From 4389ef6f66986b8700d19fd6cb7d2c8833b9990b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 29 Jul 2024 23:58:11 +0000 Subject: [PATCH] Auto-Update: 2024-07-29T23:55:17.408919+00:00 --- CVE-2023/CVE-2023-279xx/CVE-2023-27952.json | 6 +- CVE-2023/CVE-2023-387xx/CVE-2023-38709.json | 8 +- CVE-2023/CVE-2023-388xx/CVE-2023-38823.json | 12 +- CVE-2023/CVE-2023-452xx/CVE-2023-45249.json | 8 +- CVE-2023/CVE-2023-523xx/CVE-2023-52356.json | 34 +++- CVE-2023/CVE-2023-62xx/CVE-2023-6277.json | 34 +++- CVE-2024/CVE-2024-20xx/CVE-2024-2004.json | 14 +- CVE-2024/CVE-2024-232xx/CVE-2024-23261.json | 29 ++++ CVE-2024/CVE-2024-232xx/CVE-2024-23296.json | 6 +- CVE-2024/CVE-2024-23xx/CVE-2024-2379.json | 14 +- CVE-2024/CVE-2024-23xx/CVE-2024-2398.json | 14 +- CVE-2024/CVE-2024-247xx/CVE-2024-24795.json | 6 +- CVE-2024/CVE-2024-24xx/CVE-2024-2466.json | 14 +- CVE-2024/CVE-2024-273xx/CVE-2024-27316.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27804.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27809.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27823.json | 49 ++++++ CVE-2024/CVE-2024-278xx/CVE-2024-27826.json | 45 ++++++ CVE-2024/CVE-2024-278xx/CVE-2024-27853.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27862.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27863.json | 37 +++++ CVE-2024/CVE-2024-278xx/CVE-2024-27871.json | 25 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27872.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27873.json | 37 +++++ CVE-2024/CVE-2024-278xx/CVE-2024-27877.json | 29 ++++ CVE-2024/CVE-2024-278xx/CVE-2024-27878.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27881.json | 29 ++++ CVE-2024/CVE-2024-278xx/CVE-2024-27882.json | 29 ++++ CVE-2024/CVE-2024-278xx/CVE-2024-27883.json | 29 ++++ CVE-2024/CVE-2024-278xx/CVE-2024-27884.json | 37 +++++ CVE-2024/CVE-2024-278xx/CVE-2024-27886.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27887.json | 21 +++ CVE-2024/CVE-2024-278xx/CVE-2024-27888.json | 21 +++ CVE-2024/CVE-2024-32xx/CVE-2024-3219.json | 29 ++++ CVE-2024/CVE-2024-382xx/CVE-2024-38271.json | 12 +- CVE-2024/CVE-2024-382xx/CVE-2024-38272.json | 4 +- CVE-2024/CVE-2024-407xx/CVE-2024-40774.json | 41 +++++ CVE-2024/CVE-2024-407xx/CVE-2024-40775.json | 29 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40776.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40777.json | 37 +++++ CVE-2024/CVE-2024-407xx/CVE-2024-40778.json | 29 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40779.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40780.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40781.json | 29 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40782.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40783.json | 29 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40784.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40785.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40786.json | 29 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40787.json | 37 +++++ CVE-2024/CVE-2024-407xx/CVE-2024-40788.json | 49 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40789.json | 45 ++++++ CVE-2024/CVE-2024-407xx/CVE-2024-40793.json | 41 +++++ CVE-2024/CVE-2024-407xx/CVE-2024-40794.json | 29 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40795.json | 33 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40796.json | 33 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40798.json | 33 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40799.json | 49 ++++++ CVE-2024/CVE-2024-408xx/CVE-2024-40800.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40802.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40803.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40804.json | 21 +++ CVE-2024/CVE-2024-408xx/CVE-2024-40805.json | 33 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40806.json | 49 ++++++ CVE-2024/CVE-2024-408xx/CVE-2024-40807.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40809.json | 45 ++++++ CVE-2024/CVE-2024-408xx/CVE-2024-40811.json | 21 +++ CVE-2024/CVE-2024-408xx/CVE-2024-40812.json | 45 ++++++ CVE-2024/CVE-2024-408xx/CVE-2024-40813.json | 25 +++ CVE-2024/CVE-2024-408xx/CVE-2024-40814.json | 21 +++ CVE-2024/CVE-2024-408xx/CVE-2024-40815.json | 37 +++++ CVE-2024/CVE-2024-408xx/CVE-2024-40816.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40817.json | 33 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40818.json | 37 +++++ CVE-2024/CVE-2024-408xx/CVE-2024-40821.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40822.json | 33 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40823.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40824.json | 33 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40827.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40828.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40829.json | 33 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40832.json | 21 +++ CVE-2024/CVE-2024-408xx/CVE-2024-40833.json | 33 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40834.json | 29 ++++ CVE-2024/CVE-2024-408xx/CVE-2024-40835.json | 41 +++++ CVE-2024/CVE-2024-408xx/CVE-2024-40836.json | 33 ++++ CVE-2024/CVE-2024-48xx/CVE-2024-4879.json | 6 +- CVE-2024/CVE-2024-52xx/CVE-2024-5217.json | 6 +- CVE-2024/CVE-2024-63xx/CVE-2024-6387.json | 14 +- CVE-2024/CVE-2024-72xx/CVE-2024-7248.json | 56 +++++++ CVE-2024/CVE-2024-72xx/CVE-2024-7249.json | 56 +++++++ CVE-2024/CVE-2024-72xx/CVE-2024-7250.json | 56 +++++++ CVE-2024/CVE-2024-72xx/CVE-2024-7251.json | 56 +++++++ CVE-2024/CVE-2024-72xx/CVE-2024-7252.json | 56 +++++++ README.md | 82 ++++++---- _state.csv | 169 ++++++++++++++------ 96 files changed, 2943 insertions(+), 110 deletions(-) create mode 100644 CVE-2024/CVE-2024-232xx/CVE-2024-23261.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27809.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27823.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27826.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27853.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27862.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27863.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27871.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27872.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27873.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27877.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27878.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27881.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27882.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27883.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27884.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27886.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27887.json create mode 100644 CVE-2024/CVE-2024-278xx/CVE-2024-27888.json create mode 100644 CVE-2024/CVE-2024-32xx/CVE-2024-3219.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40774.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40775.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40776.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40777.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40778.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40779.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40780.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40781.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40782.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40783.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40784.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40785.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40786.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40787.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40788.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40789.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40793.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40794.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40795.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40796.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40798.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40799.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40800.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40802.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40803.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40804.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40805.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40806.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40807.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40809.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40811.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40812.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40813.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40814.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40815.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40816.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40817.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40818.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40821.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40822.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40823.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40824.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40827.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40828.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40829.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40832.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40833.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40834.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40835.json create mode 100644 CVE-2024/CVE-2024-408xx/CVE-2024-40836.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7248.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7249.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7250.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7251.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7252.json diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27952.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27952.json index 68ce0c1b73a..4fb2d34995f 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27952.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27952", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.157", - "lastModified": "2023-07-27T04:15:19.543", + "lastModified": "2024-07-29T22:15:02.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38709.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38709.json index 3d70b8abd8d..ed9375a833e 100644 --- a/CVE-2023/CVE-2023-387xx/CVE-2023-38709.json +++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38709.json @@ -2,13 +2,13 @@ "id": "CVE-2023-38709", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T20:15:08.047", - "lastModified": "2024-06-10T17:16:12.647", + "lastModified": "2024-07-29T22:15:02.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n" + "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58." }, { "lang": "es", @@ -44,6 +44,10 @@ { "url": "https://security.netapp.com/advisory/ntap-20240415-0013/", "source": "security@apache.org" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "security@apache.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json index 355a7c84169..79066b92b66 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38823", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-20T20:15:07.357", - "lastModified": "2023-11-28T22:02:33.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-29T22:15:03.200", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] + "url": "https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2023-38823/README.md", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json index 3a552a70a6c..f4bf8dfe7d6 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45249.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45249", "sourceIdentifier": "security@acronis.com", "published": "2024-07-24T14:15:04.867", - "lastModified": "2024-07-26T12:48:15.370", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-29T23:15:09.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -136,6 +136,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/", + "source": "security@acronis.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52356.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52356.json index 2d9b5fac2a9..ec77dd39f9e 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52356.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52356.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52356", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-25T20:15:39.063", - "lastModified": "2024-03-11T13:15:52.753", + "lastModified": "2024-07-29T22:15:03.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -153,6 +153,38 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html", "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214116", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214117", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214122", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214123", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214124", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6277.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6277.json index a8f3c2fbd6a..b987c97723e 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6277.