diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7515.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7515.json index 78d09332c93..4abea486ba1 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7515.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7515.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7515", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.270", - "lastModified": "2017-05-09T12:40:02.777", + "lastModified": "2024-07-03T15:16:39.567", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7516.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7516.json index 443b4bf22cb..b841b294187 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7516.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7516.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7516", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:00.937", - "lastModified": "2017-05-09T12:40:00.260", + "lastModified": "2024-07-03T15:23:36.440", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7517.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7517.json index e6c87dfab7f..41aac2cd2ae 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7517.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7517.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7517", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:00.967", - "lastModified": "2017-05-09T12:39:56.680", + "lastModified": "2024-07-03T15:17:05.433", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7518.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7518.json index 366a7b60ffb..33340999644 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7518.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7518.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7518", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.013", - "lastModified": "2017-05-09T12:39:53.323", + "lastModified": "2024-07-03T15:24:22.567", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7519.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7519.json index 07a3b715a63..c56ea6267f4 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7519.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7519.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7519", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.317", - "lastModified": "2017-05-09T12:39:50.057", + "lastModified": "2024-07-03T15:23:33.607", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7520.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7520.json index 89bd3072278..8e1fb51ab7c 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7520.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7520.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7520", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.060", - "lastModified": "2017-05-09T12:39:45.993", + "lastModified": "2024-07-03T15:20:18.050", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7521.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7521.json index 7ba1388caad..a0bdcf03700 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7521.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7521.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7521", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.093", - "lastModified": "2017-05-09T12:39:43.383", + "lastModified": "2024-07-03T15:20:33.760", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7522.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7522.json index 34fc361ad60..a0fcbeec9c2 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7522.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7522.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7522", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.367", - "lastModified": "2017-05-09T12:39:40.680", + "lastModified": "2024-07-03T15:20:47.917", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7523.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7523.json index 263ef240618..4cc70322b25 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7523.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7523.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7523", "sourceIdentifier": "security@debian.org", "published": "2020-02-06T14:15:10.737", - "lastModified": "2020-02-10T14:15:40.907", + "lastModified": "2024-07-03T15:21:09.250", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7524.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7524.json index 0a0ac571844..43e5a09e7ee 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7524.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7524.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7524", "sourceIdentifier": "security@debian.org", "published": "2020-02-06T14:15:10.830", - "lastModified": "2020-02-10T14:15:18.203", + "lastModified": "2024-07-03T15:21:23.107", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7525.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7525.json index 306efaeffd3..50945fe00e9 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7525.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7525.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7525", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.140", - "lastModified": "2017-05-09T12:39:38.103", + "lastModified": "2024-07-03T15:21:41.860", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7526.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7526.json index aba9ae555db..cc3c9da1c3c 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7526.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7526.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7526", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.187", - "lastModified": "2020-11-16T19:39:56.297", + "lastModified": "2024-07-03T15:21:49.110", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7527.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7527.json index 221c5b08b06..8527360e1ff 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7527.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7527.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7527", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.217", - "lastModified": "2020-11-16T19:37:51.120", + "lastModified": "2024-07-03T15:22:01.010", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7528.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7528.json index 7a35c6375f7..aaf1984d9a4 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7528.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7528.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7528", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.397", - "lastModified": "2020-11-16T19:36:05.883", + "lastModified": "2024-07-03T15:22:10.600", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7529.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7529.json index d06afc309c6..96b2c304bdb 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7529.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7529.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7529", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.443", - "lastModified": "2017-05-09T12:39:23.460", + "lastModified": "2024-07-03T15:22:20.367", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7530.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7530.json index caf79684780..7471231cfff 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7530.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7530.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7530", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.263", - "lastModified": "2017-05-09T12:39:19.320", + "lastModified": "2024-07-03T15:22:34.133", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7533.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7533.json index bb79f9db6b7..eb81220db2c 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7533.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7533.json @@ -2,8 +2,9 @@ "id": "CVE-2016-7533", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.520", - "lastModified": "2017-05-09T12:39:08.790", + "lastModified": "2024-07-03T15:23:17.167", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2021/CVE-2021-277xx/CVE-2021-27798.json b/CVE-2021/CVE-2021-277xx/CVE-2021-27798.json index 6710ac5c55e..ff6abc296b2 100644 --- a/CVE-2021/CVE-2021-277xx/CVE-2021-27798.json +++ b/CVE-2021/CVE-2021-277xx/CVE-2021-27798.json @@ -2,8 +2,16 @@ "id": "CVE-2021-27798", "sourceIdentifier": "sirt@brocade.com", "published": "2022-08-05T16:15:10.807", - "lastModified": "2024-05-17T01:55:38.763", + "lastModified": "2024-07-03T15:15:05.193", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "sirt@brocade.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-313xx/CVE-2022-31362.json b/CVE-2022/CVE-2022-313xx/CVE-2022-31362.json index efff79e106a..d4ff97f85b6 100644 --- a/CVE-2022/CVE-2022-313xx/CVE-2022-31362.json +++ b/CVE-2022/CVE-2022-313xx/CVE-2022-31362.json @@ -2,8 +2,16 @@ "id": "CVE-2022-31362", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-23T17:15:13.123", - "lastModified": "2024-05-17T02:09:31.817", + "lastModified": "2024-07-03T14:15:04.330", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40297.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40297.json index 28873408fbe..47fd29f9c87 100644 --- a/CVE-2022/CVE-2022-402xx/CVE-2022-40297.json +++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40297.json @@ -2,8 +2,16 @@ "id": "CVE-2022-40297", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-09T00:15:08.793", - "lastModified": "2024-05-17T02:13:18.643", + "lastModified": "2024-07-03T15:15:05.423", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json index 67b59af97d3..59860c57481 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1427", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-02T06:15:02.253", - "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:44:40.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.7.2", + "matchCriteriaId": "0181ECD4-44C0-432C-80B6-70123A9FBE22" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json index 1ee62ad941a..52d1b060e06 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1931", "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2024-03-07T10:15:07.037", - "lastModified": "2024-04-28T04:15:11.000", + "lastModified": "2024-07-03T15:15:05.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -63,6 +64,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/", "source": "sep@nlnetlabs.nl" }, + { + "url": "https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html", + "source": "sep@nlnetlabs.nl" + }, { "url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt", "source": "sep@nlnetlabs.nl" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json index ad61b98d4f4..9fcbb2a7778 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27857", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.833", - "lastModified": "2024-07-03T01:51:14.