diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json index 86c86b8c582..72174463499 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9515.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9515", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-29T22:29:00.520", - "lastModified": "2021-06-14T18:15:10.637", + "lastModified": "2024-07-19T14:15:02.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,6 +135,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0002/", + "source": "cve@mitre.org" + }, { "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "source": "cve@mitre.org" diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json index 17c73818e4d..a4bb69fe2a5 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json @@ -2,8 +2,8 @@ "id": "CVE-2015-0973", "sourceIdentifier": "cret@cert.org", "published": "2015-01-18T18:59:03.020", - "lastModified": "2016-10-20T18:46:05.357", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-19T14:15:04.343", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -300,6 +300,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0005/", + "source": "cret@cert.org" + }, { "url": "https://support.apple.com/HT206167", "source": "cret@cert.org", diff --git a/CVE-2016/CVE-2016-37xx/CVE-2016-3751.json b/CVE-2016/CVE-2016-37xx/CVE-2016-3751.json index 1fad22139c0..4ebc1c991c5 100644 --- a/CVE-2016/CVE-2016-37xx/CVE-2016-3751.json +++ b/CVE-2016/CVE-2016-37xx/CVE-2016-3751.json @@ -2,8 +2,8 @@ "id": "CVE-2016-3751", "sourceIdentifier": "security@android.com", "published": "2016-07-11T01:59:51.870", - "lastModified": "2016-07-11T17:52:53.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-19T14:15:04.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -229,6 +229,10 @@ { "url": "https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca", "source": "security@android.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0004/", + "source": "security@android.com" } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-100xx/CVE-2018-10054.json b/CVE-2018/CVE-2018-100xx/CVE-2018-10054.json index 63b9f80e568..d53cb818cd1 100644 --- a/CVE-2018/CVE-2018-100xx/CVE-2018-10054.json +++ b/CVE-2018/CVE-2018-100xx/CVE-2018-10054.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10054", "sourceIdentifier": "cve@mitre.org", "published": "2018-04-11T20:29:00.860", - "lastModified": "2024-06-26T20:15:12.490", + "lastModified": "2024-07-19T14:15:04.740", "vulnStatus": "Modified", "cveTags": [ { @@ -148,6 +148,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0003/", + "source": "cve@mitre.org" + }, { "url": "https://www.exploit-db.com/exploits/44422/", "source": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json b/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json index fd88df1dd0b..2564a0a22f3 100644 --- a/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json +++ b/CVE-2019/CVE-2019-176xx/CVE-2019-17626.json @@ -2,7 +2,7 @@ "id": "CVE-2019-17626", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-16T12:15:12.010", - "lastModified": "2023-11-07T03:06:23.607", + "lastModified": "2024-07-19T14:15:04.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -148,6 +148,10 @@ "url": "https://security.gentoo.org/glsa/202007-35", "source": "cve@mitre.org" }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0006/", + "source": "cve@mitre.org" + }, { "url": "https://usn.ubuntu.com/4273-1/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0006.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0006.json new file mode 100644 index 00000000000..696523ab472 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0006.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-0006", + "sourceIdentifier": "security@yugabyte.com", + "published": "2024-07-19T15:15:09.930", + "lastModified": "2024-07-19T15:15:09.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@yugabyte.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@yugabyte.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yugabyte/yugabyte-db/commit/439c6286f1971f9ac6bff2c7215b454c2025c593", + "source": "security@yugabyte.com" + }, + { + "url": "https://github.com/yugabyte/yugabyte-db/commit/5cc7f4e15d6ccccbf97c57946fd0aa630f88c9e2", + "source": "security@yugabyte.com" + }, + { + "url": "https://github.com/yugabyte/yugabyte-db/commit/d96e6b629f34d065b47204daeeb44064e484c579", + "source": "security@yugabyte.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21131.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21131.json index fe75c2b2895..5c71fe10951 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21131.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21131.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21131", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:13.210", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-07-19T14:15:05.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos a esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 3.7 (Impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)." } ], "metrics": { @@ -36,6 +40,10 @@ ] }, "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21138.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21138.json index ec85156bd4a..3ba3f8b8685 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21138.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21138.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21138", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:14.620", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-07-19T14:15:05.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntuaci\u00f3n base 3.7 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)." } ], "metrics": { @@ -36,6 +40,10 @@ ] }, "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json index 63820c0d4a2..5d14df51249 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21140.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21140", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.043", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-07-19T14:15:05.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de Oracle Java SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)." } ], "metrics": { @@ -36,6 +40,10 @@ ] }, "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json index 51f0821e2a0..c8bc075c5a0 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21144", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.810", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-07-19T14:15:05.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Concurrencia). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start en espacio aislado o subprogramas de Java en espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. Esta vulnerabilidad no se aplica a implementaciones de Java, normalmente en servidores, que cargan y ejecutan s\u00f3lo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.1 Puntuaci\u00f3n base 3.7 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)." } ], "metrics": { @@ -36,6 +40,10 @@ ] }, "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0007/", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json index 21526af55b9..30bb9350149 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21145", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.993", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-07-19T14:15:05.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: 2D). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de Oracle Java SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)." } ], "metrics": { @@ -36,6 +40,10 @@ ] }, "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json index 24c94032bae..3308491d63d 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21147.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21147", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:16.377", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-07-19T14:15:05.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n de datos cr\u00edticos o a todos los datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso no autorizado a datos cr\u00edticos o acceso completo a todo Oracle Java. SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 7.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)." } ], "metrics": { @@ -36,6 +40,10 @@ ] }, "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0008/", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json index c3b31f0a1db..ac9fb63749d 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22018", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-10T02:15:03.160", - "lastModified": "2024-07-11T19:15:11.303", + "lastModified": "2024-07-19T14:15:05.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -44,6 +44,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6", "source": "support@hackerone.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/19/3", + "source": "support@hackerone.com" + }, { "url": "https://hackerone.com/reports/2145862", "source": "support@hackerone.com" diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json index 42d404244eb..3c4dac0cd4f 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22020", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-09T02:15:09.973", - "lastModified": "2024-07-11T19:15:11.407", + "lastModified": "2024-07-19T14:15:05.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6", "source": "support@hackerone.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/19/3", + "source": "support@hackerone.com" + }, { "url": "https://hackerone.com/reports/2092749", "source": "support@hackerone.com" diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json new file mode 100644 index 00000000000..1e0d127ce50 --- /dev/null +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27489.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-27489", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-19T15:15:10.210", + "lastModified": "2024-07-19T15:15:10.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the DelFile() function of WMCMS v4.4 allows attackers to delete arbitrary files via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/yyyyy7777777/a36541cb60d9e55628f78f2a68968212", + "source": "cve@mitre.org" + }, + { + "url": "https://gitee.com/y1336247431/poc-public/issues/I920OW", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json index 7d875bd8969..4c5de2dab7d 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35328", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:11.037", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:25:50.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "libyaml v0.2.5 es vulnerable a DDOS. La funci\u00f3n yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37474.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37474.json index bcca74d9d23..9b69b7fdbd5 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37474.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37474", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-04T19:15:10.790", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:34:49.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:automattic:newspack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.47.2", + "matchCriteriaId": "2966F72A-C5ED-4E67-A588-F50DCAC946F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/newspack-ads/wordpress-newspack-ads-plugin-1-47-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json index 71d05293f1c..04e0196b408 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37802", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-18T17:15:52.133", - "lastModified": "2024-07-03T02:04:46.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-19T14:52:41.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:health_care_hospital_management_system_project:health_care_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD74EE23-7D08-4E89-B9C8-32ABE39D428F" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/health-care-hospital-in-php-css-js-and-mysql-free-download/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37802", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37882.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37882.json index a0d69b3a355..f4d09a0a3df 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37882.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37882", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:12.863", - "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:57:28.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,112 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "26.0.0", + "versionEndExcluding": "26.0.13", + "matchCriteriaId": "8F643317-2586-435E-8D89-721BC6161691" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.1.8", + "matchCriteriaId": "8696DA00-5B0C-45F5-BD50-9FF1F5E4646F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "28.0.0", + "versionEndExcluding": "28.0.4", + "matchCriteriaId": "C3A816F7-5D5E-43CB-9C53-E4C5B1344C84" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.12.17", + "matchCriteriaId": "ED4378AE-1AD4-4E15-A64C-E4028FCD098F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.12.13", + "matchCriteriaId": "20A172FB-2E26-4ADD-BA55-0ECC5E5FCFD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "25.0.0", + "versionEndExcluding": "25.0.13.8", + "matchCriteriaId": "7D2923A6-9A3C-4B66-82D4-E02A0E8F16A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "26.0.0", + "versionEndExcluding": "26.0.13", + "matchCriteriaId": "6909C63C-3755-4B68-B90E-4C5E14C78787" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.1.8", + "matchCriteriaId": "B6C25B03-B587-4F48-BE81-052AF67E2045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "28.0.0", + "versionEndExcluding": "28.0.4", + "matchCriteriaId": "E04001FE-890B-4D94-B679-B0854E840F39" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/nextcloud/server/pull/44339", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://hackerone.com/reports/2289425", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37894.