diff --git a/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json b/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json index af9bab1552d..bb34ec9cffc 100644 --- a/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json +++ b/CVE-2015/CVE-2015-61xx/CVE-2015-6175.json @@ -2,8 +2,9 @@ "id": "CVE-2015-6175", "sourceIdentifier": "secure@microsoft.com", "published": "2015-12-09T11:59:56.580", - "lastModified": "2018-10-30T16:27:22.263", - "vulnStatus": "Modified", + "lastModified": "2024-07-01T17:41:27.987", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "NVD-CWE-noinfo" } ] } @@ -66,13 +89,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" } ] } @@ -82,11 +100,20 @@ "references": [ { "url": "http://www.securitytracker.com/id/1034334", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-135", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json index dd08f6bb84d..c1e1512b92e 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8651.json @@ -2,8 +2,9 @@ "id": "CVE-2015-8651", "sourceIdentifier": "psirt@adobe.com", "published": "2015-12-28T23:59:19.050", - "lastModified": "2017-02-17T02:59:09.950", - "vulnStatus": "Modified", + "lastModified": "2024-07-01T17:43:25.627", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -90,14 +91,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", - "versionEndIncluding": "20.0.0.204", - "matchCriteriaId": "95299551-EDD0-4F8F-9F18-C3049CB3A9F4" + "versionEndExcluding": "20.0.0.233", + "matchCriteriaId": "D5AEC3F3-52AF-46E6-A4D1-79854036B3C0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", - "versionEndIncluding": "20.0.0.204", - "matchCriteriaId": "8338438E-18F8-4DCE-95E0-5FEFCEC15026" + "versionEndExcluding": "20.0.0.233", + "matchCriteriaId": "8C954724-30BB-4215-8BEA-930A81B73ADF" } ] }, @@ -139,8 +140,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "11.2.202.554", - "matchCriteriaId": "140657B1-1638-48BD-95B5-565EF5CF5BE5" + "versionEndExcluding": "11.2.202.559", + "matchCriteriaId": "1A5D0BB1-753D-4C3C-9D86-D095C7964A50" } ] }, @@ -167,8 +168,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", - "versionEndIncluding": "20.0.0.204", - "matchCriteriaId": "8F5182AB-63F9-4BF3-B8A9-44B182E86A80" + "versionEndExcluding": "20.0.0.233", + "matchCriteriaId": "94665D71-220E-47CF-9108-4ABAA833FC87" } ] }, @@ -205,38 +206,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "18.0.0.268", - "matchCriteriaId": "99CE27CD-BCFA-4065-AD5A-A6206C15AC37" + "versionEndExcluding": "18.0.0.324", + "matchCriteriaId": "CA77DE00-4A06-4C87-96BB-81A6430456D8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", - "matchCriteriaId": "130D56D9-BFAD-44AB-BA04-1E6E2F18A049" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", - "matchCriteriaId": "A0CE2650-25EB-446E-B2C9-631177740E87" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", - "matchCriteriaId": "CBAE999D-B558-4714-854D-42D45A7A48BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", - "matchCriteriaId": "0E47897F-1045-4CED-B208-4BED652FAE6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:20.0.0.228:*:*:*:*:*:*:*", - "matchCriteriaId": "1AA036B2-C5F2-4DCD-B414-05045E3575B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:20.0.0.235:*:*:*:*:*:*:*", - "matchCriteriaId": "7E3F4354-3066-45F0-8FE1-FB0496465C83" + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0.0.185", + "versionEndExcluding": "20.0.0.267", + "matchCriteriaId": "17AEDAF8-0784-4735-8245-DE60751067DA" } ] }, @@ -257,60 +235,242 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE4D64E-8C4B-4F21-A9B0-90637C85C1D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", + "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", + "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", + "matchCriteriaId": "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", + "matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", + "matchCriteriaId": "3A0BA503-3F96-48DA-AF47-FBA37A9D0C48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*", + "matchCriteriaId": "028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*", + "matchCriteriaId": "ED540469-C4DD-485D-9B89-6877B2A74217" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:insight_control:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "FB12FFA6-C8C5-4052-B6C3-F83119FF21EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:insight_control_server_provisioning:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "661098DB-F0F8-4AC1-A758-23B33E70BD91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:matrix_operating_environment:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "17A5B13C-7BC0-4E6B-9260-12C29AD068AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "0B49E6F3-2FA7-4B1A-A6AC-AD655CB83586" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "C2928FF2-3AD4-4220-B5E3-6069499ABD97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:version_control_repository_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "E08DDFC5-1DE5-4729-927C-823BB2E087FE" + } + ] + } + ] } ], "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-2697.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/79705", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1034544", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html", "source": "psirt@adobe.com", "tags": [ + "Not Applicable", "Patch", "Vendor Advisory" ] }, { "url": "https://security.gentoo.org/glsa/201601-03", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json index 393e7e127ff..99e55b57cf2 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json @@ -2,8 +2,9 @@ "id": "CVE-2016-0034", "sourceIdentifier": "secure@microsoft.com", "published": "2016-01-13T05:59:22.657", - "lastModified": "2018-10-12T22:10:48.720", - "vulnStatus": "Modified", + "lastModified": "2024-07-01T17:56:03.857", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", "cisaRequiredAction": "The impacted products are end-of-life and should be disconnected if still in use.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "NVD-CWE-noinfo" } ] } @@ -88,8 +89,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D6EF9A3D-4EB8-4B2E-B388-04CC0751A93F" + "criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.1.41212.0", + "matchCriteriaId": "CBFAC3EC-5210-4BB0-A8DE-95778A80AC50" } ] } @@ -99,11 +102,20 @@ "references": [ { "url": "http://www.securitytracker.com/id/1034655", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-006", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json new file mode 100644 index 00000000000..ffb63417abd --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-43554", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:13.000", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while processing IOCTL handler in FastRPC." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json new file mode 100644 index 00000000000..237d952b4d9 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20399", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-07-01T17:15:04.383", + "lastModified": "2024-07-01T17:15:04.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\n\r Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json new file mode 100644 index 00000000000..baf179f7243 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21456", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:13.387", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information Disclosure while parsing beacon frame in STA." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21457.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21457.json new file mode 100644 index 00000000000..f30cd675946 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21457.