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-03T15:43:17.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,42 +81,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.5", + "matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jun/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214101", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214102", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214106", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214108", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214101", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214102", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214106", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214108", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json index e18df6fb9d2..e8bf53e9c29 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27885", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.903", - "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-03T15:44:29.397", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,31 +15,116 @@ "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.5", + "matchCriteriaId": "3121F2A4-6F9C-4E03-837E-2A4C2B65CB09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.7", + "matchCriteriaId": "2D797210-B0F0-44AE-9028-47C18C22AFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.5", + "matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214105", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214106", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214107", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214105", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214106", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214107", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32937.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32937.json new file mode 100644 index 00000000000..19fa6824e72 --- /dev/null +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32937.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-32937", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-07-03T14:15:05.340", + "lastModified": "2024-07-03T15:15:05.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An os command injection vulnerability exists in the CWMP SelfDefinedTimeZone functionality of Grandstream GXP2135 1.0.9.129, 1.0.11.74 and 1.0.11.79. A specially crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1978", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json index bc312b1b5ae..23020602877 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json @@ -2,17 +2,41 @@ "id": "CVE-2024-34696", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T15:15:16.907", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:42:49.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice." + }, + { + "lang": "es", + "value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. A partir de la versi\u00f3n 2.10.0 y antes de las versiones 2.24.4 y 2.25.1, la p\u00e1gina Estado del servidor de GeoServer y la API REST enumeran todas las variables de entorno y propiedades de Java para cualquier usuario de GeoServer con derechos administrativos como parte del mensaje de estado de esos m\u00f3dulos. Estas variables/propiedades tambi\u00e9n pueden contener informaci\u00f3n confidencial, como contrase\u00f1as de bases de datos o keys/tokens API. Adem\u00e1s, muchas im\u00e1genes de contenedores de GeoServer desarrolladas por la comunidad \"exportan\" otras credenciales desde sus scripts de inicio como variables de entorno al proceso de GeoServer (\"java\"). El alcance preciso del problema depende de qu\u00e9 imagen de contenedor se utiliza y c\u00f3mo est\u00e1 configurada. El endpoint API \"acerca del estado\" que impulsa la p\u00e1gina Estado del servidor solo est\u00e1 disponible para los administradores. Dependiendo del entorno operativo, los administradores pueden tener acceso leg\u00edtimo a las credenciales de otras maneras, pero este problema anula controles m\u00e1s sofisticados (como el acceso sin barreras a secretos o cuentas de rol). De forma predeterminada, GeoServer solo permite el acceso API autenticado del mismo origen. Esto limita las posibilidades de que un atacante externo utilice las credenciales de un administrador para obtener acceso a las credenciales. Los investigadores que encontraron la vulnerabilidad no pudieron determinar otras condiciones bajo las cuales la API REST de GeoServer pueda estar disponible de manera m\u00e1s amplia. Los usuarios deben actualizar las im\u00e1genes del contenedor para usar GeoServer 2.24.4 o 2.25.1 para corregir el error. Como workaround, deje las variables de entorno y las propiedades del sistema Java ocultas de forma predeterminada. Quienes brinden la opci\u00f3n de volver a habilitarlo deben comunicar el impacto y los riesgos para que los usuarios puedan tomar una decisi\u00f3n informada." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,10 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.24.4", + "matchCriteriaId": "779270D7-89BA-47CA-A5E5-4539668BC18E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.25.0", + "versionEndExcluding": "2.25.1", + "matchCriteriaId": "F63F5E42-FB6D-4264-BF8A-17DEB863054C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json index fbd9260fbf8..cfd029ce355 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json @@ -2,17 +2,41 @@ "id": "CVE-2024-36401", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T16:15:04.120", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:07:42.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed." + }, + { + "lang": "es", + "value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. Antes de las versiones 2.23.6, 2.24.4 y 2.25.2, varios par\u00e1metros de solicitud de OGC permit\u00edan la ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de usuarios no autenticados a trav\u00e9s de entradas especialmente dise\u00f1adas en una instalaci\u00f3n predeterminada de GeoServer debido a la evaluaci\u00f3n insegura de nombres de propiedades como expresiones XPath. La API de la librer\u00eda GeoTools a la que llama GeoServer eval\u00faa los nombres de propiedades/atributos para tipos de entidades de una manera que los pasa de manera insegura a la librer\u00eda commons-jxpath, que puede ejecutar c\u00f3digo arbitrario al evaluar expresiones XPath. Esta evaluaci\u00f3n XPath est\u00e1 destinada a ser utilizada \u00fanicamente por tipos de funciones complejas (es decir, almacenes de datos de esquemas de aplicaci\u00f3n), pero tambi\u00e9n se aplica incorrectamente a tipos de funciones simples, lo que hace que esta vulnerabilidad se aplique a **TODAS** las instancias de GeoServer. No se proporciona ninguna PoC p\u00fablica, pero se ha confirmado que esta vulnerabilidad es explotable a trav\u00e9s de solicitudes WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic y WPS Execute. Esta vulnerabilidad puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario. Las versiones 2.23.6, 2.24.4 y 2.25.2 contienen un parche para el problema. Existe una workaround eliminando el archivo `gt-complex-xyjar` del GeoServer donde `xy` es la versi\u00f3n de GeoTools (por ejemplo, `gt-complex-31.1.jar` si ejecuta GeoServer 2.25.1). Esto eliminar\u00e1 el c\u00f3digo vulnerable de GeoServer, pero puede interrumpir algunas funciones de GeoServer o evitar que GeoServer se implemente si se necesita el m\u00f3dulo gt-complex." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,26 +81,97 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.23.6", + "matchCriteriaId": "9C28BE03-93E6-4FC4-AA6E-00E41AF25CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.24.0", + "versionEndExcluding": "2.24.4", + "matchCriteriaId": "6A407E94-A7F2-4A4F-B96E-2B3DC8FF6DF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.25.0", + "versionEndExcluding": "2.25.2", + "matchCriteriaId": "CFBAEC7A-6250-45FE-AB54-30D72C03F62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*", + "versionEndExcluding": "29.6", + "matchCriteriaId": "732DE428-3515-459F-AE5F-08407BA1A049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*", + "versionStartIncluding": "30.0", + "versionEndExcluding": "30.4", + "matchCriteriaId": "D3B2BC3D-0015-4E5D-979A-AB7D18185A57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.0", + "versionEndExcluding": "31.2", + "matchCriteriaId": "50BB4154-B19C-4BFD-8E88-9ED445680706" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://github.com/geotools/geotools/pull/4797", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://osgeo-org.atlassian.net/browse/GEOT-7587", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json index 8b93a19714b..036979e4ce4 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json @@ -2,17 +2,41 @@ "id": "CVE-2024-36420", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T16:15:04.377", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:29:45.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available." + }, + { + "lang": "es", + "value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, el endpoint `/api/v1/openai-assistants-file` en `index.ts` es vulnerable a la lectura arbitraria de archivos debido a la falta de sanitizaci\u00f3n del par\u00e1metro del cuerpo `fileName`. No hay parches conocidos disponibles para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json index c261a5b2236..a5cdc177047 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json @@ -2,17 +2,41 @@ "id": "CVE-2024-36421", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T16:15:04.623", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:36:31.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + }, + { + "lang": "es", + "value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, una mala configuraci\u00f3n de CORS establece el encabezado Access-Control-Allow-Origin en todos, lo que permite que or\u00edgenes arbitrarios se conecten al sitio web. En la configuraci\u00f3n predeterminada (no autenticado), or\u00edgenes arbitrarios pueden realizar solicitudes a Flowise, robando informaci\u00f3n del usuario. Esta configuraci\u00f3n err\u00f3nea de CORS puede estar encadenada con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json index d0efb2b2a9b..b7c39045183 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json @@ -2,17 +2,41 @@ "id": "CVE-2024-36422", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T16:15:04.860", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:38:24.