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37894.json index 7a1763efcf0..bf3024d49de 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37894.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37894", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-25T20:15:11.873", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-19T14:15:05.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgvf-q977-9xjg", "source": "security-advisories@github.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0001/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json new file mode 100644 index 00000000000..4c70850c296 --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39962.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39962", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-19T15:15:10.320", + "lastModified": "2024-07-19T15:15:10.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 was discovered to contain a remote code execution (RCE) vulnerability in the ntp_zone_val parameter at /goform/set_ntp. This vulnerability is exploited via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json new file mode 100644 index 00000000000..49b0264360b --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39963.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39963", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-19T15:15:10.383", + "lastModified": "2024-07-19T15:15:10.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX9 V22.03.01.46 and AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX12 V1.0 V22.03.01.46 were discovered to contain an authenticated remote command execution (RCE) vulnerability via the macFilterType parameter at /goform/setMacFilterCfg." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40637.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40637.json index 553b4aae8c9..fcbcb63c515 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40637.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40637.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40637", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-16T23:15:24.260", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:37:17.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,38 +81,90 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getdbt:dbt_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.14", + "matchCriteriaId": "914D843B-54DC-45D0-ACC5-CA2EE99FE727" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getdbt:dbt_core:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.7.0", + "versionEndExcluding": "1.7.14", + "matchCriteriaId": "9452C38F-FDF5-4F99-87A9-3C6DBBA031F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.getdbt.com/docs/build/packages", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://docs.getdbt.com/reference/global-configs/legacy-behaviors#behavior-change-flags", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/dbt-labs/dbt-core/commit/3c82a0296d227cb1be295356df314c11716f4ff6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dbt-labs/dbt-core/commit/87ac4deb00cc9fe334706e42a365903a1d581624", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-p3f3-5ccg-83xq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://tempered.works/posts/2024/07/06/preventing-data-theft-with-gcp-service-controls", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.elementary-data.com/post/are-dbt-packages-secure-the-answer-lies-in-your-dwh-policies", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.equalexperts.com/blog/tech-focus/are-you-at-risk-from-this-critical-dbt-vulnerability", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41009.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41009.json index 0e3730da333..55024092764 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41009.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41009", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-17T07:15:01.973", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:06:23.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,107 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: corrige el exceso de reservas en ringbuf. El b\u00fafer de anillo BPF se implementa internamente como un b\u00fafer circular de tama\u00f1o potencia de 2, con dos contadores l\u00f3gicos y en constante aumento: consumer_pos es el consumidor contador para mostrar en qu\u00e9 posici\u00f3n l\u00f3gica el consumidor consumi\u00f3 los datos, y productor_pos, que es el contador del productor que indica la cantidad de datos reservados por todos los productores. Cada vez que se reserva un registro, el productor \"due\u00f1o\" del registro avanzar\u00e1 exitosamente el contador de productores. En el espacio de usuario, cada vez que se lee un registro, el consumidor de los datos avanza el contador del consumidor una vez que finaliza el procesamiento. Ambos contadores se almacenan en p\u00e1ginas separadas de modo que, desde el espacio del usuario, el contador del productor sea de solo lectura y el contador del consumidor sea de lectura y escritura. Un aspecto que simplifica y, por lo tanto, acelera la implementaci\u00f3n tanto de productores como de consumidores es c\u00f3mo el \u00e1rea de datos se mapea dos veces de forma contigua y consecutiva en la memoria virtual, lo que permite no tomar medidas especiales para las muestras que tienen que envolverse en el mismo lugar. al final del \u00e1rea de datos del b\u00fafer circular, porque la p\u00e1gina siguiente despu\u00e9s de la \u00faltima p\u00e1gina de datos volver\u00eda a ser la primera p\u00e1gina de datos y, por lo tanto, la muestra seguir\u00e1 apareciendo completamente contigua en la memoria virtual. Cada registro tiene una estructura bpf_ringbuf_hdr { u32 len; u32 p\u00e1gina_apagada; } encabezado para la contabilidad de la longitud y el desplazamiento, y es inaccesible para el programa BPF. Ayudantes como bpf_ringbuf_reserve() devuelven `(void *)hdr + BPF_RINGBUF_HDR_SZ` para que lo use el programa BPF. Bing-Jhong y Muhammad informaron que, sin embargo, es posible hacer que un segundo fragmento de memoria asignado se superponga con el primer fragmento y, como resultado, el programa BPF ahora puede editar el encabezado del primer fragmento. Por ejemplo, considere la creaci\u00f3n de un mapa BPF_MAP_TYPE_RINGBUF con un tama\u00f1o de 0x4000. A continuaci\u00f3n, consumer_pos se modifica a 0x3000 /antes/ se realiza una llamada a bpf_ringbuf_reserve(). Esto asignar\u00e1 un fragmento A, que est\u00e1 en [0x0,0x3008], y el programa BPF podr\u00e1 editar [0x8,0x3008]. Ahora, asignemos un fragmento B con tama\u00f1o 0x3000. Esto tendr\u00e1 \u00e9xito porque consumer_pos se edit\u00f3 con anticipaci\u00f3n para pasar la verificaci\u00f3n `new_prod_pos - cons_pos > rb->mask`. El fragmento B estar\u00e1 en el rango [0x3008,0x6010] y el programa BPF podr\u00e1 editar [0x3010,0x6010]. Debido al dise\u00f1o de la memoria del b\u00fafer en anillo mencionado anteriormente, los rangos [0x0,0x4000] y [0x4000,0x8000] apuntan a las mismas p\u00e1ginas de datos. Esto significa que el fragmento B en [0x4000,0x4008] es el encabezado del fragmento A. bpf_ringbuf_submit() / bpf_ringbuf_discard() usa el pg_off del encabezado para luego ubicar el bpf_ringbuf a trav\u00e9s de bpf_ringbuf_restore_from_rec(). Una vez que el fragmento B modific\u00f3 el encabezado del fragmento A, bpf_ringbuf_commit() hace referencia a la p\u00e1gina incorrecta y podr\u00eda causar un bloqueo. Solucionelo calculando el pendiente_pos m\u00e1s antiguo y verifique si el rango desde el registro pendiente m\u00e1s antiguo hasta el m\u00e1s nuevo abarcar\u00eda m\u00e1s all\u00e1 del tama\u00f1o del b\u00fafer circular. Si ese es el caso, rechace la solicitud. Hemos probado con el punto de referencia del b\u00fafer de anillo en las autopruebas de BPF (./benchs/run_bench_ringbufs.sh) antes/despu\u00e9s de la correcci\u00f3n y, aunque parece un poco m\u00e1s lento en algunos puntos de referencia, todav\u00eda no es lo suficientemente significativo como para importar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "6.1.97", + "matchCriteriaId": "5F2E2CF9-E512-4F81-AD6C-400701BDBF04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.37", + "matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.8", + "matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/47416c852f2a04d348ea66ee451cbdcf8119f225", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/511804ab701c0503b72eac08217eabfd366ba069", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfa1a2329a691ffd991fcf7248a57d752e712881", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1b9df0435bc61e0b44f578846516df8ef476686", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41010.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41010.json index 8e9f5796fb8..aba03a37283 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41010.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41010", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-17T07:15:02.183", - "lastModified": "2024-07-18T12:15:03.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-19T15:24:59.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,92 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: Se solucion\u00f3 el lanzamiento demasiado temprano de tcx_entry Pedro Pinto y m\u00e1s tarde, de forma independiente, tambi\u00e9n Hyunwoo Kim y Wongi Lee informaron un problema por el cual tcx_entry se puede lanzar demasiado pronto, lo que lleva a un uso posterior a la liberaci\u00f3n (UAF ) cuando una qdisc ingress o clsact antigua activa con un bloque tc compartido se reemplaza posteriormente por otra instancia de ingress o clsact. Esencialmente, la secuencia para activar la UAF (un ejemplo) puede ser la siguiente: 1. Se crea un espacio de nombres de red. 2. Se crea una qdisc de entrada. Esto asigna un tcx_entry, y &tcx_entry->miniq se almacena en el miniqp->p_miniq de la qdisc. Al mismo tiempo, se crea un bloque tcf con \u00edndice 1. 3. chain0 est\u00e1 adjunta al bloque tcf. chain0 debe estar conectado al bloque vinculado a la qdisc de ingreso para luego llegar a la funci\u00f3n tcf_chain0_head_change_cb_del() que activa la UAF. 4. Cree e injerte una qdisc clsact. Esto hace que se elimine la qdisc de entrada creada en el paso 1, liberando as\u00ed la tcx_entry previamente vinculada: rtnetlink_rcv_msg() => tc_modify_qdisc() => qdisc_create() => clsact_init() [a] => qdisc_graft() => qdisc_destroy( ) => __qdisc_destroy() => ingress_destroy() [b] => tcx_entry_free() => kfree_rcu() // tcx_entry liberado 5. Finalmente, se cierra el espacio de nombres de la red. Esto registra el trabajador cleanup_net y, durante el proceso de liberaci\u00f3n de la qdisc clsact restante, accede a tcx_entry que ya se liber\u00f3 en el paso 4, lo que provoca que se produzca la UAF: cleanup_net() => ops_exit_list() => default_device_exit_batch() => unregister_netdevice_many() => unregister_netdevice_many_notify() => dev_shutdown() => qdisc_put() => clsact_destroy() [c] => tcf_block_put_ext() => tcf_chain0_head_change_cb_del() => tcf_chain_head_change_item() => clsact_chain_head_change() => mini_qdisc_pair _intercambiar( ) // UAF Tambi\u00e9n hay otras variantes, lo esencial es agregar una qdisc de ingreso (o clsact) con un bloque compartido espec\u00edfico, luego reemplazar esa qdisc, esperar a que se ejecute tcx_entry kfree_rcu() y posteriormente acceder al activo actual miniq de qdisc de una forma u otra. La soluci\u00f3n correcta es convertir el booleano miniq_active en un contador. Lo que se puede observar, en el paso 2 anterior, el contador pasa de 0->1, en el paso [a] de 1->2 (para que el objeto miniq permanezca activo durante el reemplazo), luego en [b] de 2->1 y finalmente [c] 1->0 con el eventual lanzamiento. El contador de referencia en general oscila entre [0,2] y no necesita ser at\u00f3mico ya que todo acceso al contador est\u00e1 protegido por el mutex rtnl. Con esto implementado, ya no ocurre ning\u00fan UAF y tcx_entry se libera en el momento correcto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.41", + "matchCriteriaId": "BBD7DB8F-6881-4008-B9ED-5588CD8061D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.10", + "matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1cb6f0bae50441f4b4b32a28315853b279c7404e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/230bb13650b0f186f540500fd5f5f7096a822a2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f61ecf1bd5b562ebfd7d430ccb31619857e80857", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json index 2775cba5460..2f52224e31d 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41107", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T11:15:03.323", - "lastModified": "2024-07-19T13:01:44.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:15:06.080", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -25,6 +25,14 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/19/1", + "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/19/2", + "source": "security@apache.org" + }, { "url": "https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107", "source": "security@apache.org" diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5251.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5251.json index 2cd8997ffd9..038d8baf5ed 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5251.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5251", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:02.260", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:25:30.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.19.20.1", + "matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72" + } + ] + } + ] + } + ], "references": [ { "url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e637044d-9b49-4de5-b8b8-d48a0e5e1afc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5252.