From 3c3c8c221048370a9bd75f4d91d8eb2a3399297f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 31 Jul 2024 20:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-07-31T20:00:17.116497+00:00 --- CVE-2023/CVE-2023-281xx/CVE-2023-28149.json | 21 ++++ CVE-2023/CVE-2023-393xx/CVE-2023-39312.json | 47 ++++++- CVE-2023/CVE-2023-48xx/CVE-2023-4863.json | 23 +++- CVE-2023/CVE-2023-509xx/CVE-2023-50952.json | 52 +++++++- CVE-2023/CVE-2023-509xx/CVE-2023-50953.json | 52 +++++++- CVE-2023/CVE-2023-509xx/CVE-2023-50964.json | 52 +++++++- CVE-2024/CVE-2024-234xx/CVE-2024-23444.json | 56 +++++++++ CVE-2024/CVE-2024-287xx/CVE-2024-28797.json | 62 ++++++++- CVE-2024/CVE-2024-287xx/CVE-2024-28798.json | 52 +++++++- CVE-2024/CVE-2024-318xx/CVE-2024-31898.json | 52 +++++++- CVE-2024/CVE-2024-319xx/CVE-2024-31902.json | 52 +++++++- CVE-2024/CVE-2024-344xx/CVE-2024-34444.json | 52 +++++++- CVE-2024/CVE-2024-351xx/CVE-2024-35119.json | 52 +++++++- CVE-2024/CVE-2024-373xx/CVE-2024-37391.json | 14 +-- CVE-2024/CVE-2024-406xx/CVE-2024-40645.json | 64 ++++++++++ CVE-2024/CVE-2024-411xx/CVE-2024-41108.json | 64 ++++++++++ CVE-2024/CVE-2024-416xx/CVE-2024-41630.json | 29 +++++ CVE-2024/CVE-2024-73xx/CVE-2024-7324.json | 133 ++++++++++++++++++++ README.md | 44 +++---- _state.csv | 62 ++++----- 20 files changed, 939 insertions(+), 96 deletions(-) create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28149.json create mode 100644 CVE-2024/CVE-2024-234xx/CVE-2024-23444.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40645.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41108.json create mode 100644 CVE-2024/CVE-2024-416xx/CVE-2024-41630.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7324.json diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json new file mode 100644 index 00000000000..2d5185e2dbe --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28149.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-28149", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-31T19:15:10.993", + "lastModified": "2024-07-31T19:15:10.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the IhisiServiceSmm module in Insyde InsydeH2O with kernel 5.2 before 05.28.42, 5.3 before 05.37.42, 5.4 before 05.45.39, 5.5 before 05.53.39, and 5.6 before 05.60.39 that could allow an attacker to modify UEFI variables." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.insyde.com/security-pledge/SA-2023040", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39312.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39312.json index bac401a939b..cbc53948b54 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39312.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39312.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39312", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-19T15:15:58.020", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-31T19:59:39.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.11.2", + "matchCriteriaId": "1C27B973-22D3-40A7-8A37-3A95EB89C494" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/avada/wordpress-avada-theme-7-11-1-authenticated-author-unrestricted-zip-extraction-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json index 38023061f5d..cf91801c577 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-12T15:15:24.327", - "lastModified": "2024-06-27T18:36:33.417", + "lastModified": "2024-07-31T18:19:23.710", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-09-13", @@ -175,6 +175,27 @@ "criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "versionEndExcluding": "117.0.2045.31", "matchCriteriaId": "49AFFE24-5E30-46A4-A3AE-13D8EB15DE91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "117.0.5938.62", + "matchCriteriaId": "B743C4A7-9C0F-49F3-B94E-F837F19164E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:teams:1.6.00.26463:*:*:*:*:macos:*:*", + "matchCriteriaId": "AB030595-AF08-4FA1-819D-AC8F4AF36D20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:teams:1.6.00.26474:*:*:*:*:desktop:*:*", + "matchCriteriaId": "4260DF96-DB1A-4E91-BE70-DE05424FF883" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:webp_image_extension:1.0.62681.0:*:*:*:*:*:*:*", + "matchCriteriaId": "99B1FD6D-F6BA-4992-BD0C-3B2A327F00BE" } ] } diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50952.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50952.json index d0d4f99e04a..40694a009a7 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50952.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50952.