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + }, + { + "lang": "es", + "value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, se produce una vulnerabilidad de cross-site scripting reflejado en el endpoint `api/v1/chatflows/id`. Si se utiliza la configuraci\u00f3n predeterminada (no autenticada), un atacante puede crear una URL especialmente manipulada que inyecta Javascript en las sesiones del usuario, lo que le permite robar informaci\u00f3n, crear ventanas emergentes falsas o incluso redirigir al usuario a otros sitios web sin interacci\u00f3n. Si no se encuentra el ID del flujo de chat, su valor se refleja en la p\u00e1gina 404, que tiene el tipo texto/html. Esto permite a un atacante adjuntar scripts arbitrarios a la p\u00e1gina, lo que le permite robar informaci\u00f3n confidencial. Este XSS puede encadenarse con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso directo a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -47,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json new file mode 100644 index 00000000000..f478542084c --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37726.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37726", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-03T14:15:06.120", + "lastModified": "2024-07-03T14:15:06.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Permissions vulnerability in Micro-Star International Co., Ltd MSI Center v.2.0.36.0 allows a local attacker to escalate privileges via the Export System Info function in MSI.CentralServer.exe" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json index c0cefbc9376..d6e13acc837 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37741", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T13:15:02.860", - "lastModified": "2024-07-03T02:04:40.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-03T14:27:08.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openplcproject:openplc_v3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7624BE59-886B-421D-96CC-105F185AE070" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6861E863-E6AC-4BFB-8CDE-2328A045540D" + } + ] + } + ] + } + ], "references": [ { "url": "https://1d8.github.io/cves/cve_2024_37741/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json index cfcfc93bc33..de3934a4cee 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json @@ -2,17 +2,54 @@ "id": "CVE-2024-3800", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T13:15:02.990", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:36:22.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." + }, + { + "lang": "es", + "value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en los nombres de archivos solicitados. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -24,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.3", + "matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/06/CVE-2024-3800", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json index ada3f2d0b04..dfcddfb6ffe 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json @@ -2,17 +2,54 @@ "id": "CVE-2024-3801", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T13:15:03.157", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:36:52.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." + }, + { + "lang": "es", + "value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en uno de los par\u00e1metros del encabezado GET. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -24,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.3", + "matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/06/CVE-2024-3800", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json index ecee2d328bd..d38e119ad3d 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json @@ -2,17 +2,54 @@ "id": "CVE-2024-3816", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T13:15:03.283", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:37:07.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." + }, + { + "lang": "es", + "value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a una inyecci\u00f3n SQL ciega ejecutada mediante la barra de b\u00fasqueda. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -24,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.3", + "matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/06/CVE-2024-3800", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39220.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39220.json new file mode 100644 index 00000000000..ea566ad21e6 --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39220.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-39220", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-03T15:15:05.993", + "lastModified": "2024-07-03T15:15:05.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA-04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD before firmware v3.9.2 allows authenticated attackers to read SIP account passwords via a crafted GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bas-ip.com/bsa-000001", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DrieVlad/BAS-IP-vulnerabilities", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json new file mode 100644 index 00000000000..7927dd76b35 --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-39223", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-03T15:15:06.083", + "lastModified": "2024-07-03T15:15:06.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authentication bypass in the SSH service of gost v2.11.5 allows attackers to intercept communications via setting the HostKeyCallback function to ssh.InsecureIgnoreHostKey" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/nyxfqq/a7242170b1118e78436a62dee4e09e8a", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ginuerzh/gost/blob/729d0e70005607dc7c69fc1de62fd8fe21f85355/ssh.go#L229", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ginuerzh/gost/issues/1034", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json index ee6c073ab43..d40df22ad02 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json @@ -2,24 +2,87 @@ "id": "CVE-2024-39704", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T13:15:02.927", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:32:56.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318." + }, + { + "lang": "es", + "value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code hasta 1.07 Rev. 1.4.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario en la m\u00e1quina de un cliente a trav\u00e9s de un paquete manipulado en el puerto TCP 46318." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unknown-corp:melty_blood_actress_again_current_code:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.07", + "matchCriteriaId": "AFE0E80B-E798-4931-9952-54D596CCE5A7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://pastebin.com/agpnQmhu", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json index 688d7e644b0..a1d778de8bc 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3999", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:04.050", - "lastModified": "2024-07-03T02:06:58.680", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:44:56.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spider-themes:eazydocs:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.0", + "matchCriteriaId": "D84E69AF-BB0B-4BB9-B5EA-6D03511649A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json index 6b517e75cd8..8e8bbb4235d 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4627", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:04.400", - "lastModified": "2024-07-03T02:07:51.527", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:45:08.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.0.219", + "matchCriteriaId": "D3446436-48C0-417A-A0E8-53AD3E2F8298" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5349.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5349.json index fd31058c4df..22de2f39607 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5349.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5349", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-02T05:15:10.470", - "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:44:23.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:la-studioweb:element_kit_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.9", + "matchCriteriaId": "2AB75FE2-C692-4F70-8726-45F5000C98BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3108501/lastudio-element-kit/trunk/includes/addons/google-maps.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e29a67b-2b67-4cd5-a5ae-a931900c75cd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5419.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5419.json index 5994713d3c0..5137ad1719d 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5419.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5419", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-02T04:15:03.417", - "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:43:09.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "135B2D6F-B132-456B-A8C8-317BD02A7DB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/cf7-widget-elementor/tags/2.4/widgets/void-section-cf7.php#L1672", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3109802/#file6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2837c9b2-419e-453a-b011-5ec1ef050d62?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json index 6186cfebacc..536ea644dbb 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5606", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:04.760", - "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:45:19.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 es vulnerable, no valida ni escapa el par\u00e1metro question_id en la acci\u00f3n AJAX qsm_bulk_delete_question_from_database, lo que lleva a una inyecci\u00f3n de SQL explotable por los Colaboradores y roles superiores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.0.2", + "matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json index 6f90e9ae181..800c14a638c 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5735", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T12:15:10.117", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:45:57.