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5252.json index 6d767277387..69370bee7d6 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5252.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5252.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5252", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:02.483", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:29:35.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.19.20.1", + "matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72" + } + ] + } + ] + } + ], "references": [ { "url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/675937dc-a032-4bc4-a449-c815fcb12db6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5253.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5253.json index e802040a1d7..19df4101c8c 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5253.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5253", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:02.690", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:30:34.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.19.20.1", + "matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72" + } + ] + } + ] + } + ], "references": [ { "url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97666e54-8e86-4f18-ae32-ad8ca607aeff?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5254.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5254.json index 7d849caf89c..bc6dd08cb19 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5254.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5254", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:02.883", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:32:05.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.19.20.1", + "matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72" + } + ] + } + ] + } + ], "references": [ { "url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c8971e0-befd-47ac-8cb5-064f9cd757d7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5255.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5255.json index f9c1f00f7e2..f71a59c3016 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5255.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5255", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:03.073", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:32:18.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.19.20.1", + "matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72" + } + ] + } + ] + } + ], "references": [ { "url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66d77518-a258-4e79-b483-275855c0a416?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6008.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6008.json index c1189c68eac..5dbef3649d0 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6008.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6008", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-15T15:15:51.033", - "lastModified": "2024-06-17T16:15:16.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:52:08.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1902zdq/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268698", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268698", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.357143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6009.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6009.json index ffb3e77a0a9..78ac5911977 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6009.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6009", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-15T16:15:09.830", - "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:24:41.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AutoZhou1/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268699", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268699", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.357243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6013.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6013.json index ecfea2912c2..df9d565a009 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6013.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6013", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-15T16:15:10.137", - "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:20:07.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gabriel202212/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268721", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268721", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.357075", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6014.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6014.json index f9088e46383..fbeb7d11f99 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6014.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6014", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-15T17:15:49.100", - "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:18:17.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gabriel202212/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268722", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268722", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.357246", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6015.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6015.json index b188b6fdc3b..b56dc2f0196 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6015.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6015", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-15T17:15:49.403", - "lastModified": "2024-06-17T15:15:52.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:13:10.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/chenwulin-bit/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268723", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268723", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.357462", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6016.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6016.json index 9924140cd45..f1fccc57128 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6016.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6016", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-15T19:15:48.443", - "lastModified": "2024-06-17T14:15:12.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:02:04.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/chenwulin-bit/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.268724", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268724", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.357463", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6033.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6033.json index 20168eed1c0..f6169158900 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6033.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6033", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:03.263", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:32:49.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,18 +39,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.5", + "matchCriteriaId": "2649BF6F-6AE1-457C-BDD2-8BE619A86541" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/core/admin/hooks.php#L135", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3117477/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1725c7f3-2fac-4714-a63e-6c43694483fc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6467.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6467.json index 2b9250a6b72..e63bebdc16f 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6467.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6467", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:03.493", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:37:51.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.6", + "matchCriteriaId": "A8CF2DD1-8A61-44C8-9AC4-F0AE958530BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0177510-cd7d-4cc5-96c3-78433aa0e3f6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json index a913554ec63..d719779e4bc 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6535", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-17T03:15:01.890", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:00:32.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "12B0CF2B-D1E1-4E20-846E-6F0D873499A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-6535", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296024", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6595.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6595.json index 7dcf6638282..c6d6d733fa0 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6595.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6595", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-17T02:15:10.130", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:52:54.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "11.8.0", + "versionEndExcluding": "16.11.6", + "matchCriteriaId": "67B15D59-0B7C-46F9-80D8-CBD123B54E1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "11.8.0", + "versionEndExcluding": "16.11.6", + "matchCriteriaId": "BABDAF38-D90B-42A5-BACC-5565A4ADBEF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.4", + "matchCriteriaId": "C7412902-D4C7-4172-BE56-8D4677226D96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.4", + "matchCriteriaId": "12CB9371-7540-4483-A3EE-061ACAF47067" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.2", + "matchCriteriaId": "45878C42-2DC4-4A09-ADA6-80BCCCF35DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1.0", + "versionEndExcluding": "17.1.2", + "matchCriteriaId": "19C3FE9A-BACE-4750-A2C9-E43B7E824711" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.vlt.sh/blog/the-massive-hole-in-the-npm-ecosystem", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417975", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6660.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6660.json index 9b2b4b82e8d..52933e52036 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6660.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6660.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6660", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:03.683", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:48:14.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,26 +39,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.6", + "matchCriteriaId": "A8CF2DD1-8A61-44C8-9AC4-F0AE958530BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L1491", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L410", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L476", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php?contextall=1", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/851ff861-474e-4063-88ff-d8d35b10e9a0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6669.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6669.json index 083f5bd9a9e..70ac845fe21 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6669.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6669", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-17T07:15:03.873", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:56:47.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -39,26 +59,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.5.8", + "matchCriteriaId": "991EF6A7-AD8D-4148-9BBE-3D5EEBC82E4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/admin_ui.php#L2211", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/admin_ui.php#L755", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3119022/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/chatbot/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce23efed-fe21-486a-ab3b-9ed0dd26a971?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6801.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6801.json index 1d1e6f70a6e..6d3995c8dfe 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6801.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6801.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6801", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-17T02:15:10.367", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:55:25.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_student_management_system_project:online_student_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "422F2579-A688-4D6E-97D2-873C5BCABFD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/aaajuna/demo/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.271703", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.271703", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.374774", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6802.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6802.json index 4a6981e33ba..ee82cad1787 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6802.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6802", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-17T02:15:10.780", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T14:58:12.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:computer_laboratory_management_system_project:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F90DE9D-E1E0-40CF-91E5-B93DFA487DBD" + } + ] + } + ] + } + ], "references": [ { "url": "https://reports-kunull.vercel.app/CVE%20research/computer-laboratory-management-system-save_record", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.271704", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.271704", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.374797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6803.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6803.json index b2c222f7879..a18b1b67936 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6803.