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50952", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T18:15:02.733", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T19:34:52.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275774", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7158437", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50953.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50953.json index 7944604a938..f68c5336f75 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50953.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50953", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T18:15:02.970", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T19:13:21.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275775", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159057", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50964.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50964.json index 1a3bf940191..4597ed3db3f 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50964.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50964.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50964", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T19:15:02.007", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T18:55:59.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/276102", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159060", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json new file mode 100644 index 00000000000..bd0cf14c4b9 --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23444", + "sourceIdentifier": "bressers@elastic.co", + "published": "2024-07-31T18:15:11.983", + "lastModified": "2024-07-31T18:15:11.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-23-security-update-esa-2024-12/364157", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28797.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28797.json index 8388b277fd1..1865ee7d96b 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28797.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28797", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T18:15:03.480", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T18:57:00.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287136", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7158431", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28798.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28798.json index 66e9ee5955c..93582a1fd71 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28798.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28798", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T17:15:02.720", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T19:33:56.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287172", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7158439", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31898.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31898.json index 55ff6415b0b..97032f8febe 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31898.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31898", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T18:15:03.693", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T18:56:36.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288182", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7158425", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31902.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31902.json index d4a2b475051..7993d07235a 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31902.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31902", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T17:15:02.923", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T19:20:04.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289234", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159066", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34444.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34444.json index ee09257e7cb..30201e44d85 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34444.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34444", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-19T15:15:59.530", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-31T19:59:02.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.7.0", + "matchCriteriaId": "FE00967B-EB05-4B12-8F74-54195E307ED3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/articles/unauthenticated-xss-vulnerability-patched-in-slider-revolution-plugin?