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6277.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6277", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-24T19:15:07.643", - "lastModified": "2024-01-19T16:15:11.057", + "lastModified": "2024-07-29T22:15:03.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -186,6 +186,38 @@ { "url": "https://security.netapp.com/advisory/ntap-20240119-0002/", "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214116", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214117", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214122", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214123", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214124", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json index d5996a7ab79..2bb0207183f 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2004", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.173", - "lastModified": "2024-07-03T01:52:57.560", + "lastModified": "2024-07-29T22:15:04.373", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -67,6 +67,18 @@ { "url": "https://security.netapp.com/advisory/ntap-20240524-0006/", "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23261.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23261.json new file mode 100644 index 00000000000..b8192bac45c --- /dev/null +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23261.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-23261", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.037", + "lastModified": "2024-07-29T23:15:10.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.8. An attacker may be able to read information belonging to another user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214084", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json index af19a3d36a0..c688c8ab611 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23296", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-05T20:16:01.553", - "lastModified": "2024-07-03T01:47:43.840", + "lastModified": "2024-07-29T22:15:03.750", "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-03-06", @@ -225,6 +225,10 @@ { "url": "https://support.apple.com/kb/HT214107", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json index 671172acb2d..86108085c52 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2379", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.230", - "lastModified": "2024-06-10T16:15:13.173", + "lastModified": "2024-07-29T22:15:04.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,18 @@ { "url": "https://security.netapp.com/advisory/ntap-20240531-0001/", "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json index 7fee10d1504..fddde158de0 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2398.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2398", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.283", - "lastModified": "2024-07-03T01:53:12.523", + "lastModified": "2024-07-29T22:15:04.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -67,6 +67,18 @@ { "url": "https://security.netapp.com/advisory/ntap-20240503-0009/", "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json index 61c515d0a3c..1bfb7cf6dc7 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24795", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T20:15:08.663", - "lastModified": "2024-06-10T18:15:27.003", + "lastModified": "2024-07-29T22:15:04.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -48,6 +48,10 @@ { "url": "https://security.netapp.com/advisory/ntap-20240415-0013/", "source": "security@apache.org" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "security@apache.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2466.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2466.json index 1f2dd12a69c..9c96645066a 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2466.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2466.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2466", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.343", - "lastModified": "2024-05-03T13:15:21.893", + "lastModified": "2024-07-29T22:15:04.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,18 @@ { "url": "https://security.netapp.com/advisory/ntap-20240503-0010/", "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json index 065a908d3ba..576d2366d38 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27316", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T20:15:08.720", - "lastModified": "2024-07-22T09:15:04.603", + "lastModified": "2024-07-29T22:15:04.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -136,6 +136,10 @@ "Release Notes" ] }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "security@apache.org" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/04/03/16", "source": "security@apache.org" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json index 2c4fd5c4df9..136dcbf4ee0 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27804", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.033", - "lastModified": "2024-07-03T01:50:51.930", + "lastModified": "2024-07-29T22:15:04.233", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -99,6 +99,10 @@ { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214123", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27809.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27809.json new file mode 100644 index 00000000000..dfb5f5519e2 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27809.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27809", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.110", + "lastModified": "2024-07-29T23:15:10.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214084", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27823.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27823.json new file mode 100644 index 00000000000..7648cbfc1d4 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27823.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-27823", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.170", + "lastModified": "2024-07-29T23:15:10.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214107", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json new file mode 100644 index 00000000000..f8af39aa8eb --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27826.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-27826", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.240", + "lastModified": "2024-07-29T23:15:10.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json new file mode 100644 index 00000000000..a8ccb317993 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27853", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.297", + "lastModified": "2024-07-29T23:15:10.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4. A maliciously crafted ZIP archive may bypass Gatekeeper checks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214084", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27862.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27862.json new file mode 100644 index 00000000000..a4f05347621 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27862.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27862", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.363", + "lastModified": "2024-07-29T23:15:10.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6. Enabling Lockdown Mode while setting up a Mac may cause FileVault to become unexpectedly disabled." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27863.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27863.json new file mode 100644 index 00000000000..df6894d1011 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27863.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-27863", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.423", + "lastModified": "2024-07-29T23:15:10.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to determine kernel memory layout." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27871.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27871.json new file mode 100644 index 00000000000..019c39998df --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27871.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-27871", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.490", + "lastModified": "2024-07-29T23:15:10.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27872.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27872.json new file mode 100644 index 00000000000..ea1d40cbfd6 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27872.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27872", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.557", + "lastModified": "2024-07-29T23:15:10.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.6. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27873.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27873.json new file mode 100644 index 00000000000..56b95f32348 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27873.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-27873", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.620", + "lastModified": "2024-07-29T23:15:10.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing a maliciously crafted video file may lead to unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27877.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27877.json new file mode 100644 index 00000000000..a972c224a67 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27877.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-27877", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.690", + "lastModified": "2024-07-29T23:15:10.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Processing a maliciously crafted file may lead to a denial-of-service or potentially disclose memory contents." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json new file mode 100644 index 00000000000..a19fb0e1be1 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27878.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27878", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.747", + "lastModified": "2024-07-29T23:15:10.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6. An app with root privileges may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json new file mode 100644 index 00000000000..e94fd660950 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27881.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-27881", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.807", + "lastModified": "2024-07-29T23:15:10.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access information about a user\u2019s contacts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json new file mode 100644 index 00000000000..05f14cb90b8 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27882.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-27882", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.877", + "lastModified": "2024-07-29T23:15:10.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json new file mode 100644 index 00000000000..26865fee0e4 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27883.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-27883", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:10.940", + "lastModified": "2024-07-29T23:15:10.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json new file mode 100644 index 00000000000..5f9003da87a --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27884.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-27884", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.010", + "lastModified": "2024-07-29T23:15:11.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with a new entitlement. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, visionOS 1.2, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214108", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json new file mode 100644 index 00000000000..3a671ef2207 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27886.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27886", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.067", + "lastModified": "2024-07-29T23:15:11.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sonoma 14.4. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214084", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json new file mode 100644 index 00000000000..c2816bacfc1 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27887.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27887", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.127", + "lastModified": "2024-07-29T23:15:11.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214084", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json new file mode 100644 index 00000000000..08658acbf65 --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27888.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-27888", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.183", + "lastModified": "2024-07-29T23:15:11.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Sonoma 14.4. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214084", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json new file mode 100644 index 00000000000..e29a1d4f36f --- /dev/null +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-3219", + "sourceIdentifier": "cna@python.org", + "published": "2024-07-29T22:15:04.970", + "lastModified": "2024-07-29T22:15:04.