From 5bdce53b7a1a7bbdfc4004307624e0a1fb5ee06e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 15 Jul 2024 22:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-07-15T22:00:18.326713+00:00 --- CVE-2017/CVE-2017-72xx/CVE-2017-7264.json | 6 +- .../CVE-2018-10000xx/CVE-2018-1000036.json | 6 +- .../CVE-2018-10000xx/CVE-2018-1000037.json | 18 ++++- .../CVE-2018-10000xx/CVE-2018-1000038.json | 6 +- .../CVE-2018-10000xx/CVE-2018-1000039.json | 22 +++++- .../CVE-2018-10000xx/CVE-2018-1000040.json | 14 +++- CVE-2023/CVE-2023-511xx/CVE-2023-51103.json | 6 +- CVE-2024/CVE-2024-13xx/CVE-2024-1394.json | 6 +- CVE-2024/CVE-2024-383xx/CVE-2024-38360.json | 60 ++++++++++++++++ CVE-2024/CVE-2024-399xx/CVE-2024-39912.json | 60 ++++++++++++++++ CVE-2024/CVE-2024-399xx/CVE-2024-39915.json | 60 ++++++++++++++++ CVE-2024/CVE-2024-399xx/CVE-2024-39918.json | 64 +++++++++++++++++ CVE-2024/CVE-2024-399xx/CVE-2024-39919.json | 60 ++++++++++++++++ CVE-2024/CVE-2024-406xx/CVE-2024-40624.json | 64 +++++++++++++++++ CVE-2024/CVE-2024-406xx/CVE-2024-40627.json | 64 +++++++++++++++++ CVE-2024/CVE-2024-406xx/CVE-2024-40630.json | 64 +++++++++++++++++ CVE-2024/CVE-2024-42xx/CVE-2024-4224.json | 37 ++++++++++ README.md | 49 ++++++------- _state.csv | 69 +++++++++++-------- 19 files changed, 670 insertions(+), 65 deletions(-) create mode 100644 CVE-2024/CVE-2024-383xx/CVE-2024-38360.json create mode 100644 CVE-2024/CVE-2024-399xx/CVE-2024-39912.json create mode 100644 CVE-2024/CVE-2024-399xx/CVE-2024-39915.json create mode 100644 CVE-2024/CVE-2024-399xx/CVE-2024-39918.json create mode 100644 CVE-2024/CVE-2024-399xx/CVE-2024-39919.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40624.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40627.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40630.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4224.json diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json index bf390aee639..3788867efa6 100644 --- a/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7264.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7264", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-26T05:59:00.243", - "lastModified": "2024-07-12T13:15:11.073", + "lastModified": "2024-07-15T21:15:02.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,6 +110,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=697515", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000036.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000036.json index 3a688994060..9090509c854 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000036.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000036.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000036", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-24T13:29:00.337", - "lastModified": "2024-07-12T13:15:11.203", + "lastModified": "2024-07-15T21:15:02.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,6 +119,10 @@ "Third Party Advisory" ] }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698887", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json index d1d3516292e..543047d3a17 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000037", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-24T13:29:00.430", - "lastModified": "2024-07-12T13:15:11.360", + "lastModified": "2024-07-15T21:15:02.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -169,6 +169,22 @@ "Third Party Advisory" ] }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698882", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698886", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698888", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698890", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/201811-15", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000038.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000038.json index 65c8b988b95..7c3cb65ed36 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000038.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000038.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000038", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-24T13:29:00.667", - "lastModified": "2024-07-12T13:15:11.443", + "lastModified": "2024-07-15T21:15:02.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -113,6 +113,10 @@ "Third Party Advisory" ] }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698884", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/201811-15", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000039.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000039.json index 126cc718afd..b68c46479ee 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000039.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000039.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000039", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-24T13:29:00.807", - "lastModified": "2024-07-12T16:11:04.000", + "lastModified": "2024-07-15T21:15:03.