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/revslider/wordpress-slider-revolution-plugin-6-7-0-unauthenticated-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35119.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35119.json index 2a8d7029b9f..04f583d670e 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35119.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35119", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T17:15:03.153", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-31T19:13:41.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/290342", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159052", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json index 94523446f07..52fb7d154d3 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37391", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T07:15:01.870", - "lastModified": "2024-07-25T15:13:09.723", + "lastModified": "2024-07-31T18:33:47.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 7.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 1.8, "impactScore": 5.9 } ] diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json new file mode 100644 index 00000000000..199560c7d4b --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-40645", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-31T19:15:11.870", + "lastModified": "2024-07-31T19:15:11.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FOG is a cloning/imaging/rescue suite/inventory management system. An improperly restricted file upload feature allows authenticated users to execute arbitrary code on the fogproject server. The Rebranding feature has a check on the client banner image requiring it to be 650 pixels wide and 120 pixels high. Apart from that, there are no checks on things like file extensions. This can be abused by appending a PHP webshell to the end of the image and changing the extension to anything the PHP web server will parse. This vulnerability is fixed in 1.5.10.41." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/lib/pages/fogconfigurationpage.class.php#L2860-L2896", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FOGProject/fogproject/commit/9469606a18bf8887740cceed6593a2e0380b5e0c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-59mq-q8g5-2f4f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json new file mode 100644 index 00000000000..b5e1cd711b4 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-41108", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-31T19:15:12.110", + "lastModified": "2024-07-31T19:15:12.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings. This vulnerability is fixed in 1.5.10.41." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostinfo.php", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostname.php", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json new file mode 100644 index 00000000000..aa3d6733047 --- /dev/null +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41630.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-41630", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-31T19:15:12.390", + "lastModified": "2024-07-31T19:15:12.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://palm-vertebra-fe9.notion.site/form_fast_setting_wifi_set-fd47294cf4bb460bb95f804d39e53f34", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/hk/download/detail-3852.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tendacn.com/hk/download/detail-3863.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json new file mode 100644 index 00000000000..1b28c29992e --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7324.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-7324", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-31T18:15:13.037", + "lastModified": "2024-07-31T18:15:13.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IObit iTop Data Recovery Pro 4.4.0.687. It has been declared as critical. Affected by this vulnerability is an unknown functionality in the library madbasic_.bpl of the component BPL Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The associated identifier of this vulnerability is VDB-273247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 6.