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe\n \u201csocket\u201d module provides a pure-Python fallback to the \nsocket.socketpair() function for platforms that don\u2019t support AF_UNIX, \nsuch as Windows. This pure-Python implementation uses AF_INET or \nAF_INET6 to create a local connected pair of sockets. The connection \nbetween the two sockets was not verified before passing the two sockets \nback to the user, which leaves the server socket vulnerable to a \nconnection race from a malicious local peer.\n\nPlatforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/python/cpython/issues/122133", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/122134", + "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json index 3785684bf94..d9f3ae8372e 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json @@ -2,13 +2,13 @@ "id": "CVE-2024-38271", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-26T16:15:11.560", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-29T22:15:04.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quickshare or above" + "value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quick Share or above" }, { "lang": "es", @@ -74,6 +74,10 @@ } ], "references": [ + { + "url": "https://github.com/google/nearby/pull/2402", + "source": "cve-coordination@google.com" + }, { "url": "https://github.com/google/nearby/pull/2433", "source": "cve-coordination@google.com" @@ -81,6 +85,10 @@ { "url": "https://github.com/google/nearby/pull/2435", "source": "cve-coordination@google.com" + }, + { + "url": "https://github.com/google/nearby/pull/2589", + "source": "cve-coordination@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json index 7971b931a74..a1906a103c2 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json @@ -2,13 +2,13 @@ "id": "CVE-2024-38272", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-26T16:15:11.733", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-29T22:15:04.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "There exists a vulnerability in Quickshare/Nearby where an attacker can bypass the accept file dialog on QuickShare Windows.\u00a0Normally in QuickShare Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quickshare or above" + "value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can bypass the accept file dialog on Quick Share Windows.\u00a0Normally in Quick Share Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quick Share or above" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json new file mode 100644 index 00000000000..fd1bd3909f5 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40774.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-40774", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.250", + "lastModified": "2024-07-29T23:15:11.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json new file mode 100644 index 00000000000..75abdf8fcbb --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40775.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40775", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.317", + "lastModified": "2024-07-29T23:15:11.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to leak sensitive user information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json new file mode 100644 index 00000000000..92c01add13e --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40776.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40776", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.387", + "lastModified": "2024-07-29T23:15:11.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json new file mode 100644 index 00000000000..88845178e9a --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40777.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-40777", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.457", + "lastModified": "2024-07-29T23:15:11.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40778.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40778.json new file mode 100644 index 00000000000..6251eecedce --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40778.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40778", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.527", + "lastModified": "2024-07-29T23:15:11.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. Photos in the Hidden Photos Album may be viewed without authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json new file mode 100644 index 00000000000..3cd46d730ac --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40779.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40779", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.590", + "lastModified": "2024-07-29T23:15:11.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json new file mode 100644 index 00000000000..da5ef77c7e0 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40780.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40780", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.660", + "lastModified": "2024-07-29T23:15:11.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json new file mode 100644 index 00000000000..967204ef21f --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40781.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40781", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.727", + "lastModified": "2024-07-29T23:15:11.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json new file mode 100644 index 00000000000..23ed18a201d --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40782.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40782", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.790", + "lastModified": "2024-07-29T23:15:11.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json new file mode 100644 index 00000000000..8817c717fda --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40783.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40783", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.853", + "lastModified": "2024-07-29T23:15:11.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious application may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json new file mode 100644 index 00000000000..6f36ff1de24 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40784.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40784", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.923", + "lastModified": "2024-07-29T23:15:11.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json new file mode 100644 index 00000000000..cc928c3e7d3 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40785.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40785", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:11.997", + "lastModified": "2024-07-29T23:15:11.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to a cross site scripting attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json new file mode 100644 index 00000000000..257e0589114 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40786.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40786", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.070", + "lastModified": "2024-07-29T23:15:12.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view sensitive user information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40787.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40787.json new file mode 100644 index 00000000000..3a3eda4f437 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40787.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-40787", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.133", + "lastModified": "2024-07-29T23:15:12.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40788.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40788.json new file mode 100644 index 00000000000..ed667bf494a --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40788.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-40788", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.200", + "lastModified": "2024-07-29T23:15:12.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to cause unexpected system shutdown." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json new file mode 100644 index 00000000000..4f729bd2b02 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40789", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.270", + "lastModified": "2024-07-29T23:15:12.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40793.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40793.json new file mode 100644 index 00000000000..45d40abd39c --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40793.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-40793", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.337", + "lastModified": "2024-07-29T23:15:12.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40794.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40794.json new file mode 100644 index 00000000000..e4b0a2574cf --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40794.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40794", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.410", + "lastModified": "2024-07-29T23:15:12.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, Safari 17.6. Private Browsing tabs may be accessed without authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40795.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40795.json new file mode 100644 index 00000000000..29c1a23d14e --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40795.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40795", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.477", + "lastModified": "2024-07-29T23:15:12.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved data protection. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to read sensitive location information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40796.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40796.json new file mode 100644 index 00000000000..e03fdd09df1 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40796.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40796", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.540", + "lastModified": "2024-07-29T23:15:12.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Private browsing may leak some browsing history." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40798.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40798.json new file mode 100644 index 00000000000..6ac2800e129 --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40798.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40798", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.600", + "lastModified": "2024-07-29T23:15:12.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to read Safari's browsing history." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json new file mode 100644 index 00000000000..896944b580b --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-40799", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.667", + "lastModified": "2024-07-29T23:15:12.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json new file mode 100644 index 00000000000..ee687bc4250 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40800.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40800", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.743", + "lastModified": "2024-07-29T23:15:12.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An input validation issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json new file mode 100644 index 00000000000..32b460e198f --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40802.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40802", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.810", + "lastModified": "2024-07-29T23:15:12.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40803.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40803.json new file mode 100644 index 00000000000..34b7c58d475 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40803.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40803", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.873", + "lastModified": "2024-07-29T23:15:12.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An attacker may be able to cause unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40804.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40804.json new file mode 100644 index 00000000000..e98dbca47ec --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40804.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40804", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:12.947", + "lastModified": "2024-07-29T23:15:12.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. A malicious application may be able to access private information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json new file mode 100644 index 00000000000..1d4574c9a61 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40805.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40805", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.017", + "lastModified": "2024-07-29T23:15:13.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json new file mode 100644 index 00000000000..79e596c3720 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40806.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-40806", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.083", + "lastModified": "2024-07-29T23:15:13.