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21457", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:13.620", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "INformation disclosure while handling Multi-link IE in beacon frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21458.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21458.json new file mode 100644 index 00000000000..6a511f9e2f7 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21458.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21458", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:13.847", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure while handling SA query action frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21460.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21460.json new file mode 100644 index 00000000000..bdd9a0c9fbc --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21460.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21460", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:14.063", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure when ASLR relocates the IMEM and Secure DDR portions as one chunk in virtual address space." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21461.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21461.json new file mode 100644 index 00000000000..6fff83515ae --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21461.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21461", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:14.293", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while performing finish HMAC operation when context is freed by keymaster." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21462.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21462.json new file mode 100644 index 00000000000..739953998fc --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21462.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21462", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:14.557", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS while loading the TA ELF file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21465.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21465.json new file mode 100644 index 00000000000..03c5799e658 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21465.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21465", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:14.797", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while processing key blob passed by the user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21466.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21466.json new file mode 100644 index 00000000000..a75d18ba531 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21466.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21466", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:15.033", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure while parsing sub-IE length during new IE generation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21469.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21469.json new file mode 100644 index 00000000000..699a4353159 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21469.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21469", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:15.270", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when an invoke call and a TEE call are bound for the same trusted application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21482.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21482.json new file mode 100644 index 00000000000..20ba9f10044 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21482.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21482", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:15.497", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json new file mode 100644 index 00000000000..abc11ccfe8f --- /dev/null +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-21586", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-07-01T17:15:05.193", + "lastModified": "2024-07-01T17:15:05.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nIf an SRX Series device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition.\n\nThis issue affects Junos OS on SRX Series:\n\n * 21.4 versions before 21.4R3-S7.9,\n * 22.1 versions before 22.1R3-S5.3,\n * 22.2 versions before 22.2R3-S4.11,\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R3.\n\n\n\n\nJunos OS versions prior to 21.4R1 are not affected by this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "RED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA83195", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23368.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23368.json new file mode 100644 index 00000000000..800a2c41f31 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23368.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23368", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:15.730", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when allocating and accessing an entry in an SMEM partition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23372.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23372.json new file mode 100644 index 00000000000..1e780b842f5 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23372.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23372", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:16.000", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23373.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23373.json new file mode 100644 index 00000000000..b31b0f6b4f1 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23373.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23373", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:16.290", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23380.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23380.json new file mode 100644 index 00000000000..6590b4da04c --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23380.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23380", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-07-01T15:15:16.547", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while handling user packets during VBO bind operation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24749.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24749.json new file mode 100644 index 00000000000..c3df15c709e --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24749.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-24749", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T14:15:05.350", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.5 and 2.24.3, if GeoServer is deployed in the Windows operating system using an Apache Tomcat web application server, it is possible to bypass existing input validation in the GeoWebCache ByteStreamController class and read arbitrary classpath resources with specific file name extensions. If GeoServer is also deployed as a web archive using the data directory embedded in the `geoserver.war` file (rather than an external data directory), it will likely be possible to read specific resources to gain administrator privileges. However, it is very unlikely that production environments will be using the embedded data directory since, depending on how GeoServer is deployed, it will be erased and re-installed (which would also reset to the default password) either every time the server restarts or every time a new GeoServer WAR is installed and is therefore difficult to maintain. An external data directory will always be used if GeoServer is running in standalone mode (via an installer or a binary). Versions 2.23.5 and 2.24.3 contain a patch for the issue. Some workarounds are available. One may change from a Windows environment to a Linux environment; or change from Apache Tomcat to Jetty application server. One may also disable anonymous access to the embeded GeoWebCache administration and status pages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GeoWebCache/geowebcache/commit/c7f76bd8a1d67c3b986146e7a5e0b14dd64a8fef", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/GeoWebCache/geowebcache/pull/1211", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-jhqx-5v5g-mpf3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2796.