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de ruta completa en AdmirorFrames Joomla! La extensi\u00f3n en el script afHelper.php permite a un atacante no autorizado recuperar la ubicaci\u00f3n de la carpeta ra\u00edz web. Este problema afecta a AdmirorFrames: anteriores a 5.0." } ], "metrics": { @@ -55,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -69,26 +105,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*", + "versionEndExcluding": "5.0", + "matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/afine-com/CVE-2024-5735", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/vasiljevski/admirorframes/issues/3", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json index e793a4a987c..7979e76128b 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5736", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T12:15:10.923", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:46:08.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en AdmirorFrames Joomla! La extensi\u00f3n en el script afGdStream.php permite acceder a archivos locales o p\u00e1ginas del servidor disponibles solo desde localhost. Este problema afecta a AdmirorFrames: anteriores a 5.0." } ], "metrics": { @@ -55,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -69,26 +105,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*", + "versionEndExcluding": "5.0", + "matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/afine-com/CVE-2024-5736", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/vasiljevski/admirorframes/issues/3", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json index 93395220050..584764f442d 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5737", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T12:15:11.060", - "lastModified": "2024-06-28T13:38:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:09:22.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0." + }, + { + "lang": "es", + "value": "Script afGdStream.php en AdmirorFrames Joomla! La extensi\u00f3n no especifica un tipo de contenido y, como resultado, se utiliza el valor predeterminado (texto/html). Un atacante puede incrustar etiquetas HTML directamente en datos de im\u00e1genes que una p\u00e1gina web representa como HTML. Este problema afecta a AdmirorFrames: anteriores a 5.0." } ], "metrics": { @@ -55,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -69,26 +105,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*", + "versionEndExcluding": "5.0", + "matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/afine-com/CVE-2024-5737", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/vasiljevski/admirorframes/issues/3", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json index 3e36b074192..d905fe76db2 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5767", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:05.063", - "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:26:29.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "El complemento sitetweet de WordPress hasta la versi\u00f3n 0.2 no tiene control CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sitetweet_project:sitetweet:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.2", + "matchCriteriaId": "45A2DEB6-4F70-4E8A-9744-9EC3474517FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json new file mode 100644 index 00000000000..4d894be8749 --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6052", + "sourceIdentifier": "security@checkmk.com", + "published": "2024-07-03T15:15:06.223", + "lastModified": "2024-07-03T15:15:06.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@checkmk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@checkmk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://checkmk.com/werk/17010", + "source": "security@checkmk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json new file mode 100644 index 00000000000..16eb2c22410 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6126", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-07-03T15:15:06.470", + "lastModified": "2024-07-03T15:15:06.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-6126", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292897", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json index 188d19de331..d96e0e9d9f9 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json @@ -2,17 +2,41 @@ "id": "CVE-2024-6375", "sourceIdentifier": "cna@mongodb.com", "published": "2024-07-01T15:15:17.430", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T14:54:52.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3." + }, + { + "lang": "es", + "value": "A un comando para refinar una clave de fragmento de colecci\u00f3n le falta una verificaci\u00f3n de autorizaci\u00f3n. Esto puede hacer que el comando se ejecute directamente en un fragmento, lo que provoca una degradaci\u00f3n del rendimiento de la consulta o revela l\u00edmites de fragmentos a trav\u00e9s de canales laterales de temporizaci\u00f3n. Esto afecta a las versiones de MongoDB Server v5.0, anteriores a la 5.0.22, a las versiones de MongoDB Server v6.0, anteriores a la 6.0.11 y a las versiones de MongoDB Server v7.0 anteriores a la 7.0.3." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "cna@mongodb.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "cna@mongodb.com", "type": "Secondary", @@ -47,10 +81,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.22", + "matchCriteriaId": "52107780-5C9C-4DE0-9D16-89F128662C49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.11", + "matchCriteriaId": "E8EEF504-8B18-4258-89AA-CDA99F3E5875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.3", + "matchCriteriaId": "301B06FC-E692-4D15-8E45-86268D648D6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://jira.mongodb.org/browse/SERVER-79327", - "source": "cna@mongodb.com" + "source": "cna@mongodb.com", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json index 809acde1bf5..2e1358bcb32 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json @@ -2,17 +2,41 @@ "id": "CVE-2024-6376", "sourceIdentifier": "cna@mongodb.com", "published": "2024-07-01T15:15:17.673", - "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-03T15:04:52.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2" + }, + { + "lang": "es", + "value": "MongoDB Compass puede ser susceptible a la inyecci\u00f3n de c\u00f3digo debido a una configuraci\u00f3n insuficiente de protecci\u00f3n de la zona de pruebas con el uso del analizador de shell ejson en el manejo de conexiones de Compass. Este problema afecta a las versiones de MongoDB Compass anteriores a la versi\u00f3n 1.42.2" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@mongodb.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "cna@mongodb.com", "type": "Secondary", @@ -47,10 +81,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.2", + "matchCriteriaId": "2C0CC548-DDB4-4527-AEBC-1993B3E39EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://jira.mongodb.org/browse/COMPASS-7496", - "source": "cna@mongodb.com" + "source": "cna@mongodb.com", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json new file mode 100644 index 00000000000..5c128f00f10 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6471.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-6471", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-03T14:15:06.490", + "lastModified": "2024-07-03T14:15:06.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management 1.0. This affects an unknown part of the file sms_setting.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270279." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://blog.csdn.net/ENTICE1208/article/details/140141934", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.270279", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.270279", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.367953", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index df3037780a8..fc0790b4e77 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-03T14:02:10.825146+00:00 +2024-07-03T16:01:48.944347+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-03T13:33:20.297000+00:00 +2024-07-03T15:46:08.877000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255812 +255819 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `7` -- [CVE-2024-5672](CVE-2024/CVE-2024-56xx/CVE-2024-5672.json) (`2024-07-03T13:15:03.043`) -- [CVE-2024-6426](CVE-2024/CVE-2024-64xx/CVE-2024-6426.json) (`2024-07-03T12:15:03.150`) -- [CVE-2024-6427](CVE-2024/CVE-2024-64xx/CVE-2024-6427.json) (`2024-07-03T12:15:03.430`) -- [CVE-2024-6470](CVE-2024/CVE-2024-64xx/CVE-2024-6470.json) (`2024-07-03T13:15:03.703`) +- [CVE-2024-32937](CVE-2024/CVE-2024-329xx/CVE-2024-32937.json) (`2024-07-03T14:15:05.340`) +- [CVE-2024-37726](CVE-2024/CVE-2024-377xx/CVE-2024-37726.json) (`2024-07-03T14:15:06.120`) +- [CVE-2024-39220](CVE-2024/CVE-2024-392xx/CVE-2024-39220.json) (`2024-07-03T15:15:05.993`) +- [CVE-2024-39223](CVE-2024/CVE-2024-392xx/CVE-2024-39223.json) (`2024-07-03T15:15:06.083`) +- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-07-03T15:15:06.223`) +- [CVE-2024-6126](CVE-2024/CVE-2024-61xx/CVE-2024-6126.json) (`2024-07-03T15:15:06.470`) +- [CVE-2024-6471](CVE-2024/CVE-2024-64xx/CVE-2024-6471.json) (`2024-07-03T14:15:06.490`) ### CVEs modified in the last Commit -Recently modified CVEs: `49` +Recently modified CVEs: `45` -- [CVE-2024-39206](CVE-2024/CVE-2024-392xx/CVE-2024-39206.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39315](CVE-2024/CVE-2024-393xx/CVE-2024-39315.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39324](CVE-2024/CVE-2024-393xx/CVE-2024-39324.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39325](CVE-2024/CVE-2024-393xx/CVE-2024-39325.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39326](CVE-2024/CVE-2024-393xx/CVE-2024-39326.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39353](CVE-2024/CVE-2024-393xx/CVE-2024-39353.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39361](CVE-2024/CVE-2024-393xx/CVE-2024-39361.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39807](CVE-2024/CVE-2024-398xx/CVE-2024-39807.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39830](CVE-2024/CVE-2024-398xx/CVE-2024-39830.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-03T13:15:02.890`) -- [CVE-2024-39920](CVE-2024/CVE-2024-399xx/CVE-2024-39920.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-4482](CVE-2024/CVE-2024-44xx/CVE-2024-4482.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-4543](CVE-2024/CVE-2024-45xx/CVE-2024-4543.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-4708](CVE-2024/CVE-2024-47xx/CVE-2024-4708.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6263](CVE-2024/CVE-2024-62xx/CVE-2024-6263.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6340](CVE-2024/CVE-2024-63xx/CVE-2024-6340.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6381](CVE-2024/CVE-2024-63xx/CVE-2024-6381.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6382](CVE-2024/CVE-2024-63xx/CVE-2024-6382.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-03T13:15:03.493`) -- [CVE-2024-6428](CVE-2024/CVE-2024-64xx/CVE-2024-6428.