c271a9cb49aa77effcd,2024-07-03T01:51:35.980000 +CVE-2024-28320,0,0,a2fb23f680e2bb675a224cd66e29bf262110d5410c13985fbfcef1c249b560f1,2024-07-03T01:51:35.080000 +CVE-2024-28322,0,0,57353b76141adc1a21b7e127ac12f2564b2d714c61135c271a9cb49aa77effcd,2024-07-03T01:51:35.980000 CVE-2024-28323,0,0,16dacab4d536bc79350286123596ce0c92a8e24f546fb8e6e6ccdaf1dc4caa64,2024-04-24T02:15:45.820000 -CVE-2024-28325,0,1,829f2b24ef0e6298df0e0a7317814ea224b3bc37dd5467e253067497a5469b95,2024-07-03T01:51:36.767000 -CVE-2024-28326,0,1,855dd245e209741ecd5af54aacc58610e12585c0f397bf5c5a4820ffc845584e,2024-07-03T01:51:37.560000 +CVE-2024-28325,0,0,829f2b24ef0e6298df0e0a7317814ea224b3bc37dd5467e253067497a5469b95,2024-07-03T01:51:36.767000 +CVE-2024-28326,0,0,855dd245e209741ecd5af54aacc58610e12585c0f397bf5c5a4820ffc845584e,2024-07-03T01:51:37.560000 CVE-2024-28327,0,0,df89aa24ca113b4bb35dd7e4e3cc866c8cb49edc04173e04ac906c9b3f369796,2024-04-26T19:59:19.793000 -CVE-2024-28328,0,1,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000 +CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000 CVE-2024-2833,0,0,9e113ce28ea85bd7fbbe01a048a1b11092324a333ff2f6e807d8733739209b19,2024-04-18T13:04:28.900000 CVE-2024-28335,0,0,a217e219718a353480ebe6dbe5087fa485efbd4ed754c44582430f96bbfa9ecc,2024-03-27T12:29:30.307000 CVE-2024-28338,0,0,3ea1d4c3a66b67172d60399e17da8570aa15fd5d4f0e652ed0ed26bd90bdb1be,2024-03-12T17:46:17.273000 CVE-2024-28339,0,0,eb06dcbba6c6b866b3957a0b1f6af1817f1ee37fb8932a4cb080c5ef814ab185,2024-03-12T17:46:17.273000 CVE-2024-2834,0,0,e84fef3bf1f6390f87c0082fe9dff0370895cf3ef7cd902a2802b75627052cd1,2024-04-08T18:48:40.217000 CVE-2024-28340,0,0,b694df29079c0854c0447fab99b606db18330fac912bd90c8918c409f1ded072,2024-03-12T17:46:17.273000 -CVE-2024-28344,0,1,0c3e14b9ae8bb6c7602e9654cd79c28a4acdcb7e983c8568907b325a56962744,2024-07-03T01:51:39.137000 +CVE-2024-28344,0,0,0c3e14b9ae8bb6c7602e9654cd79c28a4acdcb7e983c8568907b325a56962744,2024-07-03T01:51:39.137000 CVE-2024-28345,0,0,9f53096e64fde0bd9e67c2ba1058971494111a4dba7285ed04f98db5747f24bf,2024-04-10T19:49:51.183000 CVE-2024-2835,0,0,08ab633da70f5a51a99ace1acb3cf6af13c2240a7150392b865dae8e7499f2df,2024-05-20T15:17:54.513000 CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000 CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000 -CVE-2024-2836,0,1,36495018f88c8d364876859f0fc3fe350f22bae03ce0e1ddfd2fb6841831abfb,2024-07-03T01:53:35.640000 -CVE-2024-2837,0,1,ae302668592d4c18e6ec888a73f75aebb0caf04e9adb103971cba34e16c5520b,2024-07-03T01:53:35.850000 +CVE-2024-2836,0,0,36495018f88c8d364876859f0fc3fe350f22bae03ce0e1ddfd2fb6841831abfb,2024-07-03T01:53:35.640000 +CVE-2024-2837,0,0,ae302668592d4c18e6ec888a73f75aebb0caf04e9adb103971cba34e16c5520b,2024-07-03T01:53:35.850000 CVE-2024-2838,0,0,bfc3f66c2ee9498636bc1b73a4d214aed58a8ab41fd920e5a40fac64b074ff09,2024-04-29T12:42:03.667000 CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000 CVE-2024-28386,0,0,babe8ca097e0c09213bc5c6af798d9ab75b1906fe65d8568532f7dfbcdf59f5c,2024-03-25T16:43:06.137000 @@ -247904,7 +247904,7 @@ CVE-2024-28393,0,0,e0c4576a591386616a5436e610cf9896298fbb6cfafc568aeae2cf64152b1 CVE-2024-28394,0,0,f0eb5c2a2e992661c86d431672af612fba506c8020260929356a00254130fb99,2024-03-20T13:00:16.367000 CVE-2024-28395,0,0,82b3598bd12d6612d167521c1ee69fbab81f725a57a13c49e97ed83bf01459b1,2024-03-20T17:18:26.603000 CVE-2024-28396,0,0,08c911aadb83e5362b5d631a35d91514cb49b70b595ec0db66bff1b061c3d497,2024-03-20T17:18:26.603000 -CVE-2024-28397,0,1,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000 +CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000 CVE-2024-2840,0,0,0b9b9cf54907fdf1823442cc4c2107a1ff7330df6580a85d873db983a404ff6f,2024-05-02T18:00:37.360000 CVE-2024-28401,0,0,83d95f41ea79f5a899455bbe843f9dc43cbd29f0392a9dd964c37347d6306d48,2024-03-17T22:38:29.433000 CVE-2024-28402,0,0,61ea1531e9fa41a150bc3854f6b2d96efe4af71d76e3f9c52520b041294710ef,2024-04-11T12:47:44.137000 @@ -247912,7 +247912,7 @@ CVE-2024-28403,0,0,b577222e891cfab5ecc98b2c037b9029cb9fef7f2ce9a6695d352b110d564 CVE-2024-28404,0,0,4b60ed3b31a1c9dc8aa900dc1d949b8d123d31ed4f7c4f06bc5925a45f3dfa3b,2024-03-17T22:38:29.433000 CVE-2024-28405,0,0,44c4bd671db9af2ee46ce791ec59e85555883e1841838334d46a271011bab789,2024-04-01T01:12:59.077000 CVE-2024-2841,0,0,f6af43dae97e58c6a98e438d6895f1cf65a1eae8a2bb0f25de9f610538297208,2024-03-29T12:45:02.937000 -CVE-2024-28417,0,1,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b6a4,2024-07-03T01:51:41.033000 +CVE-2024-28417,0,0,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b6a4,2024-07-03T01:51:41.033000 CVE-2024-28418,0,0,ae238b712a12df26411e78ac0a02714475617bc52923967f2dcd5f99fed7ae88,2024-03-14T14:21:20.217000 CVE-2024-2842,0,0,04096fe7d1f311115cf3e9d072e2d5983a11017bc26d2824b7bd84f2710298d6,2024-03-29T12:45:02.937000 CVE-2024-28421,0,0,90a4d7a3d1595cfa8996f92f54737f97bf9cca063274efb8a0c9826ed947d7b0,2024-03-26T12:55:05.010000 @@ -247955,14 +247955,14 @@ CVE-2024-2855,0,0,cad9c20e45d2f11b4dcb483d96f858ccd5b9854983f0d32090f94573976b2b CVE-2024-28550,0,0,5d0ad6d2082f07d56cf9652440be9e3f8e89ff952367d33e244f401dd8cf5df1,2024-03-18T19:40:00.173000 CVE-2024-28551,0,0,40072188bc078513c98fe36eadc61408f0edcb42335d89d71c256bffca8b5040,2024-03-27T12:29:30.307000 CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000 -CVE-2024-28556,0,1,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000 +CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000 CVE-2024-28557,0,0,c99317056e88c11c2e22bbb1cd9d424821ae7d16f3a12f097c6433bace1fd1cd,2024-04-16T13:24:07.103000 CVE-2024-28558,0,0,42fcc68e970ec7953900aa21345c948b519133d0fec39b6a390e75bbfed3bf69,2024-04-16T13:24:07.103000 CVE-2024-28559,0,0,6f7249af13d3d458dea5181e480abd5d70401028fb6553338823fba575746002,2024-03-22T12:45:36.130000 CVE-2024-2856,0,0,901c195e42b970fcfba41d968adbdd28b3755a56b68132d8bf236d5cf0ee9380,2024-05-17T02:38:34.693000 CVE-2024-28560,0,0,73cbd87a5bcb29476004a8f71bcb58ba805b830f22d73a89125c2feb4312f2b7,2024-03-22T12:45:36.130000 -CVE-2024-28562,0,1,aedaf708d3b18197d691f16e4924977de0b5623e261911d3fbbbaf3604c340ef,2024-07-03T01:51:42.723000 -CVE-2024-28563,0,1,a76a8c0b981d93846eaf9f675982e2266f870d6c33b80aaee30a9eb94f23d95b,2024-07-03T01:51:43.500000 +CVE-2024-28562,0,0,aedaf708d3b18197d691f16e4924977de0b5623e261911d3fbbbaf3604c340ef,2024-07-03T01:51:42.723000 +CVE-2024-28563,0,0,a76a8c0b981d93846eaf9f675982e2266f870d6c33b80aaee30a9eb94f23d95b,2024-07-03T01:51:43.500000 CVE-2024-28564,0,0,93f443a5da21e01d53fc4363b2c431ffd3c8f477bab405eb8ef1e4325391c759,2024-05-01T18:15:17.460000 CVE-2024-28565,0,0,b882c13be35dea1b081bb1fb87d94d16ff144d006ec1f5c556ae8a3661c7ece6,2024-05-01T18:15:17.513000 CVE-2024-28566,0,0,c9f24212256cb9a88e3dae765064f6da32d332c93b211d045c3cbdffec25380a,2024-03-20T13:00:16.367000 @@ -247995,7 +247995,7 @@ CVE-2024-2861,0,0,20fac21e8ac916aba85c73de98afeef2560453504cc40b7cf7014b9abe18a5 CVE-2024-28613,0,0,bda4150312b2b3b79a305a8c0a3aeb6013ca159f1baaa84b69f3b052dab94ea7,2024-04-24T13:39:42.883000 CVE-2024-2862,0,0,a714f5e8cb944f65576648fcdb042cca021906895d812cc8cb0301d4fdfba94b,2024-03-25T13:47:14.087000 CVE-2024-28623,0,0,972befedc73e4c4f8bdd2f8c4cf61d42fcf307bb5ef2beaaeb5c62226e79d63e,2024-03-13T12:33:51.697000 -CVE-2024-28627,0,1,c3fbcb53d4bd8b45e2ac137db3c6b6a64476aafbbecf256367ec9be49dd43388,2024-07-03T01:51:44.343000 +CVE-2024-28627,0,0,c3fbcb53d4bd8b45e2ac137db3c6b6a64476aafbbecf256367ec9be49dd43388,2024-07-03T01:51:44.343000 CVE-2024-2863,0,0,a0abc0f7c14521978f0dc43ba564a7b82984dfb54a3b3c1d89a63d2a160daf96,2024-03-25T13:47:14.087000 CVE-2024-28635,0,0,27b1feabb26b23ed8fc39746433da8fac5aba34dee4929b1b3945a734731461f,2024-03-21T12:58:51.093000 CVE-2024-28639,0,0,329b7b8ad88c37a706d7a70398ba531ff9e74bf0911225af5f9e1a6b5cf5aed8,2024-03-17T22:38:29.433000 @@ -248025,21 +248025,21 @@ CVE-2024-28681,0,0,ab17b4fa17ebf8eb3957de6dd91fe40414f05e3821f3c9e15b7d517b0542f CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0ded,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000 -CVE-2024-28699,0,1,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 +CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000 CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000 CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000 CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000 -CVE-2024-28716,0,1,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 -CVE-2024-28717,0,1,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000 +CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 +CVE-2024-28717,0,0,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000 CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000 -CVE-2024-28722,0,1,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000 +CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000 CVE-2024-28725,0,0,5d6528e8744d76688217494d6011ccce2f402c87e1721e307b2ae6f6dd89ec12,2024-05-07T13:39:32.710000 CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000 CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000 -CVE-2024-28734,0,1,1c14934084e1e00ba63d896d0125baa20ca223930e97186ab2fc273c15799ec8,2024-07-03T01:51:48.533000 +CVE-2024-28734,0,0,1c14934084e1e00ba63d896d0125baa20ca223930e97186ab2fc273c15799ec8,2024-07-03T01:51:48.533000 CVE-2024-28735,0,0,96e109e8715188f76ee57d058460375db0bc7cb9155343dbdf53039c574fd622,2024-04-25T19:15:49.910000 -CVE-2024-28736,0,1,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000 +CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000 CVE-2024-2874,0,0,81d4f55665967a7403f77c13a3fe1cec09fb59ce9d6702cf1fc8df1173ec5909,2024-05-24T01:15:30.977000 CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000 CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000 @@ -248074,12 +248074,12 @@ CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa2 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,9812a3c032ed9917e7cb4cc6df8e4f64906bd7d1b08b3232fe18bad2b2b9e505,2024-06-27T19:25:12.067000 -CVE-2024-28820,0,1,095fd29e11db669f6714a4a5dc4339712d67abbd0b3541df2a561e8f599caac0,2024-07-03T01:51:51.323000 +CVE-2024-28820,0,0,095fd29e11db669f6714a4a5dc4339712d67abbd0b3541df2a561e8f599caac0,2024-07-03T01:51:51.323000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000 -CVE-2024-2883,0,1,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 +CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,0345769512c8d0617caa5313f559fdb9de7066aaa2f880b3d0fe2b7aa28290e3,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000 CVE-2024-28832,0,0,e20e133fb158c153d5c99472d0490b974e0599ab693822dcae94c1e3de7df5f9,2024-06-25T12:24:17.873000 @@ -248090,7 +248090,7 @@ CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d CVE-2024-28847,0,0,91e84a48bf06058e30212c2ac01ab493cb3959d3b6bfc21c8760687b856baf08,2024-03-17T22:38:29.433000 CVE-2024-28848,0,0,34495c9c0f308730fc81e42605f83951bd37f923638227e6b1f0c5438e0285ef,2024-03-21T02:52:25.197000 CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2be18,2024-03-23T03:15:11.970000 -CVE-2024-2885,0,1,cfc1d2cd9741b3773937ec1be23cfd79c3d11601be824c8cd00c8aa5759a52e5,2024-07-03T01:53:37.660000 +CVE-2024-2885,0,0,cfc1d2cd9741b3773937ec1be23cfd79c3d11601be824c8cd00c8aa5759a52e5,2024-07-03T01:53:37.660000 CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000 CVE-2024-28851,0,0,906f9a947fffda466dc5b0dc3ea3a19dd7da386341dafbd6d5a62e9573bd0aa2,2024-03-17T22:38:29.433000 CVE-2024-28852,0,0,f198bf5880cc2f9b5f04cdc4feef8212d841d9b642454063dce115a6d543e785,2024-03-27T15:49:41.437000 @@ -248098,7 +248098,7 @@ CVE-2024-28853,0,0,a85a4454e871f07a0e1a82c76c89e8095a49b683e7738758e26ccd5a9ccfd CVE-2024-28854,0,0,3fef733b83ce353a9d601dd97a77245a0cb37d17c25b7206b7c91f3b890c0636,2024-03-17T22:38:29.433000 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,a8cd0b4848748fd022173581cb1e543e67d103484e84a644fc5bc03b92e37b5e,2024-03-17T22:38:29.433000 -CVE-2024-2886,0,1,ed3004c461231ae00a1d5b15fa79af4dd07181280b8f035e6f90fc17721004e3,2024-07-03T01:53:37.867000 +CVE-2024-2886,0,0,ed3004c461231ae00a1d5b15fa79af4dd07181280b8f035e6f90fc17721004e3,2024-07-03T01:53:37.867000 CVE-2024-28860,0,0,c3ac94148a23300b2fa328274f5739fa5573c1ace8af4d6f8d44d76345f39d68,2024-03-28T02:01:21.693000 CVE-2024-28861,0,0,5bf1c7221daac03dbabf73db8fdaa0dbba2f944ba617d234eab106643136d93b,2024-03-22T19:02:10.300000 CVE-2024-28862,0,0,abd4a06acb5c828a7ab722874d22519cf91fbd6a363cf2586d749fb7523cc6c0,2024-03-17T22:38:29.433000 @@ -248109,20 +248109,20 @@ CVE-2024-28866,0,0,c8fdce91edf195256dbb4fdea4d7960487062cab72efc9f2b26b3b468b563 CVE-2024-28867,0,0,a2663eb7659e9fb153cbffc3c6774d69ca0c4039f52756d8a5671465d9404705,2024-04-01T01:12:59.077000 CVE-2024-28868,0,0,148f39496eb50fd19cf01404a0af3408bd44ce8d437a837fa99cdad3557f99f1,2024-03-21T12:58:51.093000 CVE-2024-28869,0,0,bed6e8ba3681250027e8ebaede92ab26ffb4384953b59d036748ca14616df063,2024-04-15T13:15:31.997000 -CVE-2024-2887,0,1,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b49,2024-07-03T01:53:38.087000 +CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b49,2024-07-03T01:53:38.087000 CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d0161c,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000 CVE-2024-28877,0,0,883039bbb8a02fedae5005218a87450c4b734f262948f425805257c253ab9e71,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 -CVE-2024-28880,0,1,d86d3a57226b47e9756d0e2de7fe8eb3bf99b87dc35f89b5848778ed1b1b3b47,2024-07-03T01:51:53.260000 +CVE-2024-28880,0,0,d86d3a57226b47e9756d0e2de7fe8eb3bf99b87dc35f89b5848778ed1b1b3b47,2024-07-03T01:51:53.260000 CVE-2024-28883,0,0,0da2cc6c41f6d079048ec96a542a244e3daa5cbbca8e93005185c421836d3999,2024-05-08T17:05:24.083000 -CVE-2024-28886,0,1,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 +CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28889,0,0,bb3c202469f2e51ff05aa6d43099130e609fec5b2294b197effadcfbe55ab53d,2024-05-08T17:05:24.083000 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 -CVE-2024-28890,0,1,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000 +CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 -CVE-2024-28893,0,1,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000 +CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000 CVE-2024-28894,0,0,139b37292842325266e36fcf501a8211453c4135dbf7a79b4d495c356e7cd07a,2024-04-15T13:15:31.997000 CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e995bb,2024-04-01T01:33:21.910000 CVE-2024-28896,0,0,286c9b14277dfd3fb198ad35d3d66add8da721df3cae192b0956bb3da3951188,2024-04-10T13:24:00.070000 @@ -248182,7 +248182,7 @@ CVE-2024-2895,0,0,deecea79af1882af98fd48c4ed5cdad6d760534eb71cf7b13f7717f69abb3b CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000 CVE-2024-28957,0,0,a169098a05ac68c39610a9d0c21c80f908b4c73fb6ad140d0292417789484670,2024-04-15T13:15:31.997000 CVE-2024-2896,0,0,0d440c90e92a7b803bc45ddfe38885eb33d3e34a76343a9bf560c93a9723c2f9,2024-06-26T20:15:15.187000 -CVE-2024-28960,0,1,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000 +CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000 CVE-2024-28961,0,0,0ddc41642ad07ac3588b209701b64adc26c13e6c39a5545ce50919c420215bae,2024-04-29T12:42:03.667000 CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000 CVE-2024-28964,0,0,39f231edb50636796dcac2656d216ab11b12d7dae679a06a7d2f297d8c8ed674,2024-06-13T18:36:09.010000 @@ -248278,7 +248278,7 @@ CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4 CVE-2024-29072,0,0,8bd07d62e543797cde35d8ea71e0325d73cf9726a00cd1db731a33d220e7c57e,2024-06-10T18:15:30.110000 CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000 CVE-2024-29078,0,0,f341344696e65c0d3fdf677eb926388586920535705e81471de21157716771c8,2024-05-28T12:39:28.377000 -CVE-2024-2908,0,1,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 +CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000 CVE-2024-29089,0,0,d048736b15469f0b39e3b876166869fc2f8a5b0a20328918b1229acf18e4ac1f,2024-03-20T13:00:16.367000 CVE-2024-2909,0,0,68117e34ca80bc8c9165ccc16b04b44079c40816237ed6e48dbf176c55e6bf7e,2024-05-17T02:38:36.843000 @@ -248338,27 +248338,27 @@ CVE-2024-29140,0,0,fbbad9e86dfcc78cc94b85fbd86b27c7285a2d9bf81924339dc3ebd393f12 CVE-2024-29141,0,0,5bce998d90032a0cf23871bca36c54861b809480f587cd5eb60caa1b7e514a33,2024-03-19T14:31:27.883000 CVE-2024-29142,0,0,3d99176f4d85d148ee233148c993a17a366c303789d941cc36575f5a634b4f81,2024-03-19T14:31:27.883000 CVE-2024-29143,0,0,a1e93df9451dd8c06c7a2104d206f94c25c39c30d89ae95cb5b825cd9ec51d18,2024-03-19T13:26:46 -CVE-2024-29149,0,1,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000 +CVE-2024-29149,0,0,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000 CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d6c,2024-03-26T17:09:53.043000 -CVE-2024-29150,0,1,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000 +CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000 CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29152,0,0,c92904cfed16837c6741a6aae634cd863038c196f5243ffb888a5a789d858f82,2024-06-25T20:15:11.353000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000 -CVE-2024-29158,0,1,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000 +CVE-2024-29158,0,0,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000 CVE-2024-29159,0,0,d287940e64aed26cf8e9b0f93ad8a5dbe300f81635819adb69203cfa6c5fdecf,2024-05-14T16:13:02.773000 CVE-2024-2916,0,0,ebca4cff0a5b27757fb80d922684d400f221b39afbfb98a0224e7c22bb605192,2024-05-17T02:38:37.200000 -CVE-2024-29160,0,1,14277773ec9d53ace5a45e8738713a751d526d84ef2e04b16fc3cf3277fe88fb,2024-07-03T01:52:09.797000 -CVE-2024-29161,0,1,5cfd8761d51385bcfe894c39c7820fc9a0931c36e498ce8b651dd3852cb6eb8b,2024-07-03T01:52:10.720000 -CVE-2024-29162,0,1,b1942e5218b9199d8b3f133e6f6ae0185975e4e85dad3209f496d8fff4251c5a,2024-07-03T01:52:11.517000 -CVE-2024-29163,0,1,17ffb72bd5e136d8bfcfddc39b6fc15b69108962b9f846734ed6aeb051a0131d,2024-07-03T01:52:12.290000 -CVE-2024-29164,0,1,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e395b,2024-07-03T01:52:13.070000 -CVE-2024-29165,0,1,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000 +CVE-2024-29160,0,0,14277773ec9d53ace5a45e8738713a751d526d84ef2e04b16fc3cf3277fe88fb,2024-07-03T01:52:09.797000 +CVE-2024-29161,0,0,5cfd8761d51385bcfe894c39c7820fc9a0931c36e498ce8b651dd3852cb6eb8b,2024-07-03T01:52:10.720000 +CVE-2024-29162,0,0,b1942e5218b9199d8b3f133e6f6ae0185975e4e85dad3209f496d8fff4251c5a,2024-07-03T01:52:11.517000 +CVE-2024-29163,0,0,17ffb72bd5e136d8bfcfddc39b6fc15b69108962b9f846734ed6aeb051a0131d,2024-07-03T01:52:12.290000 +CVE-2024-29164,0,0,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e395b,2024-07-03T01:52:13.070000 +CVE-2024-29165,0,0,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000 CVE-2024-29166,0,0,b13dfaf0c8e4ea3bbd358bd8614d1947c156835fe22c5095fd83f7cd95ae4bba,2024-05-14T16:13:02.773000 CVE-2024-29167,0,0,bf34fde11ddaf885eca651982ced409116d0263648d1d196b5990bfa9a0517fe,2024-05-17T02:37:49.993000 CVE-2024-29168,0,0,55eaa2f8aa34951f2678d17cd09a8762011ab04d052991a6497f1ac90304aedd,2024-06-13T18:35:19.777000 -CVE-2024-29169,0,1,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000 +CVE-2024-29169,0,0,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000 CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000 CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000 CVE-2024-29173,0,0,7834c8352c9984126ce7ef4158fbeb815c062c8fc3f1eb7ec698c2f25391dde6,2024-06-26T12:44:29.693000 @@ -248393,19 +248393,19 @@ CVE-2024-29200,0,0,2fded465a0d157f739ca7c28831045e810d35e1ed39056bf30a71fa62dc84 CVE-2024-29201,0,0,5033916f5c6e37ebfb2f1925ef22415c52e7214153fce901347173dc9b9eb9c1,2024-04-01T01:12:59.077000 CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d2488d1,2024-04-01T01:12:59.077000 CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000 -CVE-2024-29204,0,1,f46d75bb1b023a43dcae1a8dabcfb9ff1c361a0d2e62ebcd4665665fa845bd3e,2024-07-03T01:52:15.910000 -CVE-2024-29205,0,1,4e674b8f8da8d044735de177a49e7b209584ddf484ab1ea225bf31caee569212,2024-07-03T01:52:16.640000 -CVE-2024-29206,0,1,e86d328fcc9a6f514df760d2a874996b94023486fc1fbca1ce78fd9823e4431a,2024-07-03T01:52:17.397000 -CVE-2024-29207,0,1,cb61fd349829f4c3ea10e2458bf16eaba90c4ab4b0709ae414d9c6319d6d4f1f,2024-07-03T01:52:18.087000 -CVE-2024-29208,0,1,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074d9d,2024-07-03T01:52:18.780000 +CVE-2024-29204,0,0,f46d75bb1b023a43dcae1a8dabcfb9ff1c361a0d2e62ebcd4665665fa845bd3e,2024-07-03T01:52:15.910000 +CVE-2024-29205,0,0,4e674b8f8da8d044735de177a49e7b209584ddf484ab1ea225bf31caee569212,2024-07-03T01:52:16.640000 +CVE-2024-29206,0,0,e86d328fcc9a6f514df760d2a874996b94023486fc1fbca1ce78fd9823e4431a,2024-07-03T01:52:17.397000 +CVE-2024-29207,0,0,cb61fd349829f4c3ea10e2458bf16eaba90c4ab4b0709ae414d9c6319d6d4f1f,2024-07-03T01:52:18.087000 +CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074d9d,2024-07-03T01:52:18.780000 CVE-2024-29209,0,0,730a58a4d5c988d39296847a3cbeffaf8f223ddfb7528cfe72b7ecd7120d8d3e,2024-05-07T20:07:58.737000 CVE-2024-2921,0,0,6f7f3b512cf8e7465b0aea1823cce56bf608a3c1f40869feddab084c3da126e6,2024-04-09T19:15:38.423000 -CVE-2024-29210,0,1,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000 -CVE-2024-29212,0,1,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000 +CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000 +CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000 CVE-2024-29215,0,0,1deb2741af1ef43589dac951d569d4331d52605244b66711056e6a21b816405f,2024-05-28T12:39:42.673000 CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000 -CVE-2024-29217,0,1,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000 -CVE-2024-29218,0,1,cf4584ad45aa9022ef363367b9662bb95c85c1cf05b783ff3f8b77c49f1740c3,2024-07-03T01:52:21.197000 +CVE-2024-29217,0,0,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000 +CVE-2024-29218,0,0,cf4584ad45aa9022ef363367b9662bb95c85c1cf05b783ff3f8b77c49f1740c3,2024-07-03T01:52:21.197000 CVE-2024-29219,0,0,4481109cba1c43e8c57c43af416b7ffd0dce43a288900ab9b937cea0ab69c2a2,2024-04-15T13:15:31.997000 CVE-2024-2922,0,0,3cb36cd942c44fb4bc05e47c0e65638d7b7319c1bc41952ab87c0a978527a366,2024-06-06T14:17:35.017000 CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000 @@ -248441,7 +248441,7 @@ CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b2 CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000 CVE-2024-2928,0,0,52e75761419c8c2112a911614151e115b2003c195d62a406dbe9457ddc16786b,2024-06-07T14:56:05.647000 CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000 -CVE-2024-29291,0,1,0d703378b5cb7b849e8c22cc50b73febed58a80d3feb1ebc89147218489081f9,2024-07-03T01:52:22.557000 +CVE-2024-29291,0,0,0d703378b5cb7b849e8c22cc50b73febed58a80d3feb1ebc89147218489081f9,2024-07-03T01:52:22.557000 CVE-2024-29296,0,0,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000 CVE-2024-2930,0,0,c889d2bb0ed003840384d753c9a4791cb56d30b7751947b8a13baa116735892f,2024-05-17T02:38:37.687000 CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000 @@ -248451,7 +248451,7 @@ CVE-2024-29309,0,0,45f1a5c62c6adb2cfc37fb8e478a65e7e38cb4d4cfc5c99ecb35ab6584ea9 CVE-2024-2931,0,0,a6d520754016bbdab2d7efa74efc39e3254a7b8cd183192dc94878921c91c9ca,2024-04-02T12:50:42.233000 CVE-2024-29316,0,0,a77a66080b82cffb666cc5dc96a72ca9eacad7eb3c1a78f29a15ae578e7a1db4,2024-03-29T12:45:02.937000 CVE-2024-2932,0,0,a3c1266ff6f47dc95aa30613f077416ccee7f436989a8ec80d1c9241ff3cefc9,2024-05-17T02:38:37.813000 -CVE-2024-29320,0,1,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e6ab,2024-07-03T01:52:23.320000 +CVE-2024-29320,0,0,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e6ab,2024-07-03T01:52:23.320000 CVE-2024-2933,0,0,18d1f298f2b762b4118efe96c450d68f8ae481c12b8472bb73a5759391f8f4eb,2024-06-03T14:46:24.250000 CVE-2024-29338,0,0,e2411b46399ccf809f7042628f5dc80681cab752a4fc33bfa69d55d7b188c619,2024-03-22T19:02:10.300000 CVE-2024-2934,0,0,3802ca621262b108954a2e7ca078a0b3239a058a100ed0a90d89e0faae5d736e,2024-05-17T02:38:37.907000 @@ -248461,24 +248461,24 @@ CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6 CVE-2024-29368,0,0,58275317479c01c485651fa0a22ca9decedb8cd847a38eefd11c549de0fde384,2024-04-23T14:15:08.440000 CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000 CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000 -CVE-2024-29376,0,1,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000 +CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000 CVE-2024-2938,0,0,0d6266c511957cbd6b8494ba4a5e28bce9547cd2935b8f09d809cbbace1e2bba,2024-05-17T02:38:38.137000 -CVE-2024-29384,0,1,b089f835091687cd6d0dcdd933552a1f796e9abc13183d08fc4c9d160e3daf39,2024-07-03T01:52:25.030000 +CVE-2024-29384,0,0,b089f835091687cd6d0dcdd933552a1f796e9abc13183d08fc4c9d160e3daf39,2024-07-03T01:52:25.030000 CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b266090d,2024-03-22T19:02:10.300000 CVE-2024-29386,0,0,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000 CVE-2024-29387,0,0,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000 CVE-2024-2939,0,0,8d288c5421907c18561d6a467f0e78e7e78afcae942dcb9d7c160f3050babf32,2024-05-17T02:38:38.230000 -CVE-2024-29390,0,1,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000 +CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000 CVE-2024-29392,0,0,6821a4c6dd210bfae25d568d5e6add9cab71ce2f9ed1de56bded387978d60e49,2024-05-22T18:59:20.240000 CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0857,2024-04-11T12:47:44.137000 CVE-2024-2940,0,0,e525af8477a0b8a4e6a04b3ac27a53c69ee703f71a97899e4490355eb87ce77e,2024-06-05T20:15:13.267000 -CVE-2024-29400,0,1,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000 +CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000 CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000 CVE-2024-29402,0,0,fda5605a49d434b54f664af40772780310034556d5d1866a088f676172e81755,2024-04-17T12:48:07.510000 CVE-2024-2941,0,0,3664da94d27b244978ce98084134f6922c872e5b786ff31d00b4217eb8afd029,2024-06-26T19:15:13.107000 CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b452cd,2024-04-04T12:48:41.700000 CVE-2024-29415,0,0,53ed5ba54a647dd7681f8528c5dae7a4b047ea77500df24c050bdf2a62c4afe9,2024-05-28T12:39:28.377000 -CVE-2024-29417,0,1,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 +CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000 CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000 CVE-2024-2942,0,0,441f0a67703a8db7af5d599581bb10078cc400b1f49682a90a1d996555281551,2024-05-17T02:38:38.500000 CVE-2024-29421,0,0,b912d08ce74526ab990d3c496b114c42a5453a9993fba547589b9c9c5249ee57,2024-05-22T18:59:20.240000 @@ -248506,7 +248506,7 @@ CVE-2024-29455,0,0,34e13e15e8ba1247bab4074112a2a8e07941c50f23ef976a2aa4934ef2701 CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000 CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000 CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000 -CVE-2024-29466,0,1,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 +CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000 CVE-2024-2947,0,0,b68097f442084c413bcea33d1d0c33d19fa9ae07d0edeb3af3b79bd708e6dc65,2024-06-12T09:15:17.717000 CVE-2024-29470,0,0,47e23a8af4be8b838695296b19cd4bea426144fbae12eb976431244ea0a84b06,2024-03-21T12:58:51.093000 @@ -248518,7 +248518,7 @@ CVE-2024-29477,0,0,de7f481f5795eaec84a145aef7d5c448e8d3e580fe050c669bcf013e697d8 CVE-2024-2948,0,0,3594bbd430dd5444695ca044dc4efc4195ce92c17c43c967ca88fadf4c9f5e69,2024-04-01T01:12:59.077000 CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee03d,2024-03-29T12:45:02.937000 CVE-2024-2949,0,0,fe05e354f0ebdb867f0f2833560dc840c15ef92daf8a56e7a3e31b95f453d065,2024-04-08T18:48:40.217000 -CVE-2024-29499,0,1,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000 +CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000 CVE-2024-2950,0,0,e07028f6204e1653615da40fab9edc1b22f1b4a28f65125bfe5341d4aac985fa,2024-04-08T18:49:25.863000 CVE-2024-29500,0,0,e867a892b6feea61da09f4d0f3774bdfb045763ae21492d0ad387c1de2b2b650,2024-04-11T12:47:44.137000 CVE-2024-29502,0,0,1cedf8999be6431ee5260cbb2cb95e7cf3e534192a33d0246363cb8fb473dca1,2024-04-11T12:47:44.137000 @@ -248536,7 +248536,7 @@ CVE-2024-2957,0,0,737502ee51917bedcfc8e0d53eeb74b27331cb91e4661171e2fbc24aa9edcd CVE-2024-2958,0,0,1d0782ac3dad3eea05ab9020fa02a9c84923a290d1ec10084a1a3c542c4ae38a,2024-05-02T18:00:37.360000 CVE-2024-2959,0,0,8ebd6f5d854875f1243a0e742643637a0817e3e312cd0ab52e93c0912151ddf1,2024-05-02T18:00:37.360000 CVE-2024-2960,0,0,b0654508ad7da54a731428bce408e0368df4e1f951fcd18a828fd8ee507eddd3,2024-05-02T18:00:37.360000 -CVE-2024-2961,0,1,9aeabb370372980f8d219112df9431f09ef8b1e170c45951dff7e07f6231e023,2024-07-03T01:53:40.707000 +CVE-2024-2961,0,0,9aeabb370372980f8d219112df9431f09ef8b1e170c45951dff7e07f6231e023,2024-07-03T01:53:40.707000 CVE-2024-2962,0,0,66e1dbbf6553695d3f3b80872691537dfe2ee799c385611e870cc04c150d3a60,2024-03-27T12:29:30.307000 CVE-2024-2963,0,0,fd3dfe2484fa8fbcf32b1e1713c092eebd2b546a8fe9a7f583270172bb703a7d,2024-03-29T12:45:02.937000 CVE-2024-2964,0,0,491ec5f2811a24301edaa3e4cd378090bf610cd2f1b9a50cd7e0dcb254704174,2024-03-29T12:45:02.937000 @@ -248546,7 +248546,7 @@ CVE-2024-2965,0,0,ae0a5407fd78d6b2604d9fd881735bd6f473d7086b4c284611aa9a0f4adc9d CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000 CVE-2024-29651,0,0,64d9a8930ee4398a03fcd3e224f1e639eea2a6cdeff56b4b739c9ec75d30844a,2024-05-20T19:34:58.277000 CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000 -CVE-2024-29660,0,1,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 +CVE-2024-29660,0,0,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 CVE-2024-29661,0,0,261575e37794cafe64ffc39d8e8abae89bdc1f0dce273791f821aa281be54825,2024-04-22T13:28:34.007000 CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000 CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000 @@ -248561,23 +248561,23 @@ CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e375 CVE-2024-2972,0,0,152d903d5348ef9a28736b9da1b981c53c5565cc38a67b052e47645292e97e48,2024-04-24T13:39:42.883000 CVE-2024-2973,0,0,b7c9e09de444b51c55bed333c2b413927266920f2185557e2ed2f3ecfa098739,2024-06-28T10:27:00.920000 CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000 -CVE-2024-29733,0,1,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 +CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000 CVE-2024-29735,0,0,08441179a62f1cc6331292f57b194f29d2c97e3d1df4d6604f11a9eac503a49f,2024-05-01T19:15:23.573000 CVE-2024-29738,0,0,99465af485b39ff68e105b0428c69eb9adbd1c8e009fe9a3569be9db8bf56cc1,2024-04-08T18:49:25.863000 CVE-2024-29739,0,0,7135a40bab238cf97a55844698a5a7210b69874e392968b48d12413c9c3727c9,2024-04-08T18:49:25.863000 CVE-2024-2974,0,0,cc3d6ccfa15f0e42af840eac31b32f2ae897d1c61c7e06aeb8dd8aa1c1fe2162,2024-04-10T13:23:38.787000 -CVE-2024-29740,0,1,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000 +CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000 CVE-2024-29741,0,0,58a208fae70919819896a10b0ac69af17481c90fbaf33f6b074138668c8454e7,2024-04-08T18:49:25.863000 CVE-2024-29742,0,0,013e0935d87738e02ad985787df8e1bdb20608d450a31e334d4001bfd987aadc,2024-04-08T18:49:25.863000 CVE-2024-29743,0,0,2d88b2eb4af432fcf658c698c6f44520850b6e65f42e4f9d8e435f0857ed03f4,2024-04-08T18:49:25.863000 CVE-2024-29744,0,0,ca9c34220842db20c040958869ee7619d2f9abf8c801f17b5df2ee3c7b5aa48c,2024-04-08T18:49:25.863000 -CVE-2024-29745,0,1,78004cfb0900810795e61a81e3d7c158941740f11ef378046d506f05ba94e1e8,2024-07-03T01:52:31.423000 +CVE-2024-29745,0,0,78004cfb0900810795e61a81e3d7c158941740f11ef378046d506f05ba94e1e8,2024-07-03T01:52:31.423000 CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082a4e,2024-04-08T18:49:25.863000 CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000 CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000 CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000 -CVE-2024-2975,0,1,ce2c1eaa1d0b58261b411dcccccd364c347ae6cf1b55cf3907ef667aa6188f26,2024-07-03T01:53:41.630000 +CVE-2024-2975,0,0,ce2c1eaa1d0b58261b411dcccccd364c347ae6cf1b55cf3907ef667aa6188f26,2024-07-03T01:53:41.630000 CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000 CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000 CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000 @@ -248614,10 +248614,10 @@ CVE-2024-29780,0,0,dbb5b28e79357605c44be97580280388890d8927ed9d86b1dba54bfaf3205 CVE-2024-29781,0,0,b6224f330ff358aa94180da085366f464fc49ccb8c9a11cf2901ca1712188182,2024-06-17T12:43:31.090000 CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000 CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000 -CVE-2024-29784,0,1,75a476725b58b69912c5c88a5976ab0700b0278b01f75a2c842fe2d934ccc8aa,2024-07-03T01:52:34.030000 +CVE-2024-29784,0,0,75a476725b58b69912c5c88a5976ab0700b0278b01f75a2c842fe2d934ccc8aa,2024-07-03T01:52:34.030000 CVE-2024-29785,0,0,6acf4d5e192a210ba9b844d54adbd79774477e59fb13750c29056bd3f9129dd1,2024-06-17T12:43:31.090000 -CVE-2024-29786,0,1,6ea1aba11793e88e3539f0a1fa716e9f6f197bd5c9e2809ecb83b2a20665ce3b,2024-07-03T01:52:35.427000 -CVE-2024-29787,0,1,8b3227822d531960b3be4bdc2e1a147750039f680413f3ae3fe72ae67cdc3673,2024-07-03T01:52:36.683000 +CVE-2024-29786,0,0,6ea1aba11793e88e3539f0a1fa716e9f6f197bd5c9e2809ecb83b2a20665ce3b,2024-07-03T01:52:35.427000 +CVE-2024-29787,0,0,8b3227822d531960b3be4bdc2e1a147750039f680413f3ae3fe72ae67cdc3673,2024-07-03T01:52:36.683000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000 @@ -248655,16 +248655,16 @@ CVE-2024-29818,0,0,1f8959f01324e92affea2052755ae86441537116ae9d8dda4a17418633306 CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000 CVE-2024-2982,0,0,4aa7b937619803bd745055b07038dec2aac337789514c96ad26dee4b03439859,2024-05-17T02:38:40.403000 CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000 -CVE-2024-29822,0,1,d2615e91bb9823f5a68536f9b4cd5a24e0ab8f0aef33b45a1b908d6ea521e356,2024-07-03T01:52:39.707000 -CVE-2024-29823,0,1,21758f125f4d7ae23b17eb7d3b14695a0bc4f03982cdf3bd61c673e8fe783a08,2024-07-03T01:52:40.430000 -CVE-2024-29824,0,1,b375dd609ead4d6fa8deffd53d21027aee5b0c970a4280fe54c865911c5d6fab,2024-07-03T01:52:41.133000 -CVE-2024-29825,0,1,e1f08e7c77d9316a41574b3f9c50358ca3dcdde2c564abef4272669d8c666180,2024-07-03T01:52:41.840000 -CVE-2024-29826,0,1,015b7dc5cecd0e0c7eb7d8f1703674bec978f3ccdbd1be411e52d58ba200b131,2024-07-03T01:52:42.553000 -CVE-2024-29827,0,1,29c9069ded6ac01c3dd894b93f19938e882c8194d01f03990ea46638fcde5cd6,2024-07-03T01:52:43.270000 +CVE-2024-29822,0,0,d2615e91bb9823f5a68536f9b4cd5a24e0ab8f0aef33b45a1b908d6ea521e356,2024-07-03T01:52:39.707000 +CVE-2024-29823,0,0,21758f125f4d7ae23b17eb7d3b14695a0bc4f03982cdf3bd61c673e8fe783a08,2024-07-03T01:52:40.430000 +CVE-2024-29824,0,0,b375dd609ead4d6fa8deffd53d21027aee5b0c970a4280fe54c865911c5d6fab,2024-07-03T01:52:41.133000 +CVE-2024-29825,0,0,e1f08e7c77d9316a41574b3f9c50358ca3dcdde2c564abef4272669d8c666180,2024-07-03T01:52:41.840000 +CVE-2024-29826,0,0,015b7dc5cecd0e0c7eb7d8f1703674bec978f3ccdbd1be411e52d58ba200b131,2024-07-03T01:52:42.553000 +CVE-2024-29827,0,0,29c9069ded6ac01c3dd894b93f19938e882c8194d01f03990ea46638fcde5cd6,2024-07-03T01:52:43.270000 CVE-2024-29828,0,0,88b2301100152a3a8804ea58c67c8935af99a17ad84c5804a16e7ef535d9bcff,2024-05-31T19:14:47.793000 -CVE-2024-29829,0,1,2627c3c538089236c07fc9d99ff01f8523c0ad4c659196fc4e8a6a2fbde2ef8b,2024-07-03T01:52:43.970000 +CVE-2024-29829,0,0,2627c3c538089236c07fc9d99ff01f8523c0ad4c659196fc4e8a6a2fbde2ef8b,2024-07-03T01:52:43.970000 CVE-2024-2983,0,0,bbc8512579381338bf10ae1b698e35829f3ad472ac95ecb989d0b205ba03dc93,2024-05-17T02:38:40.503000 -CVE-2024-29830,0,1,18395a43d7ad8c4a3ef4b143a126bb1f7f474279d280a4d068388e15b7d7d9c8,2024-07-03T01:52:44.693000 +CVE-2024-29830,0,0,18395a43d7ad8c4a3ef4b143a126bb1f7f474279d280a4d068388e15b7d7d9c8,2024-07-03T01:52:44.693000 CVE-2024-29832,0,0,9f165dd8af7b150aedd8ba0e648c487f081558a3943c83b1f6267f1670f3eb8a,2024-03-26T17:09:53.043000 CVE-2024-29833,0,0,425a7917efe73a1770fcefa4ce4ec7e1a0c1da408936ec3b87fe92c30b675f21,2024-03-26T17:09:53.043000 CVE-2024-29834,0,0,8cc60342382915a3218e3b4fbfae27625c02b9703c9f2ace2a02e0ceee6666b1,2024-05-01T17:15:32.153000 @@ -248678,14 +248678,14 @@ CVE-2024-29841,0,0,55b576137a980baf276319e7949f14a0b7f1bac68593183f67439c72ef1c2 CVE-2024-29842,0,0,c555d339d968965f67a62125788ebd30337e465ee62002c966027b486a7b6656,2024-04-15T13:15:31.997000 CVE-2024-29843,0,0,0e7cac2423043e71c46c0b1e43ac9a8c810800e1746f633c825d47d92993ebb0,2024-04-15T13:15:31.997000 CVE-2024-29844,0,0,0b2bf20574d5156f6a667769b4d5660c6c41f0f9a81de3ca328a866e5a169d72,2024-04-15T13:15:31.997000 -CVE-2024-29846,0,1,ecf705f8a3f3d5200a5c3119a1c5f5c4508879a9b659519aff9f7061bee1cc64,2024-07-03T01:52:46.270000 -CVE-2024-29848,0,1,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875c84,2024-07-03T01:52:46.980000 -CVE-2024-29849,0,1,f0326930a23ff5c9419ec7504b4b4f26a8016e21eb2c16c17808ae35e2984b26,2024-07-03T01:52:47.767000 +CVE-2024-29846,0,0,ecf705f8a3f3d5200a5c3119a1c5f5c4508879a9b659519aff9f7061bee1cc64,2024-07-03T01:52:46.270000 +CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875c84,2024-07-03T01:52:46.980000 +CVE-2024-29849,0,0,f0326930a23ff5c9419ec7504b4b4f26a8016e21eb2c16c17808ae35e2984b26,2024-07-03T01:52:47.767000 CVE-2024-2985,0,0,fa2452bdca8bf817e9c39173e50c9398ab81e8bbe363c5d181d5470655c888f8,2024-05-17T02:38:40.683000 -CVE-2024-29850,0,1,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000 +CVE-2024-29850,0,0,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000 CVE-2024-29851,0,0,218edcf6feb0effa72e3a8c5b814479d3c2c35c93f48749732d1e5886bf0b9db,2024-05-24T01:15:30.977000 -CVE-2024-29852,0,1,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000 -CVE-2024-29853,0,1,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000 +CVE-2024-29852,0,0,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000 +CVE-2024-29853,0,0,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000 CVE-2024-29855,0,0,ee183a830e94532701a8e68a1a05e136347fa507da9c0312445a531c86b3c251,2024-06-11T13:54:12.057000 CVE-2024-29857,0,0,9325f9fdc1f4e8265930eb53922aae24948d06e15ce403473a616a945c01d1ad,2024-05-14T16:13:02.773000 CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000 @@ -248696,7 +248696,7 @@ CVE-2024-29863,0,0,5ec71e17f35f1b20d68a8fb4a9c7a1d55d3d29cfb9efd5769e3093565fc81 CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000 CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000 CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000 -CVE-2024-29868,0,1,6d9e485e8577ac109fc1f82f0290bd5fe84a3838b362df48ef16f072b5556dcf,2024-07-03T01:52:50.837000 +CVE-2024-29868,0,0,6d9e485e8577ac109fc1f82f0290bd5fe84a3838b362df48ef16f072b5556dcf,2024-07-03T01:52:50.837000 CVE-2024-2987,0,0,8e4472435dae1bc704d5dce95b8b76dabb2648c6f5bada5b41186e08bd4d1ecf,2024-05-17T02:38:40.867000 CVE-2024-29870,0,0,e30dc3832a6e40f96f36d6a14e8c8edd290056d5cc189e329ff7d917f01a8001,2024-03-21T15:24:35.093000 CVE-2024-29871,0,0,26669ba5bfad06e749b4da0897856b8ae6b3b31b4382f6713c54983091b3efd3,2024-03-21T15:24:35.093000 @@ -248745,7 +248745,7 @@ CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f CVE-2024-29913,0,0,86e3efc5b1353eb04c1c92a171500230e917b75dd52877c2f2066a6fd3fd1a62,2024-03-27T12:29:30.307000 CVE-2024-29914,0,0,41820f304cde41c3e6cd90a76cfeb8bb6694505fac53e08e98bf56ec132dedca,2024-03-27T12:29:30.307000 CVE-2024-29915,0,0,ed7f33b1235afbae494d2037161616570ebacbb5f3afa9bfd159dd9de9cf22c2,2024-03-27T12:29:30.307000 -CVE-2024-29916,0,1,1886b67993ddecd5872a368ade2b9940d3468220a38abae2736ce6002a67939a,2024-07-03T01:52:52.383000 +CVE-2024-29916,0,0,1886b67993ddecd5872a368ade2b9940d3468220a38abae2736ce6002a67939a,2024-07-03T01:52:52.383000 CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000 CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000 CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000 @@ -248813,7 +248813,7 @@ CVE-2024-29983,0,0,fcb26f8ef908d69f46c133d47f6fa7f3c86c8dbeb0e9e8f0c2b6960da90e3 CVE-2024-29984,0,0,c8eb19615edacf6092478fb2ad2d94260f928e0cc536a406011e5f52cd4d7b56,2024-04-10T13:24:00.070000 CVE-2024-29985,0,0,2e01df5251c981f52737c67be1729569718fa94485a3bfe706db8d88b47a628b,2024-04-10T13:24:00.070000 CVE-2024-29986,0,0,17685573c9412982552fc59dab43c7536712413b6d2f8f6b1273fa11c65f6435,2024-04-19T13:10:25.637000 -CVE-2024-29987,0,1,739a645d6cb57eafd57ae46b02a164214b94110d7027433cafab7724c5c859ab,2024-07-03T01:52:55.750000 +CVE-2024-29987,0,0,739a645d6cb57eafd57ae46b02a164214b94110d7027433cafab7724c5c859ab,2024-07-03T01:52:55.750000 CVE-2024-29988,0,0,eaf2d772ec94145334adcb8db67ab7a5bf7b2094338217b8f25aa965ef678736,2024-05-03T16:13:41.277000 CVE-2024-29989,0,0,8f06390ede228924078f3e71f278dc13caa7b29bc7a43dd5671d47700d642746,2024-04-10T13:24:00.070000 CVE-2024-2999,0,0,66188d89d7d084310719b745c980d492c6cc053998ad2cc3ef073d46cef269ec,2024-05-17T02:38:41.973000 @@ -248888,7 +248888,7 @@ CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3ca CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000 CVE-2024-30056,0,0,9eabc96ede995114869bb3aef4380d7f915e132e425ada2ef8ddea79edd8b89e,2024-05-28T12:39:42.673000 CVE-2024-30057,0,0,c7eab3d4cefd1514c5d88f29be8ea4faf479c2c21e752ea7a7a05bd4e8190c85,2024-06-26T18:15:12.910000 -CVE-2024-30058,0,1,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4873,2024-07-03T01:53:46.567000 +CVE-2024-30058,0,0,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4873,2024-07-03T01:53:46.567000 CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000 CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000 CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000 @@ -248933,13 +248933,13 @@ CVE-2024-30101,0,0,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804e CVE-2024-30102,0,0,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000 CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000 -CVE-2024-30107,0,1,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 +CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 CVE-2024-30109,0,0,6a8a59a3bf8868bc11960f386f3b1ccf692b85f5ec7ca1c3028fdcd4f6f4463b,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000 CVE-2024-30110,0,0,31ab34f1dc971d2399c4b149c7b81d5c8b84b447a4e58f0764d923bfa4bd3cfa,2024-06-28T10:27:00.920000 CVE-2024-30111,0,0,20afbe01364d348dba165503ff4e528be7a6b88d771c910736a2fa16ed5a768c,2024-06-28T10:27:00.920000 CVE-2024-30112,0,0,7776e48af0349613d262d23e79d54eaf55862c79c613ef95710a33f68285b593,2024-06-26T12:44:29.693000 -CVE-2024-30119,0,1,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 +CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,e36717a45c134ce96ee2f16d093d8717c8dcca8c5bf419fdf3e6a16688a2f2e7,2024-06-17T12:42:04.623000 CVE-2024-3013,0,0,d99aebfcd4c3fad166b5c8782b32734185b35fca38a39501e4e58d010c943884,2024-05-17T02:39:40.710000 @@ -248949,10 +248949,10 @@ CVE-2024-3015,0,0,5bfcc2df8ce380675198b2d677a05b9fe4d1d4de944a30f5dbc4a57145492e CVE-2024-30156,0,0,f042a6e9e665ad25cb33e6086a6b1915f5ef73ca21458bc60ad138bf3a5430b0,2024-03-25T01:51:01.223000 CVE-2024-3016,0,0,144d4fb32b1937399ef996d1fb0a438a94695eb58d12556815e9e53871a44930,2024-05-14T16:11:39.510000 CVE-2024-30161,0,0,f6e020d1b7d6902ffc5c88d1ad51f533f0208a2bc085d7a564099f91ae9a953b,2024-04-11T14:15:12.083000 -CVE-2024-30162,0,1,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 +CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 CVE-2024-30163,0,0,ed34c2262e7c7a5b4ecc7a347b985e1d1a2b083b2d7d7e16a60fc8754b18c01e,2024-06-07T19:24:09.243000 -CVE-2024-30164,0,1,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a216,2024-07-03T01:53:52.840000 -CVE-2024-30165,0,1,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000 +CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a216,2024-07-03T01:53:52.840000 +CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000 CVE-2024-30166,0,0,b150008503ab8c7534770489f2591fa7243e9c9df016e5c1c4c33123a4b73e85,2024-04-03T12:38:04.840000 CVE-2024-3017,0,0,1f5be6a00cc17bbba71ee155318c98c351cb1f43106e0816220cced6b290af06,2024-06-27T19:25:12.067000 CVE-2024-30171,0,0,01719a9378c350847ae599f84f673a1bd54b602a3108dc795b8a1c7ffe8fb56a,2024-06-14T13:15:51.603000 @@ -249194,7 +249194,7 @@ CVE-2024-30415,0,0,c67029325d33a1ce8e97b7604f93756b30725418df8597cb37f9b0d437540 CVE-2024-30416,0,0,3af0469edbc7730189819c559bfc99705333bc039fec00229c75444e3843fffd,2024-04-08T18:48:40.217000 CVE-2024-30417,0,0,4b0219fd35ed725db3c26aba1f1f4ed768dae0878c967a047f37117e414e514d,2024-04-08T18:48:40.217000 CVE-2024-30418,0,0,0aa631f82db225e247e747f2c214d9d726c3914e3c3ad6a01574772c58c07455,2024-04-08T18:48:40.217000 -CVE-2024-30419,0,1,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000 +CVE-2024-30419,0,0,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000 CVE-2024-3042,0,0,edf49fe44d6b8870126e49562de5abc06841d778b9974de7464ab1f1965672d6,2024-05-17T02:39:41.680000 CVE-2024-30420,0,0,0db933c30fe4b82a50dfb0c543e39daf4084f355ad47a2ac8e0693fe33e8c074,2024-05-22T12:46:53.887000 CVE-2024-30421,0,0,8cfd124574a85b45cac2d52527d901d612a69bb0525bed810c2e40b98978560c,2024-03-28T12:42:56.150000 @@ -249276,7 +249276,7 @@ CVE-2024-30496,0,0,50a31bcaca5773f5ce9c3fdbb31ca64736ba1254cea673c1a7efc11cd4ce0 CVE-2024-30497,0,0,bf99efef4d0af83c364bb0b8a4eb0c3e3d40aa31feb9a4dd43c63dc65056301a,2024-04-01T01:12:59.077000 CVE-2024-30498,0,0,a00a9780c3686a137f3a2bb4db6c83495981e02d4ba83c562afdaf07c2535e5f,2024-04-01T01:12:59.077000 CVE-2024-30499,0,0,5670d73c9b52955b44811b2abb66b835ae33f024bfd3c3fb5761cb97b456a88a,2024-04-01T01:12:59.077000 -CVE-2024-3050,0,0,40443542ef10c8a9f742f388f28386051964ca36b91982eb6261aae5a11c2b61,2024-05-29T13:02:09.280000 +CVE-2024-3050,0,1,6a792a20958957913de1d3bd62697300fe65353944052d816fd317ad51f4c112,2024-07-03T02:05:56.890000 CVE-2024-30500,0,0,90060ce93d9b777bf408384995deb72e4a1aed07c4c8c982cc42b7b14f216fb8,2024-04-01T01:12:59.077000 CVE-2024-30501,0,0,530b818ec81e31bb69a6f5be968c772a6c6083c65877652c170900d8a15af2c1,2024-04-01T01:12:59.077000 CVE-2024-30502,0,0,b5928ad8d35fd866480848c7df56c8cb1177949affc93071bc57083422f2cfc9,2024-04-01T01:12:59.077000 @@ -249358,7 +249358,7 @@ CVE-2024-30586,0,0,a186fb979ed65c88ce62a290e6f855128163c9fa77c5355abfb2bb731e824 CVE-2024-30587,0,0,23c200ae4001630b29710efdd8698d85648712273d7372a752920032f4d947e3,2024-03-28T16:07:30.893000 CVE-2024-30588,0,0,a78cc1e723dc7738ea3aa122a4b45c10693faddfd2183ab3270fc6b1c4499964,2024-03-28T16:07:30.893000 CVE-2024-30589,0,0,7f3bd7ec901fe014af7dcf666935ddd3d39c0fc2ff28ac8eaf8d31eadbb90b80,2024-03-28T16:07:30.893000 -CVE-2024-3059,0,0,b7576f8290b82a402be7cca572ad82909c3547525f18c5288b0c8e587e1f8996,2024-04-26T12:58:17.720000 +CVE-2024-3059,0,1,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000 CVE-2024-30590,0,0,b29e37400568bf3ef1858eef7769bf083a47c61a106f27df4b8173fc1d40814d,2024-03-28T16:07:30.893000 CVE-2024-30591,0,0,fccd0ace4239a30fa0ef4b9ee775d5e196ef1d9d76c1e5f2b5d345c8f64facf1,2024-03-28T16:07:30.893000 CVE-2024-30592,0,0,a707460e8e70159424b4543df18a9eb4f29ee9778a40f23b0bd8a216605d05a0,2024-03-28T16:07:30.893000 @@ -249369,7 +249369,7 @@ CVE-2024-30596,0,0,7cd0dbe59c07e524347269d6ad600edbf2ce3681f61fcb58b1ea4be53950c CVE-2024-30597,0,0,c2c4d6014cd4a690dc2be3f521581455ed497747d3319329dc997bfbd14251ff,2024-03-28T16:07:30.893000 CVE-2024-30598,0,0,3455a65bcba40de15b293f4cbe7609b01a090d4c25ed20ab971f6a106299dc77,2024-03-28T16:07:30.893000 CVE-2024-30599,0,0,45a9c2ef0bb4943ce0d3dab897bfaa7a787bb1701760e2b34a4aad8235e0de1c,2024-03-28T16:07:30.893000 -CVE-2024-3060,0,0,41ef398c8b4ef96b00f471a13be1ac26198361ab2a8ec2868f9ade4ef86bf8b1,2024-04-26T12:58:17.720000 +CVE-2024-3060,0,1,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000 CVE-2024-30600,0,0,07f8767eef19dd08d9e1cc3d0874edfb6bacf2e635173b62a3bbb7f77a1747c3,2024-03-28T16:07:30.893000 CVE-2024-30601,0,0,0a2e428cbc485c5623cbc301ff44e1cd676c3b7c2d6d8ce0571a55030f7e4cf8,2024-03-28T16:07:30.893000 CVE-2024-30602,0,0,2727b743b2e56903f7e801a28994556ef283545dd501da199ae6f2fa143c24cf,2024-03-28T16:07:30.893000 @@ -249384,7 +249384,7 @@ CVE-2024-30614,0,0,07e4194c2494ff4594f776c6b8f53ad1a48995bb1a612cc43a1ae18f2a8b0 CVE-2024-30620,0,0,761188526e26cc91e0f6258925cfdd89caad5faac5077097ba431c437299a06b,2024-04-08T22:48:50.340000 CVE-2024-30621,0,0,9fba13a7080ae15640edcf3cb18d8dd79481c10bb3102533f267ff3982d5b57e,2024-04-08T22:48:53.950000 CVE-2024-30622,0,0,0da5246ef4e8510b5fbd6bec86e149da05d8dfe76b52aa744b083196821dd6ad,2024-03-29T13:28:22.880000 -CVE-2024-30623,0,1,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 +CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 CVE-2024-30624,0,0,66d3e2d7e06cec16684c816196f2a69004a5a14026cf6f1d337c7e127ed9e3f6,2024-03-29T13:28:22.880000 CVE-2024-30625,0,0,a48225cb5b5eed5083ce514661098dcabbc07570c8aed6144d878bd7d95b966f,2024-03-29T13:28:22.880000 CVE-2024-30626,0,0,dd61e51a8ba5f6151ec2012c267de9a8f4363b4511aa2015e23176fa696a192e,2024-03-29T13:28:22.880000 @@ -249399,7 +249399,7 @@ CVE-2024-30633,0,0,ab319b0e491468d1c3cbfe5f0d96924a7633dfe57388516e1be47f6b3fc36 CVE-2024-30634,0,0,5ccb07d5328fc1be0e2cbedc51c91a12c3569f3573097e7566a8fa75fcc42efa,2024-04-01T01:12:59.077000 CVE-2024-30635,0,0,ef77a9e1c6244f1e6460f57329624df2a1158ef382b789e8309986f035c85862,2024-04-01T01:12:59.077000 CVE-2024-30636,0,0,c96d7020b9575675321d21406a3dff42d8ec7d0432a5844ede2770796a618007,2024-04-01T01:12:59.077000 -CVE-2024-30637,0,1,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000 +CVE-2024-30637,0,0,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000 CVE-2024-30638,0,0,476165b7ba1121567d55c67d54d9d40e3e29ea068ff3cb9f8e442a4ce4566f0b,2024-04-01T01:12:59.077000 CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442509,2024-04-01T01:12:59.077000 CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000 @@ -249477,9 +249477,9 @@ CVE-2024-3076,0,0,b2ddfdf17526511f9ad04f6248546e0c8d288852cffe59b222a3e4004ceea7 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,bab9594b1bbcb7c5b250fbe2c8eea38e31b02ce838e7fc85a3f05fa82d4d81e1,2024-05-17T02:39:42.337000 CVE-2024-3079,0,0,50d8fa3f15e0dba3123c9f2a8c5f91dc9ed9337671e6596861e01a056d0b3f1c,2024-06-17T12:43:31.090000 -CVE-2024-30799,0,1,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380dd9a,2024-07-03T01:54:13.747000 +CVE-2024-30799,0,0,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380dd9a,2024-07-03T01:54:13.747000 CVE-2024-3080,0,0,9363c109e83d1ce4c30b747495432709a80af2001fbb6d090baa825c691ff1db,2024-06-17T12:43:31.090000 -CVE-2024-30800,0,1,0821d6c5762542cf57058639b308e934860f4fe6fa29f94737b84029e48a9be3,2024-07-03T01:54:13.930000 +CVE-2024-30800,0,0,0821d6c5762542cf57058639b308e934860f4fe6fa29f94737b84029e48a9be3,2024-07-03T01:54:13.930000 CVE-2024-30801,0,0,59870152c8da15c65471b6c718cd867071125370ab29779fbd2a95a500515742,2024-05-14T16:13:02.773000 CVE-2024-30802,0,0,07a5f60026e39f7ac976e8364b15ee9d61c61f85b2e7ce06003ce4055b46ceb0,2024-05-14T16:13:02.773000 CVE-2024-30804,0,0,cc06a8e47fa63f418e439b59501ce1981d6b96e17fc4ed9991805cce053dddde,2024-04-29T12:42:03.667000 @@ -249501,7 +249501,7 @@ CVE-2024-30859,0,0,07863108200ea1214b143e037da0e726261ba3163514cc96b0c60d438d348 CVE-2024-3086,0,0,7e95cb4550fb1056dd0936024de18ec97380d1b1d2b431d1df6e7775642d2bd3,2024-05-17T02:39:42.693000 