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2796.json index c202522e4a7..8f47b9b1c09 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2796.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2796.json @@ -2,12 +2,13 @@ "id": "CVE-2024-2796", "sourceIdentifier": "security@puppet.com", "published": "2024-04-18T15:15:29.857", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-07-01T15:15:16.793", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A server-side request forgery (SSRF) was discovered in the Akana Community Manager Developer Portal in versions prior to and including 2022.1.3. Reported by Jakob Antonsson.\n\n" + "value": "A server-side request forgery (SSRF) was discovered in the Akana Community Manager Developer Portal in versions prior to and including 2022.1.3. Reported by Jakob Antonsson." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json new file mode 100644 index 00000000000..bc312b1b5ae --- /dev/null +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34696.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-34696", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T15:15:16.907", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36387.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36387.json new file mode 100644 index 00000000000..15e88f71c8f --- /dev/null +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36387.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-36387", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:03.497", + "lastModified": "2024-07-01T19:15:03.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json new file mode 100644 index 00000000000..fbd9260fbf8 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36401.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-36401", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T16:15:04.120", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geotools/geotools/pull/4797", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOT-7587", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json new file mode 100644 index 00000000000..8b93a19714b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36420.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36420", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T16:15:04.377", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json new file mode 100644 index 00000000000..c261a5b2236 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36421.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36421", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T16:15:04.623", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json new file mode 100644 index 00000000000..d0efb2b2a9b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36422.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36422", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T16:15:04.860", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36423.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36423.json new file mode 100644 index 00000000000..14810b1db4e --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36423.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36423", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T19:15:03.627", + "lastModified": "2024-07-01T19:15:03.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/public-chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L322-L322", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36982.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36982.json new file mode 100644 index 00000000000..6e0bb419ec7 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36982.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36982", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:06.030", + "lastModified": "2024-07-01T17:15:06.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an attacker could trigger a null pointer reference on the cluster/config REST endpoint, which could result in a crash of the Splunk daemon." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0702", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json new file mode 100644 index 00000000000..c2259d6b2fa --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36983", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:06.257", + "lastModified": "2024-07-01T17:15:06.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0703", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json new file mode 100644 index 00000000000..ed7d848fa05 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36984", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:06.480", + "lastModified": "2024-07-01T17:15:06.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0704", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json new file mode 100644 index 00000000000..fd583bf96ed --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36985", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:06.703", + "lastModified": "2024-07-01T17:15:06.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the \u201csplunk_archiver\u201c application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-687" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0705", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36986.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36986.json new file mode 100644 index 00000000000..8a1a8cf8695 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36986.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36986", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:06.910", + "lastModified": "2024-07-01T17:15:06.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0706", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36987.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36987.json new file mode 100644 index 00000000000..d4c68385c4e --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36987.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36987", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:07.120", + "lastModified": "2024-07-01T17:15:07.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0707", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36989.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36989.json new file mode 100644 index 00000000000..43f826aeb62 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36989.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36989", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:07.380", + "lastModified": "2024-07-01T17:15:07.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, a low-privileged user that does not hold the admin or power Splunk roles could create notifications in Splunk Web Bulletin Messages that all users on the instance receive." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0709", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/4b7f368f-4322-47f8-8363-2c466f0b7030", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json new file mode 100644 index 00000000000..ba74e4ecb2a --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36990", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:07.600", + "lastModified": "2024-07-01T17:15:07.