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -168,6 +168,26 @@ "Third Party Advisory" ] }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698883", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698888", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698891", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698892", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698901", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/201811-15", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000040.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000040.json index 537fb3f6a45..48bb00eacc4 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000040.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000040.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000040", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-24T13:29:01.133", - "lastModified": "2024-07-12T13:15:11.603", + "lastModified": "2024-07-15T21:15:03.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -156,6 +156,18 @@ "Issue Tracking" ] }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698904", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=699086", + "source": "cve@mitre.org" + }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ace9e69017c08e1e4ce5912014177414c0382004", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/201811-15", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51103.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51103.json index 81e7d44e720..b11e6ba9b48 100644 --- a/CVE-2023/CVE-2023-511xx/CVE-2023-51103.json +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51103.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51103", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-26T15:15:08.630", - "lastModified": "2024-07-11T18:15:05.383", + "lastModified": "2024-07-15T20:15:02.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -73,6 +73,10 @@ "url": "http://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=f1b5f87edd2675d5c79301e4ef2e1139f67f904b", "source": "cve@mitre.org" }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707620", + "source": "cve@mitre.org" + }, { "url": "https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json index 95c93b9c00a..3a1b2774670 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1394", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T13:00:08.037", - "lastModified": "2024-07-08T18:15:07.390", + "lastModified": "2024-07-15T20:15:02.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -160,6 +160,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4379", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4502", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1394", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38360.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38360.json new file mode 100644 index 00000000000..56cc5006a66 --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38360.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38360", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:03.430", + "lastModified": "2024-07-15T20:15:03.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Discourse is an open source platform for community discussion. In affected versions by creating replacement words with an almost unlimited number of characters, a moderator can reduce the availability of a Discourse instance. This issue has been addressed in stable version 3.2.3 and in current betas. Users are advised to upgrade. Users unable to upgrade may manually remove the long watched words either via SQL or Rails console." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/discourse/discourse/commit/7b53e610c17e38be982dffefa4e5b5a709a3b990", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-68pm-hm8x-pq2p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39912.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39912.json new file mode 100644 index 00000000000..b3bcfc59dfb --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39912.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39912", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:03.693", + "lastModified": "2024-07-15T20:15:03.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "web-auth/webauthn-lib is an open source set of PHP libraries and a Symfony bundle to allow developers to integrate that authentication mechanism into their web applications. The ProfileBasedRequestOptionsBuilder method returns allowedCredentials without any credentials if no username was found. When WebAuthn is used as the first or only authentication method, an attacker can enumerate usernames based on the absence of the `allowedCredentials` property in the assertion options response. This allows enumeration of valid or invalid usernames. By knowing which usernames are valid, attackers can focus their efforts on a smaller set of potential targets, increasing the efficiency and likelihood of successful attacks. This issue has been addressed in version 4.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/web-auth/webauthn-framework/commit/64de11f6cddc71e56c76e0cc4573bf94d02be045", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/web-auth/webauthn-framework/security/advisories/GHSA-875x-g8p7-5w27", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39915.