CVE-2024-30860,0,0,57c961935ca96f0d726c7792aada157040af2dca04eb4ceddb1a736e40c8a9bb,2024-04-02T12:50:42.233000 CVE-2024-30861,0,0,9f1fa8933ed2f68c5874a5300f5a3d37c1147e684241a006ca810c40cfb6858d,2024-04-02T12:50:42.233000 -CVE-2024-30862,0,1,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000 +CVE-2024-30862,0,0,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000 CVE-2024-30863,0,0,c8281ac28ed8a1a8d0b0d168e520b7f79c9e8ac5bb6e881c50a7ffa33faaedb9,2024-04-02T12:50:42.233000 CVE-2024-30864,0,0,7a490e12a6b59a146a093cae8b327acb94765f9bf349309a6726e4bfec7957f8,2024-04-01T15:53:18.060000 CVE-2024-30865,0,0,8d6be82e703e126fe494ca4f04954576ddfdaff6e7a189019ccd9c304483bfc3,2024-04-01T15:53:18.060000 @@ -249522,81 +249522,81 @@ CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c2945 CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000 CVE-2024-30889,0,0,7a4509f1616bbdfd664f70717e2f2fde35cf219fb77a745eb861f104ffdffdfc,2024-06-06T19:09:09.840000 CVE-2024-3089,0,0,6d83a2e641781112a9b8cec51b7105b249659c2946e3299214b4477888519781,2024-06-10T19:15:54.210000 -CVE-2024-30890,0,1,70cd6656f6551d3fbf1d211e5aa4de5732e110f0e7820ed44ca9141eadf4b5b1,2024-07-03T01:54:15.373000 +CVE-2024-30890,0,0,70cd6656f6551d3fbf1d211e5aa4de5732e110f0e7820ed44ca9141eadf4b5b1,2024-07-03T01:54:15.373000 CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000 CVE-2024-3090,0,0,edb617b18b2f4521fb7eae141660187181b2d32e39e048a00e6fae489e6d207a,2024-05-17T02:39:43.047000 CVE-2024-3091,0,0,85c676f553cd7c37390e9dd1d2626d1b703e97dc8870baec0ee1e157f2c69f5b,2024-05-17T02:39:43.130000 -CVE-2024-30915,0,1,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 +CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 CVE-2024-30916,0,0,a75ac013b4975103273f280feb4d1408231c0d93576fac2bd9f593ea396bd4d3,2024-04-11T12:47:44.137000 CVE-2024-30917,0,0,c44e8b8a426b1382e7b03152893a57378750ba3fe2425d8fdd5fd2662c53461b,2024-04-11T12:47:44.137000 CVE-2024-3092,0,0,cb7f2178928a426a0265657834f9aeb630ccb1ca35a9c66bd22fe30bfcb426f5,2024-04-12T12:43:57.400000 -CVE-2024-30920,0,1,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000 -CVE-2024-30921,0,1,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000 -CVE-2024-30922,0,1,cf163111ed5d85555cabc446f2f9d97fac6c7f0ed747ee1f78406fef4e9bf3e0,2024-07-03T01:54:17.827000 +CVE-2024-30920,0,0,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000 +CVE-2024-30921,0,0,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000 +CVE-2024-30922,0,0,cf163111ed5d85555cabc446f2f9d97fac6c7f0ed747ee1f78406fef4e9bf3e0,2024-07-03T01:54:17.827000 CVE-2024-30923,0,0,2b645588a6409d0059529917c7654e3d2ebc2f2b8324e069c91c32865052a48c,2024-04-19T13:10:25.637000 -CVE-2024-30924,0,1,22bd972b2c3f6dbbb8e41f56a66263757ec7eb8e597484f0e2796a2cac4237a4,2024-07-03T01:54:18.593000 -CVE-2024-30925,0,1,23f6cfde37cb305753d473ae13036a29f5bb7fcda37b8c8f7b5e05d6955a525c,2024-07-03T01:54:19.410000 -CVE-2024-30926,0,1,2e48339c860de6d8b8371963c63d2e47743152d622b217fd2eb9f09dedcce9c7,2024-07-03T01:54:20.187000 -CVE-2024-30927,0,1,d29266bc2b814d55a3b8dffd51faaae87e68901bd3496504dbc5db671534d1b0,2024-07-03T01:54:20.970000 -CVE-2024-30928,0,1,aee0febe63197b3c34ffc21c0b215933e4d30f06f0de72a31dd7df4c48678b26,2024-07-03T01:54:21.770000 -CVE-2024-30929,0,1,7150ed17033c783d22cb10cc7e29801b4cdbd11e710f0261447b2fe790494266,2024-07-03T01:54:22.560000 +CVE-2024-30924,0,0,22bd972b2c3f6dbbb8e41f56a66263757ec7eb8e597484f0e2796a2cac4237a4,2024-07-03T01:54:18.593000 +CVE-2024-30925,0,0,23f6cfde37cb305753d473ae13036a29f5bb7fcda37b8c8f7b5e05d6955a525c,2024-07-03T01:54:19.410000 +CVE-2024-30926,0,0,2e48339c860de6d8b8371963c63d2e47743152d622b217fd2eb9f09dedcce9c7,2024-07-03T01:54:20.187000 +CVE-2024-30927,0,0,d29266bc2b814d55a3b8dffd51faaae87e68901bd3496504dbc5db671534d1b0,2024-07-03T01:54:20.970000 +CVE-2024-30928,0,0,aee0febe63197b3c34ffc21c0b215933e4d30f06f0de72a31dd7df4c48678b26,2024-07-03T01:54:21.770000 +CVE-2024-30929,0,0,7150ed17033c783d22cb10cc7e29801b4cdbd11e710f0261447b2fe790494266,2024-07-03T01:54:22.560000 CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000 -CVE-2024-30931,0,1,1c68d82180e73b8514f26d33f19b69f95be31480b9f9d1b6b39915134b180669,2024-07-03T01:54:23.343000 -CVE-2024-30938,0,1,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd6d1,2024-07-03T01:54:24.137000 +CVE-2024-30931,0,0,1c68d82180e73b8514f26d33f19b69f95be31480b9f9d1b6b39915134b180669,2024-07-03T01:54:23.343000 +CVE-2024-30938,0,0,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd6d1,2024-07-03T01:54:24.137000 CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000 CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000 -CVE-2024-30946,0,1,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000 +CVE-2024-30946,0,0,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000 CVE-2024-3095,0,0,61d55fb0c9c8809327d85ad5dd4ab89ba9cf11921e765f0ffa52b8d4497f2fdb,2024-06-07T14:56:05.647000 -CVE-2024-30950,0,1,19fcf7a45168a789955b2198c0713f1a1ef707cd5bb1de038ced1b6154c32fe1,2024-07-03T01:54:25.763000 -CVE-2024-30951,0,1,9b092a5976ea47ae9ce6ac6665423991363b55ee54764d7a78a3d2ce95cbd3aa,2024-07-03T01:54:26.557000 +CVE-2024-30950,0,0,19fcf7a45168a789955b2198c0713f1a1ef707cd5bb1de038ced1b6154c32fe1,2024-07-03T01:54:25.763000 +CVE-2024-30951,0,0,9b092a5976ea47ae9ce6ac6665423991363b55ee54764d7a78a3d2ce95cbd3aa,2024-07-03T01:54:26.557000 CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61adacf,2024-04-17T15:31:50.160000 -CVE-2024-30953,0,1,6d921cd6fd90184e6ad5174bce664f22cb22e40d44f91e20fb09119d4bedb769,2024-07-03T01:54:27.430000 +CVE-2024-30953,0,0,6d921cd6fd90184e6ad5174bce664f22cb22e40d44f91e20fb09119d4bedb769,2024-07-03T01:54:27.430000 CVE-2024-3096,0,0,2be97d2fe97bbec19dc7276ea118f346f6501adfaa0ea823b2a503e30bbc7476,2024-06-10T18:15:36.050000 CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000 CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000 CVE-2024-30973,0,0,60d233d75a25952277335789c679aa444f3525d6e5b6af0f3b5901b26ae4a555,2024-05-07T13:39:32.710000 -CVE-2024-30974,0,1,58d798e5f49d558922aa7ff1fef01b969ff326cf30be128717719a7efa0d452a,2024-07-03T01:54:28.233000 +CVE-2024-30974,0,0,58d798e5f49d558922aa7ff1fef01b969ff326cf30be128717719a7efa0d452a,2024-07-03T01:54:28.233000 CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000 CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000 CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000 CVE-2024-30980,0,0,833b78703b167eadbc4b1a9a9075d8c2e0d7bf80c01c5e66d90e566b497b9b17,2024-04-17T20:08:21.887000 -CVE-2024-30981,0,1,81ff6a46243c7a5c52b0937ea3bee82cb4611dbc80eba5e29f640cdeee5e81ee,2024-07-03T01:54:29.020000 -CVE-2024-30982,0,1,abb92dcf5227f0de2235f83151bb4c17ac247815f1c0f47d65a9b4e12810b860,2024-07-03T01:54:29.753000 -CVE-2024-30983,0,1,2cbc024ca963a2060abcda8a643819af2c23ea3b93fff72c45a96443fcc25e13,2024-07-03T01:54:30.537000 -CVE-2024-30985,0,1,b25f3bf5c3a4d3f24a10ceee3cda1fdaa58cf215787fb052566fa8895d17f665,2024-07-03T01:54:31.323000 +CVE-2024-30981,0,0,81ff6a46243c7a5c52b0937ea3bee82cb4611dbc80eba5e29f640cdeee5e81ee,2024-07-03T01:54:29.020000 +CVE-2024-30982,0,0,abb92dcf5227f0de2235f83151bb4c17ac247815f1c0f47d65a9b4e12810b860,2024-07-03T01:54:29.753000 +CVE-2024-30983,0,0,2cbc024ca963a2060abcda8a643819af2c23ea3b93fff72c45a96443fcc25e13,2024-07-03T01:54:30.537000 +CVE-2024-30985,0,0,b25f3bf5c3a4d3f24a10ceee3cda1fdaa58cf215787fb052566fa8895d17f665,2024-07-03T01:54:31.323000 CVE-2024-30986,0,0,69160755613857276587b8b1f60e6694734dd914ee3a7792655db531f176eec6,2024-04-17T20:08:21.887000 CVE-2024-30987,0,0,468cef77884a1b0247108985323c0f3c5634ef332631a4474a5705346708e7f7,2024-04-17T20:08:21.887000 CVE-2024-30988,0,0,0c1fba373369486acbe7abf7a68090de377b02d5f1663773aa31862718661b2e,2024-04-17T20:08:21.887000 -CVE-2024-30989,0,1,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa9369b,2024-07-03T01:54:32.110000 +CVE-2024-30989,0,0,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa9369b,2024-07-03T01:54:32.110000 CVE-2024-3099,0,0,e7f0b923e112854028361ac6f6b5d6713757ab017ebdab6dfd1cd863c07fe47d,2024-06-07T14:56:05.647000 -CVE-2024-30990,0,1,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 +CVE-2024-30990,0,0,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000 CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000 CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000 CVE-2024-31004,0,0,f755b2d1295cbba2fb235b141572098c75292e03492bd90218100dd91b46b2be,2024-04-02T12:50:42.233000 -CVE-2024-31005,0,1,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 +CVE-2024-31005,0,0,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 CVE-2024-31008,0,0,fb58f95d5ac3e573901428dcb6b3f88285442daec81b849ad7032a6828042476,2024-04-03T12:38:04.840000 CVE-2024-31009,0,0,4ba716bb3226f0c34bd04f51a3a22402f08a7c166518bbe25119daff68e02eff,2024-04-03T12:38:04.840000 CVE-2024-3101,0,0,9b3c2c160f2d1bfe69e819647e861314a4fc12690030afc8b742d8e1b3ba69e0,2024-04-10T19:49:51.183000 CVE-2024-31010,0,0,22d3a5a8802df0899a91f29c1da59c9756b041e238b139f6c5446937f944e965,2024-04-03T12:38:04.840000 CVE-2024-31011,0,0,e280dc2325f8c749d256893287e9934a0b438d76a624897891275e16b92e2305,2024-04-03T12:38:04.840000 -CVE-2024-31012,0,1,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 +CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 CVE-2024-31013,0,0,137ba39b03bbaab20823954557195167ac08df3fa32a6782dd4080f1d723f338,2024-04-03T12:38:04.840000 CVE-2024-3102,0,0,a4611cb42951d405d0279fa5f0d1a6d6a718442772eea2fe1d9a5cfbe9ea1709,2024-06-07T14:56:05.647000 CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69336,2024-04-08T18:48:40.217000 CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000 CVE-2024-31030,0,0,5f9414f16a2bb6bb5dbcce971bc03bb500c389d94e49dc4548aeface7891f345,2024-05-31T19:14:47.793000 -CVE-2024-31031,0,1,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 +CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,2f308f228deb76e92177e5f96ebfbe834c95bdfff6cc9b10092e4afc0a7c1465,2024-04-24T03:15:05.933000 CVE-2024-31033,0,0,c7a6cbfb5d238335f35ef47bba4fa3a92246db284515ca8db031f344b12dfa7a,2024-05-17T02:38:58.313000 -CVE-2024-31036,0,1,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 +CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 CVE-2024-3104,0,0,927f515490606efe20907a2973fd062d79840e7c07fa0e36064aa10b549f022c,2024-06-07T14:56:05.647000 -CVE-2024-31040,0,1,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 +CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000 CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000 CVE-2024-3105,0,0,612909808e4133409e05068d0e1793c30e1c99e892435c60f7fd3ebc5a102cdc,2024-06-17T12:42:04.623000 CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000 -CVE-2024-31062,0,1,b5a9a4cbd113d85932da23971f519edde410a6db59033e4ad09ce76acba6508c,2024-07-03T01:54:38.023000 +CVE-2024-31062,0,0,b5a9a4cbd113d85932da23971f519edde410a6db59033e4ad09ce76acba6508c,2024-07-03T01:54:38.023000 CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000 CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaafc6,2024-03-28T20:53:20.813000 CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000 @@ -249786,7 +249786,7 @@ CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db55581 CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000 CVE-2024-3133,0,0,a7a7a4865524243743a9c88c08b8282b249ad835f6a96871747e7128048107a2,2024-06-07T19:15:24.213000 CVE-2024-3134,0,0,e04064345e517c38325e3c54708d3b5c2565ae5cbcc3f4d3393427e4c611d4fe,2024-05-17T18:36:05.263000 -CVE-2024-31340,0,1,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 +CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31341,0,0,d4166215cbddfa0324e008e571dea19e89ceb3a6d8e359be3d6c61b47b5bedf9,2024-05-17T18:36:05.263000 CVE-2024-31342,0,0,3dcf837177f2ee22dd479f7dc441eb8e323a27e9d61f77326ada203aab00e68b,2024-04-10T19:49:51.183000 CVE-2024-31343,0,0,07130367d283f095e3c4a097fcb374b7f0ee04a0481c3dc18f14571141420df5,2024-04-10T19:49:51.183000 @@ -249848,21 +249848,21 @@ CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63 CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500d88,2024-05-22T12:46:53.887000 CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000 CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000 -CVE-2024-31397,0,1,84e5539fe288f7e4c3b9dc6907e828a79fd1c0ce0682e8ac0d31f1740d4dafd1,2024-07-03T01:54:48.070000 +CVE-2024-31397,0,0,84e5539fe288f7e4c3b9dc6907e828a79fd1c0ce0682e8ac0d31f1740d4dafd1,2024-07-03T01:54:48.070000 CVE-2024-31398,0,0,b8b54a1faa7cdf95a00879a93ee0d8d8e97c6c1dd542b97c6389c4dd830a0fd0,2024-06-11T13:54:12.057000 CVE-2024-31399,0,0,2ed6b5d423879b812e36af732a627532445c8478dff877395b5408da9b5c4177,2024-06-11T13:54:12.057000 CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000 CVE-2024-31400,0,0,a20931d18dad71e74aadf60fa929b53b125c74900663be5a553ffa1d7a3f0c4e,2024-06-11T13:54:12.057000 -CVE-2024-31401,0,1,b1f392d5797fcb52bdd41fd8d97bc9543b30afce53bb15f494cac005207df95c,2024-07-03T01:54:49.037000 +CVE-2024-31401,0,0,b1f392d5797fcb52bdd41fd8d97bc9543b30afce53bb15f494cac005207df95c,2024-07-03T01:54:49.037000 CVE-2024-31402,0,0,15c2c63d18fd59b2bc62b5b289f6f1bfb7ed1e8bf0268fa2dc26f85aee60cfce,2024-06-11T13:54:12.057000 -CVE-2024-31403,0,1,0224148112c12b7ed3a671555d8cb853847c387c0a01fd25254394bf7f9de8b8,2024-07-03T01:54:49.817000 +CVE-2024-31403,0,0,0224148112c12b7ed3a671555d8cb853847c387c0a01fd25254394bf7f9de8b8,2024-07-03T01:54:49.817000 CVE-2024-31404,0,0,4bba1ccfe7dcf77b15da6db9def5060dd2e699b70ed8f7304a7c07ee5eeb14e4,2024-06-11T13:54:12.057000 CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000 CVE-2024-31409,0,0,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,dfabbf3d0507d341626b2bd4d6e1dada0feb9b8a54e2d19fc7727779054508ab,2024-05-17T02:39:44.593000 CVE-2024-31410,0,0,d8bf6820d8f5d6884591de8f3ef108bfc6b4975173a66f374f2676ccab21cc0b,2024-05-16T13:03:05.353000 CVE-2024-31412,0,0,bf5e4b7125888123ed114d5a41d3a9e2f2c13a81227e8af339e531675aae10d6,2024-05-01T19:50:25.633000 -CVE-2024-31413,0,1,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000 +CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000 CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a6d2,2024-04-03T17:24:18.150000 CVE-2024-3142,0,0,d72c9fc602405d276968d5eddee02def25c25f0696a122ca36beea9d48f99460,2024-05-17T02:39:44.690000 CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000 @@ -249907,25 +249907,25 @@ CVE-2024-31462,0,0,44e6531ceee59d107dbeeee07eb1fd8b488337c84dd99ea88e90d29f01df5 CVE-2024-31463,0,0,8268c987022371c22051c347672dbe62f7118dc9b6e5bdcfe2021c96688127a7,2024-04-17T16:51:07.347000 CVE-2024-31464,0,0,0e334e051a2f53edc57cbce800fcc17540fa9d746f3833bb6b1e894dc6dae023,2024-04-10T19:49:51.183000 CVE-2024-31465,0,0,f70429209ce72ff11ec51f35cb5d31673af53b3d766d75c0657593eff6ab185e,2024-04-11T12:47:44.137000 -CVE-2024-31466,0,1,c7231c8c97f212df84a2794b95dae43c7f9a903f4e6427747b4c715d2041e517,2024-07-03T01:54:52.503000 -CVE-2024-31467,0,1,10552dfb42cae2bbdcd31dc134265bd269d0213f334bd2ecd852194c6ce3e571,2024-07-03T01:54:53.180000 -CVE-2024-31468,0,1,33807c28bc890187acbb078b48db5e83344c9b592a92ca428d128cf3901da24f,2024-07-03T01:54:53.860000 -CVE-2024-31469,0,1,bdd3a8266b9ee40f94a50725adfc6cf00d81439aba107c2d6860cd075dcb1e24,2024-07-03T01:54:54.540000 +CVE-2024-31466,0,0,c7231c8c97f212df84a2794b95dae43c7f9a903f4e6427747b4c715d2041e517,2024-07-03T01:54:52.503000 +CVE-2024-31467,0,0,10552dfb42cae2bbdcd31dc134265bd269d0213f334bd2ecd852194c6ce3e571,2024-07-03T01:54:53.180000 +CVE-2024-31468,0,0,33807c28bc890187acbb078b48db5e83344c9b592a92ca428d128cf3901da24f,2024-07-03T01:54:53.860000 +CVE-2024-31469,0,0,bdd3a8266b9ee40f94a50725adfc6cf00d81439aba107c2d6860cd075dcb1e24,2024-07-03T01:54:54.540000 CVE-2024-3147,0,0,982efe5a2ce749cb576b655f53babb3b7f472deec76a1b3247afa76b7717197b,2024-05-17T02:39:45.117000 -CVE-2024-31470,0,1,02b6a95cd27617dd1c5b90183d9f46421996304e066c4af5b6997f2fd6201733,2024-07-03T01:54:55.227000 -CVE-2024-31471,0,1,2124415413c081701479ac118b3c909ea594a0fef9d48b8e709b5a8b0068d358,2024-07-03T01:54:55.993000 -CVE-2024-31472,0,1,c77970375af326eeb122633156ced146f5b19e31d0a2828cdf087cefbb2f97f6,2024-07-03T01:54:56.687000 +CVE-2024-31470,0,0,02b6a95cd27617dd1c5b90183d9f46421996304e066c4af5b6997f2fd6201733,2024-07-03T01:54:55.227000 +CVE-2024-31471,0,0,2124415413c081701479ac118b3c909ea594a0fef9d48b8e709b5a8b0068d358,2024-07-03T01:54:55.993000 +CVE-2024-31472,0,0,c77970375af326eeb122633156ced146f5b19e31d0a2828cdf087cefbb2f97f6,2024-07-03T01:54:56.687000 CVE-2024-31473,0,0,6521d73e4c07a86b8cca8abacf384dc09529090051683bba616839a511b7ba68,2024-05-15T16:40:19.330000 -CVE-2024-31474,0,1,3fe22b3f2f50b12ead08780c5d7337eb52fe05045f4f5d121a0714cdadfd4dcf,2024-07-03T01:54:57.453000 -CVE-2024-31475,0,1,267eb1feac853a5c9bd5774c8dc369584aafc47d42fd6edd43d1f3b01f6170ea,2024-07-03T01:54:58.147000 -CVE-2024-31476,0,1,f121e0ec81823098658d02f7da8a5a67532a2344eb6458de9d88fc9f3bce7586,2024-07-03T01:54:58.830000 -CVE-2024-31477,0,1,1b26a6a1c922791bcbc4b97a56fb7473f945db3da3dc86feefc0ff2800c48a73,2024-07-03T01:54:59.510000 -CVE-2024-31478,0,1,ff2a1c3880865d092b5866d6610dc28d1a85b6f088f681f6081a1ed8b8c02b0b,2024-07-03T01:55:00.270000 -CVE-2024-31479,0,1,f120665250ae6081be4111da0d7b4a341d2045c00d0ade7762db07e9aed38c28,2024-07-03T01:55:01.120000 +CVE-2024-31474,0,0,3fe22b3f2f50b12ead08780c5d7337eb52fe05045f4f5d121a0714cdadfd4dcf,2024-07-03T01:54:57.453000 +CVE-2024-31475,0,0,267eb1feac853a5c9bd5774c8dc369584aafc47d42fd6edd43d1f3b01f6170ea,2024-07-03T01:54:58.147000 +CVE-2024-31476,0,0,f121e0ec81823098658d02f7da8a5a67532a2344eb6458de9d88fc9f3bce7586,2024-07-03T01:54:58.830000 +CVE-2024-31477,0,0,1b26a6a1c922791bcbc4b97a56fb7473f945db3da3dc86feefc0ff2800c48a73,2024-07-03T01:54:59.510000 +CVE-2024-31478,0,0,ff2a1c3880865d092b5866d6610dc28d1a85b6f088f681f6081a1ed8b8c02b0b,2024-07-03T01:55:00.270000 +CVE-2024-31479,0,0,f120665250ae6081be4111da0d7b4a341d2045c00d0ade7762db07e9aed38c28,2024-07-03T01:55:01.120000 CVE-2024-3148,0,0,286c1c0aa7b0d3b23b2257e5942a5c00f894f195194c7893dcc31dadf941b51e,2024-05-17T02:39:45.207000 -CVE-2024-31480,0,1,86a08888be6144dad7f109bcbc1e02bef137f5ec61892a589a8c1d32bdd1d4ec,2024-07-03T01:55:01.950000 -CVE-2024-31481,0,1,3cfd49abb9f667805e469e5ad5364d7cc935c3e4cd673de3efb106e0bfc78efb,2024-07-03T01:55:02.813000 -CVE-2024-31482,0,1,89e6919adebfceffee7b9ef72fc557a7257e2359e0de4d03c9ea7df82ed31700,2024-07-03T01:55:03.583000 +CVE-2024-31480,0,0,86a08888be6144dad7f109bcbc1e02bef137f5ec61892a589a8c1d32bdd1d4ec,2024-07-03T01:55:01.950000 +CVE-2024-31481,0,0,3cfd49abb9f667805e469e5ad5364d7cc935c3e4cd673de3efb106e0bfc78efb,2024-07-03T01:55:02.813000 +CVE-2024-31482,0,0,89e6919adebfceffee7b9ef72fc557a7257e2359e0de4d03c9ea7df82ed31700,2024-07-03T01:55:03.583000 CVE-2024-31483,0,0,bde678327370835d1aa36e347db01998d4ec66a2275c4946d48e0c638b6c74ca,2024-05-15T16:40:19.330000 CVE-2024-31484,0,0,87a3d1a614fb5575405ec60575059fa9c3009ab46d28f7442572559a35369246,2024-06-11T12:15:14.993000 CVE-2024-31485,0,0,fa5c6a497932049eb7a3605c5189f3094078d3328420a189e1b093ae5914e258,2024-06-11T12:15:15.123000 @@ -249940,36 +249940,36 @@ CVE-2024-31495,0,0,42fff448b4240874d456e917ec48e364b4b70752d9d1a1fb76f06c9d7e15c CVE-2024-31497,0,0,c39b897f04ef688f063ebceae74c1e66c102d61b4026ee0939893e9ccb564409,2024-06-20T19:15:49.960000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000 -CVE-2024-31502,0,1,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 +CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-3151,0,0,9347bf7ac28e84ca877a361b1eac7ef280766a4b0b29aa18ee59e0ed7a4dbbe2,2024-05-17T02:39:45.290000 -CVE-2024-31510,0,1,2ab08923e55b765ff03b9ec06ce50479208e1bb469f6adf849509f8193855a50,2024-07-03T01:55:05.800000 +CVE-2024-31510,0,0,2ab08923e55b765ff03b9ec06ce50479208e1bb469f6adf849509f8193855a50,2024-07-03T01:55:05.800000 CVE-2024-3152,0,0,c35837c0aa31c949cf43dc6f979549eef143fbb0ccdbd0806b1482fca09a5466,2024-06-07T14:56:05.647000 CVE-2024-3153,0,0,71f9925c0b9c95802717e9ea3df72b541910d5a49c38656ce24e7b7ced61efb4,2024-06-07T14:56:05.647000 CVE-2024-3154,0,0,41e99f572a77ebdee6e8e47ee9e18a446acb6753ba44d660260064ab4ee43c62,2024-06-05T17:15:13.777000 -CVE-2024-31544,0,1,2535e66e98db21a02bea52017d819e1d7e0893ffb53b2843edb9987a766eaf9f,2024-07-03T01:55:06.580000 -CVE-2024-31545,0,1,990dd1804a5ee198d0f0887e154e925827e322f01f4e785463356ec825b7f751,2024-07-03T01:55:07.333000 -CVE-2024-31546,0,1,8e9514693e08d741612c9e2a09da9e87fa9f3e20f214aad0d330555f52918683,2024-07-03T01:55:08.090000 -CVE-2024-31547,0,1,22bd63034759209e253c932abeed783b0fd6c0ca9cadb92359cea5df0d575dd3,2024-07-03T01:55:08.870000 +CVE-2024-31544,0,0,2535e66e98db21a02bea52017d819e1d7e0893ffb53b2843edb9987a766eaf9f,2024-07-03T01:55:06.580000 +CVE-2024-31545,0,0,990dd1804a5ee198d0f0887e154e925827e322f01f4e785463356ec825b7f751,2024-07-03T01:55:07.333000 +CVE-2024-31546,0,0,8e9514693e08d741612c9e2a09da9e87fa9f3e20f214aad0d330555f52918683,2024-07-03T01:55:08.090000 +CVE-2024-31547,0,0,22bd63034759209e253c932abeed783b0fd6c0ca9cadb92359cea5df0d575dd3,2024-07-03T01:55:08.870000 CVE-2024-3155,0,0,eee76fab35fcf29316db15cf35547dea4ad865a27e411f42f7bd3ef46e800d06,2024-05-21T12:37:59.687000 CVE-2024-31551,0,0,1e496baf26fc7c379802e32efa65ebe29e89fcd33af39e4b33cab5b68ae631aa,2024-04-29T12:42:03.667000 -CVE-2024-31552,0,1,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db760,2024-07-03T01:55:09.627000 -CVE-2024-31556,0,1,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000 +CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db760,2024-07-03T01:55:09.627000 +CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000 CVE-2024-3156,0,0,f01ef771ed03a9288d0ee4324d1f6cf3e47c9af6d908a880824436519abea0a6,2024-04-26T16:00:34.653000 -CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000 +CVE-2024-3157,0,1,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000 CVE-2024-31574,0,0,d30d4d3620d807387396f69d492fff0388d23e7451887ca3e1dd10677ba3ffb1,2024-04-25T17:24:59.967000 CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000 -CVE-2024-31578,0,1,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 +CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 CVE-2024-3158,0,0,b6f3eae96db1aebf257009a6259047e5a021bd7f3ae01837a0c02ae4fb2d3f7e,2024-04-26T16:00:15.540000 -CVE-2024-31580,0,1,9892d534a6b740bd9f70a36f106331aeef11930b2acb708df4b7495ede87ec8f,2024-07-03T01:55:11.977000 +CVE-2024-31580,0,0,9892d534a6b740bd9f70a36f106331aeef11930b2acb708df4b7495ede87ec8f,2024-07-03T01:55:11.977000 CVE-2024-31581,0,0,0c13f552121d688c3bb11054a57da386d38b00579e2878a1121af5194a445a83,2024-06-10T18:15:31.323000 CVE-2024-31582,0,0,f99ff40027327bd3fbea4712d1d784593e1373bb4d685bc6d34f744e7fbd3541,2024-06-10T18:15:31.387000 -CVE-2024-31583,0,1,5718d662ef0fc7a2030b838f396484569e04f36192be74d5dc7dbf12e0d69994,2024-07-03T01:55:12.663000 -CVE-2024-31584,0,1,b7635e33f3da4b67c08efe7ab25558c0ee24a2c8974cfc1133472b04b1184049,2024-07-03T01:55:13.417000 +CVE-2024-31583,0,0,5718d662ef0fc7a2030b838f396484569e04f36192be74d5dc7dbf12e0d69994,2024-07-03T01:55:12.663000 +CVE-2024-31584,0,0,b7635e33f3da4b67c08efe7ab25558c0ee24a2c8974cfc1133472b04b1184049,2024-07-03T01:55:13.417000 CVE-2024-31585,0,0,f39db829a58f7d59fd71840ee1d6249e8f60080525ab50f13dc25f4d37c76aac,2024-06-10T18:15:31.457000 -CVE-2024-31586,0,1,cc046b8727829f9f83874539c422d0e794e65c7e2b07e31c08215bcda9684cd0,2024-07-03T01:55:14.213000 +CVE-2024-31586,0,0,cc046b8727829f9f83874539c422d0e794e65c7e2b07e31c08215bcda9684cd0,2024-07-03T01:55:14.213000 CVE-2024-31587,0,0,2fc9a5d835e653be56e59eb894e67a7be08149fb53fde5c6e30e07cc9d34087a,2024-04-19T16:19:49.043000 CVE-2024-3159,0,0,90c5caca0cc5537160e74a2b26ddbcf22bba005cb0a42d8727caf893986c2f2f,2024-04-26T15:59:59.020000 CVE-2024-3160,0,0,fced239d04f545c08f1bd1561fcd0c39fc8f6eac24b548e53a624880004990a4,2024-05-17T02:39:45.510000 @@ -249980,8 +249980,8 @@ CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654a CVE-2024-31611,0,0,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000 CVE-2024-31612,0,0,113b62286ae368abe151f1276422ede5a17bbddf3e1084cf1b1f49c898ddb8c7,2024-06-12T18:10:30.587000 CVE-2024-31613,0,0,5ce067676435ff3d2e2e64f4a4df55c3ae784b167955254c2c482ea479d5a0e0,2024-06-10T18:06:22.600000 -CVE-2024-31615,0,1,d368b7afcddf8004edd5887f0583685e84be26fc0d3934bf749ef04013bb7fc3,2024-07-03T01:55:14.960000 -CVE-2024-31616,0,1,1084c6c3d6d8aa5c511ab3dfa4028831dd239a202d2424f408608d0ae03fc34e,2024-07-03T01:55:15.753000 +CVE-2024-31615,0,0,d368b7afcddf8004edd5887f0583685e84be26fc0d3934bf749ef04013bb7fc3,2024-07-03T01:55:14.960000 +CVE-2024-31616,0,0,1084c6c3d6d8aa5c511ab3dfa4028831dd239a202d2424f408608d0ae03fc34e,2024-07-03T01:55:15.753000 CVE-2024-31617,0,0,c260c6ccac3edc4a27efaf66cf18da63c001dac2ae71b06f8a2f6de4361b01e5,2024-05-22T18:59:20.240000 CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000 CVE-2024-31621,0,0,5859f84ce615fd32361b282eb85819f2850e262c3652d6c11e3c0f262c84e82a,2024-04-30T13:11:16.690000 @@ -249996,12 +249996,12 @@ CVE-2024-31629,0,0,c6deb3500079f97322ae259ccdb4dba2134e4c1cab0e163610c39515f2a1a CVE-2024-31630,0,0,f00d29794733f378a242dcde898b52549294418b098ad7c5b8f47cbc11aeba0d,2024-06-05T17:15:13.040000 CVE-2024-31631,0,0,0472b25eb5f7333616a703b6523cc295b0de589a1374c495f36fb95699859e21,2024-06-05T17:15:13.130000 CVE-2024-31634,0,0,4aa9be86cd809cace2c7d458fd82ce0e6e4c21e7757f642f911286874e9406fe,2024-04-16T13:24:07.103000 -CVE-2024-31636,0,1,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 +CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000 CVE-2024-31648,0,0,f70c933feb3072bcb2ead02f6b1a919b0f866e1a11c84c8f391e2e290925af4f,2024-04-16T13:24:07.103000 CVE-2024-31649,0,0,639a5f64cbdf28db540c8732bf6df9d62d362e264fc5a0592fc2e34beb9bf811,2024-04-16T13:24:07.103000 CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000 -CVE-2024-31650,0,1,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 +CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,449580f383ba06b10b890173ddf2d62af7a188eb69db82466ee9152e4b087212,2024-04-16T13:24:07.103000 CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000 CVE-2024-3166,0,0,c81e3e68f1adddc19d75d351634155c3d0e9e8ee00fc86bb432f2a7f3495b309,2024-06-07T14:56:05.647000 @@ -250013,13 +250013,13 @@ CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c7 CVE-2024-31682,0,0,108e09baf03792f64e1bb3f8dda027c9a854de6459715dd00219980dec3ce6cd,2024-06-04T16:57:41.057000 CVE-2024-31684,0,0,11342a2b4f3ad43cdbcffc10774218cb9d9c89bcfff7744f09b6a9696388c47e,2024-06-03T19:23:17.807000 CVE-2024-31705,0,0,8033fd37659a2da1fb0e7633bf6cd8849a478258d0204dab5311593f3afffaff,2024-04-30T13:11:16.690000 -CVE-2024-31714,0,1,e2cbcd04e6551aaebab596d7137808760f8842fa97ced3f3a7a7709d1ffb887c,2024-07-03T01:55:18.240000 +CVE-2024-31714,0,0,e2cbcd04e6551aaebab596d7137808760f8842fa97ced3f3a7a7709d1ffb887c,2024-07-03T01:55:18.240000 CVE-2024-31741,0,0,7f7fe0680083852848d9489e7bfde2c974dd88476e32f02fc76986c5d4f4ace6,2024-04-29T12:42:03.667000 -CVE-2024-31744,0,1,fb9aa7a38c780f352284188ba5594185fd9278eb672cdcc53bb5f1def8b1306f,2024-07-03T01:55:18.993000 +CVE-2024-31744,0,0,fb9aa7a38c780f352284188ba5594185fd9278eb672cdcc53bb5f1def8b1306f,2024-07-03T01:55:18.993000 CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000 CVE-2024-31747,0,0,49aad92068289c57c88fdfeae3beb34770db6465d2b4facaae5cc88a4dd58ad8,2024-04-30T13:11:16.690000 -CVE-2024-31750,0,1,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff874,2024-07-03T01:55:19.837000 -CVE-2024-31755,0,1,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 +CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff874,2024-07-03T01:55:19.837000 +CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 CVE-2024-31756,0,0,b545fecad40ff4a3f9ae2638f024ca61b80a28fe13b877c281603566ed0b54f0,2024-05-22T12:46:53.887000 CVE-2024-31757,0,0,687398cce2bd1894ed226b76587327674cff37aef21494ede8fd245f77d3a4a6,2024-05-22T12:46:53.887000 CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000 @@ -250032,17 +250032,17 @@ CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000 -CVE-2024-31801,0,1,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000 +CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000 CVE-2024-31802,0,0,3e784b6cdf1a165b3d21f2a1c540d8b026c9de6432feb4efe6875b7608e68ead,2024-06-28T10:27:00.920000 CVE-2024-31803,0,0,92f238036d017e7b84c8654e5a5e6072228cd9b3978fedfbf2bc24ff66d8e581,2024-05-14T16:12:23.490000 -CVE-2024-31804,0,1,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000 +CVE-2024-31804,0,0,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000 CVE-2024-31805,0,0,191a14c2d5ae7968331c5203389f4ad20337fe28197ac48f135f3f3b37941d31,2024-04-08T18:48:40.217000 CVE-2024-31806,0,0,c7316b5610952238bd564a03f742588c16e0f69b26333015edb5aadd6c88d624,2024-04-08T18:48:40.217000 CVE-2024-31807,0,0,db6f4b0b7aadfa01d793851a97ace37faa51b84df184fb574cc5d20f814f346d,2024-04-08T18:48:40.217000 CVE-2024-31808,0,0,e3f1ee6c7e76eb8e90bda1034c5fcfffcffdd99ff96f24189f3d7396a2575051,2024-04-08T18:48:40.217000 CVE-2024-31809,0,0,e05c4bfbbec6345ce72a7f536061ecaa11417312314649425c98c5e882a47f63,2024-04-08T18:48:40.217000 CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000 -CVE-2024-31810,0,1,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000 +CVE-2024-31810,0,0,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000 CVE-2024-31811,0,0,f8de130100e3a9acbca356f090bc88a0d04c0b513ecb2ef2dc10ec36737b68a7,2024-04-08T18:48:40.217000 CVE-2024-31812,0,0,b05af7aae3f0183f9f4818b40eff2f73c3a9ff92a0f722950386fe48e67f87dd,2024-04-08T18:48:40.217000 CVE-2024-31813,0,0,79a1a7c98afb7e38cd483bc8738d983156987401ca20a06a5604d84fd554c04e,2024-04-08T18:48:40.217000 @@ -250050,23 +250050,23 @@ CVE-2024-31814,0,0,e3ca4010fb6a58f61e69bd6376064660d2fdaf6bb387d308db35cab7cd7c1 CVE-2024-31815,0,0,30302ad414ab45baa3ec4e6cb3fe786fcebb8651723a135b55d05ee22523845e,2024-04-08T18:48:40.217000 CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21611,2024-04-08T18:48:40.217000 CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000 -CVE-2024-31818,0,1,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000 +CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000 CVE-2024-31819,0,0,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000 CVE-2024-3182,0,0,2e270f4f3608fb5873bc26989d462e0d8be536fe98df44cf383b56c3de202fb7,2024-05-15T18:35:11.453000 CVE-2024-31820,0,0,53a16faaf48888346903fcbd57d0be6b6e997c7cc9b808188a566b0da0cce561,2024-04-30T13:11:16.690000 -CVE-2024-31821,0,1,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000 +CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000 CVE-2024-31822,0,0,39f03d3ff200c72017a27779b734a3b0a55aa46362d194ac94877ae191a015e0,2024-04-30T13:11:16.690000 -CVE-2024-31823,0,1,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000 -CVE-2024-31828,0,1,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000 +CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000 +CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000 CVE-2024-3183,0,0,f0a6251088cfd845783fa83089c4f66e5c1b4119e3b7eebeacea72fa8d6daced,2024-06-27T03:15:50.447000 CVE-2024-31837,0,0,9051d48b22c0cd39a45116204b9c51e9a92d936bee66589e1aa86bb8c892b824,2024-04-30T13:11:16.690000 CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000 CVE-2024-31840,0,0,c5fc04e6fe2d5125db2057551f9a02458bb6ea8f5da45a1b3c46ba278c1be8c1,2024-05-21T16:53:56.550000 -CVE-2024-31841,0,1,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000 -CVE-2024-31843,0,1,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000 +CVE-2024-31841,0,0,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000 +CVE-2024-31843,0,0,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000 CVE-2024-31844,0,0,faef32bf7f6d5cdf3926b68a0c0321962d1e2a27cd637406a13851a0747b2020,2024-05-21T16:53:56.550000 -CVE-2024-31845,0,1,5285f406c2c833baf2ad893e86a6252f005845d6cf83cc9d823751ca24673f2a,2024-07-03T01:55:28.633000 -CVE-2024-31846,0,1,9b0ce2d57c0813c3992666334f62ea2df99c41dc31797c0b704691d1b1dfe2ee,2024-07-03T01:55:29.393000 +CVE-2024-31845,0,0,5285f406c2c833baf2ad893e86a6252f005845d6cf83cc9d823751ca24673f2a,2024-07-03T01:55:28.633000 +CVE-2024-31846,0,0,9b0ce2d57c0813c3992666334f62ea2df99c41dc31797c0b704691d1b1dfe2ee,2024-07-03T01:55:29.393000 CVE-2024-31847,0,0,bb9854ea58cb5bbaaeb40d8ffe76e3f96dc38366eaedd1096182fbfbddf15aba,2024-05-21T16:53:56.550000 CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000 CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000 @@ -250075,14 +250075,14 @@ CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44 CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000 CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000 CVE-2024-31856,0,0,62a52705b8ee623f45839141fd2c99784658855012cca1de7b4c490712cad657,2024-05-16T13:03:05.353000 -CVE-2024-31857,0,1,b57daea1515042b1254b11fea9a109934d9eaeaf743c5e6b1d4482216f0f52dd,2024-07-03T01:55:30.363000 +CVE-2024-31857,0,0,b57daea1515042b1254b11fea9a109934d9eaeaf743c5e6b1d4482216f0f52dd,2024-07-03T01:55:30.363000 CVE-2024-31859,0,0,2cbcc460dc8e0afa742cff93e4e3623f3eeecc1b5d4af790af6dab821b4c8601,2024-05-28T12:39:42.673000 -CVE-2024-31860,0,1,0c85f33d3dadfb2fd0d5a6f2d0ed9d9d75da9aaa685f77a3492d74d36fbf93e1,2024-07-03T01:55:31.267000 +CVE-2024-31860,0,0,0c85f33d3dadfb2fd0d5a6f2d0ed9d9d75da9aaa685f77a3492d74d36fbf93e1,2024-07-03T01:55:31.267000 CVE-2024-31861,0,0,09f74af28b106a9bcd2fca862ca1484872e5dd069d055b6adc2bc96ecaaa18b8,2024-06-21T10:15:11.757000 CVE-2024-31862,0,0,bdbb4b1091af79e6aaf56d41a4760c428dcc1fb171014df01f6909ccda945916,2024-05-01T19:15:26.803000 CVE-2024-31863,0,0,c6ae1cb99dd6b8b6f74d87fc2d695eb3106e5de1e3c982a38b69c3cb15c02e9b,2024-05-01T18:15:23.507000 CVE-2024-31864,0,0,49aa3a8d1fca6882bee10753cc9be9363016130a8f0d3c0015b7461e645728b1,2024-05-01T18:15:23.563000 -CVE-2024-31865,0,1,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 +CVE-2024-31865,0,0,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 CVE-2024-31866,0,0,273882af8e5be5ea8da6353ac690dc9a0d086b625d54fdea7b1703d5467930fa,2024-05-01T18:15:23.683000 CVE-2024-31867,0,0,e77b94cb0dbba9724dcb4bf10a3c28b5d0820940e8bf0aa9502c6074559fee16,2024-05-01T18:15:23.740000 CVE-2024-31868,0,0,f51ec98640700979c2fbd42ec349064554a4f4e2766ddc3095908e984b1027bd,2024-05-01T18:15:23.793000 @@ -250142,26 +250142,26 @@ CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1 CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000 CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2dcc,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000 -CVE-2024-31948,0,1,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 +CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000 CVE-2024-3195,0,0,787f988864320d109487d10ab48e68d202e20bb992c996c1eb76e50864248bcc,2024-06-04T19:20:17.337000 CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000 CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000 CVE-2024-31952,0,0,5f29e6541e024f9b1bd72bdf8ee8e438dfaedf18a9a002e17369656e46ca5c14,2024-05-14T16:12:23.490000 -CVE-2024-31953,0,1,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 -CVE-2024-31954,0,1,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 +CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 +CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 CVE-2024-31956,0,0,56222bae986fe87c83c759cf706c4f2021e893534f083e7f4ddb4dffa4c53b2c,2024-06-13T18:35:19.777000 CVE-2024-31958,0,0,92a0a8c4e3002c821a3c846306658e74a9964a41bffea58fc59bb9ff3c43087c,2024-06-07T19:24:09.243000 CVE-2024-31959,0,0,881dd9c88eb573b82854e8881ea0e763e3c9111ab6dfe4157e823bc664d8a323,2024-06-07T19:24:09.243000 CVE-2024-3196,0,0,d5a1cb2b9527bda623e9f193c03f796a5c33bdfc24e5ed9d8b0d65fcf6304b33,2024-06-04T19:20:17.433000 -CVE-2024-31961,0,1,8693e8165d9cdba44092b3dc0a2cbcef973a8cdf8c9f695519261f49865d4db3,2024-07-03T01:55:36.730000 -CVE-2024-31963,0,1,ba90c05a8c9e5dbd1f07d8d76d1b3e91d5e43d418493615f1ef67d7be6576eae,2024-07-03T01:55:37.503000 -CVE-2024-31964,0,1,8d3c29fd368a319e520256c3700d613581d90bf641f7cb9d55243462f4fa2849,2024-07-03T01:55:38.253000 -CVE-2024-31965,0,1,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd03802547423d9,2024-07-03T01:55:39.003000 -CVE-2024-31966,0,1,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000 -CVE-2024-31967,0,1,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000 +CVE-2024-31961,0,0,8693e8165d9cdba44092b3dc0a2cbcef973a8cdf8c9f695519261f49865d4db3,2024-07-03T01:55:36.730000 +CVE-2024-31963,0,0,ba90c05a8c9e5dbd1f07d8d76d1b3e91d5e43d418493615f1ef67d7be6576eae,2024-07-03T01:55:37.503000 +CVE-2024-31964,0,0,8d3c29fd368a319e520256c3700d613581d90bf641f7cb9d55243462f4fa2849,2024-07-03T01:55:38.253000 +CVE-2024-31965,0,0,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd03802547423d9,2024-07-03T01:55:39.003000 +CVE-2024-31966,0,0,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000 +CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000 CVE-2024-3197,0,0,f230012f26d9c5ad7a19d59a4fe32cd792e51986fc310e1cb293dde9780bbff6,2024-05-02T18:00:37.360000 -CVE-2024-31974,0,1,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 +CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000 CVE-2024-3198,0,0,23f647a2f0b4c9d8282aac5d503e6a564aa810d1f345d5d2765d544a3ea2c117,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,5493ce321a7028d8f5abef4cb41ba8ec559703b9634518d9a316b2b5b284a44c,2024-05-14T19:18:31.490000 @@ -250201,7 +250201,7 @@ CVE-2024-32021,0,0,7dff6f8d8e1a4d7fc2d76dbbb4d0e044f98278ef9f9c8a6728b7047a40acd CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000 CVE-2024-32023,0,0,adb78947d782fcb7041c1fc7768e7f3d3c9be214fb8ab1e71bb129805ba1aaf5,2024-04-19T16:15:10.607000 CVE-2024-32024,0,0,02bb672a3ecdc1cc89be08499a8d52a34fd79fba894d179733ab551e6c2e5746,2024-04-19T16:15:10.680000 -CVE-2024-32025,0,1,e506e930d891a31eccd6c83ee867f04455d6476651d4b5ef0565357464967d07,2024-07-03T01:55:43.420000 +CVE-2024-32025,0,0,e506e930d891a31eccd6c83ee867f04455d6476651d4b5ef0565357464967d07,2024-07-03T01:55:43.420000 CVE-2024-32026,0,0,9aca731d81c4e3ffbf5853bebae91a7c74d278fe33c28085ed72b4d8de3653b6,2024-04-19T17:15:54.970000 CVE-2024-32027,0,0,5f3c09d170bbd26a1e397a298c9a92805316ba30164f013dc8cd02f515dcdaac,2024-04-19T16:15:10.750000 CVE-2024-32028,0,0,a16d36bcfaa5cccbb6282aecd03e18b80c66f8151e3c2f08a8edd43b521f9227,2024-04-15T13:15:31.997000 @@ -250221,7 +250221,7 @@ CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd18844526774 CVE-2024-32047,0,0,f009d59be96ce9fa193a4aa9724cc4cc41ffb33bc61e4f05b98fbbfa91a9068b,2024-05-16T13:03:05.353000 CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000 CVE-2024-3205,0,0,94de9427276f5133bdfe91db56cbfc9958b517e8a2bb181bf6c470a918feb832,2024-05-27T15:15:08.930000 -CVE-2024-32051,0,1,e28a1e0c21bc5f7358767662bb9a7b790bf9856f0536eacca66c7e2c127c26a1,2024-07-03T01:55:45.237000 +CVE-2024-32051,0,0,e28a1e0c21bc5f7358767662bb9a7b790bf9856f0536eacca66c7e2c127c26a1,2024-07-03T01:55:45.237000 CVE-2024-32053,0,0,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000 CVE-2024-32055,0,0,6f2d1e2b794c469fc60e21d2252e9f5df7bf8f202c22d166d778068242a50bff,2024-05-14T19:17:55.627000 CVE-2024-32057,0,0,5e67bb9c034526d5d833ae3ea893d728ce7f6380ab949c5a702a2155a40471cb,2024-05-14T19:17:55.627000 @@ -250306,115 +250306,115 @@ CVE-2024-32148,0,0,25993b40ac8c6405e3c4aa4697e7a65594872b4932df76faa669e9656c45d CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000 CVE-2024-3215,0,0,87550ed88317242f35b56ee440b2ef3ddf4431fdfdb3fabb22af72583d7166cd,2024-05-02T18:00:37.360000 CVE-2024-3216,0,0,aac88e798ffbdaddd62ae90ecbece12fc58351de061defd8cac2a138eea1c35f,2024-04-08T18:49:25.863000 -CVE-2024-32161,0,1,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000 +CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000 CVE-2024-32162,0,0,118ad76854c7f44c6eff111c13a9015a5b3feb6620bf58d40eff2d6cbdaa766c,2024-04-17T20:08:21.887000 -CVE-2024-32163,0,1,fc2eed4a9bb29bcfa67551b883d7bb89c5c9af4a13eff5016cb1daac622a783d,2024-07-03T01:55:50.383000 +CVE-2024-32163,0,0,fc2eed4a9bb29bcfa67551b883d7bb89c5c9af4a13eff5016cb1daac622a783d,2024-07-03T01:55:50.383000 CVE-2024-32166,0,0,8c8680ec923ae3bed8a58326054c7f7280f0a44a3f507a43055bc183eecf3164,2024-04-19T16:19:49.043000 CVE-2024-32167,0,0,e1b908973391122461e7829a2d79d03ca6868b1699a22ea149cc482b5749c2dc,2024-06-12T18:00:30.120000 CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,15d13fdbdfb7c920bd4937754941efbbf6a0874233b44e802f3c54e2e1e5f44b,2024-05-17T02:39:47.357000 CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000 -CVE-2024-32206,0,1,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 +CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,186c7b7b6520d05d615d6c269bc114b3723d88b6ff31567b059a051c2d5cb959,2024-05-17T02:39:47.450000 CVE-2024-32210,0,0,d0758956dc52f4cf5602024642ff76bb2b5c583ff5b1e63bc6f84dc013fd06f2,2024-05-01T19:50:25.633000 -CVE-2024-32211,0,1,84e4b5826602163d039517450331f03278990516e0626af786de559d752b5412,2024-07-03T01:55:51.973000 -CVE-2024-32212,0,1,f6aba6b5a0388dc6cc8b07b61804546c09da8a05399de65b74351bf95fbbbb88,2024-07-03T01:55:52.740000 -CVE-2024-32213,0,1,41eb62ef3b9a2dab94a557aba3b39a317eb9e5981c9ad6e215d6c756107a42bd,2024-07-03T01:55:53.503000 +CVE-2024-32211,0,0,84e4b5826602163d039517450331f03278990516e0626af786de559d752b5412,2024-07-03T01:55:51.973000 +CVE-2024-32212,0,0,f6aba6b5a0388dc6cc8b07b61804546c09da8a05399de65b74351bf95fbbbb88,2024-07-03T01:55:52.740000 +CVE-2024-32213,0,0,41eb62ef3b9a2dab94a557aba3b39a317eb9e5981c9ad6e215d6c756107a42bd,2024-07-03T01:55:53.503000 CVE-2024-3222,0,0,799b361ab23aa76993ebff58db38db1a2ff6bbfd18c67fd1f278e8a3ffabcc98,2024-05-17T02:39:47.540000 -CVE-2024-32228,0,1,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000 +CVE-2024-32228,0,0,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000 CVE-2024-32229,0,0,00a4557f8564c10576c097d87b562b837eaa839b191212b0107c34b3bddfdec9,2024-07-02T12:09:16.907000 CVE-2024-3223,0,0,6cc36c470525be0fd4b2414cec5a9a6177e43b11e75a26205c33328451f02d8a,2024-05-17T02:39:47.627000 CVE-2024-32230,0,0,bba137e1373cb1ea88f9e5c5bc97b3dfc8dcee41432f2e75a6da02a5c1a71891,2024-07-02T12:09:16.907000 -CVE-2024-32236,0,1,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000 -CVE-2024-32238,0,1,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000 +CVE-2024-32236,0,0,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000 +CVE-2024-32238,0,0,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000 CVE-2024-3224,0,0,ac6a81131bf4dda9a1fb919110891b8e3432d607290ab1109b186afa8000defb,2024-05-17T02:39:47.717000 CVE-2024-3225,0,0,2d6dcbf0bdbb464101f6b69c967426dbd521147e41ea300dcba51b2b7dce767b,2024-05-17T02:39:47.810000 CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000 CVE-2024-32256,0,0,a5d1df3249255701878f4ca3cc2c96f2401df41f8b31a37dac5eb50e5dc9f740,2024-04-17T12:48:31.863000 -CVE-2024-32258,0,1,5dae54230a1765016eb565e9e25d82cfb7f4d23860857f1e9a3317d31d41442b,2024-07-03T01:55:56.647000 +CVE-2024-32258,0,0,5dae54230a1765016eb565e9e25d82cfb7f4d23860857f1e9a3317d31d41442b,2024-07-03T01:55:56.647000 CVE-2024-3226,0,0,22538a15ec2928b97d8af0c0dccde27c92434562358d7198046e84039fa826a9,2024-05-17T02:39:47.900000 CVE-2024-32268,0,0,ea660c910e15f3606747fa7586b7f7f075c28fded5db811b5df434089e7b4ab1,2024-04-30T13:11:16.690000 CVE-2024-32269,0,0,0142f3c45d36ad639eeafc5315f1fa2973454aa07cda0ce0b715e55142f5d44d,2024-04-30T13:11:16.690000 CVE-2024-3227,0,0,b7888e40c309eec617406e2a5679f992e8abeb4b92975527ef40097ea2d1b52b,2024-05-17T02:39:47.993000 -CVE-2024-32281,0,1,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0f46,2024-07-03T01:55:57.420000 +CVE-2024-32281,0,0,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0f46,2024-07-03T01:55:57.420000 CVE-2024-32282,0,0,e5357aafcfe3da38abc16b53a2fe91b224de61a5ed23923f7ac518d25d82dbfb,2024-04-17T15:31:50.160000 -CVE-2024-32283,0,1,c72ca6989168ee21133166c85a18b30a403543bd2802d4602b360f26e8ac9c38,2024-07-03T01:55:58.170000 +CVE-2024-32283,0,0,c72ca6989168ee21133166c85a18b30a403543bd2802d4602b360f26e8ac9c38,2024-07-03T01:55:58.170000 CVE-2024-32285,0,0,9529431b83da151fb9b96ef61a6f52d78979021395b253d357cca57331ad87ff,2024-04-17T15:31:50.160000 -CVE-2024-32286,0,1,1db83aa9b55edb8231744756cf042cd8c4416ff23dccabd1d06f4f496f58980c,2024-07-03T01:55:58.927000 -CVE-2024-32287,0,1,932347149029d6eabd46a68bc6a82fe6d2945f3ac8f01e10c1833424637fa873,2024-07-03T01:55:59.670000 +CVE-2024-32286,0,0,1db83aa9b55edb8231744756cf042cd8c4416ff23dccabd1d06f4f496f58980c,2024-07-03T01:55:58.927000 +CVE-2024-32287,0,0,932347149029d6eabd46a68bc6a82fe6d2945f3ac8f01e10c1833424637fa873,2024-07-03T01:55:59.670000 CVE-2024-32288,0,0,d6ad7a62d4bac5355131f6aa48a68ab7356e2aec6915f40a12433efb5f544350,2024-04-17T15:31:50.160000 CVE-2024-3229,0,0,6db44865bc549d81d248c9ff4567189d0e265f2d9666ac3a1b2d3d9f5ef83f57,2024-06-20T12:44:01.637000 -CVE-2024-32290,0,1,ea7d12f24bd3a870d72d4f02beed12c0208289688c835eea6e908dc2b165b6cd,2024-07-03T01:56:00.430000 -CVE-2024-32291,0,1,6162d71e0c50cfd80b8166ccbdeaa2e4adf839d03127a1a5b034d5446628089a,2024-07-03T01:56:01.233000 -CVE-2024-32292,0,1,7d196aa8ee2ad410c3e453bbba317943102958b600dd9e6a6c1d957762e0ecb9,2024-07-03T01:56:01.983000 +CVE-2024-32290,0,0,ea7d12f24bd3a870d72d4f02beed12c0208289688c835eea6e908dc2b165b6cd,2024-07-03T01:56:00.430000 +CVE-2024-32291,0,0,6162d71e0c50cfd80b8166ccbdeaa2e4adf839d03127a1a5b034d5446628089a,2024-07-03T01:56:01.233000 +CVE-2024-32292,0,0,7d196aa8ee2ad410c3e453bbba317943102958b600dd9e6a6c1d957762e0ecb9,2024-07-03T01:56:01.983000 CVE-2024-32293,0,0,d16611fb15c081131f616e89cbae49c999e1669d1f3ba96273f94493581ea532,2024-04-17T15:31:50.160000 -CVE-2024-32299,0,1,d0a23aa31c0a2313e06327805357771e661b42ede7c77d86066b4cb57786b994,2024-07-03T01:56:02.733000 +CVE-2024-32299,0,0,d0a23aa31c0a2313e06327805357771e661b42ede7c77d86066b4cb57786b994,2024-07-03T01:56:02.733000 CVE-2024-3230,0,0,b827e5f5c7da5900d849c3ba32ae34e7601341c19e8bbb867783f44a3032e122,2024-06-04T16:57:41.053000 -CVE-2024-32301,0,1,4d4519a12ab144b213a6b233124e45a37b5f8337a2689aea47ff3693c4ac9546,2024-07-03T01:56:03.403000 +CVE-2024-32301,0,0,4d4519a12ab144b213a6b233124e45a37b5f8337a2689aea47ff3693c4ac9546,2024-07-03T01:56:03.403000 CVE-2024-32302,0,0,856590d673eb02e246223aef7a9d9a79aa445cadb1ccbcb1f59c17c7bcefe824,2024-04-17T15:31:50.160000 CVE-2024-32303,0,0,f5183e57e6da8ebbb9ebe6e641e50d0eb754fcf17fc9e8be859d54b89499237b,2024-04-17T16:51:07.347000 -CVE-2024-32305,0,1,54019115d1050a8e7a6d5cd1d49afa66fdb4c41b3a834537b9695d1e6b1d3b78,2024-07-03T01:56:04.160000 -CVE-2024-32306,0,1,3216c07ec117e1fbeaffcf62eac6a3e3d7a0764d75335094f2ef3b1b39747031,2024-07-03T01:56:04.840000 +CVE-2024-32305,0,0,54019115d1050a8e7a6d5cd1d49afa66fdb4c41b3a834537b9695d1e6b1d3b78,2024-07-03T01:56:04.160000 +CVE-2024-32306,0,0,3216c07ec117e1fbeaffcf62eac6a3e3d7a0764d75335094f2ef3b1b39747031,2024-07-03T01:56:04.840000 CVE-2024-32307,0,0,f12ea8b10d41967ec04e04d309e47f66284aeaa4e445cf32481cc5868eeb97e7,2024-04-17T15:31:50.160000 CVE-2024-3231,0,0,e95a5eba69d2a70e73288b65ef51fe35c5a71d8dfb21ef835fe92cb48dff5b16,2024-05-17T18:36:05.263000 CVE-2024-32310,0,0,403a1cc9b3055e84cb063a6792bb8b91ae7423d97bc02d3245065155bc28c656,2024-04-17T15:31:50.160000 -CVE-2024-32311,0,1,a7536302fbabb4b529b5593329bec7f2cf36802ec4f1587ed01bada9d7c32320,2024-07-03T01:56:05.617000 -CVE-2024-32312,0,1,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3052,2024-07-03T01:56:06.373000 -CVE-2024-32313,0,1,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000 -CVE-2024-32314,0,1,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000 -CVE-2024-32315,0,1,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000 +CVE-2024-32311,0,0,a7536302fbabb4b529b5593329bec7f2cf36802ec4f1587ed01bada9d7c32320,2024-07-03T01:56:05.617000 +CVE-2024-32312,0,0,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3052,2024-07-03T01:56:06.373000 +CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000 +CVE-2024-32314,0,0,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000 +CVE-2024-32315,0,0,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000 CVE-2024-32316,0,0,a58c15fa4fd96274056ab104ca6fc1340e053661d8932d745c0fc4b1c09dc8e7,2024-04-17T16:51:07.347000 CVE-2024-32317,0,0,3b211721c2918106b1f1e7546bda616d889285c7b9549429ce029a2ae9fa7832,2024-04-17T16:51:07.347000 -CVE-2024-32318,0,1,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000 -CVE-2024-32320,0,1,ff00070c0799b87b8918f3636a7d891bdc3943256f60475437c9b0e24ed27cf0,2024-07-03T01:56:10.160000 +CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000 +CVE-2024-32320,0,0,ff00070c0799b87b8918f3636a7d891bdc3943256f60475437c9b0e24ed27cf0,2024-07-03T01:56:10.160000 CVE-2024-32324,0,0,88adad67deea1264e97a523d12962916f47e4cae672d5057f64601515c5c4891,2024-04-26T12:58:17.720000 -CVE-2024-32325,0,1,e571ce4c9c23cfa0415d1b6bab7055e53f7d8f4096b96dcccf19e795da707a69,2024-07-03T01:56:10.923000 -CVE-2024-32326,0,1,352e299308e53d7cab4ce30fdcac6ce9709918093eb2935d0146d3c8aaa13cb2,2024-07-03T01:56:11.760000 -CVE-2024-32327,0,1,f9ad5f85fd968b4c25755f74bae71baf13607a4e7af0f43bcd9f778540d1517c,2024-07-03T01:56:12.527000 +CVE-2024-32325,0,0,e571ce4c9c23cfa0415d1b6bab7055e53f7d8f4096b96dcccf19e795da707a69,2024-07-03T01:56:10.923000 +CVE-2024-32326,0,0,352e299308e53d7cab4ce30fdcac6ce9709918093eb2935d0146d3c8aaa13cb2,2024-07-03T01:56:11.760000 +CVE-2024-32327,0,0,f9ad5f85fd968b4c25755f74bae71baf13607a4e7af0f43bcd9f778540d1517c,2024-07-03T01:56:12.527000 CVE-2024-3233,0,0,20c2f7e902ff3f580d4cb1f6978216cec758c282dafb334fac21c0e0b6e57fbc,2024-05-02T18:00:37.360000 CVE-2024-32332,0,0,3a004a33f351b22bab28e754ff32dab060a1204ca044c29b556fab4eb6343e1a,2024-04-18T18:25:55.267000 -CVE-2024-32333,0,1,5ea24f41febeedf6644810ff6c1c9911aaed47e6e3b7e6c8023de11405f771bc,2024-07-03T01:56:13.287000 -CVE-2024-32334,0,1,6996ffd498862ffa6ee12c5727ff00fad0e747fd1eeddd88f3108594110a0e18,2024-07-03T01:56:14.057000 -CVE-2024-32335,0,1,27b22302a22439219b05b87399163da322c2f17e7edfa76b1fbc93b9ad8d165a,2024-07-03T01:56:14.820000 -CVE-2024-32337,0,1,5e85592d7c78e5f96c7cce8de98f1c3610765794b25a03f4a02a293d1ede5863,2024-07-03T01:56:15.610000 -CVE-2024-32338,0,1,b6843ffaf837b705cd4efeb2888911cddf85726c89be4454c9b8836b2387fd4d,2024-07-03T01:56:16.380000 -CVE-2024-32339,0,1,40d4e9896b5ce55fafd4f5570160fb57639c45e0c00ed30bfdb9c5412b728799,2024-07-03T01:56:17.143000 +CVE-2024-32333,0,0,5ea24f41febeedf6644810ff6c1c9911aaed47e6e3b7e6c8023de11405f771bc,2024-07-03T01:56:13.287000 +CVE-2024-32334,0,0,6996ffd498862ffa6ee12c5727ff00fad0e747fd1eeddd88f3108594110a0e18,2024-07-03T01:56:14.057000 +CVE-2024-32335,0,0,27b22302a22439219b05b87399163da322c2f17e7edfa76b1fbc93b9ad8d165a,2024-07-03T01:56:14.820000 +CVE-2024-32337,0,0,5e85592d7c78e5f96c7cce8de98f1c3610765794b25a03f4a02a293d1ede5863,2024-07-03T01:56:15.610000 +CVE-2024-32338,0,0,b6843ffaf837b705cd4efeb2888911cddf85726c89be4454c9b8836b2387fd4d,2024-07-03T01:56:16.380000 +CVE-2024-32339,0,0,40d4e9896b5ce55fafd4f5570160fb57639c45e0c00ed30bfdb9c5412b728799,2024-07-03T01:56:17.143000 CVE-2024-3234,0,0,621ff486fe67b005aafa4d077f43b44f73e9ffae621feda6c5ee33965813c116,2024-06-07T14:56:05.647000 