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6452](CVE-2024/CVE-2024-64xx/CVE-2024-6452.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6453](CVE-2024/CVE-2024-64xx/CVE-2024-6453.json) (`2024-07-03T12:53:24.977`) -- [CVE-2024-6469](CVE-2024/CVE-2024-64xx/CVE-2024-6469.json) (`2024-07-03T12:53:24.977`) +- [CVE-2024-1427](CVE-2024/CVE-2024-14xx/CVE-2024-1427.json) (`2024-07-03T15:44:40.083`) +- [CVE-2024-1931](CVE-2024/CVE-2024-19xx/CVE-2024-1931.json) (`2024-07-03T15:15:05.560`) +- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-07-03T15:43:17.007`) +- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-07-03T15:44:29.397`) +- [CVE-2024-34696](CVE-2024/CVE-2024-346xx/CVE-2024-34696.json) (`2024-07-03T14:42:49.743`) +- [CVE-2024-36401](CVE-2024/CVE-2024-364xx/CVE-2024-36401.json) (`2024-07-03T15:07:42.777`) +- [CVE-2024-36420](CVE-2024/CVE-2024-364xx/CVE-2024-36420.json) (`2024-07-03T15:29:45.557`) +- [CVE-2024-36421](CVE-2024/CVE-2024-364xx/CVE-2024-36421.json) (`2024-07-03T15:36:31.170`) +- [CVE-2024-36422](CVE-2024/CVE-2024-364xx/CVE-2024-36422.json) (`2024-07-03T15:38:24.297`) +- [CVE-2024-37741](CVE-2024/CVE-2024-377xx/CVE-2024-37741.json) (`2024-07-03T14:27:08.057`) +- [CVE-2024-3800](CVE-2024/CVE-2024-38xx/CVE-2024-3800.json) (`2024-07-03T14:36:22.273`) +- [CVE-2024-3801](CVE-2024/CVE-2024-38xx/CVE-2024-3801.json) (`2024-07-03T14:36:52.797`) +- [CVE-2024-3816](CVE-2024/CVE-2024-38xx/CVE-2024-3816.json) (`2024-07-03T14:37:07.750`) +- [CVE-2024-39704](CVE-2024/CVE-2024-397xx/CVE-2024-39704.json) (`2024-07-03T14:32:56.510`) +- [CVE-2024-3999](CVE-2024/CVE-2024-39xx/CVE-2024-3999.json) (`2024-07-03T15:44:56.130`) +- [CVE-2024-4627](CVE-2024/CVE-2024-46xx/CVE-2024-4627.json) (`2024-07-03T15:45:08.187`) +- [CVE-2024-5349](CVE-2024/CVE-2024-53xx/CVE-2024-5349.json) (`2024-07-03T15:44:23.807`) +- [CVE-2024-5419](CVE-2024/CVE-2024-54xx/CVE-2024-5419.json) (`2024-07-03T15:43:09.450`) +- [CVE-2024-5606](CVE-2024/CVE-2024-56xx/CVE-2024-5606.json) (`2024-07-03T15:45:19.513`) +- [CVE-2024-5735](CVE-2024/CVE-2024-57xx/CVE-2024-5735.json) (`2024-07-03T15:45:57.677`) +- [CVE-2024-5736](CVE-2024/CVE-2024-57xx/CVE-2024-5736.json) (`2024-07-03T15:46:08.877`) +- [CVE-2024-5737](CVE-2024/CVE-2024-57xx/CVE-2024-5737.json) (`2024-07-03T14:09:22.483`) +- [CVE-2024-5767](CVE-2024/CVE-2024-57xx/CVE-2024-5767.json) (`2024-07-03T15:26:29.050`) +- [CVE-2024-6375](CVE-2024/CVE-2024-63xx/CVE-2024-6375.json) (`2024-07-03T14:54:52.427`) +- [CVE-2024-6376](CVE-2024/CVE-2024-63xx/CVE-2024-6376.json) (`2024-07-03T15:04:52.463`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 923b3f00647..70525ba2ac3 100644 --- a/_state.csv +++ b/_state.csv @@ -90436,25 +90436,25 @@ CVE-2016-7510,0,0,1779d722e1e3abcce643f3990841f703ae46a4e3e7f1fe529ffead6d50061a CVE-2016-7511,0,0,61e45c42288f92ed219bf7af9d1eebb46bd81957c5eaf585ba2634d48c3cbb81,2022-03-01T14:30:27.027000 CVE-2016-7513,0,0,f3d58cf54ee5cc2b5f44e21575d4af3e7368d520a46e2dc28b8c8d9f5f3fb390,2017-05-09T12:40:08.853000 CVE-2016-7514,0,0,5acf4c11c6b23e52c011f5a018c2c2d90c756ec80883de77cf9634931bafa504,2017-05-09T12:40:05.697000 -CVE-2016-7515,0,0,8335ec89d3b69556f658943cd45115cda1b3ad0170dcd5f33a693e91e75a647a,2017-05-09T12:40:02.777000 -CVE-2016-7516,0,0,dc00e35f4b14c9b3a5e2393e045f38f4ca3058fd0d88058f81bbd114e82f8fe3,2017-05-09T12:40:00.260000 -CVE-2016-7517,0,0,cae4a9021f8c6b24d69e74a964a23c761f46a0ef032301d0403500a83530e742,2017-05-09T12:39:56.680000 -CVE-2016-7518,0,0,e44c44e9af0ad7221c32d73bd55787a24594dab4bf5fbecb788c0722c9a82aa4,2017-05-09T12:39:53.323000 -CVE-2016-7519,0,0,48abfeaf70b2b93e677bd5ad1c54531c4b013a123c508cb1a2b4868cda9c8a96,2017-05-09T12:39:50.057000 -CVE-2016-7520,0,0,8675f7f6001b6f933e8c681a7b1990fc67310de9ae93d72b0c1a893eb58f0c9d,2017-05-09T12:39:45.993000 -CVE-2016-7521,0,0,e3f2b76578e137cff20a485b0cc75441b6730b1e7fb7796ad8f2f44062118381,2017-05-09T12:39:43.383000 -CVE-2016-7522,0,0,c3c6c82172f5a1233846580b5edc56aec6ecaef9ab4a92ff578a44fb00223b73,2017-05-09T12:39:40.680000 -CVE-2016-7523,0,0,50dca58580cd78b20739cdfbf227b34cc617e8e4568bfb3975aa098ff36b0718,2020-02-10T14:15:40.907000 -CVE-2016-7524,0,0,6108f244a4ee1cc990698125f9da3fdd61b2b2255b7e4e07de38a624bb5f19e2,2020-02-10T14:15:18.203000 -CVE-2016-7525,0,0,0699ab481775613d23891b4f338e2d7cd11551c5326896711f3ed3d706cec560,2017-05-09T12:39:38.103000 -CVE-2016-7526,0,0,90da6ce2733cdbd7e7d4333b8952b53b9fed1f61d51f8634f16efcdfda70a1e7,2020-11-16T19:39:56.297000 -CVE-2016-7527,0,0,c72655326862b8292653f51074d141ee78fba673e82c7f5679c057ee38b0806c,2020-11-16T19:37:51.120000 -CVE-2016-7528,0,0,e6e8407aee98e532990eb5340b712ecb7e72972b42501e3a7757fe91c6ecab1b,2020-11-16T19:36:05.883000 -CVE-2016-7529,0,0,4d58b906ef227eb004895d75595dcbd4c0183a62beb2720c9de995ecda4f8357,2017-05-09T12:39:23.460000 -CVE-2016-7530,0,0,d9bc05def810b9da8532adfc595a9a397dabe0925319a92e656af3f45715f13f,2017-05-09T12:39:19.320000 +CVE-2016-7515,0,1,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000 +CVE-2016-7516,0,1,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000 +CVE-2016-7517,0,1,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000 +CVE-2016-7518,0,1,c57244a716e7ab0556596acc51d32b901d7b3eadab1f15f85c056c01ecd21d1e,2024-07-03T15:24:22.567000 +CVE-2016-7519,0,1,70699c133d2441078f7f4d30b8096de84a4d22f60eff27facd14aa994b106686,2024-07-03T15:23:33.607000 +CVE-2016-7520,0,1,d25b55ff825e16fbdb286b4905082bc39f3c8d5f89ce9016285e6765c9befc0f,2024-07-03T15:20:18.050000 +CVE-2016-7521,0,1,ecff0a82b907397233ff4a3f7994ba7a05bc18e9489c91c2b2a4f04888f27e6c,2024-07-03T15:20:33.760000 +CVE-2016-7522,0,1,0f2318969e17069bd3a2cc23db3cbfd02ac91fd63091a4da607379f4602f307b,2024-07-03T15:20:47.917000 +CVE-2016-7523,0,1,81afb97facadafaf98e4cf71b37bec404c0305cb8747f4511dc526ae0104d0bd,2024-07-03T15:21:09.250000 +CVE-2016-7524,0,1,a5ccddebd6162757a051cd005775bf0135905bae1479300855e017885dda4f9d,2024-07-03T15:21:23.107000 +CVE-2016-7525,0,1,6cfc8323236f9ba0441ab9f3c1aebca91e972e9feb03f0c011ac6f8c22863b1b,2024-07-03T15:21:41.860000 +CVE-2016-7526,0,1,ea8a140b9c9a22fb6f394bb3f5dc9c6786ec9edd7f940d729c09fd88b648b97e,2024-07-03T15:21:49.110000 +CVE-2016-7527,0,1,95861de21872f14f8012815df306132ca4c4ec0ee42221e09d57528c086234df,2024-07-03T15:22:01.010000 +CVE-2016-7528,0,1,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b6255,2024-07-03T15:22:10.600000 +CVE-2016-7529,0,1,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000 +CVE-2016-7530,0,1,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000 CVE-2016-7531,0,0,f254a92940c7423fd73ff710e03b79d4d929be67d2537f3cb9bec6848a5ef628,2017-05-09T12:39:15.447000 CVE-2016-7532,0,0,809a94082802a4face8a9254ec7175501e10c205d92aa5b1330f0cee57b2adb7,2017-05-09T12:39:12.837000 -CVE-2016-7533,0,0,f8529d644609cab03ecc261e74050dc40f1870a20a589550cbe46f28258c0799,2017-05-09T12:39:08.790000 +CVE-2016-7533,0,1,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000 CVE-2016-7534,0,0,bceb0238cb8ce38db11107a89888e488bbdb754e0bd6a6d35f4addc83364c973,2017-05-09T12:39:03.697000 CVE-2016-7535,0,0,23fadd8cbcc8163a830df0d83144ba1cd318528b25b6b58138132d55347c5bbf,2017-05-09T12:38:58.727000 CVE-2016-7536,0,0,4b02a4d8372a703d7d8b994f35aa31e84f2c877453f888a1d7c73b17cadfb25c,2020-11-16T19:34:51.070000 @@ -95267,7 +95267,7 @@ CVE-2017-11309,0,0,0a1015ad413714840fd17bdb185f1070c94f45d2b31bf8df3eae1b31bfd6c CVE-2017-1131,0,0,6097510a934b58e996eedd162fa96e251a8c69f87fa9344db179b52fae37d20b,2017-06-27T01:29:00.780000 CVE-2017-11310,0,0,56b936587222c5c48de0aa3a4968d9e7406c62f8c69628e2b7b86d8e6b29417e,2019-10-03T00:03:26.223000 CVE-2017-11311,0,0,90cdd67c89f76972e750afb94ff98b31a502d7f8df9bebdf7df8cf4fae2d7581,2017-07-27T01:30:09.713000 -CVE-2017-11317,0,1,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000 +CVE-2017-11317,0,0,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000 CVE-2017-11318,0,0,873b3b942be64b72e00ede40092823f6d4f16af03d741a696bb1672693f3e88d,2017-08-07T18:48:45.740000 CVE-2017-11319,0,0,f9e5ba563f877740060c1429e268873b1045d0570effb97efb4ddc73ac52fc09,2019-10-03T00:03:26.223000 CVE-2017-1132,0,0,3753fbeb602509c19bbf232f979c0cf13effaf9be4bd299eceae899413f255b3,2017-06-27T01:29:00.827000 @@ -172757,7 +172757,7 @@ CVE-2021-27794,0,0,5902753dd3a47ac44d61ce05dcba1f7b330e85fa17e8176e91a0923c27e21 CVE-2021-27795,0,0,f335211bb2ba6ce8ee545f6882567e515644e4901ba6200771713d168f749dec,2023-12-11T19:44:39.613000 CVE-2021-27796,0,0,980d4cf765b69ffde1fdfff98c2b85c39dc01b92a5e37275f92f055a12379a1c,2022-03-01T23:43:08.080000 CVE-2021-27797,0,0,0870ff126239a4e5f86bc10712ec007b6ec52054473b47d89b72aeadc12b0f5e,2022-03-01T16:09:03.430000 -CVE-2021-27798,0,0,530c4ae9b2b37aa0bc4adc42227a5bde18a9b92e23c523b1ff578d0c66b51f58,2024-05-17T01:55:38.763000 +CVE-2021-27798,0,1,b5806bfc660dc90e93ffa902dcf25d7957e45c3e8c4a0ebb0757bd1ebb50e403,2024-07-03T15:15:05.193000 CVE-2021-27799,0,0,d0ee11302a63b3ea6271e540a0af8af46a88a1457074166c885a7131a2a9c36c,2021-03-10T16:59:06.673000 CVE-2021-27802,0,0,0981e3e97b8714a98f050af16eacca81b240a96d94957da281ba951efb0d6c99,2023-11-07T03:32:01.343000 CVE-2021-27803,0,0,679f77f0866982accd53b086375067dd27d2b62dec0e43e395886545a3abeff6,2023-11-07T03:32:01.380000 @@ -172777,7 +172777,7 @@ CVE-2021-27845,0,0,27cb14f9d81d75cf37f66d513914098129e2c9d54a1efbef43b698e6ec3d2 CVE-2021-27847,0,0,4cf1fd0379081a029d66fa26d168bd2c43e45765e7eeb80369436f7543702298,2023-09-29T11:18:03.783000 CVE-2021-27850,0,0,ae1e4d711acbf93339f3f5768281261f381eb85bce7c33e584fe39ab7469964d,2021-06-02T15:15:24.743000 CVE-2021-27851,0,0,87df816154ae443a8ab20fda387988a009fd8b3e4ce9c62e18ca04a19430b28b,2022-07-29T16:34:08 -CVE-2021-27852,0,1,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000 +CVE-2021-27852,0,0,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000 CVE-2021-27853,0,0,2190e5b9e70d6aaa8444bfefac172608cba6fdc4ca02e42f4588c939dcb8c904,2022-11-16T17:26:33.420000 CVE-2021-27854,0,0,702202158f71ed2ac3bf9ea57dc1eb53096d0d64aa7b77c1a59fab044dce83bd,2022-10-12T13:15:10.407000 CVE-2021-27855,0,0,7bf2b99b844c425075ceabde2e33edefdaaaa742621b6194b09423c55d06494d,2022-10-29T02:58:34.047000 @@ -183602,7 +183602,7 @@ CVE-2021-42274,0,0,5fe086d50763566c992a71f303150c7a3fb31e0e7ea54b731945b48adbc10 CVE-2021-42275,0,0,68fbee182e3e5e235f5dab48ff67db5861054648192ae667fd45691d6c2d8855,2023-12-28T16:15:54.560000 CVE-2021-42276,0,0,cba257dd2610587252c0b30a0f6c17e6ce094ed26ee7ef7c888da2ef3a9547bf,2023-12-28T16:15:54.763000 CVE-2021-42277,0,0,c99f72b4dfb97cbc34be38c0b68b72470eda5fc36135ae6e129bc3d819ee89ed,2023-12-28T16:15:54.970000 -CVE-2021-42278,0,1,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000 +CVE-2021-42278,0,0,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000 