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.2.2403.100, an authenticated, low-privileged user that does not hold the admin or power Splunk roles could send a specially crafted HTTP POST request to the datamodel/web REST endpoint in Splunk Enterprise, potentially causing a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0710", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/45766810-dbb2-44d4-b889-b4ba3ee0d1f5", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json new file mode 100644 index 00000000000..1b1e2580953 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36991", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:07.860", + "lastModified": "2024-07-01T17:15:07.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0711", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/e7c2b064-524e-4d65-8002-efce808567aa", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json new file mode 100644 index 00000000000..9a93227e57e --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36992", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:08.077", + "lastModified": "2024-07-01T17:15:08.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of unauthorized JavaScript code in the browser of a user. The \u201curl\u201d parameter of the Dashboard element does not have proper input validation to reject invalid URLs, which could lead to a Persistent Cross-site Scripting (XSS) exploit." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0712", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json new file mode 100644 index 00000000000..af2ee17fb26 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36993", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:08.290", + "lastModified": "2024-07-01T17:15:08.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0713", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/fd852b27-1882-4505-9f2c-64dfb96f4fc1", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36994.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36994.json new file mode 100644 index 00000000000..df6e0ba5b9e --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36994.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36994", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:08.500", + "lastModified": "2024-07-01T17:15:08.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View and Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0714", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/b0a67520-ae82-4cf6-b04e-9f6cce56830d", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36995.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36995.json new file mode 100644 index 00000000000..cb696d3be40 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36995.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36995", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:08.707", + "lastModified": "2024-07-01T17:15:08.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could create experimental items." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0715", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/84afda04-0cd6-466b-869e-70d6407d0a34", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json new file mode 100644 index 00000000000..03f13e7b9d1 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36996", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:08.917", + "lastModified": "2024-07-01T17:15:08.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0716", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json new file mode 100644 index 00000000000..916f74c8743 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36997", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-07-01T17:15:09.143", + "lastModified": "2024-07-01T17:15:09.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0717", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3661.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3661.json index b2d2690b569..677411b2fcc 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3661.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3661.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3661", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-05-06T19:15:11.027", - "lastModified": "2024-05-08T22:15:49.103", + "lastModified": "2024-07-01T15:15:17.187", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -59,6 +60,10 @@ "url": "https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/", "source": "9119a7d8-5eab-497f-8521-727c672e3725" }, + { + "url": "https://bst.cisco.com/quickview/bug/CSCwk05814", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, { "url": "https://datatracker.ietf.org/doc/html/rfc2131#section-7", "source": "9119a7d8-5eab-497f-8521-727c672e3725" @@ -67,6 +72,10 @@ "url": "https://datatracker.ietf.org/doc/html/rfc3442#section-7", "source": "9119a7d8-5eab-497f-8521-727c672e3725" }, + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-170", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, { "url": "https://issuetracker.google.com/issues/263721377", "source": "9119a7d8-5eab-497f-8521-727c672e3725" @@ -83,6 +92,10 @@ "url": "https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision", "source": "9119a7d8-5eab-497f-8521-727c672e3725" }, + { + "url": "https://my.f5.com/manage/s/article/K000139553", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, { "url": "https://news.ycombinator.com/item?id=40279632", "source": "9119a7d8-5eab-497f-8521-727c672e3725" @@ -91,6 +104,14 @@ "url": "https://news.ycombinator.com/item?id=40284111", "source": "9119a7d8-5eab-497f-8521-727c672e3725" }, + { + "url": "https://security.paloaltonetworks.com/CVE-2024-3661", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, + { + "url": "https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, { "url": "https://tunnelvisionbug.com/", "source": "9119a7d8-5eab-497f-8521-727c672e3725" @@ -107,6 +128,10 @@ "url": "https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/", "source": "9119a7d8-5eab-497f-8521-727c672e3725" }, + { + "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, { "url": "https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability", "source": "9119a7d8-5eab-497f-8521-727c672e3725" diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37145.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37145.json new file mode 100644 index 00000000000..7cee23edc50 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37145.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-37145", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T19:15:03.853", + "lastModified": "2024-07-01T19:15:03.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/chatflows-streaming/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L375-L375", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37146.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37146.json new file mode 100644 index 00000000000..a60ec151188 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37146.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-37146", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T19:15:04.070", + "lastModified": "2024-07-01T19:15:04.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/credentials/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L545-L545", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37298.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37298.json new file mode 100644 index 00000000000..50697292fef --- /dev/null +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37298.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-37298", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T19:15:04.283", + "lastModified": "2024-07-01T19:15:04.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38472.