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39915.json new file mode 100644 index 00000000000..e5cf5c915f2 --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39915.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39915", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:03.933", + "lastModified": "2024-07-15T20:15:03.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Thruk is a multibackend monitoring webinterface for Naemon, Nagios, Icinga and Shinken using the Livestatus API. This authenticated RCE in Thruk allows authorized users with network access to inject arbitrary commands via the URL parameter during PDF report generation. The Thruk web application does not properly process the url parameter when generating a PDF report. An authorized attacker with access to the reporting functionality could inject arbitrary commands that would be executed when the script /script/html2pdf.sh is called. The vulnerability can be exploited by an authorized user with network access. This issue has been addressed in version 3.16. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sni/Thruk/commit/7e7eb251e76718a07639c4781f0d959d817f173b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/sni/Thruk/security/advisories/GHSA-r7gx-h738-4w6f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39918.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39918.json new file mode 100644 index 00000000000..e559163ca72 --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39918.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-39918", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:04.160", + "lastModified": "2024-07-15T20:15:04.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "@jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. Input of the `ImageId` in the code is not sanitized and may lead to path traversal. This allows an attacker to store an image in an arbitrary location that the server has permission to access. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jasonraimondi/url-to-png/blob/e43098e0af3a380ebc044e7f303a83933b94b434/src/middlewares/extract_query_params.ts#L75", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jasonraimondi/url-to-png/commit/e4eaeca6493b21cd515b582fd6c0af09ede54507", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jasonraimondi/url-to-png/security/advisories/GHSA-vvmv-wrvp-9gjr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39919.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39919.json new file mode 100644 index 00000000000..4636bc219e0 --- /dev/null +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39919.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39919", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:04.380", + "lastModified": "2024-07-15T20:15:04.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "@jmondi/url-to-png is an open source URL to PNG utility featuring parallel rendering using Playwright for screenshots and with storage caching via Local, S3, or CouchDB. The package includes an `ALLOW_LIST` where the host can specify which services the user is permitted to capture screenshots of. By default, capturing screenshots of web services running on localhost, 127.0.0.1, or the [::] is allowed. If someone hosts this project on a server, users could then capture screenshots of other web services running locally. This issue has been addressed in version 2.1.1 with the addition of a blocklist. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jasonraimondi/url-to-png/commit/f62ff40403ffa1781459d6be8d97b8035888c00c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jasonraimondi/url-to-png/security/advisories/GHSA-342q-2mc2-5gmp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40624.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40624.json new file mode 100644 index 00000000000..245b6a33b6e --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40624.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-40624", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:04.810", + "lastModified": "2024-07-15T20:15:04.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TorrentPier is an open source BitTorrent Public/Private tracker engine, written in php. In `torrentpier/library/includes/functions.php`, `get_tracks()` uses the unsafe native PHP serialization format to deserialize user-controlled cookies. One can use phpggc and the chain Guzzle/FW1 to write PHP code to an arbitrary file, and execute commands on the system. For instance, the cookie bb_t will be deserialized when browsing to viewforum.php. This issue has been addressed in commit `ed37e6e52` which is expected to be included in release version 2.4.4. Users are advised to upgrade as soon as the new release is available. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/torrentpier/torrentpier/blob/84f6c9f4a081d9ffff4c233098758280304bf50f/library/includes/functions.php#L41-L60", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/torrentpier/torrentpier/commit/ed37e6e522f345f2b46147c6f53c1ab6dec1db9e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/torrentpier/torrentpier/security/advisories/GHSA-fg86-4c2r-7wxw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40627.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40627.json new file mode 100644 index 00000000000..63ba5fd8f98 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40627.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-40627", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:05.033", + "lastModified": "2024-07-15T20:15:05.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Fastapi OPA is an opensource fastapi middleware which includes auth flow. HTTP `OPTIONS` requests are always allowed by `OpaMiddleware`, even when they lack authentication, and are passed through directly to the application. `OpaMiddleware` allows all HTTP `OPTIONS` requests without evaluating it against any policy. If an application provides different responses to HTTP `OPTIONS` requests based on an entity existing (such as to indicate whether an entity is writable on a system level), an unauthenticated attacker could discover which entities exist within an application. This issue has been addressed in release version 2.0.1. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/busykoala/fastapi-opa/blob/6dd6f8c87e908fe080784a74707f016f1422b58a/fastapi_opa/opa/opa_middleware.py#L79-L80", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/busykoala/fastapi-opa/commit/9588109ff651f7ffc92687129c4956126443fb8c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/busykoala/fastapi-opa/security/advisories/GHSA-5f5c-8rvc-j8wf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40630.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40630.json new file mode 100644 index 00000000000..1021ec94c7d --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40630.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-40630", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T20:15:05.243", + "lastModified": "2024-07-15T20:15:05.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation via a format-agnostic API with a feature set, scalability, and robustness needed for feature film production. In affected versions there is a bug in the heif input functionality of OpenImageIO. Specifically, in `HeifInput::seek_subimage()`. In the worst case, this can lead to an information disclosure vulnerability, particularly for programs that directly use the `ImageInput` APIs. This bug has been addressed in commit `0a2dcb4c` which is included in the 2.5.13.1 release. Users are advised to upgrade. There are no known workarounds for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/blob/7c486a1121a4bf71d50ff555fab2770294b748d7/src/heif.imageio/heifinput.cpp#L250", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/0a2dcb4cf2c3fd4825a146cd3ad929d9d8305ce3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jjm9-9m4m-c8p2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json new file mode 100644 index 00000000000..9f833c1e029 --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4224.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-4224", + "sourceIdentifier": "cve@takeonme.org", + "published": "2024-07-15T21:15:03.883", + "lastModified": "2024-07-15T21:15:03.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator's browser. This issue was fixed in\u00a0TL-SG1016DE(UN) V7_1.0.1 Build 20240628." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@takeonme.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://takeonme.org/cves/CVE-2024-4224.html", + "source": "cve@takeonme.org" + }, + { + "url": "https://www.tp-link.com/en/support/download/tl-sg1016de/v7/#Firmware", + "source": "cve@takeonme.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2f37eecea31..cec34e885aa 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-15T20:00:18.531240+00:00 +2024-07-15T22:00:18.326713+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-15T19:15:03.700000+00:00 +2024-07-15T21:15:03.883000+00:00 ``` ### Last Data Feed Release @@ -33,41 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257063 +257072 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `9` -- [CVE-2024-27238](CVE-2024/CVE-2024-272xx/CVE-2024-27238.json) (`2024-07-15T18:15:03.633`) -- [CVE-2024-27240](CVE-2024/CVE-2024-272xx/CVE-2024-27240.json) (`2024-07-15T18:15:03.873`) -- [CVE-2024-27241](CVE-2024/CVE-2024-272xx/CVE-2024-27241.json) (`2024-07-15T18:15:04.087`) -- [CVE-2024-31946](CVE-2024/CVE-2024-319xx/CVE-2024-31946.json) (`2024-07-15T19:15:02.503`) -- [CVE-2024-36432](CVE-2024/CVE-2024-364xx/CVE-2024-36432.json) (`2024-07-15T19:15:02.593`) -- [CVE-2024-36433](CVE-2024/CVE-2024-364xx/CVE-2024-36433.json) (`2024-07-15T19:15:02.837`) -- [CVE-2024-36434](CVE-2024/CVE-2024-364xx/CVE-2024-36434.json) (`2024-07-15T19:15:03.053`) -- [CVE-2024-36438](CVE-2024/CVE-2024-364xx/CVE-2024-36438.json) (`2024-07-15T19:15:03.320`) -- [CVE-2024-37016](CVE-2024/CVE-2024-370xx/CVE-2024-37016.json) (`2024-07-15