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6803.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6803", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-17T03:15:02.130", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:01:50.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:document_management_system_project:document_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "120BA9C1-F846-4761-B02A-2880FDD0D36C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hzy11111111/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.271705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.271705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.374809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6807.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6807.json index 56d13811667..4dd18559948 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6807.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6807", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-17T04:15:02.720", - "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-19T15:03:08.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A7F67EA-5AEE-4BE7-8EB3-F5C2FFDC5344" + } + ] + } + ] + } + ], "references": [ { "url": "https://reports-kunull.vercel.app/CVE%20research/student-study-center-desk-management-system-xss-firstname", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.271706", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.271706", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.374853", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6808.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6808.json index cc5fa3fefd2..b5496ae0da9 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6808.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6808", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-17T04:15:03.320", - "lastModified": "2024-07-18T16:15:08.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-19T15:04:43.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/qianqiusujiu/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.271707", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.271707", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.375154", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6895.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6895.json new file mode 100644 index 00000000000..1ffaf10ad00 --- /dev/null +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6895.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6895", + "sourceIdentifier": "security@yugabyte.com", + "published": "2024-07-19T15:15:10.547", + "lastModified": "2024-07-19T15:15:10.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient authentication in user account management in Yugabyte Platform allows local network attackers with a compromised user session to change critical security information without re-authentication. An attacker with user session and access to application can modify settings such as password and email without being prompted for the current password, enabling account takeover." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@yugabyte.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@yugabyte.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yugabyte/yugabyte-db/commit/9687371d8777f876285b737a9d01995bc46bafa5", + "source": "security@yugabyte.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6908.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6908.json new file mode 100644 index 00000000000..095b6f6648f --- /dev/null +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6908.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-6908", + "sourceIdentifier": "security@yugabyte.com", + "published": "2024-07-19T15:15:10.747", + "lastModified": "2024-07-19T15:15:10.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper privilege management in Yugabyte Platform allows authenticated admin users to escalate privileges to SuperAdmin via a crafted PUT HTTP request, potentially leading to unauthorized access to sensitive system functions and data." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@yugabyte.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:P/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@yugabyte.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662", + "source": "security@yugabyte.com" + }, + { + "url": "https://github.com/yugabyte/yugabyte-db/commit/68f01680c565be2a370cfb7734a1b3721d6778bb", + "source": "security@yugabyte.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fbcdaa64166..bae37b0678e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-19T14:00:18.683832+00:00 +2024-07-19T16:00:18.490265+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-19T13:39:30.817000+00:00 +2024-07-19T15:56:47.190000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257499 +257505 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `6` -- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-07-19T12:15:02.320`) +- [CVE-2024-0006](CVE-2024/CVE-2024-00xx/CVE-2024-0006.json) (`2024-07-19T15:15:09.930`) +- [CVE-2024-27489](CVE-2024/CVE-2024-274xx/CVE-2024-27489.json) (`2024-07-19T15:15:10.210`) +- [CVE-2024-39962](CVE-2024/CVE-2024-399xx/CVE-2024-39962.json) (`2024-07-19T15:15:10.320`) +- [CVE-2024-39963](CVE-2024/CVE-2024-399xx/CVE-2024-39963.json) (`2024-07-19T15:15:10.383`) +- [CVE-2024-6895](CVE-2024/CVE-2024-68xx/CVE-2024-6895.json) (`2024-07-19T15:15:10.547`) +- [CVE-2024-6908](CVE-2024/CVE-2024-69xx/CVE-2024-6908.json) (`2024-07-19T15:15:10.747`) ### CVEs modified in the last Commit -Recently modified CVEs: `80` +Recently modified CVEs: `44` -- [CVE-2024-41111](CVE-2024/CVE-2024-411xx/CVE-2024-41111.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-41172](CVE-2024/CVE-2024-411xx/CVE-2024-41172.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5321](CVE-2024/CVE-2024-53xx/CVE-2024-5321.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5604](CVE-2024/CVE-2024-56xx/CVE-2024-5604.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5618](CVE-2024/CVE-2024-56xx/CVE-2024-5618.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5619](CVE-2024/CVE-2024-56xx/CVE-2024-5619.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5620](CVE-2024/CVE-2024-56xx/CVE-2024-5620.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5625](CVE-2024/CVE-2024-56xx/CVE-2024-5625.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5977](CVE-2024/CVE-2024-59xx/CVE-2024-5977.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-5997](CVE-2024/CVE-2024-59xx/CVE-2024-5997.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6205](CVE-2024/CVE-2024-62xx/CVE-2024-6205.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6338](CVE-2024/CVE-2024-63xx/CVE-2024-6338.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6455](CVE-2024/CVE-2024-64xx/CVE-2024-6455.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6799](CVE-2024/CVE-2024-67xx/CVE-2024-6799.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6898](CVE-2024/CVE-2024-68xx/CVE-2024-6898.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6899](CVE-2024/CVE-2024-68xx/CVE-2024-6899.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6904](CVE-2024/CVE-2024-69xx/CVE-2024-6904.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6905](CVE-2024/CVE-2024-69xx/CVE-2024-6905.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6906](CVE-2024/CVE-2024-69xx/CVE-2024-6906.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6907](CVE-2024/CVE-2024-69xx/CVE-2024-6907.json) (`2024-07-19T13:01:44.567`) -- [CVE-2024-6916](CVE-2024/CVE-2024-69xx/CVE-2024-6916.json) (`2024-07-19T13:01:44.567`) +- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-19T15:06:23.827`) +- [CVE-2024-41010](CVE-2024/CVE-2024-410xx/CVE-2024-41010.json) (`2024-07-19T15:24:59.137`) +- [CVE-2024-41107](CVE-2024/CVE-2024-411xx/CVE-2024-41107.json) (`2024-07-19T14:15:06.080`) +- [CVE-2024-5251](CVE-2024/CVE-2024-52xx/CVE-2024-5251.json) (`2024-07-19T15:25:30.980`) +- [CVE-2024-5252](CVE-2024/CVE-2024-52xx/CVE-2024-5252.json) (`2024-07-19T15:29:35.447`) +- [CVE-2024-5253](CVE-2024/CVE-2024-52xx/CVE-2024-5253.json) (`2024-07-19T15:30:34.717`) +- [CVE-2024-5254](CVE-2024/CVE-2024-52xx/CVE-2024-5254.json) (`2024-07-19T15:32:05.560`) +- [CVE-2024-5255](CVE-2024/CVE-2024-52xx/CVE-2024-5255.json) (`2024-07-19T15:32:18.850`) +- [CVE-2024-6008](CVE-2024/CVE-2024-60xx/CVE-2024-6008.json) (`2024-07-19T14:52:08.110`) +- [CVE-2024-6009](CVE-2024/CVE-2024-60xx/CVE-2024-6009.json) (`2024-07-19T14:24:41.657`) +- [CVE-2024-6013](CVE-2024/CVE-2024-60xx/CVE-2024-6013.json) (`2024-07-19T14:20:07.337`) +- [CVE-2024-6014](CVE-2024/CVE-2024-60xx/CVE-2024-6014.json) (`2024-07-19T14:18:17.607`) +- [CVE-2024-6015](CVE-2024/CVE-2024-60xx/CVE-2024-6015.json) (`2024-07-19T14:13:10.463`) +- [CVE-2024-6016](CVE-2024/CVE-2024-60xx/CVE-2024-6016.json) (`2024-07-19T14:02:04.600`) +- [CVE-2024-6033](CVE-2024/CVE-2024-60xx/CVE-2024-6033.json) (`2024-07-19T15:32:49.507`) +- [CVE-2024-6467](CVE-2024/CVE-2024-64xx/CVE-2024-6467.json) (`2024-07-19T15:37:51.067`) +- [CVE-2024-6535](CVE-2024/CVE-2024-65xx/CVE-2024-6535.json) (`2024-07-19T15:00:32.153`) +- [CVE-2024-6595](CVE-2024/CVE-2024-65xx/CVE-2024-6595.json) (`2024-07-19T14:52:54.943`) +- [CVE-2024-6660](CVE-2024/CVE-2024-66xx/CVE-2024-6660.json) (`2024-07-19T15:48:14.040`) +- [CVE-2024-6669](CVE-2024/CVE-2024-66xx/CVE-2024-6669.json) (`2024-07-19T15:56:47.190`) +- [CVE-2024-6801](CVE-2024/CVE-2024-68xx/CVE-2024-6801.json) (`2024-07-19T14:55:25.753`) +- [CVE-2024-6802](CVE-2024/CVE-2024-68xx/CVE-2024-6802.json) (`2024-07-19T14:58:12.707`) +- [CVE-2024-6803](CVE-2024/CVE-2024-68xx/CVE-2024-6803.json) (`2024-07-19T15:01:50.250`) +- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2024-07-19T15:03:08.933`) +- [CVE-2024-6808](CVE-2024/CVE-2024-68xx/CVE-2024-6808.json) (`2024-07-19T15:04:43.837`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 49380a24953..b54f8fbf08d 100644 --- a/_state.csv +++ b/_state.csv @@ -29106,7 +29106,7 @@ CVE-2007-6349,0,0,55c2309c853ce1ea78f598953eac0bbbffd257655f0e04247272f36f40682e CVE-2007-6350,0,0,53461a66d55fce94ee8771f8c1589164b26a5137407c8a93b914a38060a54074,2011-08-08T04:00:00 CVE-2007-6351,0,0,104fd677a458e7236e358907764e2252d7ded497fa8382007a54e0f75cb5c65c,2021-01-26T13:07:36.500000 CVE-2007-6352,0,0,f530a14c21bfc055404c29a80912ec97b7445e32f99ddb2051e95278cf78642b,2018-10-15T21:52:19.970000 -CVE-2007-6353,0,1,3fbb9122b2d3dbf0ff1069cce1228f9fd5bc5301d0de322b4ed4666eb3ccf364,2024-07-19T13:04:35.477000 +CVE-2007-6353,0,0,3fbb9122b2d3dbf0ff1069cce1228f9fd5bc5301d0de322b4ed4666eb3ccf364,2024-07-19T13:04:35.477000 CVE-2007-6354,0,0,9f2be0d0508b8864496e3a779e2936853f0a62ee0d84b838e31c9dc7d9e0041e,2011-05-13T04:00:00 CVE-2007-6355,0,0,b02cf3e83b9f403b5686286eee9a5674328ff97478346cd2f406deb9f9e17877,2011-05-13T04:00:00 CVE-2007-6356,0,0,84732a36e499b486f879b128037576ea39e0d40b6ae5bdec6082a08f9459ae21,2011-03-08T03:02:31.687000 @@ -72693,7 +72693,7 @@ CVE-2014-9153,0,0,1852fe3a0151bd62e5dc4286a28ef9334fbdff3a30a23b3a5ba8e0cbe7223f CVE-2014-9154,0,0,59bd739983a682bc345e74585d02d50f06d7b4e8f99f02180fb6d28be4347f40,2014-12-05T16:32:24.930000 CVE-2014-9155,0,0,565ceaf371a314db9a7df10e83e92282637c016a54717a3daedce1a87946f1c9,2014-12-05T16:10:56.670000 CVE-2014-9156,0,0,d8e68076b6f619078f4af9051bf6f4fd924cd6008e80510a17f25c8459b60727,2014-12-01T19:15:55.913000 -CVE-2014-9157,0,1,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000 +CVE-2014-9157,0,0,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000 CVE-2014-9158,0,0,9e594330e6883ce054afa992a164552596d2d4233052544abefd7afe2a0b3cde,2014-12-12T01:40:25.750000 CVE-2014-9159,0,0,509d5f2dd5a7b8088aee0d037a7af644ed36efde6f1510e915a6157e2c645ecd,2014-12-12T01:40:55.657000 CVE-2014-9160,0,0,5bae4029507e5450b4ce949da937cd00adbc4dab93c07ba69378d2cba9487060,2017-01-03T02:59:22.783000 @@ -73024,7 +73024,7 @@ CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d117 CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000 CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000 CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000 -CVE-2014-9515,0,0,522befe469b9d40f52519c18e0454e66503e6f41ddbade7816d38d3a9e79e342,2021-06-14T18:15:10.637000 +CVE-2014-9515,0,1,24be7155019de27e80399c6be5475ef64a6aedbe97577a256ae0a18f9a53e8b2,2024-07-19T14:15:02.500000 CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000 CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000 CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000 @@ -74386,7 +74386,7 @@ CVE-2015-0969,0,0,98a698159207b459a01c1c68618daf4c818febd68fd91bb81989c3b302cdd6 CVE-2015-0970,0,0,8acab781ba8956dc0da47639ab5844d9a863a603c524e26ca5728a588e8126c7,2019-09-27T16:44:28.233000 CVE-2015-0971,0,0,fe1ad42b256a586c6c7695e21f0ec0e2da11a1b53f584460eba8191e6bc180e3,2015-05-15T15:13:25.893000 CVE-2015-0972,0,0,13a4b8c6ef17ab64f1fb0b583479c02c9508b9578186aba569147c4411ed7607,2015-06-24T17:50:23.243000 -CVE-2015-0973,0,0,30178994f4b1d92c263cfc842e6dbd36de812993fe86681e8bc3d7f14022cd86,2016-10-20T18:46:05.357000 +CVE-2015-0973,0,1,68eaec9323199d783bace3e5c2615086955fd739151902f1903c1a081de9375d,2024-07-19T14:15:04.343000 CVE-2015-0974,0,0,258cdcfae939df11916595c4876ef9eaccdc2ba26fd1dea8a6d5276161c32b70,2017-09-12T15:37:58.493000 CVE-2015-0976,0,0,2459cd195fd89a053ff7217ae74342de6e3b68fd8bae7e138d0af08dc7cf7405,2015-04-03T15:16:34.467000 CVE-2015-0977,0,0,5944267d3fb952b169bc9eb9bd7b1770691968e29cc26b84f3c43f8b400515a7,2015-02-27T17:41:21.397000 @@ -87012,7 +87012,7 @@ CVE-2016-3747,0,0,1e9866632061c3379cd0e6306f66e694439cbbedc1b178c6335abc792da298 CVE-2016-3748,0,0,1c90f13a2854c36ccb8761c0d4511424580cf135f1a89bed8050ac8d3598fb73,2016-07-11T18:28:53.910000 CVE-2016-3749,0,0,ae78f56f9fd18e113b7c89b9925288c976404bc1c24a2abf327a46e025b7abbc,2016-07-11T18:44:36.083000 