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json new file mode 100644 index 00000000000..d54c12e703f --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40807.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40807", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.147", + "lastModified": "2024-07-29T23:15:13.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json new file mode 100644 index 00000000000..37b076efdf7 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40809.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40809", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.207", + "lastModified": "2024-07-29T23:15:13.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json new file mode 100644 index 00000000000..ff92a8e7beb --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40811.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40811", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.273", + "lastModified": "2024-07-29T23:15:13.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json new file mode 100644 index 00000000000..2c75d54877b --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40812.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-40812", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.330", + "lastModified": "2024-07-29T23:15:13.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214123", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json new file mode 100644 index 00000000000..c3a98c1112e --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40813.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40813", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.397", + "lastModified": "2024-07-29T23:15:13.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lock screen issue was addressed with improved state management. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6. An attacker with physical access may be able to use Siri to access sensitive user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json new file mode 100644 index 00000000000..42889f5e665 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40814.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40814", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.460", + "lastModified": "2024-07-29T23:15:13.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json new file mode 100644 index 00000000000..da10a02964a --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40815.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-40815", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.523", + "lastModified": "2024-07-29T23:15:13.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json new file mode 100644 index 00000000000..0faa4f72def --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40816.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40816", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.583", + "lastModified": "2024-07-29T23:15:13.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to cause unexpected system shutdown." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json new file mode 100644 index 00000000000..4db9c373ba4 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40817.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40817", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.647", + "lastModified": "2024-07-29T23:15:13.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved UI handling. This issue is fixed in macOS Sonoma 14.6, Safari 17.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Visiting a website that frames malicious content may lead to UI spoofing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214121", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json new file mode 100644 index 00000000000..077c507bc00 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40818.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-40818", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.703", + "lastModified": "2024-07-29T23:15:13.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An attacker with physical access may be able to use Siri to access sensitive user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json new file mode 100644 index 00000000000..fd5324d1851 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40821.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40821", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.770", + "lastModified": "2024-07-29T23:15:13.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Third party app extensions may not receive the correct sandbox restrictions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json new file mode 100644 index 00000000000..ee57b599100 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40822.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40822", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.840", + "lastModified": "2024-07-29T23:15:13.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. An attacker with physical access to a device may be able to access contacts from the lock screen." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json new file mode 100644 index 00000000000..ec6a524a195 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40823.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40823", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.920", + "lastModified": "2024-07-29T23:15:13.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json new file mode 100644 index 00000000000..91ec227b168 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40824.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40824", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:13.990", + "lastModified": "2024-07-29T23:15:13.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214122", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40827.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40827.json new file mode 100644 index 00000000000..c5f392ded07 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40827.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40827", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.067", + "lastModified": "2024-07-29T23:15:14.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json new file mode 100644 index 00000000000..e5cb1a8dc56 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40828.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40828", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.130", + "lastModified": "2024-07-29T23:15:14.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious app may be able to gain root privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json new file mode 100644 index 00000000000..1f72589b202 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40829.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40829", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.193", + "lastModified": "2024-07-29T23:15:14.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view restricted content from the lock screen." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40832.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40832.json new file mode 100644 index 00000000000..cdf3976c7d8 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40832.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40832", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.257", + "lastModified": "2024-07-29T23:15:14.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to view a contact's phone number in system logs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40833.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40833.json new file mode 100644 index 00000000000..bb177683a6d --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40833.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40833", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.333", + "lastModified": "2024-07-29T23:15:14.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json new file mode 100644 index 00000000000..b7be48d04c5 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-40834", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.413", + "lastModified": "2024-07-29T23:15:14.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to bypass sensitive Shortcuts app settings." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json new file mode 100644 index 00000000000..3acb1f98b66 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-40835", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.487", + "lastModified": "2024-07-29T23:15:14.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to use sensitive data with certain actions without prompting the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214118", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214120", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json new file mode 100644 index 00000000000..ba50a4442df --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40836.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-40836", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-07-29T23:15:14.570", + "lastModified": "2024-07-29T23:15:14.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. A shortcut may be able to use sensitive data with certain actions without prompting the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214116", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214117", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214119", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214124", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json index d11aa3c334e..e756f267918 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4879", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-07-10T17:15:12.117", - "lastModified": "2024-07-11T22:15:02.260", + "lastModified": "2024-07-29T23:15:14.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -103,6 +103,10 @@ { "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154", "source": "psirt@servicenow.com" + }, + { + "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit", + "source": "psirt@servicenow.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json index 017a285ada6..78c26e8d700 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5217", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-07-10T17:15:12.373", - "lastModified": "2024-07-11T22:15:02.647", + "lastModified": "2024-07-29T23:15:14.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -103,6 +103,10 @@ { "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313", "source": "psirt@servicenow.com" + }, + { + "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit", + "source": "psirt@servicenow.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json index e0f91e48c6b..54cbc49c0b1 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-01T13:15:06.467", - "lastModified": "2024-07-29T09:15:02.853", + "lastModified": "2024-07-29T22:15:05.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -896,6 +896,18 @@ "Third Party Advisory" ] }, + { + "url": "https://support.apple.com/kb/HT214118", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214119", + "source": "secalert@redhat.com" + }, + { + "url": "https://support.apple.com/kb/HT214120", + "source": "secalert@redhat.com" + }, { "url": "https://ubuntu.com/security/CVE-2024-6387", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json new file mode 100644 index 00000000000..916c41496be --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7248.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7248", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-07-29T22:15:05.553", + "lastModified": "2024-07-29T22:15:05.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Comodo Internet Security Pro Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the update mechanism. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-19055." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-953/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json new file mode 100644 index 00000000000..981f65f24b3 --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7249.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7249", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-07-29T22:15:05.817", + "lastModified": "2024-07-29T22:15:05.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Comodo Firewall Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the application to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21794." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-954/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json new file mode 100644 index 00000000000..fe6d9fbd62d --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7250.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7250", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-07-29T22:15:06.100", + "lastModified": "2024-07-29T22:15:06.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22829." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-955/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json new file mode 100644 index 00000000000..f4bc6a9afc8 --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7251", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-07-29T22:15:06.283", + "lastModified": "2024-07-29T22:15:06.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22832." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-956/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json new file mode 100644 index 00000000000..556cb734f09 --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7252.