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38472.json new file mode 100644 index 00000000000..e891749f9e0 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38472.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-38472", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:04.563", + "lastModified": "2024-07-01T19:15:04.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and\u00a0malicious requests or content \nUsers are recommended to upgrade to version 2.4.60 which fixes this issue.\u00a0 Note: Existing configurations that access UNC paths will have to configure new directive \"UNCList\" to allow access during request processing." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json new file mode 100644 index 00000000000..a7a3ef3da9d --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38473.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-38473", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:04.657", + "lastModified": "2024-07-01T19:15:04.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38474.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38474.json new file mode 100644 index 00000000000..dd25113d25b --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38474.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-38474", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:04.760", + "lastModified": "2024-07-01T19:15:04.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any\u00a0URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json new file mode 100644 index 00000000000..7abe48d85af --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-38475", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:04.883", + "lastModified": "2024-07-01T19:15:04.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json new file mode 100644 index 00000000000..aaf76a77ce7 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-38476", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:04.977", + "lastModified": "2024-07-01T19:15:04.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via\u00a0backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json new file mode 100644 index 00000000000..e19a8c97392 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-38477", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:05.083", + "lastModified": "2024-07-01T19:15:05.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38513.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38513.json new file mode 100644 index 00000000000..74929facd9c --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38513.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38513", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T19:15:05.173", + "lastModified": "2024-07-01T19:15:05.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Fiber is an Express-inspired web framework written in Go A vulnerability present in versions prior to 2.52.5 is a session middleware issue in GoFiber versions 2 and above. This vulnerability allows users to supply their own session_id value, resulting in the creation of a session with that key. If a website relies on the mere presence of a session for security purposes, this can lead to significant security risks, including unauthorized access and session fixation attacks. All users utilizing GoFiber's session middleware in the affected versions are impacted. The issue has been addressed in version 2.52.5. Users are strongly encouraged to upgrade to version 2.52.5 or higher to mitigate this vulnerability. Users who are unable to upgrade immediately can apply the following workarounds to reduce the risk: Either implement additional validation to ensure session IDs are not supplied by the user and are securely generated by the server, or regularly rotate session IDs and enforce strict session expiration policies." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gofiber/fiber/commit/66a881441b27322a331f1b526cf1eb6b3358a4d8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gofiber/fiber/security/advisories/GHSA-98j2-3j3p-fw2v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json new file mode 100644 index 00000000000..8c8ef82bfe0 --- /dev/null +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-38953", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-01T14:15:05.600", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "phpok 6.4.003 contains a Cross Site Scripting (XSS) vulnerability in the ok_f() method under the framework/api/upload_control.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/qinggan/phpok/issues/17", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json index d03d24d824a..9a583ff188f 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38987", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.717", - "lastModified": "2024-07-01T13:15:04.717", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json index bd1b70fd57b..da671f28f74 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38990", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.807", - "lastModified": "2024-07-01T13:15:04.807", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json index 0744b854c04..57863caddb3 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38991", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.863", - "lastModified": "2024-07-01T13:15:04.863", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json index fa327cd23cc..b0a3a23e19e 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38992.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38992", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.930", - "lastModified": "2024-07-01T13:15:04.930", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json index acea7a1be13..403456484fa 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38993.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38993", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.987", - "lastModified": "2024-07-01T13:15:04.987", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json index b8ce09861a8..2520586fb48 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38994", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.047", - "lastModified": "2024-07-01T13:15:05.047", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json index f5520846091..6004bcf676d 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38996", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.103", - "lastModified": "2024-07-01T13:15:05.103", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json index 4599b43b75e..fb09510b93d 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38997", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.160", - "lastModified": "2024-07-01T13:15:05.160", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json index 308b0e89bf3..4200797eb85 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38998", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.223", - "lastModified": "2024-07-01T13:15:05.223", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38999.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38999.json index a4427b9bd53..625444063e8 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38999.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38999", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.280", - "lastModified": "2024-07-01T13:15:05.280", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json index a96cc2a80f1..8a24e11a93f 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39000.