CVE-2021-42279,0,0,632d8f89c71a38d5480b12f205614381121bf4159617260406a55e81fe114c94,2023-12-28T16:15:55.363000 CVE-2021-4228,0,0,93e491af6c6b2b147521fd6dd3f3bc75f943340ce2fe2bd78fcdd33793a3aaad,2023-02-03T13:52:26.017000 CVE-2021-42280,0,0,d341f543ea9165319ef5363ed48f3eba6dc753f5b125f982e963d9d421c38191,2023-12-28T16:15:55.567000 @@ -193521,7 +193521,7 @@ CVE-2022-24517,0,0,e79c91bcb3b68c52828825c5ff897cb06a35a224accc6eaadc9f204413d37 CVE-2022-24518,0,0,5538572c537b65ea02a0df690f4981398b2f38dd3d6737fb0dc62b48d9d87042,2023-08-08T14:22:24.967000 CVE-2022-24519,0,0,1acf09adea2addc45cd1f8a1bba6e14d1a8e6a450aad26061db4b802473be0a8,2023-08-08T14:22:24.967000 CVE-2022-24520,0,0,23e43fae09c725a7acbd1fbdee71bd0cdd417371a852bdfb65928bb05a74d42c,2023-06-29T02:15:15.267000 -CVE-2022-24521,0,1,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000 +CVE-2022-24521,0,0,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000 CVE-2022-24522,0,0,8e4c1c707fb0dbb6e272e25b8ce9d9115f051bb7037004f4c39d824c952297df,2023-08-08T14:22:24.967000 CVE-2022-24523,0,0,faca6eb1725f9e2af1f2a19aaad5b494587d75e16caac5f32dd9f7b87170c477,2023-06-29T01:15:29.707000 CVE-2022-24525,0,0,32a11adb8270a4ea8950c8b2227729e32f8fafc96e46255f0fca9cbabfa0de9b,2023-06-29T02:15:15.457000 @@ -194354,10 +194354,10 @@ CVE-2022-25464,0,0,231fd3080576b3684ae82435ee901df2499bdd2b12996f22985cb04f4c481 CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000 CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000 CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000 -CVE-2022-25477,0,1,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000 -CVE-2022-25478,0,1,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000 -CVE-2022-25479,0,1,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000 -CVE-2022-25480,0,1,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000 +CVE-2022-25477,0,0,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000 +CVE-2022-25478,0,0,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000 +CVE-2022-25479,0,0,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000 +CVE-2022-25480,0,0,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000 CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000 CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000 CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000 @@ -198507,7 +198507,7 @@ CVE-2022-30632,0,0,f214153a7d78a1f18ea22ef856e8035d77e066ffe05cf4d3cd2d155a8fe2b CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000 CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000 CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000 -CVE-2022-30636,0,1,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000 +CVE-2022-30636,0,0,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000 CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000 CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000 CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000 @@ -199167,7 +199167,7 @@ CVE-2022-31357,0,0,0117d3bd77cde592c54614f7b9b3ba07e3620b33e1ed372ed0aa3d61842da CVE-2022-31358,0,0,99e295cf2650192fb9061fc7fb33a864e05c69c246c6175b92e491b13dffdb4b,2023-11-07T03:47:37.213000 CVE-2022-3136,0,0,348faa475dc105d9dc7ca0b6825af678dd4a6880325fcaad1f62607b87f27634,2022-10-12T16:42:29.870000 CVE-2022-31361,0,0,7c7a13a509ccc79dce98e213c13410afb594204a49db8971d4b7261121c52936,2024-05-17T02:09:31.713000 -CVE-2022-31362,0,0,c1da100c9bc04ee11e70dd090864de98b2758f14b734d9419060088dbd0cd2cb,2024-05-17T02:09:31.817000 +CVE-2022-31362,0,1,ce3fa4bd27c48417b8e9f66ae424852288eeffe718d961d070c2335e776696f6,2024-07-03T14:15:04.330000 CVE-2022-31363,0,0,2cdc9f5e6bce1c868cd6a6cc903c192623e0a62d2cb3e21d517c37c48e27d60d,2023-02-09T20:44:48.020000 CVE-2022-31364,0,0,16c44bc65c1ef1e94a01ddd40700a46a03bbda2d51fb3d63a950d1bba09e434c,2023-02-09T20:50:44.917000 CVE-2022-31366,0,0,67f42e566e099c711c555187131c25df8d6f9a820fd3a367aef31e2c71645659,2022-10-21T16:18:59.077000 @@ -206054,7 +206054,7 @@ CVE-2022-40293,0,0,c609d733a24235de62748fe66d7225f5f2be4a1b7d6ebfda78738adee232d CVE-2022-40294,0,0,ff48ea8004771e1ad176e146f4141a6bf1f6af63ded7d0439b11976237a989c7,2023-10-25T18:17:16.443000 CVE-2022-40295,0,0,417ec344689cf18cbe6163ad761fda8fbef5dbddd7bb733ed5d647c1fc9bc1ff,2023-10-25T18:17:16.503000 CVE-2022-40296,0,0,78154ab5bcd8116e5b7f62a9e5e2fcfc3da41d5ec60b414a2189a3fe32758d33,2023-10-25T18:17:16.567000 -CVE-2022-40297,0,0,43a551162cb7e0b0dee481c87c9b0cbc1426beef0c59b47d89fd0295b3b288b0,2024-05-17T02:13:18.643000 +CVE-2022-40297,0,1,d23b1493b99457a642376f24446356d15b5924fb33aca414b8962424b633c31e,2024-07-03T15:15:05.423000 CVE-2022-40298,0,0,9d356f1450e16dd5ebda560da24d68d82018f96f198840edce14165bb2a990d5,2023-08-08T14:21:49.707000 CVE-2022-40299,0,0,36f3dfca3faf782369516a7311b05a02ea5b584f3c6b04e15d95bc7724ba6eb1,2023-08-08T14:22:24.967000 CVE-2022-4030,0,0,7a8aeb590d9751df9668da3c2f397b6e07abe04112fccee4a2e1be5dd56e675e,2023-11-07T03:56:45.093000 @@ -217972,7 +217972,7 @@ CVE-2023-24528,0,0,899533432d6d75cedea57fd4563bb59a08ab30d04e09c55b0e4759297d9a5 CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000 CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000 CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000 -CVE-2023-24531,0,1,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000 +CVE-2023-24531,0,0,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000 CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000 CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000 CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000 @@ -241889,7 +241889,7 @@ CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe7 CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000 CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000 CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000 -CVE-2024-1427,0,0,63dddd2d42d3e35c84d49f8aaa22caa244648752e9da148e60af21d3fce7beb2,2024-07-02T12:09:16.907000 +CVE-2024-1427,0,1,192e94c8c1db3f7bb99c2eb13227bbd24cc5d98969af5836b6320be2953a05b7,2024-07-03T15:44:40.083000 CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000 CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000 CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000 @@ -242336,7 +242336,7 @@ CVE-2024-1927,0,0,31be343b20122f13e26ef76f7f4fe10a59226978014536249707ce2d72de81 CVE-2024-1928,0,0,b3421eda40eadd8f94f725465ed49c06463a4553cfbc0b59715a025d1f01d712,2024-05-17T02:35:42.223000 CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000 CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000 -CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11 +CVE-2024-1931,0,1,74525c1ab84bdef9a56fce2ad1f66433b6d371babf800064dbee863c8b3d6ae8,2024-07-03T15:15:05.560000 CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000 CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000 CVE-2024-1934,0,0,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000 @@ -242603,8 +242603,8 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 -CVE-2024-20399,0,1,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000 -CVE-2024-2040,0,1,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000 +CVE-2024-20399,0,0,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000 +CVE-2024-2040,0,0,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000 CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 @@ -243861,7 +243861,7 @@ CVE-2024-22306,0,0,5427f196cd2fc064fa3cdf34238c9c0432fe7231acc9557add0074b844121 CVE-2024-22307,0,0,612500eeac06983bafbc014843c236d8c463241187c2baf6a06b160bc5b163de,2024-02-06T15:52:58.037000 CVE-2024-22308,0,0,f72408efdea3f3f2120dbeafd0b38992093a473ba2aa0a2b4bc8ffb90cf9e200,2024-01-30T17:45:59.927000 CVE-2024-22309,0,0,1093afc20ffe4dba6071bc2d2a5c666f7d5a7f27092b0aa5704b12fac569bad5,2024-01-30T22:18:55.947000 -CVE-2024-2231,0,1,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000 +CVE-2024-2231,0,0,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000 CVE-2024-22310,0,0,97f58d74bad578babbc5c2fb902488ef3a20e73ec8d238c07475dac86db860dd,2024-02-06T16:08:42.910000 CVE-2024-22311,0,0,1b2896f06b8d2a60f5f4320525fd0e0a2ff9a9add83fae0db40bd38deadccd39,2024-03-27T12:29:30.307000 CVE-2024-22312,0,0,502cad1c70aca19be54f1a146a057702eb2ad6518581e46eff801281d9dde1eb,2024-02-15T04:38:23.153000 @@ -243873,7 +243873,7 @@ CVE-2024-22320,0,0,b7e6bc5c871bb2a076b1c4d217e351ebb443d568b1fdbb86f9513f16f0da1 CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000 CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000 CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000 -CVE-2024-2233,0,1,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000 +CVE-2024-2233,0,0,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000 CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000 CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000 CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000 @@ -243883,12 +243883,12 @@ CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3 CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000 CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000 CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000 -CVE-2024-2234,0,1,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000 +CVE-2024-2234,0,0,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000 CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000 CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000 CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000 CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000 -CVE-2024-2235,0,1,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000 +CVE-2024-2235,0,0,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000 CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000 CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000 CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000 @@ -244715,7 +244715,7 @@ CVE-2024-23745,0,0,0997a46b1366c968f7b9f767523f67b6c77ab399053d9f0736951af88cf15 CVE-2024-23746,0,0,4231b3151cad9797b59bfa65c9d1a0aba18262be508b41df48aa646e6b64ee48,2024-03-21T02:52:08.563000 CVE-2024-23747,0,0,e5badc646080ce0998e1e81852fb21e000c7398188715a4f0ce89130386d9ea5,2024-02-02T02:03:39.093000 CVE-2024-23749,0,0,e489f7636c813784a61d3812299289346709b8bf63acb59822c186709b469431,2024-02-14T13:59:39.353000 -CVE-2024-2375,0,1,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000 +CVE-2024-2375,0,0,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000 CVE-2024-23750,0,0,8e012c8bf46e4d6b122cd9676a67ed8063eceaae10c8b41283586e2acd25aff1,2024-01-29T16:51:14.573000 CVE-2024-23751,0,0,f4277632a799f5e0167c42d856d852fb64898f90e4d81aec065a43806c32cb6a,2024-01-29T15:06:44.003000 CVE-2024-23752,0,0,18d704b9462928669577bd2ecf8e771bfdc29bdedea9912638fd3f521668a073,2024-01-29T19:27:17.040000 @@ -244723,7 +244723,7 @@ CVE-2024-23755,0,0,20f404ef06f0de4002ad00bfcb3ecba797133c7898cd26c253955293bcb6e CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000 CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000 CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000 -CVE-2024-2376,0,1,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000 +CVE-2024-2376,0,0,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000 CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000 CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000 CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000 @@ -245273,7 +245273,7 @@ CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68 CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000 CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000 -CVE-2024-24791,0,1,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000 +CVE-2024-24791,0,0,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000 CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 @@ -247536,12 +247536,12 @@ CVE-2024-27850,0,0,e1d4379d6b3d34c01ebe4dd5e7858f8de64aeb5953240c61d195d17d1f48e CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000 CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000 CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000 -CVE-2024-27857,0,0,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000 +CVE-2024-27857,0,1,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000 CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000 CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000 -CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000 +CVE-2024-27885,0,1,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000 CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000 CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000 CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000 @@ -250653,7 +250653,7 @@ CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66 CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000 -CVE-2024-32673,0,1,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000 +CVE-2024-32673,0,0,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000 CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000 CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000 @@ -250890,6 +250890,7 @@ CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000 CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000 +CVE-2024-32937,1,1,78a388a1ecaf925d74c3df02d2c7aa0b4c157156f6027d67bc22546b8a4aa00c,2024-07-03T15:15:05.803000 CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000 CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000 @@ -251868,7 +251869,7 @@ CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25 CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000 CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000 CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000 -CVE-2024-34696,0,0,1697446274bb3cd395c26226b01c7397470c20a75a90bbad0605ce462858be0c,2024-07-01T16:37:39.040000 +CVE-2024-34696,0,1,fc37f1f871594e87cfe2d19d9897a201f28cf21e82debe0acdfd6232ba7f8f65,2024-07-03T14:42:49.743000 CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000 CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000 CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000 @@ -252912,7 +252913,7 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000 -CVE-2024-36257,0,1,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000 +CVE-2024-36257,0,0,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000 CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000 CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000 CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000 @@ -252980,7 +252981,7 @@ CVE-2024-36397,0,0,b682d6f470c0dada217073740a5ad29ca1b1f9032f70f4edd7bab7bdfb1f6 CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000 -CVE-2024-36401,0,0,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000 +CVE-2024-36401,0,1,4e7824d6e0ba409db0bd3352043278eb790179388b8d748fbe3f7bbd11d705c2,2024-07-03T15:07:42.777000 CVE-2024-36404,0,0,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000 CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000 CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000 @@ -252999,9 +253000,9 @@ CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513 CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000 CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 -CVE-2024-36420,0,0,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df602,2024-07-01T16:37:39.040000 -CVE-2024-36421,0,0,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000 -CVE-2024-36422,0,0,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000 +CVE-2024-36420,0,1,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000 +CVE-2024-36421,0,1,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000 +CVE-2024-36422,0,1,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000 CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000 CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000 CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 @@ -253336,7 +253337,7 @@ CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985 CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000 CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000 CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000 -CVE-2024-37082,0,1,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000 +CVE-2024-37082,0,0,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000 CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000 CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000 @@ -253554,10 +253555,11 @@ CVE-2024-37699,0,0,e6aa9aad96c5cb91a6fa4201b1b47001ba232f78e3136af80ddfa6d4248f5 CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000 CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 +CVE-2024-37726,1,1,cf8c8adbac07e4ab41cdbeea022956581b212f36b844acfc4ccad3eb7e389f64,2024-07-03T14:15:06.120000 CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000 CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 -CVE-2024-37741,0,0,3c71ffbbf01e4a0e4425969bd458658ba5fb7e837c3a88f69ccf919fc0b22481,2024-07-03T02:04:40.153000 +CVE-2024-37741,0,1,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000 CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000 @@ -253629,8 +253631,8 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027 CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000 CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000 CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000 -CVE-2024-3800,0,0,0aee6a42b2039215c9eaef826d097369b3f1d3a7d2da64d84dcd5461a8ce6887,2024-06-28T13:38:47.077000 -CVE-2024-3801,0,0,fcfad6b0ce02399c7d678f395fb128f6fba813bc23e60b051d597cd380d4b8e6,2024-06-28T13:38:47.077000 +CVE-2024-3800,0,1,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 +CVE-2024-3801,0,1,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000 CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000 CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000 @@ -253647,7 +253649,7 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000 CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000 CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000 -CVE-2024-3816,0,0,2c60ea3e6d8885876bc73fbf9a3e32dbc86d267cf2e909cefcb1e686654852dd,2024-06-28T13:38:47.077000 +CVE-2024-3816,0,1,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000 CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000 CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000 CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000 @@ -253732,7 +253734,7 @@ CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000 CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000 CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000 -CVE-2024-38453,0,1,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000 +CVE-2024-38453,0,0,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000 CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000 CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000 CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000 @@ -253782,7 +253784,7 @@ CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 -CVE-2024-38537,0,1,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000 +CVE-2024-38537,0,0,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000 @@ -253995,12 +253997,14 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 -CVE-2024-39206,0,1,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000 +CVE-2024-39206,0,0,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000 CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 +CVE-2024-39220,1,1,ee539c7dd926c4141adfea89a293da82fc291d0c8bbf25ffc9e07f033b77b6dd,2024-07-03T15:15:05.993000 +CVE-2024-39223,1,1,edd1c5b1f2e5387a540545af51f1838c7b3d17fcd3fbb559bc7e28e94aed9c4c,2024-07-03T15:15:06.083000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000 CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000 @@ -254031,14 +254035,14 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880 CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000 CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000 CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000 -CVE-2024-39315,0,1,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 +CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000 CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000 -CVE-2024-39322,0,1,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 +CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000 -CVE-2024-39324,0,1,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 -CVE-2024-39325,0,1,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 -CVE-2024-39326,0,1,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 +CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 +CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 +CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 @@ -254049,9 +254053,9 @@ CVE-2024-39349,0,0,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32 CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000 CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000 CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000 -CVE-2024-39353,0,1,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000 +CVE-2024-39353,0,0,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 -CVE-2024-39361,0,1,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000 +CVE-2024-39361,0,0,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000 CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000 @@ -254103,7 +254107,7 @@ CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 -CVE-2024-39704,0,0,46d48385d4d162b3ac12c54e9ccb839ccae9f35d96e3edd9d9bfd3968e019316,2024-06-28T13:38:47.077000 +CVE-2024-39704,0,1,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 @@ -254112,9 +254116,9 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91 CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000 CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 -CVE-2024-39807,0,1,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000 +CVE-2024-39807,0,0,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000 CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000 -CVE-2024-39830,0,1,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000 +CVE-2024-39830,0,0,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 @@ -254126,17 +254130,17 @@ CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b7 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 -CVE-2024-39891,0,1,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000 -CVE-2024-39894,0,1,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000 +CVE-2024-39891,0,0,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000 +CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 -CVE-2024-39920,0,1,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 +CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 -CVE-2024-3999,0,0,d855e263f238cc0580530dcbe41b732e5a7fc792eec652c4279dc80589279eed,2024-07-03T02:06:58.680000 +CVE-2024-3999,0,1,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 @@ -254524,7 +254528,7 @@ CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd35951 CVE-2024-4479,0,0,5ea4f16cbb65b856fd1892d7f18a0653a4e499cdb8b18f25028aa3d91283004d,2024-06-17T12:42:04.623000 CVE-2024-4480,0,0,585ced159bf2873044aaa034a55a2124aa433419daa101a5837cc3efb9afe316,2024-06-17T12:42:04.623000 CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000 -CVE-2024-4482,0,1,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000 +CVE-2024-4482,0,0,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000 CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000 CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000 CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000 @@ -254584,7 +254588,7 @@ CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000 CVE-2024-4541,0,0,4a3da304d2331b57d3e541aebfe20ad4a144b63766e310ccc54304f1be43b1dd,2024-06-20T12:44:01.637000 CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000 -CVE-2024-4543,0,1,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000 +CVE-2024-4543,0,0,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000 CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000 CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000 CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000 @@ -254657,7 +254661,7 @@ CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e861 CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000 CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000 CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000 -CVE-2024-4627,0,0,54bd30bead354294b48fe249d643bc73bcc7d1380abeeb01ca2b741806fe2836,2024-07-03T02:07:51.527000 +CVE-2024-4627,0,1,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000 CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000 @@ -254723,7 +254727,7 @@ CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 -CVE-2024-4708,0,1,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000 +CVE-2024-4708,0,0,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000 CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000 CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000 CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000 @@ -255224,7 +255228,7 @@ CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000 CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000 CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000 -CVE-2024-5349,0,0,d9c1031fed50c00ff212f0d63c2d8a2e426ecf9d35b8f18b93d3efe678c116af,2024-07-02T12:09:16.907000 +CVE-2024-5349,0,1,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000 CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000 CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000 CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000 @@ -255288,7 +255292,7 @@ CVE-2024-5413,0,0,7e9a221441ea2188d01aa42e534f11d3e951030583aa76eb413a65755ac241 CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000 CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000 CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000 -CVE-2024-5419,0,0,ca56ebdbe0bec4ab68fa7131037a346882d6a83fcd3b933da3e72484dcb3a1c7,2024-07-02T12:09:16.907000 +CVE-2024-5419,0,1,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798db,2024-07-03T15:43:09.450000 CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000 CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000 CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000 @@ -255401,7 +255405,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 -CVE-2024-5606,0,0,67661dfc366570a7697ddfbe211235e18c34fcd62cf069ffa21e3dabe87c16a5,2024-07-02T12:09:16.907000 +CVE-2024-5606,0,1,77ca044404d627b5230fd0abf899745b4715aa4e19e52966299c5c3e2cb213db,2024-07-03T15:45:19.513000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000 @@ -255433,7 +255437,7 @@ CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b56016278 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000 -CVE-2024-5672,1,1,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000 +CVE-2024-5672,0,0,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000 CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 @@ -255470,9 +255474,9 @@ CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000 CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000 -CVE-2024-5735,0,0,cc0561f495bade816cdeaced53011b07f3cb6a0e24901667ac6b88439c52c12a,2024-06-28T13:38:47.077000 -CVE-2024-5736,0,0,525c83f0d9c4bb50f89240615c5f2211bfd076d0392343c37d0ccb4f622d76cb,2024-06-28T13:38:47.077000 -CVE-2024-5737,0,0,33e4dfb4b6ecc95a25b3463ae07a17fb1eb0a57cb72699fc113aff6b8c2d0ea5,2024-06-28T13:38:47.077000 +CVE-2024-5735,0,1,5164f7c1a233150ee53341ccee6b477fac348115ef4d5352757fe303df2f5a54,2024-07-03T15:45:57.677000 +CVE-2024-5736,0,1,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d0d,2024-07-03T15:46:08.877000 +CVE-2024-5737,0,1,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000 CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000 @@ -255487,7 +255491,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000 -CVE-2024-5767,0,0,2cdcdd5f8fd65e586a4117744c4cc9c0fa1bd1cd4ae542b2fabb912f848a248c,2024-07-02T12:09:16.907000 +CVE-2024-5767,0,1,23a2de5cc642d98e40b9cd54645c60f113c9b3696a937d49f8d435c3dba338d7,2024-07-03T15:26:29.050000 CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000 CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000 CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000 @@ -255635,6 +255639,7 @@ CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c3 CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000 CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000 +CVE-2024-6052,1,1,043613cf1c108efd4df1b8c641fcfc3aae24d3f12d61f8d9bc4d4a8136d4a5d2,2024-07-03T15:15:06.223000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000 @@ -255675,6 +255680,7 @@ CVE-2024-6115,0,0,3c5ab17ce7a1f33a2dee71d5335f67c2e99b7d6204dc28e4e10a70d6ca6b07 CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000 CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000 CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000 +CVE-2024-6126,1,1,eac314364b69d7994f4911171bc2b4c5e18e3a158bd0616141df97bd068d1e38,2024-07-03T15:15:06.470000 CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000 CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 @@ -255731,7 +255737,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 -CVE-2024-6263,0,1,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000 +CVE-2024-6263,0,0,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000 CVE-2024-6264,0,0,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000 CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000 CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000 @@ -255768,7 +255774,7 @@ CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067 CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 -CVE-2024-6340,0,1,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000 +CVE-2024-6340,0,0,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 @@ -255783,11 +255789,11 @@ CVE-2024-6371,0,0,4c649bc248258025ed325d77948a1f8525c46141bb22c90a65b416ad94095e CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000 CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000 CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000 -CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000 -CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000 -CVE-2024-6381,0,1,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 -CVE-2024-6382,0,1,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 -CVE-2024-6387,0,1,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000 +CVE-2024-6375,0,1,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000 +CVE-2024-6376,0,1,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000 +CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 +CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 +CVE-2024-6387,0,0,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 @@ -255800,14 +255806,15 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000 CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000 -CVE-2024-6426,1,1,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000 -CVE-2024-6427,1,1,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000 -CVE-2024-6428,0,1,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000 +CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000 +CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000 +CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000 CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000 -CVE-2024-6452,0,1,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 -CVE-2024-6453,0,1,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 -CVE-2024-6469,0,1,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000 -CVE-2024-6470,1,1,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000 +CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 +CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 +CVE-2024-6469,0,0,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000 +CVE-2024-6470,0,0,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000 +CVE-2024-6471,1,1,33db1e0271959450d1204c1eba113a94befddf6a5610d2c3f2f72d1021d9b28f,2024-07-03T14:15:06.490000