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7252", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-07-29T22:15:06.497", + "lastModified": "2024-07-29T22:15:06.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22831." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-957/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1d7eb0b3368..be05b980315 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-29T22:00:16.610489+00:00 +2024-07-29T23:55:17.408919+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-29T21:15:12.047000+00:00 +2024-07-29T23:15:14.807000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258335 +258410 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `75` -- [CVE-2017-3755](CVE-2017/CVE-2017-37xx/CVE-2017-3755.json) (`2024-07-29T21:15:10.993`) -- [CVE-2017-3766](CVE-2017/CVE-2017-37xx/CVE-2017-3766.json) (`2024-07-29T21:15:11.060`) -- [CVE-2017-3769](CVE-2017/CVE-2017-37xx/CVE-2017-3769.json) (`2024-07-29T21:15:11.107`) -- [CVE-2019-19759](CVE-2019/CVE-2019-197xx/CVE-2019-19759.json) (`2024-07-29T20:15:02.963`) -- [CVE-2019-19760](CVE-2019/CVE-2019-197xx/CVE-2019-19760.json) (`2024-07-29T20:15:03.067`) -- [CVE-2019-19761](CVE-2019/CVE-2019-197xx/CVE-2019-19761.json) (`2024-07-29T20:15:03.143`) -- [CVE-2019-6162](CVE-2019/CVE-2019-61xx/CVE-2019-6162.json) (`2024-07-29T21:15:11.167`) -- [CVE-2019-6164](CVE-2019/CVE-2019-61xx/CVE-2019-6164.json) (`2024-07-29T21:15:11.227`) -- [CVE-2019-6174](CVE-2019/CVE-2019-61xx/CVE-2019-6174.json) (`2024-07-29T21:15:11.280`) -- [CVE-2019-6185](CVE-2019/CVE-2019-61xx/CVE-2019-6185.json) (`2024-07-29T21:15:11.337`) -- [CVE-2022-4038](CVE-2022/CVE-2022-40xx/CVE-2022-4038.json) (`2024-07-29T20:15:03.317`) -- [CVE-2022-48185](CVE-2022/CVE-2022-481xx/CVE-2022-48185.json) (`2024-07-29T20:15:03.250`) -- [CVE-2023-40396](CVE-2023/CVE-2023-403xx/CVE-2023-40396.json) (`2024-07-29T21:15:11.453`) -- [CVE-2023-40398](CVE-2023/CVE-2023-403xx/CVE-2023-40398.json) (`2024-07-29T21:15:11.537`) -- [CVE-2023-42918](CVE-2023/CVE-2023-429xx/CVE-2023-42918.json) (`2024-07-29T21:15:11.610`) -- [CVE-2023-42925](CVE-2023/CVE-2023-429xx/CVE-2023-42925.json) (`2024-07-29T21:15:11.670`) -- [CVE-2023-42943](CVE-2023/CVE-2023-429xx/CVE-2023-42943.json) (`2024-07-29T21:15:11.740`) -- [CVE-2023-42948](CVE-2023/CVE-2023-429xx/CVE-2023-42948.json) (`2024-07-29T21:15:11.803`) -- [CVE-2023-42949](CVE-2023/CVE-2023-429xx/CVE-2023-42949.json) (`2024-07-29T21:15:11.867`) -- [CVE-2023-42957](CVE-2023/CVE-2023-429xx/CVE-2023-42957.json) (`2024-07-29T21:15:11.930`) -- [CVE-2023-42958](CVE-2023/CVE-2023-429xx/CVE-2023-42958.json) (`2024-07-29T21:15:11.983`) -- [CVE-2023-42959](CVE-2023/CVE-2023-429xx/CVE-2023-42959.json) (`2024-07-29T21:15:12.047`) -- [CVE-2024-6620](CVE-2024/CVE-2024-66xx/CVE-2024-6620.json) (`2024-07-29T20:15:03.910`) +- [CVE-2024-40811](CVE-2024/CVE-2024-408xx/CVE-2024-40811.json) (`2024-07-29T23:15:13.273`) +- [CVE-2024-40812](CVE-2024/CVE-2024-408xx/CVE-2024-40812.json) (`2024-07-29T23:15:13.330`) +- [CVE-2024-40813](CVE-2024/CVE-2024-408xx/CVE-2024-40813.json) (`2024-07-29T23:15:13.397`) +- [CVE-2024-40814](CVE-2024/CVE-2024-408xx/CVE-2024-40814.json) (`2024-07-29T23:15:13.460`) +- [CVE-2024-40815](CVE-2024/CVE-2024-408xx/CVE-2024-40815.json) (`2024-07-29T23:15:13.523`) +- [CVE-2024-40816](CVE-2024/CVE-2024-408xx/CVE-2024-40816.json) (`2024-07-29T23:15:13.583`) +- [CVE-2024-40817](CVE-2024/CVE-2024-408xx/CVE-2024-40817.json) (`2024-07-29T23:15:13.647`) +- [CVE-2024-40818](CVE-2024/CVE-2024-408xx/CVE-2024-40818.json) (`2024-07-29T23:15:13.703`) +- [CVE-2024-40821](CVE-2024/CVE-2024-408xx/CVE-2024-40821.json) (`2024-07-29T23:15:13.770`) +- [CVE-2024-40822](CVE-2024/CVE-2024-408xx/CVE-2024-40822.json) (`2024-07-29T23:15:13.840`) +- [CVE-2024-40823](CVE-2024/CVE-2024-408xx/CVE-2024-40823.json) (`2024-07-29T23:15:13.920`) +- [CVE-2024-40824](CVE-2024/CVE-2024-408xx/CVE-2024-40824.json) (`2024-07-29T23:15:13.990`) +- [CVE-2024-40827](CVE-2024/CVE-2024-408xx/CVE-2024-40827.json) (`2024-07-29T23:15:14.067`) +- [CVE-2024-40828](CVE-2024/CVE-2024-408xx/CVE-2024-40828.json) (`2024-07-29T23:15:14.130`) +- [CVE-2024-40829](CVE-2024/CVE-2024-408xx/CVE-2024-40829.json) (`2024-07-29T23:15:14.193`) +- [CVE-2024-40832](CVE-2024/CVE-2024-408xx/CVE-2024-40832.json) (`2024-07-29T23:15:14.257`) +- [CVE-2024-40833](CVE-2024/CVE-2024-408xx/CVE-2024-40833.json) (`2024-07-29T23:15:14.333`) +- [CVE-2024-40834](CVE-2024/CVE-2024-408xx/CVE-2024-40834.json) (`2024-07-29T23:15:14.413`) +- [CVE-2024-40835](CVE-2024/CVE-2024-408xx/CVE-2024-40835.json) (`2024-07-29T23:15:14.487`) +- [CVE-2024-40836](CVE-2024/CVE-2024-408xx/CVE-2024-40836.json) (`2024-07-29T23:15:14.570`) +- [CVE-2024-7248](CVE-2024/CVE-2024-72xx/CVE-2024-7248.json) (`2024-07-29T22:15:05.553`) +- [CVE-2024-7249](CVE-2024/CVE-2024-72xx/CVE-2024-7249.json) (`2024-07-29T22:15:05.817`) +- [CVE-2024-7250](CVE-2024/CVE-2024-72xx/CVE-2024-7250.json) (`2024-07-29T22:15:06.100`) +- [CVE-2024-7251](CVE-2024/CVE-2024-72xx/CVE-2024-7251.json) (`2024-07-29T22:15:06.283`) +- [CVE-2024-7252](CVE-2024/CVE-2024-72xx/CVE-2024-7252.json) (`2024-07-29T22:15:06.497`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `19` -- [CVE-2024-38773](CVE-2024/CVE-2024-387xx/CVE-2024-38773.json) (`2024-07-29T20:07:57.597`) -- [CVE-2024-38788](CVE-2024/CVE-2024-387xx/CVE-2024-38788.json) (`2024-07-29T20:19:47.727`) -- [CVE-2024-5861](CVE-2024/CVE-2024-58xx/CVE-2024-5861.json) (`2024-07-29T20:32:37.267`) -- [CVE-2024-6094](CVE-2024/CVE-2024-60xx/CVE-2024-6094.json) (`2024-07-29T20:20:51.257`) -- [CVE-2024-6836](CVE-2024/CVE-2024-68xx/CVE-2024-6836.json) (`2024-07-29T20:20:30.867`) +- [CVE-2023-27952](CVE-2023/CVE-2023-279xx/CVE-2023-27952.json) (`2024-07-29T22:15:02.630`) +- [CVE-2023-38709](CVE-2023/CVE-2023-387xx/CVE-2023-38709.json) (`2024-07-29T22:15:02.800`) +- [CVE-2023-38823](CVE-2023/CVE-2023-388xx/CVE-2023-38823.json) (`2024-07-29T22:15:03.200`) +- [CVE-2023-45249](CVE-2023/CVE-2023-452xx/CVE-2023-45249.json) (`2024-07-29T23:15:09.877`) +- [CVE-2023-52356](CVE-2023/CVE-2023-523xx/CVE-2023-52356.json) (`2024-07-29T22:15:03.340`) +- [CVE-2023-6277](CVE-2023/CVE-2023-62xx/CVE-2023-6277.json) (`2024-07-29T22:15:03.530`) +- [CVE-2024-2004](CVE-2024/CVE-2024-20xx/CVE-2024-2004.json) (`2024-07-29T22:15:04.373`) +- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-07-29T22:15:03.750`) +- [CVE-2024-2379](CVE-2024/CVE-2024-23xx/CVE-2024-2379.json) (`2024-07-29T22:15:04.493`) +- [CVE-2024-2398](CVE-2024/CVE-2024-23xx/CVE-2024-2398.json) (`2024-07-29T22:15:04.563`) +- [CVE-2024-2466](CVE-2024/CVE-2024-24xx/CVE-2024-2466.json) (`2024-07-29T22:15:04.697`) +- [CVE-2024-24795](CVE-2024/CVE-2024-247xx/CVE-2024-24795.json) (`2024-07-29T22:15:04.000`) +- [CVE-2024-27316](CVE-2024/CVE-2024-273xx/CVE-2024-27316.json) (`2024-07-29T22:15:04.113`) +- [CVE-2024-27804](CVE-2024/CVE-2024-278xx/CVE-2024-27804.json) (`2024-07-29T22:15:04.233`) +- [CVE-2024-38271](CVE-2024/CVE-2024-382xx/CVE-2024-38271.json) (`2024-07-29T22:15:04.757`) +- [CVE-2024-38272](CVE-2024/CVE-2024-382xx/CVE-2024-38272.json) (`2024-07-29T22:15:04.883`) +- [CVE-2024-4879](CVE-2024/CVE-2024-48xx/CVE-2024-4879.json) (`2024-07-29T23:15:14.650`) +- [CVE-2024-5217](CVE-2024/CVE-2024-52xx/CVE-2024-5217.json) (`2024-07-29T23:15:14.807`) +- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-29T22:15:05.043`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fbbfe762c78..5bc260adc59 100644 --- a/_state.csv +++ b/_state.csv @@ -104111,7 +104111,7 @@ CVE-2017-3751,0,0,c41c9d0e86cb64e759d93cc477214289fe4f49aa1fb4d96d5b11e273a0d5a9 CVE-2017-3752,0,0,3f8236cbe38b0aa5ddeef3557b818069efd51cfec3aca7f0740129c9136463df,2017-08-30T17:50:54.717000 CVE-2017-3753,0,0,6885f1fb74ae8e4a5761a0d1dac9baf06044d26293188d3a7506faf2627bd3ac,2017-08-29T15:38:35.337000 CVE-2017-3754,0,0,96ae0f4004c362ccca5d02bf206696913af7be90df8bb274095b6a747517ebe2,2019-10-03T00:03:26.223000 -CVE-2017-3755,1,1,e92739d2a7219c4732dba5514b0832bafea85263e5ec5c98f04ab62c7f2f6e8b,2024-07-29T21:15:10.993000 +CVE-2017-3755,0,0,e92739d2a7219c4732dba5514b0832bafea85263e5ec5c98f04ab62c7f2f6e8b,2024-07-29T21:15:10.993000 CVE-2017-3756,0,0,260d30c8c73fd74ac6c7e878306c58ec6720fd1a02c0a3bb5ba4e21abe2b5fbd,2019-10-03T00:03:26.223000 CVE-2017-3757,0,0,b1839a940d6313d174f67a23644a4304ae3563ec749eb548651d4e4c81e64a19,2017-09-12T15:49:33.527000 CVE-2017-3758,0,0,1122b61558482a3cbb7dffcb3376a228b976a0e8f123dfbb03559b1ff35a6226,2019-10-03T00:03:26.223000 @@ -104122,10 +104122,10 @@ CVE-2017-3762,0,0,9e624e8954d672f2c74c3a1e3cc86593e8c364116dbf2c699d6121b9ab5624 CVE-2017-3763,0,0,3299e98e83030c603b72768fa88233a271c613693111b81aa4394bf009196fad,2019-10-03T00:03:26.223000 CVE-2017-3764,0,0,b5fbb53cd08bdf79eef899db5db7f7a6fa5716c49e4a934cde05faa7e5baf089,2017-12-20T19:04:30.500000 CVE-2017-3765,0,0,45535ba4753e25ac3e37eb008b8251d1ae19b1cc923835055b3c96a33a9bcb6b,2018-02-06T14:12:49.383000 -CVE-2017-3766,1,1,34268b66911223769008ab0475dc157a0bcbc37cd4878eb729c7230928f7b401,2024-07-29T21:15:11.060000 +CVE-2017-3766,0,0,34268b66911223769008ab0475dc157a0bcbc37cd4878eb729c7230928f7b401,2024-07-29T21:15:11.060000 CVE-2017-3767,0,0,b5f484a650273b6f905d1434fd97edea273c36678fa198859a1da78cc31c4b2f,2019-10-03T00:03:26.223000 CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c22,2018-02-15T18:06:48.340000 -CVE-2017-3769,1,1,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000 +CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000 CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000 CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000 CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000 @@ -136728,10 +136728,10 @@ CVE-2019-19755,0,0,576757e2e80399dccbdae0a683a118ad6db6a7bb95bf0a7d9944e6ac94367 CVE-2019-19756,0,0,1ac0bdab62e30eb5ab1a78699b860a548408938df444dc2031b32d44e57bf16c,2021-11-02T19:16:30.403000 CVE-2019-19757,0,0,6c08333c002f3e1b918b084afd5e3199189401eb1cffc5772a8ec918e1cd505b,2020-02-24T17:53:03.400000 CVE-2019-19758,0,0,f3cf0ee2a978417eaa68c2b04df4207f79bbea00f53f54a34da27466d93768b8,2020-02-27T14:16:50.720000 -CVE-2019-19759,1,1,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000 +CVE-2019-19759,0,0,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000 CVE-2019-1976,0,0,b8d808fbb262d28f23598cf45a4449f191ba6525e2a71abe6997a7ac93fe18a3,2020-10-16T14:12:47.730000 -CVE-2019-19760,1,1,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000 -CVE-2019-19761,1,1,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000 +CVE-2019-19760,0,0,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000 +CVE-2019-19761,0,0,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000 CVE-2019-19762,0,0,feb988600c3fc6ca7d1a933280b0be01b94e3ac7fbb425729dfcea7e6ffd9601,2023-11-07T03:07:46.650000 CVE-2019-19763,0,0,a0500b6440b16a5a1c2f0654d7e76553a99823fe0d847fa5827465e146d7f844,2023-11-07T03:07:46.963000 CVE-2019-19764,0,0,d1e9c742359c37d5db227c8fbac2d9d2e61d282573b32d622f1d5729fb94a9f7,2023-11-07T03:07:47.273000 @@ -141045,9 +141045,9 @@ CVE-2019-6158,0,0,db2e2781e7ba231fa64c0d6f7f3025dc91189c92e16915bb1280bbb7743bf3 CVE-2019-6159,0,0,6716deec9a9a136fb16a0ffbe7846839072001c97cdee984781cc2f46d237ef6,2023-03-29T16:23:13.830000 CVE-2019-6160,0,0,b2d5dce84b00aaa04fc07f413ed16929038155671fb4f39c51535abe6481cb4e,2020-08-24T17:37:01.140000 CVE-2019-6161,0,0,99cd0266289724d21255d7e9cfa2cc87b5efa2a874b60905ffab2ffe6eaae87f,2019-10-01T13:38:44.840000 -CVE-2019-6162,1,1,12368a95f492eb49b6d04a584fe5786db39a16d95f89a27258238e3d5dc131fb,2024-07-29T21:15:11.167000 +CVE-2019-6162,0,0,12368a95f492eb49b6d04a584fe5786db39a16d95f89a27258238e3d5dc131fb,2024-07-29T21:15:11.167000 CVE-2019-6163,0,0,027c0edcbb45ae583db40ecd12ff52e73eba13c1a8256f46f27e2daedabee719,2019-09-13T19:15:10.510000 -CVE-2019-6164,1,1,fb0be18f71c39ed585bba818da6aab0bba8f749f2c70054d5f51df9739125284,2024-07-29T21:15:11.227000 +CVE-2019-6164,0,0,fb0be18f71c39ed585bba818da6aab0bba8f749f2c70054d5f51df9739125284,2024-07-29T21:15:11.227000 CVE-2019-6165,0,0,6d179b5ca377e0b83e665ebd6910f73c7607e8fea52be8824995fe22e6f9c9c6,2023-02-02T16:12:47.457000 CVE-2019-6166,0,0,ab677c9ea5d642a1e2b8423dd4fda786f41249e744894f3277ae11cc48081cac,2022-10-14T03:16:01.347000 CVE-2019-6167,0,0,4d4d8ba42a1778d05302e4fbddb18543a4d71facfdb5cb7f949562ec29734657,2022-10-14T03:17:14.353000 @@ -141057,7 +141057,7 @@ CVE-2019-6170,0,0,f9abca4baf6d34b7b752a733554d53bd433ea5cab38f61027cee433cace7e3 CVE-2019-6171,0,0,1c0cedf99197e5615db52b5825e8bae7ceb0533aa9af9cbb22e375671bda923c,2022-10-19T13:31:18.703000 CVE-2019-6172,0,0,4dd7d7bc92cca79ec52e34a3a066f06d73f86817e25dd9c29869df14fc4876c1,2020-12-08T19:34:24.080000 CVE-2019-6173,0,0,c3a794edcfbfeae5a309816c65d1d4070e27e4fb48bf5b6f040044efbf93f698,2020-06-22T15:32:04.143000 -CVE-2019-6174,1,1,c1026a4a4003c1810f92ae8bed6a48066f3801813c1d105df30c12b536451215,2024-07-29T21:15:11.280000 +CVE-2019-6174,0,0,c1026a4a4003c1810f92ae8bed6a48066f3801813c1d105df30c12b536451215,2024-07-29T21:15:11.280000 CVE-2019-6175,0,0,b9ae54d8304dd7132011bb36f0cb0ec94cb982ffedbe169a883be8f42d1b032a,2020-08-24T17:37:01.140000 CVE-2019-6176,0,0,cd029beefa2dcb154fa2a100d442f4e79058bcc75fe1dda8d900168e016668e2,2019-11-21T20:46:23.820000 CVE-2019-6177,0,0,f883c040825cd6f9e94c9e8135bf040fd81c03540fd62110d930a256667693d6,2022-10-14T03:29:20.130000 @@ -141068,7 +141068,7 @@ CVE-2019-6181,0,0,796ed2285282dcbef326f51c4b1c2159381b26f117857ec4ff64b9077806ac