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39000", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.340", - "lastModified": "2024-07-01T13:15:05.340", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json index 776db6b91c4..4ff9e4515c4 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39001", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.397", - "lastModified": "2024-07-01T13:15:05.397", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json index c476ee5f151..ef696e6980c 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39002", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.450", - "lastModified": "2024-07-01T13:15:05.450", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json index 95e86a6fffa..4b4a5228cce 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39003", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.513", - "lastModified": "2024-07-01T13:15:05.513", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39008.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39008.json index 8d67434958a..d0fc16b4aab 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39008.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39008", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.590", - "lastModified": "2024-07-01T13:15:05.590", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json index b66fa68d465..95032ae9dc5 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39013", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.650", - "lastModified": "2024-07-01T13:15:05.650", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json index 9b60ce87596..ae72c4393a2 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39014", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.703", - "lastModified": "2024-07-01T13:15:05.703", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json index 3a4841e3ebf..856ba0fe213 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39015", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.767", - "lastModified": "2024-07-01T13:15:05.767", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json index 54b785e9f95..c0ade55e7e7 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39016", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.823", - "lastModified": "2024-07-01T13:15:05.823", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json index cd09d4414fe..2f9c81dd62f 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39017", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.893", - "lastModified": "2024-07-01T13:15:05.893", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json index 5597ee22141..cc9520a9d35 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39018", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.950", - "lastModified": "2024-07-01T13:15:05.950", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json new file mode 100644 index 00000000000..79c8a1a18a2 --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39236", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-01T19:15:05.420", + "lastModified": "2024-07-01T19:15:05.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Aaron911/PoC/blob/main/Gradio.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json new file mode 100644 index 00000000000..1ff78e8cb83 --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39251", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-01T19:15:05.480", + "lastModified": "2024-07-01T19:15:05.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component ControlCenter.sys/ControlCenter64.sys of ThundeRobot Control Center v2.0.0.10 allows attackers to access sensitive information, execute arbitrary code, or escalate privileges via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/ThundeRobot_Control_center", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39303.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39303.json new file mode 100644 index 00000000000..b74fe421001 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39303.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39303", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-01T19:15:05.540", + "lastModified": "2024-07-01T19:15:05.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weblate is a web based localization tool. Prior to version 5.6.2, Weblate didn't correctly validate filenames when restoring project backup. It may be possible to gain unauthorized access to files on the server using a crafted ZIP file. This issue has been addressed in Weblate 5.6.2. As a workaround, do not allow untrusted users to create projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/WeblateOrg/weblate/commit/b6a7eace155fa0feaf01b4ac36165a9c5e63bfdd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-jfgp-674x-6q4p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json new file mode 100644 index 00000000000..2930fee5e47 --- /dev/null +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39573.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-39573", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-01T19:15:05.760", + "lastModified": "2024-07-01T19:15:05.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json index 041b80aa4a3..7dfe88e810c 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39853", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:06.013", - "lastModified": "2024-07-01T13:15:06.013", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39878.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39878.json new file mode 100644 index 00000000000..2d0e30f4768 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39878.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39878", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-07-01T17:15:09.350", + "lastModified": "2024-07-01T17:15:09.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03.3 private key could be exposed via testing GitHub App Connection" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39879.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39879.json new file mode 100644 index 00000000000..86b9aeec4d8 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39879.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39879", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-07-01T17:15:09.573", + "lastModified": "2024-07-01T17:15:09.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03.3 application token could be exposed in EC2 Cloud Profile settings" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3995.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3995.json index 640c78906ea..b5c98ac65dc 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3995.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3995.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3995", "sourceIdentifier": "security@puppet.com", "published": "2024-06-28T20:15:02.820", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-01T14:15:05.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "security@puppet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://portal.perforce.com/s/detail/a91PA000001SU5pYAG", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4007.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4007.json index b295b299748..e9bf4a9ea84 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4007.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4007", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-07-01T13:15:06.077", - "lastModified": "2024-07-01T13:15:06.077", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json index f54ada4be7f..a7749223050 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5642", "sourceIdentifier": "cna@python.org", "published": "2024-06-27T21:15:16.070", - "lastModified": "2024-06-28T19:15:07.357", + "lastModified": "2024-07-01T14:15:05.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -25,6 +25,10 @@ "url": "https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/issues/121227", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/pull/23014", "source": "cna@python.org" diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json new file mode 100644 index 00000000000..bb2e0b89c0b --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-6050", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-07-01T14:15:05.893", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation vulnerability in SOKRATES-software SOWA OPAC allows a Reflected Cross-Site Scripting (XSS).