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.273247", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273247", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.378138", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ba8c0d38394..7559fcdd4f4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-31T18:00:17.300343+00:00 +2024-07-31T20:00:17.116497+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-31T17:15:12.090000+00:00 +2024-07-31T19:59:39.997000+00:00 ``` ### Last Data Feed Release @@ -33,35 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258659 +258665 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `6` -- [CVE-2024-37898](CVE-2024/CVE-2024-378xx/CVE-2024-37898.json) (`2024-07-31T16:15:03.197`) -- [CVE-2024-37900](CVE-2024/CVE-2024-379xx/CVE-2024-37900.json) (`2024-07-31T16:15:03.440`) -- [CVE-2024-37901](CVE-2024/CVE-2024-379xx/CVE-2024-37901.json) (`2024-07-31T16:15:03.683`) -- [CVE-2024-39318](CVE-2024/CVE-2024-393xx/CVE-2024-39318.json) (`2024-07-31T16:15:03.937`) -- [CVE-2024-39694](CVE-2024/CVE-2024-396xx/CVE-2024-39694.json) (`2024-07-31T16:15:04.207`) -- [CVE-2024-41947](CVE-2024/CVE-2024-419xx/CVE-2024-41947.json) (`2024-07-31T16:15:04.540`) -- [CVE-2024-41950](CVE-2024/CVE-2024-419xx/CVE-2024-41950.json) (`2024-07-31T16:15:04.797`) -- [CVE-2024-41952](CVE-2024/CVE-2024-419xx/CVE-2024-41952.json) (`2024-07-31T17:15:10.597`) -- [CVE-2024-41953](CVE-2024/CVE-2024-419xx/CVE-2024-41953.json) (`2024-07-31T17:15:10.850`) -- [CVE-2024-6973](CVE-2024/CVE-2024-69xx/CVE-2024-6973.json) (`2024-07-31T17:15:11.153`) -- [CVE-2024-6974](CVE-2024/CVE-2024-69xx/CVE-2024-6974.json) (`2024-07-31T17:15:11.413`) -- [CVE-2024-6975](CVE-2024/CVE-2024-69xx/CVE-2024-6975.json) (`2024-07-31T17:15:11.640`) -- [CVE-2024-6977](CVE-2024/CVE-2024-69xx/CVE-2024-6977.json) (`2024-07-31T17:15:11.860`) -- [CVE-2024-6978](CVE-2024/CVE-2024-69xx/CVE-2024-6978.json) (`2024-07-31T17:15:12.090`) +- [CVE-2023-28149](CVE-2023/CVE-2023-281xx/CVE-2023-28149.json) (`2024-07-31T19:15:10.993`) +- [CVE-2024-23444](CVE-2024/CVE-2024-234xx/CVE-2024-23444.json) (`2024-07-31T18:15:11.983`) +- [CVE-2024-40645](CVE-2024/CVE-2024-406xx/CVE-2024-40645.json) (`2024-07-31T19:15:11.870`) +- [CVE-2024-41108](CVE-2024/CVE-2024-411xx/CVE-2024-41108.json) (`2024-07-31T19:15:12.110`) +- [CVE-2024-41630](CVE-2024/CVE-2024-416xx/CVE-2024-41630.json) (`2024-07-31T19:15:12.390`) +- [CVE-2024-7324](CVE-2024/CVE-2024-73xx/CVE-2024-7324.json) (`2024-07-31T18:15:13.037`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `12` -- [CVE-2024-28794](CVE-2024/CVE-2024-287xx/CVE-2024-28794.json) (`2024-07-31T16:45:28.247`) -- [CVE-2024-7299](CVE-2024/CVE-2024-72xx/CVE-2024-7299.json) (`2024-07-31T16:15:05.217`) +- [CVE-2023-39312](CVE-2023/CVE-2023-393xx/CVE-2023-39312.json) (`2024-07-31T19:59:39.997`) +- [CVE-2023-4863](CVE-2023/CVE-2023-48xx/CVE-2023-4863.json) (`2024-07-31T18:19:23.710`) +- [CVE-2023-50952](CVE-2023/CVE-2023-509xx/CVE-2023-50952.json) (`2024-07-31T19:34:52.883`) +- [CVE-2023-50953](CVE-2023/CVE-2023-509xx/CVE-2023-50953.json) (`2024-07-31T19:13:21.947`) +- [CVE-2023-50964](CVE-2023/CVE-2023-509xx/CVE-2023-50964.json) (`2024-07-31T18:55:59.713`) +- [CVE-2024-28797](CVE-2024/CVE-2024-287xx/CVE-2024-28797.json) (`2024-07-31T18:57:00.313`) +- [CVE-2024-28798](CVE-2024/CVE-2024-287xx/CVE-2024-28798.json) (`2024-07-31T19:33:56.337`) +- [CVE-2024-31898](CVE-2024/CVE-2024-318xx/CVE-2024-31898.json) (`2024-07-31T18:56:36.063`) +- [CVE-2024-31902](CVE-2024/CVE-2024-319xx/CVE-2024-31902.json) (`2024-07-31T19:20:04.903`) +- [CVE-2024-34444](CVE-2024/CVE-2024-344xx/CVE-2024-34444.json) (`2024-07-31T19:59:02.343`) +- [CVE-2024-35119](CVE-2024/CVE-2024-351xx/CVE-2024-35119.json) (`2024-07-31T19:13:41.383`) +- [CVE-2024-37391](CVE-2024/CVE-2024-373xx/CVE-2024-37391.json) (`2024-07-31T18:33:47.383`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a2f4a89606c..8e5443ad88d 100644 --- a/_state.csv +++ b/_state.csv @@ -220963,6 +220963,7 @@ CVE-2023-28142,0,0,5348d765bbe00552f4b21547eb51331c1961a74e60dddf51d61eea1387e13 CVE-2023-28143,0,0,2930f4b3d1bbeb13bc36a13a085a1ddfe693ee73e55c43efb28ccefdb766d85d,2023-04-28T00:42:51.857000 CVE-2023-28144,0,0,b49d26291a340c49284192a67f5e0647690fc7789846391ecc87683ebe8ecc82,2023-03-20T19:42:14.197000 CVE-2023-28147,0,0,47d7c693d87c0910f05ddbf3504df8d78da2c6e0b3aa172621acd7ad4075afe5,2023-06-09T18:49:06.737000 +CVE-2023-28149,1,1,1b8a300198637b5dadaed2fd8b57c4c5d05a3155e06fc90bec62765c2f0e8b31,2024-07-31T19:15:10.993000 CVE-2023-2815,0,0,76d4fb095d100c8b17284725ff901d4cf7fcf13b14aca4d157d2670594f54653,2024-05-17T02:23:17.093000 CVE-2023-28150,0,0,850fc3edb9208c5c3fc18f5aab1f201ee1dd54ebe2f647d8b39dc9133fad1181,2023-03-30T15:44:05.453000 CVE-2023-28151,0,0,f5d1d693289a3ec8b086cdb9c9f5e9b84f5907327ee865cb6dfe9a0e20e0dad9,2023-03-30T16:51:00.080000 @@ -229437,7 +229438,7 @@ CVE-2023-39308,0,0,4a72f1eac6719c951da21eb76b861b0b4edc352e69b001729753732e464a0 