T18:15:04.337`) -- [CVE-2024-37386](CVE-2024/CVE-2024-373xx/CVE-2024-37386.json) (`2024-07-15T19:15:03.430`) -- [CVE-2024-39819](CVE-2024/CVE-2024-398xx/CVE-2024-39819.json) (`2024-07-15T18:15:04.407`) -- [CVE-2024-39820](CVE-2024/CVE-2024-398xx/CVE-2024-39820.json) (`2024-07-15T18:15:04.620`) -- [CVE-2024-39821](CVE-2024/CVE-2024-398xx/CVE-2024-39821.json) (`2024-07-15T18:15:04.827`) -- [CVE-2024-39826](CVE-2024/CVE-2024-398xx/CVE-2024-39826.json) (`2024-07-15T18:15:05.033`) -- [CVE-2024-39827](CVE-2024/CVE-2024-398xx/CVE-2024-39827.json) (`2024-07-15T18:15:05.237`) -- [CVE-2024-40415](CVE-2024/CVE-2024-404xx/CVE-2024-40415.json) (`2024-07-15T18:15:05.490`) -- [CVE-2024-40416](CVE-2024/CVE-2024-404xx/CVE-2024-40416.json) (`2024-07-15T18:15:05.543`) -- [CVE-2024-40631](CVE-2024/CVE-2024-406xx/CVE-2024-40631.json) (`2024-07-15T19:15:03.700`) +- [CVE-2024-38360](CVE-2024/CVE-2024-383xx/CVE-2024-38360.json) (`2024-07-15T20:15:03.430`) +- [CVE-2024-39912](CVE-2024/CVE-2024-399xx/CVE-2024-39912.json) (`2024-07-15T20:15:03.693`) +- [CVE-2024-39915](CVE-2024/CVE-2024-399xx/CVE-2024-39915.json) (`2024-07-15T20:15:03.933`) +- [CVE-2024-39918](CVE-2024/CVE-2024-399xx/CVE-2024-39918.json) (`2024-07-15T20:15:04.160`) +- [CVE-2024-39919](CVE-2024/CVE-2024-399xx/CVE-2024-39919.json) (`2024-07-15T20:15:04.380`) +- [CVE-2024-40624](CVE-2024/CVE-2024-406xx/CVE-2024-40624.json) (`2024-07-15T20:15:04.810`) +- [CVE-2024-40627](CVE-2024/CVE-2024-406xx/CVE-2024-40627.json) (`2024-07-15T20:15:05.033`) +- [CVE-2024-40630](CVE-2024/CVE-2024-406xx/CVE-2024-40630.json) (`2024-07-15T20:15:05.243`) +- [CVE-2024-4224](CVE-2024/CVE-2024-42xx/CVE-2024-4224.json) (`2024-07-15T21:15:03.883`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `8` -- [CVE-2023-6966](CVE-2023/CVE-2023-69xx/CVE-2023-6966.json) (`2024-07-15T18:55:57.513`) -- [CVE-2024-38433](CVE-2024/CVE-2024-384xx/CVE-2024-38433.json) (`2024-07-15T18:26:30.693`) -- [CVE-2024-6035](CVE-2024/CVE-2024-60xx/CVE-2024-6035.json) (`2024-07-15T18:15:05.840`) -- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-07-15T18:15:06.107`) +- [CVE-2017-7264](CVE-2017/CVE-2017-72xx/CVE-2017-7264.json) (`2024-07-15T21:15:02.673`) +- [CVE-2018-1000036](CVE-2018/CVE-2018-10000xx/CVE-2018-1000036.json) (`2024-07-15T21:15:02.777`) +- [CVE-2018-1000037](CVE-2018/CVE-2018-10000xx/CVE-2018-1000037.json) (`2024-07-15T21:15:02.867`) +- [CVE-2018-1000038](CVE-2018/CVE-2018-10000xx/CVE-2018-1000038.json) (`2024-07-15T21:15:02.963`) +- [CVE-2018-1000039](CVE-2018/CVE-2018-10000xx/CVE-2018-1000039.json) (`2024-07-15T21:15:03.053`) +- [CVE-2018-1000040](CVE-2018/CVE-2018-10000xx/CVE-2018-1000040.json) (`2024-07-15T21:15:03.160`) +- [CVE-2023-51103](CVE-2023/CVE-2023-511xx/CVE-2023-51103.json) (`2024-07-15T20:15:02.783`) +- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-07-15T20:15:02.923`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 947509a54eb..96e813186f1 100644 --- a/_state.csv +++ b/_state.csv @@ -107267,7 +107267,7 @@ CVE-2017-7259,0,0,571c59745fb72171848cbec67b01cd7395960fde6278757ecb34e86163beea CVE-2017-7261,0,0,5d4482ce57d5049c4514e03968c105efd06c3856a07be4567447823c2b860e50,2017-03-29T01:59:02.890000 CVE-2017-7262,0,0,f78bc38632d70f21b7078a4e9db2032da6abc2c24dc4facf58d5aa5df81ab103,2017-03-29T13:57:42.320000 CVE-2017-7263,0,0,51b071ac9f1aedb7d54bc263a94d26159fb2954d002b42dfac4a37d8260b650c,2017-03-29T01:59:03 -CVE-2017-7264,0,0,a59a4af1a12ac2c3e2a0b34f1a072b1dabed1defa716369bf3881478f6b0ffd6,2024-07-12T13:15:11.073000 +CVE-2017-7264,0,1,09de7ea4a569a0956bb7612ff8e6d13eae78f4f2b39bb1c33db0342689758d16,2024-07-15T21:15:02.673000 CVE-2017-7266,0,0,0b71a2968113f2f8d9030c214fd310d647c1171b7725d852e2a15e261686341b,2017-03-29T01:59:03.110000 CVE-2017-7269,0,0,bdef71e7e9f55913e1c1cf4d035b23d844dc1d11f15178199d3311f789ed6e23,2023-11-07T02:50:02.587000 CVE-2017-7271,0,0,4abb50bf24b45576e32e408897e16efe8f10cb28e2556d4eaeac68cb450ad3e9,2017-05-08T01:29:00.267000 @@ -110716,11 +110716,11 @@ CVE-2018-1000032,0,0,f83e4699aacc29de346641084aee293233bff330301ec8f389819600642 CVE-2018-1000033,0,0,858f48a27cfc6cd6d38e2a781fd60cdb956846a6a7c628da28b0249b3e0fbd5e,2018-02-26T18:41:29.290000 CVE-2018-1000034,0,0,9f046a3ae33c12eb65a81471eae361c3c96c94d7941f77661d1067393a31b9d4,2018-02-26T19:11:58.640000 CVE-2018-1000035,0,0,f3ac17321769176439c0dad8e3b5075b803f2592212d8b46134ec73584b72275,2020-08-24T17:37:01.140000 -CVE-2018-1000036,0,0,cf5accb052a6cf965bcee24601f9631ee1d4bf5b1178c4b3b4411e318b15e9ea,2024-07-12T13:15:11.203000 -CVE-2018-1000037,0,0,d2c2eec4bda81b9a494fc38e14e6c4c163411d355fce6ffd40e3522f66fa4f6a,2024-07-12T13:15:11.360000 -CVE-2018-1000038,0,0,c593b7bd3b0d503716b938dbe9474845021720ef3257b24fd05b05b8b36eea2a,2024-07-12T13:15:11.443000 -CVE-2018-1000039,0,0,42a4cddd9ee0b56eb8e38839de25e84b740d292bbcdbff5f566d608f566266a3,2024-07-12T16:11:04 -CVE-2018-1000040,0,0,1e04906576224825e0838d21b3355840fa843a3c62bb9a6a186b1f066b8907e4,2024-07-12T13:15:11.603000 +CVE-2018-1000036,0,1,9c7069ad9539e5ac71c6df2912bc9b5184a459cd394083481a163973b41f5c3a,2024-07-15T21:15:02.777000 +CVE-2018-1000037,0,1,984247b9eac36aa83bffe37f21293831c68822e0a1c484b308ee24bdf63680af,2024-07-15T21:15:02.867000 +CVE-2018-1000038,0,1,b454f40c0c455deb6991c79687c6bdeb2e53142a93c425761594677e384c6dfa,2024-07-15T21:15:02.963000 +CVE-2018-1000039,0,1,edf6f44c4fdf4e6a4a530dad1ede9a8d7fccf68640f370ffef2a6e604a7ba536,2024-07-15T21:15:03.053000 +CVE-2018-1000040,0,1,807ea1c813f13665488403000f357cef3d96b9c07ba0fbe0c6ada9b9f7c54dc5,2024-07-15T21:15:03.160000 CVE-2018-1000041,0,0,609e87a73e2e14c643c8a008081aa759687b0fee06f1b08dd27155a6322d0d49,2019-10-03T00:03:26.223000 CVE-2018-1000042,0,0,b08cd16167c79852f6d0eac1f46c0c28025c86e89eb427d2e493f010e7df89c0,2018-03-01T15:31:27.683000 CVE-2018-1000043,0,0,cfeaf48b2ca818d4355a38aabefb02ae950015e46ee4089ad4f7b76562864685,2018-03-01T15:31:49.637000 @@ -237548,7 +237548,7 @@ CVE-2023-5110,0,0,1eb8ae730135a1ea92d37f5355c755444af37dd35125f4decd6e30fb871c0c CVE-2023-51100,0,0,3b10aabe70e36e41b217c7e2052d2afef8cac89a7ef8f9a2c1fe40370831dcdb,2023-12-30T03:19:12.080000 CVE-2023-51101,0,0,5763585130c71d2c93476cb0847af7d23490f732f61722d74cd31748b8bee9dd,2023-12-30T03:19:13.923000 CVE-2023-51102,0,0,3475ee3b80cf0c4a805ce40ab09e9c87dbd1c78b9276461c51c8250b1e20737f,2023-12-30T03:19:15.973000 -CVE-2023-51103,0,0,b330d390b448ec6c689497e8d924b0ca338c3534faa25e07b0a7ac42997f944e,2024-07-11T18:15:05.383000 +CVE-2023-51103,0,1,a25aacb2ef77cb6ad1ed3b14770f29f0a01f8bdba19feb9d17836bbbf9f66a95,2024-07-15T20:15:02.783000 CVE-2023-51104,0,0,b83b78fa695252b9bc562b66774da5aa3c3d13492f6b25b379db3d99c45899c7,2024-07-11T18:15:05.497000 CVE-2023-51105,0,0,0dbc1485003c4c6257746ac53f11aaeaf8f3a7101c7e00fa09d1e95f1fe0ac66,2024-07-11T18:15:05.590000 CVE-2023-51106,0,0,beba78a4f9e7941d60e5913f1472ad3ce1eeb4dc7f63c2c92cb440549a49428e,2024-03-18T04:15:08.790000 @@ -240444,7 +240444,7 @@ CVE-2023-6962,0,0,986479cdf0104030985cc73b8c5cd922aed26e09aac7f4f0ca21a4d53b3d66 CVE-2023-6963,0,0,5d78e338c4f8af8931aea1f2dde5afb8bbdfc8f31ec8fab4d6db3d80bfcdecf2,2024-02-14T17:05:16.533000 CVE-2023-6964,0,0,6b353abfee4e0f60ba07ed53b519d8cdcc5c6e3e583c876cd6af699df966c5a5,2024-04-10T13:24:00.070000 CVE-2023-6965,0,0,f49ac78940fe244c72647e51516e80a6e573f5fa400fc7065d825c4c692cabcd,2024-04-10T13:24:00.070000 -CVE-2023-6966,0,1,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000 +CVE-2023-6966,0,0,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000 CVE-2023-6967,0,0,7fa49a7c16574cbfe3664c75658ac16ae96710a4d17734528b42e15e81f0ce19,2024-04-10T13:24:00.070000 CVE-2023-6968,0,0,a4751c3d52b515d1d942809757ebd5c330a2b3fb28572a1d55882f3452313b5b,2024-06-06T14:17:35.017000 CVE-2023-6969,0,0,28305747d8b707ea006f2410a4d39a2af33e21a9599b2601ee1414912a46183e,2024-03-13T18:16:18.563000 @@ -241934,7 +241934,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,0,958d397a2f77f4bea3511edf96e0da3bc5e1bce1201ca40b9c8f868ac4960f3b,2024-07-08T18:15:07.390000 +CVE-2024-1394,0,1,b867c1f90c73e71b6af10fe3c5a9059f6949c63efaf9a351555a67ec4558c8f1,2024-07-15T20:15:02.923000 CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000 @@ -247312,10 +247312,10 @@ CVE-2024-27234,0,0,7f9c430bb757ad526adb7918516acd55f167ec46b27604bd9833832e0b615 CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000 CVE-2024-27236,0,0,87315156a485dcd5ca2e4a3368db0027f412517fa717d3f5ab5df1cc6bb866c2,2024-03-12T12:40:13.500000 CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000 -CVE-2024-27238,1,1,462fc8e1860e98147c320e26d17ba5fee5ca1a60367d56c5f1c4f7059819041b,2024-07-15T18:15:03.633000 +CVE-2024-27238,0,0,462fc8e1860e98147c320e26d17ba5fee5ca1a60367d56c5f1c4f7059819041b,2024-07-15T18:15:03.633000 CVE-2024-2724,0,0,660610afdb28f5976ed634f2a472d2022e02ebb5bc503c73eac1e0b96d741829,2024-03-22T15:34:43.663000 -CVE-2024-27240,1,1,58daf2f38d2758083d41f48f956c68649d1d8c824a7b219db5babb7ed75e0346,2024-07-15T18:15:03.873000 -CVE-2024-27241,1,1,9e0fff38b263ebe0899e33f34b14266c4594aab0a80e4165f430f66221530bad,2024-07-15T18:15:04.087000 +CVE-2024-27240,0,0,58daf2f38d2758083d41f48f956c68649d1d8c824a7b219db5babb7ed75e0346,2024-07-15T18:15:03.873000 +CVE-2024-27241,0,0,9e0fff38b263ebe0899e33f34b14266c4594aab0a80e4165f430f66221530bad,2024-07-15T18:15:04.087000 CVE-2024-27242,0,0,aa3d00d8440b9711083704a859c18c29ae2a7d4e0687131a6877ff32cc440bb5,2024-04-10T13:24:00.070000 CVE-2024-27243,0,0,7506fdb7727ab984462fc64398555eb3450f805c7f6a3944e9822e85e93cca4e,2024-05-16T13:03:05.353000 CVE-2024-27244,0,0,481637fe3fc7930848fab67c20215a504ece49e65656eb0a28bda5cc7f4c687a,2024-05-16T13:03:05.353000 @@ -250390,7 +250390,7 @@ CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58 CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000 CVE-2024-31943,0,0,a3c3177de375490a3bcbe7c4dc869c6dc98de8408de3c26e8167121dc5553a55,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,9b7df1c1d68c7ba82d2a7e14fc250e4409e7410da01d69528d57b3dba1022b40,2024-04-10T19:49:51.183000 -CVE-2024-31946,1,1,7a838df436f8b1519c8cddad23e2362b3257c2383bd9af684a9638bf2e00480c,2024-07-15T19:15:02.503000 +CVE-2024-31946,0,0,7a838df436f8b1519c8cddad23e2362b3257c2383bd9af684a9638bf2e00480c,2024-07-15T19:15:02.503000 