CVE-2016-3750,0,0,dbcd5f94bf55d295346ddcf597a79c4071914ee295c9ea0ac6d107da0c74a475,2016-07-11T17:41:12.853000 -CVE-2016-3751,0,0,d6fa721cc5b225d90a72381b15dbbe9aed866e2aaef844bb8379f29346384a4e,2016-07-11T17:52:53.463000 +CVE-2016-3751,0,1,bc5fb81d6aaede233a449dfe8134a1c0218e0b6eb2595073967828d7767ce9d9,2024-07-19T14:15:04.573000 CVE-2016-3752,0,0,08630fd893f115bbf043182ef5338cb2b3540573825045c80ee2ab5bc120c4bd,2016-07-11T18:30:55.097000 CVE-2016-3753,0,0,dd8974f1d4e0c13e24104b3efc7433b1c6ae7ba7ee54ada5e0fd36e0fbc8c193,2016-07-11T17:43:18.823000 CVE-2016-3754,0,0,d435c37b580863e722e7200f62350927f37401218352adce39fd1358431d7b72,2016-07-11T14:24:05.513000 @@ -94648,7 +94648,7 @@ CVE-2017-10668,0,0,b3b508dd00bbdfc4c32f6581e93268dce58b239af608215f8dafb9abd8c85 CVE-2017-10669,0,0,7da649796bd95a8a6a0d1a6b84a5510f1ef49df12cc5ae837320c5d13c649741,2017-07-06T17:58:48.303000 CVE-2017-1067,0,0,5e339d272fa99fe498529e1e3f23492889219a4846a477cf56fa0d2def6fb28c,2023-11-07T02:42:16.020000 CVE-2017-10670,0,0,75e8d8e75065c423c1872194b012eae82d189cdc3a5608e753726629523f2d01,2017-07-06T17:59:00.303000 -CVE-2017-10671,0,1,606bbab4b09c232a580fdd6efa3d3f824ac23e373bb70dd833ae3218d06c0a1f,2024-07-19T13:05:10.600000 +CVE-2017-10671,0,0,606bbab4b09c232a580fdd6efa3d3f824ac23e373bb70dd833ae3218d06c0a1f,2024-07-19T13:05:10.600000 CVE-2017-10672,0,0,62592e865e8978294f88122696807d65be2bb0bd6d142716ae24419459c99b49,2020-03-03T16:19:15.567000 CVE-2017-10673,0,0,65ef9bdfaef3afbef0939aefc7763de9df86875cbd97c71a7ba545a71cc477d0,2019-12-12T13:19:51.560000 CVE-2017-10674,0,0,7851d14fd365008a24460c45a3ce5da5c2fc9ddae735a4dd058c21e94b7bc166,2017-07-06T18:07:48.387000 @@ -111218,7 +111218,7 @@ CVE-2018-1005,0,0,d15517e4e9e1db97d14dbcdeaf7d5651f0a12edff3ffd4d54845b92a268387 CVE-2018-10050,0,0,cf969848703a9b2a59313bb2763aa6281c852347ea8fc74d79bc4af3b1a62f1b,2018-05-09T18:29:04.107000 CVE-2018-10051,0,0,a3a0bac148a003ebba2da5967ead0666f6bef310e10c1de782105abb79ce9cd0,2018-05-09T18:08:23.747000 CVE-2018-10052,0,0,c3523c185ff2d85e9b0d31e90c216f284db2ddf40b6a13205a1dada94b27cb86,2018-05-09T18:08:07.997000 -CVE-2018-10054,0,0,b52aafc7cb0753cd5d8aedcb5800310d90ae68be994becb0ca74c14745dbc854,2024-06-26T20:15:12.490000 +CVE-2018-10054,0,1,7f164c93c8e6890f848f21703272543af1c1fbf11f41915a444773969d4cc474,2024-07-19T14:15:04.740000 CVE-2018-10055,0,0,19ad0ade7b7357d87bb6d75a4a0074bf851fab84c4fa3854fa7c1dc98e1e34d2,2019-04-30T18:34:22.890000 CVE-2018-10057,0,0,8274f370e169947a28352a8fdf79fe87593e238312e1b2440e7e17f4f8c9d759,2018-07-27T14:46:42.937000 CVE-2018-10058,0,0,6c8812623ef7c6db9316c220fe09077dc0f3d104fee66ccb3137c7904cdf1c30,2020-08-24T17:37:01.140000 @@ -135204,7 +135204,7 @@ CVE-2019-1762,0,0,3dfc024db74375afdf9a77e3e3d3e77477c0dc637b15bea512092209468fef CVE-2019-17621,0,0,85c741f8f9d3768b4e0bc281bd2ffe8a1855adf9bd3e1544afe4cacd9303ad45,2024-06-27T19:16:32.357000 CVE-2019-17624,0,0,34cab4b9b8d5fd56bfc68f777500f1464c84eadfdadf7fa0aa670b2a02bdf5e3,2020-08-24T17:18:39.590000 CVE-2019-17625,0,0,f99f6d326f4f07f8173685deb9c85452c592dde1d884b81fde79c62991d31705,2019-10-16T22:36:38.803000 -CVE-2019-17626,0,0,d1c3fb8e5ca035b4f87dd71a60e3770f7122dede40f7721dcdc139ead5251446,2023-11-07T03:06:23.607000 +CVE-2019-17626,0,1,d2aa81cde2600dfc256b5d4d18d747ff1f1ad0f938c459c4a76386c31a4f51fb,2024-07-19T14:15:04.930000 CVE-2019-17627,0,0,2086a1ffab420c4fd78d53df0f3352f1f205cc73c687051ffb86e903c95610e9,2019-10-18T17:00:37.100000 CVE-2019-17629,0,0,614b65deffa0b7bdceaa98f22d6aa3f8eb8c190d3d454fa4d90cc0a6f0072c6f,2019-10-16T19:11:34.597000 CVE-2019-1763,0,0,b419eaed4c26a3ac25bfa3529a129186a61beb7ca26002e3ca272799a77e5f6a,2020-10-08T19:58:23.100000 @@ -230061,7 +230061,7 @@ CVE-2023-40154,0,0,6db426d68f75684e01202401e3ecbe622403876ecbe4560542d2a6ae15228 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000 CVE-2023-40158,0,0,ea9ecbd6acdb9ee425f0387337774eb7bca92a549c7bbb73ec67e17a1e55242b,2023-08-29T14:35:53.187000 -CVE-2023-40159,0,1,73d39db9bfd3bad5c8e909b94a6eb837640d49007d2a26b95faa032fcf43ed99,2024-07-19T13:01:44.567000 +CVE-2023-40159,0,0,73d39db9bfd3bad5c8e909b94a6eb837640d49007d2a26b95faa032fcf43ed99,2024-07-19T13:01:44.567000 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000 CVE-2023-40160,0,0,de8c32a875ccf6f89392dafa209d66eda2b9b820e48facccb8082fc450366841,2024-03-18T01:53:02.353000 CVE-2023-40161,0,0,811acdcf20dca77f5e641cd172c1882f83d8fefd01d88b9229bb052c09bff4e9,2024-02-14T15:01:46.050000 @@ -230123,7 +230123,7 @@ CVE-2023-40219,0,0,771f66a87abf8df69cce91491665e525ddb3d080b9e78bf4734e3298840cb CVE-2023-4022,0,0,d6b23d4a259ff425e0bcea23f81328a67bb6e3c44aa2685891847b3db1b81338,2023-11-07T04:22:03.600000 CVE-2023-40220,0,0,89c4602906f60678a7794892d3cd5810d595c00980d101471846882934615bc4,2023-11-22T15:13:46.893000 CVE-2023-40221,0,0,fc206e84687a442a6b6faace8e4cb4d304dab11b253a40c7c3859764d42592bc,2024-06-04T19:17:38.693000 -CVE-2023-40223,0,1,d04b62607941a7a62c505babe0b67a0c8d9fa8e1269f219147a221743a1b0798,2024-07-19T13:01:44.567000 +CVE-2023-40223,0,0,d04b62607941a7a62c505babe0b67a0c8d9fa8e1269f219147a221743a1b0798,2024-07-19T13:01:44.567000 CVE-2023-40224,0,0,fe7ff7e2259903cb6a2b8a487e5657d52b403fb11aed6d8e638eabcae3a7d45a,2023-11-17T05:15:12.387000 CVE-2023-40225,0,0,4211aba8908007a30e95209432ab11366dbf58cece809a97f23ca0a3fb4772c7,2023-08-18T20:03:17.290000 CVE-2023-4023,0,0,9994c1fc2e5c266fe881d2394936c6b00f055b3f4cc90c0fb1f5d28d281ef9df,2023-11-07T04:22:03.717000 @@ -230396,7 +230396,7 @@ CVE-2023-40534,0,0,e8ece95a9c479f54fdd96184c96036c3ca75ef517f90de3d989a08bfce9bf CVE-2023-40535,0,0,3dd8b6e353e77bc78b3eaf66d47e8a5e362a0b31feec7a87804f2cc657d03e6f,2023-09-08T18:49:20.803000 CVE-2023-40536,0,0,9551e2fe36c80eabdc1a2e97ded6be800d2fb9f544e15a4ec84bb644eba227af,2024-05-17T18:36:05.263000 CVE-2023-40537,0,0,75f58d7d08cd8fb906c24aefd5bbf6d6b69c82ba74790056d8b068a8723a2e25,2023-10-19T16:43:11.323000 -CVE-2023-40539,0,1,0260cd4683ea1e89f6283f932c1a63c6dd5e1b1420f5c025e0cff80c05f811c3,2024-07-19T13:01:44.567000 +CVE-2023-40539,0,0,0260cd4683ea1e89f6283f932c1a63c6dd5e1b1420f5c025e0cff80c05f811c3,2024-07-19T13:01:44.567000 CVE-2023-4054,0,0,53238c21c0a1eb83d08a1b3d2d86562b494ce0912d3fd29acf557c382ca3a9f1,2023-08-07T14:51:09.667000 CVE-2023-40540,0,0,1e03a01e888f27e7c3ca51db2a4bc2550b4a2afd268bf6a33f8cdd0d825d3736,2023-11-22T15:13:18.220000 CVE-2023-40541,0,0,daaec126802b21cc7a612331601c83efdf2fbb147626236fb6df03c2ce8ee7c6,2023-10-12T02:32:07.413000 @@ -230552,7 +230552,7 @@ CVE-2023-40699,0,0,1c71007d49a9bda3bb25ac8a38884f2ffc429a510e5d9039d4e8477ec5b0a CVE-2023-4070,0,0,a493fa1b62788c24fea8f8fc21746dc89c9760da767bd18023dad9b52c2e8327,2024-01-31T17:15:13.767000 CVE-2023-40702,0,0,62d180282da772c8c0e58ade691879d7f1cf512a29de8bc9063c44bdbe2af130,2024-07-09T18:18:38.713000 CVE-2023-40703,0,0,35695eb835fa32a192b950c3dccf44faf04da11a8e115230e010144a1f1eab33,2023-12-01T19:13:28.487000 -CVE-2023-40704,0,1,9209d06e6b6a45b0b11e619acb500fbe43d9b7e6a6300160ab05b4ff17ab2034,2024-07-19T13:01:44.567000 +CVE-2023-40704,0,0,9209d06e6b6a45b0b11e619acb500fbe43d9b7e6a6300160ab05b4ff17ab2034,2024-07-19T13:01:44.567000 CVE-2023-40705,0,0,1eda5b358ba0f37be10f436ec87d2f785a6beaf853d5f29bdc0c3fdfc74c06ad,2023-09-08T18:48:31.770000 CVE-2023-40706,0,0,adbd436305697d32e2e9942a03d182f6db0acd7a4fd1ad3603994bd286cace6d,2023-08-29T23:34:50.430000 CVE-2023-40707,0,0,673cbc0c873be97cb20c7bf02c23c637a814b2305c2831ca2a42955e398c3f06,2023-08-29T23:34:10.753000 @@ -237203,7 +237203,7 @@ CVE-2023-50297,0,0,377af72f6c89fc0e46b9660e8b2c6192bd69c1a81ea30ef4f3f601e394b25 CVE-2023-50298,0,0,742712a47ba4f96d9443ee08ce1588bb351566ab4f33556150a490452f46d767,2024-02-15T18:40:56.680000 CVE-2023-5030,0,0,baa8609a990f56814a5ba8dd9495577324349a25a51fe3f4f221ce48042d5551,2024-05-17T02:32:47.803000 CVE-2023-50303,0,0,04eac9d14bf1dc3aa65071a8bc06d9048a964b36a98faaa3bac3085f23a59b31,2024-02-28T14:06:45.783000 -CVE-2023-50304,0,1,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000 +CVE-2023-50304,0,0,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000 CVE-2023-50305,0,0,2c664216c9930c89a7fcfadd3a31bff081c46073aca034576b3fdbe264259281,2024-03-07T17:50:18.457000 CVE-2023-50306,0,0,4f1d3b091421856e56dbbaaa9ee4678a885aa3ffdce75c9d83e590ccb0be3e6f,2024-02-20T19:50:53.960000 CVE-2023-50307,0,0,ea0b023cdac8ed9cf01745c0fa57889642f00eb899be12d40ee0b2d23a79439b,2024-04-12T12:43:57.400000 @@ -240821,10 +240821,11 @@ CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417 CVE-2023-7259,0,0,48e34f6790939be91bf1f945206235146161db18f274c444cfe683dbe37045a0,2024-06-04T19:18:14.193000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 -CVE-2023-7268,0,1,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000 -CVE-2023-7269,0,1,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000 +CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000 +CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000 CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000 CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000 +CVE-2024-0006,1,1,79db48194cb5104ac2f1b02e569f2eee06af8b9c0a4f59b9f348776648116d77,2024-07-19T15:15:09.930000 CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000 CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000 CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c05,2024-02-15T06:23:39.303000 @@ -241560,7 +241561,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000 CVE-2024-0855,0,0,d6a852138d81a2f1a5b951678ed9f076f0450cdd1094ad4d8554eefd8ccce592,2024-02-27T14:20:06.637000 CVE-2024-0856,0,0,35186061175bf94a789875417a754a8a320463b5a7778dc33b67b00319a2bfe4,2024-03-20T13:00:16.367000 -CVE-2024-0857,0,1,b0666c260e2bd7ff808ade000aadd0cab74ae18ae1df2b63d578d62ec78174c1,2024-07-19T13:01:44.567000 +CVE-2024-0857,0,0,b0666c260e2bd7ff808ade000aadd0cab74ae18ae1df2b63d578d62ec78174c1,2024-07-19T13:01:44.567000 CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000 CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000 CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000 @@ -243346,23 +243347,23 @@ CVE-2024-21128,0,0,a2a656ac82ef59dca59116b1c82244049a82be2b5f8d64dc13889b409d771 CVE-2024-21129,0,0,b1d82ad2ace6a530373fd890efc61a1afe163107a9bcd66592f3629522d0dfff,2024-07-17T13:34:20.520000 CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000 CVE-2024-21130,0,0,bea2b2e7eaeb97d38519ed7bc1bd63b9fa51bece27537e747e45a44c55c0cdf5,2024-07-17T13:34:20.520000 -CVE-2024-21131,0,0,68e549d3e011eb9fb6078a1492e62037acd3d674c9bd719eb0d2fa59a85a39b4,2024-07-17T13:34:20.520000 +CVE-2024-21131,0,1,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000 CVE-2024-21132,0,0,dd139dd4042d6a1178972f3ac987733a96a2e35f22144c114c5d699226824ca0,2024-07-17T13:34:20.520000 CVE-2024-21133,0,0,c3b712618b8daaa32fb099f380783f45f3a3232041fc17f803218133bcfc018e,2024-07-17T13:34:20.520000 CVE-2024-21134,0,0,6d06cef5bcb05ca9302f0e9cb0f7e64b3c71aa9c9e1898be8366c5e2ec7f0590,2024-07-17T13:34:20.520000 CVE-2024-21135,0,0,5ea7533ff0f28947679285df758fb5bdd6d00b15c26c27c77e949acd7e643f06,2024-07-17T13:34:20.520000 CVE-2024-21136,0,0,eac34267828dcd6c0e42f2949578579bca9932424a4c02dda1596c44a1615cb0,2024-07-17T13:34:20.520000 CVE-2024-21137,0,0,5cb346ed6a76e33ff502442e6fda21ba59fabfa2b49d93de02374b0eba7b85b1,2024-07-17T13:34:20.520000 -CVE-2024-21138,0,0,bf1b292f2fc69b2f57d0eb49178fc0f3703939cbe3859388c2916d71c5b594e4,2024-07-17T13:34:20.520000 +CVE-2024-21138,0,1,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000 CVE-2024-21139,0,0,1659564eccefabd1ef87f080fcf044771f881c3bd2283c028d2b7fe1481c401e,2024-07-17T13:34:20.520000 -CVE-2024-21140,0,0,5f55e20f43d23bc11cde840ec2a1ca590f33e24a9c9829d36ab276ea8b99732c,2024-07-17T13:34:20.520000 +CVE-2024-21140,0,1,a355b887f2f3e95c0cfcaf2066fbef2d48cd303288049a5e4f501e4b1ab2b1f0,2024-07-19T14:15:05.400000 CVE-2024-21141,0,0,4c389a1b1f7194fb9ba2446906af3d7d800a96ac9f50d96dbc4d51691fe14a39,2024-07-17T13:34:20.520000 CVE-2024-21142,0,0,7714e55c3a0eaa85d823f8a1ea286e8580188862c1a8262d24c18bcf0bedb50f,2024-07-17T13:34:20.520000 CVE-2024-21143,0,0,a339ae05c5939594a60af63a50c64360a4c2bba1a6c72ae3134b343940b551c0,2024-07-17T13:34:20.520000 -CVE-2024-21144,0,0,545ce137ae4b7251fcbe475861991619ab96bd1118a48fbbae43d504ecb74590,2024-07-17T13:34:20.520000 -CVE-2024-21145,0,0,10662079aac9837e4851948f61900e8d072caebf410e8d98dac5180f3fbd0f0a,2024-07-17T13:34:20.520000 +CVE-2024-21144,0,1,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000 +CVE-2024-21145,0,1,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000 CVE-2024-21146,0,0,a3b2bee4c09cc77d71ebb85b1373e7798d1523fbed51e3bdbddcd6b262c87281,2024-07-17T13:34:20.520000 -CVE-2024-21147,0,0,80fe25d7fbae190c147cb0af161d104a4d18887fccd83f57fce5b1db56e39f37,2024-07-17T13:34:20.520000 +CVE-2024-21147,0,1,84f7acc7bc3a20d2859db41d6e11faaeb2b951c493091b63d082c86a294a3902,2024-07-19T14:15:05.667000 CVE-2024-21148,0,0,1967fb910c0ddd4fed52a67bde1deacb54db248787d06056e78744e0393f0bfa,2024-07-17T13:34:20.520000 CVE-2024-21149,0,0,8b715a8f90298b625399ca35204ae3b26a39ea0583be5bb2eca26773007c4f88,2024-07-17T13:34:20.520000 CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000 @@ -243391,19 +243392,19 @@ CVE-2024-21170,0,0,e1e211bc02bcce908dec7d1017fecb46b088c41b3278227f0dd1b52c54f62 CVE-2024-21171,0,0,d23ed38ec4935bf20f81d9f0f4264c31da7107f3450cf18daa4ea56b7c79ff29,2024-07-17T13:34:20.520000 CVE-2024-21173,0,0,406eb663e1eea9a8921cc1039cc55ed3405ee972396ff6c4857002263fd0f5df,2024-07-17T13:34:20.520000 CVE-2024-21174,0,0,783646b73d638ea3453f935f01445854b5206f2f8b29efee57ff0f0f6cf6ec33,2024-07-17T13:34:20.520000 -CVE-2024-21175,0,1,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000 -CVE-2024-21176,0,1,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000 -CVE-2024-21177,0,1,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000 -CVE-2024-21178,0,1,035beed050bbfc2990a03e92c9b347eb1c0d59a76c8a7a78fc227f93c62febb2,2024-07-19T13:36:57.527000 -CVE-2024-21179,0,1,41e6c8b33322a354c379f8845e2addcd96f161ff65c635bb9573b0314dc3b62d,2024-07-19T13:37:06.090000 +CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000 +CVE-2024-21176,0,0,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000 +CVE-2024-21177,0,0,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000 +CVE-2024-21178,0,0,035beed050bbfc2990a03e92c9b347eb1c0d59a76c8a7a78fc227f93c62febb2,2024-07-19T13:36:57.527000 +CVE-2024-21179,0,0,41e6c8b33322a354c379f8845e2addcd96f161ff65c635bb9573b0314dc3b62d,2024-07-19T13:37:06.090000 CVE-2024-2118,0,0,8cc75b149351247ebd9b7f215d921c62e30056d8a3359ddec0c5f6ccbae617de,2024-07-03T01:53:01.593000 -CVE-2024-21180,0,1,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b6f0,2024-07-19T13:37:14.707000 -CVE-2024-21181,0,1,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000 -CVE-2024-21182,0,1,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000 -CVE-2024-21183,0,1,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000 -CVE-2024-21184,0,1,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000 -CVE-2024-21185,0,1,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000 -CVE-2024-21188,0,1,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000 +CVE-2024-21180,0,0,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b6f0,2024-07-19T13:37:14.707000 +CVE-2024-21181,0,0,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000 +CVE-2024-21182,0,0,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000 +CVE-2024-21183,0,0,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000 +CVE-2024-21184,0,0,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000 +CVE-2024-21185,0,0,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000 +CVE-2024-21188,0,0,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000 CVE-2024-2119,0,0,11b037b49d290ba489439edd17815bf1f5dbc31c03ff8b80541b76c9d70af605,2024-05-22T12:46:53.887000 CVE-2024-2120,0,0,6b5464bebd26aefe39617ee608f8869264c47eca6efc9fe45d62e273fef6e20b,2024-03-27T12:29:30.307000 CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000 @@ -243649,12 +243650,12 @@ CVE-2024-21523,0,0,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b8 CVE-2024-21524,0,0,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000 CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 -CVE-2024-21527,0,1,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000 +CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000 CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000 -CVE-2024-21583,0,1,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000 +CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000 CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000 CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740afc,2024-01-31T00:15:45.920000 CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000 @@ -243938,10 +243939,10 @@ CVE-2024-22014,0,0,97be981b1958260947f79b7908c49463e10e156bc85f07e7f7d4adfcc41c6 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,cfb284ce26f8ad11f97c3657da29409b43ee3aaafc69545af1b48a9314b4beb5,2024-06-10T17:16:18.773000 -CVE-2024-22018,0,0,1f9ebfd6cad21644653d2eb867e3c7aafdbec5e19696ca21a29367cf511a6cd7,2024-07-11T19:15:11.303000 +CVE-2024-22018,0,1,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000 CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000 -CVE-2024-22020,0,0,93515df31575572885455709ab760c011f4b5168a38cb84e62f57e08a71c4542,2024-07-11T19:15:11.407000 +CVE-2024-22020,0,1,debd2a01716784fdc798c1002cfd1de2c7ec7af620c6ad131da757aceaba0623,2024-07-19T14:15:05.863000 CVE-2024-22021,0,0,638048027337936cbd408ce99df3409e0af8fc4be0132d034339cad92c33270d,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,520151bf342f8e1b6d0df34d3bdc80dc16c1dfc15f7f487e84d9dadfaf67b99c,2024-02-15T18:45:30.887000 CVE-2024-22023,0,0,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000 @@ -247736,6 +247737,7 @@ CVE-2024-27476,0,0,ee12db45de83cded307f831888a3645bddf15bc01083bf804116fb49347c3 CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000 CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000 CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000 +CVE-2024-27489,1,1,a6aa2da3ad6334d53775c095ef5797d567e85d0adf56993e02a21261562f73a8,2024-07-19T15:15:10.210000 CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000 CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000 CVE-2024-27499,0,0,2d730ced2ef06c3685db15a9c1c8006eabdbd2f39a30889dd60bb7c576c1753e,2024-03-01T22:22:25.913000 @@ -248506,7 +248508,7 @@ CVE-2024-28833,0,0,544d9d7e36f7bff315ea2576b37cb71ff7ca29653e07f9c621760e3f96474 CVE-2024-28834,0,0,09f3a0455e20f7b6e57692de383f0a9d90c6e171b45539ab32672953d1de586c,2024-06-10T17:16:24.560000 CVE-2024-28835,0,0,715111faf82ef85ab0456cb4278dc00b797a9390ab2213a743da9936785d8360,2024-05-16T23:15:47.883000 CVE-2024-28836,0,0,9ccc11b71bb035583c1b166b015c712001695f475067cfa890f253410f5dc601,2024-04-03T12:38:04.840000 -CVE-2024-2884,0,1,d12938301c99206404c82c1ccf4a3924a8320d228f8e2b624467c9752f31f26e,2024-07-19T13:35:19.847000 +CVE-2024-2884,0,0,d12938301c99206404c82c1ccf4a3924a8320d228f8e2b624467c9752f31f26e,2024-07-19T13:35:19.847000 CVE-2024-28847,0,0,014a3928809c380b33576c4296f96e850047c73296ad4ea8531dae3cd66a2798,2024-03-17T22:38:29.433000 CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000 CVE-2024-28849,0,0,059bc6bfc5a382a2468a652be1bf3530c6d1666f5b023a0877329552fb4408ba,2024-03-23T03:15:11.970000 @@ -249003,7 +249005,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710 CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000 CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000 -CVE-2024-29736,0,1,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000 +CVE-2024-29736,0,0,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000 CVE-2024-29737,0,0,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000 CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000 CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000 @@ -249391,10 +249393,10 @@ CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 -CVE-2024-30125,0,1,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 -CVE-2024-30126,0,1,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 +CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 +CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000 -CVE-2024-30130,0,1,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 +CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000 CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 @@ -249707,7 +249709,7 @@ CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b3 CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000 CVE-2024-30471,0,0,24bc68add584a17f9d1f010daaae4a0025d7a0febd84aec39d70d272cd1e669e,2024-07-17T13:34:20.520000 CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000 -CVE-2024-30473,0,1,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000 +CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000 CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000 @@ -250119,7 +250121,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000 CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000 CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000 -CVE-2024-31143,0,1,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000 +CVE-2024-31143,0,0,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000 CVE-2024-3115,0,0,ce15a233f41ff0461e80772019f46030689b0b2d2d5c745fde6ced2663519f76,2024-06-28T13:22:33.400000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,548f0ebc12c631be1a59b512bab01930265194a04487b6bd3b57e79e2e54c960,2024-06-17T12:42:04.623000 @@ -250494,11 +250496,11 @@ CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,f08fb9f910c3a1076d50c31d40d404a72ee29f978665ed5faea697632994477c,2024-05-06T12:44:56.377000 CVE-2024-31678,0,0,a039b430a4b65e0b97046276b6ed1c632f765fc4e4053aa5427aeefb4dac3d98,2024-04-12T12:44:04.930000 -CVE-2024-3168,0,1,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000 +CVE-2024-3168,0,0,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000 CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000 CVE-2024-31682,0,0,42ea6293b90227c97d91195ff4d0e78cbfa746fc21aebe2add0640f7549a80aa,2024-06-04T16:57:41.057000 CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000 -CVE-2024-3169,0,1,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000 +CVE-2024-3169,0,0,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000 CVE-2024-3170,0,0,5e7358dc9ec4715298a5a689fbebf23a3d7543995cc630ed65af1176171581df,2024-07-18T15:04:35.447000 CVE-2024-31705,0,0,1e094636fab25f55fd2bbe89fbc416ff598664e06b0094a270ee264d1d302370,2024-04-30T13:11:16.690000 CVE-2024-3171,0,0,05e23f6e21a479cfe13415837a6ca80b006bcab87b0d88c28d88a1c1c5d48fb0,2024-07-18T15:03:07.550000 @@ -250690,7 +250692,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468 CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000 CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000 CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000 -CVE-2024-32007,0,1,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000 +CVE-2024-32007,0,0,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000 CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000 CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000 CVE-2024-32018,0,0,a57cd84bbc4228dbc73979371818ba4496491d8c8d7ae0852269ca74ca3485fd,2024-06-10T18:15:31.980000 @@ -251976,7 +251978,7 @@ CVE-2024-34009,0,0,c189f67a4f292742e7eb11598e6740d1e1f0fe6680e397db2f39bb2455a1f CVE-2024-34010,0,0,e5242e4e175689c741a04991b05d676f9e3bda064e1a681e08ea1b95446de349,2024-04-30T13:11:16.690000 CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000 CVE-2024-34012,0,0,04f4534da5173cfce7ebae120e48f12f9b737be7b5131e98dd79deccdc3d7723,2024-06-17T12:42:04.623000 -CVE-2024-34013,0,1,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000 +CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000 CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000 CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000 @@ -252656,8 +252658,8 @@ CVE-2024-35194,0,0,d148be956e67f415d7646ff65de5a97b2b79a6aea2b1221670c2eaf58e45c CVE-2024-35195,0,0,6c790b50c3e78a6333f9424d693f4919101146c76421c04d91f2b605ab56962b,2024-06-10T17:16:29.563000 CVE-2024-35196,0,0,3171bb6143cfc03b7b84aa8a6110c1e96e2a6c63c73dc2a2e171d187a366d6ee,2024-05-31T19:14:47.793000 CVE-2024-35197,0,0,80436d6dc6299a6bdf0d8897382a6e075fe7db1c6cb2ff2d7a12468a154bde4d,2024-05-24T01:15:30.977000 -CVE-2024-35198,0,1,e4e1910e071cca78b8cacf5fa783d8f7f0d361c3968aef5cb5c4b7bfa1301c36,2024-07-19T13:01:44.567000 -CVE-2024-35199,0,1,63926bc0e462abfad7a45f61d10606c266a70501317c628aa5431346b41e8b38,2024-07-19T13:01:44.567000 +CVE-2024-35198,0,0,e4e1910e071cca78b8cacf5fa783d8f7f0d361c3968aef5cb5c4b7bfa1301c36,2024-07-19T13:01:44.567000 +CVE-2024-35199,0,0,63926bc0e462abfad7a45f61d10606c266a70501317c628aa5431346b41e8b38,2024-07-19T13:01:44.567000 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 CVE-2024-35204,0,0,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000 @@ -252745,7 +252747,7 @@ CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b99 CVE-2024-35324,0,0,a9d43213d6a9d4a1ea00fc60e4d2aec7e6eb81d792aae8e17b7c5cdc773898de,2024-05-28T17:11:47.007000 CVE-2024-35325,0,0,1b7fe21e78a882e8b6a4c7cfae193ff445584367725719b7b191a7492d8ca979,2024-06-13T18:35:19.777000 CVE-2024-35326,0,0,041a8637b63c4ab99328a0f37e7ce67805675a92fb8add508ea59bd20c8b7897,2024-06-13T18:35:19.777000 -CVE-2024-35328,0,0,b59f9a10d9cafcc0c30cbb92cbc1b1b48a1d77c803546e764ab257e3e8abcc8e,2024-06-13T18:35:19.777000 +CVE-2024-35328,0,1,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd50be,2024-07-19T15:25:50.030000 CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000 CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000 CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000 @@ -253920,7 +253922,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6 CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000 CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000 CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000 -CVE-2024-37066,1,1,fbf565a13efd6d49117241734c5e5a9aae56d5ff2784cc9e258072fe32e9597c,2024-07-19T13:01:44.567000 +CVE-2024-37066,0,0,fbf565a13efd6d49117241734c5e5a9aae56d5ff2784cc9e258072fe32e9597c,2024-07-19T13:01:44.567000 CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000 CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000 CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000 @@ -254090,7 +254092,7 @@ CVE-2024-37346,0,0,a4475e8bc16526d4a2cd923965b515305302813fd73edbfa3f18575d405f6 CVE-2024-37347,0,0,6e7baea952ef385b67b23083cebbb129c77e5630de3ec6d82658c88bc410c4ea,2024-06-21T11:22:01.687000 CVE-2024-37348,0,0,49b92234970ec422b020245ff1e6f7259c16f36e8db6b7b874fd77e08ed0a6ef,2024-06-21T11:22:01.687000 CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000 -CVE-2024-3735,0,1,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000 +CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000 CVE-2024-37350,0,0,db322a02568c197ff2f4cce28d07f13a6d84645dcf6fb2d6d98030bff57992f6,2024-06-21T11:22:01.687000 CVE-2024-37351,0,0,5d28c3ae9e671d4e970680119129fdfd5cef4f93d0af956f6a6aef99cac6535d,2024-06-21T11:22:01.687000 CVE-2024-37352,0,0,8cb2d15b6cc19b492a4019e2458fe1e37bdb4a8988d34a37da730385b336d322,2024-06-21T11:22:01.687000 @@ -254140,7 +254142,7 @@ CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416 CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000 CVE-2024-37471,0,0,5edd9f6c5e3d338e594ebab0d6a40248bc10bd2ea28750bc19b1ba1459171580,2024-07-05T12:55:51.367000 CVE-2024-37472,0,0,3954317423d61a9d54cf49fbab6fafec302a0c0f856949b52d29a5dcc939d84d,2024-07-05T12:55:51.367000 -CVE-2024-37474,0,0,27892b3c50dd37af7a1a75e3d3fbcd24b0296e576855d96535eb10a6b108ece3,2024-07-05T12:55:51.367000 +CVE-2024-37474,0,1,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6ca41,2024-07-19T15:34:49.460000 