CVE-2024-32340,0,0,ed4dc49e1d39da0a286df8b47ebcf315cd49853b7dd6112c802ea07e59d5ed41,2024-04-18T13:04:28.900000 CVE-2024-32341,0,0,71f1f455bcc77ba4bdae7357bc360322947a986c89138ad9c73bd315f3ef516b,2024-04-18T13:04:28.900000 -CVE-2024-32342,0,1,bb454c0ee107b3bd4b385f651671a4e9a6ab8779e90f0240f01854727e0bd8df,2024-07-03T01:56:17.900000 -CVE-2024-32343,0,1,7f7865fa63b09a0451cd9cd36514192fc4a33dcb6cab82e4d53675ba720d24e9,2024-07-03T01:56:18.650000 -CVE-2024-32344,0,1,26bc83944a10a9caa4748416f25ffcf361d2edce0f9da57f190c8ec8cc08db28,2024-07-03T01:56:19.393000 -CVE-2024-32345,0,1,e0be9b7aaaddfaff09d7f0da62200edfad0f9dfd9fafabc086d22866c36a13d6,2024-07-03T01:56:20.143000 -CVE-2024-32349,0,1,e8628d661ed4f9b016ce895b07c4b1f81e2396ad94ad86dbdc5dd19bb212f985,2024-07-03T01:56:20.913000 +CVE-2024-32342,0,0,bb454c0ee107b3bd4b385f651671a4e9a6ab8779e90f0240f01854727e0bd8df,2024-07-03T01:56:17.900000 +CVE-2024-32343,0,0,7f7865fa63b09a0451cd9cd36514192fc4a33dcb6cab82e4d53675ba720d24e9,2024-07-03T01:56:18.650000 +CVE-2024-32344,0,0,26bc83944a10a9caa4748416f25ffcf361d2edce0f9da57f190c8ec8cc08db28,2024-07-03T01:56:19.393000 +CVE-2024-32345,0,0,e0be9b7aaaddfaff09d7f0da62200edfad0f9dfd9fafabc086d22866c36a13d6,2024-07-03T01:56:20.143000 +CVE-2024-32349,0,0,e8628d661ed4f9b016ce895b07c4b1f81e2396ad94ad86dbdc5dd19bb212f985,2024-07-03T01:56:20.913000 CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000 CVE-2024-32350,0,0,fdd6678a5e67bc1124bb59c36a80a14f25f4bf9bbefcff4ac4e75189e7a516df,2024-05-14T19:17:55.627000 CVE-2024-32351,0,0,9dfe8be024b6c2fa8636b30198bceafe2a6e74a41f370fde7bcfa153e4e2604c,2024-05-14T19:17:55.627000 -CVE-2024-32352,0,1,d332e53ad000ad8435c81c28241440757adaa084990611f8a2796504f9f9ebea,2024-07-03T01:56:21.743000 -CVE-2024-32353,0,1,95056727f707fc243928d89d790259f229ec041cac954a579b9099dbee969c0b,2024-07-03T01:56:22.500000 -CVE-2024-32354,0,1,7a51f481a311ea6ef8a37cf0ab90a70652431f14a7a615163cc4248af79f2619,2024-07-03T01:56:23.250000 -CVE-2024-32355,0,1,968872e2f9388a4f300a29bf059bb9d041ad5f1af64c12a13c06a0c4c507e69c,2024-07-03T01:56:24.003000 +CVE-2024-32352,0,0,d332e53ad000ad8435c81c28241440757adaa084990611f8a2796504f9f9ebea,2024-07-03T01:56:21.743000 +CVE-2024-32353,0,0,95056727f707fc243928d89d790259f229ec041cac954a579b9099dbee969c0b,2024-07-03T01:56:22.500000 +CVE-2024-32354,0,0,7a51f481a311ea6ef8a37cf0ab90a70652431f14a7a615163cc4248af79f2619,2024-07-03T01:56:23.250000 +CVE-2024-32355,0,0,968872e2f9388a4f300a29bf059bb9d041ad5f1af64c12a13c06a0c4c507e69c,2024-07-03T01:56:24.003000 CVE-2024-32358,0,0,4361acd373c6387e4e9f8c587956d55ed79588179fa5465dd154715a342d96e5,2024-04-25T17:24:59.967000 -CVE-2024-32359,0,1,5f5adaa7c351afc161843c430c2d85ebb8e96c4f13e61a22d9be5940d569bde0,2024-07-03T01:56:24.743000 -CVE-2024-3236,0,0,f8cddc598c55757cfd994b1be493c044d341c8da01a141ec54151a61683e3edb,2024-06-17T12:42:04.623000 -CVE-2024-32368,0,1,a245b295adfa06788541a26df62f1afc9fccb21b7ad815d7b584befe0d95c5a6,2024-07-03T01:56:25.517000 -CVE-2024-32369,0,1,ceaa4d49bac1e11a599e3682c2a04734321f86009f7fdf5c8ac8b6951737aa19,2024-07-03T01:56:26.273000 +CVE-2024-32359,0,0,5f5adaa7c351afc161843c430c2d85ebb8e96c4f13e61a22d9be5940d569bde0,2024-07-03T01:56:24.743000 +CVE-2024-3236,0,1,ec36abc2f11295d96bb4af829279736b1662391782f95917c947e11ba35b7504,2024-07-03T02:06:05.707000 +CVE-2024-32368,0,0,a245b295adfa06788541a26df62f1afc9fccb21b7ad815d7b584befe0d95c5a6,2024-07-03T01:56:25.517000 +CVE-2024-32369,0,0,ceaa4d49bac1e11a599e3682c2a04734321f86009f7fdf5c8ac8b6951737aa19,2024-07-03T01:56:26.273000 CVE-2024-3237,0,0,98b407c7ff694e30bff011becf60591f80a0369e19a531a10c3c30601e8332ec,2024-05-06T12:44:56.377000 -CVE-2024-32370,0,1,81492edf1d2c6a64042ad0cf6a2cd348080a7ef88ff3ba5fbdfd47e9e3993df4,2024-07-03T01:56:27.030000 -CVE-2024-32371,0,1,c5b061cf3b3b9690294029e93df017d05682693a4990cea94a8f5d54407c18f9,2024-07-03T01:56:27.783000 +CVE-2024-32370,0,0,81492edf1d2c6a64042ad0cf6a2cd348080a7ef88ff3ba5fbdfd47e9e3993df4,2024-07-03T01:56:27.030000 +CVE-2024-32371,0,0,c5b061cf3b3b9690294029e93df017d05682693a4990cea94a8f5d54407c18f9,2024-07-03T01:56:27.783000 CVE-2024-3239,0,0,f0b5dee118fe7d72d1dd8b04a2bfd6454494350494e967af2c301b916ad31cc8,2024-05-14T16:11:39.510000 -CVE-2024-32391,0,1,f4272eb417a6619ae6f0cd98fa3d87733204a81be0ef4fa89595e43efd0dd672,2024-07-03T01:56:28.530000 -CVE-2024-32392,0,1,1310e6c1ebc0e444f0f75bdda70e281fbe8b1f234964a64919aa8a884e12d504,2024-07-03T01:56:29.287000 -CVE-2024-32394,0,1,75664c76484188f21d0bcb681b41ac4fccac73f64c127d861639924880bf9bbd,2024-07-03T01:56:30.023000 -CVE-2024-32399,0,1,d2afaf00c74d78a83f29aa1510c56e0bd37df6cf66b6b6c480bf78080175383e,2024-07-03T01:56:30.203000 +CVE-2024-32391,0,0,f4272eb417a6619ae6f0cd98fa3d87733204a81be0ef4fa89595e43efd0dd672,2024-07-03T01:56:28.530000 +CVE-2024-32392,0,0,1310e6c1ebc0e444f0f75bdda70e281fbe8b1f234964a64919aa8a884e12d504,2024-07-03T01:56:29.287000 +CVE-2024-32394,0,0,75664c76484188f21d0bcb681b41ac4fccac73f64c127d861639924880bf9bbd,2024-07-03T01:56:30.023000 +CVE-2024-32399,0,0,d2afaf00c74d78a83f29aa1510c56e0bd37df6cf66b6b6c480bf78080175383e,2024-07-03T01:56:30.203000 CVE-2024-3240,0,0,29db5b1a5b433d74ddb6cf9845d6d7dbe813d3ab7ee99000a8ee5a7acd277af5,2024-05-06T12:44:56.377000 -CVE-2024-32404,0,1,eb80f6787a363279634a5db4d277d494ac5dc1f2539325374b050a4c28b7d13b,2024-07-03T01:56:30.957000 -CVE-2024-32405,0,1,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256af7b,2024-07-03T01:56:31.770000 -CVE-2024-32406,0,1,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000 -CVE-2024-32407,0,1,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bbfea,2024-07-03T01:56:33.310000 -CVE-2024-32409,0,1,cdbdcb7de47ba32c82cee0bb38b83e5519f96f658f96608562f1e326a9e11332,2024-07-03T01:56:34.063000 +CVE-2024-32404,0,0,eb80f6787a363279634a5db4d277d494ac5dc1f2539325374b050a4c28b7d13b,2024-07-03T01:56:30.957000 +CVE-2024-32405,0,0,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256af7b,2024-07-03T01:56:31.770000 +CVE-2024-32406,0,0,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000 +CVE-2024-32407,0,0,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bbfea,2024-07-03T01:56:33.310000 +CVE-2024-32409,0,0,cdbdcb7de47ba32c82cee0bb38b83e5519f96f658f96608562f1e326a9e11332,2024-07-03T01:56:34.063000 CVE-2024-3241,0,0,81b33ae2e84671a92af0da565a61243f149bf0e66a90aca175abdd4ada353c8d,2024-05-14T19:17:55.627000 -CVE-2024-32418,0,1,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000 +CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000 CVE-2024-32428,0,0,87a3edde2c4b0ace5bed90e6337013a3436ae0c663c6eeed3dbaf59e4e702dff,2024-04-15T13:15:31.997000 CVE-2024-32429,0,0,eb5275541e0171326bf869e836661a3d04172e6e7d4adfaa9657297147332796,2024-04-15T13:15:31.997000 CVE-2024-3243,0,0,c0b3d501de451bd25695181364b192f45772ac0c3be190b71ef36c93a88e910d,2024-04-16T13:24:07.103000 @@ -250475,9 +250475,9 @@ CVE-2024-32487,0,0,3964df55462d4b69b3a47831a0425ebab17556f2b889b4db15caceabcb50c CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000 CVE-2024-3249,0,0,76c646e2435d001bf01037ff3fd93961dd050fc46c496185359532e97ed741fe,2024-06-25T12:24:17.873000 -CVE-2024-32491,0,1,d30474497268ba8f1eca4a0213eacdfe653c7390c8a6bb0f205ad6c8bcf6d00f,2024-07-03T01:56:37.743000 -CVE-2024-32492,0,1,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb381c,2024-07-03T01:56:38.510000 -CVE-2024-32493,0,1,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000 +CVE-2024-32491,0,0,d30474497268ba8f1eca4a0213eacdfe653c7390c8a6bb0f205ad6c8bcf6d00f,2024-07-03T01:56:37.743000 +CVE-2024-32492,0,0,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb381c,2024-07-03T01:56:38.510000 +CVE-2024-32493,0,0,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000 CVE-2024-3250,0,0,42d0527e4e3750c8dcbea25ddc3c02af060082636d586aa4581df30dc613d6b8,2024-04-04T22:15:09.350000 CVE-2024-32502,0,0,69fe824b685653a546225dc4ea95ba763f416a7963602dbf9b708132b70355bf,2024-06-07T19:24:09.243000 CVE-2024-32503,0,0,186ab37f647c5868bd0439903b3f859b2664660460df6c82459d804d339c4ae7,2024-06-07T19:24:09.243000 @@ -250588,26 +250588,26 @@ CVE-2024-32601,0,0,8cbfccd19a8758bfce621311ef1b74ead1c51ab9b770a5c88b9be54c4672c CVE-2024-32602,0,0,5a036ab20093db8d77d0bbad6ef85c0fe339eab100d61f79d2951ab5687311cf,2024-04-18T13:04:28.900000 CVE-2024-32603,0,0,237bdd6eb581c0410431fd7af056971ae43580f51f8ce5d9d85cbbd85e1f61e1,2024-04-18T13:04:28.900000 CVE-2024-32604,0,0,20060b0b46ff482c2f98c24b754e397faaf75159a62e3303a44f56bbb9c17c69,2024-04-18T13:04:28.900000 -CVE-2024-32605,0,1,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 +CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 CVE-2024-32606,0,0,84f5aac92ecf093d17a20a21bc7e9a141c10b8da10020af45274e5b48c677834,2024-05-14T16:12:23.490000 CVE-2024-32607,0,0,1eb0906ba82ffd31f442372eae23dcf0fae79b2fc936be2d1d644a2d9b7e8d24,2024-05-14T16:12:23.490000 CVE-2024-32609,0,0,3b49354e342795768d6c80152719823ff8bea6f8220eda3be3cdfb4ff0e96b74,2024-05-14T16:12:23.490000 CVE-2024-3261,0,0,64e31bcc6e62db1b4c5c56e73cf5a8cb5aea5ea94bcdf9adfdb13f502eaa6a22,2024-04-24T13:39:42.883000 CVE-2024-32610,0,0,22d07bb470516ba89e598a48be36f9f1a0690330204152a02db57fa1828530bd,2024-05-14T16:12:23.490000 CVE-2024-32611,0,0,925618efb4d1e78bad76a32070f40c9c6d8c021035ac6fadecaecc85defb72e1,2024-05-14T16:12:23.490000 -CVE-2024-32612,0,1,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 -CVE-2024-32613,0,1,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 -CVE-2024-32614,0,1,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 -CVE-2024-32615,0,1,eed0625c47474188933c85f87c3961846e531f538a59e0623622ab217be95b75,2024-07-03T01:56:48.017000 -CVE-2024-32616,0,1,3470660bc21c15733b68c010ee9c1a1f6e6a37d50582163cfc4fb2ca8bf712a0,2024-07-03T01:56:48.773000 +CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 +CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 +CVE-2024-32614,0,0,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 +CVE-2024-32615,0,0,eed0625c47474188933c85f87c3961846e531f538a59e0623622ab217be95b75,2024-07-03T01:56:48.017000 +CVE-2024-32616,0,0,3470660bc21c15733b68c010ee9c1a1f6e6a37d50582163cfc4fb2ca8bf712a0,2024-07-03T01:56:48.773000 CVE-2024-32617,0,0,3956439f07d4411534f8f549ce08c96d328a2420265a359af3d1248df3e9b338,2024-05-14T16:12:23.490000 -CVE-2024-32618,0,1,56dab34cac4614715d8aac7022fd1103f44443bc68e99df871e1adb6c0e5eb8d,2024-07-03T01:56:49.560000 -CVE-2024-32619,0,1,6ef2911538be2a3043e9cc5c5d55b0b987376f6227128d41d873c541e2af6ec3,2024-07-03T01:56:50.330000 +CVE-2024-32618,0,0,56dab34cac4614715d8aac7022fd1103f44443bc68e99df871e1adb6c0e5eb8d,2024-07-03T01:56:49.560000 +CVE-2024-32619,0,0,6ef2911538be2a3043e9cc5c5d55b0b987376f6227128d41d873c541e2af6ec3,2024-07-03T01:56:50.330000 CVE-2024-3262,0,0,758c253f08a1135a2d383be61db9b8d36970b2087c7788f9321bc534b0b4222c,2024-04-04T12:48:22.650000 -CVE-2024-32620,0,1,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9d22,2024-07-03T01:56:51.087000 +CVE-2024-32620,0,0,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9d22,2024-07-03T01:56:51.087000 CVE-2024-32621,0,0,0d16af84588cba77912e6258bb92e0509e5d95cc26273293433e138b97031732,2024-05-14T16:12:23.490000 CVE-2024-32622,0,0,b317065f06760eaa27b0b7ac999830fa797acfe4b920f6d4614026ed40dcf7a9,2024-05-14T16:12:23.490000 -CVE-2024-32623,0,1,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000 +CVE-2024-32623,0,0,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000 CVE-2024-32624,0,0,2f355f5b776320f47db40144f30701bfd166073c8d5b94750f9e288f9784cd6b,2024-05-14T16:12:23.490000 CVE-2024-32625,0,0,83e118a0392b3bec4594db5d969d72238cd7025e3075e1bbd62c95f93a226798,2024-04-16T13:24:07.103000 CVE-2024-3263,0,0,3f703f1ba5ea7923ced884c4f521e9e2d72078574de8d888ca8ad52fe05fc989,2024-05-14T16:11:39.510000 @@ -250618,7 +250618,7 @@ CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504 CVE-2024-32635,0,0,7682ccfb999fd6088fd46914c66488f76831bfd92b5abdeac8d55cebbc6f8570,2024-05-14T19:17:55.627000 CVE-2024-32636,0,0,b839e4487b1638854c5d5ed3e87a4fdbdb3bc06aadde0672da5bb7c4c26643f0,2024-05-14T19:17:55.627000 CVE-2024-32637,0,0,97158ed5566d3250b3fb8d995175abcc4416b94fccd5758c6cd34951fc968110,2024-05-14T19:17:55.627000 -CVE-2024-32638,0,1,64e69b6286f832bc6f0cd7c0b6e78e47c45f311d06cafdc54ce151131c91d6d4,2024-07-03T01:56:53.103000 +CVE-2024-32638,0,0,64e69b6286f832bc6f0cd7c0b6e78e47c45f311d06cafdc54ce151131c91d6d4,2024-07-03T01:56:53.103000 CVE-2024-32639,0,0,f99f2a7c37840cbb9e81b91cedc42f4b5433fcd481ea7dcba5df3b2b90ac9ebd,2024-05-14T19:17:55.627000 CVE-2024-3264,0,0,e72e043177a1a04c7a4f16b77aec7fa5bf6f759e5ddd7b4a37761d45eae1d7e0,2024-06-24T19:26:47.037000 CVE-2024-32644,0,0,e88c5eb3a89ae127bbaa68ee6900bb69776588719de1a17fdbc979f8b62412c9,2024-04-19T16:19:49.043000 @@ -250627,7 +250627,7 @@ CVE-2024-32646,0,0,9f830707470a3978892edc29be298706f63ea6896e8eab377ae270338a7fd CVE-2024-32647,0,0,709967ccd4b1e153b53e07591ee128d4f3a6c233abebe3ddfa7e2f5c926a3d9b,2024-04-26T12:58:17.720000 CVE-2024-32648,0,0,871667b5c281d4a802f7f95e53da32f8975af0a0583bd697f738d75dc9747e06,2024-04-26T12:58:17.720000 CVE-2024-32649,0,0,e26aaaa6b14aa33a5119a1a72dbb1fb02803f961ab22f7be17e386aa0bc7d515,2024-04-26T12:58:17.720000 -CVE-2024-3265,0,0,0c1828ebf9110b8b9da218209189cf4212042bf0fafbea32409c29213eca6276,2024-04-26T12:58:17.720000 +CVE-2024-3265,0,1,6b631061e85acf8683ce020f89045fda1cf6e052497bf74c2d432802bc01889d,2024-07-03T02:06:07.057000 CVE-2024-32650,0,0,d3bf6956260168b6d99271d8fdcc2326191a427895573d48248034a5a271f620,2024-04-19T16:19:49.043000 CVE-2024-32651,0,0,32d89ae86700a3d2b6914373f504fba00316bbf18d2be3c8807a43d232496bda,2024-06-07T17:15:50.990000 CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000 @@ -250646,7 +250646,8 @@ CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66 CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000 -CVE-2024-32674,0,1,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 +CVE-2024-32673,1,1,9a3ec95645bfd1cc40341a43e7b62b6871314c24ee4dc627de7fffdde0216243,2024-07-03T02:15:10.297000 +CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000 CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000 CVE-2024-32677,0,0,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000 @@ -250691,7 +250692,7 @@ CVE-2024-32711,0,0,ee4fc6f8776e161cd18a75901753219a17a7dc9e2259a04b6086ad21e170f CVE-2024-32712,0,0,6cf3429c270426b91d6e245efb30946e3059e3ca7d973be6876a8f4441282d9c,2024-05-14T16:12:23.490000 CVE-2024-32713,0,0,4890bedc9533ffebd55221172f0c75f1346abd42e6c111dffbb34cd0b3f48d60,2024-06-12T13:34:29.523000 CVE-2024-32714,0,0,c706d4d1871d7a49138eb189601db2ab16e66a09952444b391946b116bada7fb,2024-06-10T02:52:08.267000 -CVE-2024-32715,0,1,42a63ead2f66befea5d5699ec2ca2cc1b0483d0f505559315e90bee5a18c6e67,2024-07-03T01:56:58.463000 +CVE-2024-32715,0,0,42a63ead2f66befea5d5699ec2ca2cc1b0483d0f505559315e90bee5a18c6e67,2024-07-03T01:56:58.463000 CVE-2024-32716,0,0,ef35512837a2eb385a00af812a4bd8ccb8fac7830ef81ad43aacfa3308965000,2024-04-24T13:39:42.883000 CVE-2024-32717,0,0,41fbfea18ca587f0b377a8ff08e3cedda799120e644b260bc7c5bf7bd95a593f,2024-05-14T16:12:23.490000 CVE-2024-32718,0,0,ac6094c004934613811f62cb54322c782e73ecaf784adcb8253ff40feadd2cda,2024-04-24T13:39:42.883000 @@ -250710,21 +250711,21 @@ CVE-2024-3273,0,0,daaa82c7e720f68a4f37f2f7272ffe56c61248628a537ab662a043f9a3093e CVE-2024-32730,0,0,1b540a6978216af51f74ca4011575d9f341f3a8ea462d26115f28861c4f0864f,2024-05-14T16:12:23.490000 CVE-2024-32731,0,0,38a3ff1f8bbd6df03536e2535563547564f97d47962816c584496adf13c47a39,2024-05-14T19:17:55.627000 CVE-2024-32733,0,0,cc2a83bf0b8d4e35cad819b5164d2b12cff00a586034fce34f072bdde6c85904,2024-05-14T19:17:55.627000 -CVE-2024-32735,0,1,e15013a4e1a1f236c00a02b54c507f0ad852ae7952baaf46cb9cf5ab1260e99c,2024-07-03T01:56:59.647000 +CVE-2024-32735,0,0,e15013a4e1a1f236c00a02b54c507f0ad852ae7952baaf46cb9cf5ab1260e99c,2024-07-03T01:56:59.647000 CVE-2024-32736,0,0,cc45b8c536288bb419de510340043b175e9acce96eb6d8446b58dafc25521b16,2024-05-14T16:12:23.490000 -CVE-2024-32737,0,1,cc883261dec3b83056ae60b1f3577975fafcbf9d68670556121e5122f6835fd3,2024-07-03T01:57:00.443000 -CVE-2024-32738,0,1,138d4a8ecb34682775dcea8f08e2e397d2ef2ee4373827128e457b38863861ed,2024-07-03T01:57:01.140000 +CVE-2024-32737,0,0,cc883261dec3b83056ae60b1f3577975fafcbf9d68670556121e5122f6835fd3,2024-07-03T01:57:00.443000 +CVE-2024-32738,0,0,138d4a8ecb34682775dcea8f08e2e397d2ef2ee4373827128e457b38863861ed,2024-07-03T01:57:01.140000 CVE-2024-32739,0,0,00435f6608b30774352c5f378daf7d49e6235866350cae43aa4828bf124dead9,2024-05-14T16:12:23.490000 CVE-2024-3274,0,0,a2a8e7f0f8e7484faf8b0e9e6a2f428c50556aee17382f1003689463a42b45e4,2024-05-17T02:39:49.730000 CVE-2024-32740,0,0,341b24ae4b2bd0c9b4f3e3f9c2dfbb4e62b858de6f7e60010ce1f6ce67831bcf,2024-05-14T19:17:55.627000 CVE-2024-32741,0,0,05aea67e1c9a4731a1dc63887ff99e8572d63476d341fa7d4df08a62194a9577,2024-05-14T19:17:55.627000 CVE-2024-32742,0,0,511184436ab91afdadb5c62b8e2385ec92d0b0eacae73dfb4ca7f040a395a087,2024-05-14T19:17:55.627000 -CVE-2024-32743,0,1,7c7210717c145485b678548046e778a12d5b3e295d21899e2622876b6305e329,2024-07-03T01:57:02.120000 -CVE-2024-32744,0,1,730c62a9782f1ec14b532d218d1a82cf52126d4486a56deb0c6a760f69acf0d4,2024-07-03T01:57:02.937000 -CVE-2024-32745,0,1,d87072ecdb1e4f8a0773ba4e4f91279addf64348f8d708e8345ba181860605bf,2024-07-03T01:57:03.693000 -CVE-2024-32746,0,1,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000 +CVE-2024-32743,0,0,7c7210717c145485b678548046e778a12d5b3e295d21899e2622876b6305e329,2024-07-03T01:57:02.120000 +CVE-2024-32744,0,0,730c62a9782f1ec14b532d218d1a82cf52126d4486a56deb0c6a760f69acf0d4,2024-07-03T01:57:02.937000 +CVE-2024-32745,0,0,d87072ecdb1e4f8a0773ba4e4f91279addf64348f8d708e8345ba181860605bf,2024-07-03T01:57:03.693000 +CVE-2024-32746,0,0,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000 CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000 -CVE-2024-32752,0,1,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000 +CVE-2024-32752,0,0,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000 CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000 @@ -250801,9 +250802,9 @@ CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000 CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000 CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4676,2024-04-24T13:39:42.883000 -CVE-2024-32849,0,1,2dff3f0f8458f9bc03b8b89ff3ed496d4d9a414f0ec65647eae66f330eefae8c,2024-07-03T01:57:09.160000 +CVE-2024-32849,0,0,2dff3f0f8458f9bc03b8b89ff3ed496d4d9a414f0ec65647eae66f330eefae8c,2024-07-03T01:57:09.160000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 -CVE-2024-32850,0,1,4f078b72cb56eb731f7f52f47246fffeecf7a87d9cac03b2c1a5c91db75a028f,2024-07-03T01:57:09.843000 +CVE-2024-32850,0,0,4f078b72cb56eb731f7f52f47246fffeecf7a87d9cac03b2c1a5c91db75a028f,2024-07-03T01:57:09.843000 CVE-2024-32852,0,0,4f7510548ec964120ea01daa336363dba0106d72a02a92a026b00c9470af1a61,2024-07-02T12:09:16.907000 CVE-2024-32853,0,0,e8b03127c8846180090647525a5bc316a0e614792135ee9d381884b0abb9ff9a,2024-07-02T12:09:16.907000 CVE-2024-32854,0,0,d9b241b0c3b0ebfe2b6b5414fa128df6b4b1d0193c19bf12b0f5e3408d8fa6b7,2024-07-02T12:09:16.907000 @@ -250838,12 +250839,12 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9 CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000 CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000 CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000 -CVE-2024-32891,0,1,8a0f5363d9fa6b1b1d084c97d802fb52ab823370d67e6fcfdd19d9b8bf57ceb5,2024-07-03T01:57:12.270000 +CVE-2024-32891,0,0,8a0f5363d9fa6b1b1d084c97d802fb52ab823370d67e6fcfdd19d9b8bf57ceb5,2024-07-03T01:57:12.270000 CVE-2024-32892,0,0,d09cf621a5198640d1590bf812307f6494b4f7236754c48113551ae4952a9d05,2024-06-17T12:43:31.090000 -CVE-2024-32893,0,1,0c1878ef4b8a7d4b4acf328abd68508f07e7b92789dcfcb4c893201f835ef8ad,2024-07-03T01:57:13.633000 +CVE-2024-32893,0,0,0c1878ef4b8a7d4b4acf328abd68508f07e7b92789dcfcb4c893201f835ef8ad,2024-07-03T01:57:13.633000 CVE-2024-32894,0,0,1fee7d149001a152aa78b170399fbb77214c62b2843c8bc991616757309d5d12,2024-06-17T12:43:31.090000 CVE-2024-32895,0,0,b4ce8cb14651a8c1d5b038c6fb5f1773e85a16a57281c02d55aadc2187df8505,2024-06-17T12:43:31.090000 -CVE-2024-32896,0,1,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000 +CVE-2024-32896,0,0,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000 CVE-2024-32897,0,0,4fc5f5a460c93bb0780e03b36b9c9aaf78b9c8c9778a57de9d64a615622f29cc,2024-06-17T12:43:31.090000 CVE-2024-32898,0,0,dbe7241acfd745ff54bd5f0779b9ba062f0846b5eaffdbdf1772f5da50654c30,2024-06-17T12:43:31.090000 CVE-2024-32899,0,0,1fa76a3766c2befa12f68cc07845b1b461a678de0b835ce3e5011f07f790b2d8,2024-06-17T12:43:31.090000 @@ -250855,9 +250856,9 @@ CVE-2024-32903,0,0,93e670072f9d2b482a8f504a8514776c0f289ba8f85365c76415e3b1dc44a CVE-2024-32904,0,0,2035ed8e2e2a565c2d9db5032953ccaf4fad84f0fd671940fde1df0af13b4700,2024-06-17T12:43:31.090000 CVE-2024-32905,0,0,d670a9241a3bdf998e13f75e7120c696612525b30b4d025868886f8cc8b392db,2024-06-17T12:43:31.090000 CVE-2024-32906,0,0,907618472b4cb1ef279d4db4d523e0aa39ecda75eb634d2958bf785214529a58,2024-06-17T12:43:31.090000 -CVE-2024-32907,0,1,ecf352ba7f122d5e499c50e4fb6a50b8f36f0142b4f18285166dda88585a4524,2024-07-03T01:57:15.760000 +CVE-2024-32907,0,0,ecf352ba7f122d5e499c50e4fb6a50b8f36f0142b4f18285166dda88585a4524,2024-07-03T01:57:15.760000 CVE-2024-32908,0,0,5e17516d74c81a571eb46e1e40f4e2ff9d7648d3b36532375875a466d92fd5b0,2024-06-17T12:43:31.090000 -CVE-2024-32909,0,1,0271a6d7e80d0421d9b45d3c4e1d1b7f725eb29d18c395ad0687c7cee94a0f6f,2024-07-03T01:57:16.980000 +CVE-2024-32909,0,0,0271a6d7e80d0421d9b45d3c4e1d1b7f725eb29d18c395ad0687c7cee94a0f6f,2024-07-03T01:57:16.980000 CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000 CVE-2024-32910,0,0,29cf6a0531855d50f315c3452df6e0eb31144ad7ac2ecf6b02a60ca456807cc8,2024-06-17T12:43:31.090000 CVE-2024-32911,0,0,e16102a4588453c66372cc339d8de78a8fe0bf75217d40b17bff15240917476b,2024-06-17T12:43:31.090000 @@ -250875,11 +250876,11 @@ CVE-2024-32921,0,0,819fa51385dda6f57050549e5933ba542115a94b0dc3e17493024eca85a5e CVE-2024-32922,0,0,41db22d6fea33c8fd8ad0051c1da0548eb69e5924cdd58d207fc96403406932c,2024-06-17T12:43:31.090000 CVE-2024-32923,0,0,7da771222663fa9369c7c70a1e789566f06bfef49a3a6822549a50142705a8b5,2024-06-17T12:43:31.090000 CVE-2024-32924,0,0,f4db2516035c9dfd72407d357f3c5c6a6730eefa228405fca5b8da9022108d2a,2024-06-17T12:43:31.090000 -CVE-2024-32925,0,1,952975d13abb7eac228747d03392395178a367274ac09eb4f5daa7e782f272a8,2024-07-03T01:57:18.617000 -CVE-2024-32926,0,1,9ef7e8771a6566bb36cb9f88d81a05eda20461f6e380085d4cd6c336f418a7f8,2024-07-03T01:57:19.363000 -CVE-2024-32929,0,1,17d10f21930634adcf648f3a1af5dffaf801c17e6eb1045912f45ef7311ec215,2024-07-03T01:57:19.547000 +CVE-2024-32925,0,0,952975d13abb7eac228747d03392395178a367274ac09eb4f5daa7e782f272a8,2024-07-03T01:57:18.617000 +CVE-2024-32926,0,0,9ef7e8771a6566bb36cb9f88d81a05eda20461f6e380085d4cd6c336f418a7f8,2024-07-03T01:57:19.363000 +CVE-2024-32929,0,0,17d10f21930634adcf648f3a1af5dffaf801c17e6eb1045912f45ef7311ec215,2024-07-03T01:57:19.547000 CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000 -CVE-2024-32930,0,1,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 +CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000 CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000 CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000 @@ -250923,7 +250924,7 @@ CVE-2024-32983,0,0,ce81205444cb1663f019c108840b9121773b51fa4288ee35e7c4848583e9a CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971cad,2024-05-01T13:01:51.263000 CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000 CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000 -CVE-2024-32988,0,1,b75452c4939042145070e3930ee08a16366c08052457addaa745b6ead2778cf4,2024-07-03T01:57:22.273000 +CVE-2024-32988,0,0,b75452c4939042145070e3930ee08a16366c08052457addaa745b6ead2778cf4,2024-07-03T01:57:22.273000 CVE-2024-32989,0,0,87c157b1e3d25527b7d1928b44314ff5515bc68d28ca4b835a710f703915d021,2024-06-14T08:15:40.147000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 CVE-2024-32990,0,0,f517fd83eeb745717387dc59840882f5435aeb995e5118d634e1729423fc341a,2024-06-14T08:15:40.410000 @@ -250939,56 +250940,56 @@ CVE-2024-3300,0,0,1a6109c8bd1508593cc8e2af285bc52264cb760861dae976ffae5c6edde381 CVE-2024-33000,0,0,f7c3878da3443e0af1f9be9089c259d82c336c00736d57f8315ffc60cf2a4cb2,2024-05-14T19:17:55.627000 CVE-2024-33001,0,0,c8206b28a061e185d52fadd106218deb8c3387bdacb5a4bacf69846d6cf833a9,2024-06-11T13:54:12.057000 CVE-2024-33002,0,0,0a262bd708eaa5ab273c1c7f9a9a8a5a7eb11d008d67ffa1b16928e33aeb1977,2024-05-14T19:17:55.627000 -CVE-2024-33004,0,1,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000 +CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000 CVE-2024-33006,0,0,3de8db02467d1c66da918aa215665a9f6424098c0742ce05aa96a3aaae6ee0bc,2024-05-14T19:17:55.627000 -CVE-2024-33007,0,1,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000 +CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000 CVE-2024-33008,0,0,c2a80a1d4e2dc5e1e75aadb7e1a929543cc5d10b6b6cfa3a8e96c582e25685b9,2024-05-14T19:17:55.627000 CVE-2024-33009,0,0,61ef23a6983c4f9d6408dfe200f276a3569c841477f02644b97f8743b9ee2d3c,2024-05-14T19:17:55.627000 CVE-2024-3301,0,0,fe53419d0990b3ee7e1694e790c41b07e4bb9e0efd3bec0afd1b54f9f665e1c7,2024-05-30T18:18:58.870000 -CVE-2024-3302,0,0,125cce6ead91da0349b4d4d5e52af6eb4c2a0511fb870ab9451e4f4746c28bb4,2024-04-24T10:15:07.417000 +CVE-2024-3302,0,1,10a0a5360346a347e0e1404168c46ba9e22d839c53347c2b379db8443b59f174,2024-07-03T02:06:08.953000 CVE-2024-3307,0,0,0c526989944cfe68b9f0c23887ae40bc5c8c244ab9a96a8afcbc5907f3c67c3e,2024-05-02T18:00:37.360000 CVE-2024-33078,0,0,04c3a44dd78d418f484a3d2bb089db81f731cffb08f90923e7bba9e97d89f66b,2024-05-01T19:50:25.633000 CVE-2024-3308,0,0,e67d94750b720297a8b6a0767d0960b33a91436391d2678f53cc34abe1cbf0b9,2024-05-02T18:00:37.360000 CVE-2024-3309,0,0,19830d3497b7cd442b078cebc8c87afb76f15d3a703a2ca882ed7fec3a15ca29,2024-04-29T12:42:03.667000 -CVE-2024-33101,0,1,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 -CVE-2024-33102,0,1,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 +CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 +CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 CVE-2024-33103,0,0,2aa0581d6dd4e37d89165f09381d9660126d8dc423d64bc642e8162a026e26fc,2024-05-17T02:39:22.550000 CVE-2024-3311,0,0,8e227c5dee8fedbb182f76c3c2f3081e8b3e58486bff7a3c40a74c83095aecea,2024-06-04T19:20:19.213000 -CVE-2024-33110,0,1,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 +CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 CVE-2024-33111,0,0,037421c00013b59d74bdf937f3cc04c73db028e959cbdf208e3b0e85181fc725,2024-05-06T16:00:59.253000 CVE-2024-33112,0,0,63cedc96a774558f5fee60ef80727b6b0c0200c0c0c3205562cde281741f6dfb,2024-05-06T16:00:59.253000 -CVE-2024-33113,0,1,52de5588a6b1c2d4dca0e59f9ff40c57f764cd0549cbca52bafec015292d66c1,2024-07-03T01:57:27.973000 +CVE-2024-33113,0,0,52de5588a6b1c2d4dca0e59f9ff40c57f764cd0549cbca52bafec015292d66c1,2024-07-03T01:57:27.973000 CVE-2024-33117,0,0,1141f5bd55b81d658c6e3c7994ad48fc5e0cf3dec4b9ba799562c98fbb5ae9de,2024-05-07T13:39:32.710000 CVE-2024-33118,0,0,ac34c28b0f9855a32e215f883b1aed7f164e30a3dc6b5ffd7f9c6f2ff28b9096,2024-05-07T13:39:32.710000 CVE-2024-3312,0,0,600190b8b1b98d908237811e0b165781ecf00c4b37f62f7ea411c1ef102136dd,2024-05-02T18:00:37.360000 -CVE-2024-33120,0,1,75be799cb77913de5b744b592fc9f1d7bb2b4160e45ac741918319e80f040406,2024-07-03T01:57:28.817000 -CVE-2024-33121,0,1,edf7460f7f7adab8e228b5ff796261e79f522c43247c3404f31f8d8daf19d480,2024-07-03T01:57:29.587000 +CVE-2024-33120,0,0,75be799cb77913de5b744b592fc9f1d7bb2b4160e45ac741918319e80f040406,2024-07-03T01:57:28.817000 +CVE-2024-33121,0,0,edf7460f7f7adab8e228b5ff796261e79f522c43247c3404f31f8d8daf19d480,2024-07-03T01:57:29.587000 CVE-2024-33122,0,0,abdf24a5fd17de5e9f5289ccf9de2b407fdedda76bf5ca5d677a89db859927cb,2024-05-07T20:07:58.737000 -CVE-2024-33124,0,1,61d65caffa6a7c09f37b7d9aaeb31ffc0225bf90c60a22ae5f347bc3de14de18,2024-07-03T01:57:30.343000 +CVE-2024-33124,0,0,61d65caffa6a7c09f37b7d9aaeb31ffc0225bf90c60a22ae5f347bc3de14de18,2024-07-03T01:57:30.343000 CVE-2024-3313,0,0,4522b87a14767eb9675e0349d3ff030871782d4eaf9b41a1ee60aa3e1df0045c,2024-05-28T17:15:11.210000 CVE-2024-33139,0,0,a1def75a2b17047adcfa376068fb2a6d954d07b07e9ff64a4e279ac289e82199,2024-05-07T20:07:58.737000 CVE-2024-3314,0,0,95488108b8350e95f44b77cc325ef6d664335b414091e3723a0267658bd66adb,2024-05-17T02:39:50.393000 -CVE-2024-33144,0,1,7ce66848bdfdad6c7661c7606415e2d330de485bc612c3cf999a55dbe1be4b18,2024-07-03T01:57:31.107000 -CVE-2024-33146,0,1,4baefebe2977ba4ed48c0fb4dc2805a0ffd790dd812293e2b72426874933d1a5,2024-07-03T01:57:31.870000 +CVE-2024-33144,0,0,7ce66848bdfdad6c7661c7606415e2d330de485bc612c3cf999a55dbe1be4b18,2024-07-03T01:57:31.107000 +CVE-2024-33146,0,0,4baefebe2977ba4ed48c0fb4dc2805a0ffd790dd812293e2b72426874933d1a5,2024-07-03T01:57:31.870000 CVE-2024-33147,0,0,4e20223d30801a7f21075f78af39ad813c51d9a42f5da19568c56dfb94f8ec03,2024-05-07T20:07:58.737000 CVE-2024-33148,0,0,e602d5a33a62d03d47a28e7218226ed04f87672199559a9cef94aa6423eff20e,2024-05-07T20:07:58.737000 -CVE-2024-33149,0,1,cd385dce8cfe9dabe6c5f72763dc870308b700fe51948946fbdaf204a00dfaef,2024-07-03T01:57:32.207000 +CVE-2024-33149,0,0,cd385dce8cfe9dabe6c5f72763dc870308b700fe51948946fbdaf204a00dfaef,2024-07-03T01:57:32.207000 CVE-2024-3315,0,0,f6177ad3fb4dc6f17488fa13529d64aa95baefa58a281ce37432ce4819f04517,2024-05-17T02:39:50.500000 -CVE-2024-33153,0,1,6b3b93fcc8a90a70e11c0b83b5ca4bcf0ecea245a6ab75c78fd7d09f8a892577,2024-07-03T01:57:33.003000 -CVE-2024-33155,0,1,e4ad5d640ecdba746dd1a49f46932097b92ddfffac20cb1d78f4e9e96f3384a0,2024-07-03T01:57:33.780000 +CVE-2024-33153,0,0,6b3b93fcc8a90a70e11c0b83b5ca4bcf0ecea245a6ab75c78fd7d09f8a892577,2024-07-03T01:57:33.003000 +CVE-2024-33155,0,0,e4ad5d640ecdba746dd1a49f46932097b92ddfffac20cb1d78f4e9e96f3384a0,2024-07-03T01:57:33.780000 CVE-2024-3316,0,0,755eac613ac0f3f96c418809a83b0076d1cfc54ee52931715ea7b2ee1b4c0d5a,2024-05-17T02:39:50.603000 -CVE-2024-33161,0,1,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8aa28,2024-07-03T01:57:34.540000 -CVE-2024-33164,0,1,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000 +CVE-2024-33161,0,0,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8aa28,2024-07-03T01:57:34.540000 +CVE-2024-33164,0,0,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000 CVE-2024-3317,0,0,268fd6a05bc213ed8b67e37e634d7f613dcb3522b15a1901c02c843c9f2b8099,2024-05-15T16:40:19.330000 CVE-2024-3318,0,0,26cc3af453f9b7d2d0f465154a23fc1065171fdfa524c18286eac13f3ef91d5e,2024-05-15T16:40:19.330000 CVE-2024-3319,0,0,f8440f53736afee3c536c36b4daab0cb134c44bb60b9ba7ada1f7f6e23c7a93a,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,aed8dafda882cf55453efda5eeebaa2a26c051fa8c3194e6cc0707606da554b4,2024-05-17T02:39:50.797000 CVE-2024-3321,0,0,267ad1cb87ca0a9a9d65e31ea648c8356111ad555cbe6ee6d86199727e4453ee,2024-05-17T02:39:50.900000 -CVE-2024-33211,0,1,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 +CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 CVE-2024-33212,0,0,fe18dfa218c6712fea180c0e6b039507df6232ec0c173e67e9a407cc5f79ca32,2024-04-24T13:39:42.883000 -CVE-2024-33213,0,1,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000 -CVE-2024-33214,0,1,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000 -CVE-2024-33215,0,1,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000 +CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000 +CVE-2024-33214,0,0,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000 +CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000 CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000 CVE-2024-33218,0,0,8fb813323ddb2eccbc35a036c2c8ad5959ce48973ef0d1e129c52465ed4133a5,2024-05-22T18:59:20.240000 CVE-2024-33219,0,0,4aa16dcbbd12c78070360ec152f9d696965613ce0542d0703865df89e3db6bb9,2024-05-22T18:59:20.240000 @@ -251002,113 +251003,113 @@ CVE-2024-33225,0,0,dd3928cfb890acb53a34f64dd57892805b0e1d1bc6bfe739a2727bba4a99f CVE-2024-33226,0,0,39c1650723ac6707f0b1cf1f898bf1816e429802b190b8b3cd27ee96e2e66a29,2024-05-22T18:59:20.240000 CVE-2024-33227,0,0,dba47dc6901331cd8b2c437b00c864f39f98ab616998125012a5d6f0fc649b49,2024-05-22T18:59:20.240000 CVE-2024-33228,0,0,f3448597a287250f65febdc50573b1814b9e5e5281e20e4e28a9c439a03cbb22,2024-05-22T18:59:20.240000 -CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000 +CVE-2024-3323,0,1,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000 CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000 CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000 CVE-2024-33253,0,0,9724c511857718d0a8259b3f2abfa4544637a582271dda703908f0d9d40ec502,2024-06-17T12:43:31.090000 CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000 CVE-2024-33258,0,0,41d7b4e3d9e09b0d296b620041fceccfb75290061ed11a54c972d58a06b97783,2024-04-26T15:32:22.523000 -CVE-2024-33259,0,1,b9cfacc7381c863d79548660b191f9ab569132aff57640e20db67cfe7e276a28,2024-07-03T01:57:38.597000 -CVE-2024-33260,0,1,55a867adfd5e0f6edfcce33a55bd36bba0efe48c958963841545b9ad37a0e4be,2024-07-03T01:57:39.373000 +CVE-2024-33259,0,0,b9cfacc7381c863d79548660b191f9ab569132aff57640e20db67cfe7e276a28,2024-07-03T01:57:38.597000 +CVE-2024-33260,0,0,55a867adfd5e0f6edfcce33a55bd36bba0efe48c958963841545b9ad37a0e4be,2024-07-03T01:57:39.373000 CVE-2024-33263,0,0,0c56e0a61edf4ecae0c69f4d4728ba00fceb4374c288eb194edb02f12c4f710c,2024-05-14T16:12:23.490000 CVE-2024-33266,0,0,186f1252f7ca5ede1a70673f69a91ca858a9fb1b315dcbdb95f70746fdb43c97,2024-04-30T13:11:16.690000 -CVE-2024-33267,0,1,7eba67054759f1c32ed4311ab6657f5b98d023948e910b24b95ed0e60d9c6b1a,2024-07-03T01:57:40.120000 +CVE-2024-33267,0,0,7eba67054759f1c32ed4311ab6657f5b98d023948e910b24b95ed0e60d9c6b1a,2024-07-03T01:57:40.120000 CVE-2024-33268,0,0,43f1c4dc5a2965d643ab1f03d8000c98dd3b547b6c66a9c084db066a52e5db99,2024-04-30T13:11:16.690000 -CVE-2024-33269,0,1,ff7344a3e782883ff05ffe243216e31d8ec317b81fe485e6183631084242f561,2024-07-03T01:57:40.893000 +CVE-2024-33269,0,0,ff7344a3e782883ff05ffe243216e31d8ec317b81fe485e6183631084242f561,2024-07-03T01:57:40.893000 CVE-2024-33270,0,0,8642b31dd3005e3c324c16b789bdc68df55d51617455c5db15c20bb01f967927,2024-04-30T17:52:35.057000 -CVE-2024-33271,0,1,ff4b503681588c5b252c4b59d9973b0db308ba4cd89028bb833a97a24a35af36,2024-07-03T01:57:41.730000 +CVE-2024-33271,0,0,ff4b503681588c5b252c4b59d9973b0db308ba4cd89028bb833a97a24a35af36,2024-07-03T01:57:41.730000 CVE-2024-33272,0,0,dbceae71cdcc4b04e65e8c3305296fa23a5fef2f5e74766bf7822e0af6840812,2024-04-30T13:11:16.690000 CVE-2024-33273,0,0,585d07525cd63ab54e2649da09bd7189be4bbd92fb20c631d01ed4b6f3a3376a,2024-04-30T17:52:35.057000 CVE-2024-33274,0,0,52b15509dffdfc3176647bce12df8b0c1eced4688c94457202dc37e296aad7ac,2024-04-30T17:52:35.057000 -CVE-2024-33275,0,1,4251729a2acffecc6a6671231470090228a04965d2bd2942e3c8151bda563e34,2024-07-03T01:57:42.480000 -CVE-2024-33276,0,1,1fe1410ec422bac109498ece274211e156abcca47b7c8479c6d7de8507635a91,2024-07-03T01:57:43.290000 -CVE-2024-33278,0,1,66b076915372ac75eed52c103d009ceb4804813177b3c017eb8a608d0a388063,2024-07-03T01:57:44.047000 -CVE-2024-33292,0,1,c3ceabb00f3a3025e64af61f5190512ed104ea5315c3e330d81a0229db92ebd4,2024-07-03T01:57:44.807000 -CVE-2024-33294,0,1,17541a6765e44ea06a20248c9ca673778968fec1e4c8bcb2e45ac885e55d6596,2024-07-03T01:57:45.580000 +CVE-2024-33275,0,0,4251729a2acffecc6a6671231470090228a04965d2bd2942e3c8151bda563e34,2024-07-03T01:57:42.480000 +CVE-2024-33276,0,0,1fe1410ec422bac109498ece274211e156abcca47b7c8479c6d7de8507635a91,2024-07-03T01:57:43.290000 +CVE-2024-33278,0,0,66b076915372ac75eed52c103d009ceb4804813177b3c017eb8a608d0a388063,2024-07-03T01:57:44.047000 +CVE-2024-33292,0,0,c3ceabb00f3a3025e64af61f5190512ed104ea5315c3e330d81a0229db92ebd4,2024-07-03T01:57:44.807000 +CVE-2024-33294,0,0,17541a6765e44ea06a20248c9ca673778968fec1e4c8bcb2e45ac885e55d6596,2024-07-03T01:57:45.580000 CVE-2024-3330,0,0,18007e53c8b3ebb37b189e3c59f6487e0b2ed0f12210630f40669648720c1214,2024-06-27T19:25:12.067000 -CVE-2024-33300,0,1,fa87abfdcbfd1e8c97c25122ede65d7d482f76e3289e99cabd18dd015de96144,2024-07-03T01:57:46.330000 -CVE-2024-33302,0,1,16226248dff503a810cb34493ca6df179d8a427e800a21d419cc2490b51d59e7,2024-07-03T01:57:47.117000 -CVE-2024-33303,0,1,3d6207cf61eaa0c4b222d2868df52f9c415342494118f3616c907664ad0775a3,2024-07-03T01:57:47.943000 -CVE-2024-33304,0,1,c69b7491366f4c957f408f15c91213d3a30f1301fa5b95f5233347233c728d2a,2024-07-03T01:57:48.707000 -CVE-2024-33305,0,1,9456b591799e836fd99c84c1fde49824c89d04ed858b129a95eda7b4d82dbd13,2024-07-03T01:57:49.460000 -CVE-2024-33306,0,1,9a9d23042570962300a30645ba4d19f889c5273037a417c4e7c74745e1c6a309,2024-07-03T01:57:50.153000 +CVE-2024-33300,0,0,fa87abfdcbfd1e8c97c25122ede65d7d482f76e3289e99cabd18dd015de96144,2024-07-03T01:57:46.330000 +CVE-2024-33302,0,0,16226248dff503a810cb34493ca6df179d8a427e800a21d419cc2490b51d59e7,2024-07-03T01:57:47.117000 +CVE-2024-33303,0,0,3d6207cf61eaa0c4b222d2868df52f9c415342494118f3616c907664ad0775a3,2024-07-03T01:57:47.943000 +CVE-2024-33304,0,0,c69b7491366f4c957f408f15c91213d3a30f1301fa5b95f5233347233c728d2a,2024-07-03T01:57:48.707000 +CVE-2024-33305,0,0,9456b591799e836fd99c84c1fde49824c89d04ed858b129a95eda7b4d82dbd13,2024-07-03T01:57:49.460000 +CVE-2024-33306,0,0,9a9d23042570962300a30645ba4d19f889c5273037a417c4e7c74745e1c6a309,2024-07-03T01:57:50.153000 CVE-2024-33307,0,0,685e6dd47a08dab94c9ba0e23fd24014f68fb2d510e871d193d497b88ce19585,2024-05-02T13:27:25.103000 CVE-2024-33308,0,0,c51602bb951dc504524489be700ba980c6849c038059ed7b24a552934a0ffdc4,2024-05-17T02:39:23.753000 CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867601,2024-05-17T02:39:23.810000 CVE-2024-3331,0,0,5769fc47c1644a784687913176ff51174f40b1dc158ef3146eb07b8f4d35b9c7,2024-06-27T19:25:12.067000 CVE-2024-33326,0,0,e65d4ed2661b78b0d6d9d84492b487f78a682aca0337d12f880fe182d4410799,2024-06-27T12:47:19.847000 -CVE-2024-33327,0,1,7caf9ed798d7ac11933dcfb0822d82d00c04b846f50a0663f4685fb11de6e487,2024-07-03T01:57:51.030000 +CVE-2024-33327,0,0,7caf9ed798d7ac11933dcfb0822d82d00c04b846f50a0663f4685fb11de6e487,2024-07-03T01:57:51.030000 CVE-2024-33328,0,0,90d28a35dd07b70524349882294f927c18c1bf26a735395d4ccf2ff290476545,2024-06-27T12:47:19.847000 -CVE-2024-33329,0,1,98705ced2c36304a5a3f8cd53265fde17aacdf584c113adf6a16213749a55d4e,2024-07-03T01:57:51.877000 +CVE-2024-33329,0,0,98705ced2c36304a5a3f8cd53265fde17aacdf584c113adf6a16213749a55d4e,2024-07-03T01:57:51.877000 CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000 CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000 -CVE-2024-33332,0,1,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000 -CVE-2024-33335,0,1,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000 +CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000 +CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000 CVE-2024-33338,0,0,9b8c84dbfacc6e8a05751db225811f66c7a44395ffe03492a33884b37ad228c7,2024-04-30T13:11:16.690000 CVE-2024-33339,0,0,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000 -CVE-2024-33342,0,1,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000 -CVE-2024-33343,0,1,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000 -CVE-2024-33344,0,1,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e54c,2024-07-03T01:57:55.620000 -CVE-2024-33345,0,1,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000 -CVE-2024-33350,0,1,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000 +CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000 +CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000 +CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e54c,2024-07-03T01:57:55.620000 +CVE-2024-33345,0,0,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000 +CVE-2024-33350,0,0,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000 CVE-2024-3337,0,0,0e96a0de2c5ffbe4a9f2804ffa8c1140c4bee3e6e00979a6ee0758b1212b2f3c,2024-05-02T18:00:37.360000 CVE-2024-33371,0,0,ec7a79f056a06763ccfa7dcfdf94bdae70f29613e0b1d07abafaf338bff1ecb9,2024-05-01T13:02:20.750000 CVE-2024-33373,0,0,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000 -CVE-2024-33374,0,1,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 +CVE-2024-33374,0,0,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 CVE-2024-33375,0,0,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000 CVE-2024-33377,0,0,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000 CVE-2024-3338,0,0,9454a656764280ba43f4b4a832049a80a0f45e8c0d37939e326776fd301ff609,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,fdefbc91dd758eee79622e13a87ace7fd97404c7ba92ae8195304a5c3b9d8c61,2024-05-09T13:05:45.620000 -CVE-2024-33383,0,1,a17ca065fb2e7fbe2ec9dff63547764a7d93f23fc83c9cf36fdef1a320ec24ba,2024-07-03T01:57:58.903000 +CVE-2024-33383,0,0,a17ca065fb2e7fbe2ec9dff63547764a7d93f23fc83c9cf36fdef1a320ec24ba,2024-07-03T01:57:58.903000 CVE-2024-33386,0,0,436f4c1344591e4001ca08c7b23cbfcba1b8812956aad72563da143c23f90755,2024-05-16T09:15:13.600000 -CVE-2024-33393,0,1,232ca2e885c806f4b9b9a02ff0150be30ef03824c7242fa15d1cda05a9c453d0,2024-07-03T01:57:59.677000 -CVE-2024-33394,0,1,7b222f25f909bf36b1a73106bc9440b0e4a207e0b25c09a543013f16580566cc,2024-07-03T01:58:00.483000 -CVE-2024-33396,0,1,c84805dbead4b3034624d9bfefee3aa00256e29f27f29843f126f45196ddb863,2024-07-03T01:58:01.270000 -CVE-2024-33398,0,1,96ccc0e818ac86c2609bf632a45842d69ddeccdc5c0db07415ac3f15480df390,2024-07-03T01:58:02.040000 +CVE-2024-33393,0,0,232ca2e885c806f4b9b9a02ff0150be30ef03824c7242fa15d1cda05a9c453d0,2024-07-03T01:57:59.677000 +CVE-2024-33394,0,0,7b222f25f909bf36b1a73106bc9440b0e4a207e0b25c09a543013f16580566cc,2024-07-03T01:58:00.483000 +CVE-2024-33396,0,0,c84805dbead4b3034624d9bfefee3aa00256e29f27f29843f126f45196ddb863,2024-07-03T01:58:01.270000 +CVE-2024-33398,0,0,96ccc0e818ac86c2609bf632a45842d69ddeccdc5c0db07415ac3f15480df390,2024-07-03T01:58:02.040000 CVE-2024-3340,0,0,bb944c005c7790c370881d2998d5d0e1d0131387022373f1f023fce27421a6d2,2024-05-02T18:00:37.360000 -CVE-2024-33401,0,1,f5c782efdaddc134127281dbf0507c23da03bf716b4c093fd81898611b625984,2024-07-03T01:58:02.837000 -CVE-2024-33402,0,1,fd5c0d4fea7ffcc0138dbfc3269178dd77fd48918b2a4be267a37b1c69649014,2024-07-03T01:58:03.570000 +CVE-2024-33401,0,0,f5c782efdaddc134127281dbf0507c23da03bf716b4c093fd81898611b625984,2024-07-03T01:58:02.837000 +CVE-2024-33402,0,0,fd5c0d4fea7ffcc0138dbfc3269178dd77fd48918b2a4be267a37b1c69649014,2024-07-03T01:58:03.570000 CVE-2024-33403,0,0,d9a44215029f012cefe540492828918a2b399e4cc9cdfbed53cb1eba30fabf75,2024-05-28T18:15:09.083000 -CVE-2024-33404,0,1,c9f51a5809fa297bb2289a78327e6d0ddc8d5e495b3e760ef4ac768d15a7f0ad,2024-07-03T01:58:04.417000 -CVE-2024-33405,0,1,7b64b483e46a97392e43f4b015cd27cd282d4799d58fb8648b12f3802fedd3a3,2024-07-03T01:58:05.170000 -CVE-2024-33406,0,1,8c679048379d6dc3620065008eeb4a0fa8183be266d695e89da0c2d5e3fa0724,2024-07-03T01:58:05.953000 -CVE-2024-33407,0,1,ed4a824fbf1e19bcadf3992da26933b694f424ff133570bc43d44a0c7b3a43a9,2024-07-03T01:58:06.720000 +CVE-2024-33404,0,0,c9f51a5809fa297bb2289a78327e6d0ddc8d5e495b3e760ef4ac768d15a7f0ad,2024-07-03T01:58:04.417000 +CVE-2024-33405,0,0,7b64b483e46a97392e43f4b015cd27cd282d4799d58fb8648b12f3802fedd3a3,2024-07-03T01:58:05.170000 +CVE-2024-33406,0,0,8c679048379d6dc3620065008eeb4a0fa8183be266d695e89da0c2d5e3fa0724,2024-07-03T01:58:05.953000 +CVE-2024-33407,0,0,ed4a824fbf1e19bcadf3992da26933b694f424ff133570bc43d44a0c7b3a43a9,2024-07-03T01:58:06.720000 CVE-2024-33408,0,0,b1dc1cfa284ec119582c3e333a3c857ccf162bbb7da939d7f21e95b86f1a0e19,2024-05-28T18:15:09.290000 CVE-2024-33409,0,0,a4ec0ab79610c7a422ccb4902c34cb60c607b5619df8e2280820b42d73af29d4,2024-05-28T18:15:09.347000 CVE-2024-3341,0,0,6a7220590c46c9b457bdb714e3a172e69043834c00f974bf4469b0075cbe33fc,2024-05-02T18:00:37.360000 -CVE-2024-33410,0,1,c078c0658ea8ad68f15ffc8e894b976091875813ae0f7dd53ee1a6c6de68b839,2024-07-03T01:58:07.577000 -CVE-2024-33411,0,1,d4b6b59aad1a2b98ba2b07a3f292ce85f1ef1e986776fdf66ecd25dfa92d252b,2024-07-03T01:58:08.337000 +CVE-2024-33410,0,0,c078c0658ea8ad68f15ffc8e894b976091875813ae0f7dd53ee1a6c6de68b839,2024-07-03T01:58:07.577000 +CVE-2024-33411,0,0,d4b6b59aad1a2b98ba2b07a3f292ce85f1ef1e986776fdf66ecd25dfa92d252b,2024-07-03T01:58:08.337000 CVE-2024-3342,0,0,2c3ca8d5c3061bb507c26662d038cd059db385c42ff804757be4b5dbd68c1d0b,2024-04-29T12:42:03.667000 -CVE-2024-33423,0,1,e30348028d65f1fa1b248a99417a0ba7b421367d631f6e80dc15c0ee0de5ee97,2024-07-03T01:58:09.100000 -CVE-2024-33424,0,1,660eebb0cde04d2bbec7f7bf4f9dc3045482b99c3b20b3a7ca5ede89aafcdc57,2024-07-03T01:58:09.857000 +CVE-2024-33423,0,0,e30348028d65f1fa1b248a99417a0ba7b421367d631f6e80dc15c0ee0de5ee97,2024-07-03T01:58:09.100000 +CVE-2024-33424,0,0,660eebb0cde04d2bbec7f7bf4f9dc3045482b99c3b20b3a7ca5ede89aafcdc57,2024-07-03T01:58:09.857000 CVE-2024-33427,0,0,9476c5f9c8988b26166fe9f7a357839b1651ce10bb12a768ec8d4e52b65e45a2,2024-05-26T22:15:08.427000 CVE-2024-33428,0,0,405c7d4470f1c4c6a9da4790ad16769be5bbee6bc7cbd31bcf2800f3281bb40b,2024-05-01T19:50:25.633000 -CVE-2024-33429,0,1,6250a357badd662aab990ce6b0b26247ba646ef32396387c4f5d15eb6a9b3303,2024-07-03T01:58:10.623000 +CVE-2024-33429,0,0,6250a357badd662aab990ce6b0b26247ba646ef32396387c4f5d15eb6a9b3303,2024-07-03T01:58:10.623000 CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000 -CVE-2024-33430,0,1,993b3294050392fefcb9816964b718ba74e359b0ac7b5293f058fa179eaf350f,2024-07-03T01:58:11.383000 -CVE-2024-33431,0,1,a7c1a6301976b2d2e09da72a5c3e2e07719bfa5d761e3b3a064294c09c4ed2c9,2024-07-03T01:58:12.147000 +CVE-2024-33430,0,0,993b3294050392fefcb9816964b718ba74e359b0ac7b5293f058fa179eaf350f,2024-07-03T01:58:11.383000 +CVE-2024-33431,0,0,a7c1a6301976b2d2e09da72a5c3e2e07719bfa5d761e3b3a064294c09c4ed2c9,2024-07-03T01:58:12.147000 CVE-2024-33433,0,0,198801a1e08f2deb1df11d88887470b8cf98a081b3a3c1a0457a553261569a24,2024-05-14T16:12:23.490000 -CVE-2024-33434,0,1,d3d9dd7556d381ed0616d5fd402213526363d7fa50ea2db29323c7c72d416248,2024-07-03T01:58:12.927000 -CVE-2024-33435,0,1,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e9a4,2024-07-03T01:58:13.733000 +CVE-2024-33434,0,0,d3d9dd7556d381ed0616d5fd402213526363d7fa50ea2db29323c7c72d416248,2024-07-03T01:58:12.927000 +CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e9a4,2024-07-03T01:58:13.733000 CVE-2024-33436,0,0,701c454e4625ea3667a2a4c57b2b8813ef0906b2788ee031a4fb999b217c8733,2024-05-01T13:02:20.750000 CVE-2024-33437,0,0,1ec2ac47d7b1ab44be8b75609a46c1e8607276ea4a6f55841f41e488acd680a8,2024-05-01T13:02:20.750000 CVE-2024-33438,0,0,c2642f5df14f0f416201641b4a2e125cc0d2de857c51a031f5833f4693326023,2024-04-30T13:11:16.690000 CVE-2024-3344,0,0,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000 -CVE-2024-33442,0,1,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000 -CVE-2024-33443,0,1,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000 -CVE-2024-33444,0,1,3ef8405d0701f5475dc75b10aec72e2f6b5a70303f405f10387e1aa41ce1da12,2024-07-03T01:58:15.583000 -CVE-2024-33445,0,1,6e7e4efc8ec4c00f5a4d8586fbcb92cabc92474cc1d9f3d59cf859cedc450f3b,2024-07-03T01:58:16.350000 +CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000 +CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000 +CVE-2024-33444,0,0,3ef8405d0701f5475dc75b10aec72e2f6b5a70303f405f10387e1aa41ce1da12,2024-07-03T01:58:15.583000 +CVE-2024-33445,0,0,6e7e4efc8ec4c00f5a4d8586fbcb92cabc92474cc1d9f3d59cf859cedc450f3b,2024-07-03T01:58:16.350000 CVE-2024-33449,0,0,82c0fe8439f268eedf63ed1da3eb3fb2ad29e68126122a5274369bbec0c38b68,2024-04-30T13:11:16.690000 CVE-2024-3345,0,0,014ffeb3c34b5125ba42dbaa2e64d2efabf27a52f406bfdb3d89eb78c163151f,2024-05-21T12:37:59.687000 CVE-2024-33450,0,0,b7d22d3ad1d31fe9b10e6d79608301db099b202296baa0ae2c3b81d6d1f79cfa,2024-05-29T13:02:09.280000 -CVE-2024-33454,0,1,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e14aa,2024-07-03T01:58:17.097000 +CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e14aa,2024-07-03T01:58:17.097000 CVE-2024-3346,0,0,884c16501a7a7f21b20c07cf3efdf5b4258ff945bba7c98f4920e8657cd7fe63,2024-06-04T19:20:19.553000 CVE-2024-33465,0,0,eadb6536921f299769dd28ca056127bee4ec0a5d9a79c4314362582bea14e967,2024-04-30T17:52:35.057000 CVE-2024-3347,0,0,dbd420f749e303adb57c18e6222d5e8f3e19b569039f37e1aa8e9e50efcf6fe9,2024-05-17T02:39:51.303000 CVE-2024-33470,0,0,49ee4c0d6360d68dd959668b81ea5e54f8cdcccd6cfce64e557ef9eaa0b46eb9,2024-05-24T18:09:20.027000 CVE-2024-33471,0,0,1e9306947f4d7124e4b6326ed79300bcb1af9bfa3f92267f388304603d70db4d,2024-05-28T12:39:42.673000 CVE-2024-3348,0,0,d67c078d7a8cc99abc9c1173eada8bc90e02ff0043f602641d85cbd7d5ed4572,2024-05-17T02:39:51.403000 -CVE-2024-33485,0,1,545a3ddb2c081ca34ecb0c2a68c90fa3f095f3607dce687f15a518e34a732453,2024-07-03T01:58:17.873000 +CVE-2024-33485,0,0,545a3ddb2c081ca34ecb0c2a68c90fa3f095f3607dce687f15a518e34a732453,2024-07-03T01:58:17.873000 CVE-2024-33489,0,0,c5e9a158fd0f5dbe9fd624dac45162861bc4de2e877dfdbae462d2ef7d2738bb,2024-05-14T19:17:55.627000 CVE-2024-3349,0,0,9e77b3b7669a491e59b05b9ff3ff10ed5134887ec699846000601b364d0e0d87,2024-05-17T02:39:51.497000 CVE-2024-33490,0,0,14c7b872b5cf64f86ced5639dd06e3ee36db7ff983335042a00dbd2eba834e00,2024-05-14T19:17:55.627000 @@ -251124,24 +251125,24 @@ CVE-2024-33499,0,0,8cb0843c38b353e79b24fe74f6b05c8071b02f4b63b3bcb8893f4033cc9c6 CVE-2024-3350,0,0,2b8baf70bc71563420116bceae3da55f775969025d5793968d110aec63c6ad2b,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,c6295613b84990917f1a57c080fe27562d29b01b0e6d3200ab007d211e070981,2024-06-11T13:54:12.057000 CVE-2024-3351,0,0,9ad5e91d8f23e74b177e32892aec306da9ca113a4552ee690c2a76c864ee2562,2024-05-17T02:39:51.683000 -CVE-2024-33511,0,1,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 -CVE-2024-33512,0,1,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 -CVE-2024-33513,0,1,9c20c2a1df7f9aef87f42ca5b5e1f373a326fbb0cd04a029a0444d0d17ed883a,2024-07-03T01:58:20.920000 -CVE-2024-33514,0,1,4aab893018a6a2404daaafa33312b00ab60231c8a7baeb1e63689eb6f4e7dcd6,2024-07-03T01:58:21.100000 -CVE-2024-33515,0,1,0a29698b566d1ce96badc6c9dd3f9a2648c522eb6b37724b52074d909a3a4bed,2024-07-03T01:58:21.780000 -CVE-2024-33516,0,1,2a125f75033a85309256af5b7bcbd9cab289bd0eb807ee2035c6ab7d5101ea26,2024-07-03T01:58:22.457000 +CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 +CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 +CVE-2024-33513,0,0,9c20c2a1df7f9aef87f42ca5b5e1f373a326fbb0cd04a029a0444d0d17ed883a,2024-07-03T01:58:20.920000 +CVE-2024-33514,0,0,4aab893018a6a2404daaafa33312b00ab60231c8a7baeb1e63689eb6f4e7dcd6,2024-07-03T01:58:21.100000 +CVE-2024-33515,0,0,0a29698b566d1ce96badc6c9dd3f9a2648c522eb6b37724b52074d909a3a4bed,2024-07-03T01:58:21.780000 +CVE-2024-33516,0,0,2a125f75033a85309256af5b7bcbd9cab289bd0eb807ee2035c6ab7d5101ea26,2024-07-03T01:58:22.457000 CVE-2024-33517,0,0,4499de4ebe1f423e3234cee0e8f8c16d3a4ed4c1336ceb4afb74bc930260196d,2024-05-01T19:50:25.633000 -CVE-2024-33518,0,1,84ccf326440e53cdc178e6fa27177ba3577a132315b02d47fe46572cfd6ace26,2024-07-03T01:58:23.150000 +CVE-2024-33518,0,0,84ccf326440e53cdc178e6fa27177ba3577a132315b02d47fe46572cfd6ace26,2024-07-03T01:58:23.150000 