CVE-2024-31947,0,0,53a07a96d235761473c51b6658ac88c324f970e3729e396995a521d5b07b0a35,2024-07-15T13:00:34.853000 CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000 @@ -253316,11 +253316,11 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1 CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000 CVE-2024-3643,0,0,af0c2404bd4ab34bcd75932174ab1b00c5ac556e20d57f0445020a0c94c96fe2,2024-05-16T13:03:05.353000 -CVE-2024-36432,1,1,bc7dcc54c0accd9d08a7eb50f3ad4572241465881609f579fc341e21961b7c58,2024-07-15T19:15:02.593000 -CVE-2024-36433,1,1,27ef33775c72c0fd42ed9b3c63df51a99b759c2ebef0c22d29deb86a1eac9de9,2024-07-15T19:15:02.837000 -CVE-2024-36434,1,1,0dfd2c56938439fb6a894bd775b9cbf740e7ded5bc9d49218fae9b783d279f33,2024-07-15T19:15:03.053000 +CVE-2024-36432,0,0,bc7dcc54c0accd9d08a7eb50f3ad4572241465881609f579fc341e21961b7c58,2024-07-15T19:15:02.593000 +CVE-2024-36433,0,0,27ef33775c72c0fd42ed9b3c63df51a99b759c2ebef0c22d29deb86a1eac9de9,2024-07-15T19:15:02.837000 +CVE-2024-36434,0,0,0dfd2c56938439fb6a894bd775b9cbf740e7ded5bc9d49218fae9b783d279f33,2024-07-15T19:15:03.053000 CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000 -CVE-2024-36438,1,1,774be27f24fca724c25c385bb341460342aa8691fc1a30d28ca76b1c9d53b8e7,2024-07-15T19:15:03.320000 +CVE-2024-36438,0,0,774be27f24fca724c25c385bb341460342aa8691fc1a30d28ca76b1c9d53b8e7,2024-07-15T19:15:03.320000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000 @@ -253622,7 +253622,7 @@ CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55 CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 CVE-2024-3701,0,0,b97bf02f501ce8bb46bbbea962bd508392417999afee815d0c2fcfb239983cc7,2024-04-15T13:15:31.997000 CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 -CVE-2024-37016,1,1,a5541b3a7f0a84fa31ec51dc66cb973b2ac5e7f89d07e0348ce7d14438de273a,2024-07-15T18:15:04.337000 +CVE-2024-37016,0,0,a5541b3a7f0a84fa31ec51dc66cb973b2ac5e7f89d07e0348ce7d14438de273a,2024-07-15T18:15:04.337000 CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000 CVE-2024-37018,0,0,702b0048025811920f5478aca500fdf16e8badcce077fd8d6d40cb1d8cc37861,2024-05-31T13:01:46.727000 CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000 @@ -253845,7 +253845,7 @@ CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000 -CVE-2024-37386,1,1,3fc6f12821cdac1c4892854bf660c25bf1a1ca57761e368d4200b885ae7dc344,2024-07-15T19:15:03.430000 +CVE-2024-37386,0,0,3fc6f12821cdac1c4892854bf660c25bf1a1ca57761e368d4200b885ae7dc344,2024-07-15T19:15:03.430000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 @@ -254239,6 +254239,7 @@ CVE-2024-38356,0,0,bec2e415543d848869e9d63f2fb0cc432a4170577530c5e2a83bdb87ad08f CVE-2024-38357,0,0,adb1f307dbe4b8facda37fd7466e9e38a01a5bfc6b85c7127fa6225078756e84,2024-06-20T12:43:25.663000 CVE-2024-38358,0,0,4721334c80a93643b526d0b31fb5e13fbcb84d9d7ff2b0840b3236994c45067b,2024-06-20T12:43:25.663000 CVE-2024-38359,0,0,f28617e1813345db2901c0d79798ed429608ec68b5de1ca43d804b7817ccf8c1,2024-06-21T11:22:01.687000 +CVE-2024-38360,1,1,de048e794ece1419993069fe0b25c68540e2338a76530438ba31e5050db5edf9,2024-07-15T20:15:03.430000 CVE-2024-38361,0,0,f382ebba7fc984c6e86107cb94ceaca8dedca184f9f6123ffedcd7094bb741b0,2024-06-21T11:22:01.687000 CVE-2024-38363,0,0,4ba5b34714c88cf806284a26eaf8261d70f03ee7392713aa1b260c885e54e80f,2024-07-09T18:19:14.047000 CVE-2024-38364,0,0,2279d9d422aa31a74e603806d16ace0153ff248c4a5fbe8796ad93e25cd4d53d,2024-06-26T12:44:29.693000 @@ -254269,7 +254270,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,88ab77f65d2de763959b3536063d69fbc2444cb9d53c4b7dcba71cfc1a022537,2024-06-17T12:42:04.623000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 -CVE-2024-38433,0,1,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000 +CVE-2024-38433,0,0,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000 CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000 CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000 CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000 @@ -254854,11 +254855,11 @@ CVE-2024-3977,0,0,87f55f2983faa9489e3ab65e96b4cea8a0d04681e4c4541cf69108c85d144a CVE-2024-3978,0,0,e25d25f011ecf86a9a7629ea5449d530d107458e873c97f796fe325b70200d63,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 -CVE-2024-39819,1,1,3ed27297e5dbf2b5db195ab7e433cf48cdd2011e8378ab27c539a83818e800c8,2024-07-15T18:15:04.407000 -CVE-2024-39820,1,1,0a370c1960af31a93093357600b0ed4111feec64382be841777decf985639317,2024-07-15T18:15:04.620000 -CVE-2024-39821,1,1,ffecc1cca9d0647f6a473cf37bb2fa90bd231ab7475e8f7e70a655aa741bd08f,2024-07-15T18:15:04.827000 -CVE-2024-39826,1,1,f422588b30ad994068eda47537984282c3659d647a20e3872a22edb1bb332311,2024-07-15T18:15:05.033000 -CVE-2024-39827,1,1,157c0f61a4c15fdb2ab6aa4ba54f2d4d0e2783cc207c0189f8175c7ce923d0ac,2024-07-15T18:15:05.237000 +CVE-2024-39819,0,0,3ed27297e5dbf2b5db195ab7e433cf48cdd2011e8378ab27c539a83818e800c8,2024-07-15T18:15:04.407000 +CVE-2024-39820,0,0,0a370c1960af31a93093357600b0ed4111feec64382be841777decf985639317,2024-07-15T18:15:04.620000 +CVE-2024-39821,0,0,ffecc1cca9d0647f6a473cf37bb2fa90bd231ab7475e8f7e70a655aa741bd08f,2024-07-15T18:15:04.827000 +CVE-2024-39826,0,0,f422588b30ad994068eda47537984282c3659d647a20e3872a22edb1bb332311,2024-07-15T18:15:05.033000 +CVE-2024-39827,0,0,157c0f61a4c15fdb2ab6aa4ba54f2d4d0e2783cc207c0189f8175c7ce923d0ac,2024-07-15T18:15:05.237000 CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 @@ -254907,9 +254908,13 @@ CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888 CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000 CVE-2024-39909,0,0,84d207bd7916a7aa0c749989b5f6df126cc82f60739ec52f44f8de2604f130ed,2024-07-12T16:34:58.687000 CVE-2024-3991,0,0,8fc5cec164b75a61473f46907d411f1d06a3bf1fdc70a00ae47e8c931a83fb1a,2024-05-02T18:00:37.360000 +CVE-2024-39912,1,1,1522ab6ac5199db60579de83fc395400aa63e94d07b51da7661e4de4c71bc11c,2024-07-15T20:15:03.693000 CVE-2024-39914,0,0,fc85dcd483038cc9947eead0920b62559c30fc46579f4bdee42403db053af4c1,2024-07-12T16:34:58.687000 +CVE-2024-39915,1,1,ba7374fe390bfec2e93b5e705ea74c7f222e7d0f7fefd1637ebcfe09f76c125a,2024-07-15T20:15:03.933000 CVE-2024-39916,0,0,df08bb6ea7153a6f790e0e23382946b388fbc02804d2bb78dc62b53f8c36a79e,2024-07-12T16:34:58.687000 CVE-2024-39917,0,0,a022cfadc012af0e44d5ab631089d56f3fc46948e6694b954a65044aa2799c29,2024-07-12T16:34:58.687000 +CVE-2024-39918,1,1,5b65272b9d006b7204a057d7609ef1bf9880cefbe781920f75bc3ffd21c7afdf,2024-07-15T20:15:04.160000 +CVE-2024-39919,1,1,58dd45d4d34729e7783305d849a212b692e5ab90e2b6b73492b21052db437834,2024-07-15T20:15:04.380000 CVE-2024-3992,0,0,475460e0c2a64b96a6a878b0463608fa30ba82616c0c0e2ef22dfa38c5bcb39b,2024-06-17T12:42:04.623000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 CVE-2024-39927,0,0,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000 @@ -254977,8 +254982,8 @@ CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac0 CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000 CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000 CVE-2024-40414,0,0,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000 -CVE-2024-40415,1,1,dd6b4b157d36739047024ef312bcdbc2974a75c7371ac4228d566a23bdd925f6,2024-07-15T18:15:05.490000 -CVE-2024-40416,1,1,2541f9169745ccf44b3c6aaf80029bc6951ce4931a6336d52713caa5691ef3bf,2024-07-15T18:15:05.543000 +CVE-2024-40415,0,0,dd6b4b157d36739047024ef312bcdbc2974a75c7371ac4228d566a23bdd925f6,2024-07-15T18:15:05.490000 +CVE-2024-40416,0,0,2541f9169745ccf44b3c6aaf80029bc6951ce4931a6336d52713caa5691ef3bf,2024-07-15T18:15:05.543000 CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 CVE-2024-4042,0,0,f41d19a896222ab39f54d4d516c2364bd25fe65dca5e9c4b7ccc9d626f82d5ed,2024-06-07T14:56:05.647000 CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000 @@ -255028,8 +255033,11 @@ CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5b CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000 CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000 +CVE-2024-40624,1,1,60f5e5ec1dd1160b1c04909bb056e8d96b0720c11779e628d35e27cc7c963540,2024-07-15T20:15:04.810000 +CVE-2024-40627,1,1,33ce527ef44dad432c6ed14dfea1ec416c392b3ef1b7cc35ac020438d9fcd451,2024-07-15T20:15:05.033000 CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000 -CVE-2024-40631,1,1,02afd974607c209ba61a932b05cbea74ea58f5af3cb05e9df016ee708037da70,2024-07-15T19:15:03.700000 +CVE-2024-40630,1,1,2d00162d014a05a3f3c949cffafbfde43cdb8c956634545465647a9ef8f0a7b3,2024-07-15T20:15:05.243000 +CVE-2024-40631,0,0,02afd974607c209ba61a932b05cbea74ea58f5af3cb05e9df016ee708037da70,2024-07-15T19:15:03.700000 CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 @@ -255286,6 +255294,7 @@ CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000 CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000 +CVE-2024-4224,1,1,947adeccff5156ed446d1fa4cff48f0dff97bb22dfffe4b714c4b06a1efe286f,2024-07-15T21:15:03.883000 CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000 CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000 CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000 @@ -256709,7 +256718,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702 CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000 CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000 -CVE-2024-6035,0,1,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000 +CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000 CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000 @@ -257041,7 +257050,7 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812 CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000 CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000 CVE-2024-6689,0,0,ec7131b60c617e40df7d8cd950219c4e232d1b7354523cf28a3e92438a8ddde2,2024-07-15T14:15:03.640000 -CVE-2024-6716,0,1,e3306c105d7fd24ec7a1939e295c57fdf07bdb80aad35408cde8763b9316c0be,2024-07-15T18:15:06.107000 +CVE-2024-6716,0,0,e3306c105d7fd24ec7a1939e295c57fdf07bdb80aad35408cde8763b9316c0be,2024-07-15T18:15:06.107000 CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000 CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000 CVE-2024-6729,0,0,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000