CVE-2019-6182,0,0,54abd660fc93f3a87156acd4c96296d180651b62e80d1c7700a14f69f4fc44c8,2022-10-14T03:20:44.237000 CVE-2019-6183,0,0,471187a22fe315f5a24b60bcb7fbcfab43426e78197ac569598348df4396cdac,2020-08-24T17:37:01.140000 CVE-2019-6184,0,0,67da7c21e09f9811494a2f3e524833f2ee4f2aace057241287d38b3d40a16302,2020-08-24T17:37:01.140000 -CVE-2019-6185,1,1,228dcda793b8f7680d98bbf05b5314c55adae6c96d48b324bdceeb0dd43677fb,2024-07-29T21:15:11.337000 +CVE-2019-6185,0,0,228dcda793b8f7680d98bbf05b5314c55adae6c96d48b324bdceeb0dd43677fb,2024-07-29T21:15:11.337000 CVE-2019-6186,0,0,0c244d9d313587d3a55ff5ca86df7dbd7694be6aeaebb9499ed628aeba413ecc,2019-11-22T01:08:15.587000 CVE-2019-6187,0,0,9f3daa3a701d124fdb7e13a5de8263f3e10947d984243be3b09d688e97c1c371,2020-08-24T17:37:01.140000 CVE-2019-6188,0,0,8c194678f0f298b6aca4ed9e27b16d62a15a8bd2b4a937efd68fb69c71a5a8f7,2020-08-24T17:37:01.140000 @@ -206130,7 +206130,7 @@ CVE-2022-40363,0,0,6423f008d6342ae2cc78b421a216227fd5616496935395403c04363593fde CVE-2022-40365,0,0,cccb355bc930a63d76ccf4edda04284e6432e8bb2daddd5b67c972ab54a0dc37,2022-09-16T19:27:25.667000 CVE-2022-4037,0,0,f9bfdcdd7a52fa2ba84a650512e429bbca1eb66830ef1e3d5ef723ccfa5f4768,2023-01-20T15:34:23.423000 CVE-2022-40373,0,0,b40950a62f31c60645353599eed93c867e8b30ad31aeed9332d5b03847c87a1e,2022-12-19T16:24:55.247000 -CVE-2022-4038,1,1,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000 +CVE-2022-4038,0,0,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000 CVE-2022-4039,0,0,06b2484bc7b98d5624dca70127d033f0293995e2c6bd62ddc46e10485416b22b,2023-11-07T03:56:46.790000 CVE-2022-40402,0,0,07221e21cc3b86eaea1c2aa42f779291ec2c4027c37a9d13f512ed9b452e0cf5,2022-09-27T04:55:48.947000 CVE-2022-40403,0,0,2e90a1a52eb04792ffb948ebc6c233ad8804fe02fb818b40ffe367c3c2b856d5,2022-09-27T04:48:12.660000 @@ -211718,7 +211718,7 @@ CVE-2022-4818,0,0,efda42f09829854104f88653d6fb0c138476703b4f95d3761b4e08c8297d3f CVE-2022-48181,0,0,8474c885691c667425c24561d8f78dae5439ab49cb7f311d56f40947c953be1e,2023-06-13T19:34:14.697000 CVE-2022-48182,0,0,d6534c9d85a0a5705048242e38159eac056a9605d6b5d2af1acd18f1a63ce69a,2023-10-12T18:37:01.287000 CVE-2022-48183,0,0,94faee17e8c16e496e7c5e93f974ef6ee83c64e3e512d3af5b7ecf56ec8ec9ec,2023-10-12T18:36:54.013000 -CVE-2022-48185,1,1,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000 +CVE-2022-48185,0,0,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000 CVE-2022-48186,0,0,45597050fd15461922f8e20a35c354618461ad4684fd2b360fd9ec3fd80dbd81,2023-05-09T20:16:38.417000 CVE-2022-48187,0,0,ff1590e9a690fb0ae260adde2c69973167f534b3795163c9e5f0527961fbe91f,2023-11-07T03:56:29.847000 CVE-2022-48188,0,0,1e9d177db03926434670d4fa3d381984ab7fc2522bdcb986b41da06206088453,2023-06-13T21:19:19.467000 @@ -220766,7 +220766,7 @@ CVE-2023-27949,0,0,944faf80b76c50b74dc9f86e54418c3639db6dde85f7c8b3b133bec768bc1 CVE-2023-2795,0,0,9ad05231de618cab902152898f9f0ae4ae98137a6dc5971cb73675b90e785ded,2023-11-07T04:13:20.667000 CVE-2023-27950,0,0,feb689a552dec920776bdc5fd711a87a696d8738fa7aecc419d3821172950278,2023-09-08T15:48:43.720000 CVE-2023-27951,0,0,07a8ad9c973513f5c325e744ef00500a0159b771326db5c192813f47eada229a,2023-07-27T04:15:19.403000 -CVE-2023-27952,0,0,667b31af1f5284a8224d57dd8528db25020aa768603ab7b2b81266a9b33dfacb,2023-07-27T04:15:19.543000 +CVE-2023-27952,0,1,c849c263ca6930acc9a6872a34912c54f9b71518a672fa0eaf54060adcd764fd,2024-07-29T22:15:02.630000 CVE-2023-27953,0,0,db7677358cfada1374a2084252ff651805fd9c27cc8716e644cdc58ca7909025,2023-07-27T04:15:19.687000 CVE-2023-27954,0,0,86ec702ff6bf2ca2eeaf185b6dc647ac5fa3bd57e022135f73fe1a29c5ca66a2,2023-07-27T04:15:19.933000 CVE-2023-27955,0,0,197d65afc1fcce777628be2cabccd5c3e41f2fff9260001ce4394d261ba19db5,2023-07-27T04:15:20.063000 @@ -228997,7 +228997,7 @@ CVE-2023-38704,0,0,e8f61e669641b4541b9dead34f29bdaa6050ad5483b1650192a2a7fffecb7 CVE-2023-38706,0,0,f3b7a28d99df82bfb4b65abf6b7ea5765da2d19f9dab4e40045ea292dfc87d75,2023-09-20T19:59:40.533000 CVE-2023-38707,0,0,9347e60d24d7ba37513b78e42026dca258290cd85b3a3ac2815752767f123f99,2023-11-07T04:17:23.830000 CVE-2023-38708,0,0,34b544bf48e1f9934c27a77b390dffc52ab8cd8bf31c3289afb5eb9e239abd11,2023-08-09T16:15:56.907000 -CVE-2023-38709,0,0,5fe10cdc0a92b04952b23a0dc4a6a25f0424e3048a272e021736b407505a8983,2024-06-10T17:16:12.647000 +CVE-2023-38709,0,1,f340467c92c022f961e84b4f91cf5aa415ed1b501bd2bfa8ac670b7def6e1b99,2024-07-29T22:15:02.800000 CVE-2023-3871,0,0,b63a6f980224e42fe5cec7ad5cf482968e70b380f7a48c7c40b58a1e34ebf7b7,2024-05-17T02:27:54.960000 CVE-2023-38710,0,0,1a53a43418ab06aa38abdb8383b4db665cd5dd79b4ddecbb9e27a105cfd1fc62,2023-12-11T19:34:38.997000 CVE-2023-38711,0,0,d83687734955dc99b560e3e7b1db054c0db054a346c91e162d4f81a073993ace,2023-12-12T13:52:11.970000 @@ -229062,7 +229062,7 @@ CVE-2023-38814,0,0,9aac3e73f3dea67ff499610adc8aebc4b1bdfe7348e3a0c13ce93d8235db4 CVE-2023-38815,0,0,64c2f1cafe170788d2dae17acd97f143483ea35d344d1c405785fd711091d743,2023-11-07T04:17:24.550000 CVE-2023-38817,0,0,02f08d8764e58ddff92f8e71f36696396282f0c973dbc17473db3d1e17ca402b,2024-07-09T18:15:08.577000 CVE-2023-3882,0,0,9718e1f58a19c190f2b6dde660ada479b6caee0f419bab2f92a01d8ef1d1c033,2024-05-17T02:27:56.237000 -CVE-2023-38823,0,0,26d29675a5e84bfb0c856c8d7f7d027ef66693c5118506098df2f708c99ee394,2023-11-28T22:02:33.013000 +CVE-2023-38823,0,1,12b5bce357005cd17e55ba4fde9aeb3463513dd0698d17dc4225732b578c45a9,2024-07-29T22:15:03.200000 CVE-2023-38825,0,0,ac97f5cf8dd7bce10fc69be98839c094a86ce9979a52853cf9d5c403f72cab08,2024-03-21T12:58:51.093000 CVE-2023-38826,0,0,8ff5f457fccec1f91d2c727b83fd1b215cb0cb1f56602e1deed062bd46c7f82e,2024-01-03T22:54:24.607000 CVE-2023-38827,0,0,f54704191f2a7b8aca2114c6e95cb655be16715db44f89dbfa31fbeb928e6e0a,2024-01-16T18:57:56.167000 @@ -230273,9 +230273,9 @@ CVE-2023-40392,0,0,b54a0d5914b9186321a665f5b2009e1d4bda632c5b381d56f487e57d220d2 CVE-2023-40393,0,0,e0720121847159abda778d2f646c0c7e848f8bc72fbac40185b3c98f6a69162e,2024-01-17T18:30:39.897000 CVE-2023-40394,0,0,526da955586233b1a7b2dc9d999b1f0be86354cdad86453374676f9733b0041a,2024-01-18T14:31:24.653000 CVE-2023-40395,0,0,8951a0da5934955ebf0f075ae9e557422fd4c66d3267f9876fe4bc4a0543d4dc,2023-11-07T04:20:13.073000 -CVE-2023-40396,1,1,d6752cd7a4f5887d72b9410a9baa5f59ca3a082ed6903a7d64ce47cde737412c,2024-07-29T21:15:11.453000 +CVE-2023-40396,0,0,d6752cd7a4f5887d72b9410a9baa5f59ca3a082ed6903a7d64ce47cde737412c,2024-07-29T21:15:11.453000 CVE-2023-40397,0,0,48f5d35694eda11e063d524064bdc097e2aab2bd9e9d13544e89fbc0b53f0c7b,2024-01-05T14:15:47.920000 -CVE-2023-40398,1,1,a8b3b99a6c0f2bf3869bd949fe9b38fccdedf4ff103dc8f1b205b13e8bd91b85,2024-07-29T21:15:11.537000 +CVE-2023-40398,0,0,a8b3b99a6c0f2bf3869bd949fe9b38fccdedf4ff103dc8f1b205b13e8bd91b85,2024-07-29T21:15:11.537000 CVE-2023-40399,0,0,091e5a2db15fd5f665ca444b78b62be5004d4abcf322f2dee4eb3017386c844e,2023-11-07T04:20:13.200000 CVE-2023-4040,0,0,e11728f161945388107c8ae43690a4d8736e1afb7e958f898d615bcdea0c7a50,2023-11-07T04:22:04.223000 CVE-2023-40400,0,0,40794a10c4c9163312504f098de9ecd9780321feca619f02675db3767c324753,2023-12-22T16:10:51.593000 @@ -232196,14 +232196,14 @@ CVE-2023-42914,0,0,f5f29cd9efb0b6e902e417bba37ba297b7c917356de5179adf80ab896d374 CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000 CVE-2023-42916,0,0,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000 CVE-2023-42917,0,0,15549d591e10c4a0f8e1ae1b9de5e6d4081ffb5c46b1b7c185d2789ea21a2acb,2024-06-26T20:01:23.280000 -CVE-2023-42918,1,1,ac21c0fcce55bc3ae0926ccfbebdf5bf10c71e98b0550ecae108153c2300a377,2024-07-29T21:15:11.610000 +CVE-2023-42918,0,0,ac21c0fcce55bc3ae0926ccfbebdf5bf10c71e98b0550ecae108153c2300a377,2024-07-29T21:15:11.610000 CVE-2023-42919,0,0,f9a3b1dae89bc9cf392d1cf8dea65cc44606d99a0ff0603d430f6ace7681b3a7,2023-12-14T14:08:16.317000 CVE-2023-4292,0,0,3ea59f0e5840e07b56bc2aae1b281e2ab80136b2b379398236c012d0899a4d88,2023-09-22T13:48:01.647000 CVE-2023-42920,0,0,967029ebc9d2fa13e49b3b2a7e43266d0af79ef15d4513e03a7c68b3187f308f,2024-03-20T13:00:16.367000 CVE-2023-42922,0,0,d462ec8a37d9ad76a8353a6b4d7d79094fede2b875e86ffc84e579e57a42a188,2023-12-14T14:05:30.140000 CVE-2023-42923,0,0,2718c43e187a8424615b9f8de717d1e9605fa64e6eb699c03e6b09fc5d5d64d5,2023-12-13T21:19:46.137000 CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa779,2023-12-13T21:17:10.803000 -CVE-2023-42925,1,1,7f5756665c935d986aa32de37edc3c48523a8f96d6401bb1bca180e48e9013ff,2024-07-29T21:15:11.670000 +CVE-2023-42925,0,0,7f5756665c935d986aa32de37edc3c48523a8f96d6401bb1bca180e48e9013ff,2024-07-29T21:15:11.670000 CVE-2023-42926,0,0,10536a0e5d0896ff760b50cd54c1cef47c09b911f9aeabee54318eada99b22f1,2024-02-02T03:11:34.350000 CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000 CVE-2023-42928,0,0,0f96803af50c6bf772f0d2998c444df6f973590aa281ef5d0e5f7a9046ef4c87,2024-02-22T19:07:27.197000 @@ -232223,12 +232223,12 @@ CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f80 CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000 CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000 CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000 -CVE-2023-42943,1,1,f6d5d7e883a22d5910d1e1d3956b5aff761b61d6b9d83a08708a57e110d1b88b,2024-07-29T21:15:11.740000 +CVE-2023-42943,0,0,f6d5d7e883a22d5910d1e1d3956b5aff761b61d6b9d83a08708a57e110d1b88b,2024-07-29T21:15:11.740000 CVE-2023-42945,0,0,a06b1aec09c4d06c83c2ecc43e93c97ac1de84ec55101d5962c5f9ba2c7586a9,2024-02-22T19:07:27.197000 CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000 CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000 -CVE-2023-42948,1,1,096cc4f0f8df892a53138a76d1c11c3301eb9cb58b0b6660631b21d836e00f0f,2024-07-29T21:15:11.803000 -CVE-2023-42949,1,1,474e9d0b9f738b6e5107bf957a3b7c8719ccc30684a627c9c05cb8b4eb2a2179,2024-07-29T21:15:11.867000 +CVE-2023-42948,0,0,096cc4f0f8df892a53138a76d1c11c3301eb9cb58b0b6660631b21d836e00f0f,2024-07-29T21:15:11.803000 +CVE-2023-42949,0,0,474e9d0b9f738b6e5107bf957a3b7c8719ccc30684a627c9c05cb8b4eb2a2179,2024-07-29T21:15:11.867000 CVE-2023-4295,0,0,ec334b74dcc01539baa3eed8300f24e0d43c22b250be6de255e7d71ca4f97cb4,2023-12-28T17:14:36.030000 CVE-2023-42950,0,0,7d5905ff324fe033699a11a15d8566fd52354d2018009bfba134ef93fd3c72e7,2024-06-12T10:15:27.083000 CVE-2023-42951,0,0,5599d72d1055314191c8db46df9d7c3c52edb7a93dbd3fb4d584b453f42b45e7,2024-02-22T19:07:27.197000 @@ -232237,9 +232237,9 @@ CVE-2023-42953,0,0,10e4b94939ee0a7c816d850e4e7befeb67bf5108acf30f852eb067399e688 CVE-2023-42954,0,0,065c350829c9b241771d1bca2f08dbf3f9951aa86fb8dbf545b8b0f102b1a850,2024-03-22T12:45:36.130000 CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 CVE-2023-42956,0,0,66b0dda941d2a4925cbdb9e601d4277739f51c5e0165d598d707e4a6d9b3fb9b,2024-06-12T10:15:27.210000 -CVE-2023-42957,1,1,d24fbe1f9b92907f4a10436deb8f6c75bdc1c1ea674bb2720e77764ea20251b5,2024-07-29T21:15:11.930000 -CVE-2023-42958,1,1,4fc62e668da46c99991dded531c220534c006dab4b194ea4cf8d5e395788b722,2024-07-29T21:15:11.983000 -CVE-2023-42959,1,1,0f86f809cdd468ac9c734cb41f847ae78a24bbc25a6806b2d0e30fb9854064a3,2024-07-29T21:15:12.047000 +CVE-2023-42957,0,0,d24fbe1f9b92907f4a10436deb8f6c75bdc1c1ea674bb2720e77764ea20251b5,2024-07-29T21:15:11.930000 +CVE-2023-42958,0,0,4fc62e668da46c99991dded531c220534c006dab4b194ea4cf8d5e395788b722,2024-07-29T21:15:11.983000 +CVE-2023-42959,0,0,0f86f809cdd468ac9c734cb41f847ae78a24bbc25a6806b2d0e30fb9854064a3,2024-07-29T21:15:12.047000 CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000 CVE-2023-42962,0,0,35794e89578ee19a4b7d15e17dbc849654eef14cc3d488dadb444cc2c1961a1a,2024-04-08T22:47:42.510000 CVE-2023-4297,0,0,047ed4f9023e2ddaed83a6b2684e12e7cb9df8581e91d1a9b5f1e7175f976ace,2024-07-12T16:11:19.193000 @@ -233642,7 +233642,7 @@ CVE-2023-45245,0,0,f71f5550bce318c5896855b0720ef3b014b7edad826762736cbbe2c3e48a3 CVE-2023-45246,0,0,6799976449efb5e7dfbd39ca49c91e79edc135b105c217fc842128d098ea333b,2023-10-11T17:20:21.937000 CVE-2023-45247,0,0,cf730bce8af4196d54c7fa8e0341f517de223cc02208e0ec0dd8e04054077116,2023-10-11T19:06:49.937000 CVE-2023-45248,0,0,cde75e840aad96dac96b2f35c9e6f15ef3cf04deb0931c7f7ba39cfb3ca21688,2024-02-27T17:15:10.327000 -CVE-2023-45249,0,0,3cf14811a2b45b8e31cbb5e7cfa40d83d5d729bf0b0c56d3f2d80dc651a38108,2024-07-26T12:48:15.370000 +CVE-2023-45249,0,1,1bc9ce809ecf314861ecbfa8f85f135583f2993914971c1bf11334a02b51e3f3,2024-07-29T23:15:09.877000 CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9ba6,2023-11-07T04:22:41.327000 CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000 CVE-2023-45252,0,0,307228454f587d0983793c9bfdd500c095874fad12af348d470cff72f1f8a6d2,2023-12-08T18:45:28.017000 @@ -238544,7 +238544,7 @@ CVE-2023-52352,0,0,5e107ecf2b7a6400f671cc5a9a0f89213e61b31027cc0ebaefad36aa04e25 CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f859777c0,2024-01-29T15:53:20.917000 CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000 CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000 -CVE-2023-52356,0,0,c1a260f7f038d28c1e0dd6374157023869a940cc7b6d8bf5c486caa60203e908,2024-03-11T13:15:52.753000 +CVE-2023-52356,0,1,45849d7a53226b08b6d7c576627d21243ff7e01dedeeea45ce339b329398ce52,2024-07-29T22:15:03.340000 CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000 CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000 CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000 @@ -240006,7 +240006,7 @@ CVE-2023-6273,0,0,bfe15761d0e2bb921ed3c0d0c2c36c03a1656966fe638d3401638d2cebdb26 CVE-2023-6274,0,0,4f530dd28ac44051dca761bb89d18362b76653c5f1bd1f7f9a0b0b7fc6974e6b,2024-05-17T02:33:36.680000 CVE-2023-6275,0,0,1df4a2d506677de951981566edaf40c947c0fb87ae017e4f3b204b0bc3f9bb45,2024-05-17T02:33:36.787000 