CVE-2024-3352,0,0,8d8116cce81ffc02b3d2f59517baad98542659fb6068576e268a365bf929b959,2024-05-17T02:39:51.777000 CVE-2024-33522,0,0,698c28a35bc69cffbbdcc528451b780b5020339e6e061f4789570701ef9577a2,2024-04-30T13:11:16.690000 -CVE-2024-33525,0,1,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 +CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 CVE-2024-33526,0,0,1bf86d2025468f58f3259fa37536f4b45c8320ff99e9665e583ba93873ee7943,2024-05-23T17:15:29.020000 CVE-2024-33527,0,0,3aa4268b04e818d68b9981964d63adc6e021a5caa6806fc76a3e6e04e4e0d782,2024-05-23T17:15:29.103000 CVE-2024-33528,0,0,c64e3b1ff77d3562f26644714e92a8b6968829150e1cbafbe65986600efc0f6e,2024-05-23T17:15:29.213000 -CVE-2024-33529,0,1,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000 +CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000 CVE-2024-3353,0,0,2ddbc6535b793a0147a58343572c1b0e378c4cc25bcc9f8dccfa91f1a8c7260c,2024-05-17T02:39:51.867000 -CVE-2024-33530,0,1,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 -CVE-2024-33531,0,1,b4f686a17b522487db106a979e75b685d2e11fa9abe95f79b3890bf766d3a008,2024-07-03T01:58:25.220000 +CVE-2024-33530,0,0,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 +CVE-2024-33531,0,0,b4f686a17b522487db106a979e75b685d2e11fa9abe95f79b3890bf766d3a008,2024-07-03T01:58:25.220000 CVE-2024-33537,0,0,2b759091e7063e22ebdb3d00e9c9cbe29f7897d413878e4f374a7f6892b2ba35,2024-04-29T12:42:03.667000 CVE-2024-33538,0,0,e7d86585abc433df63c34994a7b1a015734175492b100326db14778bb8d1f54e,2024-04-29T12:42:03.667000 CVE-2024-33539,0,0,87f154978a987e28cf100a131c9fad421daff9a6f4f5e6dbc40640de68db94cd,2024-04-29T12:42:03.667000 @@ -251208,8 +251209,8 @@ CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e1 CVE-2024-33599,0,0,a5496f68bd03ec173dacb08f8bad400d5f78972808b33c7e0d2c6de710406c46,2024-06-30T15:15:09.713000 CVE-2024-3360,0,0,39157a34f099f0f6a23141aebb926dd32cd3bc7b4661c6e276ef587b3ffe440a,2024-06-04T19:20:19.660000 CVE-2024-33600,0,0,7cbd68d15c56d14c56708ef6915a64c9604d14691a940047f092aa8f253db52c,2024-06-30T15:15:09.827000 -CVE-2024-33601,0,1,ecd1144638f59655ea1ed59691bee8e7c1b397008cc72896f03377fba5109d21,2024-07-03T01:58:29.503000 -CVE-2024-33602,0,1,6cc16045ef5670839b402ad7345d2ed363889d512c0c1b43a378c069318e373c,2024-07-03T01:58:29.700000 +CVE-2024-33601,0,0,ecd1144638f59655ea1ed59691bee8e7c1b397008cc72896f03377fba5109d21,2024-07-03T01:58:29.503000 +CVE-2024-33602,0,0,6cc16045ef5670839b402ad7345d2ed363889d512c0c1b43a378c069318e373c,2024-07-03T01:58:29.700000 CVE-2024-33604,0,0,3ab2c002c5d377b142c243de99829b91e6a82788bf0b2eb8f577e38ce442a06e,2024-05-08T17:05:24.083000 CVE-2024-33606,0,0,ebf9d8749ac3537ee5359461da4e05bc91414a0e3bcb9c11221bcf71e8ce61aa,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,75bd6a7cfea3f46ff885a646fe991c9389ed68527f615bf970851ddf524ca214,2024-05-08T17:05:24.083000 @@ -251227,7 +251228,7 @@ CVE-2024-33628,0,0,bd593525183e782eba9ed1d53c2c68cab7cced5143364e77f1a2ec527b353 CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000 CVE-2024-3363,0,0,9fdb0cecdf98b246fd6b10b0b9413a6ea0e0487a81b8ecec11f5e8c4b9304459,2024-05-17T02:39:52.813000 CVE-2024-33630,0,0,7ad1e5626b9cc2115fea7ca091a964156b524174aed2afaf452662addb6899f7,2024-04-29T12:42:03.667000 -CVE-2024-33631,0,1,6c3fd9d0d670586db3969fb2c1aceaaef794d4aac36932ff4b016ed610a8b9e0,2024-07-03T01:58:30.720000 +CVE-2024-33631,0,0,6c3fd9d0d670586db3969fb2c1aceaaef794d4aac36932ff4b016ed610a8b9e0,2024-07-03T01:58:30.720000 CVE-2024-33632,0,0,09a1ebe0d3d46aa3fd940c75dff78c22a750303308e602db9817cd681c0e57c0,2024-04-29T12:42:03.667000 CVE-2024-33633,0,0,8bddc6e7297a79d6dd0f8f7ef19355460adb6240964b8d97c9fc24a67f5a5ffc,2024-04-29T12:42:03.667000 CVE-2024-33634,0,0,2317852d7911cdb8f927c7e1fc59f18ce357d05b95aaa8b99a2da4b010c6f118,2024-04-29T12:42:03.667000 @@ -251253,18 +251254,18 @@ CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6d CVE-2024-33652,0,0,f10385ddf63819e6bfc4cfd1af98d21aa48a5904778b552fb96e778ca7071131,2024-04-29T12:42:03.667000 CVE-2024-33655,0,0,2a1a57d16853f2dbeafe3a1d5d9bd7aba78e93864ecaf7bf30fb94862628a49d,2024-06-10T18:15:34.520000 CVE-2024-3366,0,0,cee4987ed8ff1f296ec0608c2f2a4293250401226181ff89b21a21c72172c537,2024-05-17T02:39:53.090000 -CVE-2024-33661,0,1,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 +CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33663,0,0,ec8e93da37d2d2637b8f6a349ca26f3f71e8cd5e6cb10be23a57d50df0caa826,2024-04-26T12:58:17.720000 CVE-2024-33664,0,0,ff700d0348622411a575b35a22930026c6a38bfb8414ff438507f717041fdd4a,2024-04-26T12:58:17.720000 CVE-2024-33665,0,0,c6eda2ef04663bc8651d265f2c3c62a4f9c0faef2b7b753d46b35081382cab0f,2024-05-17T02:39:27.117000 -CVE-2024-33666,0,1,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 +CVE-2024-33666,0,0,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 CVE-2024-33667,0,0,1d48df7eee913799310fcfbe30de7a5cde0336a13f3bdc5c6f50a501722e9880,2024-04-26T12:58:17.720000 -CVE-2024-33668,0,1,1057e9899f3d071fbe9469ff4d64f06b263f71484eb3414fb82aad54f0a342bc,2024-07-03T01:58:34.653000 -CVE-2024-33669,0,1,9f9e4923b29b77e4df7ed4bfab7ff189f9617396636ad12f3335720e7b3f148c,2024-07-03T01:58:35.420000 +CVE-2024-33668,0,0,1057e9899f3d071fbe9469ff4d64f06b263f71484eb3414fb82aad54f0a342bc,2024-07-03T01:58:34.653000 +CVE-2024-33669,0,0,9f9e4923b29b77e4df7ed4bfab7ff189f9617396636ad12f3335720e7b3f148c,2024-07-03T01:58:35.420000 CVE-2024-3367,0,0,960603a26ef6b142509321d49e151f94a19b335f6f238fbeac2ae8c02d482fbe,2024-04-24T12:15:07.093000 -CVE-2024-33670,0,1,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000 +CVE-2024-33670,0,0,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000 CVE-2024-33671,0,0,09d6fe1494c08d25e3ebe0bd3df9b1f9b5ae6e2f75228545b8040649c20a8078,2024-04-26T12:58:17.720000 -CVE-2024-33672,0,1,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000 +CVE-2024-33672,0,0,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000 CVE-2024-33673,0,0,3d68e08b0d011322a43b1c482669ca841ae8a193a77f5ccbf9966098404f0c0f,2024-04-26T12:58:17.720000 CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74587,2024-04-26T12:58:17.720000 CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000 @@ -251291,59 +251292,59 @@ CVE-2024-33697,0,0,f1a322dee5ec8563df23e02e8d701179da9c0f74bc61aaadca8daa27bdd8a CVE-2024-3371,0,0,a0481e14f6cfcb9b0215a88c87fda086117ad0add8d553a83f1550e7381c3170,2024-04-26T15:15:49.357000 CVE-2024-3372,0,0,55bb1ec5f293fe57946b9b13f3d7b45f86f6f8820432c1f094bc02b6daa4faaf,2024-05-14T19:17:55.627000 CVE-2024-3374,0,0,688889bb860916d573f326620a51acbee74f00b2f0d7daeb9ea3d44a36bd146e,2024-05-14T19:17:55.627000 -CVE-2024-33748,0,1,066f13e7dc76dff0529f136e64473f4bf178cc6b6f4c44f335cc233ab954b6f1,2024-07-03T01:58:38.810000 +CVE-2024-33748,0,0,066f13e7dc76dff0529f136e64473f4bf178cc6b6f4c44f335cc233ab954b6f1,2024-07-03T01:58:38.810000 CVE-2024-33749,0,0,5eabad0a3484337336a9daf20c409978b4e97899a0ce60a223a003e76b4ef00f,2024-05-06T16:00:59.253000 CVE-2024-3375,0,0,855a143c26311248df944e6ebe7198b3e53ef3372f1cd77aa442c756b2c30d37,2024-04-29T12:42:03.667000 -CVE-2024-33752,0,1,1bc9f08a0011e44b90280ee1144c3d3bf7022be746c68e8063dce2331b55fc9a,2024-07-03T01:58:39.567000 -CVE-2024-33753,0,1,2fc447b40b2f762f051408e9969732ce9ebcb69b836d167fb124d965f0f02f03,2024-07-03T01:58:40.327000 +CVE-2024-33752,0,0,1bc9f08a0011e44b90280ee1144c3d3bf7022be746c68e8063dce2331b55fc9a,2024-07-03T01:58:39.567000 +CVE-2024-33753,0,0,2fc447b40b2f762f051408e9969732ce9ebcb69b836d167fb124d965f0f02f03,2024-07-03T01:58:40.327000 CVE-2024-3376,0,0,82ac84b910b7dc2f09e1d55f24027febe1e7bd36215fa938391715d49257475b,2024-05-17T02:39:53.447000 -CVE-2024-33763,0,1,a9dcdd69a9dcf4426ef125f4a4f55c3ca46d53315be497b3f8a99adcba4ad824,2024-07-03T01:58:41.113000 +CVE-2024-33763,0,0,a9dcdd69a9dcf4426ef125f4a4f55c3ca46d53315be497b3f8a99adcba4ad824,2024-07-03T01:58:41.113000 CVE-2024-33764,0,0,52d2c2eb4494a26cc013ede9086efdfad0e1887dedb298b992ba46d243575797,2024-06-10T18:46:38.557000 CVE-2024-33766,0,0,d1f11c4f1b2274fc2efdbb2baefea6e84d5aa930242e868d1481f540ffbe3a8f,2024-05-01T13:02:20.750000 CVE-2024-33767,0,0,6dcb3ef39402605f3b5845ece7cafb51f022eb1fdf766ffe6d574cac39dbc083,2024-05-01T13:02:20.750000 -CVE-2024-33768,0,1,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472142,2024-07-03T01:58:42.057000 +CVE-2024-33768,0,0,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472142,2024-07-03T01:58:42.057000 CVE-2024-3377,0,0,8d762eb16aa3dcff8a27c53160e9e789c9ff93d63500e4f5ba3529a203799fb9,2024-05-17T02:39:53.543000 CVE-2024-33771,0,0,cfc0d9c2ac9c87b6047ec753801bb92fb60272050e10f70b6c0b1b6f7b95324e,2024-05-14T16:12:23.490000 -CVE-2024-33772,0,1,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000 +CVE-2024-33772,0,0,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000 CVE-2024-33773,0,0,ce807b4a5f9b87efef9508cbe9666e27df9c7ceab8a76549bffede3404d21ad6,2024-05-14T16:12:23.490000 CVE-2024-33774,0,0,6569fdec8a8dd40808e72cffa462e06be716a1cbfb9cd01e1ae4c73909a9000b,2024-05-14T16:12:23.490000 -CVE-2024-33775,0,1,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000 +CVE-2024-33775,0,0,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000 CVE-2024-3378,0,0,ca2650af49c2de7462538e8f059378df3bc0abe66ece11195086b2cb821ec5db,2024-06-06T19:43:40.377000 -CVE-2024-33780,0,1,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873a60,2024-07-03T01:58:44.400000 -CVE-2024-33781,0,1,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0ec0,2024-07-03T01:58:45.220000 -CVE-2024-33782,0,1,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000 -CVE-2024-33783,0,1,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000 +CVE-2024-33780,0,0,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873a60,2024-07-03T01:58:44.400000 +CVE-2024-33781,0,0,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0ec0,2024-07-03T01:58:45.220000 +CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000 +CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000 CVE-2024-33786,0,0,95e7fe56c23e0e423edeb474f00c74d5ecc6d14f38a9a2816153585865c480e6,2024-05-03T14:17:53.690000 CVE-2024-33787,0,0,948faae9d117819d981385091574d66529210ae1e799083ff339db62a8add210,2024-05-03T14:17:53.690000 -CVE-2024-33788,0,1,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 -CVE-2024-33789,0,1,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 -CVE-2024-33791,0,1,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 -CVE-2024-33792,0,1,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 -CVE-2024-33793,0,1,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 +CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 +CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 +CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 +CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 +CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 CVE-2024-33799,0,0,d4703884563e5833cdb9648d7cc33f8705bd1497cf8e8aa164eac24bf9bafb3b,2024-05-28T17:11:47.007000 CVE-2024-3380,0,0,e3c517da057282c74d27c6e3988489004467d97a03962300cc409e3173bd2118,2024-06-07T17:15:51.487000 CVE-2024-33800,0,0,17bc2480cf1a294c4292319b62d955cef0134cc8b1bff7da4b78d7b55c06c171,2024-05-28T17:11:47.007000 -CVE-2024-33801,0,1,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000 +CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000 CVE-2024-33802,0,0,2476d398b8594ad323a8dcb8865ed3c9d1843ba4df856ae65611bc0b42c9b32c,2024-05-28T17:11:47.007000 CVE-2024-33803,0,0,99c652e38eb63da1d070f2217a40025de76c94a2564b78e9c93e5d493c01aca4,2024-05-28T17:11:47.007000 -CVE-2024-33804,0,1,6621966fba27f3dd0da67323c048a53a2b132469f199bc736e2057ed57961b5d,2024-07-03T01:58:51.660000 -CVE-2024-33805,0,1,58af49a7c74149ca9f823d30f922778154c6ecf6b330b510d828d2d1dcc56f01,2024-07-03T01:58:52.423000 +CVE-2024-33804,0,0,6621966fba27f3dd0da67323c048a53a2b132469f199bc736e2057ed57961b5d,2024-07-03T01:58:51.660000 +CVE-2024-33805,0,0,58af49a7c74149ca9f823d30f922778154c6ecf6b330b510d828d2d1dcc56f01,2024-07-03T01:58:52.423000 CVE-2024-33806,0,0,9a5cdc220f2d34e935a67442cffe776d785994f07c76bd35aa2097502d557ed5,2024-05-28T17:11:47.007000 -CVE-2024-33807,0,1,2173c6521a5c18022682137c8c79fe1d718736f1b1f1ebd36d2009f7313e0327,2024-07-03T01:58:53.170000 +CVE-2024-33807,0,0,2173c6521a5c18022682137c8c79fe1d718736f1b1f1ebd36d2009f7313e0327,2024-07-03T01:58:53.170000 CVE-2024-33808,0,0,c51d3bc7c243893234d482b83f321bccf552fb07b2c0e530f45d8a2d81e7175c,2024-05-28T17:11:47.007000 CVE-2024-33809,0,0,f49687bdb1b67c41dd6116fa038715d7519a4be0442fa47f5646ef61751e82cc,2024-05-24T18:09:20.027000 CVE-2024-3381,0,0,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,fcf08ee825495c7c9196412d6a7ac485908da9a914b001b572e82e64bc2af5f7,2024-05-14T16:12:23.490000 CVE-2024-33819,0,0,27ebf543bf09f96d296185f9994673eb8c5aa230fac1ef1d22da8e6b7ccd2158,2024-05-14T16:12:23.490000 CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000 -CVE-2024-33820,0,1,1f4676a068bf8eef81b801f6edfe98ebc1889872789d97021fd443221fe898b4,2024-07-03T01:58:53.933000 -CVE-2024-33829,0,1,82376f1bb7b84688541c346599e7ab08e78978ce19e0fd4a8bd452996459b714,2024-07-03T01:58:54.750000 +CVE-2024-33820,0,0,1f4676a068bf8eef81b801f6edfe98ebc1889872789d97021fd443221fe898b4,2024-07-03T01:58:53.933000 +CVE-2024-33829,0,0,82376f1bb7b84688541c346599e7ab08e78978ce19e0fd4a8bd452996459b714,2024-07-03T01:58:54.750000 CVE-2024-3383,0,0,23294a2c02d282067f57807e610d19ad62151e7737eff1a2dbce91b2ce33a939,2024-04-10T19:49:51.183000 -CVE-2024-33830,0,1,fc6fa18894467c83b0848443851c7e78f7eba7d19fa4f8b67e04a58cc8829d7e,2024-07-03T01:58:55.540000 -CVE-2024-33831,0,1,91e2a95f17e19760b86b81244b402977c638bd6085319805d6a4540f23f9d8e6,2024-07-03T01:58:56.317000 -CVE-2024-33832,0,1,7b3e27b34a81a08591742eaf0380d56875457acf0d341656accd4bb7693f1793,2024-07-03T01:58:57.087000 -CVE-2024-33835,0,1,cffd31db3df6261e091005d9fb36253e75a61316a58e0e89b08946054d5f55ef,2024-07-03T01:58:57.853000 -CVE-2024-33836,0,1,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd0584d,2024-07-03T01:58:58.623000 +CVE-2024-33830,0,0,fc6fa18894467c83b0848443851c7e78f7eba7d19fa4f8b67e04a58cc8829d7e,2024-07-03T01:58:55.540000 +CVE-2024-33831,0,0,91e2a95f17e19760b86b81244b402977c638bd6085319805d6a4540f23f9d8e6,2024-07-03T01:58:56.317000 +CVE-2024-33832,0,0,7b3e27b34a81a08591742eaf0380d56875457acf0d341656accd4bb7693f1793,2024-07-03T01:58:57.087000 +CVE-2024-33835,0,0,cffd31db3df6261e091005d9fb36253e75a61316a58e0e89b08946054d5f55ef,2024-07-03T01:58:57.853000 +CVE-2024-33836,0,0,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd0584d,2024-07-03T01:58:58.623000 CVE-2024-3384,0,0,f1db02aa38b819888be52a421a922174001b5f3c9e0abe3ab9082a168503f129,2024-04-10T19:49:51.183000 CVE-2024-33844,0,0,921cf446ac356d2881e6613aac60d162eae136862d065184d9b1201e02e62333,2024-06-10T18:45:09.903000 CVE-2024-33847,0,0,cec3102738820622f0167b7b117ab7c4d637fe3cf90cd38fd5f1921621ade8bc,2024-06-24T19:26:47.037000 @@ -251351,38 +251352,38 @@ CVE-2024-33849,0,0,3b4368a52b5ddf8a3c305c2346a67c77b86eca45d334812e664f6d20b43a3 CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645a8,2024-04-10T19:49:51.183000 CVE-2024-33850,0,0,158a3abac262aacbd4fb1eef86465f2f064c398c7b73e2e07333e2e0ee53ab9d,2024-06-11T13:54:12.057000 CVE-2024-33851,0,0,70fa6f94197d636021b1e88f06b3272bd3466c39938f37afc7083daec042598a,2024-04-29T12:42:03.667000 -CVE-2024-33856,0,1,e1bc615af0caf524dcab77cf6cf6563129862468d325102417ce19fd73712644,2024-07-03T01:58:59.643000 -CVE-2024-33857,0,1,b9573703f999cbfa64c65ad4975e76915087495646b59661c3236ffafa92c9ce,2024-07-03T01:59:00.423000 +CVE-2024-33856,0,0,e1bc615af0caf524dcab77cf6cf6563129862468d325102417ce19fd73712644,2024-07-03T01:58:59.643000 +CVE-2024-33857,0,0,b9573703f999cbfa64c65ad4975e76915087495646b59661c3236ffafa92c9ce,2024-07-03T01:59:00.423000 CVE-2024-33858,0,0,908335cb5f6f9fce545a8d8e396c240343dfa0c627880c76928e0dfd92f71949,2024-05-07T20:07:58.737000 CVE-2024-33859,0,0,c39c79672554484e65368e295f5b8216c172323c2ed38b2ef6778fbe14be0853,2024-05-07T20:07:58.737000 CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000 -CVE-2024-33860,0,1,4edc8dec2f427c2816a0216d7c9e23f7b50c2414633de446e641048438fa012d,2024-07-03T01:59:01.367000 -CVE-2024-33863,0,1,c260069bf74562524b59f29e5ae47ab85abe94da31d2a1859218017be058cb0f,2024-07-03T01:59:02.140000 -CVE-2024-33864,0,1,61b38f0dc43ac9d0068f6da9de00a6e65ddc35f21838a32f075823f961986d6b,2024-07-03T01:59:02.930000 +CVE-2024-33860,0,0,4edc8dec2f427c2816a0216d7c9e23f7b50c2414633de446e641048438fa012d,2024-07-03T01:59:01.367000 +CVE-2024-33863,0,0,c260069bf74562524b59f29e5ae47ab85abe94da31d2a1859218017be058cb0f,2024-07-03T01:59:02.140000 +CVE-2024-33864,0,0,61b38f0dc43ac9d0068f6da9de00a6e65ddc35f21838a32f075823f961986d6b,2024-07-03T01:59:02.930000 CVE-2024-33865,0,0,9f1dd99cceb321d30e7627b12a8d7830d5875309e5d742338b8087f86b779deb,2024-05-14T19:17:55.627000 CVE-2024-33866,0,0,85ae47904a3f92a316374427985280624457f9b9010b9d9f990ba9cbe15ad32d,2024-05-14T19:17:55.627000 -CVE-2024-33867,0,1,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000 -CVE-2024-33868,0,1,4fc50ed4e32f87e9ba3d697ac3c0b062acf2b7d48dd2fe49590aadfcab9eb4eb,2024-07-03T01:59:04.490000 +CVE-2024-33867,0,0,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000 +CVE-2024-33868,0,0,4fc50ed4e32f87e9ba3d697ac3c0b062acf2b7d48dd2fe49590aadfcab9eb4eb,2024-07-03T01:59:04.490000 CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000 -CVE-2024-33873,0,1,6ea1274dbe138465702444faa4e98a829d2dcf26c68796f03309e9049cdfe9b0,2024-07-03T01:59:05.293000 -CVE-2024-33874,0,1,d26fda7bcde0c687055ecb7e8a711b7b405c2f58134eb500396c86a8ce6f97a1,2024-07-03T01:59:06.100000 +CVE-2024-33873,0,0,6ea1274dbe138465702444faa4e98a829d2dcf26c68796f03309e9049cdfe9b0,2024-07-03T01:59:05.293000 +CVE-2024-33874,0,0,d26fda7bcde0c687055ecb7e8a711b7b405c2f58134eb500396c86a8ce6f97a1,2024-07-03T01:59:06.100000 CVE-2024-33875,0,0,d56411f6b08dc38a7f7767c8da240cc0d8e5f0e9cd402439404e4aab3eaa845c,2024-05-14T16:12:23.490000 CVE-2024-33876,0,0,855e6f1a6953572bf2abcb9512e6b09150bd51d2ecf5c5bf346f500d7866eb87,2024-05-14T16:12:23.490000 -CVE-2024-33877,0,1,b4f1b95444f84dfcef907af7774009cf66d9af779662daf465f9739beafd3f6d,2024-07-03T01:59:06.870000 +CVE-2024-33877,0,0,b4f1b95444f84dfcef907af7774009cf66d9af779662daf465f9739beafd3f6d,2024-07-03T01:59:06.870000 CVE-2024-33878,0,0,c933698b6a2548cf9b48c8259d80584290a037a34e4e04a28347b701e99d20c0,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,117309d498de43b6be44305c3d48f23c24045914c7d7039e16ab99e31775a4d8,2024-06-26T14:40:53.927000 CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000 CVE-2024-33880,0,0,7756f13a44ee301d806ebdc3733aec2a801c10bb5020ba6d2d6b54997225f784,2024-06-26T14:42:00.533000 -CVE-2024-33881,0,1,e4d10f61fc565fc8bb5fef52d9f0697958357e8d77d4357eec47a5d0b1ff7b9d,2024-07-03T01:59:07.727000 +CVE-2024-33881,0,0,e4d10f61fc565fc8bb5fef52d9f0697958357e8d77d4357eec47a5d0b1ff7b9d,2024-07-03T01:59:07.727000 CVE-2024-33883,0,0,c3d4ca3457f68fb83203c8f7576ab4f6d2af7e59b5901cd64501370e80dea4a9,2024-06-10T17:16:28.217000 -CVE-2024-33891,0,1,1989e665b70cca966ca59362172b98f189cf8e652408c4337ef1f2abce15995f,2024-07-03T01:59:08.507000 +CVE-2024-33891,0,0,1989e665b70cca966ca59362172b98f189cf8e652408c4337ef1f2abce15995f,2024-07-03T01:59:08.507000 CVE-2024-33898,0,0,fce817d892a67a37756f05aa1b381dbae2c15aaf04344df974a9160309f3b986,2024-06-25T12:24:17.873000 -CVE-2024-33899,0,1,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 -CVE-2024-33900,0,1,03828701299297702ee936c4723ae70794f1d4664c7ca2f0322872e9a7b4d7d4,2024-07-03T01:59:09.967000 +CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 +CVE-2024-33900,0,0,03828701299297702ee936c4723ae70794f1d4664c7ca2f0322872e9a7b4d7d4,2024-07-03T01:59:09.967000 CVE-2024-33901,0,0,75e1f4bc73d73047b93bc18aaf649342f4e272c76affbb46aef808d0b0e62e7d,2024-05-21T17:15:09.143000 CVE-2024-33903,0,0,d2659cb95032f4bf4e82ec7ebb3e3a955a9eb80acf170b021644b79abb230380,2024-04-29T12:42:03.667000 CVE-2024-33904,0,0,4e23880abf5747270fb682428cdb1c8d9da3ad9f2ae0530104035f429e5a2c50,2024-04-29T12:42:03.667000 -CVE-2024-33905,0,1,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000 +CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000 CVE-2024-33907,0,0,61fea348950e38683146d14305d27d67cff3f826a8055e478155b8c1d0ac0243,2024-05-07T13:39:32.710000 CVE-2024-33908,0,0,a88a69da4efefbaf00105bd137ff32d6ed2880bc8a96e30239b8820c98589ef1,2024-05-07T13:39:32.710000 CVE-2024-33910,0,0,74d376387ced889738dadc60e33e92e139a28a86011b172915a176ec8c222a4e,2024-05-06T19:53:38.797000 @@ -251430,18 +251431,18 @@ CVE-2024-33953,0,0,3b3356729af80b251661673310f8c56f44f10df5bf865f8c660a36c2bb489 CVE-2024-33954,0,0,c503ae766ab5514537a2f4c6d4b14a345a29e519b230f4073c9e782b0bbe69b4,2024-05-14T16:12:23.490000 CVE-2024-33955,0,0,2ca854ebde5acdbe9a0cbc52fdc48933a592e02407281f304c8b2d9d1c5c771f,2024-05-14T16:12:23.490000 CVE-2024-33956,0,0,a3addf39e4aabbdc7e441806152a9a1df58e40ee38caf2a4eb3a2e733fe2d75d,2024-05-14T16:12:23.490000 -CVE-2024-33996,0,1,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000 +CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000 CVE-2024-33997,0,0,5b3612b220337f25b38467e1f212b70c162181eb47e4ddfb3415753caaffd55c,2024-06-03T14:46:24.250000 CVE-2024-33998,0,0,8e63d48b15f2262d35a843f7a9457e23af5aee5d3e86bbbc94e2e28ec7b3fa32,2024-06-03T14:46:24.250000 CVE-2024-33999,0,0,29bc13d19be6e74644ffe59df0021a7993dee82b6ee04438762d3af2a303cb95,2024-06-03T14:46:24.250000 CVE-2024-3400,0,0,ca612a9a9d0abd8952e404012cd7953d185fcc4b36e6c122ae2aa18b847a21b3,2024-05-29T16:00:24.093000 CVE-2024-34000,0,0,1b1400b3cd4799709e56e84cd96e17fe69958143350c73cc3953431c0cfbc9f1,2024-06-03T14:46:24.250000 -CVE-2024-34001,0,1,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000 +CVE-2024-34001,0,0,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000 CVE-2024-34002,0,0,e20f7d66d4bb801f75c42da8485bbbac3c60286e9a30c92c02828980a462847e,2024-06-03T14:46:24.250000 -CVE-2024-34003,0,1,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000 +CVE-2024-34003,0,0,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000 CVE-2024-34004,0,0,c514bda174a2863f34ff466c3a19f37251b541102fe3a4c330e8c4883a7a54c2,2024-06-03T14:46:24.250000 CVE-2024-34005,0,0,100728f5097165a5959e76178c5d67a827841686e3af57acac8bc0c76f34715a,2024-06-03T14:46:24.250000 -CVE-2024-34006,0,1,395648fff5e3bb9db979037721cab37ad30235177e6b8c53ee620b321ccc7d74,2024-07-03T01:59:15.730000 +CVE-2024-34006,0,0,395648fff5e3bb9db979037721cab37ad30235177e6b8c53ee620b321ccc7d74,2024-07-03T01:59:15.730000 CVE-2024-34007,0,0,128bcc830b5d69de01e6d3263d335a3cdda7f94aac607ac9823d74e02f9b6c9c,2024-06-03T14:46:24.250000 CVE-2024-34008,0,0,edc66ba59c24fe86c5737696ef5e1beb12d9c8c54bd644a71789cd3b77a014b0,2024-06-03T14:46:24.250000 CVE-2024-34009,0,0,6ddbdcd2f8161372a9bcdefda9c8b3e3050867c707ff64c3c31650ed3f1f8522,2024-06-03T14:46:24.250000 @@ -251449,20 +251450,20 @@ CVE-2024-34010,0,0,c31f2f180475c1f3f2204c1feb2010c5ada948eb1b4d37517c54f97316341 CVE-2024-34011,0,0,4e2e0fb5d64e6e75da5ff3561c6f86ff1f891a3646e890e015512c561d328a58,2024-04-30T13:11:16.690000 CVE-2024-34012,0,0,f1411ce42e8800b234994197ea4049bb546138b11d36384d7fb2107e804a3455,2024-06-17T12:42:04.623000 CVE-2024-3402,0,0,e994f4abb2ec0efc27de74bd789f4b69dd0341c920e8e4136eb625b5fd69d8ce,2024-06-07T14:56:05.647000 -CVE-2024-34020,0,1,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 +CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 CVE-2024-34024,0,0,10e33d292073b520b667747f9d1f0728699da6905036151d86e343d924c712be,2024-06-20T12:44:01.637000 CVE-2024-34025,0,0,7910ed3f49f27cc3d6e29efd0456c14b8fa97ed1ac57b4183c41d497d3215ba0,2024-05-16T13:03:05.353000 CVE-2024-34027,0,0,e397fca17c7df014adc9f3ce444d12c38313597f0e3ff23bd3fd7d4b1959c585,2024-06-24T19:26:47.037000 CVE-2024-34029,0,0,4169ae74794d01d0e86a2d5b95da9173d7cd134e14e2c2e7fdcc6668ef8aab4e,2024-05-28T12:39:28.377000 CVE-2024-3403,0,0,351b7361a62b75fa01065ca2b4d00dead5236a2356f9f11be8885ee6cd82884b,2024-05-16T13:03:05.353000 -CVE-2024-34030,0,1,4aa6c6f880a939dd30e0afb4ad95dc9841c13fda89f46a9df825aad2f3b3008a,2024-07-03T01:59:17.300000 +CVE-2024-34030,0,0,4aa6c6f880a939dd30e0afb4ad95dc9841c13fda89f46a9df825aad2f3b3008a,2024-07-03T01:59:17.300000 CVE-2024-34031,0,0,32832cbb1e8c12d82b1b4f0b17dd8da5298483e844da3b9dfde76f943f816f64,2024-05-03T12:50:34.250000 CVE-2024-34032,0,0,5a4c84545c086e02a753cbdc2a69955417aff416961e34fcc07fc6e9fddc4770,2024-05-03T12:50:34.250000 CVE-2024-34033,0,0,719a8ff9b4eb14602d2888920177741310f8b0330069ca799cf076b91625a4df,2024-05-03T12:50:34.250000 CVE-2024-3404,0,0,6e17c41fd2ac1693dde4618a5f61498fd7ee98f9bce0873b88bd7dd4dfede7da,2024-06-07T14:56:05.647000 CVE-2024-34043,0,0,7ca1282f168b2382fda735851194a0d4cf0b96b9e0efe68d472278215068d68e,2024-04-30T13:11:16.690000 CVE-2024-34044,0,0,1b80936b6f5ff7a9f74aadc7ee541de569f6d2545da0250429d475e804224350,2024-04-30T13:11:16.690000 -CVE-2024-34045,0,1,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 +CVE-2024-34045,0,0,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 CVE-2024-34046,0,0,9255585df9d7a51a380efebf772692118266a4c64a9f939689e6f2a8d4a6a674,2024-04-30T13:11:16.690000 CVE-2024-34047,0,0,aacdfb21458e74a2fab076317c61bb2dde19e6dfaa3fa2d4b3b2228c3638b166,2024-04-30T13:11:16.690000 CVE-2024-34048,0,0,8c496f871a2c0d981af3777efae32f5c577cc3a739ddfa90d08b574a8ed636cf,2024-04-30T13:11:16.690000 @@ -251471,7 +251472,7 @@ CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0b CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000 CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000 CVE-2024-34055,0,0,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000 -CVE-2024-34058,0,1,cfbb8590d55f48cefc143414c8f3d439d56763f898de84d852e391cab57a6cc6,2024-07-03T01:59:19.210000 +CVE-2024-34058,0,0,cfbb8590d55f48cefc143414c8f3d439d56763f898de84d852e391cab57a6cc6,2024-07-03T01:59:19.210000 CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000 CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000 CVE-2024-34061,0,0,3ce76c3220f695556e9bc43d23c63a4d4d07710be053bec43ac41fe85d030b22,2024-05-02T18:00:37.360000 @@ -251483,7 +251484,7 @@ CVE-2024-34066,0,0,e7ea762d407e43f2240bb3754ec52285087c0f293e145c429f01621948c32 CVE-2024-34067,0,0,44f51ac699d7dc59dc5c4d716fb932669e0775f482117289b722cd92c6ee4f2f,2024-05-06T12:44:56.377000 CVE-2024-34068,0,0,6b5e10382809437662673061404a0c29ee6d46eb60b53e78fc9d6699f4c6fea5,2024-05-06T12:44:56.377000 CVE-2024-34069,0,0,1fa2a4267b3e8d89656a4d9b27b372ba9fdb15119ce17e6289ed7cc0fb6b1c35,2024-06-14T13:15:51.803000 -CVE-2024-3407,0,0,b10fd772df28678f25889b1a606462137e8c5378f492e8968048b136493a201e,2024-05-15T16:40:19.330000 +CVE-2024-3407,0,1,57bb5233c65259bd74c4e5931601d053b144d9e3f42a0aa06bc1010a283d6a90,2024-07-03T02:06:12.480000 CVE-2024-34070,0,0,298deb9b735702f1cdd1af9a9d57c62408035e9d8bf7379797eb1644eab412c1,2024-05-14T16:12:23.490000 CVE-2024-34071,0,0,21e2e12630a23744051ebc72b588ef65638db84ae62628b7d5b3b42e371622bc,2024-05-21T16:54:26.047000 CVE-2024-34072,0,0,2d2c1ae5c2f9bbde7edb4bd54db49d595645c0c688527595e3a7dbf6ccdcee5d,2024-05-03T12:48:41.067000 @@ -251504,9 +251505,9 @@ CVE-2024-34086,0,0,c6d9a7386c842d5c59ea9979eb5dbfe478217d9b6c600c2b728171f329aa0 CVE-2024-34088,0,0,6883a0b70d0dde6a9cd88ea6282b05e33733ec87c48078fd4a071d0cb0aef5b0,2024-04-30T19:35:36.960000 CVE-2024-34089,0,0,c4995c5899bf75c17002edf2297d054d02cbc010ded6b6614d0c1fcb408f32ea,2024-05-06T19:53:38.797000 CVE-2024-34090,0,0,73f27f58371a8666265526d07222810acdb885707b1b55123938a5e2539034cc,2024-05-06T19:53:38.797000 -CVE-2024-34091,0,1,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000 +CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000 CVE-2024-34092,0,0,079ea99bb21d4c1a138d545f7e5e5abbd38b83ad27446c874b351279df34c3ee,2024-05-06T19:53:38.797000 -CVE-2024-34093,0,1,a3683f2cbbe3f4d2616fb123bbb1ded4218b58d2ed8c82d304f478e8d6150d29,2024-07-03T01:59:22.817000 +CVE-2024-34093,0,0,a3683f2cbbe3f4d2616fb123bbb1ded4218b58d2ed8c82d304f478e8d6150d29,2024-07-03T01:59:22.817000 CVE-2024-34094,0,0,c836e2e886b9fc0dadeaaa957653b7fdc02a907af4086f6d954d9c03245716a6,2024-05-15T16:40:19.330000 CVE-2024-34095,0,0,08f61da3eac92d19915475779f2e0cf8d56e67ffbd3cb3bacdeaea2c908570fc,2024-05-15T16:40:19.330000 CVE-2024-34096,0,0,b211b538fffe9abfd3a63762f76226325b711bcb377209279662a8a0721f8522,2024-05-15T16:40:19.330000 @@ -251523,7 +251524,7 @@ CVE-2024-34106,0,0,379b7518cf47c9fcf9ce9717219ccac8597ca16082474660c50581081fd17 CVE-2024-34107,0,0,d2f3870a43c205b2448aa65f92934220f0658aa8d0088b529cb31befd4bedcea,2024-06-13T18:35:19.777000 CVE-2024-34108,0,0,bb12eb7dd6a2649cf8bd2801997e40cde5207cc16d043a28f0170b9a605c08ca,2024-06-13T18:35:19.777000 CVE-2024-34109,0,0,cf5e8a812443afb88cfa97a8986adef054620c0d2dde9ad1aeffdd52b917aa4d,2024-06-13T18:35:19.777000 -CVE-2024-3411,0,0,1527ccef7805d20e12db1e61173246b27470986be341d9b24d7b20f806f94433,2024-04-30T19:35:36.960000 +CVE-2024-3411,0,1,753c5e9411d41df3bfbeb914d93b6273ea5227bd5a2c5433a08dd93c6f600b0c,2024-07-03T02:06:13.437000 CVE-2024-34110,0,0,ef92d28f1b38097967948e65fa35a5dca1d443b57dc19fe03c3d290fa97f4b9a,2024-06-13T18:35:19.777000 CVE-2024-34111,0,0,387dd165d065b948c8a5768b1f68d89ac77a10ca7e7a87764391af989d1e4d7a,2024-06-13T18:35:19.777000 CVE-2024-34112,0,0,4931d605140765fe4fb44ae044404453bc096c0375b5ddafd6dc116348487a5d,2024-06-13T18:35:19.777000 @@ -251540,11 +251541,11 @@ CVE-2024-34130,0,0,89584332f9dd3125064424fac4aabed722eb075df05ba25c9a02617aa8a68 CVE-2024-3414,0,0,69231815197d8c759df4a79a39950c8d4f6258471ea32f1c29be1a7038b6ec47,2024-05-17T02:39:54.160000 CVE-2024-34141,0,0,0328c765f70a818d854683e04e980b09961525d5dd8879ace860d192776bc00d,2024-06-25T12:24:17.873000 CVE-2024-34142,0,0,c526b1831039e375b135e55cb58a71752c1b1dd1103a82d9d4050eb194a5f7f7,2024-06-25T12:24:17.873000 -CVE-2024-34144,0,1,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000 -CVE-2024-34145,0,1,38c44993a1dc70421d8e9284263c594effe0d087a5df7c7a4b3ac5e8c821ff86,2024-07-03T01:59:26.520000 -CVE-2024-34146,0,1,787b7a8aac402effb291b025d8f2aec84609a236cac974fe09cd7845739a936f,2024-07-03T01:59:27.270000 -CVE-2024-34147,0,1,d9d77d8f0db4502f689561e9042a311ab3573d6b584b25af82549f0ad3fc4dcb,2024-07-03T01:59:28.043000 -CVE-2024-34148,0,1,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b080,2024-07-03T01:59:28.797000 +CVE-2024-34144,0,0,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000 +CVE-2024-34145,0,0,38c44993a1dc70421d8e9284263c594effe0d087a5df7c7a4b3ac5e8c821ff86,2024-07-03T01:59:26.520000 +CVE-2024-34146,0,0,787b7a8aac402effb291b025d8f2aec84609a236cac974fe09cd7845739a936f,2024-07-03T01:59:27.270000 +CVE-2024-34147,0,0,d9d77d8f0db4502f689561e9042a311ab3573d6b584b25af82549f0ad3fc4dcb,2024-07-03T01:59:28.043000 +CVE-2024-34148,0,0,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b080,2024-07-03T01:59:28.797000 CVE-2024-34149,0,0,6718ff54c28c47b83499c8438323ca646d2bd3d2cb77ff497c0ecd581cc61196,2024-05-17T02:39:31.800000 CVE-2024-3415,0,0,ac982b4864f8e4a7bf9d1d27366b734c59c6abb888535e3c9066ef082f3066d3,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,04467579c4bab25309b1030ce0ec0a344d1fe4e96fcb332263f7aeba2730f816,2024-05-28T12:39:28.377000 @@ -251557,70 +251558,70 @@ CVE-2024-3419,0,0,aeca19960cd1f95bdadc5c30b5b727390552e333abdda78cd3d5486ef78495 CVE-2024-34191,0,0,27b1c620282570c87b9d36cf383a2ab3527ffa825ce9edfd9e46e92b141fd915,2024-05-14T19:17:55.627000 CVE-2024-34193,0,0,d492fcf35655541322fc4447180a69459414c1b3edfb33067e06f67fde02568f,2024-05-20T19:34:58.277000 CVE-2024-34196,0,0,4e80cd162a6469d87fbc5160248bcd148f17d7e9ff6e8d925ea5afbae398c96d,2024-05-14T16:12:23.490000 -CVE-2024-34199,0,1,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 +CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 CVE-2024-3420,0,0,b23336ce8c63df177a870ef266a5c8c6a1f5d11f9f70c90daa106ac2bb4085f4,2024-05-17T02:39:54.717000 -CVE-2024-34200,0,1,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 -CVE-2024-34201,0,1,331c15ea4d8678817fc4a039b90628979e4d12ceb52da635433fde95bd8259d3,2024-07-03T01:59:31.177000 -CVE-2024-34202,0,1,10e2af653aecf5939b67ff5397946eb97268ba48cfc20999e9653a29203a02fa,2024-07-03T01:59:31.937000 -CVE-2024-34203,0,1,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68d04,2024-07-03T01:59:32.703000 +CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 +CVE-2024-34201,0,0,331c15ea4d8678817fc4a039b90628979e4d12ceb52da635433fde95bd8259d3,2024-07-03T01:59:31.177000 +CVE-2024-34202,0,0,10e2af653aecf5939b67ff5397946eb97268ba48cfc20999e9653a29203a02fa,2024-07-03T01:59:31.937000 +CVE-2024-34203,0,0,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68d04,2024-07-03T01:59:32.703000 CVE-2024-34204,0,0,37f521335803858a894e2b0926e961c46c3fe90cc77031ddff770d0c70d2c42e,2024-05-14T16:12:23.490000 -CVE-2024-34205,0,1,5e6ec1f83f8df2b44ee77e87d09f991b3d26ad92e17843fda65dc4a06a8d8d48,2024-07-03T01:59:33.503000 -CVE-2024-34206,0,1,bf2b14d36cc1c2097afe17c99c0cac4b916ae816d9a6bfbf97f078b15fc27e67,2024-07-03T01:59:34.333000 +CVE-2024-34205,0,0,5e6ec1f83f8df2b44ee77e87d09f991b3d26ad92e17843fda65dc4a06a8d8d48,2024-07-03T01:59:33.503000 +CVE-2024-34206,0,0,bf2b14d36cc1c2097afe17c99c0cac4b916ae816d9a6bfbf97f078b15fc27e67,2024-07-03T01:59:34.333000 CVE-2024-34207,0,0,a9d15ded434afef2ced0f4d6437effdde6ba5b08331af0ee1d355c5202afda0e,2024-05-14T16:12:23.490000 -CVE-2024-34209,0,1,4ad44bfcbcf039f986b2d526a19d98c15b5b8bb73456978475253049b47762bd,2024-07-03T01:59:35.650000 +CVE-2024-34209,0,0,4ad44bfcbcf039f986b2d526a19d98c15b5b8bb73456978475253049b47762bd,2024-07-03T01:59:35.650000 CVE-2024-3421,0,0,9c8199a47366d379daede939206537984d9bce885e546669d64fb80971a66b54,2024-05-17T02:39:54.817000 -CVE-2024-34210,0,1,02626780bed2bd793e39eb14595382898b75f6bd94088cfe6237dd06a298d5c6,2024-07-03T01:59:36.677000 +CVE-2024-34210,0,0,02626780bed2bd793e39eb14595382898b75f6bd94088cfe6237dd06a298d5c6,2024-07-03T01:59:36.677000 CVE-2024-34211,0,0,2c2ca2aaccb13a7e146ada35a5ee76936b06e465ea24373a846c5619216e8b87,2024-05-14T16:12:23.490000 -CVE-2024-34212,0,1,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000 -CVE-2024-34213,0,1,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000 -CVE-2024-34215,0,1,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000 +CVE-2024-34212,0,0,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000 +CVE-2024-34213,0,0,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000 +CVE-2024-34215,0,0,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000 CVE-2024-34217,0,0,3bf5a0bb48bcdfa6a9a074bdb05727ccace87ac6abb128f2eb080b8a8bf73b7e,2024-05-14T16:12:23.490000 -CVE-2024-34218,0,1,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5c0d,2024-07-03T01:59:39.750000 +CVE-2024-34218,0,0,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5c0d,2024-07-03T01:59:39.750000 CVE-2024-34219,0,0,032d69998a74aede4c60c30cf6d1f1ac164a1a7a95162073d56c7091c1ca3240,2024-05-14T16:12:23.490000 CVE-2024-3422,0,0,6dd3fc1591cb989cb039484a97f7d4d1b3fce2fb1b6c8e98440345fc7f164033,2024-05-17T02:39:54.907000 -CVE-2024-34220,0,1,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 -CVE-2024-34221,0,1,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000 -CVE-2024-34222,0,1,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 +CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 +CVE-2024-34221,0,0,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000 +CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 CVE-2024-34223,0,0,fbeee087a582b9540d530eea3602e847dd91a3e89190044649c0a7b6b84a9916,2024-05-14T16:12:23.490000 CVE-2024-34224,0,0,89ccf4b53445891b1974d2ddc7c382dc7404fd435fa7a69e93cd1cb1cf5b6f22,2024-05-14T16:12:23.490000 -CVE-2024-34225,0,1,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 +CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 CVE-2024-34226,0,0,af86130198a1be41c1020d608a59584c729d17e5eedb09d523865704009de000,2024-05-14T16:12:23.490000 CVE-2024-3423,0,0,8665fcd9107d2ecb4cb52657beb8f12ab52765f88b392f57018d69a80a5785b3,2024-05-17T02:39:54.990000 CVE-2024-34230,0,0,d94278dd5be9b7072d77b40aa5803a04584269e9d8ed42fe3d845cd9db307679,2024-05-14T16:12:23.490000 CVE-2024-34231,0,0,f81ed1ca676437e260cf9aa5b5a801d7846623ebfddedb6871fdf9d1c15c449c,2024-05-14T16:12:23.490000 CVE-2024-3424,0,0,a54a43c6958e83ca08d926c6db53c591f33edbf26b4382a0bb0f2ec4f7ba0ad6,2024-05-17T02:39:55.073000 CVE-2024-34240,0,0,dfcda03bbf447d4c2dd1de139b6f1edab9ac275202c87fee372600fc9722ee04,2024-05-22T12:46:53.887000 -CVE-2024-34241,0,1,dfcf8e51cf99490944ad55b4d7efbac771f91027fe853fbf51050e455e0ec2d6,2024-07-03T01:59:43.687000 +CVE-2024-34241,0,0,dfcf8e51cf99490944ad55b4d7efbac771f91027fe853fbf51050e455e0ec2d6,2024-07-03T01:59:43.687000 CVE-2024-34243,0,0,3bcb56ac06c11871ed21e998c6490784523666679d058904e5eec3bac4649969,2024-05-14T19:17:55.627000 -CVE-2024-34244,0,1,a26bfd7a4c49ba50484ca76340a595b71efe617bcf4043b16d0002cb15e33d74,2024-07-03T01:59:44.530000 +CVE-2024-34244,0,0,a26bfd7a4c49ba50484ca76340a595b71efe617bcf4043b16d0002cb15e33d74,2024-07-03T01:59:44.530000 CVE-2024-34245,0,0,64a679ccac2bd1e7d810b4b5a11028c70ee810ea1bc383eda2361bf020aad3f8,2024-05-14T16:12:23.490000 -CVE-2024-34246,0,1,335d7e6142113fc73612fa11fce8ff9e0bed0ba29ee83e94c66b8177c509d2c4,2024-07-03T01:59:45.300000 -CVE-2024-34249,0,1,76288a8f8b73f43cdaccb9883116279113e529ae1b4481e6c10bf04ce9d0c49d,2024-07-03T01:59:46.180000 +CVE-2024-34246,0,0,335d7e6142113fc73612fa11fce8ff9e0bed0ba29ee83e94c66b8177c509d2c4,2024-07-03T01:59:45.300000 +CVE-2024-34249,0,0,76288a8f8b73f43cdaccb9883116279113e529ae1b4481e6c10bf04ce9d0c49d,2024-07-03T01:59:46.180000 CVE-2024-3425,0,0,86d8ae517d4b4b8afbc91acb063674f44a9b392c3ea866179ce57420c243f0ae,2024-05-17T02:39:55.157000 -CVE-2024-34250,0,1,f4b19ad9252772265d578a0ee4d340d1be61778ce996bf871f0e59f9069875d2,2024-07-03T01:59:47.113000 -CVE-2024-34251,0,1,25fee35991321980af574ec031ad1bf30dfcc5a1f1d3b6d4e81940757de9b231,2024-07-03T01:59:48.090000 +CVE-2024-34250,0,0,f4b19ad9252772265d578a0ee4d340d1be61778ce996bf871f0e59f9069875d2,2024-07-03T01:59:47.113000 +CVE-2024-34251,0,0,25fee35991321980af574ec031ad1bf30dfcc5a1f1d3b6d4e81940757de9b231,2024-07-03T01:59:48.090000 CVE-2024-34252,0,0,31bb8a2950b6912074be7ee48fc32c61e907b50fb159aca156077c558dda1516,2024-05-06T16:00:59.253000 -CVE-2024-34255,0,1,df9fc147599d4b56a58626b2e11d564dc5f867fdcafae7981130ab159cbdf4a2,2024-07-03T01:59:48.913000 -CVE-2024-34256,0,1,6220269db052ab81edb92c6f9acb6971b653bd049f7e6b4252582ddd7f8f1dc7,2024-07-03T01:59:49.690000 +CVE-2024-34255,0,0,df9fc147599d4b56a58626b2e11d564dc5f867fdcafae7981130ab159cbdf4a2,2024-07-03T01:59:48.913000 +CVE-2024-34256,0,0,6220269db052ab81edb92c6f9acb6971b653bd049f7e6b4252582ddd7f8f1dc7,2024-07-03T01:59:49.690000 CVE-2024-34257,0,0,fbd84b9c65ecd13d768bb5975b92131a2fdb6999482cee32ad98ede789e75941,2024-05-21T19:15:10.090000 CVE-2024-3426,0,0,3fab9d5e13d65987226b3eacf3176bf8413014b60d8c9b42a797460ba9ed2de0,2024-05-17T02:39:55.250000 CVE-2024-3427,0,0,8ec8e862f797bb81b9d4ca614d2eae08e844bf2eeab6da619bcde489396cea28,2024-05-17T02:39:55.333000 CVE-2024-34273,0,0,9a2fb0e3f02cab13377b15bc3ebeb83f8916934fba1719cf7e91c12ce4f829c2,2024-05-17T18:36:31.297000 -CVE-2024-34274,0,1,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000 +CVE-2024-34274,0,0,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000 CVE-2024-3428,0,0,6bd12c0e792d3206173879dbc2d07d17480b1dc620de60ecd99e55318e421784,2024-05-17T02:39:55.420000 CVE-2024-3429,0,0,142a702623e51f7167cd4d2dfb301671577283ae70e145eca4d03920b0a9bcc1,2024-06-07T14:56:05.647000 CVE-2024-3430,0,0,26511d7640da51b7d570c3e3e64dcd51a1ae1a874f887e17d041871761404897,2024-05-17T02:39:55.503000 -CVE-2024-34308,0,1,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000 +CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000 CVE-2024-3431,0,0,455a9b01059963fcb0a3456cd2358856e44f5db237eb4ee1c03f1b9fc99bc502,2024-05-17T02:39:55.597000 CVE-2024-34310,0,0,66df9c89974c6825f0e7d33b795a4985a07b16f5413b2fe4d7327eaf5fe9cf52,2024-05-14T16:12:23.490000 CVE-2024-34312,0,0,42ebb218a5fc0e270a6fe4891325f23ff4f98cc82876e3ff17e1e916fd05efa1,2024-06-25T12:24:17.873000 -CVE-2024-34313,0,1,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70a40,2024-07-03T01:59:52.040000 +CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70a40,2024-07-03T01:59:52.040000 CVE-2024-34314,0,0,0107b5ea4eb283c867d7bcf45b9a1b1b8c09b93e02d17eb326a855e2eae22472,2024-05-07T20:07:58.737000 -CVE-2024-34315,0,1,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 +CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 CVE-2024-3432,0,0,c54577582bdbc3937c3144599074e1b9739b0a7ed62b33767d62fe9e77c22e2b,2024-05-17T02:39:55.693000 CVE-2024-3433,0,0,d8fe0ffd32e9fb3f3bfbfe278a5e952300a650397e5632010fbf07827a8c84d4,2024-05-17T02:39:55.780000 -CVE-2024-34332,0,1,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 -CVE-2024-34338,0,1,0b7082b91aa78856b4b16b824fb5642c1377f61ea50b332ded8dd5ce396d2aa9,2024-07-03T01:59:54.407000 +CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 +CVE-2024-34338,0,0,0b7082b91aa78856b4b16b824fb5642c1377f61ea50b332ded8dd5ce396d2aa9,2024-07-03T01:59:54.407000 CVE-2024-3434,0,0,e5e1f6c3f83a330c95098e301aa118cb27dcfcb5f7977633532da07dcd9b5499,2024-05-17T02:39:55.870000 CVE-2024-34340,0,0,3716ef6a533c1fa5301121efa934b32a4483b996c3342b94e030572193ac6a5a,2024-06-10T17:16:28.827000 CVE-2024-34341,0,0,f37d69cf5bf50561e35500a7e90f2b7d080eebb75e274e57cc9fba16796bd69b,2024-05-07T20:07:58.737000 @@ -251682,12 +251683,12 @@ CVE-2024-34397,0,0,70854b1ad6ab06679e1af787bf84a8a6de29444e6873fb72f86f5216cc743 CVE-2024-3440,0,0,b6e021f0a39374e5963047ffe0e563b4f8644f79c10282228c1df76f022468ec,2024-05-17T02:39:56.370000 CVE-2024-34400,0,0,e8519dd13fbf5464c7676c8cf94fdad109e7bb0206ce725dc62d2fd8b95ef432,2024-06-26T12:44:29.693000 CVE-2024-34401,0,0,0cfb896ccce711bbc7db6c4bbd385298b085bc508f7ecdead1ed17bc160057da,2024-05-03T12:50:34.250000 -CVE-2024-34402,0,1,40c1c09e73a5e121ad069e420d9f5e2215153ab4f3ce6510830030c249155906,2024-07-03T01:59:58.723000 -CVE-2024-34403,0,1,a772c000336bb8be08b5529657346fe94b3dd49c540ea077515808f0de4e0beb,2024-07-03T01:59:59.493000 +CVE-2024-34402,0,0,40c1c09e73a5e121ad069e420d9f5e2215153ab4f3ce6510830030c249155906,2024-07-03T01:59:58.723000 +CVE-2024-34403,0,0,a772c000336bb8be08b5529657346fe94b3dd49c540ea077515808f0de4e0beb,2024-07-03T01:59:59.493000 CVE-2024-34404,0,0,4cf79ec0e52c18a8578c4661fc10cbf04d041740040a70674bf6d5499a83f663,2024-05-03T12:50:34.250000 -CVE-2024-34405,0,1,ef98b8f0239394151e55685ca5e6b90093a0ec1a4c0b84ee10f6283d58a6ba28,2024-07-03T02:00:00.383000 +CVE-2024-34405,0,0,ef98b8f0239394151e55685ca5e6b90093a0ec1a4c0b84ee10f6283d58a6ba28,2024-07-03T02:00:00.383000 CVE-2024-34406,0,0,f06da877eafee71b3eab9bec17faad9d11b96416e1bd2e4c44970ff2ef3c2142,2024-06-13T18:36:09.013000 -CVE-2024-34408,0,1,abf017611e0417f256a7bd2b0f28d70e2a9494b10fc034d68f1ef92afd0fd7e0,2024-07-03T02:00:01.550000 +CVE-2024-34408,0,0,abf017611e0417f256a7bd2b0f28d70e2a9494b10fc034d68f1ef92afd0fd7e0,2024-07-03T02:00:01.550000 CVE-2024-3441,0,0,8906c475fe42e8064f831b67da9a8acaf93111ca107044a302235d95883712ee,2024-05-17T02:39:56.467000 CVE-2024-34411,0,0,fbb1735a6de85c00d8e3a7ee46274d79cf469c7f7382d1755784e0c027375be5,2024-05-14T16:12:23.490000 CVE-2024-34412,0,0,ebf9aa81c46e7e18ab298c1d0c6caf18455f80ca2b2b5a9a0ef2a115d4e3e2c7,2024-05-06T19:53:38.797000 @@ -251733,57 +251734,57 @@ CVE-2024-34449,0,0,97d09fdadfd613905dbfd9871f1d974c32ae8fd0c469e4b64fe2252427eb7 CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000 CVE-2024-34451,0,0,e70710b537fe2eeb930751f9cb9f8206f6cd9179f5b8e341e64ba4d6bec23b04,2024-06-17T12:42:04.623000 CVE-2024-34452,0,0,1539d23d88439359c8056a55b62128368abc940cc3fe41e5eb768680fb4e9509,2024-06-24T12:57:36.513000 -CVE-2024-34453,0,1,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000 -CVE-2024-34454,0,1,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 -CVE-2024-34455,0,1,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 +CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000 +CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 +CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 CVE-2024-34459,0,0,b190ab894bfa61268f2171d95b164182c7b97f2f25f3dedd03418dad2239c2df,2024-06-10T18:15:34.930000 CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,99c6d0d412292b29abd0eb6b005513cae3139ce4a46c3a1130ade276e61e2a09,2024-05-06T12:44:56.377000 -CVE-2024-34461,0,0,2a236ceaca3a093c5fd8c7e190397c18e1c79e84a07d33e6c0476230dd6f4789,2024-05-06T12:44:56.377000 -CVE-2024-34462,0,0,143fa078dbd399415573f2f781d6f37adfaf8fe7791e3821230cc7b7ff1bfa27,2024-05-06T12:44:56.377000 +CVE-2024-34461,0,1,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000 +CVE-2024-34462,0,1,8a88747aa45fa0ff08468c03145b77f14c23a2c5a801117a3645ac9e35ca3df3,2024-07-03T02:00:09.780000 CVE-2024-34466,0,0,dcb84331447b0337457fa6227ff5df8fd1e06a206cd354189f985bab3feb6181,2024-05-06T15:15:24.473000 CVE-2024-34467,0,0,95c6cc8baa0369b7efcdf8bf7ebbf6be364e923ab4bf96b6bd3cddae28bde482,2024-06-12T15:15:52.083000 CVE-2024-34468,0,0,a40ff6fb5b40ba197993bb345fa17becf6195272ce9db7f4f3085d63801852aa,2024-05-06T12:44:56.377000 CVE-2024-34469,0,0,cc38c52cb01a5bd7d1ef7476faf1d55aeed17cdf4eba155d2e9487cc36f60510,2024-05-06T12:44:56.377000 -CVE-2024-34470,0,0,7563a552ca2be8a7bfec68cf96ce2167a4e74ad20fa48edfb3bf720fb3040d7f,2024-05-06T16:00:59.253000 -CVE-2024-34471,0,0,d35c6ca51ed215341f8739c999b3835ba89c4ffde7a3f1af4a19f9a90869780c,2024-05-06T19:53:38.797000 -CVE-2024-34472,0,0,67ec9206c396674795926a026bcb97212ce813e7e8b8f0e6ac9cd84dfb8734cd,2024-05-06T16:00:59.253000 +CVE-2024-34470,0,1,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000 +CVE-2024-34471,0,1,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000 +CVE-2024-34472,0,1,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000 CVE-2024-34473,0,0,a0e81d4e65e4f59fc6788a67ab9abe6ae8169dfe1411246b36c4680fde1afa89,2024-05-06T12:44:56.377000 CVE-2024-34474,0,0,3df656c76dccd5c0b812eaec7b5241dc606cf859dfb7b55dfdb0e2ac6d92fbbf,2024-05-06T12:44:56.377000 -CVE-2024-34475,0,0,bc3b000674e2f5e5d8987a5a03c7029744124543abeafbfeb540e90342057172,2024-05-06T12:44:56.377000 +CVE-2024-34475,0,1,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522386,2024-07-03T02:00:14.950000 CVE-2024-34476,0,0,f460d7b07cd8e1102230047a90895024b7118c0a722ec4264bd02b84a90ba448,2024-05-06T12:44:56.377000 CVE-2024-34477,0,0,1582bb27a51733ef5d8216b768cf631f7623fa6704a59528ef32a8f5c53cec81,2024-06-07T14:15:10.293000 CVE-2024-34478,0,0,e041b25b36e3062d0ab338fb8a5bf2a23de65e7f383d14a7d54f9bd405368aa0,2024-05-06T12:44:56.377000 CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000 -CVE-2024-34483,0,0,df92e60b2a063249d7c7eb5d2fcb2d7b0c92f9a83d882b5d628cf9e21e289c65,2024-05-06T12:44:56.377000 +CVE-2024-34483,0,1,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000 CVE-2024-34484,0,0,627f49dadca95e26dd01857c2e82a7ff7d913e52fd5d19d3f5a26ae697877b79,2024-05-06T12:44:56.377000 CVE-2024-34486,0,0,26f6d0ef1222cf4bd0474871265bd9abd6351340002c593000a39a9f2c434af7,2024-05-06T12:44:56.377000 CVE-2024-34487,0,0,efbf0ae9a611ba35825c395b4907de516ef173da0cf174abaf0225872c9c45f0,2024-05-06T12:44:56.377000 -CVE-2024-34488,0,0,3dda09c30cfd6ed897bbc17de18d224a6bf90ac56e1a48e08f23004964675959,2024-05-06T12:44:56.377000 -CVE-2024-34489,0,0,e01a4d33f1770b1b7fa187d950c18b108d9baa7953c9fc9d37485d8adcea0a14,2024-05-06T12:44:56.377000 -CVE-2024-34490,0,0,79a8494551c141d55fde12895c0bdea68f3b2c63e33bc01c8265c61468a18f10,2024-05-06T12:44:56.377000 +CVE-2024-34488,0,1,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000 +CVE-2024-34489,0,1,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000 +CVE-2024-34490,0,1,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000 CVE-2024-34500,0,0,76a7c61c371b86f658f4a0decd1d0b929364c8584d995bff0ce66e8ea77fe319,2024-06-10T17:16:29.303000 CVE-2024-34502,0,0,ae4e9455fd5a4991b685ac3f082c333bad021bcc5093aef7ce56b997f20cf961,2024-06-10T17:16:29.370000 -CVE-2024-34506,0,0,8e9a8084465401a342edc42c1541b8d74e4c2052055ddc037d261b9b0762c860,2024-06-10T17:16:29.427000 -CVE-2024-34507,0,0,0e7d7e8e661dfec05c7b23af8a3d1e019040f29c439e43c4f86d63272c020209,2024-06-10T17:16:29.483000 +CVE-2024-34506,0,1,91884f62e0a07e36490be7a849db3addb4a9338b84975e418e0914a4f89aa554,2024-07-03T02:00:21.367000 +CVE-2024-34507,0,1,218d2664de9ad27dc44233beca69cace0ca437014bd07ff163e57c33e50085bd,2024-07-03T02:00:22.533000 CVE-2024-34508,0,0,5e2673a670e4b77b4a9c2499c88b60b0bcbf7731c3422764416c91ccda5ee532,2024-06-28T19:15:05.557000 CVE-2024-34509,0,0,3c941906fb696827a87e0e982c58b61c6ffdbf8aab60ea7334047097893c0c53,2024-06-28T19:15:05.630000 CVE-2024-34510,0,0,99ee026929adfb870b6ea33a909d03953dec904faa8e22a2182e459c6966c18b,2024-05-06T12:44:56.377000 CVE-2024-34511,0,0,7c12609bfac9f920a2fdfc9cea67b69ad8d20ca84ffda1766c813f120996dcb2,2024-05-14T15:39:15.780000 CVE-2024-34515,0,0,46b96796c8c54bacb8cad21d051c9895b19b541f5ffdfc636b6991e9ced426d8,2024-05-06T12:44:56.377000 -CVE-2024-34517,0,0,08eb5939adb96ecc64af8ef29061a9d0c94558efd45e14e4e090540eb24dc4fc,2024-06-05T20:15:13.430000 -CVE-2024-34519,0,0,e1b4b4d9f14686bb1b8922eedc65355c7331072c7a6ea1cccdbf1355e160f5a1,2024-05-06T12:44:56.377000 -CVE-2024-34523,0,0,6367384c44448ebc7f737c8028dc55a4aa98dcabb8af73d4f6e494ce4067ff8c,2024-06-04T19:20:01.453000 -CVE-2024-34524,0,0,87be3037aa2152625c8a9dd41382d4e153b5323658161b12a4aee0d4a22600c0,2024-05-06T12:44:56.377000 -CVE-2024-34525,0,0,9a8e5ba207d2fc825a676d4dce5466d0bbfaeec0fa1f003fb940ace1272ce1de,2024-05-06T12:44:56.377000 +CVE-2024-34517,0,1,cde89b9593a0fa0e1ad4eef031d1be52532f44d623b2553db6a6b804041b3e30,2024-07-03T02:00:23.917000 +CVE-2024-34519,0,1,e1bab0f51bff6ddc1064f759576ee7e30191ae4ab924c21597ebc2a29f9b8ff5,2024-07-03T02:00:25.010000 +CVE-2024-34523,0,1,75c01e382110a6a9a722fadaa2e54b139b8f0ce6fc69c81b676a9add8538e9ba,2024-07-03T02:00:26.050000 +CVE-2024-34524,0,1,3e667092f2fac2e9248384e2031bfe46558254a6a3fc0f2ae0aecbfd07dbb573,2024-07-03T02:00:27.283000 +CVE-2024-34525,0,1,7b62d839278ce76830c96b3fb5e58c932a408ac771b301e231e0f571e1316ee9,2024-07-03T02:00:29.427000 CVE-2024-34527,0,0,ce857875a7facfbe24154ab86e1fa357ee5854fa3fb506e810faf3aac3dd958c,2024-05-06T12:44:56.377000 CVE-2024-34528,0,0,e014e0c812b9afc00d642e51789899b0ec73e42b7f18ad2e9464fdd413a7820a,2024-05-06T12:44:56.377000 -CVE-2024-34529,0,0,d444b005053f2f0f45cc5b0980f02d1643b1d605c07af89ad23206ad31535d95,2024-05-06T12:44:56.377000 -CVE-2024-34532,0,0,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d635c,2024-05-07T13:39:32.710000 -CVE-2024-34533,0,0,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000 -CVE-2024-34534,0,0,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000 -CVE-2024-34538,0,0,a2fcd9f25de4a8f9a4aacd02bb856e42b1502c8756c1b9e4ac90cde8a992ed65,2024-05-06T12:44:56.377000 -CVE-2024-34539,0,0,2c4241c7a30ddee4a2bc7c06f570157df62b046f56dbde29bfff73eaeb25d776,2024-06-17T12:42:04.623000 +CVE-2024-34529,0,1,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb105b,2024-07-03T02:00:30.540000 +CVE-2024-34532,0,1,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000 +CVE-2024-34533,0,1,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000 +CVE-2024-34534,0,1,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 +CVE-2024-34538,0,1,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 +CVE-2024-34539,0,1,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 CVE-2024-34546,0,0,c2d3cb2b20dc218584a3e29d42bf74758d50d12287d7d00198db4d41ad728570,2024-05-08T13:15:00.690000 CVE-2024-34547,0,0,68485045b79b039986ac8a2bc39116a73bcfb61cefe86b3c97c2629af1031b6d,2024-05-08T13:15:00.690000 CVE-2024-34548,0,0,a263052f22b9ed630797ec6d56bcffb08c7a0f2402a01d542130845b1abea7a8,2024-05-08T13:15:00.690000 @@ -251818,9 +251819,9 @@ CVE-2024-34573,0,0,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a6 CVE-2024-34574,0,0,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000 CVE-2024-34575,0,0,f874cba4be84fe80062f36c4a92c1529344b91ba4a22c0305bd8b082f4f4d827,2024-05-17T18:36:05.263000 CVE-2024-3458,0,0,95e4aaffa4279b78a2b992b7ca84a76b9c0fc4040617906bdb6d2a26fd53d894,2024-05-17T02:39:57.243000 -CVE-2024-34580,0,0,23e9c9e6196de214627ce70d2ecaafc9ed253a53de7670f13fae70cba93aceb8,2024-06-26T16:15:11.437000 -CVE-2024-34581,0,0,101eae71972fe0e0b512a60a9bdc31b241f90f9c819f01ada4065ee44845d826,2024-06-26T12:44:29.693000 -CVE-2024-34582,0,0,4844e743472b7231bfa5452c2e20c2f3ad08007eb97cbefe2d71005b993ee4bd,2024-05-16T15:44:44.683000 +CVE-2024-34580,0,1,19940bb2c544766cd6c53ffdca8fb9e214f270c8b9158a8629c2ecdb513241a0,2024-07-03T02:00:39.550000 +CVE-2024-34581,0,1,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000 +CVE-2024-34582,0,1,589200e4299098a43f17589b3359a4252ec2c8c3c5fc845d002a18066ab71c11,2024-07-03T02:00:41.190000 CVE-2024-34583,0,0,d92099cb2aacb9940a376e2e0c9537aa23ff3e9bc91c630cc7027a285ebda73d,2024-07-02T12:09:16.907000 CVE-2024-34584,0,0,66f579d58d0cc7857dc55afaee042ff4470394e6d336c56a30139b656962b66c,2024-07-02T12:09:16.907000 CVE-2024-34585,0,0,ee8a251702fee14d8824e610a55296979d395fc30ca6242ef0d771950dd8a16c,2024-07-02T12:09:16.907000 @@ -251880,7 +251881,7 @@ CVE-2024-34714,0,0,a16faa7f57b02979f0d9baa24210a39fe199236a17b9a6c8ee9e34ebead52 CVE-2024-34715,0,0,caff2451aacd33d9c1785db66ba7b81c7f2c3b630c6b9d2ce069d8a61cc254e5,2024-05-29T19:50:25.303000 CVE-2024-34716,0,0,86dd1938143b344fc361262a3b1c662de4efbcaa04e6b10cb049ee8700b9a271,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,2b916dc6a1e09850236d38da24f3e36a503c2d4e64c7e637d4f378867f8ef155,2024-05-14T19:17:55.627000 -CVE-2024-3472,0,0,4484e96023d5f2f9d97a8d2739e776f8d23c2b92bb270bab3a70f3ac3ac9bb4e,2024-05-02T13:27:25.103000 +CVE-2024-3472,0,1,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 CVE-2024-3473,0,0,ecf07ac84ad9a3f593fb990c7a6940d333eabefd6a4358103eba0f21665023d1,2024-05-02T18:00:37.360000 CVE-2024-3474,0,0,92034c6e8e03ef9947dcf9fd02cc16997c4bf0b4b196a87ecd9d32a4fbd7f10b,2024-05-02T13:27:25.103000 CVE-2024-34749,0,0,fe5f41bd42e695276d38161b9a2d636fec6ebfca2120aa0bc8cb065f0e443352,2024-06-04T19:20:02.877000 @@ -251905,7 +251906,7 @@ CVE-2024-34766,0,0,2293ffac3449ef1ecabec995fb5414490a2b1124424c491c241ec0595015b CVE-2024-34767,0,0,7caf2eae117eacc9dee625f4ea1574868d5ff2da675294817d495e2702767bac,2024-06-03T14:46:24.250000 CVE-2024-34768,0,0,8639e46847b48b8b815f0453b4c23e10478a95ab51655da4384db57dba8ffdb9,2024-06-13T18:36:09.013000 CVE-2024-34769,0,0,73ed99df82f39db71ecd24a6c897586450bea956229a7b82e516212429882112,2024-06-03T14:46:24.250000 -CVE-2024-3477,0,0,06132a9cebdd48f3a85c9e2194776daa64e508210471c8ba503616346531ad67,2024-05-02T13:27:25.103000 +CVE-2024-3477,0,1,88728cb4caa12b1415716c45abbee3f67aec5afb7aa2aa14019934b79560bc09,2024-07-03T02:06:15.707000 CVE-2024-34770,0,0,629ed46c37fcd7d6e4f87bae171dde215c1619cb09f814f13b0c4304a96ec3db,2024-06-03T14:46:24.250000 CVE-2024-34771,0,0,deaa281b48d1539fc4d88a99f2c542da7d2f97b319dd410ab53213b70ec8b3e8,2024-05-14T19:17:55.627000 CVE-2024-34772,0,0,635f5a0bcdcc084928ed60d40a3f5691181a54a2efa05b50e13ad7462247110c,2024-05-14T19:17:55.627000 @@ -251935,7 +251936,7 @@ CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000 CVE-2024-34808,0,0,21b09ce53727c5ee928a1437c8c0d952a27c47249673a6e4bc367b5a7a58e57d,2024-05-17T18:36:31.297000 CVE-2024-34809,0,0,28c9294cfef95730f169a95c2d46858080bd8c47826d26db722c04e16411d290,2024-05-17T18:35:35.070000 -CVE-2024-3481,0,0,c3f70551c1becffb0a9b407cad9be5595273e7df315c7008e09a7f27bc6e1d73,2024-05-02T13:27:25.103000 +CVE-2024-3481,0,1,5d1025337d70db60ab9d04f8d819befa730e336c1ef5906f6b42987d0f4ce020,2024-07-03T02:06:16.693000 CVE-2024-34811,0,0,6afba0d787dbcfbbd66965f2fd829a9e346c05027e62405f08f4e435218ea77c,2024-05-14T16:12:23.490000 CVE-2024-34812,0,0,7332a043c47768e371dccefcc80daf8c8275382c0e6daacd34a29bf101c857a9,2024-05-14T16:12:23.490000 CVE-2024-34813,0,0,70564b11bb7588eaedc70ac81e58caae5b31e82d0793dc0d9b9453776028b2e4,2024-06-11T13:54:12.057000 @@ -251960,8 +251961,8 @@ CVE-2024-34832,0,0,5450d25a8a2a2c18ec1f13cea90692cbdaa88c98ad37b2d242e0d647addbb CVE-2024-34833,0,0,789f0a35216c1be50ffd360aabd943414abb12c109dbba03663b97841c399d00,2024-06-20T12:44:22.977000 CVE-2024-3484,0,0,77b96fc6faa401f39469e2fe8fb49203604ce091be4caf53c785afcea370dbf3,2024-05-15T18:35:11.453000 CVE-2024-3485,0,0,e8641b5678d7bfcdabd6408cac9c77af492485e4b29f63fc9dc56af18234e19a,2024-05-15T18:35:11.453000 -CVE-2024-34852,0,0,a2b46166918037a96ec96511b7428ab937c28a5b7c34beca90d286eb089cfe06,2024-05-29T13:02:09.280000 -CVE-2024-34854,0,0,0e8ca98f4df4a1f6bbb30b850eeb662e8bf05df80620511a6fb79531d51ed979,2024-05-29T13:02:09.280000 +CVE-2024-34852,0,1,6658d0142e07dfc5b88d6885ac5eb8a1e2d2f1453db4324c60dd4b90d48954c8,2024-07-03T02:00:50.907000 +CVE-2024-34854,0,1,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d5a0,2024-07-03T02:00:51.720000 CVE-2024-3486,0,0,8da7f9712efe40cda63a7544f219d9f75402c9bf9fd383ace6dc4fbb45739a0d,2024-05-15T18:35:11.453000 CVE-2024-3487,0,0,8f06547acdcbfd092859b21bebd94d4a6de047fecbc8390036a7cd12c35c5f14,2024-05-15T18:35:11.453000 CVE-2024-3488,0,0,bf7c4b33b6e91489947313990def9ab3ebf80b81d3d9e53cfe72c6eb903d1ddf,2024-05-15T18:35:11.453000 @@ -251970,93 +251971,93 @@ CVE-2024-34899,0,0,9579694904378722f2b9da74dd16a33f2e9423032433b6d7a12c13c9e08fe CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000 CVE-2024-34905,0,0,a88924cde0b34bfe1866d7fae4db0ed8aaed52a8d0ebdd8229d8da95a15d8107,2024-05-23T21:03:49.143000 CVE-2024-34906,0,0,2e87c19545a662b9bbb732affd4033eedf71c0d6ff41c50506bab921f34df110,2024-05-23T20:42:22.080000 -CVE-2024-34909,0,0,200d6e135c597cb2e777da35c986586f176b28b1430331d2d52fe002caa50f25,2024-05-23T20:56:30.393000 +CVE-2024-34909,0,1,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000 CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000 CVE-2024-34913,0,0,482ab417b16d36cac885da18c13005f6c4dcc004509b2b573a33dd2947f7d3b7,2024-05-23T20:59:34.540000 -CVE-2024-34914,0,0,70a7c11501909b39ef53f8b81e0474e671bd02725d09e7751be6f86dc2b4f270,2024-05-14T19:17:55.627000 -CVE-2024-34919,0,0,76beccc7ee306fce0aae029e497d6e83a0c5a3aea6f0c11ac1da266396722275,2024-05-17T18:35:35.070000 +CVE-2024-34914,0,1,488c01684aef7fae520eb6f0628a96a961ab856901df991bf866a786a5c9031b,2024-07-03T02:00:53.427000 +CVE-2024-34919,0,1,823c5c451a1eed666cfdb6436f6850bdbb3997f7dfda43c7cb7477056e9bb3ae,2024-07-03T02:00:54.243000 CVE-2024-3492,0,0,907a9c5ac3d14a6f41640cc73f118a64a2fc103e0422da4909af2e38dfdc3499,2024-06-13T18:36:09.010000 -CVE-2024-34921,0,0,dbf53dbc9b81b9221c12f4c1ada0297cc361fc3675871ab0069ddf8fe9b53895,2024-05-14T16:12:23.490000 +CVE-2024-34921,0,1,258d6bc4ff16be25947117b994a7b2305574dc7e88be47c1d8439dffb3fb7800,2024-07-03T02:00:55.040000 CVE-2024-34923,0,0,5697df08bcc5b5bb6e875c0dad875791ae2e843c0a151e5ce0091eaeff88496a,2024-05-28T12:39:28.377000 -CVE-2024-34927,0,0,f64d4b3fa2d75a498f29da3e6338e873aaa7fe95b7d4cb54fa8a5234118d8251,2024-05-24T01:15:30.977000 -CVE-2024-34928,0,0,43cd769ec4fdb33239ced280adaf59383cf7b652fcf6735a7ca67fa759cc6693,2024-05-24T01:15:30.977000 +CVE-2024-34927,0,1,65b6f1073e9034477a827eae4f8e1e96da2dcd8b6b7a4dd6a353ea18c54c97c4,2024-07-03T02:00:55.873000 +CVE-2024-34928,0,1,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8d7a,2024-07-03T02:00:56.653000 CVE-2024-34929,0,0,ef37f14987963fad9ab35b4d2ebf05a2e84c97cdb2ecbc61ba0c98ed773a4ba4,2024-05-24T01:15:30.977000 CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000 -CVE-2024-34930,0,0,b2a87d1480692bc866fa9361200b77b5829fed32d16f14dbb18440530d687b1e,2024-05-24T01:15:30.977000 +CVE-2024-34930,0,1,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000 CVE-2024-34931,0,0,5d22e67c3aa5323c0f60120b8d7040796ecf637dfa3fee4d6654fb37d117916f,2024-05-24T01:15:30.977000 CVE-2024-34932,0,0,1692d7a2ace4c2a0b85db4b7783114f1f3bc1b79ad4d84c3510cb18e0c2ffc8c,2024-05-24T01:15:30.977000 -CVE-2024-34933,0,0,b0b58047e9f6cba425393e3543aa0e331167e2a8b4cc17fc86216d43545f6c56,2024-05-24T01:15:30.977000 +CVE-2024-34933,0,1,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000 CVE-2024-34934,0,0,e313921ad79750a3e32c3903486b703d77df36956c8f6525a50ab23ca8211243,2024-05-24T01:15:30.977000 CVE-2024-34935,0,0,b5732b6f9db2742e1fbcbebd5327ad3ba14e8da351ee5a5f0f5705b0d2697e13,2024-05-24T01:15:30.977000 CVE-2024-34936,0,0,33094a39e31d0ec454725cfcc5159a05bc757468d891cf90a80c8a723b6f466b,2024-05-24T01:15:30.977000 CVE-2024-3494,0,0,64d46dc2a19508d3711e9aedb3c5a94f86b9d5284b5f5f7adc98cacb6f1d9c54,2024-05-08T13:15:00.690000 CVE-2024-34942,0,0,e059946476e6ed6f7700787b6d293319c3917f84cc21df39845c2415b202e398,2024-05-14T16:12:23.490000 -CVE-2024-34943,0,0,44d98cd58aa649e622669b5d139eb3c721c497a3ed9e2f38cf0a924b84b63888,2024-05-14T16:12:23.490000 +CVE-2024-34943,0,1,27f223f9ebdd1c5e044a9b8c3ea5e878cc25ed59e01266545a6073517a2a7075,2024-07-03T02:00:59.257000 CVE-2024-34944,0,0,dc412fb3e6a3cf1ffd7e85fafb66ffaabb7c1be0e9b9ac9e3158aeb74b4d5f0e,2024-05-14T16:12:23.490000 -CVE-2024-34945,0,0,575023130609b734f4893425fcd731e9a9935102b4df26247d6e0eb6ba48bebd,2024-05-14T16:12:23.490000 -CVE-2024-34946,0,0,18a70d63ec6de478ac3f73160a9c6a4992ce9174fd5476f10d8e6c79e1f65d0e,2024-05-14T16:12:23.490000 +CVE-2024-34945,0,1,bd887865baa11222c5471f83f64ee50937d3f1c1cfa2d234bd4834ddeb94df5d,2024-07-03T02:01:00.147000 +CVE-2024-34946,0,1,bc37c91351bb9de539bebc2edf6ca00a5506257a85c0193f030841ee78b07113,2024-07-03T02:01:00.960000 CVE-2024-34947,0,0,1f28b058197f1b877062f0835c3513c4ef75f6c8214e60c177ebf327e506958b,2024-05-20T19:34:58.277000 CVE-2024-34948,0,0,80ffa63f076a0b3bb12ba06a8abf5d6edba92b52f77c848778b38824cdfffa0b,2024-05-20T19:34:58.277000 CVE-2024-34949,0,0,a7d96597060b1f0d1dc8fdb2b4042778f1a7f0cba50e24aecc834abe024b3562,2024-06-04T19:20:04.827000 CVE-2024-3495,0,0,fed7d06d8c3855cd2e6e0d78216ea50d3f7c6be718662393b3c5db22dda3fdaa,2024-05-22T12:46:53.887000 -CVE-2024-34950,0,0,bce08889c675e02cdedb7c7d716140ca0269187b86ee9ecf74ec425b66e2c63c,2024-05-15T16:15:10.333000 +CVE-2024-34950,0,1,4b8267007ff70ad214b66a8a544774886740823c745cf811c7b1935620d9a19e,2024-07-03T02:01:01.753000 CVE-2024-34952,0,0,1e00f9fde21932e6d048d83048eebdfe661e48bacd064d4b436d82b6868f49c5,2024-05-20T15:17:54.513000 -CVE-2024-34953,0,0,3c069a1bba4c75628bc6257b042a50fc4e11af252fd69bf1ed8db6f13a18c2bd,2024-05-20T15:17:54.513000 -CVE-2024-34954,0,0,220f2af335f4755ab80252d7201547e3e0c966bc49c0a987db737345dd26e53d,2024-05-15T16:40:19.330000 -CVE-2024-34955,0,0,736d9770eac92ec7e2b60cad049fae12dec90bd59792447a7c2dec6a68ba4bdb,2024-05-15T16:40:19.330000 +CVE-2024-34953,0,1,9b4f59e590af18fd55ab03e8f9e2f9ac1fc4af0855347fdb3f9d86b63ec479e7,2024-07-03T02:01:02.633000 +CVE-2024-34954,0,1,396f6bcdd5628f29b651b044d875f6f745abc33bdf7936030fedfd16934e8f29,2024-07-03T02:01:03.443000 +CVE-2024-34955,0,1,07b611f0d3195cc07947bdc986a25ada2abb6b04dcc79dd570a0d13ecae3b249,2024-07-03T02:01:04.230000 CVE-2024-34957,0,0,81e13155f5d544ba1cf35c8817ef90109ba8ed4716a915b1dffaa0ac7377cc5f,2024-05-16T15:44:44.683000 -CVE-2024-34958,0,0,4d9db207089d2d0330c7e1b36bd727c49de99a4ae3247fcc01fb329ed61445c3,2024-05-16T15:44:44.683000 -CVE-2024-34959,0,0,a4a5c2b854729dafe8bd6153cee335ae16c335e77f519a8a85a086d239147105,2024-05-20T13:00:34.807000 +CVE-2024-34958,0,1,31e490140adc46640f8f90858aa079c5b3881d7c17835c735e99e53b699fea0c,2024-07-03T02:01:05.013000 +CVE-2024-34959,0,1,5772ca0dd874715925cf4da6c25b5b6ba5531d062cdf4f1c5ebda80fd41560f3,2024-07-03T02:01:05.837000 CVE-2024-3496,0,0,8f9185ca29b34e2424b798f691678287a62f4f688811d368d36b23c33ea74368,2024-06-17T12:42:04.623000 CVE-2024-3497,0,0,becb064c880daba18f17bf55ede1733fde57ade31bfe104bbdfaf5a023b2abd7,2024-06-17T12:42:04.623000 -CVE-2024-34974,0,0,519613cdbc229706fafa4388ed0de03632496af6e2fd3a5450a4996c9b966471,2024-05-14T16:12:23.490000 +CVE-2024-34974,0,1,db93d6fc06c8e4d6ed75b4accd8acf59e9b9a04d41397a160c53843993ce1d4a,2024-07-03T02:01:06.613000 CVE-2024-3498,0,0,5a88bde38eadc03f84603569fdec38fe83a6606de78277714e78faa80a5569cc,2024-06-17T12:42:04.623000 CVE-2024-34982,0,0,ef460a32eb987949d8c2a373dc7919974bee9f6e2b2a3c53ead2e4138396cd2a,2024-05-17T18:35:35.070000 CVE-2024-34987,0,0,262d3ccca2f7e7df7be241d8326c4714ae2b44466572454690af1a110c26db06,2024-06-18T19:15:59.873000 -CVE-2024-34988,0,0,b3467eb38646e4d8a6df0704cef40b0e453cfb971357b3ffba531bed667671a0,2024-06-25T12:24:17.873000 -CVE-2024-34989,0,0,a75d8ba41908a8d4a011a34c5328e77e756e2c0766173d0c2f6d80fbf3e9fc4f,2024-06-24T12:57:36.513000 +CVE-2024-34988,0,1,6474dbdbaa4ebcb8d8eec04dee908e1ee08255976e596a42dde1361f42bfc7ea,2024-07-03T02:01:07.437000 +CVE-2024-34989,0,1,c0f737f83c65230e74658db3038decf49406b8bd85e57531cd1168cd2bc8ccef,2024-07-03T02:01:08.240000 CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000 CVE-2024-34990,0,0,954e9cad148d93781e06727d2db5247f2f552d787151dbf2d18611cf67a55aa3,2024-06-20T12:43:25.663000 -CVE-2024-34991,0,0,780a03bdc762fbb7188d00cefe07a50db49ebd1ee5a53f96d48d3d1cd68fcaf7,2024-06-25T12:24:17.873000 -CVE-2024-34992,0,0,497a097d0e0e3b9258450d28cd0c4bb5357bfd0b4b76c0b1ba867b7545310b74,2024-06-25T12:24:17.873000 +CVE-2024-34991,0,1,305a0f5c327fb4efa27f1c49708e6dba8d2ab257c8b12c44573d21730be45637,2024-07-03T02:01:09.030000 +CVE-2024-34992,0,1,9a2f44bcac614c82fb508eea2c914f5d30212ef74c3e81eaf50515aa083ed010,2024-07-03T02:01:09.800000 CVE-2024-34993,0,0,88520e58b3968956ee44832ef9bca602378dea4f2524d5113c2eaf5052b0d026,2024-06-20T12:43:25.663000 -CVE-2024-34994,0,0,2d37bfb277f5e0193ed8c82676312446b855d68532288e194c45848265ea0e23,2024-06-20T12:43:25.663000 -CVE-2024-34995,0,0,ff7295f94bdc66d877986c97deb7981eb83c3e840f72ac7a8ee7543b9685ad7b,2024-05-24T18:09:20.027000 +CVE-2024-34994,0,1,2a57fa5a48b91cfc9175994b09415b4e2c46f84fdbe6aceded93bada909a8bfe,2024-07-03T02:01:10.570000 +CVE-2024-34995,0,1,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adaeedd,2024-07-03T02:01:11.353000 CVE-2024-34997,0,0,cee044c4ccffe504e44bd95724dd0befc01681debe6525e4c247f664c7f74ef5,2024-06-17T14:15:09.950000 CVE-2024-3500,0,0,bd83544d3c8c82359104dcd5b032a6095cbae3178ec9c9c56ddfe242d28462ee,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3a464f11376d0472939f04e02c9cdd08c5fb1d5981603d76946fb2eb9747024a,2024-05-14T19:17:55.627000 CVE-2024-35010,0,0,6784a947df2e9deefe9757ceafde92b1b4ea5ac58202274413dd6808bde18093,2024-05-14T19:17:55.627000 CVE-2024-35011,0,0,f2661dd77acfffb252c04e1320c267716aea3744ac85c0060c0d7422270083d6,2024-05-14T19:17:55.627000 -CVE-2024-35012,0,0,c50fcf2a5579f8393bc9e4a23a36901c21717650b7441366632fff1c32da860d,2024-05-14T19:17:55.627000 -CVE-2024-35039,0,0,549aab3001465c18f7558af8e5e45f167595616c9a7bca77c96ced50314baa21,2024-05-16T15:44:44.683000 +CVE-2024-35012,0,1,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 +CVE-2024-35039,0,1,fd488899c30d35f4d4b91dd7bab1c3bc1cb0a26710ffca620c623f52241a5821,2024-07-03T02:01:12.907000 CVE-2024-3504,0,0,79cce84e6f753803ee042004779287d4dc9d06a39c69bee145ee31cd2e79f692,2024-06-07T14:56:05.647000 -CVE-2024-35048,0,0,ed871a8ade99e0617809ff904ac4a8fd285ba197cac8822e996ab2fb9852d715,2024-05-14T16:12:23.490000 -CVE-2024-35049,0,0,ee71153645e9403440b243e3a73667394924bc5f87710f5682c39713babcc96d,2024-05-14T16:11:39.510000 +CVE-2024-35048,0,1,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502def,2024-07-03T02:01:13.607000 +CVE-2024-35049,0,1,7f4be420d91d9a8f87262bac46be64324b444d7ac3ac1587575b0d32b81ff685,2024-07-03T02:01:14.393000 CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000 -CVE-2024-35050,0,0,44ea377a6fb5d231d9a6a23aef96817e62a46e94c3a7cbd117621c0a80b96f5d,2024-05-14T16:11:39.510000 +CVE-2024-35050,0,1,b0236daac2c3966aba94745c646c21ffa4a26fe8fffa2e95528779869a71d061,2024-07-03T02:01:15.190000 CVE-2024-35056,0,0,fed9e93bff83d8508a850afa40a61e75d47a33d7ee44b4d59741260f73bdbbee,2024-05-22T12:46:53.887000 -CVE-2024-35057,0,0,918869cf6af2be39af2814bdca53b9c26d7c6995df0678fac3955c5b555e4dd4,2024-05-22T12:46:53.887000 -CVE-2024-35058,0,0,8497673bea16ddf45ff848f0321e4dbe7d57a7d02f7c5cce3b16bdc7d8edfffb,2024-05-22T12:46:53.887000 -CVE-2024-35059,0,0,bd64074b0906c1c54ef17d2e14ef72d6e07f1a69861632fbcb25eee7085311c4,2024-05-22T12:46:53.887000 -CVE-2024-35060,0,0,62446a6780b8c8e1187040238ecfc349f6eb1b933015bf43bbb359906b5391dc,2024-05-22T12:46:53.887000 -CVE-2024-35061,0,0,34e811b322aae61856581c9d11d0a6300ec0d542883626f03b8561ef5119041c,2024-05-22T18:15:10.133000 +CVE-2024-35057,0,1,47daba873776057e2d4f676fce8093d9bdbcad7aad68b4565ea6ee9e1578c2b8,2024-07-03T02:01:16.030000 +CVE-2024-35058,0,1,4c978a9f2fc0df6f46d5cd8467aac76a67a01324702f33fa24c016ab3c438d5f,2024-07-03T02:01:16.830000 +CVE-2024-35059,0,1,32912879e1c71e5bdf72eb54227af1385b5c1aeaf3f83f89bda60480d159c776,2024-07-03T02:01:17.657000 +CVE-2024-35060,0,1,dc3ef8cd004453780e3b8edd242ed99b58513de18965db0f3e2846c3a0b0c40c,2024-07-03T02:01:18.427000 +CVE-2024-35061,0,1,1c542ec6e66af9696bb08f80c7cf7f3caa0aed339c06075b5f11bddb7ba214b6,2024-07-03T02:01:19.220000 CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000 CVE-2024-35079,0,0,dc2d0442f6c9894aef7f06132f30a3b0f0e82c2f5437498b8e6870946f9000f4,2024-05-24T01:15:30.977000 -CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000 -CVE-2024-35080,0,0,0b33c6e107d1c21d76b2686c5bbf8042c4827a9e37d3a2edff1e02775302df81,2024-05-24T01:15:30.977000 -CVE-2024-35081,0,0,2e1cbea9dbf92e3d0e73ab6b0d7522b3062f36a322a5a221dd1a956807343daf,2024-05-24T01:15:30.977000 +CVE-2024-3508,0,1,2b43f9e122cbb6c5d0ee83530dba132ab3fde8d83c6c2582c0a69215807219e4,2024-07-03T02:06:18.367000 +CVE-2024-35080,0,1,c9a211365cbd542cdef0b29d59f3b2dfae2b1b61359fa8769a673763d1c1edb3,2024-07-03T02:01:19.997000 +CVE-2024-35081,0,1,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d2d6,2024-07-03T02:01:20.817000 CVE-2024-35082,0,0,70ed09094e82aa4ebfedf4ff996f77881c56d0fc70f76cc3a6fa683c02ad7109,2024-05-24T01:15:30.977000 CVE-2024-35083,0,0,945c2486c7cf0b9ba0db1e5772ca52dff2c620c52f2b41e9889e0c3fe6282193,2024-05-24T01:15:30.977000 -CVE-2024-35084,0,0,739706367f7f524c3a6d774b7754f817056fb8d77a9cf17c359045d18fa988aa,2024-05-24T01:15:30.977000 +CVE-2024-35084,0,1,ac2799cc1434dfc2c78149fd1b6245909a5d0ccbc943a72e9768ed8158560b71,2024-07-03T02:01:21.793000 CVE-2024-35085,0,0,544513a23c18ea6321ccfe949f1301f1f1519237c0b3554b7f44c6eef5d202a4,2024-05-24T01:15:30.977000 -CVE-2024-35086,0,0,dc057a812620cf4654915b2497b6d5d73a0df4281ac88757e20c49016d9a58bd,2024-05-24T01:15:30.977000 +CVE-2024-35086,0,1,bbb34dc58989be1196237a9d847c0e01aed13ed3f437f7e1bef961a874339d86,2024-07-03T02:01:22.567000 CVE-2024-35090,0,0,f30d71260c974be2e1cc7e1f1f16382cd1ff50624db9d99ff1506a381a8bea21,2024-05-24T01:15:30.977000 CVE-2024-35091,0,0,c5762df5a81de00b8f17457d5801bcecce8596cc10a72c6783eff6e04109d374,2024-05-24T01:15:30.977000 CVE-2024-35099,0,0,8c0b69879ab1111cf063e500789278f969d059f38759acadb58167d526b5b96f,2024-05-14T16:11:39.510000 CVE-2024-35102,0,0,781492c1bcdcbb91cc24f5b5ff3eacf4542faa6544199a3dcb435c0e7da31a06,2024-05-16T13:03:05.353000 -CVE-2024-35108,0,0,3d160490977cee5bde1d3bbae750736ca9206a5392ad0c8f4f20b1d705d7e1b9,2024-05-15T16:40:19.330000 -CVE-2024-35109,0,0,1723de5edad4801c113dd0d41cbe0df6c36d556c862ef08d4faf7caa71ed9098,2024-05-15T16:40:19.330000 -CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209b46,2024-05-17T18:36:05.263000 +CVE-2024-35108,0,1,26473bc212f25b793c66f492376510c497f3c8040fd855e035e2125e4662c9ef,2024-07-03T02:01:23.437000 +CVE-2024-35109,0,1,5c37b5989db27d73a1b7673ab81df5907cc813f794f46739f6fbd9e9480590e6,2024-07-03T02:01:24.210000 +CVE-2024-35110,0,1,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9863,2024-07-03T02:01:24.987000 CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000 CVE-2024-35119,0,0,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000 CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000 @@ -252066,11 +252067,11 @@ CVE-2024-35139,0,0,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3 CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000 CVE-2024-35140,0,0,45c3bb60ea04b1120d4f838be7226beea8411238e0d1eeb8dfdc4424ca0b5ad7,2024-05-31T19:14:47.793000 CVE-2024-35142,0,0,2e771ea16b161d7fa34214dfdb10478412ee26ce44f8ad533bb2991294386c64,2024-05-31T19:14:47.793000 -CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000 +CVE-2024-3515,0,1,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 CVE-2024-35153,0,0,86727db419cb843920e5cd4c7a87cf5b7fde13fc70ca82a13eb4d069ddb821d5,2024-06-27T19:25:12.067000 CVE-2024-35155,0,0,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000 CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 -CVE-2024-3516,0,0,c67f1b1a12bf3a4087d8b779d182fd3cd73d7fc172668a9a1561ab7e0601a8e1,2024-04-19T23:15:12.003000 +CVE-2024-3516,0,1,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000 CVE-2024-35162,0,0,096de883de595ba1679c139890301da91a94c85a87a466687ddcd8baf8fe1502,2024-05-22T12:46:53.887000 CVE-2024-35165,0,0,caf63944f08ce101dd14e275b41e5ef9dcf2b386ad9b4bb6b8d83ed28c45d5eb,2024-05-14T16:11:39.510000 CVE-2024-35166,0,0,8ef2b403e9c48e4a4c024d735641311b572c06042563d6935a498ffc36d354df,2024-05-14T16:11:39.510000 @@ -252107,7 +252108,7 @@ CVE-2024-35196,0,0,6ff32cee39eac2f9a8cd8e0f432a76468473f3aa977910c3deca0e5fcf1c9 CVE-2024-35197,0,0,416bcb1a932d9a0fd41caaeb4c9deb5fd7f244f1a2a38750f955428ee2ae2267,2024-05-24T01:15:30.977000 CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,80afb5efea241c47dadd107093a319b2296ac78739379ae0f930fc3fd8eb6a47,2024-06-10T18:15:34.983000 -CVE-2024-35204,0,0,426b422871683d1b16b6e67a7918f8f9959a907fcff966c6f5833a5066df0ead,2024-05-22T21:15:08.100000 +CVE-2024-35204,0,1,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000 CVE-2024-35205,0,0,e759b9359595ebaf333ccada053519f187d3d1cfddc6ef72f21bfd74e59fe204,2024-05-14T16:11:39.510000 CVE-2024-35206,0,0,d364d0d056671b6aae94e7ff4e067f0427da0dcb91e9a9def6b3435439b972f5,2024-06-11T13:54:12.057000 CVE-2024-35207,0,0,a6fdb3aaad30c5ccc349084c0d1016b64b0d1a8aed07391395a07ca9105afc28,2024-06-11T13:54:12.057000 @@ -252163,7 +252164,7 @@ CVE-2024-3529,0,0,a5064dfdb29cc291d331e7cb349f1ad4d7941de74c2bc68b73712d362eb350 CVE-2024-35291,0,0,0cd9908c687150a1cb92a20a0728ae0d78713e0c1f8545554484da4694fb3024,2024-05-28T12:39:28.377000 CVE-2024-35292,0,0,d7611392c0d965ffc3c4722e15c98d7b6e4fb149df8eeccb24ddc9ca3fe05c9e,2024-06-11T13:54:12.057000 CVE-2024-35297,0,0,77081ae230c63fb48dd5900682a9571bd14346ef9951f53b02ff7fc86a100e83,2024-05-28T12:39:28.377000 -CVE-2024-35298,0,0,4a93465b73521a13629db05b4a86a28e218b8bbd2011f61a842e94ebba15980e,2024-06-20T12:44:01.637000 +CVE-2024-35298,0,1,767802677800ceed2390ec4b021eb4a1bb445bf1aba3154a6ba4d4e3eb13ec79,2024-07-03T02:01:32.613000 CVE-2024-35299,0,0,3e4e645ea2334a2d70a8ac0e5a235ab378675ad9f04d95540b17d9c98a4ac10a,2024-05-16T13:03:05.353000 CVE-2024-3530,0,0,e12d930d34076470c73bc5005c248ade707b9149f13bae62cf727f0aa959148f,2024-05-17T02:39:59.340000 CVE-2024-35300,0,0,c9948d6a23b607dc905f5cedb43ddb5e762c784721f0ec88d5b26fbba2ccfab0,2024-05-16T13:03:05.353000 @@ -252196,18 +252197,18 @@ CVE-2024-35344,0,0,c73208ca079218543a762b8507f86bf5aeafefb33f0718a97fc664a4ab5b2 CVE-2024-35345,0,0,34d624a51a5c4eb1460e7c594cedb48529d32732bb98587b4cd33612ca920701,2024-05-30T18:19:11.743000 CVE-2024-35349,0,0,ec4daada8ae0d0fe467f317929a5e31e34bf7102e4253caf9a5c2af18d2bc61a,2024-05-30T18:18:58.870000 CVE-2024-3535,0,0,f574fcdaa266eb8da2fb53308d734bd66c33a13c49e8b4335f6bdaf83f11e9c6,2024-05-17T02:39:59.803000 -CVE-2024-35350,0,0,231ce4b3d3985a94f7cf4305861b41895ab9ae770cac79ac261e1c0f4cf1ec0f,2024-05-30T18:18:58.870000 -CVE-2024-35351,0,0,017658ab1bda6ff171e49beed092f9f5d82c59fec369c7105af37b0d295f9f8c,2024-05-30T18:18:58.870000 -CVE-2024-35352,0,0,0e3f98f95d84bc200c62ba4199b61bd5db15e4ecc373366fa03cfdbef54927c0,2024-05-30T18:18:58.870000 -CVE-2024-35353,0,0,eabeedce0596750e3c3e5ea497235759f0e26a1d5edbb86e991222a522d677c4,2024-05-30T18:18:58.870000 +CVE-2024-35350,0,1,e596350b63af6a3fd5a9ea71cc091d69ecc8ca9756da6b52fb081734d570d495,2024-07-03T02:01:34.357000 +CVE-2024-35351,0,1,f15ca955c03ac0c00b104ba129c1beb4d32d316803785ffd7151d3b367cf6862,2024-07-03T02:01:35.133000 +CVE-2024-35352,0,1,4c967a90c48bc3b9a730f66b4aa4e73d374946e45ba43d6bf4f44dbaa8e078df,2024-07-03T02:01:35.943000 +CVE-2024-35353,0,1,333d5edadaf1f94ae3f5d3a7f6ced901c90164332604a2a1bf202da5aa249a45,2024-07-03T02:01:36.723000 CVE-2024-35354,0,0,386ee388cf27517d378aee7b3edcc64d7e27b0c816dafcb50fd2f60364505a2b,2024-05-30T18:19:11.743000 CVE-2024-35355,0,0,362f7f061546cd6a5801da2b4279913eadcc09f3483322014a88f8adf82dc61f,2024-05-30T18:19:11.743000 -CVE-2024-35356,0,0,896643abd7ba4caf9e319dbb9379ccfea448cb95e9a5f4f9ca47c52ac5c516de,2024-05-30T18:19:11.743000 -CVE-2024-35357,0,0,70381b42c9aa7ff22c6c3dc279409169874078352a9afa797681edf7d291087e,2024-05-30T18:19:11.743000 +CVE-2024-35356,0,1,627942e8212cc6a1f35ab8ad0d4b429325f3eea84c95c53f77bfafed79b34d36,2024-07-03T02:01:36.923000 +CVE-2024-35357,0,1,014dc8ac880784295c5af6b49368054397ad859cd12c61cec99e2eb3904233b8,2024-07-03T02:01:37.703000 CVE-2024-35358,0,0,7e69bf562e12864a75ed45a4790a4c9d61cddfc00231e1ba3bca7e4443c54d2a,2024-05-30T18:19:11.743000 CVE-2024-35359,0,0,2d4c13b6aef8a88059c4e56fd3982d3f7e3b031136f63e7a40b551508b7e54e2,2024-05-30T18:18:58.870000 CVE-2024-3536,0,0,b63dbc7abf49c7babee61877e5b2a8e70e35b7a32ec432c7d29371fbe78ff8a5,2024-05-17T02:39:59.897000 -CVE-2024-35361,0,0,c9edd7fb4e9d5574493099f304f560fb9957ae6d40cf3cae0922d6762e047a0a,2024-05-21T16:54:35.880000 +CVE-2024-35361,0,1,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000 CVE-2024-35362,0,0,58c8d1641bad60a276f790d6859c55ea40267f28d5156e42b2078edfa33bc6d6,2024-05-22T18:59:20.240000 CVE-2024-3537,0,0,a991188dca9ef4640adf7a802695a0fa207bb0c024fcd7aac535d47c4720436f,2024-05-17T02:39:59.987000 CVE-2024-35373,0,0,8da103fa59a9ebc1337ebad8ac8450cebdb3ac71f7c0d4e7df3cd64e4d5a2aeb,2024-05-28T12:39:42.673000 @@ -252215,27 +252216,27 @@ CVE-2024-35374,0,0,5f9414a459c4244bf34b9d6bf79c508ad4a68a8fa59e5873125783e8913f2 CVE-2024-35375,0,0,48c0ef716a6e812f026337b9746704cc2558ae45fd28006c5183d4e9376cea57,2024-05-24T01:15:30.977000 CVE-2024-3538,0,0,f8cabe6328eaf87ba6d9a024b15cf0edff2e3f1ab108489ec3ba849f1bf7e980,2024-05-17T02:40:00.087000 CVE-2024-35384,0,0,22741a598c12ce87668e3e4a8fd13cf59140bbef1191e5924b2326f7924f0bf3,2024-05-21T16:54:26.047000 -CVE-2024-35385,0,0,66d6841219806c8b698638bc9dcbc6e9fbb8dc70d090c3475d37b6a878a16c99,2024-05-21T16:54:26.047000 +CVE-2024-35385,0,1,398a0815629caee79e0ed577c05dcef42bd37c568d9a41ae8597fc88574b3380,2024-07-03T02:01:39.520000 CVE-2024-35386,0,0,029389b409d61da207e10b5dfd362e99d63e8f3010062ba5eff763893946cd12,2024-05-21T16:54:26.047000 -CVE-2024-35387,0,0,9c033df7b89c3adf2140d780b7adf6e43c353f401a4053c68a877d24ddbf938d,2024-05-28T12:39:42.673000 -CVE-2024-35388,0,0,4e8b8ccdcd9108b40cb1ded23d79f37e5eb58d6d414b94b858643868fb3a5e1c,2024-05-28T12:39:42.673000 +CVE-2024-35387,0,1,c15fdfd7d84f50c783e9e09361abe37993b474b133a90ed661a9f7fadb59afd8,2024-07-03T02:01:40.300000 +CVE-2024-35388,0,1,830a86b36926f5e0687c6d41178a5d819df1e34c94732e02a8d2ad4cef75400a,2024-07-03T02:01:41.110000 CVE-2024-3539,0,0,559f59aa42b27f78697ad4db4ec164269b8bdfa5d6a12f739b030696a2fe1797,2024-06-26T18:15:15.653000 -CVE-2024-35395,0,0,b397f5a2bb5c4d2234131e0b8e785bb70ce635d7391112d02f3becc8f1f82701,2024-05-24T18:09:20.027000 -CVE-2024-35396,0,0,8b099a219bf1333a66691785e343a345b3d9da5af49ab76a63995e1eeb16b18b,2024-05-24T18:09:20.027000 +CVE-2024-35395,0,1,354e9e37e0ce75bb53ff93ce47bf40c126f587275536a8cd511f6253a52ab9b1,2024-07-03T02:01:41.880000 +CVE-2024-35396,0,1,827fe50b50a04cab962dbec8c945133243cb4b7963621cce923073eaec840529,2024-07-03T02:01:42.667000 CVE-2024-35397,0,0,331674b1de643540114a6987743a0e60f6a5be7b59b496486edd3ad7d58bde52,2024-05-28T17:11:55.903000 -CVE-2024-35398,0,0,c8a5407be45ea166f12d2986595d7430cc04ff38404f3b2826919ef8c5272ab1,2024-05-28T17:11:55.903000 +CVE-2024-35398,0,1,a491584c9df6e11fdb2efbaa9a24ed323ffdfc3c73ef67e6f6aad4d4001efd05,2024-07-03T02:01:43.440000 CVE-2024-35399,0,0,6d1536d187d6ab10cf60ebba4d2f427babbc1ee04c53e5b62fb4274cdbb1b8c3,2024-05-28T17:11:55.903000 CVE-2024-3540,0,0,c58fda32eb76563ef2ccd0b9c389537d6cfae50422ab18b8dbb1bd1161d40701,2024-05-17T02:40:00.280000 CVE-2024-35400,0,0,9a99c31e9a84e9b0216b7a2ee1bbfb4aa6a25ad564801407c19a106dc3806d20,2024-05-28T17:11:55.903000 CVE-2024-35401,0,0,d2f91fc3b8acbdcc131d0e4168bcac4ce00e3a2b07e000e4e1d0883c9f5ab3ed,2024-05-29T13:02:09.280000 -CVE-2024-35403,0,0,3f2a086c5013818de6973bb16e1c4bb2d8503fc6556bbaea0843c448cda4910b,2024-05-29T13:02:09.280000 +CVE-2024-35403,0,1,4d9a98843a184aa3f7fed28ea2e26cfcf04b1cff379a69b2f7e72017e9a927ab,2024-07-03T02:01:44.377000 CVE-2024-35409,0,0,db7869380830c422a0cc89c6cd323d0b44796220a126ffb4aebbff5d29976162,2024-05-22T14:30:41.953000 CVE-2024-3541,0,0,4678afe637b96076af7a5175ea4b3f0b09c929a839eb19db5485fd9bba275844,2024-05-17T02:40:00.373000 CVE-2024-3542,0,0,ddfc9654cb604e4529b438145853d5267c0068a712bd76401a813380f3ca9dfe,2024-06-26T18:15:15.750000 CVE-2024-35428,0,0,73aecf6d5acf0c9de7e2c7192dbdf749ebe127bedd5c0646691ab5d0bf81b807,2024-05-30T18:18:58.870000 CVE-2024-35429,0,0,df0c2f74e5d96fa6105cb4ef17a07979e39892f34c82a4aacfe94f2e17ea6acd,2024-05-30T18:18:58.870000 CVE-2024-3543,0,0,fcdce76ee9f664c4051d70ca4d8408961eb7768c8664bc2d390108d6130755df,2024-05-02T18:00:37.360000 -CVE-2024-35430,0,0,0f89a4535db55011a22d1b581e7d10b1b0113fa88447c12c39be124ff70ae8e7,2024-05-30T18:19:11.743000 +CVE-2024-35430,0,1,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9db6,2024-07-03T02:01:45.150000 CVE-2024-35431,0,0,141682d046f5d69f99bf384ca122884784d62ac69e1a5734807ba3604e57f500,2024-05-30T18:18:58.870000 CVE-2024-35432,0,0,9a46d5f7be14dbc933e9db654dc7b61d74d735e2b166e39068704e24d0454519,2024-05-30T18:19:11.743000 CVE-2024-35433,0,0,471520f6b565b036ba9b93b81697a4fd36fa43b149bd3b22f868a9b314160e39,2024-05-30T18:18:58.870000 @@ -252247,15 +252248,15 @@ CVE-2024-35468,0,0,ef139a1cea143364977b278ef27392959f9bf8e2b2413f95e97ce063151ea CVE-2024-35469,0,0,03b2a0bbc10c15554d03fc094afdf0f15ca07888e05a17bc3d9a0168f92059ba,2024-05-30T18:18:58.870000 CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c9920,2024-05-14T16:11:39.510000 CVE-2024-35474,0,0,91e1e27a8b9b04b3ffab4211b2be8813b684a8047bb0decc2de0203db090189d,2024-06-10T18:06:22.600000 -CVE-2024-35475,0,0,53effa9dc5e8213551bbdbda32e2dfa4c153fd878258c89c9e91bb711c7a017e,2024-05-22T19:15:09.373000 +CVE-2024-35475,0,1,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf4fd,2024-07-03T02:01:45.963000 CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000 CVE-2024-3549,0,0,f198f48480b68d8c7199a54edb0999988d4909cd746b750a6fa243be125cef2f,2024-06-11T13:54:12.057000 CVE-2024-35492,0,0,a02d0a80cf6795bdd8349f855d15db1b17890353f3564619ef911d889417eed6,2024-05-30T13:15:41.297000 CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000 CVE-2024-35504,0,0,0960d865c9f0a37450856438a4637b3494eda5adde12ce8eee871eda221f0ce9,2024-05-30T18:19:11.743000 CVE-2024-3551,0,0,0b53eeac67d78da7f449ca2544acbc24b1d30e959723fbcf9808dc22d9b1d6b3,2024-05-17T18:36:05.263000 -CVE-2024-35510,0,0,244a039d3e43a77d1e1c1bfa1c93465718af15f6d6ebd597960608d48e40fc7c,2024-05-29T13:02:09.280000 -CVE-2024-35511,0,0,88c11e90f79a9ed0aca8c4301cc3b328c70f04cb419aacefe9fa82a87fbd22d6,2024-05-29T13:02:09.280000 +CVE-2024-35510,0,1,caaffeb522a9243cb4a1bb41637eced11d63455c55d5f889189d39467161eb6a,2024-07-03T02:01:46.810000 +CVE-2024-35511,0,1,0925e571054fff897af51a6c91c2579c2749b26c74104183a16b37d4fa6c6517,2024-07-03T02:01:47.583000 CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46a7d,2024-05-29T19:50:25.303000 CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000 CVE-2024-35526,0,0,9145d718b99666c752b72c23585259f6b43d68cd740cf1774e7de05603733122,2024-06-26T12:44:29.693000 @@ -252267,41 +252268,41 @@ CVE-2024-35545,0,0,ebaceeb6f9fb1227eb7a838d45911ea1ddfb933eae518341305c5801c883b CVE-2024-35548,0,0,d8ef06df5ce64125bab3cdde256f258e1c87cbfe4cc6bfbb1a4d7595969f62d9,2024-05-29T13:02:09.280000 CVE-2024-3555,0,0,7b5ade071f86d2f47a475842356f8c63a7b0fec9dcaebb74484d06286ab10108,2024-06-04T16:57:41.053000 CVE-2024-35550,0,0,b3c85fa0d88560018d8c46302ba1cba82a3adc9c9d9315f8092c405b1f662d91,2024-05-22T14:30:41.953000 -CVE-2024-35551,0,0,bced5ed716b8a6cde6b8827aca76efe4aa3a304eed485f9c2d1140453267c787,2024-05-22T14:30:41.953000 +CVE-2024-35551,0,1,992575a49edb7ff405cf9bf6bf5989df98166aa9907815a4de443d6fb9bf6774,2024-07-03T02:01:48.753000 CVE-2024-35552,0,0,f6913d712c73cbd84cae10dae0421fd278caa25b1bc3c8cb3704337f3de4daaa,2024-05-22T14:30:41.953000 CVE-2024-35553,0,0,968e9737b84ba47bd7fd6fc4369d593c075d249029506c0273e517f2e0437958,2024-05-22T14:30:41.953000 -CVE-2024-35554,0,0,93579bb4980411eda5d5eff06ce932a53f8425f81ff329624b4098bc3dfea5fe,2024-05-22T14:30:41.953000 -CVE-2024-35555,0,0,67123c7f655621af7dc55ae0a0e5999e24415fda72e868fbe2901aacf10d5f5a,2024-05-22T14:30:41.953000 +CVE-2024-35554,0,1,59e9b71b9bc9c32e32fdf267c50239bbb5cfe71a605af00d13cb11c63fed59dc,2024-07-03T02:01:49.550000 +CVE-2024-35555,0,1,53add4f9a2ccd19a2ac12920308039f42bc69f18f4655c871d756b3733167823,2024-07-03T02:01:50.260000 CVE-2024-35556,0,0,64eed00431ccdb88386260f44dc1899622f0971ab4f7c977216469b8601bb42e,2024-05-22T14:30:41.953000 -CVE-2024-35557,0,0,8d393d9979e94857651d55f02cb65f39e6d21c5d938c15bbd5f4de17907da7ba,2024-05-22T14:30:41.953000 -CVE-2024-35558,0,0,328b59790b0b44c828609311f9bcb24d0ba47a09a772af7f70ff9d914027d7a8,2024-05-22T14:30:41.953000 -CVE-2024-35559,0,0,dede7633232a3b6ae6e9e8cbfcd37af574b7a3acd5f3c4c657f13238d75f31b6,2024-05-22T14:30:41.953000 +CVE-2024-35557,0,1,3ca463097e0f9293244e3113fad94495aea18ea959c1328f2783f5db3f727021,2024-07-03T02:01:51.060000 +CVE-2024-35558,0,1,e3fd2a49061dcf165a9f23ddbb89ab4aad5c6769021a7ee059a07965cb38ae28,2024-07-03T02:01:51.867000 +CVE-2024-35559,0,1,567b6880d14443b1ae9f48b92c8e2230d656fdae8fe7665c8cab362d07c935a8,2024-07-03T02:01:52.063000 CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000 -CVE-2024-35560,0,0,8b5163d26d16473e60613497d9704d425e713ba303bba9989e187b09632248ea,2024-05-22T14:30:41.953000 +CVE-2024-35560,0,1,ff151a7a7d20f3bafb68c34544272bf8fe13bc313aeb97863454326a7a0d4ff0,2024-07-03T02:01:52.840000 CVE-2024-35561,0,0,4e2eb3b1706dd6490195ac46a6e737540d17f5017fdefe98efc805b0d70851f2,2024-05-22T14:30:41.953000 CVE-2024-35563,0,0,271b533f6fb296ae16b3243b5333fc44d7ea41ea3318dc6ed2b8eddfbddae252,2024-05-29T13:02:09.280000 CVE-2024-3557,0,0,c3ea56b0bdc34dfc5cf46195aafe89ecd6c9203d05038c46d80fbbba3f6bf60d,2024-05-24T13:03:11.993000 CVE-2024-35570,0,0,a3f60b055b435e42500b9a875f56784c532bd9e1f02d4c9b0d637d4370e0ff0e,2024-05-24T01:15:30.977000 -CVE-2024-35571,0,0,dcefc26d9b657207625437e63a7ceff75cf8ace6d5c78cee94aa9e811570b6bf,2024-05-20T19:34:58.277000 -CVE-2024-35576,0,0,6fd29acfb903a2443f8d00c4cda4f5ba191f77d5b0b1351e41a5877536c1ac12,2024-05-20T19:34:58.277000 +CVE-2024-35571,0,1,737c2a7f64c2812d810288ac20005c00d1a957dbded3b4f543f336361b86f200,2024-07-03T02:01:53.540000 +CVE-2024-35576,0,1,4cf028a111dcdddf7b60054ad17a0fe8aad691fef93220823224c4163d503b71,2024-07-03T02:01:54.333000 CVE-2024-35578,0,0,11eb62338421587fed66b0ca7ef3560bcd4370552307bc4119662b3c0deaaac8,2024-05-20T19:34:58.277000 CVE-2024-35579,0,0,271374c19e13bccc58e82fc2a49bd5a4d9e26c3bbc49d82078ba3c56ef3686b3,2024-05-20T19:34:58.277000 CVE-2024-3558,0,0,f9fa8295ef1bb8e06bc2bd8d49a335a6d7c8b402023b1332ede6212c7f0d5778,2024-06-20T12:43:25.663000 CVE-2024-35580,0,0,0345a89b9d1b0b2bc3648b28bbf695e495afdf532600f33365cca04a56d5d3d5,2024-05-20T19:34:58.277000 -CVE-2024-35581,0,0,0251a3e87b13757c3a03e890126d433466629cf50c68351c4c02a6208e1e9c23,2024-05-29T13:02:09.280000 +CVE-2024-35581,0,1,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000 CVE-2024-35582,0,0,e476c64ba51d10b24dcb30010c383cdc2c74fb3a3a57489cdf68eb2dbeda37c9,2024-05-29T13:02:09.280000 CVE-2024-35583,0,0,0efec8770e16fbf25bbba2434d526545d52a41ef16818d5a5e57e43abdb9bb60,2024-05-29T13:02:09.280000 CVE-2024-3559,0,0,77d1e04e6b0763837495ae9d939d26b768d0b817bc2d80df2e1003e0885c9878,2024-06-13T18:36:09.013000 CVE-2024-35591,0,0,ee149d634b7392e12f62ac0c95147a19946e778ea06315bd9f939acf5593bad0,2024-05-24T18:09:20.027000 CVE-2024-35592,0,0,8f6a7fbbc655181061e6850b1df1cfc42aef549b106dc16a322109a72795de1c,2024-05-24T18:09:20.027000 CVE-2024-35593,0,0,ac49e872b55e54f210318d86332baa52d20d8879f1cd298d8a19635900c842e2,2024-05-24T18:09:20.027000 -CVE-2024-35595,0,0,309ff184e92dd2b3f270cd8670573cca3fd077dcdf3378b4aa602096b5697fba,2024-05-24T18:09:20.027000 +CVE-2024-35595,0,1,1c0caac8b66ea50c55b6a38567b8221cce1fb5534ed6ea6fa786e54a9487b678,2024-07-03T02:01:55.937000 CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d35,2024-04-19T13:10:25.637000 CVE-2024-3561,0,0,87332a7f44d79f38ac016e43146b6eab96b23fbdf4b6276fc649f5d695c1c6a5,2024-06-20T12:43:25.663000 -CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3b77,2024-05-24T18:09:20.027000 +CVE-2024-35618,0,1,909b98d4f6bab57eebe322fcd0fa9e4a02c096346d6899a3aecfb54429751f2f,2024-07-03T02:01:56.717000 CVE-2024-3562,0,0,2c433f38634ac971df5298204e01a5cfcb61fa234d5652d870b5515296a5f914,2024-06-20T12:43:25.663000 CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000 -CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000 +CVE-2024-35627,0,1,4a039665766224ab2309171105fbc890963796bdfb66945f84a5ba2663f6bfff,2024-07-03T02:01:57.493000 CVE-2024-35628,0,0,2c313b2d5cf1c891710a64b767f44ab49e131c2c45bfba95fd1cab6ac44d46a3,2024-06-27T13:15:58.550000 CVE-2024-35629,0,0,5e80f8e30b8e7ad09d457f272fe181427a56dad2c38472133e9c4c9c94534324,2024-06-10T21:06:02.157000 CVE-2024-35630,0,0,d2b99481e1d25785f899feae2f2b2deb084dac85df61f77063521999b38c24e3,2024-06-03T14:46:24.250000 @@ -252468,7 +252469,7 @@ CVE-2024-35786,0,0,6ac4b9e82e454392f6dffeb00b6e5500dba40d5e3125e5ec1b3b17cdac988 CVE-2024-35787,0,0,3efa8438309715a6b50e98cc629a3b04c80482df2546db2096b3ecade15d851e,2024-05-17T18:35:35.070000 CVE-2024-35788,0,0,b2881e6dddfbcf9673a03284279c64e322d4e53b4699089f9fd56a537db3265f,2024-05-17T18:35:35.070000 CVE-2024-35789,0,0,211503aac17f7b5db33d8d0eac3c7f6e7be4ae22b3b0f1fd062a45e765e4edf1,2024-06-27T12:15:25.220000 -CVE-2024-3579,0,0,382095facbcb62f8766bdfdf3bce2813f1be8461475346b344d7436f67656894,2024-05-14T19:17:55.627000 +CVE-2024-3579,0,1,725561021cda08447e23c5b0e44ec054d5afb8528e0d9c66ecdd17821f6eb1aa,2024-07-03T02:06:22.743000 CVE-2024-35790,0,0,6ac117fdc5275df1a8fd20824735d990fd5b4e8a2388d8acac0f2ff7e1b4aa24,2024-05-17T18:35:35.070000 CVE-2024-35791,0,0,5007c3488b31f13cb9d83fd61c73948d0fe842019eb289539adec0212b0c6462,2024-06-25T22:15:30.563000 CVE-2024-35792,0,0,9e583b4a9f7dcb2ae8672dca64670751ac10e1f497b9b6a654713eb247ce983c,2024-05-17T18:35:35.070000 @@ -252478,10 +252479,10 @@ CVE-2024-35795,0,0,39fff1822b508fc467ef5ed23c1af81a7b3aaf2ddee7d6c564f57470fd8d6 CVE-2024-35796,0,0,bfb8aa972fe679b3c881beb019675baa25500c04e3e9afe8a4fcd4221d0b71f2,2024-06-25T22:15:30.627000 CVE-2024-35797,0,0,161559e31ca95a0da04b078b50ab0178ec29bc57dee21c14a0f3bf67e76b74d8,2024-05-17T18:35:35.070000 CVE-2024-35798,0,0,a3229d131cd77bf89a2dde0ed606084dbc0868b4e04e37ba1184e86b69753810,2024-05-17T18:35:35.070000 -CVE-2024-35799,0,0,35c4ba566a5330afcee01ca5192f71fdf4fd21bc81db2a9879a60ca9b92ffc87,2024-05-17T18:35:35.070000 +CVE-2024-35799,0,1,2dce7d3c01c6b462983682ed86f45e0447833392232f61fcdb54d3cb67bf0d68,2024-07-03T02:02:11.170000 CVE-2024-3580,0,0,2f50f0fc5dab3b30b6794761652a76e64fa18c5ab5aa589ad184e1b1dddc1829,2024-05-17T18:36:05.263000 CVE-2024-35800,0,0,8ca998bf01aba32fc65d46dc525ef0c67b5ec2b62e1109803f13170dfe3b0027,2024-05-17T18:35:35.070000 -CVE-2024-35801,0,0,fdc16f6565258a5b3b0af0fa8ebdae2f40f899bda290b1c88373813fae43832c,2024-05-17T18:35:35.070000 +CVE-2024-35801,0,1,7beb0f17bf3151694c1d4b5eedafd44e39c46da43f8694c5ee3a6a093af6baba,2024-07-03T02:02:12.050000 CVE-2024-35802,0,0,28b959a1da70bd3ae8b9f426676798cdb2b0a03d135c79dbb46853b6fe636a45,2024-05-28T19:15:10.597000 CVE-2024-35803,0,0,32adc2443d8a9bf7440b2addc4d16d479aff19a5b4908b036e9a777bb38634d4,2024-05-17T18:35:35.070000 CVE-2024-35804,0,0,49fa6f90db0236fabad8bce1ef4b344742e977703bb897e11df51b8d7502c75d,2024-05-17T18:35:35.070000 @@ -252495,7 +252496,7 @@ CVE-2024-35810,0,0,be2abeea367f182a6b1ad511a953cc5bc3876003e09c08bacbcea430ee5fe CVE-2024-35811,0,0,82b28547819adafd6ae135c048a0a8e8823910146f57c0635a5fe4ec0417e56e,2024-06-27T13:15:58.970000 CVE-2024-35812,0,0,7d0d1a60f242229a3825673001282d0446ce7ae166b119c0e506a39221a4e148,2024-06-04T13:15:52.390000 CVE-2024-35813,0,0,3076adac19ed647d8df7288bd92dee9a32b49c9380a9bc7bac1f1b9d8b809aaa,2024-06-25T22:15:30.860000 -CVE-2024-35814,0,0,18619d6cf722935daa54c4a2017ed9cd3b4228dac5f23c34be01df98692cef75,2024-05-17T18:35:35.070000 +CVE-2024-35814,0,1,c12d20362fa7f156ac6f13c6924c56af28d855c9690c8c80713b7222e211542c,2024-07-03T02:02:13.390000 CVE-2024-35815,0,0,14069055c1a239f655502725c48eddee2982b71d85d2a93cf7fbffe3bc6cb4ab,2024-06-27T13:15:59.050000 CVE-2024-35816,0,0,c8753974635e0f713ef177aeacfe64152c82ba064ae049a915578b4ef7e87597,2024-05-17T18:35:35.070000 CVE-2024-35817,0,0,63ca67d08e32d98e7ccdb92356199c835829a7188ca5cbda4f3851375cbd25ef,2024-05-17T18:35:35.070000 @@ -252503,7 +252504,7 @@ CVE-2024-35818,0,0,e794ec00e84b7891d510bcede44bb6aedd9b0e49c13ca4583395f2e4809dc CVE-2024-35819,0,0,a30e000145bba003e959098cd80313e94b1898d9e8cac0c089961a5866bb8137,2024-06-27T13:15:59.133000 CVE-2024-3582,0,0,ccff8970706a85d3ee495e91ff392c6a7172ea5fbc74c301c7707e7f9af29a61,2024-05-14T16:11:39.510000 CVE-2024-35820,0,0,ef8937a48788ed835bd3f34798690b95d243eba50ca3caf796662dedc6c777fe,2024-05-25T14:15:52.920000 -CVE-2024-35821,0,0,234a6a6984c105e317d77f7902e6a33a0528f2c28b9514aaa81539ab4b21c442,2024-06-27T13:15:59.203000 +CVE-2024-35821,0,1,4dbff26a17e41b5eba5bc0c618c64a7f9b7d053de20ca41264c5b381e5e4c27b,2024-07-03T02:02:14.487000 CVE-2024-35822,0,0,9ca065a0aebb28b27c91296d61007980e3e24b66a5f026619232573a30aa0734,2024-06-27T13:15:59.277000 CVE-2024-35823,0,0,4ab2aea01c597dd3cb8fb54e114a247f78d86f7b0867075fdfd46799c52fefef,2024-06-27T13:15:59.343000 CVE-2024-35824,0,0,bc73fd2d083752568e54ae546c31c3d76b68fa9b2aabc1cbf60374ecd3be99a6,2024-05-17T18:35:35.070000 @@ -252527,9 +252528,9 @@ CVE-2024-3584,0,0,6d033f319836713f2ccb0bf1bb590bf63e78792648578b0b333097456dd4e5 CVE-2024-35840,0,0,dc338d287561e1e7ff39d20acff403182b82b4a74c73a9cdbe6b0fb14a5d7da6,2024-05-17T18:35:35.070000 CVE-2024-35841,0,0,4303e4c467abc295f491bb3f0c9c4f0b0b010992cdb58e7fd46456bac0d0223a,2024-05-17T18:35:35.070000 CVE-2024-35842,0,0,592ada3e6fccf8755452d84c99e3dc173426627812e275369fb4db26c6cfdc74,2024-05-17T18:35:35.070000 -CVE-2024-35843,0,0,b99d2f9c3b57744053024620b791f7c00959bc5fa311b8c82aa0c2667af855bb,2024-05-17T18:35:35.070000 +CVE-2024-35843,0,1,f74a4aca66ba000a9cbe068bbb71a1ea5b709968774026ad6b51c3e6b4a6c484,2024-07-03T02:02:16.580000 CVE-2024-35844,0,0,9977f38fd486a5904b7383c7eb6ad5360ac384d17108620b67113cfa1d34114f,2024-06-10T18:15:35.250000 -CVE-2024-35845,0,0,b93c01b8117d526ed1b0fedd0a270e51f3d2851c20fd78dd3f91960a191ddea8,2024-06-25T22:15:31.510000 +CVE-2024-35845,0,1,df98078d1569f84a43b9538200632423f8b096d759ae210cb6ca401ea31cb716,2024-07-03T02:02:17.450000 CVE-2024-35846,0,0,e3932a760cf7300d77b7b45d00a9c07b1b457001acb1af73cb3f5252ad7bdcb2,2024-05-17T18:35:35.070000 CVE-2024-35847,0,0,01d3d6fd165a034f47f0b30603645c02bf752158e40694b7436e810fa02ddbd0,2024-06-27T12:15:25.567000 CVE-2024-35848,0,0,908b3b233d6163eaedf562605e5020459f3904cf73b35f145edf95848db0cb42,2024-06-27T14:15:13.787000 @@ -252538,8 +252539,8 @@ CVE-2024-3585,0,0,d56994adec844913daa064ad70bdc27c802c5df905040176ea6c6996b636c1 CVE-2024-35850,0,0,1caaf651b5b8da65d25ea10206e70df56162a890740b4e5190ed48f0c08c3ab7,2024-05-17T18:35:35.070000 CVE-2024-35851,0,0,4376d6fe25d843738ede208de8b13dd1bc95b6282f1f031a18eeb382cef6f667,2024-05-17T18:35:35.070000 CVE-2024-35852,0,0,c932edb93efd048de4c7386d651c38355620fbc701285e1ab59a89dcea417150,2024-06-25T21:15:59.330000 -CVE-2024-35853,0,0,fc926482699b1770ce396b952be18c282c51f02a21feae435bd4fffebc64c1a2,2024-06-25T22:15:31.740000 -CVE-2024-35854,0,0,6d5edfbc98e8b4c4ffac0d6f8d04cac292aa2d9b143674a509b458bae16cf6aa,2024-06-25T23:15:30.857000 +CVE-2024-35853,0,1,146f1bae94755e066a52fcc61fb2c0469634ea4c1bdb1934eb162cfcdace04d6,2024-07-03T02:02:18.807000 +CVE-2024-35854,0,1,0197b24a27bdbce69f46f1d7cb51c8fd564aed67a1adecddfcb162c93a91d43a,2024-07-03T02:02:19.600000 CVE-2024-35855,0,0,dbeb96dfe191a26d605aab1f4f6584b997685e7f8d0abc6f8b441e8bb303549d,2024-06-25T22:15:31.813000 CVE-2024-35856,0,0,e138946365ed53581d1d54097ffba5911cedeee704622a6535016b1efc80d90f,2024-05-17T18:35:35.070000 CVE-2024-35857,0,0,654840124a7b517192d4af0753894d56bc1ccc14b2fe403bf9677929e15c74d3,2024-05-17T18:35:35.070000 @@ -252554,7 +252555,7 @@ CVE-2024-35865,0,0,f8aaa67cf8f4af5da996f230d17512382c7e32406b80c7951d69d09367ec0 CVE-2024-35866,0,0,2b3f0302ab7a15ea84d2add739dd67e6cf469ef627d231f5c355b7e3fff985be,2024-05-20T13:00:04.957000 CVE-2024-35867,0,0,03dbe3096006cac7a6bdc0819bd1646fe93718c1aebe2c0738fb57a3330e93a9,2024-06-10T18:15:35.320000 CVE-2024-35868,0,0,f6c57d03d6cd80fccdd66f1cdfd8d6fe7cb5832c1ee4f8996e8398ebf25961b0,2024-05-20T13:00:04.957000 -CVE-2024-35869,0,0,d23e4df72d2fe6e79dd9eb561c51c34eabce67b32fbaac28b158b8b91a039f2a,2024-05-20T13:00:04.957000 +CVE-2024-35869,0,1,630ed395e8d0f836b200232a6be2974e06759cee7a4d75dd11d6f714bebe5b1a,2024-07-03T02:02:21.027000 CVE-2024-35870,0,0,d7be2005f5fef68391cd625a3128a1c0f461d92cb7b8ea1e272fc75ee4c21570,2024-05-20T13:00:04.957000 CVE-2024-35871,0,0,08341946bb839f9bfb036253ecb3dd1bc0616ef1337a77a89581be8814f326c5,2024-06-25T22:15:31.897000 CVE-2024-35872,0,0,c226c7b9422295b2429ff2c25b92a53dbce24edb6ef5a6c26fc7f69ae419e9af,2024-05-20T13:00:04.957000 @@ -252585,7 +252586,7 @@ CVE-2024-35895,0,0,0c09b7c95528cfb66e574d7c132054cd453934cbdfe5121443b14b66fb476 CVE-2024-35896,0,0,46275aaff8cee15975cf7e14dfa07faebe547458ecd4d049cb153c6731fac123,2024-06-25T22:15:32.433000 CVE-2024-35897,0,0,5162ed21f1af78a6b26ef54507972b700d793dc4b1bd215549fd38bee5d5b50a,2024-06-25T22:15:32.503000 CVE-2024-35898,0,0,551566b5b26acbe9ea549c4068d3497eac661fa59690c1a1950a1abf29d5b22f,2024-06-27T12:15:26.020000 -CVE-2024-35899,0,0,bcb906185f05a6675af34835846f417172bbc08b9f76eda26d257c96a7b41a6f,2024-06-25T22:15:32.740000 +CVE-2024-35899,0,1,4dbe75b47a1246880346d207e2caf3bd12899b72a9fbfa1f3838858346681f0f,2024-07-03T02:02:23.870000 CVE-2024-3590,0,0,1b4d86409edc7cb85d4449ae4f816edfdac3be0a085a89d46eaa687645fc2ef1,2024-05-14T16:11:39.510000 CVE-2024-35900,0,0,6716018817c91a00a0cd1ba0a72f0d7195aabc7d01767762dbf111e94174c190,2024-06-25T22:15:32.823000 CVE-2024-35901,0,0,7877f157f39ffad861738fd4918c2c0a1821c59daecadcbea3a0179059ad1362,2024-05-20T13:00:04.957000 @@ -252597,7 +252598,7 @@ CVE-2024-35906,0,0,66f3c62f3594cbe20c4a3f8d08643135a7dd4476d6b88555cbe87cb3443e3 CVE-2024-35907,0,0,85f5d6adfea06fa2a56a96f07669fd5b3a3150b8ab62bf7406cd5e32c77b560c,2024-05-20T13:00:04.957000 CVE-2024-35908,0,0,1c87b1eb9a8ad55774dcf364441df6cc69e36801c339cf87a94691243de783d8,2024-05-20T13:00:04.957000 CVE-2024-35909,0,0,8762a89904b817025d6231a1e4dd849b55e320ba1c9f6a47d0d648de6f462c54,2024-05-20T13:00:04.957000 -CVE-2024-3591,0,0,9877ebc0159829ab400f95864586bf30cc4e3bc9831fa204193468dc46d597ba,2024-05-01T13:01:51.263000 +CVE-2024-3591,0,1,4f5feabd0ed5cea474d31b0018a5e4c8adefe0e7f6d9b6fdf7ea049c5a0733ba,2024-07-03T02:06:23.340000 CVE-2024-35910,0,0,94365645ff58df38a1b120ccc0facdf85c97644b390c57383cc9be1edea9a6be,2024-06-27T12:15:26.153000 CVE-2024-35911,0,0,65dfccc16926f73b7b215ac6777e53acce05145d7631dae2f348ac81a0e2144d,2024-05-20T13:00:04.957000 CVE-2024-35912,0,0,cbae508992521e1e11580f5eb71bc51a73550d3512845d64c56fd80d1dbad7bb,2024-05-20T13:00:04.957000 @@ -252639,7 +252640,7 @@ CVE-2024-35944,0,0,1113513874495d39d00949a0d1ecc1b806659bc4a0eaed05b995e72ff408c CVE-2024-35945,0,0,a0c381e7a77d5ab4da0e7b3a771532d3cdd0e0f4250d66940a69897ddc946a18,2024-05-20T13:00:04.957000 CVE-2024-35946,0,0,9605756f2fc14e549761e5eb088152e2b2b47f9b4bbe8ca2411e81d4f89087b7,2024-05-20T13:00:04.957000 CVE-2024-35947,0,0,0c1642cee2fcd34e40a81e500db106993726d61b6ca4ab47c913ef59ca0ca7cb,2024-06-27T14:15:13.860000 -CVE-2024-35948,0,0,d865625963e02ac5adc8b78b5718b2a3f53bf1b40d251f28cf7f17fb9a418704,2024-05-20T13:00:04.957000 +CVE-2024-35948,0,1,b46d9803032a3127456ee310c36bf3cedd17b0d7a11fbe27dab4bfc37a02fd78,2024-07-03T02:02:27.897000 CVE-2024-35949,0,0,44764f2566878600b0d46ddd8d460e0c9c197ccadb6380d7626ca4e69a79bb50,2024-06-10T16:15:16.563000 CVE-2024-3595,0,0,042a1bf793010cd433ce5baf95b511b1a6d765b86915add8be092615dea72fbc,2024-05-14T16:11:39.510000 CVE-2024-35950,0,0,21585073f7d09f3f132669993e795ff7f38b553d845c7f70427dcf36dfa326ad,2024-06-25T22:15:33.627000 @@ -252647,12 +252648,12 @@ CVE-2024-35951,0,0,2c8984a07fac81bfd1b2c6d53e8af72e30543b6c53d7b63a8c9deff071a77 CVE-2024-35952,0,0,3ab929cd25145f7cc9f984f3696c92cc9a543b63d3411d731d512042ea185c9c,2024-05-20T13:00:04.957000 CVE-2024-35953,0,0,03fb4a05ed47e586e3ec39d8d36cd755173f341036c22ca12382aef9d7f118d2,2024-05-20T13:00:04.957000 CVE-2024-35954,0,0,95533d080699e98828adbeee447f52d56aadee566466f89532acc19a9eda0234,2024-05-20T13:00:04.957000 -CVE-2024-35955,0,0,7b36e4fa2d08477cd017136facac2ef5934c7e0e4f8279725f1fd0f6cfaccea2,2024-06-27T13:15:59.610000 +CVE-2024-35955,0,1,20944e36f3c060eab9931576f0bfc456815a44d088df82e5772d50ce721db86f,2024-07-03T02:02:29.083000 CVE-2024-35956,0,0,55b12553a75f89f2d214b1fcd84fa80766bd8ee9d7a6cac0e7d21a623984e23b,2024-05-20T13:00:04.957000 CVE-2024-35957,0,0,5b6371b0c19cd391a7a5e835308f5b5bb079073e043d3490afb575881e4c64eb,2024-05-20T13:00:04.957000 CVE-2024-35958,0,0,8be8284087c38f65cf08babd3b4a780856c21e62456b0a04c726a0757437fcef,2024-06-25T21:15:59.560000 CVE-2024-35959,0,0,1aef1161e36451906f546e64f8cacd36636913bd21908d9216c1a205438ce199,2024-05-20T13:00:04.957000 -CVE-2024-35960,0,0,f602139bce799159e6216c09664ef5bb37f2a44213abdedd5bff0f93788ed3e0,2024-06-27T12:15:26.787000 +CVE-2024-35960,0,1,11d604c76d60dfaa78f70c27cc242617c170ee1b403a8338bbdc80eef71892f9,2024-07-03T02:02:30.127000 CVE-2024-35961,0,0,2504ac9445f08283dfd48dff6f73cd1bde27dcfc34a3af8b848c02cdfbc3b2d5,2024-05-20T13:00:04.957000 CVE-2024-35962,0,0,27ee2dc50d8c19cf92e1495d31ffca1c8c1cfb90509bc18e8192f2d623abe696,2024-06-25T22:15:33.823000 CVE-2024-35963,0,0,51ab4977108f8e6f85568d52a9443d4c2f5d55ef98e6e3329011d10407fea0cf,2024-05-20T13:00:04.957000 @@ -252669,14 +252670,14 @@ CVE-2024-35972,0,0,8fcf39d4ace4f1fcc0a244e6329df0b275111c4ac22e4ce79dcba8599cd85 CVE-2024-35973,0,0,e0ed319a3d37581b4b4648a07ad6f572a3fbd829a2a08c31ae8dd0876ffa933f,2024-06-27T12:15:26.977000 