\u00a0An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.\u00a0This issue affects SOWA OPAC software in versions from 4.0 before 4.9.10, from 5.0 before 6.2.12." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:X/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "GREEN", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/07/CVE-2024-6050/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/07/CVE-2024-6050/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json new file mode 100644 index 00000000000..188d19de331 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6375.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6375", + "sourceIdentifier": "cna@mongodb.com", + "published": "2024-07-01T15:15:17.430", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-79327", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json new file mode 100644 index 00000000000..809acde1bf5 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6376.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6376", + "sourceIdentifier": "cna@mongodb.com", + "published": "2024-07-01T15:15:17.673", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/COMPASS-7496", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json index a6b5bdafabe..661523904ee 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-01T13:15:06.467", - "lastModified": "2024-07-01T13:15:06.467", - "vulnStatus": "Received", + "lastModified": "2024-07-01T19:15:06.037", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -48,17 +48,89 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/01/12", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6387", "source": "secalert@redhat.com" }, + { + "url": "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/", + "source": "secalert@redhat.com" + }, + { + "url": "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server", + "source": "secalert@redhat.com" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604", "source": "secalert@redhat.com" }, + { + "url": "https://explore.alas.aws.amazon.com/CVE-2024-6387.html", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/oracle/oracle-linux/issues/149", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/rapier1/hpn-ssh/issues/87", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/zgzhang/cve-2024-6387-poc", + "source": "secalert@redhat.com" + }, + { + "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html", + "source": "secalert@redhat.com" + }, + { + "url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html", + "source": "secalert@redhat.com" + }, + { + "url": "https://news.ycombinator.com/item?id=40843778", + "source": "secalert@redhat.com" + }, + { + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010", + "source": "secalert@redhat.com" + }, + { + "url": "https://security-tracker.debian.org/tracker/CVE-2024-6387", + "source": "secalert@redhat.com" + }, + { + "url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/", + "source": "secalert@redhat.com" + }, + { + "url": "https://ubuntu.com/security/CVE-2024-6387", + "source": "secalert@redhat.com" + }, + { + "url": "https://ubuntu.com/security/notices/USN-6859-1", + "source": "secalert@redhat.com" + }, + { + "url": "https://www.openssh.com/txt/release-9.8", + "source": "secalert@redhat.com" + }, { "url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt", "source": "secalert@redhat.com" + }, + { + "url": "https://www.suse.com/security/cve/CVE-2024-6387.html", + "source": "secalert@redhat.com" + }, + { + "url": "https://www.theregister.com/2024/07/01/regresshion_openssh/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6424.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6424.json index 2ee594ae189..39907864aaf 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6424.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6424", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-07-01T13:15:06.690", - "lastModified": "2024-07-01T13:15:06.690", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6425.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6425.json index abb59fbb7d3..98ea99bd485 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6425.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6425", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-07-01T13:15:06.927", - "lastModified": "2024-07-01T13:15:06.927", - "vulnStatus": "Received", + "lastModified": "2024-07-01T16:37:39.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 55c4c9cb85c..0d399bfcf7e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-01T14:02:32.990499+00:00 +2024-07-01T20:01:26.920930+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-01T13:15:06.927000+00:00 +2024-07-01T19:15:06.037000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255560 +255620 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `60` -- [CVE-2024-38990](CVE-2024/CVE-2024-389xx/CVE-2024-38990.json) (`2024-07-01T13:15:04.807`) -- [CVE-2024-38991](CVE-2024/CVE-2024-389xx/CVE-2024-38991.json) (`2024-07-01T13:15:04.863`) -- [CVE-2024-38992](CVE-2024/CVE-2024-389xx/CVE-2024-38992.json) (`2024-07-01T13:15:04.930`) -- [CVE-2024-38993](CVE-2024/CVE-2024-389xx/CVE-2024-38993.json) (`2024-07-01T13:15:04.987`) -- [CVE-2024-38994](CVE-2024/CVE-2024-389xx/CVE-2024-38994.json) (`2024-07-01T13:15:05.047`) -- [CVE-2024-38996](CVE-2024/CVE-2024-389xx/CVE-2024-38996.json) (`2024-07-01T13:15:05.103`) -- [CVE-2024-38997](CVE-2024/CVE-2024-389xx/CVE-2024-38997.json) (`2024-07-01T13:15:05.160`) -- [CVE-2024-38998](CVE-2024/CVE-2024-389xx/CVE-2024-38998.json) (`2024-07-01T13:15:05.223`) -- [CVE-2024-38999](CVE-2024/CVE-2024-389xx/CVE-2024-38999.json) (`2024-07-01T13:15:05.280`) -- [CVE-2024-39000](CVE-2024/CVE-2024-390xx/CVE-2024-39000.json) (`2024-07-01T13:15:05.340`) -- [CVE-2024-39001](CVE-2024/CVE-2024-390xx/CVE-2024-39001.json) (`2024-07-01T13:15:05.397`) -- [CVE-2024-39002](CVE-2024/CVE-2024-390xx/CVE-2024-39002.json) (`2024-07-01T13:15:05.450`) -- [CVE-2024-39003](CVE-2024/CVE-2024-390xx/CVE-2024-39003.json) (`2024-07-01T13:15:05.513`) -- [CVE-2024-39008](CVE-2024/CVE-2024-390xx/CVE-2024-39008.json) (`2024-07-01T13:15:05.590`) -- [CVE-2024-39013](CVE-2024/CVE-2024-390xx/CVE-2024-39013.json) (`2024-07-01T13:15:05.650`) -- [CVE-2024-39014](CVE-2024/CVE-2024-390xx/CVE-2024-39014.json) (`2024-07-01T13:15:05.703`) -- [CVE-2024-39015](CVE-2024/CVE-2024-390xx/CVE-2024-39015.json) (`2024-07-01T13:15:05.767`) -- [CVE-2024-39016](CVE-2024/CVE-2024-390xx/CVE-2024-39016.json) (`2024-07-01T13:15:05.823`) -- [CVE-2024-39017](CVE-2024/CVE-2024-390xx/CVE-2024-39017.json) (`2024-07-01T13:15:05.893`) -- [CVE-2024-39018](CVE-2024/CVE-2024-390xx/CVE-2024-39018.json) (`2024-07-01T13:15:05.950`) -- [CVE-2024-39853](CVE-2024/CVE-2024-398xx/CVE-2024-39853.json) (`2024-07-01T13:15:06.013`) -- [CVE-2024-4007](CVE-2024/CVE-2024-40xx/CVE-2024-4007.json) (`2024-07-01T13:15:06.077`) -- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-01T13:15:06.467`) -- [CVE-2024-6424](CVE-2024/CVE-2024-64xx/CVE-2024-6424.json) (`2024-07-01T13:15:06.690`) -- [CVE-2024-6425](CVE-2024/CVE-2024-64xx/CVE-2024-6425.json) (`2024-07-01T13:15:06.927`) +- [CVE-2024-36993](CVE-2024/CVE-2024-369xx/CVE-2024-36993.json) (`2024-07-01T17:15:08.290`) +- [CVE-2024-36994](CVE-2024/CVE-2024-369xx/CVE-2024-36994.json) (`2024-07-01T17:15:08.500`) +- [CVE-2024-36995](CVE-2024/CVE-2024-369xx/CVE-2024-36995.json) (`2024-07-01T17:15:08.707`) +- [CVE-2024-36996](CVE-2024/CVE-2024-369xx/CVE-2024-36996.json) (`2024-07-01T17:15:08.917