CVE-2024-37476,0,0,a0f3320231f39c9c5889103930f7c304a498db0d6e09c95ec7c56af3d003c3dc,2024-07-05T12:55:51.367000 CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000 CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000 @@ -254266,7 +254268,7 @@ CVE-2024-37798,0,0,bc04f57588d0fb28785b030c799331a26805968021d11fbacde42d13b6803 CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7505,2024-07-03T02:04:44.730000 CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000 CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000 -CVE-2024-37802,0,0,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000 +CVE-2024-37802,0,1,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000 CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000 CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000 CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000 @@ -254298,7 +254300,7 @@ CVE-2024-37878,0,0,282b497331cb5e0e568eabcf2bb041155bba14f057968afb117714a18e582 CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000 CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000 CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000 -CVE-2024-37882,0,0,1591ef5f43033c48132d21762e3ee547f1087c0ab48932fd92dc93f9f374339e,2024-06-17T12:42:04.623000 +CVE-2024-37882,0,1,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000 CVE-2024-37883,0,0,c77acb00c6918b88f907a34f95c6331dd8026d26d9df45c23ee0d7fedcbaf4bb,2024-06-17T12:42:04.623000 CVE-2024-37884,0,0,952c4e8fbd193a9545d9e09eebd8595200777ddf3410e4c7d9e4c780747d8c23,2024-06-17T12:42:04.623000 CVE-2024-37885,0,0,0554ded4578d680ce028ccdfb1c66cc431ad3523cf98aaf322e17a30654cd453,2024-06-17T12:42:04.623000 @@ -254310,7 +254312,7 @@ CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f9984 CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000 CVE-2024-37891,0,0,ddade946d98463a2c8f8cfbb3e55e1c2664330986b4bd67bacc4915522a6cc76,2024-06-20T12:44:22.977000 CVE-2024-37893,0,0,1e621ca1efe8ed2ab7c42c8bab6b80feddd2af900ca46095cf7b6980e321a4b3,2024-06-20T12:44:22.977000 -CVE-2024-37894,0,0,424d8ed8a48fd7cd5e8c57134310a02f78cc91b6a429d6219c4e31dd01ead29b,2024-06-26T12:44:29.693000 +CVE-2024-37894,0,1,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a42dc,2024-07-19T14:15:05.957000 CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000 CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000 CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000 @@ -254447,7 +254449,7 @@ CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da CVE-2024-3813,0,0,255e2bbf5db93c0e3292fd35c927e47a1f392d6327b9d4c6707ef52776c11659,2024-06-17T12:42:04.623000 CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c18,2024-06-17T12:42:04.623000 CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000 -CVE-2024-38156,0,1,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 +CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000 CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 @@ -254480,7 +254482,7 @@ CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943d CVE-2024-38294,0,0,cfe666b9712fab71a124db5665eed08c4872b4737e6668b46d4396d88c0aebaa,2024-06-13T18:36:09.010000 CVE-2024-38295,0,0,03d5fac9c56dd868c4010b14a3eb31cfcfc8b05ace907fed84907dc669fa51ee,2024-06-13T18:36:09.010000 CVE-2024-38301,0,0,f2a37402ef8b0d31ff3ea0e1d564c9225d55bf4ff53ba3d88dbb3b4cbe725ed6,2024-07-11T13:05:54.930000 -CVE-2024-38302,0,1,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000 +CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000 CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000 CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000 CVE-2024-38312,0,0,62eb62b9d7b5ef969e29b7a666a055ad4f1c195d2f96322b61c091e6e406a8ac,2024-06-17T12:43:31.090000 @@ -254753,7 +254755,7 @@ CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9 CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000 CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 -CVE-2024-38806,0,1,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 +CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 @@ -254833,7 +254835,7 @@ CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26 CVE-2024-39072,0,0,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000 CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000 -CVE-2024-39090,0,1,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000 +CVE-2024-39090,0,0,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 @@ -254862,7 +254864,7 @@ CVE-2024-3916,0,0,f95518a402c56c15214d8c7d6dfe42604495d4bb38ccc0f52b32e4da2a1f88 CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 CVE-2024-39171,0,0,979bc13509f362c564b7984548b10a6ed307c7ff17f59734c1b5aba694dfcb6e,2024-07-12T17:15:38.200000 -CVE-2024-39173,0,1,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000 +CVE-2024-39173,0,0,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000 @@ -254958,7 +254960,7 @@ CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bde CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000 CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 -CVE-2024-39457,0,1,56e1deb6213e966d38aa162f6114a67ee205460480d1b6740f1a9974b4d73e7f,2024-07-19T13:01:44.567000 +CVE-2024-39457,0,0,56e1deb6213e966d38aa162f6114a67ee205460480d1b6740f1a9974b4d73e7f,2024-07-19T13:01:44.567000 CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000 CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000 CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000 @@ -255194,11 +255196,11 @@ CVE-2024-39901,0,0,2e70a8f9f46cc19984c51f63370a0f8333bfb1ff58b809a78b0486415e619 CVE-2024-39903,0,0,138b301be2353a9e3b0b27c4af1a1a55145a503c57863f4b07d601b2ac0aca9c,2024-07-12T16:34:58.687000 CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888843,2024-07-11T18:09:58.777000 CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000 -CVE-2024-39907,0,1,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000 +CVE-2024-39907,0,0,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000 CVE-2024-39908,0,0,08d14bdaf18f2ed74e9b6ee71dfe514c41d48f98781bfe1f038503cd39467df4,2024-07-17T13:34:20.520000 CVE-2024-39909,0,0,84d207bd7916a7aa0c749989b5f6df126cc82f60739ec52f44f8de2604f130ed,2024-07-12T16:34:58.687000 CVE-2024-3991,0,0,8fc5cec164b75a61473f46907d411f1d06a3bf1fdc70a00ae47e8c931a83fb1a,2024-05-02T18:00:37.360000 -CVE-2024-39911,0,1,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8dbf40,2024-07-19T13:01:44.567000 +CVE-2024-39911,0,0,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8dbf40,2024-07-19T13:01:44.567000 CVE-2024-39912,0,0,4436d60855b958a3375758a6aab42c07e9fab81e2780af44769632fe57f2c7e5,2024-07-16T13:43:58.773000 CVE-2024-39914,0,0,fc85dcd483038cc9947eead0920b62559c30fc46579f4bdee42403db053af4c1,2024-07-12T16:34:58.687000 CVE-2024-39915,0,0,5ec2bdefe8c5cab79f2425e6d7423ca1431bc3eed9fc27e781bc8d91b05089c7,2024-07-16T13:43:58.773000 @@ -255222,6 +255224,8 @@ CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d CVE-2024-3994,0,0,1a9bed43f4b2f43f8d685322cd3b5005094af7345fc065cd7144b7703ac2b568,2024-04-25T13:18:02.660000 CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 +CVE-2024-39962,1,1,b1aaa4e08376ce43b551fc23e10a14348461b89da0b769d5b76b6b4090edc3fc,2024-07-19T15:15:10.320000 +CVE-2024-39963,1,1,ee059b8c54354e03d7be8b8edac5b858d32e3796923f5746a1878d0fad50b757,2024-07-19T15:15:10.383000 CVE-2024-3997,0,0,1f2576b07f1c26f802b0f1e551eeeee57100d1eaa419296265017e09a1456b97,2024-05-24T01:15:30.977000 CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000 CVE-2024-4000,0,0,7c8c2f5334fecf0f2ab22d97b46108b7e41243cb0a54444d2343bca0b6a11052,2024-05-02T18:00:37.360000 @@ -255348,23 +255352,23 @@ CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616e CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000 CVE-2024-40626,0,0,39de0d110e3c1039d3a20d10cfa670212de054a0a02a529b738910a4f0544e46,2024-07-16T18:00:02.110000 CVE-2024-40627,0,0,9135682f430d5bd3e848a020970fdae52f5ba66833f8d323b6fb81718428c2a6,2024-07-16T13:43:58.773000 -CVE-2024-40628,0,1,97542434aaedd6d0d3469c237db978665a1c67f0643ba1911e47734618959708,2024-07-19T13:01:44.567000 -CVE-2024-40629,0,1,5aade287d48ab090ae707ebaff210653202d02d310a954cbbb601ee1614f7a9d,2024-07-19T13:01:44.567000 +CVE-2024-40628,0,0,97542434aaedd6d0d3469c237db978665a1c67f0643ba1911e47734618959708,2024-07-19T13:01:44.567000 +CVE-2024-40629,0,0,5aade287d48ab090ae707ebaff210653202d02d310a954cbbb601ee1614f7a9d,2024-07-19T13:01:44.567000 CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000 CVE-2024-40630,0,0,7de2616afe35fe6a2f4466f98346fd28ee106a7dd06220a48b0a183cb2c5ca6f,2024-07-16T13:43:58.773000 CVE-2024-40631,0,0,e76fc6e49d84a60697f94ea752f6e05b7f5417e39730b8ace11ee475f8eb8441,2024-07-16T13:43:58.773000 CVE-2024-40632,0,0,e6e0d67d4d0269bad5508951d35718e2d8be48cd6b922ab10030a5117e405f96,2024-07-16T13:43:58.773000 CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07b87,2024-07-18T12:28:43.707000 CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000 -CVE-2024-40637,0,0,54ffb49542381dd02d325bdc0440dd33e103feee559c71f6b3bfb9145dba117f,2024-07-17T13:34:20.520000 +CVE-2024-40637,0,1,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000 CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000 CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000 CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 -CVE-2024-40642,0,1,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 -CVE-2024-40644,0,1,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 -CVE-2024-40647,0,1,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 -CVE-2024-40648,0,1,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 +CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 +CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 +CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 +CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 CVE-2024-4067,0,0,9e7f1211bf79e7110903241dcc25ab8bd46e04dab02a9e051766a97ad7f670bf,2024-05-22T12:15:10.767000 @@ -255374,7 +255378,7 @@ CVE-2024-40690,0,0,0a05f7a4f7971e105a22713da576e2849ab9ee90c08902f265b260950371b CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000 -CVE-2024-40724,0,1,07e21dd8086f51b2f0ac6b15bc7615c27469a6b73a4728771314d2544f7ccb8c,2024-07-19T13:01:44.567000 +CVE-2024-40724,0,0,07e21dd8086f51b2f0ac6b15bc7615c27469a6b73a4728771314d2544f7ccb8c,2024-07-19T13:01:44.567000 CVE-2024-40725,0,0,11d004e87674b6d12438f654b88589fb007f4c0a9cd9fd16855d5d14c7be5722,2024-07-18T12:28:43.707000 CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000 CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000 @@ -255525,8 +255529,8 @@ CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71f CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000 CVE-2024-41007,0,0,3a5f8217b27f31f94659ee14ad4d3eb5769831e9479c2468b28332be75d954c4,2024-07-18T12:15:03.357000 CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000 -CVE-2024-41009,0,0,1ef19d3a6350817f09e7f0a1cc785e4d5b3dd9bf898020c5ce3302bfe332d3bc,2024-07-17T13:34:20.520000 -CVE-2024-41010,0,0,86472970e8578f9cf515f3b02e7178e84fc33304ffe01eed8e1ec71ca37e601c,2024-07-18T12:15:03.453000 +CVE-2024-41009,0,1,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000 +CVE-2024-41010,0,1,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000 CVE-2024-41011,0,0,5448bb43e82962b35456558e414651f36e8eafb86b92da98f77189318aaccec2,2024-07-18T12:28:43.707000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 @@ -255534,16 +255538,16 @@ CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45 CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000 CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000 CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000 -CVE-2024-41107,0,1,23274597458da7a9f06d14f567bbc9c55442ae3cacd9818d933bb7ba0a974592,2024-07-19T13:01:44.567000 +CVE-2024-41107,0,1,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d60165da,2024-07-19T14:15:06.080000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 -CVE-2024-41111,0,1,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000 +CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000 CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000 CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000 CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 -CVE-2024-41172,0,1,7ff2c1ab31750efec911d6f77936d20ab0d41d18e897382dcdb87b18ab700b32,2024-07-19T13:01:44.567000 +CVE-2024-41172,0,0,7ff2c1ab31750efec911d6f77936d20ab0d41d18e897382dcdb87b18ab700b32,2024-07-19T13:01:44.567000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 CVE-2024-41184,0,0,3aa7a7d3229054604eab34d61ec1dc93a7d382f6b0438d40096cf79453690f27,2024-07-18T14:15:05.137000 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 @@ -256512,11 +256516,11 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317 CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000 CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000 CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000 -CVE-2024-5251,0,0,4796cbb3b42f0a690ee03b3cd93b6294e6cec2e698949c47a2ce09d6d1f7aabc,2024-07-17T13:34:20.520000 -CVE-2024-5252,0,0,35e14245b82aa24bc3c367b1abfd026ee06fb2416bc15456ada1738976a26f10,2024-07-17T13:34:20.520000 -CVE-2024-5253,0,0,bf9183552c283029a0bdb30e3d7c77bba5cfa7fe6141ceea8ac0eb9c1982ed9e,2024-07-17T13:34:20.520000 -CVE-2024-5254,0,0,db3b82ed38e66cc455a38971516e009071894574c4da01a94cae994f4fcf4c33,2024-07-17T13:34:20.520000 -CVE-2024-5255,0,0,583678a17d043ddf4c248db87c3d2e96379310b5323b537393f97b7d62335487,2024-07-17T13:34:20.520000 +CVE-2024-5251,0,1,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 +CVE-2024-5252,0,1,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 +CVE-2024-5253,0,1,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 +CVE-2024-5254,0,1,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 +CVE-2024-5255,0,1,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 