CVE-2024-35974,0,0,47c72410c2d5a202dc8786b8c640c5e3910321f990bcd69a5de3c3db6c5b0404,2024-05-20T13:00:04.957000 CVE-2024-35975,0,0,58cb8cb6e00a7a16562610fda13b300aa4edf229b20a25a14e22d431eeae77a5,2024-05-20T13:00:04.957000 -CVE-2024-35976,0,0,7f23026b834551aba5065600072d51161bdf3b9c5f35a4bbe2c04b2943bc3142,2024-06-25T22:15:34.027000 +CVE-2024-35976,0,1,f146dc116ea568418446bcc15c8639c06b854bc53ab444a3029c4462d4a0aeca,2024-07-03T02:02:31.857000 CVE-2024-35977,0,0,768529df22e71f8b08da3992841c8bdc2f1a8892798da493cf372af21d02b3bd,2024-05-20T13:00:04.957000 CVE-2024-35978,0,0,e306734de8d8086da7300aba53de6d039ddfeaf5bd8bfbbf26ee007d6733a106,2024-06-27T12:15:27.050000 CVE-2024-35979,0,0,c9348d4dd7da6c2ba2ce8f4be23dc0b3f79b66ef76c44b7360b46e880f7eec21,2024-05-20T13:00:04.957000 CVE-2024-3598,0,0,885c48b686e5bb2258cc0c91f29020f7833d7484ea51a21d94da9f5d8904b730,2024-04-19T13:10:25.637000 CVE-2024-35980,0,0,4cd59bcc872e7014af4237a2d195b69413ffb03e15c70088fbefd933bd06c714,2024-05-20T13:00:04.957000 CVE-2024-35981,0,0,ad49c9f883390f754072cbd3dfba613a6a6097b8d716561943458e74e943f915,2024-05-20T13:00:04.957000 -CVE-2024-35982,0,0,c6628edc5d2b12c1c5c04bad9201f9ab6e0a9fede2644f82f41cee3e39c91eea,2024-06-27T13:15:59.693000 +CVE-2024-35982,0,1,efe5f8e92e1dc23047935b9e354b4d469c0a950d6b8c98030e7d193da70f3f4d,2024-07-03T02:02:32.940000 CVE-2024-35983,0,0,1765e4d03d1ffce57f923d9337012e723cab392648fd549310316d43c9f62d3d,2024-06-25T23:15:31.383000 CVE-2024-35984,0,0,50b46e9f354a80e47908030e54742b0b16175af93682949b161602e4a922cf8a,2024-06-27T12:15:27.137000 CVE-2024-35985,0,0,f18895f8d229a047ba54c3045d03967427e9a1f0b5bcb5ae41678d1eb51ecb76,2024-05-20T13:00:04.957000 @@ -252692,7 +252693,7 @@ CVE-2024-35993,0,0,c023eeee539ee4e82ed89df4ac5f4a32af175b99fc2ae096d429636e6fbfc CVE-2024-35994,0,0,856ef9767d968b4ad4a1f22ac0d00754911c7c2181eda13b15ee1e72c7f602c4,2024-05-20T13:00:04.957000 CVE-2024-35995,0,0,2f07605c4dcc1143979a52d52639c01d2c531f39716486221527047248cd4b5d,2024-05-20T13:00:04.957000 CVE-2024-35996,0,0,afa42b223f008b4125fefcf452820b486f7bd80e59affe4b4a0715d2527a3e3c,2024-06-25T22:15:34.480000 -CVE-2024-35997,0,0,9feb5ad942ca3fd7678e073d27e6f3cef8ea97bb1ee04542d40307b604d523b0,2024-06-27T12:15:27.237000 +CVE-2024-35997,0,1,3aed6129e9a81f4a2f88008deb262317e454a81e54068a57ef6255c0d5dfb98a,2024-07-03T02:02:34.990000 CVE-2024-35998,0,0,317a6a19b81578697904777d4986a6fbd72f28f92be0cdb4cc7f9752a5589ce6,2024-05-20T13:00:04.957000 CVE-2024-35999,0,0,434a237d10f92e790b2b326825f4b7d101999dad0746276066e894e6dc73573a,2024-05-20T13:00:04.957000 CVE-2024-3600,0,0,2bcdab915f93b74478de5881653ccc603ff3b16953c5dedfa1e8f1a51494d9c9,2024-04-19T13:10:25.637000 @@ -252710,10 +252711,10 @@ CVE-2024-3601,0,0,fc79ccecd0a0bbb79cd9c210153588f7d4590d9827348da641a07d91a9dbdb CVE-2024-36010,0,0,2843e205b9e9b17b5fb3357cdae71842164efb1f33700d0fc205102dad316114,2024-05-29T06:18:31.813000 CVE-2024-36011,0,0,abd5638cc1cfdef36e14f7c96bf2fc845d42601d602cfe73690b22754ed47103,2024-05-24T01:15:30.977000 CVE-2024-36012,0,0,99a87dfc7b0fc5371c51d11442e2aebe0c642c881f6f8e57147716a4b47febdf,2024-05-24T01:15:30.977000 -CVE-2024-36013,0,0,f0047bb10d2dce87d69aa970cfdfb12b997d410e2099a5ede8802f23ddaee47e,2024-06-10T17:16:32.087000 +CVE-2024-36013,0,1,93f62ee8a0f5cf59f8dd98ff2f518b3bad937ef9f32589a754ac3434b5d3d740,2024-07-03T02:02:37.247000 CVE-2024-36014,0,0,a3851da580406b2ea6442c183f0c259cc8e9f25ba8dbe6888379a9fe1c186353,2024-06-27T13:15:59.797000 CVE-2024-36015,0,0,aace83336e9fe64463ed22489fcdadce07e3980d46687da2ead1183b8881d75c,2024-06-27T12:15:27.443000 -CVE-2024-36016,0,0,4196dec4e1b79d5a81d6f2ae199617b7e91ed786acfbaad6490015ecc39d50d5,2024-06-27T12:15:27.533000 +CVE-2024-36016,0,1,56f6d6d091c07fc82009bcdf946d0bf236de4ec56dcde2efe21b5dd6edc0602e,2024-07-03T02:02:38.177000 CVE-2024-36017,0,0,33237fe106c3600cd4524470b095efe23af07b5069537183953efbb72503bbfa,2024-06-27T14:15:13.943000 CVE-2024-36018,0,0,3a8206a02c5adfc67a2a516b8b16f0711b57e1035b88218c63b323725b6cdf46,2024-05-30T18:19:11.743000 CVE-2024-36019,0,0,cbde2a6e185dae769cb5f8294d3446f38fd341f16f132fc23455025199fad60c,2024-05-30T18:19:11.743000 @@ -252729,36 +252730,36 @@ CVE-2024-36027,0,0,04a8d28eb14b2a84cd823f108a1627ed163196ae6f3679e8018d7ce75259e CVE-2024-36028,0,0,99a65cfe5e6aeb27c26307198eb77f77f64763e0afbaeb20aafb2ecef6f915ed,2024-05-30T18:19:11.743000 CVE-2024-36029,0,0,4b393bd3d58ef667258996c8d4231ff4cc7acb00192e977ca706e530eb535f62,2024-05-30T18:19:11.743000 CVE-2024-36030,0,0,00ef498a3d807c79a3c459b6828e1b94bc303f4cb2f66d73b6847b59338e7c17,2024-06-04T19:20:12.590000 -CVE-2024-36031,0,0,95c24a59836909543214a3f8d22844ffa38e757d34c61762b2bbd77c4ac0e772,2024-06-27T14:15:14.020000 +CVE-2024-36031,0,1,b3d1c00a9a158e36837f51f76e121e32ecde035ed99b7ea6fbeda07ba7b3ce3e,2024-07-03T02:02:40.070000 CVE-2024-36032,0,0,5a12487bf2cb4627b147414b9dd50756c55a274ce8d6f1678519c36adada0011,2024-05-30T18:19:11.743000 CVE-2024-36033,0,0,761ce8e91fd8ec725f5fd70906c3e8b3e4ae739a30faa4a1ecc4c7502a89a5b5,2024-05-30T18:19:11.743000 CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000 -CVE-2024-36037,0,0,e8ddc31f39a62a0d6f93584a2886b907bf85fcebcdd4d47a54b701feefb8d09a,2024-05-31T11:15:09.563000 +CVE-2024-36037,0,1,b69974bc3633092c95e0c07f5aa24d13ab328cfb54a9948a0d1d9e8d060f0b0a,2024-07-03T02:02:41.210000 CVE-2024-36038,0,0,c689030949db2782a8d69ade71f9a1affc97ffaf319c773509c47cb5ee7f1cd3,2024-06-24T12:57:36.513000 CVE-2024-36039,0,0,2459d11347af42cb829e5007b01f06e3d0aed0906f508ec72619f858b8aa6d3e,2024-06-24T07:15:15.230000 -CVE-2024-36042,0,0,2ba301066fcf3b5e2098ddfbb2759b29cc55ab5a805cf9edc9ebe22e6b436ca1,2024-06-03T14:46:24.250000 +CVE-2024-36042,0,1,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11ac5e,2024-07-03T02:02:42.150000 CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000 CVE-2024-36048,0,0,28009f5c9c89d66914a954a3622c5cc8d7b761845f43a58d1b9db13955c9fa8c,2024-06-10T17:16:32.167000 CVE-2024-36049,0,0,3a7a1da30d4597dad4c167032717d4ea0f9bb4c5d5396bc121febaf5ae683a7e,2024-05-24T18:09:20.027000 CVE-2024-3605,0,0,c493df18d7bb5f847e1a975a6e775c5f6fae79bc93247baa5bb2cc57f81ebc95,2024-06-20T12:43:25.663000 CVE-2024-36050,0,0,4c307008c713c918a6e3b84da1e5e49b2b2247354b7102850872f2f1076c6edc,2024-05-22T16:15:10.777000 CVE-2024-36052,0,0,8db219128822e3b435341a720fec4da51967df08eb27bb5fb0af45f420ce346c,2024-05-22T12:46:53.887000 -CVE-2024-36053,0,0,672a3b34a9bdb19210396687438a3a5963248f4f357ce5db05db5d249614922b,2024-05-20T13:00:04.957000 +CVE-2024-36053,0,1,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000 CVE-2024-36054,0,0,745f3c7e954612064b0267225a8d627bc9659c4049b0e182b852fe9bfc7c38eb,2024-05-28T12:39:28.377000 CVE-2024-36055,0,0,0f986ba9c1e2ba5209d6b7a2b636885b44374f594bbb5ec4625e72f54b29eca2,2024-05-28T12:39:28.377000 -CVE-2024-36056,0,0,ec028c5add14708bdf202db488cd226acb08a71476882e9d398db176c5d0deed,2024-05-28T12:39:28.377000 +CVE-2024-36056,0,1,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,998ab1a4c4804396ee5d95b6a046534f1c83a85e738366d2e437dee500263742,2024-06-28T10:27:00.920000 CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000 CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,eb4d689c0fd52dc71530686149db340f07354ff188ce53f7ebe9b94f9b8be928,2024-05-20T13:00:04.957000 -CVE-2024-36071,0,0,8064ac0267a543a843f6a87c1b9d3c051a2764efadb31f76520bd5d37151088a,2024-06-21T11:22:01.687000 +CVE-2024-36071,0,1,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000 CVE-2024-36072,0,0,adf5e914207ccf07bd5a80ea20223f9761ddfd7b43e10d7dc7df1dbe43c03ab5,2024-06-28T10:27:00.920000 CVE-2024-36073,0,0,7f65c55d89fc8b6c5d3b4a7785da1b0dab1ec80e1ca112f4e573d11120d2dff1,2024-06-28T10:27:00.920000 CVE-2024-36074,0,0,fe26ee3452dc25406d18750fc41c47c68bcae2cd3e67efb067c3985b2651020b,2024-06-28T10:27:00.920000 -CVE-2024-36075,0,0,8d5cc9c2586da8e812f17aeb43ec0f587b694ca668c9440829ea8da550a72ac7,2024-06-28T10:27:00.920000 -CVE-2024-36076,0,0,7bd178b56b4ea91c0d10da16861cc8958caaaa1d0561d3821785629a0cb379df,2024-05-21T20:15:08.970000 -CVE-2024-36077,0,0,24c001c4e142bc641d92d00f062a2471b2aa71a98c36262a8c3ab28738cd9b9d,2024-05-22T18:59:20.240000 -CVE-2024-36078,0,0,c51f0267c8f676ff86e885fc858add33b498be4bce4ced499be9c0d55f68f411,2024-05-20T13:00:04.957000 +CVE-2024-36075,0,1,8065b7576d1822450ebe95a948e55df1546e885b8401ad57b800c7b3eae944e8,2024-07-03T02:02:45.453000 +CVE-2024-36076,0,1,095e5a8223ddf00346b27a38d3816d5070afb43ba53217d9f4c5235422924fd9,2024-07-03T02:02:46.290000 +CVE-2024-36077,0,1,dd4f3e87dbff21add73a266278ac055e49b2117e2fd83b28a0ab86a0527993cc,2024-07-03T02:02:47.107000 +CVE-2024-36078,0,1,82760eab7701e5c572c3669adb7bca9f1d77c52b4416e7ef2f3d4f8d4f198477,2024-07-03T02:02:47.847000 CVE-2024-36079,0,0,fdb9a00040976f09fbaf93ec1c9cec0113756b033e4d68b6334fa44aebe9f8d5,2024-05-28T12:39:42.673000 CVE-2024-36080,0,0,de5551202af1794b77e1032fd6ee35ba7df3ef2929b44077b5dc18aee0b886df,2024-05-20T13:00:04.957000 CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3712,2024-05-20T13:00:04.957000 @@ -252766,7 +252767,7 @@ CVE-2024-36082,0,0,ec05e6fee429e8ce759a7c1458dcc4d6897daf721318becd9b0e86af84bd5 CVE-2024-3609,0,0,ed7edf68142e8387ad834c19a7338682e57310d52666dd6c703556dcd2e4f649,2024-05-17T18:36:05.263000 CVE-2024-3610,0,0,e939d3b347c73608d9b0843823e2e742d3881baea226b5e82a29cc17c49af3a2,2024-06-21T11:22:01.687000 CVE-2024-36103,0,0,12bbcb4ded1b753fd9b95b190619b55ba667c988679a86063c42f2146efcb4c8,2024-06-13T18:36:09.013000 -CVE-2024-36104,0,0,f94ea0cb7958e56dffdecb1b4837799b68ea7935ebeb2da813f05e84c54e031b,2024-06-10T18:15:35.497000 +CVE-2024-36104,0,1,646bc4ec6c51fdc169ab260c72f97091bede68a1a0bee7cde56c81392b0a1b2f,2024-07-03T02:02:48.717000 CVE-2024-36105,0,0,4b0fed9ed2485549411fb1c0dd5b530df11ef2b63c1b154f3cb43f2c66dea72a,2024-05-28T12:39:28.377000 CVE-2024-36106,0,0,c68c312ee2bc6ec7a30477c97b5c82d947d4a1b2653da093413e96421d465f20,2024-06-07T14:56:05.647000 CVE-2024-36107,0,0,3822d3240549b49c3e2603142bff0a390b754055e04abd1375217acc3ea4ac02,2024-05-29T13:02:09.280000 @@ -252902,7 +252903,7 @@ CVE-2024-36243,0,0,99cda0a332158f15b1e161d69b0e78de02a464f1b437f108c6af23bdaab68 CVE-2024-36244,0,0,038656f03db804566ce68ac1f46ed948e8ae898a69338704230a1cd93f8be7c7,2024-06-21T11:22:01.687000 CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468e33,2024-05-31T13:01:46.727000 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 -CVE-2024-36252,0,0,15f198f9d24050d47b4b65c7729189d555592843e3d7c2313de650ff4411e911,2024-06-20T12:44:01.637000 +CVE-2024-36252,0,1,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000 CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000 CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000 @@ -252910,33 +252911,33 @@ CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267f CVE-2024-36264,0,0,3852f3a1f0d8a2d4f62090f3b6254d16b37a584c2a4799814e318aea1f24146e,2024-06-13T18:36:09.010000 CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000 CVE-2024-36266,0,0,251ca14083666637d83281029e46640454efd455680ea38b3c5a664d41d8a836,2024-06-11T13:54:12.057000 -CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000 +CVE-2024-36267,0,1,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 CVE-2024-3627,0,0,f5c20db254155e1980cc0c244f583a6a1536d3adf64c11755694648c0d5e1776,2024-06-20T12:43:25.663000 CVE-2024-36270,0,0,291f6e458fbc676a304ed9970e06ef7e4860b79a198510d6c392b901a78fa76c,2024-06-21T11:22:01.687000 -CVE-2024-36277,0,0,20d47326e280adb94d9059aa48d208d3f478f327ce890b8688aef81aa91e0089,2024-06-17T12:42:04.623000 +CVE-2024-36277,0,1,af400d33a698814e148533e62eceb8aef6909a879b47a7e44b0b7cad3c452635,2024-07-03T02:03:01.187000 CVE-2024-36278,0,0,a855422a5f943dac3b480ad44cd70110739b58be5862bb0759b204c05b016aaa,2024-07-02T12:09:16.907000 -CVE-2024-36279,0,0,3325b8af913fac0d163d5be9a8802e9f76dc63912c8cffea0ae3040270976e9f,2024-06-17T12:42:04.623000 +CVE-2024-36279,0,1,ae6d96e367108cc090e0cf1f9382ed63328248da9c7d975607021f129b51c4ff,2024-07-03T02:03:01.997000 CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 CVE-2024-36281,0,0,479133ce06ac02edc62536071e8e7fed1efaa94d8e73a60aac6af353af480add,2024-06-21T11:22:01.687000 CVE-2024-36286,0,0,c1f5baa24f55be1a5b224e41ed82b843041c1e11e92f844787bb0cf3b2b93308,2024-06-27T12:15:27.810000 CVE-2024-36287,0,0,e3d04d973f90b2170d68fde9a36c28c9c5e8a06631e57b0e5a27e5d94e0933ef,2024-06-17T12:42:04.623000 CVE-2024-36288,0,0,36d226ed1d21153f2b2ee3140ae73adbbee59f4715a40fb075ea6ee38c2ddcf8,2024-06-27T13:15:59.863000 -CVE-2024-36289,0,0,dc1cbda549dffc5af4283892adb2dec0a95ed6a19c3c066db9d79fac2619eca1,2024-06-17T12:42:04.623000 +CVE-2024-36289,0,1,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000 CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4ba,2024-05-15T16:40:19.330000 CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000 -CVE-2024-36302,0,0,e1f4931beacda377102258578e84cb72b47284751be4a5dc324f70f76b3c6500,2024-06-11T13:54:12.057000 +CVE-2024-36302,0,1,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000 CVE-2024-36303,0,0,df934a12848c0dd1c8082cb1b858c10ff645614a704b864efd226bf61c7421a9,2024-06-11T13:54:12.057000 -CVE-2024-36304,0,0,b3714d817d8c247b7e05327a04206176cd4063213840cb0c6b7a7752c1ecd703,2024-06-11T13:54:12.057000 +CVE-2024-36304,0,1,6553eaeab20fcc6f7790fe6185a6579754d58c81bbcc384ed85838792943d3e1,2024-07-03T02:03:04.557000 CVE-2024-36305,0,0,25c6009804152d7b9979d9821e9e70f3611f20519825a820152254cf8944cddc,2024-06-11T13:54:12.057000 CVE-2024-36306,0,0,b7a506dff1a266cee79d9db49c2ffc0e2570931464b091df5cbe92fde0600ec5,2024-06-11T13:54:12.057000 -CVE-2024-36307,0,0,65c2a77849c0c655edb7178a3a2e5c766b2febfc39d9416a3d5029d11e9e67ca,2024-06-11T13:54:12.057000 +CVE-2024-36307,0,1,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c714342692d4,2024-07-03T02:03:05.420000 CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000 -CVE-2024-3633,0,0,2db7ffc7f459790f265177a4532d2ef952cf54b88f78dafb34a118075cb27942,2024-06-26T12:44:29.693000 +CVE-2024-3633,0,1,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000 CVE-2024-36358,0,0,0b6d0d7e847e5e80626827024fae1ecc3aa20949dc775e143afeabadd5937bd0,2024-06-11T13:54:12.057000 CVE-2024-36359,0,0,e478cf489bb1ede60e62fa94e4217a61161e3068e762986d86e699f0d3644034,2024-06-11T13:54:12.057000 -CVE-2024-36360,0,0,a5c3b4431d27c52be66754c15eedf653964fb175d4438f87ce6b9a5f0826f114,2024-06-11T13:54:12.057000 -CVE-2024-36361,0,0,e6bb6c383c1666ed2ebd76c2860daf874be766774cb8ee3c270f4225933d1164,2024-06-06T16:15:12.457000 +CVE-2024-36360,0,1,ddc5300b7bb869f12d74d4384687968a3f779184e5862714938da7b9d3508d56,2024-07-03T02:03:06.327000 +CVE-2024-36361,0,1,3cd4e07c7240fb19021613a23fe7d45d63025b12242ea82991b9d6a8d7e938dd,2024-07-03T02:03:06.537000 CVE-2024-36362,0,0,8fe53587d01d75cf05d382c4cdc9dd5acba96213b931891c8617ccaeb71fb210,2024-05-31T14:15:09.370000 CVE-2024-36363,0,0,5dd5d563c190558c74ba8e221bb4206b3001359840c2c456abec432adc87e684,2024-05-31T14:15:09.563000 CVE-2024-36364,0,0,6ac32d8adace15a677fa5bc42198d57cecf30b9147b384f0064e076f7f48b913,2024-05-31T14:15:09.660000 @@ -252994,18 +252995,18 @@ CVE-2024-36420,0,0,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df CVE-2024-36421,0,0,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000 CVE-2024-36422,0,0,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000 CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000 -CVE-2024-36426,0,0,b4e77ad9e3c809414d8917ef0e48e37b5fd9f4bf9093f3155502aee0ee6063a0,2024-05-28T12:39:28.377000 -CVE-2024-36427,0,0,293226c6bcd994263dc2fdfe762b698685b7c5a39208c64b5ce6ccf8d2a3d9bc,2024-05-29T19:50:25.303000 +CVE-2024-36426,0,1,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000 +CVE-2024-36427,0,1,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8d2a,2024-05-28T12:39:28.377000 CVE-2024-3643,0,0,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d3b,2024-05-16T13:03:05.353000 CVE-2024-3644,0,0,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 CVE-2024-36454,0,0,119ecbd34abcc47a263eca5a7b8a20f07f9103015a4c85c0f4c832e1c8eae2d9,2024-06-13T18:36:09.013000 -CVE-2024-36459,0,0,f16fb8ed963dfe95b4fc272449b1a09c6b89c0f3723f92fd4ac68a38bf250292,2024-06-17T12:42:04.623000 +CVE-2024-36459,0,1,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 CVE-2024-3647,0,0,ca25e9298939397c868176f0412c03a959d2ccf69e0a681bb97da636a0c7782e,2024-05-02T18:00:37.360000 CVE-2024-36470,0,0,eca9d8a200b88d17a126a01f7740a10369dc45c4d4bdc3d30973fc6663ec4526,2024-05-31T14:15:10.607000 -CVE-2024-36471,0,0,7bfc01a91f1334cb206068a1dfaffdf29e68b3bf2783355d50e083ff5a6a3868,2024-06-11T13:54:12.057000 +CVE-2024-36471,0,1,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000 CVE-2024-36472,0,0,9bfd7afc4b2e800059c7e7a1cc84b36bb079950920b1605d92cfb4dcf501fc09,2024-05-28T17:11:47.007000 CVE-2024-36473,0,0,fdab9cfd1652fb2a67390d3a8e49efbc4911425ddf31224888be2ea2f102443c,2024-06-11T13:54:12.057000 CVE-2024-36477,0,0,b59e5d5af1c6acdc24e1a63eef92e4f9122e2b4bb56c6b73955e396539bd4c7b,2024-06-24T18:38:40.737000 @@ -253018,8 +253019,8 @@ CVE-2024-36484,0,0,d8980b6175f97dcbe3120732bdd3f5c4554f0bf6402d98cdd4a7efe1e2dc7 CVE-2024-36489,0,0,706602251538409bdd6d4f26c7d5b5f5da3d2d56202958896118ef2720f4e680,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000 CVE-2024-36495,0,0,8c9396310106fc0ed472fdfac70b04def80f0697a214373feab7064d38e55057,2024-06-25T06:15:10.057000 -CVE-2024-36496,0,0,96ab23d9f31071e7647863395db620479f7d27a83452811dca7994cfd61d5c7b,2024-06-25T06:15:11.413000 -CVE-2024-36497,0,0,737894768aed23bd88754653f442468575f9190f8878a367c837720ad55227e3,2024-06-25T06:15:11.513000 +CVE-2024-36496,0,1,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 +CVE-2024-36497,0,1,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000 CVE-2024-36499,0,0,077c5caf8d301ff2d1947e18a01670bc02e5c0dd9fda48352816e5be2251d0eb,2024-06-17T12:42:04.623000 CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000 CVE-2024-36500,0,0,257fd399a14a7141c50c9e2046f94aaac781c0de172f7af5b46d8dab39ba2a83,2024-06-17T12:42:04.623000 @@ -253028,73 +253029,73 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254 CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 -CVE-2024-36527,0,0,78d7584b160535d1351b569ab12493248c714d50ee4dfafee49cf0501ef01071,2024-06-20T12:44:22.977000 +CVE-2024-36527,0,1,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000 CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000 CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000 -CVE-2024-36532,0,0,4ecc13b4c128bec93f6e823ccd296809f806d38583394cf96f9983f47941daec,2024-06-24T12:57:36.513000 +CVE-2024-36532,0,1,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000 -CVE-2024-36543,0,0,96dadbfc1ecb488523e1445b9cca4f88005d70a44d460cd8a195bc76559786cc,2024-06-20T12:44:22.977000 +CVE-2024-36543,0,1,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000 CVE-2024-36548,0,0,9d28d8e8972db5bd27a8a65faaafcca56f3bdf2175ddc670e3a757d6c577d105,2024-06-06T15:24:02.577000 CVE-2024-36549,0,0,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a996,2024-06-06T15:24:35.210000 CVE-2024-36550,0,0,affd201d52525b08fe9dc0ac43cf536ec50f780fc23bf861db62d86c798cfc86,2024-06-06T15:24:43.683000 -CVE-2024-36568,0,0,f6757785c01c43727d227a9340ded7869db334138c1e07644080e388c657d4de,2024-06-03T14:46:24.250000 -CVE-2024-36569,0,0,cc62a3b4fb5fe5cf7891883c6e12ba14de517f9765eb42867751af3c3e50f0ad,2024-06-03T14:46:24.250000 +CVE-2024-36568,0,1,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000 +CVE-2024-36569,0,1,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000 CVE-2024-3657,0,0,cc8d5e168f89f0134207e085af69525a0d15c2797a50f745be104a59afa27c9f,2024-07-02T23:15:10.747000 CVE-2024-36573,0,0,fe17576bb75552079566dd5d6c7a5851d1d43b2b8ea1d59b23b3fc0b98ec48b6,2024-06-20T12:44:22.977000 -CVE-2024-36574,0,0,0848b880836181907f2f643113be33bf38b0f27e048a009439c6d54141479ec7,2024-06-20T12:44:22.977000 -CVE-2024-36575,0,0,5088cc8230af34a6553ab5b03d7ac65d8e6dd090c538b3da6412c983cb2c9c3d,2024-06-20T12:44:22.977000 -CVE-2024-36577,0,0,0a24527bd7e0655c846a00acea63f64354529ccbe7e2b776a57bb2f876d338b0,2024-06-20T12:44:22.977000 -CVE-2024-36578,0,0,5f9a4c402bba76c7557cd8e724384718288c5ac61b96cd4155ceb9c4cfd58bcb,2024-06-20T12:44:22.977000 +CVE-2024-36574,0,1,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000 +CVE-2024-36575,0,1,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092c4a,2024-07-03T02:03:19.590000 +CVE-2024-36577,0,1,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000 +CVE-2024-36578,0,1,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000 CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000 CVE-2024-36580,0,0,d5906284499fdb7c595238f9ae8dcc879081c712e4783aa05752ed465a0ab190,2024-06-20T12:44:22.977000 CVE-2024-36581,0,0,c413c68ea18d4a2466915c4cf84a760fdc7347d8011360e27296b6648f443897,2024-06-20T12:44:22.977000 CVE-2024-36582,0,0,45f87142f9a5e9e5e5696a5ee24e464582757274df8404620787ffbabef5ee66,2024-06-20T12:44:22.977000 -CVE-2024-36583,0,0,4ed35952c0aa0ce8a7976492a381da1363e45eef5c87a4eb5e0be4b43b47803c,2024-06-20T12:44:22.977000 -CVE-2024-36586,0,0,302fd67d5bf11292556b5a817ae025f56479dee1787f148e919beea3947496ec,2024-06-17T12:43:31.090000 +CVE-2024-36583,0,1,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000 +CVE-2024-36586,0,1,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1aacc,2024-07-03T02:03:22.850000 CVE-2024-36587,0,0,906aafdc070e7118cc2f1e5d5e49e8746361ad3b3c3a10318730a2cccba4b3ea,2024-06-17T12:43:31.090000 CVE-2024-36588,0,0,041c855a0e5ca096dd16030ca52f4146f7b727baaf22aa52e219f4870ac0578a,2024-06-17T12:43:31.090000 CVE-2024-36589,0,0,650772a4e12d6982e0e5b9fe9dc65ca1c770c5ffc3b4cdc3422f878d38ef9604,2024-06-17T12:43:31.090000 CVE-2024-36597,0,0,7d9aee11fe90a7c918b9e6d994a87fe5eac6f20be15838ed431e6246cfd689b7,2024-06-17T12:42:04.623000 -CVE-2024-36598,0,0,48a7f84b262a583bf9004fee30eff522e0b8984e0994c43322d9fe6b0152a0b4,2024-06-17T12:42:04.623000 +CVE-2024-36598,0,1,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000 CVE-2024-36599,0,0,9a15a33c7489ab37c6a5fa2897d627b0bcd61f22458c24f2c9412064d5ed81ca,2024-06-17T12:42:04.623000 CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000 -CVE-2024-36600,0,0,528d617ba99d44422001ec52e277c8720af143b7d8228ce2c53d51a37cabe886,2024-06-17T12:42:04.623000 +CVE-2024-36600,0,1,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000 CVE-2024-36604,0,0,38f77f753935bc42c015eb31deee2068198d6e188158d2d88cd9ce30dd28f28e,2024-06-11T14:24:17.413000 CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000 CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000 CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000 CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000 -CVE-2024-36647,0,0,7e47b1f8da086773a4d06e9ee87b1de2afb0bab841045911f2c33501b0f8f4f1,2024-06-13T18:35:19.777000 +CVE-2024-36647,0,1,c31e7e6b8080244a2de4852013b2b5eae9e0c7673d9ba9c0d0cbf4624eea7349,2024-07-03T02:03:25.473000 CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000 -CVE-2024-36650,0,0,3f0a36bd630b2dc6620e742965eefd261b45338830d0f3fa298a60ae1dff4c86,2024-06-13T18:36:45.417000 -CVE-2024-36656,0,0,bf9c71b2294c13f715537aed0b8d7949a78e36f20e72e87046faa19b71dcf8af,2024-06-17T12:42:04.623000 +CVE-2024-36650,0,1,a6dc4fabc18762dbfb018c0e11850a01ac287f515682c65a85c025009c2704da,2024-07-03T02:03:26.290000 +CVE-2024-36656,0,1,da14d6f6b98aba8dd134bbca05ce0beee2307c23e23b68d72ed361bfc76eaea0,2024-07-03T02:03:27.067000 CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000 CVE-2024-36667,0,0,2ee20ee9ba43e63dfdbff587544936f139d5519e85459328e645e784129e0d89,2024-06-27T14:53:18.847000 CVE-2024-36668,0,0,45691d42970329f6de186d652353828881aa8018139af31694f18209a8b93788,2024-06-27T14:53:27.607000 CVE-2024-36669,0,0,9589e40c7f1ebe8be0cb77569ef95126ebef4cb9ad0cb76443fb20474e3295a6,2024-06-27T14:53:35.357000 CVE-2024-3667,0,0,b8aaa7837b9708a00cf0b0659c0d909767a8ae9572c9d0bb67e828adada10c4b,2024-06-06T14:07:44.473000 -CVE-2024-36670,0,0,fdafe9c66140e5a2018ce6b3a330b135107007226ee1c746bda0de7803753e50,2024-06-06T14:17:35.017000 +CVE-2024-36670,0,1,98051372c03c4f8daf963a6b52983fb8a9582924dc9f1a3de21e1b0831613748,2024-07-03T02:03:27.853000 CVE-2024-36673,0,0,c3fdb493385fd7349af8a7f0f647aa65a0c25320dc90b659d1425197d89ce5bd,2024-06-11T18:27:20.950000 CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000 CVE-2024-36675,0,0,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000 -CVE-2024-36677,0,0,9f75570545ecba2b72703a8b10ef48a3072dcad0b0da2c3a9395d1cde3c4cf06,2024-06-20T12:43:25.663000 -CVE-2024-36678,0,0,b40bcef505929051186338018132624ab6cbb572787979182cd8c6d26989404a,2024-06-20T12:43:25.663000 -CVE-2024-36679,0,0,8821e4eea3e4aeed8d65a516b06861a5717cd50e7124b3274b0fd92bade0c86c,2024-06-20T12:43:25.663000 +CVE-2024-36677,0,1,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000 +CVE-2024-36678,0,1,c0825943f1d5219c9624193357755cc06a7e20f8bcb4f135a8b3456b8cac03b6,2024-07-03T02:03:29.450000 +CVE-2024-36679,0,1,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0c1d,2024-07-03T02:03:30.273000 CVE-2024-3668,0,0,49d55bc0cfb418bcfc9437877f4056373badba24215047598ce2c0a1a6dfb761,2024-06-10T02:52:08.267000 -CVE-2024-36680,0,0,d0d5945762cb2164a2282b055a60546e9c27ff729e4565b5f8f11eb263a62624,2024-06-20T12:43:25.663000 -CVE-2024-36681,0,0,ccf99be2d41fa72a8eb3bbea6be382a291c87a641b5a5b5f4cd17b9c70b6a3ff,2024-06-25T12:24:17.873000 +CVE-2024-36680,0,1,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f28d2,2024-07-03T02:03:31.083000 +CVE-2024-36681,0,1,91ab5a39355fb60d1e0e5e355644e5363b5d880ec14684cab5ae1016626028b9,2024-07-03T02:03:31.853000 CVE-2024-36682,0,0,866e96df4efc86beadf4475f6c4cd90092f5a3c14d138f91c23e3822ce3f1b58,2024-06-25T12:24:17.873000 CVE-2024-36683,0,0,44182fb4ce182abc4714324cf5c81e3c173647eec66ba51bd23b657303771b58,2024-06-25T12:24:17.873000 CVE-2024-36684,0,0,04438f1f2d344e3fc16c304c18197337a565e4aba220854d4ffac5c0b815632e,2024-06-20T12:43:25.663000 CVE-2024-36691,0,0,eb8762b05fd0460b1321a45df3641c06640e12f5ae9e65b313352697eb6ff0d2,2024-06-13T18:36:09.010000 CVE-2024-36699,0,0,4c8862d154ba42ed56a4ce8bf1e6f3cc34d74fcc619fdd49ec3e97bb2690a0fe,2024-06-14T15:15:50.967000 CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000 -CVE-2024-36702,0,0,50285d6d8fdaea84eea2ac1bc1d5b710fdf204a17b2bce93ef63c9e2511abb34,2024-06-13T18:36:09.013000 +CVE-2024-36702,0,1,3210d1551f985a1be028e17dfcccc53d1d6245bdae9389bfe77a8fe591c428bd,2024-07-03T02:03:32.733000 CVE-2024-3671,0,0,d4c07d059b6fad473ffadbf866eab2d0161459cafd3d5843ab40df0df4e33fe1,2024-05-22T12:46:53.887000 CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000 -CVE-2024-36728,0,0,c142ea0768030475e09b67970d6d134ac1f264f478c1f3002c31225e15f77734,2024-06-03T14:46:24.250000 -CVE-2024-36729,0,0,2c244c4a3a2cb44a7504dcb212c431ab42bba9c836d2f1f20d6f1d5f7d2902cb,2024-06-03T14:46:24.250000 +CVE-2024-36728,0,1,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000 +CVE-2024-36729,0,1,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 CVE-2024-36730,0,0,9dda72b0002f8a905b914a8cd36ff962846bc847eb5c21d1bd86d0b7cecb8586,2024-06-07T14:56:05.647000 CVE-2024-36732,0,0,d2047b08a8fc9347417a01d7e12d415f90cadfdb990e6471de1f6c3bf71b340e,2024-06-07T14:56:05.647000 CVE-2024-36734,0,0,d69484de6d95841b2668a312f78840454d9d5fea259be344a7e37c00f91278e5,2024-06-07T14:56:05.647000 @@ -253104,12 +253105,12 @@ CVE-2024-36737,0,0,ed3abada6b42917ea7f9f032fa5e9c6eaeb8eff7fb60e2f6d790a0d7c02e4 CVE-2024-3674,0,0,f0fad7a5bda9e15945dde9432e31b1e267affdedcf2e230210a842bcd40fa4e1,2024-05-02T18:00:37.360000 CVE-2024-36740,0,0,aae82699ee7e0aeefcea8ddf838caf624c3999d81e4756b1ea8205a87e01a7a8,2024-06-07T14:56:05.647000 CVE-2024-36742,0,0,2941ab796d29923e5003ba921e34147b367638496ca61de6313da56f2bc0d8af,2024-06-07T14:56:05.647000 -CVE-2024-36743,0,0,947029ef079964db2f975300f543b502c98bef02b4c5f9f3d5de943b90d777a7,2024-06-07T14:56:05.647000 +CVE-2024-36743,0,1,918adf8ca0ed469017b9c6faa54a88497274ae724212583479f2aa193c53be72,2024-07-03T02:03:35.050000 CVE-2024-36745,0,0,c21f6d498139c367702b2a5b310b830e45905feb661fd13e2ada12120c92ab59,2024-06-07T14:56:05.647000 CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000 CVE-2024-36755,0,0,0d3087cdc86b4119e530303acbaf095f72e78ae16a77d0f4a8b01adcf870e9c4,2024-06-28T10:27:00.920000 CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000 -CVE-2024-36760,0,0,897ef07013c673251dc351acece72f77bd0814f03b1d64cdffdfe62a5a19b3b9,2024-06-13T18:35:19.777000 +CVE-2024-36760,0,1,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000 CVE-2024-36761,0,0,041a212c076f1136e2779e71c78a9b4ede72b24b7b3151a3477ecc5877c87618,2024-06-13T18:36:09.010000 CVE-2024-3677,0,0,822256c91d31044a13b27ee319c8c0a4bbd148e7653d3ef44cb1c97299aa9fe7,2024-05-02T18:00:37.360000 CVE-2024-36773,0,0,e0e217eb50adf6e9091270c5252716d99cc5165c3407e09ad7b21f3b1bef4e14,2024-06-07T19:24:09.243000 @@ -253117,13 +253118,13 @@ CVE-2024-36774,0,0,2df072beaff79bc30583e2884ff43f38048f215ce893570cbe619b2c4b3ea CVE-2024-36775,0,0,4b375f407da92147ec03b418aa34ecf2eb865c48a39c0ec7b6825445f826777a,2024-06-07T14:56:05.647000 CVE-2024-36779,0,0,0ee53513eeb0bcd7f3b430e83c9f130011bfbd10a7376084bff983db73674b7f,2024-06-11T18:14:35.890000 CVE-2024-3678,0,0,d720397e0ff5aed34935621b66252dd502ae3dd7e987e20f2aefa29510c09059,2024-04-26T12:58:17.720000 -CVE-2024-36782,0,0,e7ea68c65c5ca104712b302d02b4ac394c2f9961920c167363ea2d5cb5f8492d,2024-06-04T16:57:41.057000 +CVE-2024-36782,0,1,a26ba637b3d65bc93f6cef8eab2e486cb22e0f173ff0b09ffa5f5054e7e91e9a,2024-07-03T02:03:36.797000 CVE-2024-36783,0,0,836a2ceb0d98b8a700028ad4ff916db5f51e7a924e1a9f84d5d28e5cfa23ba3e,2024-06-04T16:57:41.057000 CVE-2024-36787,0,0,b5758e4606a434c61f967df8647bff3360721293f2d9c17abbf0e68237896f89,2024-06-07T19:24:09.243000 CVE-2024-36788,0,0,fc50280df923da7402dbe7fe4fc5d2d29a9f051b9bb1fe884383aeb94bcfe4f7,2024-06-07T19:24:09.243000 CVE-2024-36789,0,0,642a079c8356d5b14bf5586c385d00232b2b1594b6010f3e0ecd83de5940687d,2024-06-07T19:24:09.243000 CVE-2024-36790,0,0,c10161b472ca94723b615fbaf84875badf4aa6d0377dbdea5d7cf0f91202b682,2024-06-07T19:24:09.243000 -CVE-2024-36792,0,0,3144959b1e1ef01222e781ea888fd0c03d813d53a3905a3b7ec5ec28e7233102,2024-06-07T19:24:09.243000 +CVE-2024-36792,0,1,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000 CVE-2024-36795,0,0,85e3975032f158649d202197d4f3d1d367782eb9719b5cf4299505053a485fcf,2024-06-07T14:56:05.647000 CVE-2024-3680,0,0,b1ed78ba2c31e060c65591b1b4aa0e0cdd627bc790583f352919e473d1394bc8,2024-05-14T16:11:39.510000 CVE-2024-36800,0,0,785b7fa43c87f2b51e704c91b6ff6c5c3ccea1388fafbf5c6cbad8798125bdd7,2024-06-04T16:57:41.053000 @@ -253137,12 +253138,12 @@ CVE-2024-36821,0,0,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3a CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000 CVE-2024-36827,0,0,122a045e95fe548424707b69a5d81cb1d2970259814d1c03f8e1b4b2c344d0e6,2024-06-07T19:24:09.243000 CVE-2024-36829,0,0,6eb0783f0584e9de50671adccbe8e7f0a1dc803b2458c66ec80ede8dad219d91,2024-06-27T12:47:19.847000 -CVE-2024-36837,0,0,9837561b3eb4109cddbfeb72c7253bf6ec01f4922f80106622bd91fb8fbae4e9,2024-06-18T18:54:51.380000 +CVE-2024-36837,0,1,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000 CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000 -CVE-2024-36840,0,0,4a6f09cefc62787a0fbedba2a44163b90d3503531e692316cb82598d8c83950c,2024-06-13T18:36:09.010000 +CVE-2024-36840,0,1,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000 CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000 CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000 -CVE-2024-36845,0,0,4b9d7b96ab3c57fe0fa6236fc4a20ae85e48dc606d8eba3c5478623a05a01e27,2024-06-03T14:46:24.250000 +CVE-2024-36845,0,1,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000 CVE-2024-3685,0,0,f921a0a401f8b4f7737f6fde068e597ed9cc1b4c23e79252700a3c350a96640b,2024-05-17T02:40:03.840000 CVE-2024-36856,0,0,1a95fa3bd987cd1b81c1ee3498a0a3dd80867b1d69377328d4b18586d7ff801e,2024-06-13T18:36:09.013000 CVE-2024-36857,0,0,6ca6782e9ef9e00253d513b24ebf4bc1e4911443d20a0960a90d34bf61a682ab,2024-06-11T14:13:14.437000 @@ -253156,19 +253157,19 @@ CVE-2024-36882,0,0,6ac152d75b84c2df3f3d5795df4f9937e63b77f454cdcd851f35ef8e7b4a5 CVE-2024-36883,0,0,74c69c8edfb7ce26fc4d792167b7422268bb6708e4986009bd2bce645d02a637,2024-06-27T13:15:59.953000 CVE-2024-36884,0,0,cd36e9089cef290772209fcc4df998d16f55fbee0331c66875243c4b6218afff,2024-06-10T19:21:50.973000 CVE-2024-36885,0,0,04a352a08671e0d2d2658418cf7959b38ab0d79bf07127e7b7f7d2f1f5403f6f,2024-05-30T18:18:58.870000 -CVE-2024-36886,0,0,40d8447f20bc6ce069c7597cc5f8c173b9207da3395f69e4bf9b486d2ddf604e,2024-06-27T14:15:14.100000 +CVE-2024-36886,0,1,4d71a587fd1837e7da7a5a58d41c9d2b5f72f102fc502b0601cc6299af1138ed,2024-07-03T02:03:41.640000 CVE-2024-36887,0,0,e6b7bfce672ceab96bb4af4b461eb80a380219490bb80688e6ea00d355066637,2024-05-30T18:18:58.870000 -CVE-2024-36888,0,0,7d59857fd4e612a1991dd7c2d50d12b68bc72215fe0a786d2772936b46a86027,2024-05-30T18:18:58.870000 +CVE-2024-36888,0,1,763b6ee4a46984b71902d5a4937137e41f4439c4630537437f85955220fa9520,2024-07-03T02:03:42.560000 CVE-2024-36889,0,0,3395addb4cffaf291abfa70485d44080787753ee143b9ed3f4288ca45efe4d46,2024-06-27T14:15:14.190000 CVE-2024-3689,0,0,4e275fdb6ad676996e7dd24bdab8010cbe28b08cd69841b3ca38f41f40d6e7c1,2024-05-17T02:40:04.233000 CVE-2024-36890,0,0,c51194089bf8780a96e9dc427391f6ebdd9825677b3ec9deee67b0f0913295ef,2024-05-30T18:18:58.870000 CVE-2024-36891,0,0,40addb420f8a410ccf604b489d28feef726ef30338834deb12f3c32613ad8f70,2024-06-16T13:15:52.713000 CVE-2024-36892,0,0,ac076b0351d49cdd158ac43b8356e62df7dacdff06db9fa8beb0f93a099b8efb,2024-05-30T18:18:58.870000 CVE-2024-36893,0,0,ce840742d343936212cf080c5b501cc4fcc64456f9cb0e86a905123c92ec8ab0,2024-06-10T19:21:29.260000 -CVE-2024-36894,0,0,38b109a32c986f13eb61a62b404b153473408155a87d62d4ef78dc83749787be,2024-06-21T14:15:12.163000 +CVE-2024-36894,0,1,d2797bcf8fc809f5d9792481a1565a39a769604c0797e149095586d97d1713e0,2024-07-03T02:03:43.843000 CVE-2024-36895,0,0,b63c383fc302fb6cc72af9a51ff5609c306464804833ec5fc78a47e5b201ee30,2024-05-30T18:18:58.870000 -CVE-2024-36896,0,0,050492bbd679d35b60dcbc95bd456bbe039e944130409ef3785df50b27fb83ae,2024-05-30T18:18:58.870000 -CVE-2024-36897,0,0,0cad23c2b3472a6e36ed370c20fe883e11419b8070c8920f764cc5219196db6f,2024-06-10T19:21:20.813000 +CVE-2024-36896,0,1,69dacce3fac79060603cf99433899fe6c7c693a726f207a653be56197794c521,2024-07-03T02:03:44.757000 +CVE-2024-36897,0,1,001cb52f2015bceca0d484f595f8a8a6c372fbe09daaf10674ffb693db0094e7,2024-07-03T02:03:45.570000 CVE-2024-36898,0,0,09573b1910b2a7e116e9ba31d1da06b4362db2cc61980947fd9c918d04d2f260,2024-05-30T18:18:58.870000 CVE-2024-36899,0,0,aed6d669cad39777ad8d3f5ad5640da5cbc0de9fc5ebd87f7efca7905cd39457,2024-05-30T18:18:58.870000 CVE-2024-3690,0,0,b4159f29e38837f138a04af86574673cb07d36e78588902798316a6803061f4f,2024-06-04T19:20:23.213000 @@ -253177,16 +253178,16 @@ CVE-2024-36901,0,0,85c092d93b837b14e5d35f604c3d2ca54f771ae885f4840c0490338e54dc0 CVE-2024-36902,0,0,2d30aefd2ed86ea2be6bf8e9d247aa947fe4ebba63333cfe80bfb35faf2b1367,2024-06-27T14:15:14.263000 CVE-2024-36903,0,0,c0bd9fae019dd75bd7cd109c0e7d1761df45f34c7182adf032cf81acf2921b9f,2024-05-30T18:18:58.870000 CVE-2024-36904,0,0,06dc15ffda165116aeab59c67fdffb5dbda0b458dae14e14a6bdf796c4dbf9f6,2024-06-27T13:16:00.043000 -CVE-2024-36905,0,0,72ee64ff9a7209fe797c4f73b5723b06f1ea5b39d88283c0a18315439153fa18,2024-06-27T14:15:14.377000 +CVE-2024-36905,0,1,f4c18ac2e3f61a705a011968a4e3e37e46a88ae810f2099f2d2200a5748c4c92,2024-07-03T02:03:47.120000 CVE-2024-36906,0,0,4a6f108012e4ea73c41f1aeb0e2c2a94d603ad421f99c24445dd1441f8a3e03f,2024-05-30T18:18:58.870000 CVE-2024-36907,0,0,19d37de24694e5b570ccefe348d369ee5239e9fda6fc2672c006b7669b49c668,2024-05-30T18:18:58.870000 CVE-2024-36908,0,0,5c7088253b542145b67ada77e543285e91c02f2d851260f875a687c93ebfb6ad,2024-05-30T18:18:58.870000 CVE-2024-36909,0,0,55cc3e213c03711277d8919bc58f7d283fd8174d7c8421bc8a803e60265456ca,2024-05-30T18:18:58.870000 CVE-2024-3691,0,0,a3ef0330e098bc1c86867b04897ce2cca7e0cbd9e7d8b6849aab6c0f324d47f5,2024-05-17T02:40:04.407000 -CVE-2024-36910,0,0,1b65b3c95b73a0875047621d2f74fe4ba86bd7fa1c17f95c627e7021ed4bb9c2,2024-05-30T18:18:58.870000 +CVE-2024-36910,0,1,40583cd9f13175a05952799ccb9247ee405dcba2dbb30942f6d83e17bf72952b,2024-07-03T02:03:48.127000 CVE-2024-36911,0,0,36172f5dcf9cfd0e4725a05f8a41361690eea252179753ff9e7e829faa51a9fb,2024-05-30T18:18:58.870000 -CVE-2024-36912,0,0,6c6334b02fbacbf7654ad32554ef474434e084c6254ee34ea2466299ef9c8ef7,2024-05-30T18:18:58.870000 -CVE-2024-36913,0,0,33de768a6ab684c702541d17c5df48d1f7d659838911ba3348d8959ec5c54434,2024-05-30T18:18:58.870000 +CVE-2024-36912,0,1,4d16e3c0e44dae74fb4f56ef66d76111321868b505627c129ae05bf55e598345,2024-07-03T02:03:49.030000 +CVE-2024-36913,0,1,b5701a70b17faedcb86c05267b95e0568110660dd09bba586abfe504bf7e17cc,2024-07-03T02:03:49.870000 CVE-2024-36914,0,0,36c0b350713b85890b439f8c6d3af60678fbec14d25cecff8e3137be70837f1e,2024-05-30T18:18:58.870000 CVE-2024-36915,0,0,494ea3162f161ea96be446677722e626ce3842e9447f9c8787f0bc354c9a9ee5,2024-05-30T18:18:58.870000 CVE-2024-36916,0,0,ae7bfdf1f65d6316cbdfca35008b4f6c7fafece459dc4f41a1610ce9c670d0d9,2024-06-27T14:15:14.463000 @@ -253200,7 +253201,7 @@ CVE-2024-36922,0,0,f104ecce2cb4656f96775d65e542035b67394a8d78aad45d102e3cb2782e8 CVE-2024-36923,0,0,738d0405c762e6511dbb480c5fb84fc98cd7a757fd38a930e5b63b1d13ac332b,2024-05-30T18:18:58.870000 CVE-2024-36924,0,0,5f8a47c56f23fae880a0772825e16f0f69cd6051c20b535206d3c785bcd3ac4e,2024-05-30T18:18:58.870000 CVE-2024-36925,0,0,74da30db17b1bcff8f667ff4e8ed2e76ee371b60358224dc52dc3b1cec1aa55a,2024-06-10T19:21:01.693000 -CVE-2024-36926,0,0,eafb8dbdf2ac017b4c94bed796d1f949af0168dbaca909c06c9aec68eb54f80f,2024-06-10T19:20:56.143000 +CVE-2024-36926,0,1,44a79207e2295dd595b2107f8ce477f75e3fe4a37f25fec68904bc438c80d6aa,2024-07-03T02:03:51.367000 CVE-2024-36927,0,0,e4034f0e2d8c270582c914fd3f3e95e6950f0389fa6c8fb07f04bc398a8627d5,2024-05-30T18:18:58.870000 CVE-2024-36928,0,0,863125ce475af04fe0d235be6ffe78d53da51051be50ecfd7ca4239029f4a6ab,2024-05-30T18:18:58.870000 CVE-2024-36929,0,0,f884e83fbdc8afa8ea48ee458356b34791b82832b88c80c1e5356c1cc1f085c3,2024-06-27T14:15:14.623000 @@ -253230,13 +253231,13 @@ CVE-2024-36951,0,0,0c6ceea3423c1ce708b5d7427a8d4f211513446bf033c1a27f2c7ab6d1eae CVE-2024-36952,0,0,837c928f0e88d0f128cc83fed5055987dd7ee03c54f8f5e8068e0c970b37f822,2024-05-30T18:18:58.870000 CVE-2024-36953,0,0,5e3b1b8c15f76e42b081a534b4ca63b70f9ab685adb8ec97d69cdfabc96bebe1,2024-06-27T14:15:15.170000 CVE-2024-36954,0,0,d2b15d67c0470756e919ead82d0b0bb982773b7fe8312d745fb535d366a57027,2024-06-27T14:15:15.237000 -CVE-2024-36955,0,0,7987af910197d6959e63178604586394186f14a00b256d58872655a822f8fdd3,2024-05-30T18:18:58.870000 +CVE-2024-36955,0,1,2177d2fec34a0c82ee8955b7c31b7d24aa0bfbc57287be7b8c0e982445dfea8d,2024-07-03T02:03:54.210000 CVE-2024-36956,0,0,48ce9d3602153cee67ef3c807b8328c8128860792c92ba24ee1797ac8cebd024,2024-05-30T18:18:58.870000 CVE-2024-36957,0,0,141de645d4a94e736a2c07f3120dae2fa67c72370eced73b95d985478c45acbe,2024-06-27T14:15:15.300000 CVE-2024-36958,0,0,27ba702862686ffcbfc7435dcc4011c841c4be08d6d6bff774be51941829ca30,2024-05-30T18:18:58.870000 CVE-2024-36959,0,0,8ba5f7e5895ceb6610b5710783919ce6c8513c86020b767ff27e38ab2eeb502a,2024-06-27T14:15:15.360000 CVE-2024-3696,0,0,54c8c42492f1c31e1d0d081b12ae9fb101d447905039b557dcc4372130239b90,2024-05-17T02:40:04.613000 -CVE-2024-36960,0,0,0c462e5a7a74d629c4d70292f57a08e9c322bae7fb58ba05c3e2e2c3486a05d1,2024-06-27T14:15:15.423000 +CVE-2024-36960,0,1,b95b26866e47237dc2fc66a84de293d780a8db9b870d76a7a8442f137192d806,2024-07-03T02:03:55.203000 CVE-2024-36961,0,0,23b0844a9529f3ecfd6285bf875a287ce67af9417a3eb4ff1001834e83635e53,2024-06-03T14:46:24.250000 CVE-2024-36962,0,0,5fce798c0bb35579e13c17bb9f54632747360d5004ae06492f537a1e1919292d,2024-06-03T14:46:24.250000 CVE-2024-36963,0,0,603c4aee8277db74a501815fd4789e2662e4b99b616454a415c4c767068ca598,2024-06-03T14:46:24.250000 @@ -253249,7 +253250,7 @@ CVE-2024-36969,0,0,eafd7633c7400da81e33cfcbe9d23e638a72017a27f91eb9f3474fd90ada6 CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b65a,2024-06-04T19:20:23.323000 CVE-2024-36970,0,0,7821872f33932cd23581e3f08933e1120512f95b8bffb9a221042f6e182c4c03,2024-06-10T02:52:08.267000 CVE-2024-36971,0,0,9283ec99226c893c0491ae4cd8a1a532104544816c180d7de15bc948a019a659,2024-06-27T12:15:28.553000 -CVE-2024-36972,0,0,c8949e99c51cdd06e16d761976785fb3e8ba887f5070dbd12308139f2998e944,2024-06-16T13:15:52.947000 +CVE-2024-36972,0,1,a2ab0e02a9dc38f992f1abc892dfaba943164f0fa5c0a17bc8e30ba95822955c,2024-07-03T02:03:56.627000 CVE-2024-36973,0,0,4ec4f1f7d5bf85141dbd06b8e7324cbd18de7d65efdb460540f386b5ac0ec3d0,2024-06-21T14:15:12.250000 CVE-2024-36974,0,0,52ef4cebb513bd6d0914cb592dbdf3bcb0b6feb9edc1daefcd29b34c26ab0f73,2024-06-21T14:15:12.330000 CVE-2024-36975,0,0,fec62453d9d139bbf281f7602593c857ec33f10da19c238179e6eeabc562fa45,2024-06-20T12:44:01.637000 @@ -253260,35 +253261,35 @@ CVE-2024-36979,0,0,b5c86fe1e151f03cc7911f2db726f75e908559d8b3402d6614d6fdbd11ceb CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 CVE-2024-36982,0,0,4dbd1530815d909f7b8a20adc74abe9eb6b389d94d646bfeec79ddd1688357b5,2024-07-02T12:09:16.907000 CVE-2024-36983,0,0,963311d20d060d062b4f0f3d3b8e4f7386ac835084d2059618aaedd67b3a2701,2024-07-02T12:09:16.907000 -CVE-2024-36984,0,0,476011d1f90bde65a62fc4b5226f6969668486ae065c6436b1692fca0c55422c,2024-07-02T12:09:16.907000 +CVE-2024-36984,0,1,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5d08,2024-07-03T02:03:57.773000 CVE-2024-36985,0,0,71e873d4320bbc49c043e780ddb08eea3bec2039b2afa0729a9979634a3d4853,2024-07-02T12:09:16.907000 CVE-2024-36986,0,0,d77959baa043d26a8556e64500677a30bbeafbe22f29b2b02d1fbd4cca9bc429,2024-07-02T12:09:16.907000 CVE-2024-36987,0,0,b172218ebeacc9820cde42e9dd02bf646a7c40748351537292bbd58793d81f40,2024-07-02T12:09:16.907000 CVE-2024-36989,0,0,367789c208d0ee3303eb46fd1a7a117326cfb2aa0c405856d9692b0f7a7613a8,2024-07-02T12:09:16.907000 CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000 CVE-2024-36990,0,0,aa48358778f1e075473a9c6be8b2232901de5cf6b02efd9b8064650031dc0d02,2024-07-02T12:09:16.907000 -CVE-2024-36991,0,0,f85986f42df16c79cbc6b7bfd0fe3c3772cc97c5d7bace0790c25b40c6da4a31,2024-07-02T12:09:16.907000 +CVE-2024-36991,0,1,f9b4d10a713f169d5c13c1acfee506d96c2280531ba76383dcac8a7e11ca5d37,2024-07-03T02:03:58.577000 CVE-2024-36992,0,0,bcbbb6881d186d85eeb8a22d44f95616b8fd4f4a00ae2d2dab0390da0fa6c3c1,2024-07-02T12:09:16.907000 CVE-2024-36993,0,0,0bf69cc687b9984786a898e5e3bdec70b83ac19c6b025b29f234d81abd1b0a63,2024-07-02T12:09:16.907000 CVE-2024-36994,0,0,41b4a7bf18016496aa0ffc64b6de03767318f5816798a9b5cf2ee34ebedfeeea,2024-07-02T12:09:16.907000 CVE-2024-36995,0,0,48f90593111cc04ea178c4e656d9a82f3e628ccad1b92a7f93b8a54e4eeda513,2024-07-02T12:09:16.907000 CVE-2024-36996,0,0,31e362903c36afc041aebda059381ab0aabf7dcc26b2083cfbc7e435169bd342,2024-07-02T12:09:16.907000 CVE-2024-36997,0,0,1cc73090777f044df0fe8b995e16d0bef22068c2f0f6088f6573489503bd8171,2024-07-02T12:09:16.907000 -CVE-2024-36999,0,0,e623ac69d78c1d872fd9d23ebed97cd66e8b6293086bcd7909366177ce71d4fe,2024-06-25T12:24:17.873000 +CVE-2024-36999,0,1,734e0568d2623f6b7394de1b2c703cca096721b07c4ba47885bcabdc0e4abb78,2024-07-03T02:03:59.553000 CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 -CVE-2024-37000,0,0,a7ce938c2375111dcdf9fa56d08df7bf8307bd849e0b0ce2b6f89977fd5cc422,2024-06-25T12:24:17.873000 -CVE-2024-37001,0,0,4d1c5c28a7e84d12a719a4e4c73b1ebd37cf9a762fd9671fffb22a1b37047fa8,2024-06-25T12:24:17.873000 -CVE-2024-37002,0,0,1d8ea789fd94d1d9e45333bd1688c87d3bf0a220ea9399871cecf34bec5c4335,2024-06-25T12:24:17.873000 -CVE-2024-37003,0,0,42b026fd72bb40667980364b96d99f029ab43db04399d50d09f7cbff523326e8,2024-06-25T12:24:17.873000 -CVE-2024-37004,0,0,8876c8d2dd305512fdd4804d192c33aa2b5a192415a76bd52d7210f63087a080,2024-06-25T12:24:17.873000 -CVE-2024-37005,0,0,930bf62043bdff1a520d38cced5d6267328c06e2533705ccaa1b2c49a23a9e24,2024-06-25T12:24:17.873000 -CVE-2024-37006,0,0,d327f4f7ed2697ce1c5c1578094835d020ae3c80106e42d3c9884d76d8adcd98,2024-06-25T12:24:17.873000 -CVE-2024-37007,0,0,f1ec814e6ec207423c623e10fc49c73b92ce1524507fa65a91b9138d6cc06e4b,2024-06-25T12:24:17.873000 +CVE-2024-37000,0,1,eb7342d14f34edf9127b95014f2d19d18d4dda29c980fd9452975dec05564bca,2024-07-03T02:03:59.763000 +CVE-2024-37001,0,1,a113270b19085ce79309db50d3177d7c49c6283fe71ba41a28df9be9d85b1103,2024-07-03T02:03:59.960000 +CVE-2024-37002,0,1,96b8aadcf588b43cf189d5ad044fbfec6cad230c23119b4f1bf7b72417165679,2024-07-03T02:04:00.170000 +CVE-2024-37003,0,1,d97355c0717767637fcf5b7d7d752f635c421c3248171a19eae12f3303f26e1b,2024-07-03T02:04:00.380000 +CVE-2024-37004,0,1,eb821b24aec40cee5d3a4d83d3182056a26abdd06091705aaacecddd90b33396,2024-07-03T02:04:00.647000 +CVE-2024-37005,0,1,6346c3768c56adc2bd0ec197af628ad214cd9981413f2d5df7e8d7f1bc79c5d6,2024-07-03T02:04:00.877000 +CVE-2024-37006,0,1,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55f85,2024-07-03T02:04:01.090000 +CVE-2024-37007,0,1,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000 -CVE-2024-37014,0,0,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000 -CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000 +CVE-2024-37014,0,1,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 +CVE-2024-37017,0,1,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000 CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000 -CVE-2024-37019,0,0,c7b7779ae7837bd324c73dde7cb1a43454b31469d3554588beff0fd2aed9bc3d,2024-06-03T19:23:17.807000 +CVE-2024-37019,0,1,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000 CVE-2024-37021,0,0,6cd5193268887117aa0cfa91ce5bb24e5123c87b1685ec41bfaa6b8c35d1e2fb,2024-06-24T19:26:47.037000 CVE-2024-37022,0,0,2e2eefd3e0454318fd9ea45982b5aef37a4139c6c043004fbe53dd71e5f37e26,2024-06-13T18:35:19.777000 CVE-2024-37026,0,0,d7cbfb6603c7d2d6e0f58c3d85c47d158b70aead88a80ecee6e5f9c900ea1461,2024-06-24T19:26:47.037000 @@ -253326,7 +253327,7 @@ CVE-2024-37078,0,0,07ffa320065553977b456d5493a365b0e5630945bde4b6a809eb6cb991c42 CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985b9a,2024-06-20T12:44:01.637000 CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000 CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000 -CVE-2024-37081,0,0,462e18659ef5f7f4965b221966912e397932217f36959496e3a505bf8400d835,2024-06-20T12:44:01.637000 +CVE-2024-37081,0,1,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000 CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000 CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000 @@ -253339,7 +253340,7 @@ CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000 CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000 -CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000 +CVE-2024-37124,0,1,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,495695df459c199494d49dc1695a63c9c2737bce0dc07937f43f3d0738bd9a3e,2024-07-02T12:09:16.907000 CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000 CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000 @@ -253405,7 +253406,7 @@ CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000 CVE-2024-37280,0,0,549e00d208ea67334db7c6ceeb9cb79f781baad9a857e5758fd905754c6f58de,2024-06-13T18:35:19.777000 CVE-2024-37282,0,0,af986c3c9c4d35a73432126f46db35f5d3c21ad1f56541935c5d8cad0cab057d,2024-06-28T10:27:00.920000 -CVE-2024-37289,0,0,2fb00f90d13443feb2f6a7f1e7d138e51b10efb8192c90ecef8306ef2b5c5360,2024-06-11T13:54:12.057000 +CVE-2024-37289,0,1,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000 CVE-2024-3729,0,0,fe9208be005903b27f9e982914c8adbe6ffd46f8d19d93e705d785ecc61de3fc,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,f0da63058bcf58de65f1096623503997fb39c4c766dc2a028c111b64e3ba77cd,2024-06-13T18:36:09.013000 CVE-2024-37294,0,0,dba61618bee02ef566742444e7eb5067ca185e0e0eae11447db5592bae3eea7a,2024-06-13T18:36:45.417000 @@ -253448,7 +253449,7 @@ CVE-2024-37353,0,0,e6f52a7a7027c04194c2427371bb2186ee89c5f7aa37cf34b91c891185fe3 CVE-2024-37354,0,0,608ee1378cfe9d7c58c071856c1e892d3428f43310e1f01035e1a9fe4c3b2cae,2024-06-25T18:50:42.040000 CVE-2024-37356,0,0,94252885724322b6ee2853c68fc3047a798fb139795883a9a15edce39c0aa7fb,2024-06-27T12:15:28.643000 CVE-2024-3736,0,0,8212a13db4363d6279d1d8c19924659c1f0cf224cf46584ea7e82cad3d6da340,2024-06-04T19:20:23.987000 -CVE-2024-37364,0,0,070f30cc4e6616b0f0ef3a023c4cee97eb2b6bdbb7bd742359fc5c6826335718,2024-06-07T14:56:05.647000 +CVE-2024-37364,0,1,ede4925e44433ddaa6ada4b563ccb7aeb6a9e3cb870f402cba816f78552263a4,2024-07-03T02:04:15.133000 CVE-2024-37367,0,0,aac603db5bb919680e2cd819ce6cb6ca25ea592fb28f92a3759e9a2fd18ea95d,2024-06-17T12:42:04.623000 CVE-2024-37368,0,0,956c028a8638d3a3e19949beb7545c84f68f21d91e6b291904004a55453a08ce,2024-06-17T12:42:04.623000 CVE-2024-37369,0,0,7108a286445619350057461b39fedff0137563337148ca5c14290fc641ad2c5e,2024-06-17T12:42:04.623000 @@ -253456,13 +253457,13 @@ CVE-2024-3737,0,0,e288f29127240d626de190f33aa5cc85cc615dc26f102a0c00221aa9708716 CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000 CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 CVE-2024-3738,0,0,0968d9618a10c036b25eaa390531466819e491a5c992bcf4c715af4b591b9121,2024-05-17T02:40:05.977000 -CVE-2024-37383,0,0,c0362d3d95fe11bdc30f3c36377b27485de734d675fe1b90f60703cfe5051656,2024-06-17T15:15:51.517000 -CVE-2024-37384,0,0,2bdb7db18773042dbfcf7b4442179738e059134c1a70f1a6d09b92e8cfe2872e,2024-06-17T15:15:51.640000 +CVE-2024-37383,0,1,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 +CVE-2024-37384,0,1,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000 -CVE-2024-37387,0,0,b989b6f9a9181325e6202ffc64af4007cc6f76345f94702c71f04fd2017fece5,2024-06-20T12:44:01.637000 +CVE-2024-37387,0,1,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 -CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000 +CVE-2024-37393,0,1,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 CVE-2024-37407,0,0,ee8ce47670290c1c2b55db5b097f09876b3dd9d92be92f1e73bc28ca72e36250,2024-06-10T02:52:08.267000 CVE-2024-37408,0,0,585b814524bdbb81f700ac3933c4f0dceea6dcd8210dcf9df29d64b6ad874ed5,2024-06-14T21:15:51.160000 @@ -253471,20 +253472,20 @@ CVE-2024-3742,0,0,78c61e704f37a9137f7f9be10f02b0ed07c0bef31d61c3d6452a3591123829 CVE-2024-3743,0,0,a066d49023268d129172d910e0990b3a457ebf914ca5a08a9f020fc0da48a3af,2024-05-02T18:00:37.360000 CVE-2024-3744,0,0,3408d488e8996c91d94ffcdb9d000c212f3fb5178aa8822cd0999d10712521a9,2024-06-10T16:15:16.980000 CVE-2024-3745,0,0,0c97e7d88631153724030fc4589ac35dd3957f099e7d9be0c53b9ed0e2dd38f4,2024-05-20T13:00:34.807000 -CVE-2024-3746,0,0,bf665bd1c63d674f7a064c0ad8040bd5128d2f5c4febe3dc8aacfad825f7d80f,2024-05-28T17:15:11.570000 +CVE-2024-3746,0,1,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000 CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000 CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000 -CVE-2024-3748,0,0,b0e27aec04ee07a8ce410bb6d8c3b0277cb63dc4584c172af60f83cc3e59cff2,2024-05-15T16:40:19.330000 -CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12f2,2024-05-15T16:40:19.330000 +CVE-2024-3748,0,1,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000 +CVE-2024-3749,0,1,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000 CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 -CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b36e,2024-06-10T17:16:32.753000 +CVE-2024-37535,0,1,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000 CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000 -CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000 +CVE-2024-3756,0,1,9f6325e6bf8bb208b4e2ee6674c7d5cde657d33007cb72c8f23cf7232b49431b,2024-07-03T02:06:32.530000 CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3bbc8,2024-06-20T09:15:12.253000 -CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000 +CVE-2024-37569,0,1,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000 CVE-2024-37571,0,0,49d013a9c0dec0c40c039ac0b6cc010c02b60f0954bac18608dad027be12792e,2024-06-27T12:47:19.847000 @@ -253495,32 +253496,32 @@ CVE-2024-37619,0,0,fb18acad5ba1a8224fdd33f26f78349bad39bb24158d07ebb826ee85065e8 CVE-2024-3762,0,0,3a4d7121b46153c733feea020bbdc2b15c8dd6dac7706d18d5d6cc6fdd5731da,2024-05-17T02:40:06.647000 CVE-2024-37620,0,0,37467c263f3a10bfc6b745e644b5a43ae65b50bb4f2457ed19a0f152bb8e9d4a,2024-06-20T12:44:22.977000 CVE-2024-37621,0,0,5130c0bcc2cba29b045247f3ea9bd16107f039194b4374647a532239a8d33439,2024-06-20T12:44:22.977000 -CVE-2024-37622,0,0,c5ce5e55072739c990e174478f39d68c083974ab6129554da5a4e33caf326895,2024-06-20T12:44:22.977000 -CVE-2024-37623,0,0,d8395bc9979b8438bd8a5fcda64469a56ed1c7b2c754f62d69464aad225f7a8d,2024-06-20T12:44:22.977000 +CVE-2024-37622,0,1,72464291a01f93964414bd967586f0dc8e108583f1668f09fd2b19a23b93be4b,2024-07-03T02:04:21.550000 +CVE-2024-37623,0,1,b515ba49cdad646a6e4424a0af8caad03b3eeb5dcc7461835b4fa847ff81d1a5,2024-07-03T02:04:22.347000 CVE-2024-37624,0,0,c67dc5f200fd7bd4558aaa3dba0b70e30788e7a5243808acd6e7683dc3c78ae7,2024-06-20T12:44:22.977000 CVE-2024-37625,0,0,a02e4bb7abe01fe5f5451064a7b8497a50e5fc7fa5bd1988eae82c585b3c68a7,2024-06-20T12:44:22.977000 -CVE-2024-37626,0,0,775979113b41fcacdac61c445ebb3e534aee49f9bdbba7559a9b38ede36b4f4d,2024-06-21T11:22:01.687000 +CVE-2024-37626,0,1,67f0e21678f6260b33b002fa2f7c441578e8bb71c1b35d831202b3d9d14d22d7,2024-07-03T02:04:23.230000 CVE-2024-37629,0,0,1d00756a2a17c559759065d32584e34ded12669fdde5bf74562dbb03b1828152,2024-06-13T18:36:09.010000 CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000 CVE-2024-37630,0,0,bf66b2030be40d35050885498117395fd763796c76fee3b35b96849113224fa0,2024-06-13T18:35:19.777000 -CVE-2024-37631,0,0,363de7deb03b89f6132eecd0ca3ec08b114632871523fec55a73a7eb1533ec6c,2024-06-17T12:43:31.090000 +CVE-2024-37631,0,1,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000 CVE-2024-37632,0,0,f362a45d996d3ae3690ea262e6e69e756aaa3eff5eeff8c390f0454c106cf004,2024-06-17T12:43:31.090000 -CVE-2024-37633,0,0,9ce850b530966fa6c58796dd929a92c8c105fce17f09b7240c29afbdbba550b3,2024-06-17T12:43:31.090000 -CVE-2024-37634,0,0,d110433bc20e4cd990dea4b9ffdc4008486368d5721a6f02b9d6b8c5087a374b,2024-06-17T12:43:31.090000 +CVE-2024-37633,0,1,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000 +CVE-2024-37634,0,1,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000 CVE-2024-37635,0,0,166ea400b8ae90ab378c1703449b872fb18660097f1a15470727326879b3be5e,2024-06-17T12:43:31.090000 -CVE-2024-37637,0,0,8d0c8d76b4b8694d6e84003f2135f42cc23f7b1e64628fcd27c135b2fc3c7d63,2024-06-17T12:42:04.623000 -CVE-2024-37639,0,0,0fc594b344a57754f25f16a46cbceb7199f8acecba37f842a145b5ad000357f0,2024-06-17T12:42:04.623000 +CVE-2024-37637,0,1,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000 +CVE-2024-37639,0,1,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000 CVE-2024-3764,0,0,33410633d9dadf088a16c40fe902a036322ce93eb40b27ebad26eee187e78727,2024-05-17T02:40:06.823000 -CVE-2024-37640,0,0,6d63a51996f6cf50be6d9115273ff3152b436b3fd321be79c47e1548a829a008,2024-06-17T12:42:04.623000 -CVE-2024-37641,0,0,39de8d06511f6f6e43265bf859f25986f86bda12d4933c1e91c1b66184f46bf0,2024-06-17T12:42:04.623000 -CVE-2024-37642,0,0,0dc43d8faf7e991154045a6eeeaa4dd848c37696ea34cf01ee7329bc7065b42d,2024-06-17T12:42:04.623000 -CVE-2024-37643,0,0,dd4dd1cf62f3e08f00b2f338cadf964b79fd48d825ed68a41a2bd5d2e825ece8,2024-06-17T12:42:04.623000 -CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231333,2024-06-17T12:42:04.623000 -CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000 +CVE-2024-37640,0,1,42811d9ea3c74d53d1361a959c51145fab255d235dd562bab2ef546023936d9e,2024-07-03T02:04:28.170000 +CVE-2024-37641,0,1,7a6d172801ddd3fb311e3080b1e92db888cd76b485d2e5f1fc9b3b03a519bf4d,2024-07-03T02:04:28.980000 +CVE-2024-37642,0,1,2c8163e90ae4f52707558cc313ac3be19ea4aaa04dea07be54227989d9d4c759,2024-07-03T02:04:29.797000 +CVE-2024-37643,0,1,5b628e35d19a6d356287ed86a8529e5a27c6fa8f417f537307ef56900cb231f7,2024-07-03T02:04:30.600000 +CVE-2024-37644,0,1,bd27abddad4e341f8b98285148398c70ca356fff0fc734e36bbf249df7f80be3,2024-07-03T02:04:31.457000 +CVE-2024-37645,0,1,34d8cced57780441610f62d6af434c6d9470f47af1755e23758fa357fcc20bd6,2024-07-03T02:04:32.270000 CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000 CVE-2024-37654,0,0,2be5fad4abae82a09a489f1c5b0c12ed88c0a91ac4520b7fdb6aef9d062d3590,2024-06-24T12:57:36.513000 CVE-2024-3766,0,0,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000 -CVE-2024-37661,0,0,81e23698cd648834aff1e39e66ffecdc62f564b919dc4643e362915df5fa1b2a,2024-06-20T12:44:22.977000 +CVE-2024-37661,0,1,6db168d2f3ae431d826f69a05b16f3210dc133b79cd809abcdc976904db6eec2,2024-07-03T02:04:33.177000 CVE-2024-37662,0,0,2581d16ac0c1e64ed9489a4956fd58fc745c5ab4cf8c43694c38d8d5ee60569c,2024-06-20T12:44:22.977000 CVE-2024-37663,0,0,461ef2b627ebaf037724a15235d82a1820114435949dedc6f8dbf4f5fc8f77a4,2024-06-20T12:44:22.977000 CVE-2024-37664,0,0,d12e16fb3db0b4b5d59f6bea6df277ad2fce6c983f4f02a9c54b534ba9c1963c,2024-06-20T12:44:22.977000 @@ -253528,15 +253529,15 @@ CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639db CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000 CVE-2024-37671,0,0,a9e75e6ef0a31daa7176dccd007f455e09652d7ab94e0dfedfe5fc284a860633,2024-06-24T19:40:48.993000 CVE-2024-37672,0,0,31f27ce138b47703f4a1732a58dec82931f5b6c091d0ab042ac7d88eadae1f91,2024-06-24T19:41:06.183000 -CVE-2024-37673,0,0,f51362f0ce4136423a5ee471b8652d54a0dfebce8e08a4e6002feb970ebfa69e,2024-06-24T19:41:19.880000 -CVE-2024-37674,0,0,10f19cbc643eab387106fb4d2dc47ca0de793db105c70cb22aa76c9f07603c89,2024-06-21T11:22:01.687000 +CVE-2024-37673,0,1,2c7bc32512258fae221e5aab88f709b80ebb331af0ece52f2cbe4428a42038ed,2024-07-03T02:04:34.020000 +CVE-2024-37674,0,1,995a0f9ec101b814b742bfc971f0346488f53226a84592555889cc608dd7d2f3,2024-07-03T02:04:34.857000 CVE-2024-37675,0,0,b8b2966e003a7477c4ef0b8bf3338112186a7b55754a1c2931ac546b40adcb30,2024-06-24T19:41:31.713000 CVE-2024-37676,0,0,9b6174275e973fa26ace8eeff114e47be3264bfcc9cbe3eb6174581137c23815,2024-06-21T11:22:01.687000 -CVE-2024-37677,0,0,f527ca7e3778488975b6a887689127915316ad4376daabff9a8c5a342c88ed17,2024-06-26T17:43:11.407000 -CVE-2024-37678,0,0,5fe19e5914948d3b0a107d3111ab1682cae3de028d4c044825890d7965bf9ab2,2024-06-25T12:24:17.873000 -CVE-2024-37679,0,0,0fcb063f76f80cd23bb0d0dd5ff9ab7a74d890ede143b4b49b5dc822847851af,2024-06-26T17:48:30.970000 +CVE-2024-37677,0,1,5a3d710b80c82f02ba319a70df287c39fb486869f56126fd4a5509c1adbddf16,2024-07-03T02:04:35.833000 +CVE-2024-37678,0,1,b53cf5e5c141313af786935fd493df7a78799a2dc77ec1659050d0d5bd21f5f1,2024-07-03T02:04:36.657000 +CVE-2024-37679,0,1,89d4b481b4eeda09e3de57b5ce5fac803deedba18cfe07a1aafdd3872dcfad15,2024-07-03T02:04:37.457000 CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000 -CVE-2024-37680,0,0,c5b116495aeb8342c175600187d66d41047a0514921c8b09ab075a2121dd36ec,2024-06-26T17:48:43.950000 +CVE-2024-37680,0,1,251f8a25b0a9450d71379f12a2d545c394553c2edc47dd2498070a81216f31b0,2024-07-03T02:04:38.277000 CVE-2024-37681,0,0,9c6c2701baa4acf84102747d461045da29c4e50bac29e2d41efbf39c81d0f787,2024-06-25T12:24:17.873000 CVE-2024-3769,0,0,a35a1a6580261497cd040b87c6b68395a49a236a06454712c9a126123641e120,2024-05-17T02:40:07.297000 CVE-2024-37694,0,0,0a2a635c85c9603f2552a4a5f08b062636b8e283e8901f9daae3ff251a5d7f0b,2024-06-27T20:15:21.913000 @@ -253544,46 +253545,46 @@ CVE-2024-37699,0,0,e6aa9aad96c5cb91a6fa4201b1b47001ba232f78e3136af80ddfa6d4248f5 CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000 CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 -CVE-2024-37732,0,0,c4e29c0f7175fe60ae396c5841d69538b22a36865a0b8a792362db7866454fcc,2024-06-26T17:49:36.837000 -CVE-2024-37734,0,0,29ef61325a2a410f1ce167e31ddaa14dcadbade171729df78357519fd43864bd,2024-06-27T12:47:19.847000 +CVE-2024-37732,0,1,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000 +CVE-2024-37734,0,1,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 -CVE-2024-37741,0,0,0c604ff9bbf0f4166edf09e137a29293b9badf54e94c896222941b0de67cb381,2024-06-28T13:38:47.077000 +CVE-2024-37741,0,1,3c71ffbbf01e4a0e4425969bd458658ba5fb7e837c3a88f69ccf919fc0b22481,2024-07-03T02:04:40.153000 CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 -CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000 +CVE-2024-37759,0,1,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000 CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000 CVE-2024-37762,0,0,667891b1f6e91618bbf6567a824c9723bfd8cc578e754c146d99da3298523a54,2024-07-02T12:09:16.907000 CVE-2024-37763,0,0,75542f98a1a2f20544c469cfb3e348386a1de1558c9804033733b99d26509708,2024-07-02T12:09:16.907000 -CVE-2024-37764,0,0,b6cd697c83c6742a3eec95c1b0a984662826bfc54ad4d648e1bcf9a52c2800bc,2024-07-02T12:09:16.907000 +CVE-2024-37764,0,1,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000 CVE-2024-37765,0,0,f31f1f7818ee7f8090baf8e373c09fbd5bca9e31a6ae9c032a065c1fa2b18c1b,2024-07-02T12:09:16.907000 CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000 CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000 CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000 CVE-2024-37791,0,0,aac0a75365a73d05a49838e7a7b1ba90a794339affdf6e30eec1aa9fd749c48e,2024-06-20T12:44:01.637000 -CVE-2024-37794,0,0,4c3366c949c3a00b5985b55e086ea5fd5a3c04859d2613f1e28f09c9c53bc4e0,2024-06-20T12:44:22.977000 -CVE-2024-37795,0,0,0ff1ea38e854ef97fef5a9769f3bd2bd99f2e5335a31299021a2afe28c37fb4b,2024-06-20T12:44:22.977000 +CVE-2024-37794,0,1,0173114c4850547998c4a3719d0197d2f797f34c9e250dbc5cfe23ea2cc8953b,2024-07-03T02:04:43.130000 +CVE-2024-37795,0,1,48c1e40188ca43abeb8c259db9a0e5c208932bb0487d0ab98eaa7cd6c293d43c,2024-07-03T02:04:43.927000 CVE-2024-37798,0,0,a36d4ce942da740a820483c71ea27d50cf1c83d3b81c54ef74a42f4ebeb4a079,2024-06-20T12:44:22.977000 -CVE-2024-37799,0,0,0232ea2090a0e592209e0a68f751a4a7bae4888199b9a0222e19baa8b6f85802,2024-06-20T12:44:01.637000 +CVE-2024-37799,0,1,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7505,2024-07-03T02:04:44.730000 CVE-2024-3780,0,0,d5287c65230cff026fcb8162b9ad15d2c7a6ec9085a2f226aaf7f4b5c5cee424,2024-04-15T13:15:31.997000 -CVE-2024-37800,0,0,36eed506d2f5ce9d6b2834586124ecf9a503dd8108d250049c63e00ddb7167c7,2024-06-20T12:44:01.637000 -CVE-2024-37802,0,0,81dd912a99a788ace360667b22054f8192c4e36f358a19747d18c874d2ebd289,2024-06-20T12:44:01.637000 +CVE-2024-37800,0,1,09158975a52174d125928cdbe975e3c4edb5541e201cd84580d2539aed569bca,2024-07-03T02:04:45.520000 +CVE-2024-37802,0,1,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000 CVE-2024-37803,0,0,4f3db0375a36967be1dadee84c3c9799655c3891ffc2301c21194d9aedc22218,2024-06-20T12:44:01.637000 CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000 CVE-2024-37818,0,0,9dde5fb80aa69772170f1a2e1414de157ca4025771910bb93ffd749e3cb749f4,2024-06-21T11:22:01.687000 CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000 CVE-2024-37820,0,0,0a0996a8947e2895e99ed868e2f9dddf9b73eaadf620faf0715e497fd47a9750,2024-06-26T12:44:29.693000 -CVE-2024-37821,0,0,69c8b0f219772ac85c00d152695d2a6db130f2920e14ec06f202587157691baf,2024-06-20T12:44:01.637000 +CVE-2024-37821,0,1,dad227ff1e39e1e08a617033ca30de21cc87f5062f829537e300bad0e33ab0a8,2024-07-03T02:04:48.313000 CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000 CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000 CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000 CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000 CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000 -CVE-2024-37840,0,0,145ee429ed53f53bee37478d13303757e3c9a9f24e63bc7b6c2abc99adf58711,2024-06-20T12:44:22.977000 +CVE-2024-37840,0,1,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,efef5b346df7408c97f3f202001c7d16fd1da906a54459bc2a40fc31bc6f652b,2024-06-26T12:44:29.693000 -CVE-2024-37848,0,0,14bb88bc5c67311edd5b3500e695fbbed1a5f0a2c4a3e7baecfb228770826b1a,2024-06-20T12:44:22.977000 +CVE-2024-37848,0,1,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000 CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000 -CVE-2024-37855,0,0,45ab2f13c8dcd2eda9d39267aa7a8288f6be3e045c37d8c983fcc19a14b98e1f,2024-06-26T12:44:29.693000 +CVE-2024-37855,0,1,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000 @@ -253652,7 +253653,7 @@ CVE-2024-38271,0,0,8e2b25e7088c2e4efa2d97ea33a18261f508acceb96bd53692012b5e2b16a CVE-2024-38272,0,0,2795ed77f29b68791fe21d161abb3166a24d42cf0b3bc8a5427ac6bfbbc1e33b,2024-06-27T12:47:19.847000 CVE-2024-38273,0,0,aa930ae8c440a2647a011bf0695d4747b271b56264e48ff4863a5149d1b66b6e,2024-06-27T03:15:50.130000 CVE-2024-38274,0,0,695f4776bc9da0b749f4bd4e8e8830e4a621add514e667c392deb2445ea25c90,2024-06-27T03:15:50.233000 -CVE-2024-38275,0,0,474fed95f690c9f90f55ff4b7ea783e35914740c4a353e11aabbb10d602de3d4,2024-06-20T12:44:01.637000 +CVE-2024-38275,0,1,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000 CVE-2024-38276,0,0,8f400bdb3990cf115c7036c2753d2a6feedd3604e2b534641c0664514cce6946,2024-06-27T03:15:50.300000 CVE-2024-38277,0,0,9605cead31ae22d303e958d368dca6ec79ee41629f04ca89a87e1b14962ed517,2024-06-27T03:15:50.370000 CVE-2024-38279,0,0,8e0d752edd2b7f1cef81ab1eeb42304ca3458652fd02e5f15b8a704f935f8c5e,2024-06-13T18:35:19.777000 @@ -253664,7 +253665,7 @@ CVE-2024-38283,0,0,f8b39fec8597e11dde41b06fd0b7d78e7ac253c86210d81789d3c916a4e31 CVE-2024-38284,0,0,80e97345d4e4d029505ab9e5b590a5ff663c66b207cd90de0189d4f64c3f1ffb,2024-06-13T18:35:19.777000 CVE-2024-38285,0,0,807e131a4277f175024c9c8b1f78df8f06ba0287834311556bdbc03259a9354e,2024-06-13T18:35:19.777000 CVE-2024-3829,0,0,3665a2ef01b9d2a532a67b6bd535e92cc829779e81e658e1b77983bbc06d00f6,2024-06-03T14:46:24.250000 -CVE-2024-38293,0,0,a9b1fe23a5b7aceb305df22b9e5e69d11cc40f1bf66bedc9fa76d7158e801196,2024-06-13T18:36:09.010000 +CVE-2024-38293,0,1,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000 CVE-2024-38294,0,0,5ead4befff2b61ceb0efdd186e7234e4e666514924ffa35ab4e04f3aea639e9b,2024-06-13T18:36:09.010000 CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f708b,2024-06-13T18:36:09.010000 CVE-2024-38306,0,0,e0aec5c158deb0f01179376e98c8bad40403be7c0bb21d50ea0989f9fb4a8b33,2024-06-25T18:50:42.040000 @@ -253676,9 +253677,9 @@ CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 -CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f77e,2024-05-03T04:15:09.043000 +CVE-2024-3834,0,1,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000 CVE-2024-38347,0,0,4d613454dc1780690a10a13a7c4d0d38fa70bfa9e6afa8cdcbdd33d7a9b439c3,2024-06-20T12:44:01.637000 -CVE-2024-38348,0,0,08a2029befc8d2a1e1aac0c0f86516a41bff44ffe308cc482b357e94f4d80ebd,2024-06-20T12:44:01.637000 +CVE-2024-38348,0,1,6e5ce391b6cb124e038ae8273d56ab90f89cf43a2075c68d341d5350c665dadb,2024-07-03T02:04:55.710000 CVE-2024-38351,0,0,fc316049b1243ceecf4f16bb932622b3d32a9ec242887e0258f3f20fe77446f1,2024-06-20T12:44:01.637000 CVE-2024-38352,0,0,13a6e81e4d4d40a0591843c161ee638c75aac348990bf4d2603a4c2fb8cf2a30,2024-06-19T18:15:11.507000 CVE-2024-38355,0,0,548f855fd76fea3ae91cbde1441c70071a7c7d1a3d657b48a4999a1a744b1672,2024-06-20T12:43:25.663000 @@ -253692,51 +253693,51 @@ CVE-2024-38366,0,0,c804f94bd9a9281c50163d6bd850f11de47bf9dfcd004925ce0ed31a43c4b CVE-2024-38367,0,0,d3326a47bb3d237ae822354ef25e3ecc075d6076ace31be51fee96ae9db93c06,2024-07-02T17:15:05.410000 CVE-2024-38368,0,0,03b9c449b31d9a7d3f598bc6d45d21df03487372325a1e752596006346b7f273,2024-07-02T17:15:05.590000 CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000 -CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 +CVE-2024-3837,0,1,83b07e73fbcd3bdc07d74ecd9200ace8bc3f655fb5ef786e0fb5447a3f989592,2024-07-03T02:06:37.303000 CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000 CVE-2024-38373,0,0,44bd01362bd05dfdecb2d241c2e4e4fe52c2264760c405bf6f3f48fb0d969aff,2024-06-26T15:02:05.100000 CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000 CVE-2024-38375,0,0,ded65bab8580f207fa6313539998812618b08a20bbdd5d51ce7200bdf863d856,2024-06-27T12:47:19.847000 CVE-2024-38379,0,0,d0af2d7e81a6285c1c7099c958a4a50ce3d2f639bd068091599f2b1327853e0b,2024-06-24T12:57:36.513000 -CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 +CVE-2024-3838,0,1,735036a2518f7573cca51130f444cef3025402a2ce5912ec1ce518df4b6cd9a7,2024-07-03T02:06:38.383000 CVE-2024-38381,0,0,c504d6ca70d74e43829158cac72275566ce3ec5e038bde15a54a40b986799f55,2024-06-27T13:16:00.650000 -CVE-2024-38384,0,0,706997b8bd74b4e945fb4ea92c7b860b5f40f54233d054279ff0854095c4eca9,2024-06-24T19:26:47.037000 +CVE-2024-38384,0,1,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000 CVE-2024-38385,0,0,6ede95b10b5fd3bf97325d6d6e002e23e38a0e008a909e36d40ae711b1be808f,2024-06-25T18:50:42.040000 CVE-2024-38388,0,0,7c0bb01f9b9fb79d83dbd6e2c27fd6e239bc8d3e90d248b1b279840e35bf7176,2024-06-21T11:22:01.687000 -CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000 +CVE-2024-3839,0,1,7c6a8e24e8992e3cadc889bd78886524b88f88c58f4f3536293ab700e2d6e3b8,2024-07-03T02:06:38.637000 CVE-2024-38390,0,0,d3cec8cf37055d7984956bdcdf2d47c2af6b037bed7779bdf5635c68af266a42,2024-06-21T11:22:01.687000 CVE-2024-38391,0,0,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b054,2024-07-02T20:15:05.730000 CVE-2024-38394,0,0,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000 -CVE-2024-38395,0,0,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000 -CVE-2024-38396,0,0,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000 -CVE-2024-3840,0,0,403182a28ab5f4c1d5b284d35c53f5335d4c6aac194c57fd7d723522380d6b0f,2024-05-03T03:16:29.067000 -CVE-2024-3841,0,0,115f766a88fd32831299505e83a1207ec4bfedfbb7b32163caf9b2dcda142051,2024-05-03T04:15:09.563000 -CVE-2024-38427,0,0,732204cceeb6abe7907342f21e7efa4f2a18a21658ab4ca99d4398a365d436c7,2024-06-17T12:42:04.623000 +CVE-2024-38395,0,1,200f7eb17515a405ff37cc6fccc1c826c560846e0c0625cd687aedb08987a6c9,2024-07-03T02:04:58.833000 +CVE-2024-38396,0,1,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bfcdf,2024-07-03T02:04:59.670000 +CVE-2024-3840,0,1,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 +CVE-2024-3841,0,1,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 +CVE-2024-38427,0,1,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,3714727f8bfcc9e282c2717dad223df765a696413b267002faf1df27a5ac73ea,2024-06-17T12:42:04.623000 -CVE-2024-3843,0,0,e2f9823881882a7119ad05ef8bacfc680d4c49d84fc3cf5b87bbb0f45959dd0d,2024-05-03T03:16:29.117000 +CVE-2024-3843,0,1,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000 -CVE-2024-3844,0,0,557b2843dd1fca85a530c46acabf2e2b3fe4cb4e29b4ec8be3ca0b11ef97034e,2024-05-03T03:16:29.163000 +CVE-2024-3844,0,1,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000 CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000 -CVE-2024-38441,0,0,2efce111268ac0468f1041a0c4ddb93e500f0656d65384e0b3d02b47425911d5,2024-06-30T12:15:02.427000 -CVE-2024-38443,0,0,1d75cfa177cf692b67a12f7bd5c673225dc4008379121d75b6d5d0686ab9a220,2024-06-17T12:42:04.623000 -CVE-2024-38448,0,0,66ae408cb06bbe5b04615772f5468e0f5bb5c8f2d46df318fd238e60dfb550e8,2024-06-17T12:42:04.623000 +CVE-2024-38441,0,1,a973f5143c6734e984ff9aea01be1b9a40b4154f243a146a34adc1cd56beda46,2024-07-03T02:05:01.423000 +CVE-2024-38443,0,1,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f7ac,2024-07-03T02:05:02.417000 +CVE-2024-38448,0,1,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000 CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000 -CVE-2024-3845,0,0,0eb4004f99da1c2122444a8d1de5d3db39129e713bf386d7b60bb455af744c00,2024-05-03T03:16:29.210000 +CVE-2024-3845,0,1,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000 CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000 CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000 CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000 -CVE-2024-38459,0,0,bba0e96fa178cd7bb836c09767d8407be8abe0aa39ab2460aa1208123c9912e6,2024-06-17T12:42:04.623000 -CVE-2024-3846,0,0,c48e0a8a684c17ee6ebfa3dd6ef492735a7e1f61d2741ebafccef32d97787cb1,2024-05-03T03:16:29.250000 +CVE-2024-38459,0,1,4ef78a4d5c93482a3188b8be60d5fc2896531e30b015b11c8a864501b9d2680f,2024-07-03T02:05:04.377000 +CVE-2024-3846,0,1,0870f232696d74977451a2a3214c388694b50eb565f2d8dd146f9e698c4155f9,2024-07-03T02:06:43.703000 CVE-2024-38460,0,0,c8a9bea1aabc10fa9490dcb55fbab7e37d2d5b77ef01088a37519f80734f1be1,2024-06-17T12:42:04.623000 CVE-2024-38461,0,0,72e5f3475030cc94f7ae7314a9b3f0d6bc109696d43ba8a7471a65e873774b8d,2024-06-17T12:42:04.623000 CVE-2024-38462,0,0,5edc0d844a7fbb524661339af8ace86999ae1091d9bed65713ae91154b0bacd8,2024-06-17T12:42:04.623000 CVE-2024-38465,0,0,ce0d9866ad6b3f19ec6c77095c1dbcaa6c5f45b9afb927f8abe6499d7e02e02d,2024-06-17T12:42:04.623000 CVE-2024-38466,0,0,5d1c6c536bd1417b5b67342ab1c487e0c966acabfa2718a6effebf26cfa8c7cc,2024-06-17T12:42:04.623000 -CVE-2024-38467,0,0,b57435625cbeac6544b6507d14e1fc98d3d5fa7f2ffbeb94aa6418d1e331de50,2024-06-17T12:42:04.623000 +CVE-2024-38467,0,1,65442e1ae0d1a475e337e0854e519ac76df13c757eb0152563a4b35ed3da1f56,2024-07-03T02:05:05.690000 CVE-2024-38468,0,0,d4c6d48d530a65ce7d90662f3fd07d6f0801b061b80f57001958e3c05da71f26,2024-06-17T12:42:04.623000 -CVE-2024-38469,0,0,61f8d4e00b8eb0d7cc440bb61aa54e448e7d0cf937bc39055bad05a42163dd83,2024-06-20T12:44:22.977000 -CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000 -CVE-2024-38470,0,0,4c268a4f5b43704204ee0794f0d14b8ed1a9214a7b71a5011526bcfa496d0f17,2024-06-20T12:44:22.977000 +CVE-2024-38469,0,1,511cfa020ce0415f6c58505919037fce87bd20a70c430acbe541f3249cbfb3a1,2024-07-03T02:05:06.670000 +CVE-2024-3847,0,1,95f9ad8fbf5c3c80550e0a325ff7f48c02be2f78865a75992b282f70c630bcf1,2024-07-03T02:06:43.977000 +CVE-2024-38470,0,1,e532fc2610ce0ba05d395b2565b3921da00db5c8c8ee1a62b50a319ed8de746e,2024-07-03T02:05:07.477000 CVE-2024-38472,0,0,0ebe93ad3c585976e2f0467fbf3c32b4ae2c8392df9a3628aca18fe0cea5ebf4,2024-07-02T12:09:16.907000 CVE-2024-38473,0,0,4a52332d99fe848743528bbabba861df2f74ad2accfcf888abc7220000504fe8,2024-07-02T12:09:16.907000 CVE-2024-38474,0,0,d9563f48d3829949fd43481a10c11343a9dd1b93362516af40fb11af0189d44b,2024-07-02T12:09:16.907000 @@ -253758,7 +253759,7 @@ CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000 CVE-2024-38519,0,0,e39694de68d399ffb04e75d040046561d83a8a72674fb0d599e16cb1c2511c02,2024-07-02T17:44:45.700000 -CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 +CVE-2024-3852,0,1,23d67cc6cd9eaaffcbcd8c6df21d1387cf7355b2b4540b1c97d43e33361312ed,2024-07-03T02:06:44.987000 CVE-2024-38520,0,0,5adf4dbb90762553b78084199dfb3abdb3d5337ac3a1f068b4f090511f700047,2024-07-02T16:15:04.517000 CVE-2024-38521,0,0,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae8c7,2024-07-01T12:37:24.220000 CVE-2024-38522,0,0,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000 @@ -253767,26 +253768,26 @@ CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83 CVE-2024-38526,0,0,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000 CVE-2024-38527,0,0,9d30e9caf22ebe74cba027d0e20fbdb3b1d3bd82d6438824209935ed0cb0babb,2024-06-27T12:47:19.847000 CVE-2024-38528,0,0,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000 -CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 +CVE-2024-3853,0,1,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f7a,2024-07-03T02:06:45.877000 CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 CVE-2024-38537,0,0,b13261faf80ca2cfe6630aff4816c714858af9e7bce4a6263f68e63ffd658697,2024-07-02T20:15:05.860000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 -CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 +CVE-2024-3854,0,1,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000 CVE-2024-38540,0,0,e7b3803cf99e050c270c726ab274e7affefcb94f7141fbd6c0b0de4357820faf,2024-06-20T12:44:01.637000 -CVE-2024-38541,0,0,1065fa7d8a4cfd5436e04c18db5d69054ab11f4091c3b7b1134ec020405979bc,2024-06-20T12:44:01.637000 +CVE-2024-38541,0,1,023c6a7426f76d21c921b964034a52048d8ae62a75126b3da24f432830a3ec3b,2024-07-03T02:05:10.090000 CVE-2024-38542,0,0,2d3206d3acbc6296896c679abb34821c47c48d8547928a1903930404e39399fb,2024-06-20T12:44:01.637000 CVE-2024-38543,0,0,749d163234bfa43b2a7a6d5ddb464425e98a7fa6417113dfa2e269c4435d43de,2024-06-20T12:44:01.637000 CVE-2024-38544,0,0,5697b7121dc116d7dcef1239b61c622e0f4cc69a3755f90752a511f7e74eea0c,2024-06-20T12:44:01.637000 CVE-2024-38545,0,0,e19534fd73a94af20a1fb344dbf36ffdeca4febea6b2756e17c399f613e5bd81,2024-06-20T12:44:01.637000 CVE-2024-38546,0,0,06ab8e5395b6ea64dcfc3d0291c1a4cede82de3c6adf9a35f972579209480dff,2024-06-20T12:44:01.637000 CVE-2024-38547,0,0,6d094da35ceeec072de822b532aacf8e22808edceb46187f6ef18b7c87947a6c,2024-06-20T12:44:01.637000 -CVE-2024-38548,0,0,226b2ec59cd0e8bc5ac9ab89d5a58dbce46f44f8de3bdb71de5c8cff8c4bd0b1,2024-06-20T12:44:01.637000 +CVE-2024-38548,0,1,171e39d7367d49de534de52c4917669fe9bfa7833fe5361405e0ecddb170ac33,2024-07-03T02:05:11.107000 CVE-2024-38549,0,0,e3ac7fb55108dcee3c5f6a63655f34c149b9d0e44d20a19747f931d2341da19b,2024-06-27T13:16:00.840000 CVE-2024-3855,0,0,72f9965b46480d1ef50ed2a1799389235938182cc86dc8ecd73fd2cc29210cf3,2024-04-17T12:48:31.863000 -CVE-2024-38550,0,0,12c1f7faf6d391bda45153650ece532f5927f00b8db4353fe4f9877957dc88b7,2024-06-20T12:44:01.637000 +CVE-2024-38550,0,1,3c81943b88da9d32a80e343d7d38e1cd6aa5f0c47582231155d312a40312171b,2024-07-03T02:05:11.837000 CVE-2024-38551,0,0,994bdc4b2bbd91b836307a9355447db2c53145ee9caa85e9ac226f8e6e77bac5,2024-06-20T12:44:01.637000 CVE-2024-38552,0,0,919f2f11cb187e73d3fc69192846a885a7b56a8cd58353da92e0ee2036de4ee4,2024-06-27T13:16:00.903000 CVE-2024-38553,0,0,286ac07f37ead0233ff53087fe6bb725f02540170c59cfcee7e11483334cd294,2024-06-20T12:44:01.637000 @@ -253807,14 +253808,14 @@ CVE-2024-38566,0,0,cbf9595bc7c6a3a8392b2f29aa06e360a055ceee2b59f6b396c4b12b30d6a CVE-2024-38567,0,0,82f9375ae9ed5a064924c0405e04c68f48a4fe90e6e8c8d0940547e9c7724e9c,2024-06-27T12:15:28.800000 CVE-2024-38568,0,0,ebc26ecb554f4a117e56a2b7595b19c2bb6870e5fe6ec7da1db88f1843088b19,2024-06-20T12:44:01.637000 CVE-2024-38569,0,0,43b2e24bb95b5b0c5ed869e83948d4db63ec0f5a8a8fbb28319ca0915c7949cf,2024-06-20T12:44:01.637000 -CVE-2024-3857,0,0,759e3e6356edbe4b757e6defb2865ff9079af79daa39f4b5313863a09852808f,2024-04-22T10:15:07.520000 +CVE-2024-3857,0,1,73a9c1fe436176bbc730be669b62c208d33e2f84627732b864c38ba9014087a7,2024-07-03T02:06:46.957000 CVE-2024-38570,0,0,7ec182f6fa5f3c0d1a4f19f2759b6f5e1c5a221db963b42f1c92abd85c45cdce,2024-06-20T12:44:01.637000 CVE-2024-38571,0,0,a8ac066d75001a7a7c7d08cd5467b743b181e3ae1b62ab3328c7b56658888fcf,2024-06-20T12:44:01.637000 CVE-2024-38572,0,0,aacf13e691ed59e8d1f0037d7039807cd50bf7233bf63dc7df8936b4d7a148b7,2024-06-20T12:44:01.637000 -CVE-2024-38573,0,0,bc38939d625e4d50426892be0c285949a4fdf5b8010cff55bd177a21e81e979b,2024-06-20T12:44:01.637000 +CVE-2024-38573,0,1,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec64e,2024-07-03T02:05:13.393000 CVE-2024-38574,0,0,c9bbb608bc0fb4fd78471e471f67157db9c46f296b9cebdbf2a9eaa112c2b05c,2024-06-20T12:44:01.637000 CVE-2024-38575,0,0,706823464dd777ddf38fceba51b63345567e0ce58208e92b648866b8c461ddcf,2024-06-20T12:44:01.637000 -CVE-2024-38576,0,0,5f2c362a1b20fb6644f41270cb49cdc5fa151e9181a4765c6f2c4b80f8fd5ce5,2024-06-20T12:44:01.637000 +CVE-2024-38576,0,1,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362b36,2024-07-03T02:05:14.340000 CVE-2024-38577,0,0,aab783e562369ba736289de53b41b9b9e9e5bce44bf13dc1d8e2f816a558ee31,2024-06-20T12:44:01.637000 CVE-2024-38578,0,0,7742b7e21a29430038b4a81674047631844b743cb39852e4e7b480ae5a3f6410,2024-06-27T12:15:28.887000 CVE-2024-38579,0,0,b02c681d92cc0f763400e2ca8a8494d6eeb3fc790e71740f7deb9d4a819281a9,2024-06-27T12:15:28.957000 @@ -253829,7 +253830,7 @@ CVE-2024-38586,0,0,44e39521bc8b7aff0d13b8bdb8eb57c475e755967082646c98b31056f074b CVE-2024-38587,0,0,d682466aa99d6e2a621eb512420c2d64a18d009cd294bb427fb88ff70d8c2606,2024-06-27T13:16:01.323000 CVE-2024-38588,0,0,63377d15d615a89cc502e82cc0b4d98dd3570175273284e854a555b603cb2164,2024-06-20T12:44:01.637000 CVE-2024-38589,0,0,3347353e7e4386941ef006cdf96b7e25e5fabe67bf143b1463e3d66e69c4c032,2024-06-27T12:15:29.020000 -CVE-2024-3859,0,0,3065404677b844c907170ea43348d98daf159eda29192d0f8b013c98cba7e7cc,2024-04-22T10:15:07.573000 +CVE-2024-3859,0,1,f6a57f468f9800b8da982d83af2ac389f3f4d8b059886951b49765f213c508e4,2024-07-03T02:06:47.757000 CVE-2024-38590,0,0,1fde351792af11094df547ca6039c92dd4040f95fbccbb26deb2074af9ba3491,2024-06-20T12:44:01.637000 CVE-2024-38591,0,0,a87a6cf3381321fae2571d6b3d74f06358c9ae85b011ec7304b3632eb3677c62,2024-06-20T12:44:01.637000 CVE-2024-38592,0,0,05588f2b7ced16b85036b6966bff690fa7126b1bbbd3653d3eefb89b41f1a1cd,2024-06-20T12:44:01.637000 @@ -253846,19 +253847,19 @@ CVE-2024-38601,0,0,23968da6af6998bb7ebf678dab971842ce3e3f950336b8c45fbb6e76fee59 CVE-2024-38602,0,0,9a80355cc21e33c080d1b076281ffae3e2e5deed03254094e225183d4901578c,2024-06-20T12:43:25.663000 CVE-2024-38603,0,0,2e6ffe264b8f7d29692c9fa8910cbe9efc4c6ac4cd0660382cf13ff5b0949cfe,2024-06-20T12:43:25.663000 CVE-2024-38604,0,0,2774a468bb1e28e6ecd0cb6e8825f2bc4f300c9700b1b90f2627bc020f94a4ce,2024-06-20T12:43:25.663000 -CVE-2024-38605,0,0,284e8faf962af23a3027f4706f39f0bd1cbeb02f1904945be570abdec92a24a6,2024-06-20T12:43:25.663000 +CVE-2024-38605,0,1,f602dbd8b228460d18451b3d21699759c6e44ec89ce2e41ec5c3edf366b5b986,2024-07-03T02:05:15.990000 CVE-2024-38606,0,0,9f6359ceccd6950e6f174b7a3d98677dd3e810cdff76a24028869e81ac53d4fc,2024-06-20T12:43:25.663000 CVE-2024-38607,0,0,b4ac9545970d8e8cc1928b417e090211e47ad577bebad64bd080d1987850875a,2024-06-20T12:43:25.663000 CVE-2024-38608,0,0,7737edfe46fb47f195726e0c7c632204c84811e284d710ed238cbe4299694fd0,2024-06-20T12:43:25.663000 CVE-2024-38609,0,0,db774524e58ca6f0eefca9518e6396633842bb781a3277855e12f8fbba63d8de,2024-06-20T12:43:25.663000 -CVE-2024-3861,0,0,891d68faecae715fa9ed74917dcc8c6b8466167516a2b34c2f3aaf1667ff2bc5,2024-04-22T10:15:07.620000 +CVE-2024-3861,0,1,ee20d345f39d75706a5854d9d379d2ccdb2c90fb91332b3e9bdada75b698c9b2,2024-07-03T02:06:48.590000 CVE-2024-38610,0,0,29353cc675ddf7fdfb11ab2c2ee9e633c6e3a71d49824683ceb2244130fd130b,2024-06-20T12:43:25.663000 CVE-2024-38611,0,0,da00074115add864f490a027525486c8284afa31e189c50727dcb4c7424e8f65,2024-06-20T12:43:25.663000 -CVE-2024-38612,0,0,ade01bf742f84598e9a5d4761b111183ca353d53b9bd8cf32eca1b7e675481c4,2024-06-27T13:16:01.530000 +CVE-2024-38612,0,1,ff22c4ce775096bb9fe8c21fe4c09bf9b160d7ed1d74901d77ebe0291d780560,2024-07-03T02:05:17.077000 CVE-2024-38613,0,0,693b4c2b59c67cd93392d22cc43d2f41b73124550e270fd775740e2c797f5616,2024-06-20T12:43:25.663000 CVE-2024-38614,0,0,cf11629b661e0fdd3caf78fc8ad16f9623893b32e3f007f9cb07ed9675a254cf,2024-06-20T12:43:25.663000 CVE-2024-38615,0,0,6b2b30021c462b67b43c68a1b611bf4e256aef4b2202d2a4ffcd14a365f0996c,2024-06-20T12:43:25.663000 -CVE-2024-38616,0,0,5973b89685927d01a2bc6739c9869c62b013e73534589bc0a28a6ca91ac6e344,2024-06-20T12:43:25.663000 +CVE-2024-38616,0,1,f8c51d530c6963ad76ff0e210ba7c38d38abd039210c3919fbdb52eed1c6bd83,2024-07-03T02:05:18.007000 CVE-2024-38617,0,0,9c97e58cf4d706f899e8162b3f89b78d980789c28dbd9a8d8811544e01702995,2024-06-20T12:43:25.663000 CVE-2024-38618,0,0,9f09a6969fb6a684b0f677beedf80b32b7ab8de364cc601497ff8efd6c478217,2024-06-27T12:15:29.227000 CVE-2024-38619,0,0,d53dbad3d74b4eba98dbae88a34c0ce40740499e8f393cdcbc0226a7781a417e,2024-06-21T14:15:13.613000 @@ -253866,7 +253867,7 @@ CVE-2024-3862,0,0,d892c55e37e2ad71ebd3e4aade996aff767de8739f62e2d71c93704431b2b0 CVE-2024-38620,0,0,6148b861a5093fff5387ffdb934470362842871878e29323f4b878a27c1f924b,2024-06-20T12:43:25.663000 CVE-2024-38621,0,0,e851e344092a58b93abfcdfc8e0c1cb200d4e0785daf3d71ef6eab3acb0ab050,2024-06-27T13:16:01.607000 CVE-2024-38622,0,0,ba6b4e5dd8ff5530bdf29e3219192ae1fec1559b400be83328cb0674a062fb29,2024-06-21T11:22:01.687000 -CVE-2024-38623,0,0,df2061012368449118260b5f6365b16007b47af549796017c469b35189df012d,2024-06-21T11:22:01.687000 +CVE-2024-38623,0,1,16f6c7445e39a6ca7ed3c6963946b0dec9cdeccf290c4a55b47c615c74178fbf,2024-07-03T02:05:19.197000 CVE-2024-38624,0,0,52e638e541a14b7bc9be2016e347e8fd4ab6d7a56f37cfd4a5debbff67c5f4e5,2024-06-21T11:22:01.687000 CVE-2024-38625,0,0,9d1784a1d9fd0409e2ba0ac3357fda848dfd81d83aa1f472c2816080c539e957,2024-06-21T11:22:01.687000 CVE-2024-38626,0,0,a2f4328bcc7ac370a10fd01c19217533d15da90b1102e9d2101497bdd675293e,2024-06-21T11:22:01.687000 @@ -253911,21 +253912,21 @@ CVE-2024-3883,0,0,c0ee3c129d03d9b7803729c6b8ba3c3dbf4ee4f2b39f81dd559f9f8568fb1b CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c391224,2024-05-02T18:00:37.360000 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000 -CVE-2024-38873,0,0,480e62ff44ca44c60b79669b7942679e9800aada230c257b18bef37e33b79e3a,2024-06-21T11:22:01.687000 +CVE-2024-38873,0,1,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 CVE-2024-38874,0,0,84b324545c03e3af351829556c1e9c9a1e19bfbe37e66a75476dbe17e7f3fa44,2024-06-21T11:22:01.687000 CVE-2024-3888,0,0,edb7c29072abf78278f8742356d5aae8212665d8818b230c40ee3cc957ee71c6,2024-06-04T16:57:41.053000 CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000 -CVE-2024-38892,0,0,78d50090c0cd68a53a439e4db95d8ebbbb280cddaddd36aaf2dcff2e1879f912,2024-06-25T12:24:17.873000 -CVE-2024-38894,0,0,dea608eba996bae3013e076f41afceb1493408ea073ac1870e8972060846eec0,2024-06-25T12:24:17.873000 -CVE-2024-38895,0,0,61077d24fa95181b9332258ae85828569e123f2d00cfb6c572e81418ff3f976b,2024-06-25T12:24:17.873000 -CVE-2024-38896,0,0,76d4dd2fcd38152cd7c2cb770dda2534ec93a9ba2be489143fc2689cd178c4d6,2024-06-25T12:24:17.873000 -CVE-2024-38897,0,0,4e649a2b89613154255ebb9b7ab7e562726af38e1abb31a0b1fdd69d940ea658,2024-06-25T12:24:17.873000 +CVE-2024-38892,0,1,7f56674c04e74351dd21325ea04280a43fbeb1fd2a47bbef7c9364d4479e55d9,2024-07-03T02:05:22.090000 +CVE-2024-38894,0,1,c09a57a07901a90f4ba0c1a31ba41b31d8f82c21fb322b702be955a68ec1974e,2024-07-03T02:05:22.937000 +CVE-2024-38895,0,1,716e59d18f64015676dc141eff408f11adbd22a4a66efb34ed2b5a79bef7b5af,2024-07-03T02:05:23.750000 +CVE-2024-38896,0,1,e949d7f0d604812e0c7b71a22b8e4f3e31cd0c4c5e0e9ab86180bc45c3e0d030,2024-07-03T02:05:24.560000 +CVE-2024-38897,0,1,d5624b84699009a260fe1a98237ae1687fc4d1ba5c6044d2e051c4d97cd50e55,2024-07-03T02:05:25.367000 CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000 -CVE-2024-38902,0,0,23ffdd6776811ca6c01033cc338f472c4356d79587b08691b797afafd051f7d1,2024-06-25T12:24:17.873000 -CVE-2024-38903,0,0,7fcdbee1ab2a5ddb09039c821fd90546668576169f9797a60d69a1cce1f325d1,2024-06-25T12:24:17.873000 +CVE-2024-38902,0,1,ac988b882df018ca92e12c5877e77cfd875299a6f04c2e568bccd90f65b2e946,2024-07-03T02:05:26.170000 +CVE-2024-38903,0,1,2b94b77610c8a043c9d0ea06696528fdc7d9d24aef31329270a0121bf4f56367,2024-07-03T02:05:26.943000 CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535ead,2024-05-02T18:00:37.360000 CVE-2024-3892,0,0,fd27f7808afa94cc2c75f61cd235edb0c08399fa20b15f6c79b02a7674d8055a,2024-05-15T18:35:11.453000 -CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000 +CVE-2024-3893,0,1,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000 CVE-2024-3894,0,0,edf80459282b8df89b54e83306b1e3308990b8425170b8aae8ee5dd50d193a39,2024-06-20T12:44:01.637000 CVE-2024-38949,0,0,a43dbf328281300509f5ac31ad8a17523caf140bc030a3178261346b56882d3d,2024-06-27T12:47:19.847000 CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24ea,2024-05-02T18:00:37.360000 @@ -253935,26 +253936,26 @@ CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958 CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 CVE-2024-38987,0,0,8e5543bc013d5021cfb12250ec622bf33ff663f5974b5e9efe103d174baf7a3b,2024-07-01T16:37:39.040000 -CVE-2024-38990,0,0,c74cd76d2342a02a975f887b4d58b34e2c6967f32f55f6fd8b807d2643621113,2024-07-01T16:37:39.040000 -CVE-2024-38991,0,0,5c180588e2b6a01b28db3752bc9cc96858ae39a00587154860cda4368a7ff8f6,2024-07-01T16:37:39.040000 -CVE-2024-38992,0,0,2e570cd2eed251f271f85b2df9a7002fa24ca413722447a3a914590d4b8bf475,2024-07-01T16:37:39.040000 -CVE-2024-38993,0,0,73faa3d497e0a33b4def022c7b84272bb8e78951f2326d7a1ad62b5574b382c0,2024-07-01T16:37:39.040000 -CVE-2024-38994,0,0,623ae3fa8a384c5debb1199bb0204554766de971953ebe0c7f7023a769b62c61,2024-07-01T16:37:39.040000 -CVE-2024-38996,0,0,db790449014448ae87f3425d74a96423d4f25d3eefecfad29430c49fe7e6d233,2024-07-01T16:37:39.040000 -CVE-2024-38997,0,0,c7d47980841a9b0ae67023e8210b95e8881571b72e18f736bd58e90bcdf41491,2024-07-01T16:37:39.040000 -CVE-2024-38998,0,0,edfa0696537e6dc5d0b8e23e28f2391be4352521b0c7fab8f861b804209c04e8,2024-07-01T16:37:39.040000 +CVE-2024-38990,0,1,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 +CVE-2024-38991,0,1,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 +CVE-2024-38992,0,1,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000 +CVE-2024-38993,0,1,fc2d7e57e39ddfcc6af2dbe204e666e6951361034badd73a54ed967e6430c5f9,2024-07-03T02:05:30.293000 +CVE-2024-38994,0,1,52e74c8e49acf40312bab2cc0a5b12a01f19b079b47741262e8027889427648c,2024-07-03T02:05:31.113000 +CVE-2024-38996,0,1,a1527cd446e6396d926036d720f3d18c64e1e77ef3f93ca65d73a82bceb3de02,2024-07-03T02:05:31.903000 +CVE-2024-38997,0,1,67cc6ee46b0f88f15a47d916defc512f0d73a6fe097801b2dbae8c76c5acc9e0,2024-07-03T02:05:32.753000 +CVE-2024-38998,0,1,9282cac0cc3c8cf49c21643b99000efeea36726d969c8a628d3f29607a28583d,2024-07-03T02:05:33.543000 CVE-2024-38999,0,0,b189bad1ee2babac6b8006a78d8cc7a5bb62af267315bd0a3288f0e149de22ab,2024-07-01T16:37:39.040000 CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000 -CVE-2024-39000,0,0,865535b7d65e1d3e0f5a4a2042012fe524a4722997fb77655f1e5a1e941f9c7a,2024-07-01T16:37:39.040000 +CVE-2024-39000,0,1,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000 CVE-2024-39001,0,0,82f6001aa2dce6119be50984c18101b4a6aacb440c096b445d257d239da9aac4,2024-07-01T16:37:39.040000 CVE-2024-39002,0,0,f730aa8ef147d70b2879c78c6f1f0ff1f81c5a139e4c9775f359b7cb8ab78f63,2024-07-01T16:37:39.040000 -CVE-2024-39003,0,0,e5716538bdbd78a5bfa5a9af017cbf026b973b733106e9129e879a9709c8ab3f,2024-07-01T16:37:39.040000 +CVE-2024-39003,0,1,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000 CVE-2024-39008,0,0,cb7f345a6d5a41be6d2526fac2444be15490818f118d2679ea4e85f1012f9719,2024-07-01T16:37:39.040000 CVE-2024-39013,0,0,7f8924a5f1b67cca0d5ab6af0e7a96c4ff89036dd75053e53c271e93cc4cf209,2024-07-01T16:37:39.040000 CVE-2024-39014,0,0,85f2582cc6d7f5ddbf77aca86106a65d54d3111a3f65f930f3405599f2535e10,2024-07-01T16:37:39.040000 -CVE-2024-39015,0,0,8f692a337ec522916ee5f18e47a1f67b243e32141d1032ce0a36774d8ca787f7,2024-07-01T16:37:39.040000 -CVE-2024-39016,0,0,3bc798c511e27939051e75e20febf350d59572d35beeee3b4abe958c2f9ddd4d,2024-07-01T16:37:39.040000 -CVE-2024-39017,0,0,10be03ac062a097d6757c937b88f1e992120572b4e181895f1486ee51c2d3d2d,2024-07-01T16:37:39.040000 +CVE-2024-39015,0,1,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000 +CVE-2024-39016,0,1,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000 +CVE-2024-39017,0,1,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000 @@ -253963,39 +253964,39 @@ CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb656 CVE-2024-3908,0,0,85d7a8c4b6c04a1bc64d61b9b16434d97a56cd08e916479d8cc7f65ce540b05b,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354ef,2024-06-04T19:20:26.763000 CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000 -CVE-2024-3911,0,0,421a4146dc8ebd653de189c62bd791d7d943c2a07a6c17029678795c1bffde3d,2024-04-24T13:39:42.883000 +CVE-2024-3911,0,1,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39119,0,0,1a69b24f1f94ef8540905f4cb9572420f76889d8a155c3d3a5e32d4b0cb231f3,2024-07-02T17:44:45.700000 CVE-2024-3912,0,0,40b98d6972fd8b29682fb9d5c479312d61b03f7aa0ccbcb16e7844b5a5f893f3,2024-06-17T12:42:04.623000 CVE-2024-39129,0,0,9312806d832c51933c3038527273101f0daf3190355080fae05f2347855542dc,2024-06-28T10:27:00.920000 -CVE-2024-39130,0,0,bb74f9ef3dbe13379a9cc84dff2ba44f866c8769dabd039c7af844d86cae9a61,2024-06-28T10:27:00.920000 +CVE-2024-39130,0,1,df5f818c69686396dd3eb68339897ebffa1b11bf7906d37001b874abe3136d64,2024-07-03T02:05:38.450000 CVE-2024-39132,0,0,6ab3e2e5c27f090632724618bb18b9fb986b73a73dd0cc0fb1e85e724f201ff9,2024-06-28T10:27:00.920000 -CVE-2024-39133,0,0,bee3791c46864c4a7b9c3f57bb0aa0f799667bbae7ebc1a8d271d663377ee518,2024-06-28T10:27:00.920000 -CVE-2024-39134,0,0,f9c7f878a3bea6aa0088d9c47c65ec47ca6b4af545c333528f13dc2543300c00,2024-06-28T10:27:00.920000 -CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd14203f,2024-05-03T03:16:29.340000 +CVE-2024-39133,0,1,c0b156e43b5b006fb8a1a63a92ff8df19a3b9334b5434845fe916818d8f721fc,2024-07-03T02:05:39.283000 +CVE-2024-39134,0,1,65225663759c93144bdb2cf9e576b89d8259bcce47718e35bf97379e5e9715cb,2024-07-03T02:05:40.117000 +CVE-2024-3914,0,1,a336378eac9d576aedbefe608da8eebcdb9fa109fd46220d159a3f8481da3f90,2024-07-03T02:06:52.980000 CVE-2024-39143,0,0,8f47b682c75fd28fc97feee7618bc9433dc6b816cc495ebda3dd3935812a92e7,2024-07-02T17:44:45.700000 CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000 -CVE-2024-39153,0,0,79c92bc44ceaef2ab705e7fa71d1fb5741f4e73f892ec71cd6ced02eb978bda3,2024-06-27T17:11:52.390000 +CVE-2024-39153,0,1,dcec1c4ae1798ea788d66ec52e054244cacc5771986472ce6b18b0b79017ed7c,2024-07-03T02:05:40.930000 CVE-2024-39154,0,0,e9267e643c64c5fe4f5e9c26e884ce63a143ad4aff34e62518725c8c14557f85,2024-06-27T17:11:52.390000 CVE-2024-39155,0,0,c6b84759d94f9b861804190816183b6d43aa3ec2ad9c97bfc30bd05f3ff2a41a,2024-06-27T17:11:52.390000 -CVE-2024-39156,0,0,fa8de171cd976c9f3d7caef7ce141f8bf5755dcf153e5dc49481fdcb0676c668,2024-06-27T17:11:52.390000 -CVE-2024-39157,0,0,0696a2977a8146ebb9368aad2a54dd01fd45dfd114ace284873d15de5e4a722e,2024-06-27T17:11:52.390000 +CVE-2024-39156,0,1,77ee55fa44e5b5a1aee8c345b1d4424c08513568738373a9ed7a7016b20f5f6b,2024-07-03T02:05:41.750000 +CVE-2024-39157,0,1,7034c13893105630c126aaeda1d41a6cc977f264ae0a5560b4322987c45914a9,2024-07-03T02:05:42.557000 CVE-2024-39158,0,0,cce9aef03924ed944acf28cea35a7f6e5bd4872826f71e46c93899a9929f6901,2024-06-27T17:11:52.390000 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 -CVE-2024-3917,0,0,55f83f03b9292263c532dbe29e254e7b9925f1a39645bd6835596489dfabe52b,2024-05-24T01:15:30.977000 +CVE-2024-3917,0,1,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 CVE-2024-39206,0,0,8cab33503027debb462a815aaa1f3da3d0625928338f1e658c10a9f2aa642bef,2024-07-02T18:15:03.290000 CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 -CVE-2024-39208,0,0,299e5852229d2647ff0440f276fa367c28bfc141139d729c8061f6806a3c58e2,2024-06-28T10:27:00.920000 +CVE-2024-39208,0,1,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 -CVE-2024-39236,0,0,651b4d90a8d55a0e5b11f9187496f58fac46ceaceed51eca388e8b19428ddbd5,2024-07-02T12:09:16.907000 +CVE-2024-39236,0,1,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000 CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000 CVE-2024-39241,0,0,afa83ae007b8cddb769c7423e9b1caee4c0fe8b440470f4e2aca6500f4f35cee,2024-06-27T12:47:19.847000 CVE-2024-39242,0,0,e6a42d26f8742e08c6e87c2f9736f6a5d1c92d4e99728f3f16ba7aaa3565d9e9,2024-06-27T12:47:19.847000 -CVE-2024-39243,0,0,b8130c621cb0dfb964c1992defd80d667f6acc85382d7b6cd314c7c97d98e637,2024-06-27T12:47:19.847000 +CVE-2024-39243,0,1,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2d8b,2024-07-03T02:05:45.213000 CVE-2024-39249,0,0,1ff2f203913d6def8e45c8465efc367378bddbe2b6c6b3b7bed53397c147bbc4,2024-07-02T12:09:16.907000 CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000 CVE-2024-39251,0,0,11bb5a05e3dee260dab5143009f39b990145aeda6e37f3232c0fb54201edd825,2024-07-02T12:09:16.907000 @@ -254029,7 +254030,7 @@ CVE-2024-39324,0,0,04ab9c8763685159f533c7d96d83ab8247d560d949d6ea5428fce08afab5b CVE-2024-39325,0,0,fb628c0a6246b721ccdcf88743ebf44736eda766d0e7d7c4b84f8d1662576544,2024-07-02T21:15:11.433000 CVE-2024-39326,0,0,a16c463704800186fd98549c3f5764f8d0de863d0b43b19aa8b0f49702f6b013,2024-07-02T21:15:11.657000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 -CVE-2024-39331,0,0,c5bb3e665b31aacdbf907c7032da4f6d49d6bc82a59a96e6be39b1d4f66a92fd,2024-06-29T07:15:02.060000 +CVE-2024-39331,0,1,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000 CVE-2024-39347,0,0,f5c35927ca6bc6b01c0289886e48e1c26a8232470e7aa98c1613809c151fa9f4,2024-06-28T10:27:00.920000 @@ -254061,7 +254062,7 @@ CVE-2024-39459,0,0,d1d8498393c450e178fa7bc147e75f870b75d424b183c32cba625d84c2757 CVE-2024-3946,0,0,af95d5e46eb992f74c75866328fad3ff861f42ea88ebd6ef22645eb1de333586,2024-05-30T13:15:41.297000 CVE-2024-39460,0,0,64535d769b37f6b9c7eceaa56210e3ceeb3b449fc556c3bc5382087d1c24bdf6,2024-06-27T12:47:19.847000 CVE-2024-39461,0,0,72dccb75786f085395fcbdc3b0ca926fa6759a1127d3979166b2568685bbc213,2024-06-25T18:50:42.040000 -CVE-2024-39462,0,0,32bc8f035f120344da7dce6fc99c7ebe73ac8830c3666aecdafa2afcce962161,2024-06-25T18:50:42.040000 +CVE-2024-39462,0,1,d6fa49df9f42ed202e5a3cc2f250dce01e83d58a2dd9514f13116e83ffa785aa,2024-07-03T02:05:49.283000 CVE-2024-39463,0,0,7c98fe725d4e51d691cbffc619089d88cefeea1f9586f4294ebd84933dd8071c,2024-06-25T18:50:42.040000 CVE-2024-39464,0,0,648509aff602abbe0bf765b9a1eb490094a3d79470a22106e7b7881918db06b6,2024-06-25T18:50:42.040000 CVE-2024-39465,0,0,2765da70e9bed8c3dbc53e987abed4c2654a9003d6c1dae4a2b0cd8fef1dcb27,2024-06-25T18:50:42.040000 @@ -254076,22 +254077,22 @@ CVE-2024-3948,0,0,376ea8906f03fda3c144927b149cbacf34b84dec1b654121329bc158cfe1d5 CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f43,2024-05-14T16:11:39.510000 -CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000 +CVE-2024-3955,0,1,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 -CVE-2024-39573,0,0,366fad4f46e01b60ab625a4397108f86c43d4f8f4c730e8981c51e7ec507ba69,2024-07-02T12:09:16.907000 +CVE-2024-39573,0,1,7e7eebc8f7807e5a5d00f82c0d28f5abe2d79239ae34bea5f004fd03abc17ccd,2024-07-03T02:05:50.170000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 -CVE-2024-3965,0,0,6a2d24a56808a8dbb9160c44f3b8ea17e074c89928316addbe1fa0ca0aaeb11f,2024-06-17T12:42:04.623000 +CVE-2024-3965,0,1,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000 -CVE-2024-39669,0,0,bcdc363e2d433b0d9d12f355b9208a4cd0e262037576ab90efd3238ccad39524,2024-06-27T17:11:52.390000 +CVE-2024-39669,0,1,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa29,2024-05-15T18:35:11.453000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 CVE-2024-39704,0,0,46d48385d4d162b3ac12c54e9ccb839ccae9f35d96e3edd9d9bfd3968e019316,2024-06-28T13:38:47.077000 -CVE-2024-39705,0,0,34f8335644e5bfcc0826cf082dfb05192d87d4cbdcebdd20e96f35cefbdc73c5,2024-06-28T10:27:00.920000 +CVE-2024-39705,0,1,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0bec,2024-06-17T12:42:04.623000 @@ -254101,26 +254102,26 @@ CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 -CVE-2024-39840,0,0,cf0cef2e05329a1216f74981ebbc4dbc7d10ee8168b70073e5c435ffc0748588,2024-07-01T12:37:24.220000 +CVE-2024-39840,0,1,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 -CVE-2024-39848,0,0,a406e2b5eebf34f795b980d155db1a7147865fe617aee30717a15aea5ad0bfcf,2024-07-01T12:37:24.220000 +CVE-2024-39848,0,1,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000 CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000 -CVE-2024-39853,0,0,2169eba1d28bdc589b024da57c04aeaf5c002fb75bec5b315c751dfe63b8af60,2024-07-01T16:37:39.040000 +CVE-2024-39853,0,1,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000 CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 -CVE-2024-39891,0,0,3d4b41a13a0ab5478a6ca83e6f5ba1427c7171d941e8b0954e51acc85bbc9f29,2024-07-02T18:15:03.447000 +CVE-2024-39891,0,1,ec5c82beca653c51f2b62fdea054dbb99f55518a9039f431aa649bad5f8b9397,2024-07-03T02:05:54.380000 CVE-2024-39894,0,0,c968489b60e34628f9bade5d12d3eb7cbc6bf7492988d91234687e1aa6697daf,2024-07-02T18:15:03.710000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 -CVE-2024-3993,0,0,60132f24d182886d3025f810ce7decb14e0293094944605569519b576c903995,2024-06-17T12:42:04.623000 +CVE-2024-3993,0,1,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 -CVE-2024-3999,0,0,8b504db281681bef266a2fb613f2c0692341e5dc0dee3088a7da80af8c0c709c,2024-07-02T12:09:16.907000 +CVE-2024-3999,0,1,d855e263f238cc0580530dcbe41b732e5a7fc792eec652c4279dc80589279eed,2024-07-03T02:06:58.680000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 @@ -254142,7 +254143,7 @@ CVE-2024-4022,0,0,862692e09b9131698fdf2d078f1715a141df0663671065e383928a8148e4ca CVE-2024-4024,0,0,ef64ae76a72fe30f0382303f22cba197d841a5535eb50d7c4ad40f3e475d662a,2024-04-25T17:25:05.903000 CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c766627,2024-04-22T13:28:34.007000 CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000 -CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000 +CVE-2024-4030,0,1,d6596b1bc8e06ff5d34944ccd3859da5be8798d01baeb248a35681574bba0161,2024-07-03T02:07:00.540000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4032,0,0,52c6b9eccf7e021076c0ce344d44b2f19b27dbd5716fada0f5ba921e591652d5,2024-06-20T12:44:22.977000 CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000 @@ -254160,10 +254161,10 @@ CVE-2024-4044,0,0,24332ace72d4390c16ec3b8977440043e797db2d7d42445b64fa06b462f426 CVE-2024-4045,0,0,2973487eda1b15ccbfcf50557eac1a48f731099aa75396cca0be0624bea7de1b,2024-05-28T12:39:42.673000 CVE-2024-4046,0,0,a540b586e4490c5aa35243f10fb42fe8c42d9288228be6b989b109661bfcf7e0,2024-05-14T16:11:39.510000 CVE-2024-4056,0,0,8d2872a63b61af99b314442fa34c585e616ec707e8d3b58da8a6d93a2f4a4848,2024-04-26T12:58:17.720000 -CVE-2024-4057,0,0,c68a82f9733094861d7eb38c56bca3878f1a3c824e551cdb4c90c0679c9344fc,2024-06-04T16:57:41.053000 +CVE-2024-4057,0,1,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-4058,0,0,c4c95455d6e76cbbdb3e2ad2bd6d39a0a74b9da8ef4ac622e44ffc5e8b4fb2cc,2024-06-07T15:40:49.707000 CVE-2024-4059,0,0,f7356d83fe5fccf2c54f421bb90f2c15bd9bf33edb756392f4236a5836d7af45,2024-05-03T03:16:29.430000 -CVE-2024-4060,0,0,e73d48dba8d4867b445df561ca35c4a253ea1abc6b1746f05e1e8b87e0d0ee8e,2024-05-03T04:15:09.620000 +CVE-2024-4060,0,1,c4df35b4ba03f25ce9e66ccd2a0f6342dcbc5f1e886657ca582640ee8747c7ed,2024-07-03T02:07:02.533000 CVE-2024-4061,0,0,731822e6f24cd811e7f06812f39ade81c9a66c6b1046f4d45903066a1f181f99,2024-05-21T12:37:59.687000 CVE-2024-4062,0,0,7fcbe6e50148b9b5e05d3025a893191a4aca3bb309243ec182c3df8f6e2a0587,2024-06-04T19:20:29.007000 CVE-2024-4063,0,0,10c24a204d439c4cd3340a486d9bc67fc982c548c71c2d3a385738d7e6499dc1,2024-06-04T19:20:29.120000 @@ -254171,7 +254172,7 @@ CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a CVE-2024-4065,0,0,b1f422b831341d9c1e5986a64370f0af2e0a4a34916a37b0d733d0bdad68fb96,2024-06-04T19:20:29.227000 