CVE-2023-6276,0,0,24c3dc4dd47e004cfc2d394ab4aa6804146bc09890750cb25a878e0ee9940b41,2024-05-17T02:33:36.890000 -CVE-2023-6277,0,0,e64598bc4845ef933a63cfce11b44a1186885c79098ccf9efb29eb3604a2126f,2024-01-19T16:15:11.057000 +CVE-2023-6277,0,1,33cbd357819d72228e36155bc3bfe5ff1303c021d43ad9d4ccf58c3dc2c4d083,2024-07-29T22:15:03.530000 CVE-2023-6278,0,0,c78b8d879da1ce114b8d36c4602cd8be742dae98eec5ce3b7337c3170b6a2e43,2024-02-03T01:23:05.233000 CVE-2023-6279,0,0,058b7b47599ec599cdb9a002a2c8fd40321be5fd43b36531af9da360a427c486,2024-02-03T01:22:07.893000 CVE-2023-6280,0,0,87ee32c86b2c6404c104c84ee2fafd835c9be3dfccae6ec09e648330480cc30f,2024-05-17T02:33:37.093000 @@ -242694,7 +242694,7 @@ CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a CVE-2024-20037,0,0,9c45a018c7c075a8a97c9a68674f13d53eed1650b73e588cabb51078922b13c9,2024-03-04T13:58:23.447000 CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000 CVE-2024-20039,0,0,68d71d9533ee3a71787cbfe2ab34478818f0903af4255681b79317a3506c2dcd,2024-04-01T12:49:09.583000 -CVE-2024-2004,0,0,986b9069f0e16c9cad75d0af17c842c0acbddb79c7dfed57e096aa6b1b17c80f,2024-07-03T01:52:57.560000 +CVE-2024-2004,0,1,ed66cd00a62a4714c38518303868d9d029bdeae31c990354a09ca3981351c2e6,2024-07-29T22:15:04.373000 CVE-2024-20040,0,0,7794263a0ff9ef7a9a293c11fabe2693e4a31f8e28a938c194a6c9b335ae777e,2024-04-01T12:49:09.583000 CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 @@ -244760,6 +244760,7 @@ CVE-2024-23258,0,0,52aef1e9d6cc8d17d23b996b2711a0df58dc5d1ea500a1b8fa34d0615dc37 CVE-2024-23259,0,0,32180f50b016e600303bef490f7c44972cd0819551854177dd2a129ee13314e5,2024-03-13T21:15:57.180000 CVE-2024-2326,0,0,3c8b37146da325cce38aec51267ca4284760cd42c72a832b281add7789332b70,2024-03-25T01:51:01.223000 CVE-2024-23260,0,0,cfbcfeb19854283a9e5066e6e8e5e90d2605569101e96973822703b992d8a487,2024-03-13T21:15:57.227000 +CVE-2024-23261,1,1,fbd4fb6f0575c693de6014b4bec875b5d16de5ef425017e845bbb2dbae55281e,2024-07-29T23:15:10.037000 CVE-2024-23262,0,0,62d9ca66899810aa5c6562616e9cb31025a85566f240255b691a56f330edff70,2024-03-13T23:15:46.790000 CVE-2024-23263,0,0,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000 CVE-2024-23264,0,0,e8679cdfb620ed4032710b82b0ab29602601551c60ac1c22de87e1638374eb53,2024-03-13T23:15:46.883000 @@ -244797,7 +244798,7 @@ CVE-2024-23292,0,0,f5276fc6b99c3fe604590c2b2122f4a436bc2bab6e0ae212225461a31d58c CVE-2024-23293,0,0,985096bd22ec764c85e903a49a99ed4147dd2d751c79968ad916db545194c1db,2024-03-13T22:15:11.390000 CVE-2024-23294,0,0,100c10a3131c32be888e04553bed37c2d7a75d8b5d5a64c5c5fd47cdad6c9eab,2024-03-13T21:15:58.733000 CVE-2024-23295,0,0,f60b5b481bcc709a0e07818ec60448a8b8255b454dac1f32e5ff0b3a390550bb,2024-03-13T23:15:47.630000 -CVE-2024-23296,0,0,12a1de3d62ca79ef989249cb1e691420221912e9533cad73e61bbc1dd756eb30,2024-07-03T01:47:43.840000 +CVE-2024-23296,0,1,98ad16ed19ceb98a774f2fcc724aad9a1d938302930707577ef753cfcbd775c5,2024-07-29T22:15:03.750000 CVE-2024-23297,0,0,dfd56967bab57b4e450ebc4d5ffd5b8e085c43f2dc7ce30d6472eb920ff02a80,2024-03-13T22:15:11.520000 CVE-2024-23298,0,0,a565b18965c275606ac8348acd9993cb8bd15ff52c9c70b79da019a948d277e6,2024-03-17T22:38:29.433000 CVE-2024-23299,0,0,c511e81be43ab0bab76e86bc6db7a8fc5840f12996fc93f1ff034882f594ee51,2024-06-12T18:03:36.960000 @@ -245155,7 +245156,7 @@ CVE-2024-23786,0,0,a4843821edc7301dc3896b1dc41942f9a7cad1c9811616d65b63499b1903e CVE-2024-23787,0,0,1cebbe4231b42e35699eed5d7dba409232d884bafafb6cdea00ae172adf3e7de,2024-02-14T13:59:35.580000 CVE-2024-23788,0,0,6c6993e63ac258c815c0d6f15d7560f4b8732b4638909b422908e0ecb34bd923,2024-02-14T13:59:35.580000 CVE-2024-23789,0,0,eb24c8fd06c4dc0c79533f62c1520b9bd32813c0e2c7e43d74bbd067c1f01e08,2024-02-14T13:59:35.580000 -CVE-2024-2379,0,0,12e7ac3667f07b307742fd31fb389abc47f3b2c366b2df97007dd8bb9fef8142,2024-06-10T16:15:13.173000 +CVE-2024-2379,0,1,4ca7e42dfc5c22096910545f76bab2426f3be8f64dd8d351f8e628dcaa942948,2024-07-29T22:15:04.493000 CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755ae0,2024-02-02T02:07:58.653000 CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000 CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000 @@ -245300,7 +245301,7 @@ CVE-2024-23975,0,0,8574349dfa5f2a0fe4ae15f83d2f9c7c0823899e45c716a2ca2f4f60ae30f CVE-2024-23976,0,0,16acbea1fb543126c77bcb211c592f37e28d378e3cd2df50f24701a7caca7cb3,2024-02-14T18:04:45.380000 CVE-2024-23978,0,0,5bee98426b560d02600c1690e08516003e9bd0e42643648505946247e075278a,2024-05-17T02:36:41.847000 CVE-2024-23979,0,0,6fdd5509f38519be7582661a9525c018d02e080bbc0d3ec491dc3a617317722d,2024-02-14T18:04:45.380000 -CVE-2024-2398,0,0,0f4a48da0ead4f20c3af2704d87468d8abca50984f056bab845a2786b3e742c6,2024-07-03T01:53:12.523000 +CVE-2024-2398,0,1,2df48c721cfb060432be4d236c44ca083dd8ee77c5818324eaea9a325822973e,2024-07-29T22:15:04.563000 CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000 CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000 CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000 @@ -245588,7 +245589,7 @@ CVE-2024-24623,0,0,1416328fef44b3dca34f3b6ab49045c4173158618d91fb7f567b860695bb9 CVE-2024-2463,0,0,24deeeee766ad4a5a7424dba127cb4cbbe9e946086a31f7db9b5902aa6111178,2024-03-21T15:24:35.093000 CVE-2024-2464,0,0,5ff7c9aac18d394d4849e149117cdc80dedc6fee12e8baf9893132cc38ce131f,2024-03-21T15:24:35.093000 CVE-2024-2465,0,0,6230da2d3a7d355f9109bcbe86ce790145cd318aa89b33fca16121fe02380d5a,2024-03-21T15:24:35.093000 -CVE-2024-2466,0,0,d02d057413d73b505fec664a2e7d80aa1c2fd4efc63e92bd5dbe2492eb6a6db9,2024-05-03T13:15:21.893000 +CVE-2024-2466,0,1,6b3dd9237aa20b4b2f20cb9811624ae879351b8bde3e76e921ba5d522e67c2d6,2024-07-29T22:15:04.697000 CVE-2024-2467,0,0,9bcf217419e076743a229c7d9329553030b624f85cef7b05ba0694abd37301e6,2024-04-25T17:24:59.967000 CVE-2024-2468,0,0,f5fa0f4e21305851a5ed43e2730a4e0c2e70e0ee8b201aed06c129c3eb28843c,2024-03-25T01:51:01.223000 CVE-2024-24680,0,0,5e88d8a3de6deb02cd3bb72094ef29806d18a6b5b891345f7494f12256a199a7,2024-04-20T03:15:06.820000 @@ -245692,7 +245693,7 @@ CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73 CVE-2024-24792,0,0,f69bae6aeabc0bd1864687cbecc00a414d65f449f6042a0a0606e99652942d2a,2024-06-27T19:25:12.067000 CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000 -CVE-2024-24795,0,0,df5b2f0124975b34046fdd165c37965a95f26001139b404a1152bec012a6fee9,2024-06-10T18:15:27.003000 +CVE-2024-24795,0,1,8b96800f98f97e666dc2b89bddc7d365031a992307d47d2b82e462dc83917a6b,2024-07-29T22:15:04 CVE-2024-24796,0,0,292fd4a31399bba86c5730ef4bd877b625e772494a5146bfd46b725d130f455b,2024-02-12T14:19:54.330000 CVE-2024-24797,0,0,40724d1d3e1a03ea7253bf27a8e4cea3180b132258b4b1bc361005ab1c0591b9,2024-02-12T14:19:54.330000 CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000 @@ -247656,7 +247657,7 @@ CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771 CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000 CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 CVE-2024-27315,0,0,e2c8341ce82caf348d52a9896be5ac15e43c9c9ebf18a27eb01146f06cf9a599,2024-02-28T15:15:09.670000 -CVE-2024-27316,0,0,47557bba568976b709ce61c7b3f2b56ae39595698680263b8f0bb7449bb3941e,2024-07-22T09:15:04.603000 +CVE-2024-27316,0,1,3bf6f13ee9dbcc947168c29dac2b12e27972894e222efd3444dea533d66430b8,2024-07-29T22:15:04.113000 CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d45e1,2024-05-01T18:15:16.097000 CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000 CVE-2024-27319,0,0,198bfb473ae5c4a00a4bf458aba8771a9487b41224f35d4388056e6f7ba27f15,2024-03-30T02:15:08.090000 @@ -247948,11 +247949,12 @@ CVE-2024-27800,0,0,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d CVE-2024-27801,0,0,4f37242e62570444393eedc0e6b0ad8e8ff66a897bd149ce4d1292d83e4fe3ae,2024-07-02T13:36:50.500000 CVE-2024-27802,0,0,5fa4df8e0fa4e055c45d206bab7fd01f5c4103a30fc3e7d9373406c7aa7c6468,2024-07-02T13:37:19.690000 CVE-2024-27803,0,0,d8c6c7c35a66fefd164ec7252ba7f65231664b1bd53cefc22f8eab515bc840d4,2024-06-10T18:15:28.727000 -CVE-2024-27804,0,0,cc0ff5a5b94c6780767cdc22ac5b7c683a356469ddaa3536697d5bd02fd071c5,2024-07-03T01:50:51.930000 +CVE-2024-27804,0,1,5a3a9d1fd3691a1b54b24866e69cee2f5e3a65aabf978c5b6b5c4365c9f4b2f7,2024-07-29T22:15:04.233000 CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8980,2024-07-02T13:29:10.397000 CVE-2024-27806,0,0,28c67af34cc68b2a5a6c23ba0a23708c28b0ee7df3bcafd7c779ecd50c264c63,2024-07-02T13:29:21.613000 CVE-2024-27807,0,0,a7b781fd7f96d6bc57a085fc734d11b31dcdd4417a6ae278ff1c40e2b1bf7128,2024-07-02T13:33:44.157000 CVE-2024-27808,0,0,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000 +CVE-2024-27809,1,1,04d69a9f15d9275ea5e9f599e7bb9d5b08dd452bedb4560400b8bfe95c8cebee,2024-07-29T23:15:10.110000 CVE-2024-2781,0,0,97e23bf2edd148fde295ed4a38d42212ed940660bc04c9822025b8526dedd073,2024-03-27T12:29:30.307000 CVE-2024-27810,0,0,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000 CVE-2024-27811,0,0,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000 @@ -247968,8 +247970,10 @@ CVE-2024-2782,0,0,680a3c329ce925b550d110698489929aa37484a831dec13218a370944105b9 CVE-2024-27820,0,0,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000 CVE-2024-27821,0,0,997425452e8be4677f15c9b9aaa18f17147699f7e8dfe8b663210b670dcd8496,2024-06-10T18:15:29.097000 CVE-2024-27822,0,0,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000 +CVE-2024-27823,1,1,e1da5fe73742b4c013df4afed2b9533d08c1bfa73db827d260617648cb2aeaee,2024-07-29T23:15:10.170000 CVE-2024-27824,0,0,79e08efd7f96e8899d7d8541d6c0e1e0a4f8d446eaa36c3c2ce9d69863460387,2024-06-11T08:15:49.830000 CVE-2024-27825,0,0,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000 +CVE-2024-27826,1,1,048e46a2061e609bf38d953a60410e4e7eb20ff1f0495e29959b6f02580741b6,2024-07-29T23:15:10.240000 CVE-2024-27827,0,0,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000 CVE-2024-27828,0,0,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000 CVE-2024-27829,0,0,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000 @@ -247997,13 +248001,28 @@ CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794 CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000 CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000 CVE-2024-27852,0,0,9c516bed02a09c2aff2aa4b9ea5d528517ae4b8f02f5b13e3e44ea400df8e7a3,2024-06-10T18:15:29.900000 +CVE-2024-27853,1,1,58852b1c49daadf3eb721d9fec57a112a387a77f154df8d001dbb23df5fb1557,2024-07-29T23:15:10.297000 CVE-2024-27855,0,0,88e90c75a89e49c8f0ad6b77cda4945339f0165265fec6e1ae2d913c345f3617,2024-07-03T16:12:55.173000 CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000 CVE-2024-2786,0,0,8ed89c394db0a4298af6ad355228ba4ef878fdf7e45e835968fbe7eb06ba76d1,2024-04-10T13:23:38.787000 +CVE-2024-27862,1,1,e1074f87e7442ac605245fa9d9c07b3a7668072e08ef1bd41f1661a683bca55a,2024-07-29T23:15:10.363000 +CVE-2024-27863,1,1,1196f189ac028a8c13a2b2399a50df84a9882a1282df70d07ccd25da9799d4f8,2024-07-29T23:15:10.423000 CVE-2024-27867,0,0,c8c0bef10450917c014bb0f5b8c10be2f4bd90c5c93e6cf14274f5f577a33a76,2024-07-04T05:15:15.540000 CVE-2024-2787,0,0,2d4ec32358f3e4fff4e28d01c0d898cc511d2c65fccc3f39ec557fb8f116ac98,2024-04-10T13:23:38.787000 +CVE-2024-27871,1,1,20c0ed501f922aade5238514c8fe0564a519e1368175f2c68cfd73b0aa73d960,2024-07-29T23:15:10.490000 +CVE-2024-27872,1,1,5b11feb487c7ac167ff50ccad0b6e9fe79e595a4ae3327adf51cf603d0ae7f9b,2024-07-29T23:15:10.557000 +CVE-2024-27873,1,1,6ac1b86ae3e000df5fa034f49e62d43ce367c98a14ef3892b9d586e4a5062a64,2024-07-29T23:15:10.620000 +CVE-2024-27877,1,1,5319a3ef50433183786e283de8252b3e9a8130945e9948fcc308f584ff5c5c54,2024-07-29T23:15:10.690000 +CVE-2024-27878,1,1,9a77834a5956c098be4d95f8c0f67872cb9a57fba088268573cb0735307ca1ae,2024-07-29T23:15:10.747000 CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000 +CVE-2024-27881,1,1,7ad8e556325aa06778118ac11e882460462c1565acf06446bba0ddd884bd11e8,2024-07-29T23:15:10.807000 +CVE-2024-27882,1,1,0ba7846f97ad521269a665cdf4a8ae2591286faeb255e2dad55a3b7319e0696b,2024-07-29T23:15:10.877000 +CVE-2024-27883,1,1,1e383cd32db13b5129923e521bf8d1ae67e437433a5f67b5096885db85429aaa,2024-07-29T23:15:10.940000 +CVE-2024-27884,1,1,58f140c86c751c1d006370d1b382cff8ce96aa13987c7a12cceefe129ef896fe,2024-07-29T23:15:11.010000 CVE-2024-27885,0,0,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000 +CVE-2024-27886,1,1,b9c10b0713ecceb64f6d0ee0382d80b2e23963dfcf9884061b6819e73ec8038d,2024-07-29T23:15:11.067000 +CVE-2024-27887,1,1,6f75ea8b69ff3ac4420432ff26b71b2c18ffe3d8188390513addf2d75be2cf58,2024-07-29T23:15:11.127000 +CVE-2024-27888,1,1,be829e5e2f7a9a324e9f28c352e77afa2aa91e3ee0900845899f816120ee07af,2024-07-29T23:15:11.183000 CVE-2024-27889,0,0,7117aad45d32aeaef1ee1fabf03a8eb1a99ce1846aae926fc9cdd323c7a5b8ea,2024-03-05T13:41:01.900000 CVE-2024-2789,0,0,34742259502804c5b95d3d9e3233d720754fd74f45f9568c62dc8f4e6bc9ffb3,2024-04-10T13:23:38.787000 CVE-2024-27894,0,0,a037a624d2f95391d5ae19191b0926bbf6c393d1d253b2842dc172d91ee0ac42,2024-05-01T17:15:30.557000 @@ -250892,6 +250911,7 @@ CVE-2024-32166,0,0,0d336fd2663f53ad5073af796b0f13018ac3836e84a93337db7f44ece472c CVE-2024-32167,0,0,4748c69f7eec35b2beddc2dc94362f1e2e767018d85482f9559e46e4a468fd84,2024-06-12T18:00:30.120000 CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000 +CVE-2024-3219,1,1,9249843b8f2b4d97479f83df5e1511c116eb732df4bef87e522d211cc11d7539,2024-07-29T22:15:04.970000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000 @@ -254689,8 +254709,8 @@ CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369 CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000 CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000 CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000 -CVE-2024-38271,0,0,38702e993143f28dff98f8a009090e500c461857dbbfb4642cc6600e0270049f,2024-06-27T12:47:19.847000 -CVE-2024-38272,0,0,56b2095985e7f6c32ea69c0888f53e8cdc0431545419063cc54478b41f8371d3,2024-06-27T12:47:19.847000 +CVE-2024-38271,0,1,a55d517f1e451a20db301f87d88d99f6d0173df1fa03dd913b12a59d024f897d,2024-07-29T22:15:04.757000 +CVE-2024-38272,0,1,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1568,2024-07-29T22:15:04.883000 CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000 CVE-2024-38274,0,0,3f34dcdbcb04b3bd1c27e63f0c6c999c7639ff04bd1f29bc2ba555ae3687211a,2024-06-27T03:15:50.233000 CVE-2024-38275,0,0,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000 @@ -255043,7 +255063,7 @@ CVE-2024-38759,0,0,b9fa7ce22eebb94e2617e669160f4e670eabfdcde229d0ec6de28ef0c8571 CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000 CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000 CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72aa,2024-06-04T19:20:25.903000 -CVE-2024-38773,0,1,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000 +CVE-2024-38773,0,0,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000 CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000 CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000 CVE-2024-38781,0,0,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000 @@ -255051,7 +255071,7 @@ CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61 CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000 CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000 CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000 -CVE-2024-38788,0,1,b3310eca77eefd3eefd5fbc91ad027ce188932d22ffd466513f5156f93253a02,2024-07-29T20:19:47.727000 +CVE-2024-38788,0,0,b3310eca77eefd3eefd5fbc91ad027ce188932d22ffd466513f5156f93253a02,2024-07-29T20:19:47.727000 CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000 CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26 CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000 @@ -255747,12 +255767,62 @@ CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd47 CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000 CVE-2024-40767,0,0,01a151f22bd3f1cd8b44f314114a7bbe92f50d1e2d88d2bec8d0eaa4d4f7e2fb,2024-07-25T17:15:10.910000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 +CVE-2024-40774,1,1,038483d23bb2998316e588c9f4d57162f3e1389705e5d0280be486edb42825e7,2024-07-29T23:15:11.250000 +CVE-2024-40775,1,1,178d1ae486637928ebc8a58e3fc99bfbf31fd4d917c655e124ad7b68ddad1dc9,2024-07-29T23:15:11.317000 +CVE-2024-40776,1,1,be0866f437f31f9b403a9a240b02c79404035a8918a5cf44aa80d407abfc02a3,2024-07-29T23:15:11.387000 +CVE-2024-40777,1,1,760bcf9b4899f086ab2da86ba07619aed6ebe1f0122e1da20103034d7a71b0ed,2024-07-29T23:15:11.457000 +CVE-2024-40778,1,1,4131521b8a9786888d9b56825e090b708bbba950c7aeb4e940402d5f5a1f7d20,2024-07-29T23:15:11.527000 +CVE-2024-40779,1,1,a7c06b8c08d8b945e6a44e3af8132e34cb9b7bcf62dd7e42ca680bba1108f610,2024-07-29T23:15:11.590000 CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000 +CVE-2024-40780,1,1,951f08bd17fbe60aa6a9ce133aeaa5e9571e4dbfdf0101f4237092436fb279f9,2024-07-29T23:15:11.660000 +CVE-2024-40781,1,1,82536600101ac07df8ec671c79667a7efa9870f8e78cbc4fe6f6494a06e8525d,2024-07-29T23:15:11.727000 +CVE-2024-40782,1,1,a9dd57fa446bc079345a9584f2f47f2681679aadb6c513618fa540b51ae615ae,2024-07-29T23:15:11.790000 +CVE-2024-40783,1,1,11a16592e1f8587f380151ea90155837d7009f81ae2924d20e5859554c9e16d8,2024-07-29T23:15:11.853000 +CVE-2024-40784,1,1,ab7ab7768a72b0743ab1aa9a6c9363348a7346f946e97a5da7d8b5367fe5fb10,2024-07-29T23:15:11.923000 +CVE-2024-40785,1,1,be1282fdb4ce9702d300622af20280919009f2f6899e88f628bd3b6802bad330,2024-07-29T23:15:11.997000 +CVE-2024-40786,1,1,f1371cbf8f0fe2b670fb351bbca0e2a58919af3ab6d54bae4cde1d5c101fb006,2024-07-29T23:15:12.070000 +CVE-2024-40787,1,1,7d9c4623a4076f11e6e6cd510d01e19681ec41fbe76f83f92721f3ad82ab37da,2024-07-29T23:15:12.133000 +CVE-2024-40788,1,1,a01d9fec4cc0df6480f77d4a31626523be9d0926047632f470ff0add872263c1,2024-07-29T23:15:12.200000 +CVE-2024-40789,1,1,e905e285d44ad8c924ee962a522b126f8e9208694c91437fd8b5368404a61b83,2024-07-29T23:15:12.270000 CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000 +CVE-2024-40793,1,1,4b5566e87c1b49e9c6ae623f682ca7555e0faa9d214accfae047488698d0fe6b,2024-07-29T23:15:12.337000 +CVE-2024-40794,1,1,b8687b6d468e0c0c2c47cef98e51720b72e3e20fc4c8aa0515d263e02c3cfa84,2024-07-29T23:15:12.410000 +CVE-2024-40795,1,1,fcea860c2ec7812aafd69527d5e4075c40a2bc8d136ee197f3895523b83ed289,2024-07-29T23:15:12.477000 +CVE-2024-40796,1,1,757a069e62a9d4de1b1c62d828a0aeebceee945359afd3f7eb87748564ecd608,2024-07-29T23:15:12.540000 +CVE-2024-40798,1,1,77637969bf8fe3db0cd56c0fd204792490e998a905e24fed29360640d949c4d4,2024-07-29T23:15:12.600000 +CVE-2024-40799,1,1,1c67cb9faf60b0740689e6893ed3840c5fd677a8077230f760f07d8e539e554a,2024-07-29T23:15:12.667000 CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000 +CVE-2024-40800,1,1,1eb80ceeabb78ee7321a1f4910e11f186d854b3b77df7bb9e237e9f391b6bf18,2024-07-29T23:15:12.743000 +CVE-2024-40802,1,1,2e12a235d0ebf2e9a38e7e8888e28b3610a6fac3117833d6d5951a47ec86e485,2024-07-29T23:15:12.810000 +CVE-2024-40803,1,1,692628f0f346ba5085c1b09a72ee54b99e25bb960c6aef9b8d51f4bd6126f0e7,2024-07-29T23:15:12.873000 +CVE-2024-40804,1,1,c83775a5d61705b6393865ebbd0a1ce576be35645b1800885a04ed797d8d0498,2024-07-29T23:15:12.947000 +CVE-2024-40805,1,1,15fdd4d3a584843c6b1bf54e33b6e505db6d1c262311d7d909c79ca651979cb5,2024-07-29T23:15:13.017000 +CVE-2024-40806,1,1,a23d90ace0f8c121ed72b0be655db6d0abe655b722e668c9deba85ae1d9f03ac,2024-07-29T23:15:13.083000 +CVE-2024-40807,1,1,e3cc12f3129adf0c3c57559caafa91f71cd7cea1bcc8329daa2840611c173f83,2024-07-29T23:15:13.147000 +CVE-2024-40809,1,1,ffd9b17b4a63c6fc23b2a7356ece7dc8905c6aee41961ae019ab270a5c382702,2024-07-29T23:15:13.207000 CVE-2024-4081,0,0,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000 +CVE-2024-40811,1,1,8d5b59fe6e9fb977b45dce0eba4212514ec064f0a8c02ca927951a1feedaa595,2024-07-29T23:15:13.273000 +CVE-2024-40812,1,1,72b5ea9f510350b495b2925da066424db0567fc311ad3f98843e0fdd25776f57,2024-07-29T23:15:13.330000 +CVE-2024-40813,1,1,2ac94ce6190328a172c8b8f496815d90c7485fca1fad9afc67d8184d7d507e0e,2024-07-29T23:15:13.397000 +CVE-2024-40814,1,1,cca56b21dddf051984a27101bebac088cdf7ec39621e20affb28a987cf4b5f22,2024-07-29T23:15:13.460000 +CVE-2024-40815,1,1,c673267933af03c692cea061b0bf8b806aeb212718e78b2e53da36e448b2820e,2024-07-29T23:15:13.523000 +CVE-2024-40816,1,1,68bd94f9456482cbd1c3f610a919a27cffab48785f807d5844c4c3fa2866dcc9,2024-07-29T23:15:13.583000 +CVE-2024-40817,1,1,b647788caa33fdf5af7d7443d5a6af64c83680ae0a1e5f283cb135b3bcc2787f,2024-07-29T23:15:13.647000 +CVE-2024-40818,1,1,eb3183d90e40772501eb43fa589ae5c7b2c820c288387d4aa4aa13ceba1fef8c,2024-07-29T23:15:13.703000 CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000 +CVE-2024-40821,1,1,6e052d0aa504590857a329cf8fc449cb10ae9818bbe1f72232e212199dab6a18,2024-07-29T23:15:13.770000 +CVE-2024-40822,1,1,4495f5e697e3214503e6fccae0cc2b00f03d2e2b66c7fb9c6b1e7daf1a3b35d0,2024-07-29T23:15:13.840000 +CVE-2024-40823,1,1,9dc5249a3184db2fe1f3e09cfb71482c85eb28533a5845b08ab000711fa5990d,2024-07-29T23:15:13.920000 +CVE-2024-40824,1,1,c9c5611175e28c3d6c83706b6d62911fb5d46fa54b1763f08fb1089bb5b65eb8,2024-07-29T23:15:13.990000 +CVE-2024-40827,1,1,eed76fb81c5d6d730c4dc6a5cf5685a607b34ebf60ab42324ae6de9c30623d70,2024-07-29T23:15:14.067000 +CVE-2024-40828,1,1,3f70f0fa0be2593f0ee73515da54d4a0700be008ab4da51c082a90d1f23b7804,2024-07-29T23:15:14.130000 +CVE-2024-40829,1,1,630f68721a8f60f069dcb66f55b03ff3124d1f2a3d9e6f2ab47d4b1e3944995a,2024-07-29T23:15:14.193000 CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000 +CVE-2024-40832,1,1,61dde41120d247d3895c3b08dfed9ee6c04f15f3a0d664fcb3c8bb789da5265b,2024-07-29T23:15:14.257000 +CVE-2024-40833,1,1,b66d9eca4ea48c6a7ddceb91e12109daecb518e5080a98290bc3b25e6e5970da,2024-07-29T23:15:14.333000 +CVE-2024-40834,1,1,917f31cf67c8ca627e84cd5bd0ca9236d97a173c992cb480d28fd8b1c115a97a,2024-07-29T23:15:14.413000 +CVE-2024-40835,1,1,2dcffeb7534755d3171743b1999186ef0b2e67ad4edc23df4503da4372e2959e,2024-07-29T23:15:14.487000 +CVE-2024-40836,1,1,f8e29f638b0b6f8e26a3e2ab4cd1aafdd537a299a7ea18ea901de98586b0ea79,2024-07-29T23:15:14.570000 CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000 @@ -256811,7 +256881,7 @@ CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d8 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 -CVE-2024-4879,0,0,56229bd7ffd4a409de97013360aaa6ca4ee318c9286f43f7eac51db8f9d45e53,2024-07-11T22:15:02.260000 +CVE-2024-4879,0,1,aac607dfb1dd5f8e5400d9068a8a95b417c652d65a4ba884266aa1ba39b30390,2024-07-29T23:15:14.650000 CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 CVE-2024-4883,0,0,2ff7450efd44772325cada3b845290dfe574175b9b5b8d8937e9a22721054fd1,2024-06-26T12:44:29.693000 @@ -257096,7 +257166,7 @@ CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000 CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000 CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000 -CVE-2024-5217,0,0,6832bb457ac7885c3d529aa58eea84d54813c374c2860ed54ebbfa064b5a7e35,2024-07-11T22:15:02.647000 +CVE-2024-5217,0,1,d62fb791fdbb07b0b8870307225ce8097cab090bffae9c6698a1202201ccd2a3,2024-07-29T23:15:14.807000 CVE-2024-5218,0,0,3f0f08ad7c2d51d3a67b7d7a45835724ecc9f070958f49b8f27381122972dec7,2024-05-28T12:39:42.673000 CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000 CVE-2024-5220,0,0,c038ea6a169ab16726e3cd0d45ec2f73c131df5f0c00c638dfb0aa809792bfe5,2024-05-28T12:39:42.673000 @@ -257607,7 +257677,7 @@ CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc CVE-2024-5858,0,0,63cb7f6cd58686ca5ad3c57990888086a18b2814d4915e424991a00332eb64f9,2024-06-17T12:42:04.623000 CVE-2024-5859,0,0,72e4b113c686d9a3109f00890cd02d7c66daeaf956171b1cfade7c196becbe2c,2024-06-24T19:21:07.943000 CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000 -CVE-2024-5861,0,1,0f6737e71badb31ad995141819e3de68ee07520527361b4ba51682844c68ec2b,2024-07-29T20:32:37.267000 +CVE-2024-5861,0,0,0f6737e71badb31ad995141819e3de68ee07520527361b4ba51682844c68ec2b,2024-07-29T20:32:37.267000 CVE-2024-5862,0,0,441ab26bc80ed7c87de8e4be62f6bf1c86b995270dbb376cc8e089e80e683161,2024-06-24T19:26:47.037000 CVE-2024-5863,0,0,8eb388b46dfdca7ac79f7a3487053af7c103c168da16a20899b575731960eec2,2024-06-28T10:27:00.920000 CVE-2024-5864,0,0,539f12905317a790a13c7190e3394133674affd0cb1690d81cb0d56c8ad41bb1,2024-06-28T10:27:00.920000 @@ -257759,7 +257829,7 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 -CVE-2024-6094,0,1,21e31087817484583e2492fdd4981c05277a9dbc98ecae783fc36b2e123caf96,2024-07-29T20:20:51.257000 +CVE-2024-6094,0,0,21e31087817484583e2492fdd4981c05277a9dbc98ecae783fc36b2e123caf96,2024-07-29T20:20:51.257000 CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000 CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000 @@ -257958,7 +258028,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 -CVE-2024-6387,0,0,18a0eee254c378cec8300ccfc21cb8052a8dc8829e64291b38d5c6284633aacb,2024-07-29T09:15:02.853000 +CVE-2024-6387,0,1,584848f90a0e6d6513a757b32b891aa914d62444b8c645ccd87c69765fbbd0d2,2024-07-29T22:15:05.043000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000 CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000 @@ -258090,7 +258160,7 @@ CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000 CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000 CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000 -CVE-2024-6620,1,1,93c6de4b06b208771165f294569491243a3290d2098714e195918c0b85e0bd6d,2024-07-29T20:15:03.910000 +CVE-2024-6620,0,0,93c6de4b06b208771165f294569491243a3290d2098714e195918c0b85e0bd6d,2024-07-29T20:15:03.910000 CVE-2024-6621,0,0,75f7ea9becaa66b3030f6b54d6ea12535b72220300e49d7375089d25edbe8b2f,2024-07-16T13:43:58.773000 CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000 CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000 @@ -258189,7 +258259,7 @@ CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee6 CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000 CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000 CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000 -CVE-2024-6836,0,1,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 +CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 CVE-2024-6874,0,0,6fdb828244d0878bf4334f6c8b61a3ad657fa405006bc4b1bc91d03b240bfdb1,2024-07-24T12:55:13.223000 CVE-2024-6881,0,0,ae484b8b97ecbaca3d459a043a0b9e7c17dfa3db2ae41eab10b19174db4e67d5,2024-07-29T14:12:08.783000 @@ -258334,3 +258404,8 @@ CVE-2024-7199,0,0,1c38ae71600e9c4c0d209d192fce66196ad6d1d1454dfe95d9b268bf29c6a5 CVE-2024-7200,0,0,d21a4dd541acbc0094d3b150aee5dc57732e3b43b8983d68802bfc40bea446f0,2024-07-29T14:12:08.783000 CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000 CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000 +CVE-2024-7248,1,1,a2ddbed55de01980f63d0b9718ce842c14c9c1b9e6cdca518c180966561a19d1,2024-07-29T22:15:05.553000 +CVE-2024-7249,1,1,c7fccf87c8ceb0c945e7a77936034d5c4e5006994b9df61388b67e431ddf2786,2024-07-29T22:15:05.817000 +CVE-2024-7250,1,1,47214a6631c5e0c15e01a9d48696651797894eba964a53c781b9db24f665f066,2024-07-29T22:15:06.100000 +CVE-2024-7251,1,1,2e9dec42abfd731f5e87da16a34d11bf2d0c37cf024df63f9ff50bc95cc7c004,2024-07-29T22:15:06.283000 +CVE-2024-7252,1,1,aab68971ce2840239d9a3f49898d569965202598c905827f10884e2704b76876,2024-07-29T22:15:06.497000