CVE-2024-5256,0,0,7546c1517da1882e18d942ab700b65cdd397cd67565c940d6efb24b85fa1c2bd,2024-06-07T14:56:05.647000 CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000 CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000 @@ -256573,7 +256577,7 @@ CVE-2024-5314,0,0,a7cdac28c15b59d972bbd1ad7f63aae58232f4c63fcf8544d4cfc91c709ee3 CVE-2024-5315,0,0,8579169b825e98cf3238daa1adb0a4d2ea9e4baf40a7a9906b16d52fd8bd309a,2024-05-24T13:03:05.093000 CVE-2024-5317,0,0,ca9413f34c0b442e0ebe516eaf4713c47241a346ee54ab90be673b58c28dbb75,2024-06-11T17:22:08.007000 CVE-2024-5318,0,0,57c4f59f6a451d6f05e81bdd8afab94c5de1c9afb56a5a0aa1d0fc569b3192c2,2024-05-24T18:09:20.027000 -CVE-2024-5321,0,1,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000 +CVE-2024-5321,0,0,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000 CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570df,2024-07-02T12:09:16.907000 CVE-2024-5324,0,0,5e2a0edd7d52fdd781c71961fc96e8e4892ea284c973f4fdaaac9fb76e2276bc,2024-06-06T14:17:35.017000 CVE-2024-5325,0,0,18c2f6d476daa18335c2e6768222449a066fc898992619a7b5e7a30be6df7d11,2024-07-12T16:34:58.687000 @@ -256795,7 +256799,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000 CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 -CVE-2024-5604,0,1,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000 +CVE-2024-5604,0,0,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000 CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000 CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000 CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000 @@ -256805,10 +256809,10 @@ CVE-2024-5612,0,0,c48d9d85ab6fb6f375c9bae41bb41f013f62cc7d97e523d92c986f223f9ac3 CVE-2024-5613,0,0,d9550d95a21bd950ae7717d597381d24b04054ec554e6d52d8ed280e70034f18,2024-06-10T02:52:08.267000 CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000 CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 -CVE-2024-5618,0,1,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5bd,2024-07-19T13:01:44.567000 -CVE-2024-5619,0,1,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000 -CVE-2024-5620,0,1,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000 -CVE-2024-5625,0,1,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000 +CVE-2024-5618,0,0,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5bd,2024-07-19T13:01:44.567000 +CVE-2024-5619,0,0,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000 +CVE-2024-5620,0,0,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000 +CVE-2024-5625,0,0,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000 CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000 CVE-2024-5627,0,0,b223ea977e14432dc305de4592ca7e0252873a120062584093cd834d6b6d0c82,2024-07-15T13:00:34.853000 CVE-2024-5629,0,0,7b249822418cf5aa1c707605ba6baf660f2f435a4da7f400697e48d05f897bc1,2024-06-18T18:31:05.663000 @@ -257049,7 +257053,7 @@ CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5974,0,0,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000 CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000 -CVE-2024-5977,0,1,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000 +CVE-2024-5977,0,0,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000 CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000 CVE-2024-5981,0,0,6efd4ce65d0be4286973240a22b49938ee7da116677222eebd9958d92f31bba4,2024-06-17T12:43:31.090000 @@ -257064,20 +257068,20 @@ CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2 CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000 CVE-2024-5995,0,0,8d0649a03e9f8bd101521287664fde419efa05e0cba1e926a7b9f4f0e9253177,2024-06-17T12:42:04.623000 CVE-2024-5996,0,0,918847ed31e9a63de46ac039dd01d572fa8e980691ed5ebebacc312a719edc7b,2024-06-17T12:42:04.623000 -CVE-2024-5997,0,1,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000 +CVE-2024-5997,0,0,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000 CVE-2024-6000,0,0,4ab86aa4bce235d1120437fd5cb3b34fb6bdae181005ebaa070e8c0afe83cf87,2024-06-17T12:42:04.623000 CVE-2024-6003,0,0,14279c0384813c4cf50ab75a79953f2b0469d9bedd7f76c2b6cebfd90962fd14,2024-06-17T16:15:16.027000 CVE-2024-6005,0,0,4d74c6c4a521a164f63a9fe529c141dc8da0592a0575e27e0e62d822beb9b877,2024-06-17T12:42:04.623000 CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d5f,2024-06-17T15:15:52.693000 CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000 -CVE-2024-6008,0,0,4981ff7807e88c1f8b4d359e2cef28bc1c5f6b09c66a566cffc45ed30847b945,2024-06-17T16:15:16.140000 -CVE-2024-6009,0,0,bff9169cd0b647f3240090ab5144b9bc1d53f891f5a2501a8dd424bcd87aba6e,2024-06-17T12:42:04.623000 +CVE-2024-6008,0,1,e339bd5f37f67074a3982bb584c73bf8dda0cb7cd7304fe99aa6ea6d9b2ef2e4,2024-07-19T14:52:08.110000 +CVE-2024-6009,0,1,e0a24374cca31358971f963f7084d5ca791c42b65310b9cca023d09b825a9a06,2024-07-19T14:24:41.657000 CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000 CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000 -CVE-2024-6013,0,0,4e5648a7dc6c96abe65307e6aa1037738e042c0ac9f6243b9c097655b6ee6cec,2024-06-17T12:42:04.623000 -CVE-2024-6014,0,0,c98f9e90e95e02a515d46acbf2b3153d6c1f93a5af25c259b597856be8d3673a,2024-06-17T12:42:04.623000 -CVE-2024-6015,0,0,346129762229c269cf6e307cf409b651125cd6b2d793094b9e036b88eb54e832,2024-06-17T15:15:52.830000 -CVE-2024-6016,0,0,095e7569a99cbe538193e07d7f4f79a2f81daca39e3152345de0c698955e57eb,2024-06-17T14:15:12.487000 +CVE-2024-6013,0,1,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2a9,2024-07-19T14:20:07.337000 +CVE-2024-6014,0,1,6f9e64ff8fbf43e19b3d7e24c13ad8adc071c58e85b8bf9a829322ea55abcf8f,2024-07-19T14:18:17.607000 +CVE-2024-6015,0,1,c2460029f18cca819988d11dbd49466b5328ee3d26de8c6ec6e0519debb7ea98,2024-07-19T14:13:10.463000 +CVE-2024-6016,0,1,db11fa4e2db5dca1bf67cd82c1ae54777d6d6de86c83abed9806f80a5c1a5385,2024-07-19T14:02:04.600000 CVE-2024-6022,0,0,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000 CVE-2024-6023,0,0,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000 CVE-2024-6024,0,0,0c9dac9804939f4358bda0a07a9c71c46e84018a1e951997775f9c46353d018f,2024-07-12T16:12:07.453000 @@ -257085,7 +257089,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702 CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000 CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000 -CVE-2024-6033,0,0,8cfff70812f0fd734249d7491b07b714d4db7a7e879c5b2b3eab35b868b9bc26,2024-07-17T13:34:20.520000 +CVE-2024-6033,0,1,752465a708ea245148cff8e77846a7ba88d4d0bef6b4e047d1479c5311cd83dd,2024-07-19T15:32:49.507000 CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000 CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 @@ -257205,7 +257209,7 @@ CVE-2024-6193,0,0,00fd76685b00c66c75878efc81598a588f58971e8df576cbee2d630c4caeff CVE-2024-6194,0,0,2fd14db6633e624a38e90bae695b4c4d57fa0e3aaeb642623d447d03f1402676,2024-06-21T11:22:01.687000 CVE-2024-6195,0,0,6a062efe55296f0b78677192fb0a748b37d8f49a4a61cffdf8e5d965a387b28b,2024-06-21T11:22:01.687000 CVE-2024-6196,0,0,ee53490a34820f9c77a5a8ca54b2af4db4b9298e709dd53453d8c4a657cc2768,2024-06-21T17:15:11.350000 -CVE-2024-6205,0,1,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000 +CVE-2024-6205,0,0,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000 CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 @@ -257291,7 +257295,7 @@ CVE-2024-6326,0,0,7f3dd075f877db7303a493f59304e094cd076f4bffd073b2a606c370e31f6e CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,cbe18bd9d2fe447b7a1ae02266749a6e6d80ba22cbea894f6c946ded39640177,2024-07-17T13:34:20.520000 -CVE-2024-6338,0,1,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000 +CVE-2024-6338,0,0,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 @@ -257354,13 +257358,13 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 -CVE-2024-6455,0,1,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000 +CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000 CVE-2024-6457,0,0,3f8fd462f3f8c08854de8c2b7a3218f7387f47da9a3a1dd75e4a135f6aa135cb,2024-07-16T13:43:58.773000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000 CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000 CVE-2024-6465,0,0,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000 -CVE-2024-6467,0,0,5b9ead3379b44b10c36af0988b505d8c9049b4b9963978db665ebe162faf6d93,2024-07-17T13:34:20.520000 +CVE-2024-6467,0,1,40d89c875ad7013f32015f1ef7736b3fb0ce3fd8c16e4649f7f0da01810ff45c,2024-07-19T15:37:51.067000 CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000 CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 @@ -257384,7 +257388,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 -CVE-2024-6535,0,0,ebcd6a15734c7bd515f473e3694f403e38dfdfb613934f319baf860afe37056e,2024-07-17T13:34:20.520000 +CVE-2024-6535,0,1,7e920196055804e6beeef53bb75ed2bd3a366087f8b193ad1d13704b3ca01837,2024-07-19T15:00:32.153000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 @@ -257401,7 +257405,7 @@ CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537 CVE-2024-6579,0,0,b286f5c4b3721fdb4257ac4cb9bb10daf8e7123999c9d4983b5d418f439447bf,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 -CVE-2024-6595,0,0,4de8f055bbd2e266590b849663cbe5d6660e39d6760c9305731e3e1ae9a12884,2024-07-17T13:34:20.520000 +CVE-2024-6595,0,1,97cf6a37af39b7f5832976478077fe225f57d63ffd9a5f39caf9eca8e3545339,2024-07-19T14:52:54.943000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 CVE-2024-6599,0,0,037851e9df9d617d8307f9b270a87bc534f61814e2c16dbf5d0d1ccdfb3dffc4,2024-07-18T12:28:43.707000 CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000 @@ -257435,11 +257439,11 @@ CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6655,0,0,0485248ee98682a7d1526979650a74114bd662162c8fc1626488ee79436e31bf,2024-07-16T18:00:02.110000 -CVE-2024-6660,0,0,e12123b0fdc1a4cf893451c502a4c949c34272dd4951db34e902a701cd340466,2024-07-17T13:34:20.520000 +CVE-2024-6660,0,1,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000 -CVE-2024-6669,0,0,1827a5cd80b70c7e4a072fdca8a75608d4a1b643851076680e62b92828d5825a,2024-07-17T13:34:20.520000 +CVE-2024-6669,0,1,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000 CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000 CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000 @@ -257478,23 +257482,25 @@ CVE-2024-6777,0,0,a56d95e067795760df390f3c029e1e701f64cddc2191775e9444fd4f0151a2 CVE-2024-6778,0,0,fdea16e148384a7e3dcb709a8443d007c41fffe85566adafe1ded010eb26487c,2024-07-17T13:34:20.520000 CVE-2024-6779,0,0,a0c53973235d650b76f5a317527d64babc63b7437f664de7c206225fae1a5344,2024-07-17T13:34:20.520000 CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000 -CVE-2024-6799,0,1,261c5f62ba7eb23f22b0dcfaa72979cb179b4af28583aa3634c3f6ae02c8d066,2024-07-19T13:01:44.567000 -CVE-2024-6801,0,0,162a1f556795709c33618b00251776b5d64e78443324e3312f382d4754aaf838,2024-07-17T13:34:20.520000 -CVE-2024-6802,0,0,386226bce7b12b7500a7728e6323db5d69291b7883c492fa520631c141d51c93,2024-07-17T13:34:20.520000 -CVE-2024-6803,0,0,698fb954222e7db5d1598623eedb3617e795f993f29a35b3e0ac7c1569604491,2024-07-17T13:34:20.520000 -CVE-2024-6807,0,0,60acf58925408625a444a0bb6ffc77398b3b984199e5b0e4e7ba5e371b31f55b,2024-07-17T13:34:20.520000 -CVE-2024-6808,0,0,9e957ba9065e9b12c070f25b75e9ca36ec77b27a404450e1a18818d5661c0932,2024-07-18T16:15:08.300000 +CVE-2024-6799,0,0,261c5f62ba7eb23f22b0dcfaa72979cb179b4af28583aa3634c3f6ae02c8d066,2024-07-19T13:01:44.567000 +CVE-2024-6801,0,1,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 +CVE-2024-6802,0,1,28d3acf4fd2d79095dac148cf5494a8bae6c6a9f871caa0540dd765a2bd6262d,2024-07-19T14:58:12.707000 +CVE-2024-6803,0,1,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 +CVE-2024-6807,0,1,e7a9e356d2137bfb067b0761eea1a41e11da3606f29d9b24e33a8982fadc5d78,2024-07-19T15:03:08.933000 +CVE-2024-6808,0,1,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000 CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000 CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000 -CVE-2024-6898,0,1,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000 -CVE-2024-6899,0,1,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000 -CVE-2024-6900,0,1,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000 -CVE-2024-6901,0,1,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000 -CVE-2024-6902,0,1,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000 -CVE-2024-6903,0,1,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000 -CVE-2024-6904,0,1,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000 -CVE-2024-6905,0,1,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000 -CVE-2024-6906,0,1,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000 -CVE-2024-6907,0,1,3d839b35437f0dd0faf9914e897ddc2454e64f962bdd094121c84723df304c00,2024-07-19T13:01:44.567000 -CVE-2024-6916,0,1,96455c03765030601aeb6ca7398864bb6cd18912db996a417121b3c4bb1540e3,2024-07-19T13:01:44.567000 +CVE-2024-6895,1,1,0c486e88c5dc57ed2713d59c6e5f599844da09fd6e820a24b10235451464145d,2024-07-19T15:15:10.547000 +CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000 +CVE-2024-6899,0,0,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000 +CVE-2024-6900,0,0,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000 +CVE-2024-6901,0,0,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000 +CVE-2024-6902,0,0,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000 +CVE-2024-6903,0,0,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000 +CVE-2024-6904,0,0,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000 +CVE-2024-6905,0,0,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000 +CVE-2024-6906,0,0,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000 +CVE-2024-6907,0,0,3d839b35437f0dd0faf9914e897ddc2454e64f962bdd094121c84723df304c00,2024-07-19T13:01:44.567000 +CVE-2024-6908,1,1,43e596b9986e083f26060cdbf20a02be417ad9fa3161f7053b7c41e2528f0046,2024-07-19T15:15:10.747000 +CVE-2024-6916,0,0,96455c03765030601aeb6ca7398864bb6cd18912db996a417121b3c4bb1540e3,2024-07-19T13:01:44.567000