CVE-2024-4066,0,0,4e1f511aad72571330159c417a61ca53f34c4e977ad9652365f2b4ae2ea4e4f2,2024-06-04T19:20:29.323000 CVE-2024-4067,0,0,c43c8ece29e54a7c357dcff8288f0137b2d265474bbb0c017a3d19f74212bd9e,2024-05-22T12:15:10.767000 -CVE-2024-4068,0,0,605c876816b0d5d545f0b16cfe7fbb9326bd5a0fe5c97a9f1b94375a4fc97f7d,2024-05-22T12:15:10.983000 +CVE-2024-4068,0,1,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 CVE-2024-4069,0,0,f8d2f2628e60be749b9734b09218105a0396eae1a8a4c94b50114640615c8252,2024-06-04T19:20:29.457000 CVE-2024-4070,0,0,611b2353a344eebf4d3d821b72a7661978c51598fabebbafad7cb3b8eb92ba73,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,1e5173381da62898dd2d89e779aa47e534c3be7a31fd5b5ef289e0ef19550704,2024-05-17T02:40:14.747000 @@ -254226,7 +254227,7 @@ CVE-2024-4140,0,0,722eee4132feb9c9f6e2ce08731c2e9140964d3eba63910346dbf63a264f25 CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000 CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000 CVE-2024-4144,0,0,804f070eb7c147c92dd9f6be5c3d4dba7563c2bc35d2c208518fc5d01b232644,2024-05-14T19:17:55.627000 -CVE-2024-4145,0,0,3c9762f04821050a58ad2e9967155f35715c1845669fa0a585ddbcc8a17cbed8,2024-07-02T14:44:45.540000 +CVE-2024-4145,0,1,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 CVE-2024-4146,0,0,a114759907c2b4b4964d82b3e640cc98e9895c1fdec80a727da3c0deb49d3ce1,2024-06-10T02:52:08.267000 CVE-2024-4148,0,0,99472767520f10bad17ca80099c5e2a59b64c04b882cb0fc99c8823f2860bd7b,2024-06-03T14:46:24.250000 CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000 @@ -254243,7 +254244,7 @@ CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71 CVE-2024-4160,0,0,a7e7d75f35cc83e015f97ccc8c84e392212beae420cbd507edd92418f485388f,2024-05-31T13:01:46.727000 CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000 CVE-2024-4162,0,0,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000 -CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000 +CVE-2024-4163,0,1,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 CVE-2024-4164,0,0,49b237365f4b3a57155336e2d6164de0b75d0d0b5c5e7ef04c9d3cfeebba2d2f,2024-05-17T02:40:17.710000 CVE-2024-4165,0,0,bbde8b313f0dde53798f3547e417555fb6c8e29ba00c488f19c82ebbebfddb22,2024-06-04T19:20:31.500000 CVE-2024-4166,0,0,c966e51739fa044e76f9a8839971eb1a1693fa42e53892e78013547ddee705db,2024-05-17T02:40:17.900000 @@ -254286,7 +254287,7 @@ CVE-2024-4212,0,0,9d03056b6fd89b00a99251c37ea5cec20a93e96520680d3762404caf20fca8 CVE-2024-4213,0,0,42ea90224045d73e2b0e3583ac57d426d05abb547b5044b93cb751055084fa1f,2024-05-14T16:11:39.510000 CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b06a,2024-05-17T18:35:35.070000 CVE-2024-4215,0,0,2a43dd2effbd31681d2d452a71037398a8b05276042d39ca0d120b651bef66fd,2024-06-10T18:15:36.443000 -CVE-2024-4216,0,0,b64899f98d1df93de8af859424e606a0b54f03649eab8c4a6696dbffde3f9ec7,2024-06-10T18:15:36.523000 +CVE-2024-4216,0,1,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000 CVE-2024-4218,0,0,68377bf5bc219c5624001bda4aa985e5224f9f419836698a53a69f78bf595508,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,c8079b758b715a1f50eab74fe10b87ff01903f1873291c49593cac5e499424d6,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,d6aa05e427d916e0de9769fc4820e29f1f18a3c6387db1bee92ab09f1ecef44c,2024-06-11T17:05:35.203000 @@ -254296,7 +254297,7 @@ CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000 CVE-2024-4228,0,0,e830c13aa5a6f4c85f45d6eae1028a4dec8a8006f0e9403b46d88a9b6fcbb44a,2024-06-27T12:47:19.847000 CVE-2024-4231,0,0,b748cd0cba9f8ca987fa54497bf4f5e243fe33136b361691cb77cf6b95c81bb2,2024-06-05T13:15:12.980000 -CVE-2024-4232,0,0,29a7149387c890d6a0d05202995edf38065cf1e9ded36e8c20e5c1fd1dd38377,2024-06-05T13:15:13.190000 +CVE-2024-4232,0,1,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d54942c,2024-07-03T02:07:15.740000 CVE-2024-4233,0,0,ca4371c9e0f8794352ea7e9d8d1d33962fb848d5646d81ea1b681c81b408ae84,2024-05-08T17:05:24.083000 CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000 CVE-2024-4235,0,0,e5a2e61878721e122ae422f5b9bcfdc813963b072f29be0ed433dc9fbd200f5c,2024-06-04T19:20:32.857000 @@ -254332,7 +254333,7 @@ CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000 CVE-2024-4268,0,0,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000 CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000 -CVE-2024-4271,0,0,b387f99302f91201ccece9e8c147bcdfc30a6615cd2543471e3490cd41180d93,2024-06-17T12:42:04.623000 +CVE-2024-4271,0,1,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000 CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000 CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000 @@ -254346,7 +254347,7 @@ CVE-2024-4287,0,0,048bae39f58d60d42f1a986a979513f5c9cfb08eeca89126761e78c7c68ed3 CVE-2024-4288,0,0,9367649ffe77365cb201f95bc69986ffb5e481ba50542c3f0953c5f2e0eb0d2a,2024-05-16T13:03:05.353000 CVE-2024-4289,0,0,76ba9be3eab9b673a4fa73a49b34a9d170f584667b3b959e9ff27923d52b8ed4,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,ae18adfa1aa95fb7b892a7c80ec7306532c6b8879b7b6c3c85ccb2ae6caf5b31,2024-05-21T12:37:59.687000 -CVE-2024-4291,0,0,6fb6b0e83a49b64a5565b2ca5f6437971dbeea9c5ab39460fc142df5bce32752,2024-06-04T19:20:34.997000 +CVE-2024-4291,0,1,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 CVE-2024-4292,0,0,f51ff84855f02b0bc4dd3e03d8351463229984e5d3c218f3331913e1b68e232f,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,631458ecd34e0e099a1efde23f32eb7981cbcf3111570b5f9cad2a4f0ec45cb7,2024-06-04T19:20:35.203000 CVE-2024-4294,0,0,97bd940eeda24c94b1982f85ff25718412e73b2bf939766f3f03c261351a8304,2024-06-04T19:20:35.300000 @@ -254363,7 +254364,7 @@ CVE-2024-4304,0,0,26620f2e8ced99fdd3bda531b587b99eceacc7574327e1e3504df0a80354f3 CVE-2024-4305,0,0,80d9e81fe28203915c36013916fcda2a85447859d56c5653b163fb664248ecc9,2024-06-17T12:42:04.623000 CVE-2024-4306,0,0,e9aaa66e23013eeddb017fc28910aff24c8ac74d8e5a2f36c0285b37028fcebf,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,8632ca6475393105acd262617756d75d5dfc473b5ad0365976bdee020429b7af,2024-04-30T13:11:16.690000 -CVE-2024-4308,0,0,c30b8d7bce14d8d06db9bf545139ec925cbf528f27e8b442e0e9c6b9a7a51847,2024-04-30T13:11:16.690000 +CVE-2024-4308,0,1,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000 CVE-2024-4309,0,0,f1f14d3d80b8943142865ddb6cb7e0bda2252fff5ef38ed63d563490a010cefb,2024-04-30T13:11:16.690000 CVE-2024-4310,0,0,6a8887d86a728fc0163c37e4f3726fb9d19866f95653c15dd5d393e7592aa1b6,2024-04-30T13:11:16.690000 CVE-2024-4312,0,0,9e55bf62ae99c615e6428643ba23c177214afa107267a60fb24a14ad6d9006da,2024-05-14T16:11:39.510000 @@ -254385,7 +254386,7 @@ CVE-2024-4327,0,0,4d82dd4709e731be065c0bf0ae9ef6780542dd816512537c908eaf4d566d42 CVE-2024-4328,0,0,5c6dddabdbc801031ee77029aa4b0ff4de38533976485f2a04e98fdc9688c2d2,2024-06-12T19:33:00.527000 CVE-2024-4329,0,0,b4ac7e4961d4eb2bf8d3a768969ba81a7ecc8f8fe7d1f63dcc17b43bdf703463,2024-05-14T16:11:39.510000 CVE-2024-4330,0,0,27ed586df5d07858fa3cac91f5c86ff400dd30bbc2cec38947cbe22382636599,2024-05-30T18:19:11.743000 -CVE-2024-4331,0,0,31d80071d9217fb084a6ad175ae7c8879003862f66041883ec06dc2da18f1116,2024-06-10T18:15:36.607000 +CVE-2024-4331,0,1,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000 CVE-2024-4332,0,0,a4450918e5a589db8c977e5003357b878aa0c56e343fea642c51db757d4ea728,2024-06-03T19:23:17.807000 CVE-2024-4333,0,0,54d45bd52745780b8118a31c1fee89485df63cc9da9171570014fde92de8077a,2024-05-14T19:17:55.627000 CVE-2024-4334,0,0,30906cbcfc478d118f3f2667f0f32e5aecae9fd644f3f457d85bdc99ab962676,2024-05-02T18:00:37.360000 @@ -254415,7 +254416,7 @@ CVE-2024-4364,0,0,5edc139442e19a08636aa02c6e9afe48e9a2ca53e1abef91f65b8b0f93a33c CVE-2024-4365,0,0,9806433296206bcec148d9648ab2fc91142327d17ef07e64e0ad9e5ff3907a52,2024-05-24T01:15:30.977000 CVE-2024-4366,0,0,c04cea9d73579a737d5c3d200547b1e50e3a1d3ac8e5c0e3a1d88c878c2e9d6a,2024-05-24T13:03:05.093000 CVE-2024-4367,0,0,c21edbb80531231ffca1d343d0a559592c99f935f8e88145cc03f35a6a006b04,2024-06-10T17:16:33.380000 -CVE-2024-4368,0,0,e238366009859277dd7e92e4325028250a78f7d3fa28b20672c01083b2417648,2024-06-10T18:15:36.693000 +CVE-2024-4368,0,1,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000 CVE-2024-4369,0,0,50920fdcee19aa19b0b40029a8eb79df3e2175cd7214593e13e1ad35efa56c2f,2024-06-19T18:15:11.820000 CVE-2024-4370,0,0,069da1b0ae5c656e192af67776d4fb05a1e574a802cd3af79b4e6cc7490b0dbc,2024-05-15T16:40:19.330000 CVE-2024-4371,0,0,6cec3438f9da16aaaf81036d5252f279057c04fa33a9a5b8c9aee6667c7b57b7,2024-06-13T18:35:19.777000 @@ -254434,15 +254435,15 @@ CVE-2024-4384,0,0,ebc1c84b90844c3f97a8b9e82daa6480f405d72df77e0fb864b9730ee8f9fb CVE-2024-4385,0,0,ca3b527b38ef117a25bd1a563993108f86670c5409f332b50d53521ab7d618e2,2024-05-16T13:03:05.353000 CVE-2024-4386,0,0,57810600ce2cb57e3b791eb883cd1cf3cd600b48831c08c0c6ff5f338408f5ca,2024-05-14T16:11:39.510000 CVE-2024-4387,0,0,9ee50ad7bc6299cf393d49fb5522fa18479c94f2c9950e2c45d0cf70a824aaad,2024-06-11T10:15:13.637000 -CVE-2024-4388,0,0,684fa93214b643d863a1f4b43d949a4a035e5481cc5c9e9fbbff1ed7d8cb315e,2024-05-24T01:15:30.977000 +CVE-2024-4388,0,1,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed80c,2024-07-03T02:07:30.200000 CVE-2024-4390,0,0,e0f292a38c635f40275a1e1f559f35ce9d0874913091030d18dfd937968c272f,2024-06-20T12:43:25.663000 CVE-2024-4391,0,0,606dfcb7000017430c9016faa846742a8e75fccee77649ce6753dd6affa1593a,2024-05-16T13:03:05.353000 CVE-2024-4392,0,0,42aa790771d322d803e80e41696519285313df90a0aa7c7e222147b471317291,2024-05-14T19:17:55.627000 CVE-2024-4393,0,0,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000 -CVE-2024-4395,0,0,e6c4228ae5c87523b0cf007bb4db130150d420515f2a30cbb7e5018a06861d7d,2024-06-28T10:27:00.920000 +CVE-2024-4395,0,1,7eb8bb55518c25270e2cdb5da345e646a2437fce6bdd0ba1dda9f1e27539a52c,2024-07-03T02:07:30.800000 CVE-2024-4397,0,0,ebc3b333bdff80be7423291cb70bec6082bb12d724cf862660c9f0050112398c,2024-05-14T16:11:39.510000 CVE-2024-4398,0,0,4b7d20498f56e38cff1d1c0b655156a2b3f15862c52a314f7c4c607a40427bdd,2024-05-14T16:11:39.510000 -CVE-2024-4399,0,0,3d19e4ab740018443fd6f7e134fb90cb1dbd4ba6681853dbea09ee003df9e238,2024-05-24T01:15:30.977000 +CVE-2024-4399,0,1,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000 CVE-2024-4400,0,0,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000 CVE-2024-4403,0,0,76e3d9cd08e7991585d91e955d822e10d6bdac0fada874a8ddfe039529718e09,2024-06-10T18:06:22.600000 CVE-2024-4404,0,0,76b84568a6fd8c4c13b055f9fe807dc63ab804e0335afb670a3611ad4154cb58,2024-06-17T12:42:04.623000 @@ -254456,9 +254457,9 @@ CVE-2024-4418,0,0,3a6b05af9a3179afbc189aea747551964540d505918c15716894bdd0ca752d CVE-2024-4419,0,0,e2d8f545d71f8d9558ae0290474349668dafdd9730a778cdbbf911c6b4cf5157,2024-05-29T13:02:09.280000 CVE-2024-4420,0,0,9b75921df8e16106b48e4c0d4f1fc07ba699b6ee751657d557cf95a2815ddc11,2024-05-21T12:37:59.687000 CVE-2024-4422,0,0,033ffa151e9f7c26ec50c74ca266b6c48fb375132593b1334657790301503e16,2024-05-30T13:15:41.297000 -CVE-2024-4423,0,0,e0dbe4a46d2bfb02a06f5f6dd7941b892a0e354e08a517bf9732a9750b61686d,2024-05-14T16:11:39.510000 +CVE-2024-4423,0,1,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 CVE-2024-4424,0,0,620360b6d69d7e46500e9eab3db8f094f558ee3037a5afde7000ad6722a43c71,2024-05-14T16:11:39.510000 -CVE-2024-4425,0,0,ae12578d88becb8c756d759ea5148419b194091165c0ac35427c779bf68bf797,2024-05-14T16:11:39.510000 +CVE-2024-4425,0,1,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000 CVE-2024-4426,0,0,d45b07e459b8942ce39fad0451263a36b438510587df84b90121d95238db1c29,2024-05-30T13:15:41.297000 CVE-2024-4427,0,0,dbffeb3bfbdab262c72e87811faa35600cb8d59d008385dfa387cc983f05f603,2024-05-30T13:15:41.297000 CVE-2024-4429,0,0,6db0b50afd68c2935a9b7297cfb4cb747c1bf0011d158eb705397d3f75a5fc02,2024-05-28T17:11:55.903000 @@ -254471,7 +254472,7 @@ CVE-2024-4435,0,0,00fbe56a3162edeae001d58c5c5c4a8e71f65051db3777fe986060ffca8e63 CVE-2024-4436,0,0,a91428e5a2aa192fb6a697af879af6f14e366dc50cc143a39f5a3fcca97b187b,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,61054b22af09e3b0d98a92aa8a0ef52dee86769ebfd9b1f0507b757c8842e26d,2024-05-30T02:15:47.433000 CVE-2024-4438,0,0,b2a3938b595847aabcc899f73eb7efe44f6e3d720b2c42aa84e0abfa35309b7f,2024-05-30T02:15:47.537000 -CVE-2024-4439,0,0,d4904ab7f03492cebfcab113d16c9db0e8589fc24c413d994223fa5d5b94f71f,2024-05-03T12:48:41.067000 +CVE-2024-4439,0,1,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000 CVE-2024-4440,0,0,51dabd0ed14011a33ac13484b9ff25988940854e7446055f86986b74eaffda88,2024-05-14T19:17:55.627000 CVE-2024-4441,0,0,21bddaae6271b56b94db02a08e641400bfc943be91594296c54fd13926b71ef2,2024-05-14T16:11:39.510000 CVE-2024-4442,0,0,57e7edb2bbe85f3cb8cdc5fd7a02d1ab6bfbd4ff0c8528211ebf7c1b689cb05e,2024-05-21T12:37:59.687000 @@ -254495,7 +254496,7 @@ CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93b CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000 -CVE-2024-4467,0,1,cdbc50db3bde7e6815023f83ab9f52bf00f2b867725367d3a16d42b11160a048,2024-07-03T00:15:02.313000 +CVE-2024-4467,0,0,cdbc50db3bde7e6815023f83ab9f52bf00f2b867725367d3a16d42b11160a048,2024-07-03T00:15:02.313000 CVE-2024-4468,0,0,0ca1519b3786abed41420557bdcc900f05c07970f7b2d2d6a490ebaf1139dd06,2024-06-10T02:52:08.267000 CVE-2024-4469,0,0,38345c865c5feb52902e530671fff3d9d47caec782b7e2a3a7d5d275ffe98f44,2024-05-31T13:01:46.727000 CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8d0,2024-05-21T12:37:59.687000 @@ -254553,9 +254554,9 @@ CVE-2024-4525,0,0,741247f2a3c837330c7396d52eb39279c136e543e5edfe42049fc3b99c3eb4 CVE-2024-4526,0,0,38f25e6d8357ea96d9e0f34fa228779e656d62cf934884d2f42de5d4a9329e1b,2024-06-04T19:20:41.720000 CVE-2024-4527,0,0,f79a4462139040e419caa8cbdd95505b5e81c8ee4ada7cc0551dee295b41eb0e,2024-06-04T19:20:41.810000 CVE-2024-4528,0,0,bb30c972d01721ce2df31368adecf49c93ca8c32117bec10bec2b4a606f59eff,2024-06-04T19:20:41.917000 -CVE-2024-4529,0,0,b464213a661f358d480fa29ab3e1f2cc37bd7be7d18625b18a36674b9feb13a9,2024-05-28T12:39:28.377000 +CVE-2024-4529,0,1,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-4530,0,0,c72aa96a550d60bf64babf7964c79c17453ed67abf6338705e53f3a9c3ef857d,2024-05-28T12:39:28.377000 -CVE-2024-4531,0,0,20165061f74665f06c3f2866451f5b2328a3d80e0981bfa152da75c864391f9c,2024-05-28T12:39:28.377000 +CVE-2024-4531,0,1,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-4532,0,0,c2e03d530bcb2898a842fe4e8288b62bb9f19a09d8834f7014536354d8d2a9c8,2024-05-28T12:39:28.377000 CVE-2024-4533,0,0,492e130d3e5d10472cfda9c2f7877bf4343c0232946f56f139a67ddf12a239dc,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,19cec6a1510d613f49bfd3ead8eb68cbc99eb860cd5c104d9058aac1c794fef3,2024-05-28T12:39:28.377000 @@ -254572,19 +254573,19 @@ CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000 CVE-2024-4547,0,0,6b600f363e41b63ee43a4b2365298fb38de96fd61b910d0724ca38ee29a8a8df,2024-05-06T16:00:59.253000 CVE-2024-4548,0,0,255fb62729cbf70b5d240d036752cc7d31677deac2357745733c1172bc76cfe7,2024-05-06T16:00:59.253000 -CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ace3,2024-05-06T21:15:48.783000 +CVE-2024-4549,0,1,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde15796,2024-07-03T02:07:44.057000 CVE-2024-4551,0,0,bde23bacf66d6a3da20cc3762eb00d7dfd03b874f5885e9a67eebb6780ae65b6,2024-06-17T12:42:04.623000 CVE-2024-4552,0,0,e23892055f41d68c57f1d172e5ea3d0a2ee46019e9d286872c115b7aad205614,2024-06-04T16:57:41.053000 CVE-2024-4553,0,0,8b88b932112e5db46be28f06635e2ec7d2585d5bcb10d64401d792f4b888b1c3,2024-05-21T12:37:59.687000 CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 -CVE-2024-4558,0,0,fcb727202a9f43a9bf70ed6e025c63a0fd8208e4c1e99d83d4aee5cebbd5fae2,2024-06-10T18:15:36.760000 -CVE-2024-4559,0,0,8380b9787705277bd83d6c6288181f3738a86c645934830c7e5c61a4edd855f6,2024-06-10T18:15:36.837000 +CVE-2024-4558,0,1,ea190aa729a7b0a2c5304c20c6930c1aca8d4418112d25ea312df8adcbd7a8ba,2024-07-03T02:07:45.140000 +CVE-2024-4559,0,1,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000 CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000 CVE-2024-4563,0,0,43e81ccbb963e983297369a19c921ee8c5a4d32bc8be4a7c8277c1c258a5c174,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,4e10c9acbdd4f88d210f4dd1739d9efe5b9317a176118d23abd270246fa28562,2024-06-13T18:36:09.013000 -CVE-2024-4565,0,0,67d994d050778f99ebea00dffeedd75aa1729789c9eb9581753d556845ec5e7b,2024-06-20T12:43:25.663000 +CVE-2024-4565,0,1,df9fed47799979e89096de86e015120d931fdd297661dfb657291836f62e8622,2024-07-03T02:07:47.217000 CVE-2024-4566,0,0,5bf64390fca62ba0e88600d1f0954e23dea48d7610695fd2ef891697361d3217,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000 CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 @@ -254625,7 +254626,7 @@ CVE-2024-4605,0,0,953638d724b858b3af29d2158adc8bf0b3f03be99b297e319002baf558be51 CVE-2024-4606,0,0,6a0f9aa1de71c84cf915c091fa2bebebead3ebb4c4bdbaf5b5bc091e1c955edc,2024-05-14T16:11:39.510000 CVE-2024-4608,0,0,66fd8dbc7b1c172bc789c4876374c82bfd54c48e5902295fa28145d061770319,2024-06-06T14:17:35.017000 CVE-2024-4609,0,0,c23c3de39dc98d86dc6853d31c2bc52148fecec26ec42d14e3cca3645de4f823,2024-05-17T18:36:31.297000 -CVE-2024-4610,0,0,81ff3ae6e48750d7db743becd24b39c747725961f69d5bed9a772eadd337b280,2024-06-13T01:00:02.087000 +CVE-2024-4610,0,1,9d1f5948ee247bb460ec957dcfec1558fe286260475ff78c506e184740f1e859,2024-07-03T02:07:50.390000 CVE-2024-4611,0,0,0152495de6f2454e6b1280dd3d20184c586b399950947591d94dfb5475ea0272,2024-05-29T13:02:09.280000 CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000 CVE-2024-4615,0,0,7b5276905c165aa4f37a2a2e956283f0d8e2b47a85a8c0a930e4cc6ae0292a24,2024-07-02T14:51:50.013000 @@ -254634,12 +254635,12 @@ CVE-2024-4617,0,0,a9ac6f97f78093fda60c756da599c06372e99e21d7b1347de185ba0119cb6c CVE-2024-4618,0,0,60eca777456ce5379ff16ab59d0e8db1fff28f58a76fe14d606e7a27666b586b,2024-05-15T16:40:19.330000 CVE-2024-4619,0,0,e5a9884a731cd527eccadb69d8fea8c7f9c7a04a1fc119314f14a8f7a5fe1b15,2024-05-21T12:37:59.687000 CVE-2024-4620,0,0,aca290e81a01c9aa0297c2a2a6f363e13c691584f35f3993ff959e5f7ab27226,2024-06-07T14:56:05.647000 -CVE-2024-4621,0,0,0dcad97674134d7acc0f6a3b23542c7c7b4811503a20f42bfd18c3bed8fb5fba,2024-06-07T14:56:05.647000 +CVE-2024-4621,0,1,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000 CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e86196,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000 CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000 CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000 -CVE-2024-4627,0,0,66f44b28d09faaf490b0f87d18524c2208e8638eafb68daa7b5e3f09b9c84247,2024-07-02T12:09:16.907000 +CVE-2024-4627,0,1,54bd30bead354294b48fe249d643bc73bcc7d1380abeeb01ca2b741806fe2836,2024-07-03T02:07:51.527000 CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000 CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000 @@ -254672,7 +254673,7 @@ CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06b CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000 CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000 CVE-2024-4670,0,0,438b57b9006ea70a278767dc5849ca5e16eeaf7f43c9f1acf2c1dcf72f3e2983,2024-05-15T16:40:19.330000 -CVE-2024-4671,0,0,c1b63d9479e0a7899b79c2f71caa3b9a65f268c56a2b0a474a2a8df31065a6d8,2024-06-10T18:15:36.890000 +CVE-2024-4671,0,1,043d3efab38d086b34bba001150b0534552caf17f100fca56ac049faf8a658e6,2024-07-03T02:07:53.880000 CVE-2024-4672,0,0,2e7277bc711b9149c2117e5a8d761b586a461c190d37c6ce07007cf45835bf27,2024-06-04T19:20:45.330000 CVE-2024-4673,0,0,c65362c2881243211da81eabb3c43edea333d38bfd7cb4f1c8bfceed1929f9a6,2024-06-04T19:20:45.437000 CVE-2024-4674,0,0,f94d65b4403d5df5dd08800d2069c0e3912393bc448d9b4aad6bb61f7bdd2f77,2024-06-04T19:20:45.527000 @@ -254701,7 +254702,7 @@ CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620 CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000 CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,2d052263ca03efcceae6f1a9b5190b0e61a795b9eb986321f967eeb0b20da62b,2024-06-11T18:06:31.967000 -CVE-2024-4704,0,0,77378e98186724fe19847a6f6a69faba595c66ae1f99398832716c1d97a37422,2024-06-28T13:27:26.267000 +CVE-2024-4704,0,1,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 @@ -254747,28 +254748,28 @@ CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4 CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000 CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000 CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000 -CVE-2024-4755,0,0,8a7a71d94c74cb52dec815eae51a85f655e8bbdb14fb2727ec4857b0eeba2dfa,2024-06-24T19:31:03.263000 +CVE-2024-4755,0,1,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000 -CVE-2024-4757,0,0,73657ac01744c501b9896ce49d4f00383a32113d3f80fad0403d338908d3a4f5,2024-06-25T12:24:17.873000 -CVE-2024-4758,0,0,57406868ebb68bb5b6412fc9d60125c43a5e81e040ffd2f2a8dfd71351e995fb,2024-06-26T12:44:29.693000 -CVE-2024-4759,0,0,8b059e177c76b9c2cc6c55c4c3ef3e13274f4cfdcd4ecb6a7973f71b5eda00d8,2024-06-25T12:24:17.873000 +CVE-2024-4757,0,1,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000 +CVE-2024-4758,0,1,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000 +CVE-2024-4759,0,1,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000 -CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000 -CVE-2024-4764,0,0,9a13ff0309ce1e5420716f8085db95df94fd2bab38dc643251ec74d75f275fe3,2024-05-14T19:17:55.627000 +CVE-2024-4761,0,1,df79e269dd6a74aaf18be3488efb683c94b3158db9f96005d676c8bc48a87011,2024-07-03T02:08:03.270000 +CVE-2024-4764,0,1,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 CVE-2024-4765,0,0,79cf786affcffdbdcf63e64510a9df9c69661dd60d893b7d58fe569da83450db,2024-05-14T19:17:55.627000 CVE-2024-4766,0,0,98e8f2fc1a9bb434dc2ebf9712dcd963d3447784d3ba2c4c02b3cfc1d33376e2,2024-05-14T19:17:55.627000 -CVE-2024-4767,0,0,515b2b1dab0b68f8dcc410e0a42d7ec3cc5289f6fae20e90b9ff70acd96e0465,2024-06-10T17:16:33.823000 +CVE-2024-4767,0,1,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 CVE-2024-4768,0,0,e1d80771954b5e9c4ad911244727d590e4367cd37d5aa8934d84c9ad6c8772b1,2024-06-10T17:16:33.883000 -CVE-2024-4769,0,0,e1e29498f65bbe413c5962147ce0c90418a64797a32ce2e6aa802efce40abe03,2024-06-10T17:16:33.950000 +CVE-2024-4769,0,1,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 CVE-2024-4770,0,0,1f072fce81f263a7b94d764eaf87eca59c330f2689debdba652ebfba413df900,2024-06-10T17:16:34.013000 -CVE-2024-4771,0,0,f3c8218dd8d9901b352d2640e8ef932feaa579517fdf4ba07d6bc53594a835a2,2024-05-14T19:17:55.627000 +CVE-2024-4771,0,1,65ecb44d66f4d1dbe0ceedf41bce3009ee95c66c5cee70725cf485ae8cc22e85,2024-07-03T02:08:06.447000 CVE-2024-4772,0,0,0548f2bf4854c114c3072ed264850541155f765e8c3f39fdd9693882c610c4da,2024-05-14T19:17:55.627000 CVE-2024-4773,0,0,d8209e41bf9cc7ac4f035ae2cb3a841c690ab5f97ea816c9ca05ffa9efbe4365,2024-05-14T19:17:55.627000 CVE-2024-4774,0,0,6c0388c3e1f4b79ea1c2de84abefe678fb403f6f0dafe4487e3abc5a37af09b4,2024-05-14T19:17:55.627000 -CVE-2024-4775,0,0,757972c70170e347b2c51d2e2498d128ecd7ff8f77339f6d2f4b77d366af97ef,2024-05-14T19:17:55.627000 -CVE-2024-4776,0,0,64dd8268145f408ad7d61272729ea601365b30d5997216da96d560825c4fd0a6,2024-05-14T19:17:55.627000 +CVE-2024-4775,0,1,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 +CVE-2024-4776,0,1,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000 CVE-2024-4777,0,0,463b2af71f8f2a9d1c562c36b6fb26878d601ac505a437b31aefb6540cc53c2e,2024-06-10T17:16:34.070000 -CVE-2024-4778,0,0,37531b60d89a44d35c14fde25587b4d8cbf891fd39da513ae2adbe2646535312,2024-05-14T19:17:55.627000 +CVE-2024-4778,0,1,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-4779,0,0,e93e79f4a86fab8cb11a3f6a53c3afceec1606ec76ba934e81e552f2e4a9a244,2024-05-24T01:15:30.977000 CVE-2024-4783,0,0,daba56adbc0652555be3afeccbdbe190fb7cbe9964b63627bf6508f75d28c65f,2024-05-24T01:15:30.977000 CVE-2024-4787,0,0,20a16e1f74cb3e944eacd8337852aa9641c9a9f479c35a6b627f90bdd3958503,2024-06-20T12:44:01.637000 @@ -254859,7 +254860,7 @@ CVE-2024-4895,0,0,be42ef886a64c01ec9437b4cfbce4dfdf0b902fbee0c6083bfc71de776f15b CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7a6,2024-05-22T12:46:53.887000 CVE-2024-4897,0,0,a273fa1e610a27e4ca9c04a635a2633f6f061e2bbcc8255661a4476b491a2085,2024-07-02T17:44:45.700000 CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000 -CVE-2024-4899,0,0,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000 +CVE-2024-4899,0,1,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 CVE-2024-4900,0,0,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000 @@ -254903,14 +254904,14 @@ CVE-2024-4942,0,0,157240698edb46a5deca9943c90e89d5c268795c03f1dadbb4d2f6e28d7706 CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000 CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000 CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000 -CVE-2024-4947,0,0,0989bdad2f01574011303d3ecc708402fd1f8315e22ea1bd1418f8c873ede3b3,2024-06-10T18:15:37.447000 -CVE-2024-4948,0,0,b05b3d79ed1bf722f64863ac2977f422c8f4b6d1e09bbc1d1e2e68fdf78370bd,2024-06-10T18:15:37.577000 -CVE-2024-4949,0,0,f0a79ad84a3544c6d743e80f76d1663673c23e46c12c5ac6e4f28e6bfa119dfe,2024-06-10T18:15:37.743000 -CVE-2024-4950,0,0,3ebada6d910a8901a57ded412adc347e7122b31907aba3a87df300b3f8515696,2024-06-10T18:15:37.830000 +CVE-2024-4947,0,1,8b22fa92c86c832263b0660c6b596a76b1c7e8c155bae82cd88218c6326792e3,2024-07-03T02:08:19.620000 +CVE-2024-4948,0,1,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8ff8,2024-07-03T02:08:20.437000 +CVE-2024-4949,0,1,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000 +CVE-2024-4950,0,1,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 CVE-2024-4956,0,0,ee2bcf2dea357e2a10f3afc4aab6bf4b7aa596bd0271ebb4f60e3d58e4ce3e86,2024-05-17T18:36:31.297000 -CVE-2024-4957,0,0,fbe11ceff64da7f3b667bbba244809e23b59951bd8423f08944f8b63f6ca14e0,2024-06-26T12:44:29.693000 +CVE-2024-4957,0,1,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 CVE-2024-4958,0,0,2bbe45732cede494f69801845c1ffcb7706b51daa06d3118dc1540d009abe6d9,2024-06-03T14:46:24.250000 -CVE-2024-4959,0,0,99c51fccbdc3be4ec7a4f64a5f749631191acce391b06228ed01dc94d3cc689a,2024-06-26T12:44:29.693000 +CVE-2024-4959,0,1,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-4960,0,0,7a8ddb2c3fde26a166a544c1ef080595386d19e05b6d4e7e6367c9f15a68a056,2024-06-04T19:20:55.213000 CVE-2024-4961,0,0,0d2d4f4239c9a9f29742a2da2d8e79004d41b07adb750c3d0ef3c07228a3521b,2024-05-17T02:40:43.983000 CVE-2024-4962,0,0,6c5bd74692e7fb9e5f8bab3246b40f1edbcfa52027a31b052d3ab9d12e9821c4,2024-06-04T19:20:55.343000 @@ -254933,7 +254934,7 @@ CVE-2024-4980,0,0,b5b93d089fa3d245393b7cb268984100664e9544bf4ff7971c072bbdebb099 CVE-2024-4983,0,0,49f1cb0f5f1d6955f366dda654a5436de910210a329601fe7472776ed46f30ec,2024-06-27T12:47:19.847000 CVE-2024-4984,0,0,c181b2792419ab292757f17fa7ed54efe54e64b1f0d7a8e32f201040654607f4,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,8a1d7360ecb0b336e479fb881fdc484ef9fe33bf7265e6809734a732fb238e9f,2024-05-21T12:37:59.687000 -CVE-2024-4988,0,0,e3e46f66e9019adcefc7fde3cb6b9482628a866ff50189a1fb9c695c9d061184,2024-05-21T12:37:59.687000 +CVE-2024-4988,0,1,dfc0f5530dd22007888e6394b201730918d0fc293c4423105233cf9632ea29fc,2024-07-03T02:08:24.393000 CVE-2024-4991,0,0,180b9ed28c0cce46df550147eebf5773d3a2c46d3490c6ab8f019084050e5a01,2024-05-16T13:03:05.353000 CVE-2024-4992,0,0,504a91a45451c38d9b5beed8f2c88cac747dfe187af29754ed23c5e483929557,2024-05-16T13:03:05.353000 CVE-2024-4993,0,0,54558f9e3463a1500143cda3bf9ee67127625c6afa1872d34f1d786cf2569f73,2024-05-16T13:03:05.353000 @@ -254963,7 +254964,7 @@ CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992 CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17df,2024-05-22T12:46:53.887000 CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e3ae54d07fb41ce4fd356143d834c0744cccfcb0f7c15179bf5d5b0f79f65ca1,2024-06-20T12:43:25.663000 -CVE-2024-5037,0,1,80c31b9bbe1b67fe35a2516a9112e42ea4127092cdc83d8c5b22e5fed7ba22ed,2024-07-03T00:15:02.640000 +CVE-2024-5037,0,0,80c31b9bbe1b67fe35a2516a9112e42ea4127092cdc83d8c5b22e5fed7ba22ed,2024-07-03T00:15:02.640000 CVE-2024-5038,0,0,06b42bf2f2d8413cc0f40932a00eaaea0786a8ef2cd369c2d799d355c720323a,2024-06-11T17:41:37.883000 CVE-2024-5039,0,0,42959b486bf28971702f84d5d970f64301a550626d1348beb35b7505e0fa75c5,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,0ff887bafdff8fcd61409221ff18cf1da08d6038e0047c0178293c334ec34d62,2024-05-22T12:46:53.887000 @@ -255000,7 +255001,7 @@ CVE-2024-5087,0,0,4f5f1251d7189640c9c6f95bfddf954e41f7d961c0a07b4302145df66739e9 CVE-2024-5088,0,0,670ed03c49211ecb2fb7d707640c3762718821887df98f6c48b414573abc37eb,2024-05-20T13:00:34.807000 CVE-2024-5089,0,0,1b747912b9ca78f56cee36088b5d02d248b45a5a454d24110a362b62386eddf1,2024-06-06T09:15:14.897000 CVE-2024-5090,0,0,6175bb4aadc63b132e799e5a29e3927ca1ef848ead0dfaf93b0c8e4569bac982,2024-06-11T13:54:12.057000 -CVE-2024-5091,0,0,6ca209b1eb59143a7fd76d81bd1e05c78885c9672403a2e5c91f6b10900d2131,2024-06-10T02:52:08.267000 +CVE-2024-5091,0,1,ebfc63df063962b42c546da9b063b838d4cc3405e8f86d8f0f4a8a37b0ebeb5c,2024-07-03T02:08:29.633000 CVE-2024-5092,0,0,42d960073f235db3a1d896466f3bea026be5b117dc5effbb8a82da60874fb373,2024-05-22T12:46:53.887000 CVE-2024-5093,0,0,d2d6eaa6c80785824276c0a81dd265ac7bb3ca056730de7cd7f1d7d5170a9109,2024-06-04T19:20:58.343000 CVE-2024-5094,0,0,7a79bbb94993c5d6d42caf9102d6d20e95bbb63461ef3c32deb62744d29b150a,2024-06-04T19:20:58.470000 @@ -255058,21 +255059,21 @@ CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186c CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000 CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000 CVE-2024-5154,0,0,0900f3ffde48a737774e31da15c4bd85a62398198c843c819abf1f8f6c6973c9,2024-06-27T05:15:51.567000 -CVE-2024-5155,0,0,2a20a869c58a8b80fd2bd862f76df12b43c40fbeec518ecb9ca464561a78cd98,2024-06-17T12:42:04.623000 +CVE-2024-5155,0,1,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000 CVE-2024-5156,0,0,04d3b26745087cecbd2208e3ae2166c72777f223725a2a397110c6609350eb95,2024-06-20T16:07:50.417000 -CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000 -CVE-2024-5158,0,0,76369e6e46f6c34bbc5a354a762f99c1a790d22381b6a166821eb73e4f6cf9b3,2024-06-10T18:15:37.953000 -CVE-2024-5159,0,0,21e48f9c116346beacd1ff1b36dcd3eeb5d22159bc679bcf4bc325526369218a,2024-06-10T18:15:38.010000 -CVE-2024-5160,0,0,9e4b1e18860b5527c7c851e358a84bf2abb3a6bec986d19da5dba6c58ecb7cb1,2024-06-10T18:15:38.067000 +CVE-2024-5157,0,1,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 +CVE-2024-5158,0,1,8c70fcc8db449f9a5a335015df1612ab2222ce3250558850ee4d694ef204cd6f,2024-07-03T02:08:35.143000 +CVE-2024-5159,0,1,9a9b3de45c6c36099e2df42ed5c739b91b4960d213fd6f345b99527b20e821e8,2024-07-03T02:08:35.967000 +CVE-2024-5160,0,1,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5161,0,0,e7ee50e132209c9af2d04e0f78f70daa2f8e4d8e66a5c74b97f79aeb602e94ca,2024-06-06T14:17:35.017000 CVE-2024-5162,0,0,d15fa704d37693972ec8048da97de07e102beeb78dcaeaa088ebcc9b6b634ff1,2024-06-06T14:17:35.017000 -CVE-2024-5163,0,0,891fa577af5d712f6c3d18cebfb44e2a6f24a31af0cc2dc5481c88da80665cf6,2024-06-17T12:42:04.623000 +CVE-2024-5163,0,1,bdc81db4ac58629f980356520760931bcc42aa23cfccd4fdeb3934ec7b891de9,2024-07-03T02:08:37.670000 CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000 CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000 CVE-2024-5169,0,0,b1ca0b7cc98949f62453afcab28e83911d364c4494efe1f6507425f7cbc51120,2024-06-26T12:44:29.693000 CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000 -CVE-2024-5172,0,0,c11e28cee00d03ca550aa31f6a4a4e2619eb7f584486db6cbc532617ccc0d3c9,2024-06-20T12:44:01.637000 +CVE-2024-5172,0,1,c8c884eeccb953712e0719e1416dd616a1f13a0cc426940cef2525dd47b28157,2024-07-03T02:08:38.770000 CVE-2024-5173,0,0,1d07a8c869bc825cf73f46bac935aee62b58e8e6badef703c708e935b6259cfb,2024-06-26T12:44:29.693000 CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 @@ -255117,7 +255118,7 @@ CVE-2024-5224,0,0,60b1bcb89040b5c3e85ac5131fd112ccc87db84d011046ada6bfcb3cc04495 CVE-2024-5225,0,0,7881c429f87388fcca6782bea681345deddb79fb7655466f82539aaf4c1c91ef,2024-06-07T14:56:05.647000 CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000 CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000 -CVE-2024-5229,0,0,5591fcb6917655cbf3944dcd6615ff3ff9ee2f54b68a25aab97dceee478c25ea,2024-05-28T12:39:42.673000 +CVE-2024-5229,0,1,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189c3,2024-07-03T02:08:42.827000 CVE-2024-5230,0,0,51b265a993a2a1838333f971bcff3753bc95798a0f7ce39ec9a30aa74fafe886,2024-06-04T19:21:02.540000 CVE-2024-5231,0,0,d1d57f2646136734f8ab6324b74544b5f379815daea3a3cbe7d317dbd09af9bf,2024-06-04T19:21:02.640000 CVE-2024-5232,0,0,f8ad828bf1a022f565cd9f4dd564b91180600b2aa17034d954ba640ef15cac8e,2024-06-04T19:21:02.890000 @@ -255134,7 +255135,7 @@ CVE-2024-5242,0,0,87c19031ba2563634a93b4e50f352770dc1e61bdd2368e036f8f1f8f9d48de CVE-2024-5243,0,0,6fbd89e6d008e339388b4427bf3e4296b3de77c6a105f3cacba576a0d10eabb3,2024-05-24T01:15:30.977000 CVE-2024-5244,0,0,4e043148ef278646bb1dc2908b9b052cca7e51976f437390cc5a6a5dc2a19618,2024-05-24T01:15:30.977000 CVE-2024-5245,0,0,885af784a1c7b3c68788b03806b782abc316cb75da65e88871ee466ba1a204bf,2024-05-24T01:15:30.977000 -CVE-2024-5246,0,0,a3caa78128bac4a72615dccb481ff335052f3377ab67fd694d7f5fc053234984,2024-05-24T01:15:30.977000 +CVE-2024-5246,0,1,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000 CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000 CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de6328191e,2024-06-07T14:56:05.647000 CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000 @@ -255154,7 +255155,7 @@ CVE-2024-5270,0,0,e200d6ed6ebdb84a917f949dcb40f0d98c76339d55f3b191cf4ff77238c630 CVE-2024-5271,0,0,d3f4377983bdb14b36061f7826a2769c4b74dac3ab0fd218e99cb4bdcc673a12,2024-05-31T13:01:46.727000 CVE-2024-5272,0,0,485554be89aaf429d625f742d41620b7105b55f3f82c1bd7e7c2afb7e9a676c6,2024-05-28T12:39:28.377000 CVE-2024-5273,0,0,f7b775afc6e46cbf2933f26022bd5d6a5054d80bf2d607df2ea5eeb06bc0b97e,2024-06-10T18:15:38.157000 -CVE-2024-5274,0,0,815675421e4b9c2b34f2340865cc1ed903b3b9cc89dafcd7624436bba1c58088,2024-06-10T17:16:34.257000 +CVE-2024-5274,0,1,0a7a76a1cda7f1e3200c09e42a9356cf233068076f78060a1c165134c0ebe6c5,2024-07-03T02:08:46.527000 CVE-2024-5275,0,0,b81fd6634b953b380acd7d67040183676d61d3e908aa91611721c09fa7243801,2024-06-20T12:44:01.637000 CVE-2024-5276,0,0,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078e6,2024-06-26T12:44:29.693000 CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000 @@ -255289,8 +255290,8 @@ CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708 CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2e0,2024-06-11T18:26:45.147000 CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000 -CVE-2024-5447,0,0,3e4699962d14ab3efd1df3e7ced79104a7a31cb3cb23dd36b2e05295f49fdfa3,2024-06-24T19:27:17.300000 -CVE-2024-5448,0,0,24e00b17d44c355a66337f1b8192b4308b013ec9be7e4e68644f82dd25cbb76e,2024-06-24T19:26:43.517000 +CVE-2024-5447,0,1,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 +CVE-2024-5448,0,1,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 CVE-2024-5451,0,0,0dc9e04d41f05345ae465cb541cb585eb35309652e769d3d8446d539c07ab3f0,2024-06-25T18:50:42.040000 CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000 @@ -255304,8 +255305,8 @@ CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339b CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000 -CVE-2024-5473,0,0,68bff144c97ed7e10f458e1f3ffa79e9c82cd71e1f2f5c678ae893746348b4ac,2024-06-26T12:44:29.693000 -CVE-2024-5475,0,0,9a35a27ed618b47a569e72c9eedce24392059deeff1f9ce687dca2ba057faa99,2024-06-20T12:43:25.663000 +CVE-2024-5473,0,1,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 +CVE-2024-5475,0,1,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 CVE-2024-5480,0,0,0c96379cb76c4f8b6d9852cdcc0f60ebab5e5f97f64e4439ef99fbfb3e3714ee,2024-06-07T14:56:05.647000 CVE-2024-5481,0,0,7e1e4455e255ae80e6041eac91512213cb57b2091c06ce10c4272331eb1d58af,2024-06-11T18:00:09.740000 @@ -255314,13 +255315,13 @@ CVE-2024-5483,0,0,50ef873fd9ba2b134eb7743380749d7bf41a18a6183eddc44371799e9b77b4 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 CVE-2024-5489,0,0,9bb79263edce390c6997c8d9f9fe7d295077e49147dbdcc1c480d08892e3d2f5,2024-06-11T18:15:01.617000 -CVE-2024-5493,0,0,8c772af4ecef23b008292b2a1c2c5ec083db970acbddc1ab5060bfac53739b99,2024-06-10T17:16:34.603000 -CVE-2024-5494,0,0,248cf78c4deabd88b33c654c164cc9192c7dea673b3710c94aec33872c2da880,2024-06-10T17:16:34.680000 +CVE-2024-5493,0,1,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 +CVE-2024-5494,0,1,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc903d,2024-07-03T02:08:59.420000 CVE-2024-5495,0,0,0a1c44916768f321aa0f99dcbbf7835c3f375f68104a303716ad9e841a86c5f0,2024-06-10T17:16:34.740000 -CVE-2024-5496,0,0,2b4639301d6e088fe2c682aad780d9cf6c1295561567a3badcc6c8b1de6a00a3,2024-06-10T17:16:34.800000 -CVE-2024-5497,0,0,2ecd2174a04569d5f511f4853aa15511c6ad8dd0534698aa5634955731fa9c39,2024-06-10T17:16:34.907000 +CVE-2024-5496,0,1,df1432449d01998c3afe7dd375c469d734075268fe0daa88ef4698d508149d6e,2024-07-03T02:09:00.193000 +CVE-2024-5497,0,1,f8911b8845bbbfa95a7832f1617866f45a83c965f344f6e4c9cf922533c51dcb,2024-07-03T02:09:01.003000 CVE-2024-5498,0,0,734c6c536bc56a91dbd107c39a51ae397643e3245409e39f3a56c59dbc22556b,2024-06-10T17:16:34.980000 -CVE-2024-5499,0,0,b5af232f34247d4ac7d3c630379d04427a676739309970b0b94548f93464ba69,2024-06-10T17:16:35.033000 +CVE-2024-5499,0,1,35dd9c6b1c2542f41b348af6ab7b219dd2f92d9ae3c52132e0b08b696c15d780,2024-07-03T02:09:01.860000 CVE-2024-5501,0,0,d4e4bc8b8db5b9e6fa14f6bf5c3381308561a5d72eef767955ee99c11419b1db,2024-06-03T14:46:24.250000 CVE-2024-5503,0,0,0f697147547c2a2433c49b9b46e01de2014e93e9b95ab1682351373926d90d44,2024-06-21T11:22:01.687000 CVE-2024-5504,0,0,fd8e8a8dbbb85642121157c73992a32cb380bb2ba6c54134c109099815a8b7bf,2024-07-02T12:09:16.907000 @@ -255337,7 +255338,7 @@ CVE-2024-5518,0,0,7be8efd54096829bb11c5abb04e19bf1a49b1768c0ad36f7ac88e032ad73e0 CVE-2024-5519,0,0,676af88d878b937cce3af5b28731e1191247d663004f92c739f5db0d966e0d3f,2024-06-04T19:21:10.043000 CVE-2024-5520,0,0,63f9c32911da3f67c58779f2c8ba34d9aa4b55d3386d570dad5bc0397c8cb5db,2024-05-30T13:15:41.297000 CVE-2024-5521,0,0,ccb2ba49d7e4be9859a81cd0c950d08f47c4a44700fa46f5775af6da3418abbd,2024-05-30T13:15:41.297000 -CVE-2024-5522,0,0,c96fcc2950cb5d3776a6659e311c7cdc83ac15b85b1861dfcc027e4e48db75bc,2024-06-20T12:43:25.663000 +CVE-2024-5522,0,1,cce6e44089bc21d77afd83489d005b543104dbc9704ac45f0d88caeaf2ff8a18,2024-07-03T02:09:03.580000 CVE-2024-5523,0,0,047cc71fb1f4320881d428c79c80679ee2da549498da604407797261c69d069c,2024-05-31T13:01:46.727000 CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c5d,2024-05-31T13:01:46.727000 CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000 @@ -255345,7 +255346,7 @@ CVE-2024-5526,0,0,e88e82e62b5e4c5aebe68213504a5aa190a1c186279f7068714569f91c3de7 CVE-2024-5530,0,0,a1a0702e27e4a4e3934db43cd9ea561e00ac905016f120852abcc67a37fa7a55,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,aff596c4345d9e9649e4107c993c40fc7416a56fa205089ee8692b6e8ba6cecf,2024-06-11T13:54:12.057000 CVE-2024-5533,0,0,1994262e08a7071f611be7c6d84dc9ffdd2ad4dec717c16feb005eeb66301b8d,2024-06-20T12:44:01.637000 -CVE-2024-5535,0,0,e31387e4e0e48fee4af3f985d8c8e7cb0e0e17b6ceeb984d5e967d16bdb77523,2024-06-28T19:15:07.060000 +CVE-2024-5535,0,1,823cd883eb780b4873573ca4453aa397c94e10a1d6c3b53a4ae748e110b914b8,2024-07-03T02:09:04.140000 CVE-2024-5536,0,0,d892d63cd79e6d462fe4485ce154b4e3b14e14d416b8b4d67114661d27280a01,2024-06-11T17:28:37.343000 CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000 @@ -255365,7 +255366,7 @@ CVE-2024-5558,0,0,09f3631381717b3ba9f6f331adbe19283ecf1ecf6408742eafb8b270343d37 CVE-2024-5559,0,0,2783b17045adc6e83e5bf6acfe749e5c6489b786d017eb582b973704c839f44d,2024-06-13T18:36:09.010000 CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e1f,2024-06-13T18:36:09.010000 CVE-2024-5564,0,0,9795ccf7f64c945419f550534828bd8bef2f36c164c7b95941f181710cd7c39c,2024-06-28T19:15:07.147000 -CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 +CVE-2024-5565,0,1,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000 CVE-2024-5570,0,0,1f1ed1d460e111500125bee4bd672bf4d3d1893979a351b847eab3c62fb55e82,2024-06-28T10:27:00.920000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5573,0,0,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000 @@ -255423,30 +255424,30 @@ CVE-2024-5683,0,0,416fdce68077ec4a3eabb7881f93e8b3f956fda57e2d7ec858b12f0a2abb9f CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000 CVE-2024-5686,0,0,5baef36d265e76c8a185391151bfaa15c3d3a21cf5116dcf4f0b4cb376e1e9d1,2024-06-20T12:43:25.663000 -CVE-2024-5687,0,0,b3163ba80d711118288940f35942362f888184d516eedb8a121f43c8b6e99d13,2024-06-11T13:54:12.057000 -CVE-2024-5688,0,0,95b546c05aa2ff613844572a96d4d10e5d464e0191f6ea34f9e436196d40e472,2024-06-19T10:15:11.017000 +CVE-2024-5687,0,1,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a49,2024-07-03T02:09:09.507000 +CVE-2024-5688,0,1,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000 CVE-2024-5689,0,0,43d9e6c4643e481c8669e8de5c0cdbeeb708721474986d0f913b6c90e34aa5bd,2024-06-11T13:54:12.057000 CVE-2024-5690,0,0,7ae39c8c739dae9ba8bb771b336dd016f86562153d108a87e77c9072570bb55e,2024-06-19T10:15:11.210000 CVE-2024-5691,0,0,758211b87463d709c48003e62143f109bb0de1d14d08b52a02e114079f9acaad,2024-06-19T10:15:11.280000 CVE-2024-5692,0,0,f00746d9dda797bb603caee0812b8c6f417c037755c16115b1d8dd4aa72145d7,2024-06-13T23:15:50.707000 -CVE-2024-5693,0,0,730ffa70836ed09a42a404459f62aa1d4b112e219ca0f8b58b33c4cf0032dfaa,2024-06-19T10:15:11.360000 +CVE-2024-5693,0,1,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000 CVE-2024-5694,0,0,54bcd23e2c666a5a8641c3a65a31a1082adf870b825d4d5e2ddd9b0c9e62b9b7,2024-06-11T13:54:12.057000 CVE-2024-5695,0,0,2e6b1d7e4620d8eadf14e6f612e6776c60ec7f2c9a0afdfc64c10d31b1a6b391,2024-06-11T13:54:12.057000 CVE-2024-5696,0,0,f504124b2e322615440f0fda970bf42d01a01a0c59ae7a1bfd52067dd1ba0e23,2024-06-19T10:15:11.430000 CVE-2024-5697,0,0,f72dea8b8dd79c726dde619fa7e7e2e8daecc0a1ac006ebcdee7a97c20ac7027,2024-06-11T13:54:12.057000 CVE-2024-5698,0,0,47bc16e7e84732b0675e927ad85785fe5ac78848a3609e2e5fae96b27440b3e7,2024-06-11T13:54:12.057000 CVE-2024-5699,0,0,d1e1ab6a164c3c763187b9b9eaa5ede2a373113d6efcf901de284e7d644c7711,2024-06-11T13:54:12.057000 -CVE-2024-5700,0,0,bf41828814d49bd1ca21d234dd56d9b9baae6eae1faa482eef0b223ac08cdef3,2024-06-19T10:15:11.510000 +CVE-2024-5700,0,1,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000 CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8ce,2024-06-11T13:54:12.057000 CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 -CVE-2024-5727,0,0,1fbc88a30e9a1b5b66ae83f1b3e85e2a5fb8114d9d41f9dac322c2902c1d92bd,2024-06-28T10:27:00.920000 +CVE-2024-5727,0,1,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 CVE-2024-5728,0,0,5a889a67227481274c819df95431051019a211516033d5f988b49d47d8c66f3e,2024-06-28T10:27:00.920000 CVE-2024-5729,0,0,e1aca1388a2cf611974ab50f0f578b9dc91c2e7eff3688e112f84f2c4fd97db9,2024-06-28T10:27:00.920000 -CVE-2024-5730,0,0,bce8aafe7f6412d1673f24d0d50a0ceda8b4ae213d0fc66eca08d164e5b22ae8,2024-06-28T10:27:00.920000 +CVE-2024-5730,0,1,b1e3b523ff3fe033a4627e600289f9d47a0ec4c88ed24f5361108bdf9adc4b02,2024-07-03T02:09:14.303000 CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e02,2024-06-17T12:42:04.623000 CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000 @@ -255504,24 +255505,24 @@ CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630 CVE-2024-5826,0,0,e0d3dade8a07433249d59b1aea8b4c0765b07d04d2f9cc584b2c1dc787708da4,2024-06-27T19:25:12.067000 CVE-2024-5827,0,0,2115c4e97523e0aa0a8beec64c71961c8ec1201ab92e9e9dd09f28cef85192d3,2024-07-01T12:37:24.220000 CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000 -CVE-2024-5830,0,0,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000 -CVE-2024-5831,0,0,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000 -CVE-2024-5832,0,0,f6f7614a6d74b1d3bbc420f9681758a802e78db48e4c0857fdd0315a9c96e2df,2024-06-20T15:09:08.407000 -CVE-2024-5833,0,0,5b40c0a16c7d2ef5b3ac59bff5edeb1c79ffbdbe857cc12dfe0a4e6ae3c21dc4,2024-06-20T15:09:20.810000 -CVE-2024-5834,0,0,25c6dd26bcb2ab9bba361f180488ba9093d88a3197cd87967df7b7dddbf91a3b,2024-06-20T15:07:28.820000 -CVE-2024-5835,0,0,6b5c54ec1cc985cdfc55b69fa6f9065ffc40ab6aa736545cc7e159389dbd6ac9,2024-06-20T15:08:20.267000 +CVE-2024-5830,0,1,b565f57d750c6d05011ebbbb41ca7416fca82a37e2651ac67f0f4d51e00123ef,2024-07-03T02:09:17.023000 +CVE-2024-5831,0,1,2a43276d264cabea7b91e0c4ef35a2b4c0c7011eec486c41a40861779df017a2,2024-07-03T02:09:17.847000 +CVE-2024-5832,0,1,fcc8d912e6c8c38175ccea7150b16b62e2ce7eae3dd1539b01b9bf831f40b8d1,2024-07-03T02:09:18.747000 +CVE-2024-5833,0,1,a74d6cce3a1790ef74d3836450506e9a7e306cd07532907e8300bc8d9a8bd7ba,2024-07-03T02:09:19.737000 +CVE-2024-5834,0,1,3eaebe678be109cf432cf27c742c2b9362970e430c21bfb473c7c2fbeada267f,2024-07-03T02:09:20.643000 +CVE-2024-5835,0,1,3e524b82e8ed0b84d2c482cdc0cfce05ebf5d76c695278d4bcb9110adcb244b7,2024-07-03T02:09:21.673000 CVE-2024-5836,0,0,36a697f29269683a637f442597b27a60a595f4fdf2d944c2d23404b0d072232c,2024-06-20T15:08:33.157000 -CVE-2024-5837,0,0,179deefe991364b84bc9fa3385c9e93c640801f1009410ad78819a4c79352171,2024-06-20T15:04:00.617000 -CVE-2024-5838,0,0,771bf99a061ccb07ffc054c7af6b2187a8d1c8c0ef3679515bc1a7321ce57bdd,2024-06-20T15:04:22.750000 -CVE-2024-5839,0,0,1c136d6c549ce57946ee76f98300a3ab7fc802e51dfe501d9e28f8d5cc0e3531,2024-06-20T15:06:42.903000 +CVE-2024-5837,0,1,a3430952c8e48f90bf943b78b484234954723d493f275584419eeb04849b7796,2024-07-03T02:09:22.720000 +CVE-2024-5838,0,1,7c76efe71220708ee702a73816746926766b357630940d525e4a60a2a76d2e61,2024-07-03T02:09:23.820000 +CVE-2024-5839,0,1,9130876cb95f097dbdaed8649c52744f55bb9ad261dd630433bc625ccdf7d124,2024-07-03T02:09:24.927000 CVE-2024-5840,0,0,aefecb93e2ce1a317fc468af1eb45fc4232933a36f5196ea07cc10a1ad968ed6,2024-06-20T14:55:25.307000 -CVE-2024-5841,0,0,89aa8ff3a7d0764249bba3d7c593c8a90604fd5abee365236e7458a0a067acdf,2024-06-20T14:55:42.033000 -CVE-2024-5842,0,0,22ee1449b9ed2eed847eecd038540fd3892deb5bea4b21988e6386b28e901223,2024-06-20T14:55:51.013000 -CVE-2024-5843,0,0,b053c19dc1f27009bdf49ecd84eb42ff5cf8eb4bd496e96f6cb04053a0843a6f,2024-06-20T13:22:50.317000 -CVE-2024-5844,0,0,2d28c41604a9ba82bebcd99ac808450f4fff866ab0885f4b7c6e54f8ade5bfe3,2024-06-20T13:23:18.707000 -CVE-2024-5845,0,0,81cef0ce322e71a4bed434dbc7ea9d65be8ec3ba295af42053db9235d9f0408f,2024-06-20T13:24:38.797000 -CVE-2024-5846,0,0,5609dd7477433b65308e4f00728623f0cbb335d708d82c23fe7d233bf5bad701,2024-06-20T13:05:14.410000 -CVE-2024-5847,0,0,a9c5c4d55b667879ca2540ce0f100ade6913bb045068cf41dbc793953586289f,2024-06-20T13:05:43.187000 +CVE-2024-5841,0,1,26dfc9020def48a067369079e9f08c5acadbc01c7414dfddae4ab481694ac207,2024-07-03T02:09:26.067000 +CVE-2024-5842,0,1,6a52ae3fb9ce80746e3b566216cd68eeb4bb9c4079b51c304411e79436a32911,2024-07-03T02:09:27.080000 +CVE-2024-5843,0,1,bdd7342e5f3782a90d254322dc95ab51ed0b5ca6e5098e14744d8c61723a99bf,2024-07-03T02:09:28.160000 +CVE-2024-5844,0,1,cb741198deb8b5f70d2d0ce9c33e3416f6a940b998b67b99e17d7bffff2c6869,2024-07-03T02:09:29.187000 +CVE-2024-5845,0,1,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f75,2024-07-03T02:09:29.493000 +CVE-2024-5846,0,1,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000 +CVE-2024-5847,0,1,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000 CVE-2024-5851,0,0,1ff86bf427427298fe5dc39bbfedb897b9870fd2315cf065507e70165fb41d41,2024-06-13T18:36:09.013000 CVE-2024-5853,0,0,4db307c3757855b51e51fa12e1eb9aa67e540512d9bb40f822c5370c3893dc4f,2024-06-20T12:44:01.637000 CVE-2024-5858,0,0,30241924d409355226bb80c4fb982c4833f84483f4f89b94e986f70fe7751e71,2024-06-17T12:42:04.623000 @@ -255640,10 +255641,10 @@ CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd051 CVE-2024-6088,0,0,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000 CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000 CVE-2024-6099,0,0,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000 -CVE-2024-6100,0,0,2b903b3a6c63696aea9a10797071b5fd7d0b6547a8f1416ee7dc4ff992de4ff5,2024-06-21T13:15:13.077000 -CVE-2024-6101,0,0,3b6bc52ab046ce2a9a29c26d80fa3342c59ba956272c0888c64da753b102c8a5,2024-06-21T13:15:13.187000 -CVE-2024-6102,0,0,229621a473a3fa4bd90193f7d8f9e1a06a3142a4c3e1de71a8a1ff5fb584365f,2024-06-21T13:15:13.277000 -CVE-2024-6103,0,0,65e0716635327b274a8b58e139da65b2b5a353367277b42b1e6e2562f7582bba,2024-06-21T13:15:13.350000 +CVE-2024-6100,0,1,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000 +CVE-2024-6101,0,1,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000 +CVE-2024-6102,0,1,1ba1817630dabd1d86deec5e027a2cd559fc5de63b986886b08c689d57cce7eb,2024-07-03T02:09:42.810000 +CVE-2024-6103,0,1,5e29bc37d9d7a304c867024ebdb6c9635d505e152b36dfc1b31a9280adb1e2de,2024-07-03T02:09:43.923000 CVE-2024-6104,0,0,ec5e0ea079ed55a20cd75f0e1aa316a0529dd3030b904eba417beee8fd1d1b75,2024-06-26T17:19:40.850000 CVE-2024-6108,0,0,9d7b272c32cdc486201e19fd8f5e2716987f604941e0e7768f7b1e0c5fc9e865,2024-06-25T18:15:11.730000 CVE-2024-6109,0,0,702c63a72777bc30119b051d43a51c9500c42d0a474f7fbd46aa104abc3ca24e,2024-06-20T12:44:01.637000 @@ -255730,10 +255731,10 @@ CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92 CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000 CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000 CVE-2024-6288,0,0,759e3147da1b3805ee22c246688b7816f816dcaacd990c0e2025b974262129c2,2024-06-28T10:27:00.920000 -CVE-2024-6290,0,0,67d71c6eecc55d47dcb9d49fef6cb3eb904eb85c23231aa8b50f7ec84f4eca31,2024-06-27T03:15:51.093000 -CVE-2024-6291,0,0,98316ec8c30ef04c26783c1255f68e3afa2f2d15a087f64e5f63af0c4c0b5b0c,2024-06-27T03:15:51.167000 -CVE-2024-6292,0,0,e1c33fd19725688298e8cda180f12fd23244dcb77aa2334c1dbb13297cecfcc5,2024-06-27T03:15:51.230000 -CVE-2024-6293,0,0,852bbc0bbb768d29d4d4dd718fa490ff1047406faeedc791fdc0eec18c787ee7,2024-06-27T03:15:51.293000 +CVE-2024-6290,0,1,f38106d9e1179e3770e59e6eaa72c9e7b486c800903b3806d0d60fbc8ab354e0,2024-07-03T02:09:49.960000 +CVE-2024-6291,0,1,fbd3e8c01e83f15387bec7fa3def7d60152486e2661a98df452a96f2d0c0973e,2024-07-03T02:09:50.740000 +CVE-2024-6292,0,1,67575b31ef91584461fe54512334e761f8e74daed594248d12ac6ebaf52fad0d,2024-07-03T02:09:51.530000 +CVE-2024-6293,0,1,a690ca627177ecad04cfc64b5dbdfcafc0550798c9b570abdc1649506e2f597f,2024-07-03T02:09:52.323000 CVE-2024-6294,0,0,6e157447a380471b4e672432441b0d5dbba0fc67bea6ec1145ba68325fae735e,2024-06-25T12:24:17.873000 CVE-2024-6295,0,0,34be56c45a4536c17926fc9c9d678ef84cff2fe2a1e2b1e6898c4c1a47aa2e9c,2024-06-25T12:24:17.873000 CVE-2024-6296,0,0,2f0e4a66c60611de0f983e9680e76a35c142eccc5d0956d3219c5a0abd09b7d4,2024-06-28T10:27:00.920000 @@ -255751,7 +255752,7 @@ CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb80 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 -CVE-2024-6354,0,0,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000 +CVE-2024-6354,0,1,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000 CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000 CVE-2024-6367,0,0,7207995286cd77894417e443ceec13186f4617a3d835dc70f545e6022e4f6dc9,2024-06-27T12:47:19.847000