CVE-2023-39309,0,0,2fda465d3ddfc11dacd0f9e9e52c869fae810d976947e00e73fa0a289b2bd9c2,2024-03-28T12:42:56.150000 CVE-2023-39310,0,0,8c4cc06877d08b40f610108957f4dc87e2b49343244db2563b3485e7e5bb95a3,2024-06-20T12:44:01.637000 CVE-2023-39311,0,0,b1a74a3090b94f35e861c81ebc95020d19911627f926443092be007fd28fe679,2024-03-27T15:49:41.437000 -CVE-2023-39312,0,0,05b16396eccf702ff38680dbbb66fe9bb945c7d80433593df26e4d757f6b932f,2024-06-20T12:43:25.663000 +CVE-2023-39312,0,1,67893cedcfa64eaa3cd80a73a79e15a08e9aae67601a9f4e90e99ff3549a7006,2024-07-31T19:59:39.997000 CVE-2023-39313,0,0,f5be270c143e885052c8398ac5eb0cc3f1c56258fb266d84639b8aa446aca569,2024-03-28T12:42:56.150000 CVE-2023-39314,0,0,225e0a349f7948586437d4437c8234b28326898600f28069d2baa6558ba213ba,2023-08-15T00:14:54.643000 CVE-2023-39316,0,0,d91b0577d55ecc8f9b7d902911cef580dd7a8461c318a575335575136187ba79,2024-04-09T21:15:15.350000 @@ -236088,7 +236089,7 @@ CVE-2023-48626,0,0,b8b622d44af21779832ea90be00f4583eccbd212a82740dfae608d916b98d CVE-2023-48627,0,0,9bfbf353a1021dbd30eb0c013800dd54a27f9f02b77ccc8943cabc4666c288a8,2023-12-16T01:43:37.750000 CVE-2023-48628,0,0,954288f98742e8304c6803ffe3f23bc9341992d82e04fa0d0ea7b80b9a88909e,2023-12-16T01:43:45.137000 CVE-2023-48629,0,0,d1e1d870abbf860d5a07571e31a06661944bfa687a60e895d08df6f4512bd33b,2023-12-16T01:43:55.833000 -CVE-2023-4863,0,0,e145fcefb387325e13103dc712bde0a81ad033999bf18604fe7275d871aecd77,2024-06-27T18:36:33.417000 +CVE-2023-4863,0,1,01b14c06db799bc33b666fe077d3891a920899769f5281fd12c8a9d6e4c9018a,2024-07-31T18:19:23.710000 CVE-2023-48630,0,0,51dd9298407b50ad62e212614827bdb4bf0bb6cfe9d813cf080a9d1fa0f816cf,2023-12-16T01:44:04.563000 CVE-2023-48631,0,0,ffb16bd4cd2d70bc89ec28c6ba69a386696475eb94990b08b7e76e5b6679af8c,2023-12-18T20:14:50.077000 CVE-2023-48632,0,0,52571cd517df5ad91d81948daef5eb4a3142bbc6bb327fee18fe72191c729650,2023-12-16T01:44:12.910000 @@ -237597,8 +237598,8 @@ CVE-2023-50948,0,0,bdb8dfe61e6bb5c0ead710e7634822087e4ba9d4a8aa3d0b38f1d70ff1d5b CVE-2023-50949,0,0,b5f44f6e20174821ef9521b996e8772c222b0c86e038fa496a122146fa429903,2024-04-12T12:44:04.930000 CVE-2023-50950,0,0,44d9f6fce0df4c0cb249dd6910d6c5f827d41fa95ee4793fa82fc6cd0bdbd2d4,2024-01-24T19:42:29.450000 CVE-2023-50951,0,0,f6602a94bee5ac370ebd327ee71099d1d7184ed6e0d0e6b8d7894abc3d65ab08,2024-02-20T19:50:53.960000 -CVE-2023-50952,0,0,6fb8a6f06e6ea79274476d98fa8b7f4c7c8fe5f78cbf74526726a3c4f21b950e,2024-07-01T12:37:24.220000 -CVE-2023-50953,0,0,6a7df3afd53a32e2774a66668eb39cee23e7c8d11420bbc120edbae979b6e96a,2024-07-01T12:37:24.220000 +CVE-2023-50952,0,1,a42bfb9eb2ec7c3f0ba7edf0dc6ed3e721be6a8d276393fcea326ad1cdea6eda,2024-07-31T19:34:52.883000 +CVE-2023-50953,0,1,52036d7752aac445cbb090aea392f5f16e3dcdb55ed4b88e406bc96e30a1871f,2024-07-31T19:13:21.947000 CVE-2023-50954,0,0,03e5c9c632759f06d0045591a0608fa87031762cf88a1b42fbb995d9ab529ae8,2024-07-01T12:37:24.220000 CVE-2023-50955,0,0,cb43484caa0d365611ce717b8ab9c294998eddcf699afed606cd6871f7a3627e,2024-02-22T19:07:27.197000 CVE-2023-50957,0,0,2afed176927569fa17df9b690207f86f15723fa616f6bf3a39224dbb3a2fe550,2024-02-15T04:37:53.297000 @@ -237607,7 +237608,7 @@ CVE-2023-5096,0,0,8779dd03ac450548d2ba6a548c8104e3c99fd199c2b742e8b243fd8421a3b4 CVE-2023-50961,0,0,d96746f90b058ea88a5e4895283dfaa6c8e019ec1e8002d622554261292b5bdc,2024-03-27T15:49:51.300000 CVE-2023-50962,0,0,96bdff8dcb677bdc79c39bfccf460d1e0e91dac38c48fffb3397e1ec6b27a6f4,2024-02-12T14:31:36.920000 CVE-2023-50963,0,0,c351b4118bb06998b72052bc9f424778991465868b25e60991b8e71556cfe023,2024-01-24T21:22:22.293000 -CVE-2023-50964,0,0,05618bc7480072746dd363727665cfce41d13577a3279532051009bea9dc475a,2024-07-01T12:37:24.220000 +CVE-2023-50964,0,1,09de2824e3f3005514ea7ef8210c8fda17bd6187a04281bd3c5e86c8d77b2d31,2024-07-31T18:55:59.713000 CVE-2023-50965,0,0,2ab8f843f06fa75772d31032acc0a4143eb8a49505fca8090a45527fdf0f0f43,2023-12-20T20:02:23.497000 CVE-2023-50966,0,0,b5a97fd73e1e6cae4fa5e7b2936c8189fb09de7cddb2c6684b87d97ca2763015,2024-03-19T16:33:58.680000 CVE-2023-50967,0,0,c36860011164f2d7fbf8bd4ec5229dfb89aeca57d5033b3c98ab0a5982defbbc,2024-04-19T23:15:09.330000 @@ -244885,6 +244886,7 @@ CVE-2024-23440,0,0,888cd3d174129643abdafcbeddc64e6f21d5ae8e2b2e370f6f7b930a90b3e CVE-2024-23441,0,0,390d5d2bcc3b1398b0150c0f0c98b785cb9627d9865bfc83ae73159a1a10f10c,2024-02-05T18:41:43.547000 CVE-2024-23442,0,0,443db8dbb1f8b987d963a7dd5d60c961dd33264e42510a9f3b5600fa33a14f9f,2024-06-17T12:42:04.623000 CVE-2024-23443,0,0,39619cd9ac9d9c83b0ac7c9e7dc99ae54ae4def9a52df44cf7e3d4e8d6ff7018,2024-06-20T12:44:01.637000 +CVE-2024-23444,1,1,b80e846b2921026fae0ca1e493866a7de943ad611d2d3c7cbabeee30b00358a7,2024-07-31T18:15:11.983000 CVE-2024-23445,0,0,6c527df37925bfee88abbff37b4b4e377f6526ae267b170f8c243c193159d3f0,2024-06-13T18:36:09.010000 CVE-2024-23446,0,0,4d7124defa0cb48f303fd49a5701937ff8d343d7ed35efe26f93d719e40bd716,2024-02-14T20:10:24.323000 CVE-2024-23447,0,0,ead5eeded6dc2e4e220b06ad6f5040f9ba1bf7850a4aca072f42a67732bb7fc3,2024-02-14T20:02:00.753000 @@ -248578,11 +248580,11 @@ CVE-2024-28784,0,0,6938c040ba1b760c7dffbfb4cb6df832fb92ccc125db3fbab809c41581680 CVE-2024-28787,0,0,ae2fe056558612ea54f7786b2749d8c7eb4b79c4855a2500ae63276f0936f4b5,2024-04-04T19:24:50.670000 CVE-2024-2879,0,0,dbdb53723be18fbee30aefddb98b892cc05662454ff0dc284d9d7d7d767dab47,2024-04-08T22:49:41.533000 CVE-2024-28793,0,0,7d414f92d43f30000a62dc37a0c80fadf87a5ffc630bb3c26c9945f0e8b7cdb0,2024-06-10T18:15:29.983000 -CVE-2024-28794,0,1,c10da1b41da7071b80498b87abd9d687769c0fa94b037b7ebb3faa4084e98fd8,2024-07-31T16:45:28.247000 +CVE-2024-28794,0,0,c10da1b41da7071b80498b87abd9d687769c0fa94b037b7ebb3faa4084e98fd8,2024-07-31T16:45:28.247000 CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 CVE-2024-28796,0,0,9309b95ff28ad61ded45c96b0ce61eb28e84237793000fa8c06bf713a7309924,2024-07-18T12:28:43.707000 -CVE-2024-28797,0,0,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000 -CVE-2024-28798,0,0,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000 +CVE-2024-28797,0,1,215c6e5211c115cb8a1dd99529c7ef7d500087d4643915a223453edd582d1174,2024-07-31T18:57:00.313000 +CVE-2024-28798,0,1,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a524813c1,2024-07-31T19:33:56.337000 CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9d1,2024-07-12T16:55:30.137000 CVE-2024-28804,0,0,9df6edf6ae339d680185172e5ed213f302ddf3e3f29618df198f13863aac79c1,2024-07-30T13:33:30.653000 CVE-2024-28805,0,0,7e8f422d872ff6928ec00a78f178b43022aa22328738d123a1e39a8d5357e6af,2024-07-30T13:33:30.653000 @@ -250712,9 +250714,9 @@ CVE-2024-31893,0,0,1c7d6253e15ada8ecd560ebe4d44c495e2ebd1765b23d5133f875af5cb7d6 CVE-2024-31894,0,0,657ebec51508a8a9e81a6bf77e1af55b91d39f1157660d9afa903879def9d6c7,2024-05-24T01:15:30.977000 CVE-2024-31895,0,0,fe374e20832c9aae350e47d74978bf183f5d5c0369f487d8af68df70d3c0f094,2024-05-24T01:15:30.977000 CVE-2024-31897,0,0,a9f6dffdef42db63de321f283f9008f4cc590873723e0b6ff14df57c7407f3ac,2024-07-11T14:52:52.907000 -CVE-2024-31898,0,0,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000 +CVE-2024-31898,0,1,98b5fee92aa3e78db3b92a2045655a85910d78a165cc0fc0eb03d45c453d34fe,2024-07-31T18:56:36.063000 CVE-2024-3190,0,0,59b4ce24fb505a0884244f905c395c98b38f50a3b44829542252bc93265789b6,2024-05-30T13:15:41.297000 -CVE-2024-31902,0,0,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000 +CVE-2024-31902,0,1,792ebd92048a7d574f1f4f622d29c5adae49f7f37a902660c4b217f76bba207a,2024-07-31T19:20:04.903000 CVE-2024-31904,0,0,77f4db6cab579901d99ba6c75def744c8e9197f1a2c93d4ffef011323b61b3cc,2024-05-24T01:15:30.977000 CVE-2024-31907,0,0,e57043b034702621fcca13eaf542da6f92ff5842c4e903e12746e460db136786,2024-05-31T19:14:47.793000 CVE-2024-31908,0,0,747fd2c58000cd25913c25e42d3852e7dcfd29b11f273ad346d09720c57822b0,2024-05-31T19:14:47.793000 @@ -252386,7 +252388,7 @@ CVE-2024-34440,0,0,bda50b1c3ed75a67370d237a25a38594ac34f71c68e0b430863a90af4d5ed CVE-2024-34441,0,0,d89a44709be53f244cf5e9b1f106601ee2bbd58659e3c493c408ccaac9ec7876,2024-05-14T16:12:23.490000 CVE-2024-34442,0,0,6264f8491ee5d12e5a5f408e8abeaf7f3129b325a31afb66300d05700c7a7fd6,2024-06-13T18:36:45.417000 CVE-2024-34443,0,0,c8f11408ade1f322bcf59e1e6ccdfab5f9f2536b164a74975bd7ede92d5e3984,2024-07-31T14:20:21.527000 -CVE-2024-34444,0,0,3900259df817a7840349ea3d08b1dc7cde0656ab7f041d5d7012c4b07efc2a20,2024-06-20T12:43:25.663000 +CVE-2024-34444,0,1,83cf0e146347d288c8ea9da6587c65a2fffe6e87f7db1a1dc5a19fc6768087d7,2024-07-31T19:59:02.343000 CVE-2024-34445,0,0,3b07364d9bdbad0e17fe82bd2b8457170020621f36717725efd6e85a1ffc3713,2024-05-14T16:12:23.490000 CVE-2024-34446,0,0,5f8d83ca96b0bb057e12975bf469965ab37fc737acea8dd912eb1a08f5464c53,2024-05-03T15:32:19.637000 CVE-2024-34447,0,0,6bea4a391aa6348494cdd2d2934d51e86f6805261afa24a43d6930eff057ed1d,2024-06-14T13:15:51.950000 @@ -252738,7 +252740,7 @@ CVE-2024-35108,0,0,26473bc212f25b793c66f492376510c497f3c8040fd855e035e2125e4662c CVE-2024-35109,0,0,5c37b5989db27d73a1b7673ab81df5907cc813f794f46739f6fbd9e9480590e6,2024-07-03T02:01:24.210000 CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9863,2024-07-03T02:01:24.987000 CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000 -CVE-2024-35119,0,0,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000 +CVE-2024-35119,0,1,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 CVE-2024-35137,0,0,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000 @@ -254306,7 +254308,7 @@ CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcf CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000 -CVE-2024-37391,0,0,150400ee309f1fb57b79e17db94532e7f68272dc6319e93487ad1b062271d45e,2024-07-25T15:13:09.723000 +CVE-2024-37391,0,1,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 CVE-2024-37405,0,0,ff056e1e6b71205230bf39333b4a3618e5032f8631acafb990972570435f5468,2024-07-12T16:34:58.687000 @@ -254566,11 +254568,11 @@ CVE-2024-37894,0,0,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a4 CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000 CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000 CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000 -CVE-2024-37898,1,1,df8ee1bb6b8f38bec566205021b717cd3931cf46a7ea3164f933443691ac1951,2024-07-31T16:15:03.197000 +CVE-2024-37898,0,0,df8ee1bb6b8f38bec566205021b717cd3931cf46a7ea3164f933443691ac1951,2024-07-31T16:15:03.197000 CVE-2024-37899,0,0,b15b2f0659684c15abe8d3b9fc90e954532acfe6178361a33640834566aa7b12,2024-06-21T11:22:01.687000 CVE-2024-3790,0,0,54ff85acf33b27347b60794a0d91a04db9e5fdd7b0bb2899aaf68ff18e5328b6,2024-05-14T16:11:39.510000 -CVE-2024-37900,1,1,f5ca223df015165b0c48c89fd3f42aae78fe8d6e486be5ea6df8ba7e27436f71,2024-07-31T16:15:03.440000 -CVE-2024-37901,1,1,f816d9d41260a0e179f7f8535b53a1453a926dc3bdd6077d085153bc07aa1662,2024-07-31T16:15:03.683000 +CVE-2024-37900,0,0,f5ca223df015165b0c48c89fd3f42aae78fe8d6e486be5ea6df8ba7e27436f71,2024-07-31T16:15:03.440000 +CVE-2024-37901,0,0,f816d9d41260a0e179f7f8535b53a1453a926dc3bdd6077d085153bc07aa1662,2024-07-31T16:15:03.683000 CVE-2024-37902,0,0,914ec46cc1273d7c21c7b2dab73f39d6c3f01e86944529e46279ac98efc57a11,2024-06-20T12:44:22.977000 CVE-2024-37903,0,0,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000 CVE-2024-37904,0,0,4a1838bfa872e93babcec91edc2a58b1f777ff60512a3a43aa04f02c821270dc,2024-06-20T12:44:01.637000 @@ -255291,7 +255293,7 @@ CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000 CVE-2024-39317,0,0,50f7a469519b62eca16220b475bffdb7e1e0158b2b6611386cb9bf3353e1272e,2024-07-11T18:09:58.777000 -CVE-2024-39318,1,1,041b9fe4c97fe2a4483ab787ec857052185dbfddfdb7cee525f6d72ff96a9375,2024-07-31T16:15:03.937000 +CVE-2024-39318,0,0,041b9fe4c97fe2a4483ab787ec857052185dbfddfdb7cee525f6d72ff96a9375,2024-07-31T16:15:03.937000 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 CVE-2024-39320,0,0,6f7ce6a5bce29c3b54d4c4199d5683e1993d85cda15758fd22b24998859b20cb,2024-07-31T12:57:02.300000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 @@ -255495,7 +255497,7 @@ CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d2 CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 CVE-2024-39693,0,0,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 -CVE-2024-39694,1,1,32086b4cca70a0ef4cedf08973c8c937efd407611ccfab6531f938f08ce75052,2024-07-31T16:15:04.207000 +CVE-2024-39694,0,0,32086b4cca70a0ef4cedf08973c8c937efd407611ccfab6531f938f08ce75052,2024-07-31T16:15:04.207000 CVE-2024-39695,0,0,fbaaa4e185fc8d8718a1bd681584149a106333fea090ef242205e9fceffe21eb,2024-07-09T14:47:19.767000 CVE-2024-39696,0,0,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000 CVE-2024-39697,0,0,beaa1d3d138b1c8f4d915594365efac05629e956228fed35abbf7934793c82f2,2024-07-09T18:19:14.047000 @@ -255786,6 +255788,7 @@ CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 +CVE-2024-40645,1,1,e92df399af3217106cd72ce7f7f4170d4ce648762e85c7848f5e01db4f052a9c,2024-07-31T19:15:11.870000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 @@ -256106,6 +256109,7 @@ CVE-2024-41096,0,0,d489857270af65a71c8869e16e9156c6c6f8ddab5a965ff4723a5cbb7166d CVE-2024-41097,0,0,58268fc72f08d01bcbeee285e07076a5aa3a451cc1f952059328faf3b59a18ce,2024-07-29T16:21:52.517000 CVE-2024-41098,0,0,0e3bb06817924b091ecd502db6e8d6b8dfedc58f44996ff13dc833ea0ac51b2f,2024-07-29T16:21:52.517000 CVE-2024-41107,0,0,8900de25677c2ad7075ce083b915bd87b6a95be071804b0852c57c05697761e4,2024-07-19T14:15:06.080000 +CVE-2024-41108,1,1,34cc93314582487bd18b36eb65cc773b14b52de92bdf6f93b4d81494cfbf0427,2024-07-31T19:15:12.110000 CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 CVE-2024-41110,0,0,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000 @@ -256227,6 +256231,7 @@ CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc CVE-2024-41624,0,0,27591d721b6b93bb72ed8c8d8df31fac89dd525c92ee99de3b5ca8f07694b2d0,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,5ec8768921bad03bab84b09fc8dfe73d891754e0ae7735ac3fc375a877076401,2024-07-29T14:12:08.783000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 +CVE-2024-41630,1,1,57269ac3ec0c80a5608c74057c3b590e8925efc910a08eb413c32d8f08927c0e,2024-07-31T19:15:12.390000 CVE-2024-41631,0,0,556c3cf2668f94cda2183cc9edbabc5831345bf61d77fd5cca10bada84a3cde5,2024-07-29T16:21:52.517000 CVE-2024-41637,0,0,914ac1a2919f9b0b050b2a6e5abe0136c4e506ec6e973a1399ad1331b2ca31d8,2024-07-29T14:12:08.783000 CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000 @@ -256326,11 +256331,11 @@ CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 -CVE-2024-41947,1,1,6b3eda40d039bee05566ead3c841671ae6812b2990bb83f04bb0897dedd43617,2024-07-31T16:15:04.540000 +CVE-2024-41947,0,0,6b3eda40d039bee05566ead3c841671ae6812b2990bb83f04bb0897dedd43617,2024-07-31T16:15:04.540000 CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000 -CVE-2024-41950,1,1,b5bdcf1e1bca4821b773ae66dee1550bc42a8780157ecff9615d501851a742a8,2024-07-31T16:15:04.797000 -CVE-2024-41952,1,1,6f7523908481a663b4179f664f52c21eaa97674300e8215372125a23ca967e8d,2024-07-31T17:15:10.597000 -CVE-2024-41953,1,1,4ebafda2210f36bf39d39417db17657a6d3368731c96f25439fa25aace4ae549,2024-07-31T17:15:10.850000 +CVE-2024-41950,0,0,b5bdcf1e1bca4821b773ae66dee1550bc42a8780157ecff9615d501851a742a8,2024-07-31T16:15:04.797000 +CVE-2024-41952,0,0,6f7523908481a663b4179f664f52c21eaa97674300e8215372125a23ca967e8d,2024-07-31T17:15:10.597000 +CVE-2024-41953,0,0,4ebafda2210f36bf39d39417db17657a6d3368731c96f25439fa25aace4ae549,2024-07-31T17:15:10.850000 CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000 @@ -258513,11 +258518,11 @@ CVE-2024-6968,0,0,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b2 CVE-2024-6969,0,0,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 -CVE-2024-6973,1,1,2645766c2cb4d8ede1fdb14893d96d390c25a138793150698bdb8f2bd13e6fc9,2024-07-31T17:15:11.153000 -CVE-2024-6974,1,1,53a7a83ca58f4b30a839ca2683dc125589e2c8f1f3b7ba666bb94266abaaca4e,2024-07-31T17:15:11.413000 -CVE-2024-6975,1,1,b2b351bf2be50b8fd658e8234c270520445bfc36e2fba8946c25781abdea8d7e,2024-07-31T17:15:11.640000 -CVE-2024-6977,1,1,3121777bd0a52ccf3540d69bf9a48fe1c1b7f86ef36c5a72b5a200933b1d9fe6,2024-07-31T17:15:11.860000 -CVE-2024-6978,1,1,bfc065920d3818fe93eed937ed76d477aac18dcdc5208b3cc73dff1ab8039ab4,2024-07-31T17:15:12.090000 +CVE-2024-6973,0,0,2645766c2cb4d8ede1fdb14893d96d390c25a138793150698bdb8f2bd13e6fc9,2024-07-31T17:15:11.153000 +CVE-2024-6974,0,0,53a7a83ca58f4b30a839ca2683dc125589e2c8f1f3b7ba666bb94266abaaca4e,2024-07-31T17:15:11.413000 +CVE-2024-6975,0,0,b2b351bf2be50b8fd658e8234c270520445bfc36e2fba8946c25781abdea8d7e,2024-07-31T17:15:11.640000 +CVE-2024-6977,0,0,3121777bd0a52ccf3540d69bf9a48fe1c1b7f86ef36c5a72b5a200933b1d9fe6,2024-07-31T17:15:11.860000 +CVE-2024-6978,0,0,bfc065920d3818fe93eed937ed76d477aac18dcdc5208b3cc73dff1ab8039ab4,2024-07-31T17:15:12.090000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 CVE-2024-6984,0,0,5e471e68c1f9c8af4cd4126a693da97e089cde1a0fe72eca9e017c53446a32dc,2024-07-29T16:21:52.517000 CVE-2024-7007,0,0,d661b80f381c5e5a20762050cd26d7cdbc7442dd5816d04953c75c3bb9a2e0ae,2024-07-26T12:38:41.683000 @@ -258646,7 +258651,7 @@ CVE-2024-7288,0,0,9f6044ce185e7e49d04041d682800303d4df5b333cb7e6da85a8dc8b3f0482 CVE-2024-7289,0,0,a709df24f87a0f503a11766c66b03ca94607de4e52c2ab315e56364f32619286,2024-07-31T12:57:02.300000 CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2bdb,2024-07-31T12:57:02.300000 CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000 -CVE-2024-7299,0,1,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 +CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799ae9,2024-07-31T14:15:08.080000 CVE-2024-7303,0,0,d7f72dd61499e6619ce7f5b3ddfad21cf84d8b933f5b61aad0d5acbabf0695d7,2024-07-31T12:57:02.300000 CVE-2024-7306,0,0,41d2dc73352be3adbe3da1c5ddee86e5aba159cd2a5da8e89aabb430dec59115,2024-07-31T12:57:02.300000 @@ -258657,4 +258662,5 @@ CVE-2024-7310,0,0,f41dfd90546a9735111808103c67b19c822dfd89b37a542d36f1a7128ca8fa CVE-2024-7311,0,0,992c6b7ceb1c9a4d719c68d0c71706858cdee857ab750e2dc0c4b13c55655029,2024-07-31T12:57:02.300000 CVE-2024-7320,0,0,33e9dcaae6c93434ade67bd8a073d2b7f1fbc81482e595b40c21856a0fa46ae6,2024-07-31T12:57:02.300000 CVE-2024-7321,0,0,7c3abae321c1c206df72b5645aa4b7f08ab908ecabfe1d2acbc6472a1b295bbf,2024-07-31T12:57:02.300000 +CVE-2024-7324,1,1,1e2ca05d2a54a8e20a65dafbea055b83788ac7fbff6de5e226983904da67ce08,2024-07-31T18:15:13.037000 CVE-2024-7340,0,0,fce15548fae9b804b40d57548bf30df09df1870e3bdee4ca04fd99c2c05c0232,2024-07-31T15:15:11.203000