`) +- [CVE-2024-36997](CVE-2024/CVE-2024-369xx/CVE-2024-36997.json) (`2024-07-01T17:15:09.143`) +- [CVE-2024-37145](CVE-2024/CVE-2024-371xx/CVE-2024-37145.json) (`2024-07-01T19:15:03.853`) +- [CVE-2024-37146](CVE-2024/CVE-2024-371xx/CVE-2024-37146.json) (`2024-07-01T19:15:04.070`) +- [CVE-2024-37298](CVE-2024/CVE-2024-372xx/CVE-2024-37298.json) (`2024-07-01T19:15:04.283`) +- [CVE-2024-38472](CVE-2024/CVE-2024-384xx/CVE-2024-38472.json) (`2024-07-01T19:15:04.563`) +- [CVE-2024-38473](CVE-2024/CVE-2024-384xx/CVE-2024-38473.json) (`2024-07-01T19:15:04.657`) +- [CVE-2024-38474](CVE-2024/CVE-2024-384xx/CVE-2024-38474.json) (`2024-07-01T19:15:04.760`) +- [CVE-2024-38475](CVE-2024/CVE-2024-384xx/CVE-2024-38475.json) (`2024-07-01T19:15:04.883`) +- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-07-01T19:15:04.977`) +- [CVE-2024-38477](CVE-2024/CVE-2024-384xx/CVE-2024-38477.json) (`2024-07-01T19:15:05.083`) +- [CVE-2024-38513](CVE-2024/CVE-2024-385xx/CVE-2024-38513.json) (`2024-07-01T19:15:05.173`) +- [CVE-2024-38953](CVE-2024/CVE-2024-389xx/CVE-2024-38953.json) (`2024-07-01T14:15:05.600`) +- [CVE-2024-39236](CVE-2024/CVE-2024-392xx/CVE-2024-39236.json) (`2024-07-01T19:15:05.420`) +- [CVE-2024-39251](CVE-2024/CVE-2024-392xx/CVE-2024-39251.json) (`2024-07-01T19:15:05.480`) +- [CVE-2024-39303](CVE-2024/CVE-2024-393xx/CVE-2024-39303.json) (`2024-07-01T19:15:05.540`) +- [CVE-2024-39573](CVE-2024/CVE-2024-395xx/CVE-2024-39573.json) (`2024-07-01T19:15:05.760`) +- [CVE-2024-39878](CVE-2024/CVE-2024-398xx/CVE-2024-39878.json) (`2024-07-01T17:15:09.350`) +- [CVE-2024-39879](CVE-2024/CVE-2024-398xx/CVE-2024-39879.json) (`2024-07-01T17:15:09.573`) +- [CVE-2024-6050](CVE-2024/CVE-2024-60xx/CVE-2024-6050.json) (`2024-07-01T14:15:05.893`) +- [CVE-2024-6375](CVE-2024/CVE-2024-63xx/CVE-2024-6375.json) (`2024-07-01T15:15:17.430`) +- [CVE-2024-6376](CVE-2024/CVE-2024-63xx/CVE-2024-6376.json) (`2024-07-01T15:15:17.673`) ### CVEs modified in the last Commit -Recently modified CVEs: `94` +Recently modified CVEs: `33` -- [CVE-2024-3995](CVE-2024/CVE-2024-39xx/CVE-2024-3995.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-4934](CVE-2024/CVE-2024-49xx/CVE-2024-4934.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5062](CVE-2024/CVE-2024-50xx/CVE-2024-5062.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5192](CVE-2024/CVE-2024-51xx/CVE-2024-5192.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5598](CVE-2024/CVE-2024-55xx/CVE-2024-5598.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5666](CVE-2024/CVE-2024-56xx/CVE-2024-5666.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5712](CVE-2024/CVE-2024-57xx/CVE-2024-5712.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5790](CVE-2024/CVE-2024-57xx/CVE-2024-5790.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5819](CVE-2024/CVE-2024-58xx/CVE-2024-5819.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5827](CVE-2024/CVE-2024-58xx/CVE-2024-5827.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5889](CVE-2024/CVE-2024-58xx/CVE-2024-5889.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5926](CVE-2024/CVE-2024-59xx/CVE-2024-5926.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-5942](CVE-2024/CVE-2024-59xx/CVE-2024-5942.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6130](CVE-2024/CVE-2024-61xx/CVE-2024-6130.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6265](CVE-2024/CVE-2024-62xx/CVE-2024-6265.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6363](CVE-2024/CVE-2024-63xx/CVE-2024-6363.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6402](CVE-2024/CVE-2024-64xx/CVE-2024-6402.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6403](CVE-2024/CVE-2024-64xx/CVE-2024-6403.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6405](CVE-2024/CVE-2024-64xx/CVE-2024-6405.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6414](CVE-2024/CVE-2024-64xx/CVE-2024-6414.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6415](CVE-2024/CVE-2024-64xx/CVE-2024-6415.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6416](CVE-2024/CVE-2024-64xx/CVE-2024-6416.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6417](CVE-2024/CVE-2024-64xx/CVE-2024-6417.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6418](CVE-2024/CVE-2024-64xx/CVE-2024-6418.json) (`2024-07-01T12:37:24.220`) -- [CVE-2024-6419](CVE-2024/CVE-2024-64xx/CVE-2024-6419.json) (`2024-07-01T12:37:24.220`) +- [CVE-2024-38992](CVE-2024/CVE-2024-389xx/CVE-2024-38992.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-38993](CVE-2024/CVE-2024-389xx/CVE-2024-38993.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-38994](CVE-2024/CVE-2024-389xx/CVE-2024-38994.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-38996](CVE-2024/CVE-2024-389xx/CVE-2024-38996.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-38997](CVE-2024/CVE-2024-389xx/CVE-2024-38997.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-38998](CVE-2024/CVE-2024-389xx/CVE-2024-38998.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-38999](CVE-2024/CVE-2024-389xx/CVE-2024-38999.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39000](CVE-2024/CVE-2024-390xx/CVE-2024-39000.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39001](CVE-2024/CVE-2024-390xx/CVE-2024-39001.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39002](CVE-2024/CVE-2024-390xx/CVE-2024-39002.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39003](CVE-2024/CVE-2024-390xx/CVE-2024-39003.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39008](CVE-2024/CVE-2024-390xx/CVE-2024-39008.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39013](CVE-2024/CVE-2024-390xx/CVE-2024-39013.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39014](CVE-2024/CVE-2024-390xx/CVE-2024-39014.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39015](CVE-2024/CVE-2024-390xx/CVE-2024-39015.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39016](CVE-2024/CVE-2024-390xx/CVE-2024-39016.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39017](CVE-2024/CVE-2024-390xx/CVE-2024-39017.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39018](CVE-2024/CVE-2024-390xx/CVE-2024-39018.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-39853](CVE-2024/CVE-2024-398xx/CVE-2024-39853.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-3995](CVE-2024/CVE-2024-39xx/CVE-2024-3995.json) (`2024-07-01T14:15:05.680`) +- [CVE-2024-4007](CVE-2024/CVE-2024-40xx/CVE-2024-4007.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-07-01T14:15:05.807`) +- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-01T19:15:06.037`) +- [CVE-2024-6424](CVE-2024/CVE-2024-64xx/CVE-2024-6424.json) (`2024-07-01T16:37:39.040`) +- [CVE-2024-6425](CVE-2024/CVE-2024-64xx/CVE-2024-6425.json) (`2024-07-01T16:37:39.040`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7b541bff7e6..3642d825f3a 100644 --- a/_state.csv +++ b/_state.csv @@ -79100,7 +79100,7 @@ CVE-2015-6171,0,0,edaa0ed49eca25902af9123467fb349de5a3628e49d9db465cafb7d871a69b CVE-2015-6172,0,0,f07991e2e2a19a9696a20f9d21527bf782f4878a6f3159baba024f3f1fa5ca45,2018-10-12T22:10:40.283000 CVE-2015-6173,0,0,3b678b405fdde2a6942f6a5fe6b2d0f8c2b3bd0bc0ea5369ae7ddce0883941b8,2019-05-15T15:09:51.853000 CVE-2015-6174,0,0,45d401e5ec610322b600846d114338dc0709df0e55cc6235d2cdecf333787927,2019-05-15T15:31:23.057000 -CVE-2015-6175,0,0,3c68ccec2e939247edb7c19533148ee76eeca9cfb00d5db0201b827601b6b0fb,2018-10-30T16:27:22.263000 +CVE-2015-6175,0,1,8cc2ab1bd5520efca87bf70b3d2d73fb6837ee65c5e493214e80e7bf7cf4ef68,2024-07-01T17:41:27.987000 CVE-2015-6176,0,0,6d8bd7888fa0d0322cc3d5ddfca235cc209c56f28f600a60442f2fd7bf289e01,2018-10-12T22:10:41.080000 CVE-2015-6177,0,0,817a059e7eabaf9152ee399566436d2eb9366c4156e06b3107a910cd0b5d919d,2018-10-12T22:10:41.267000 CVE-2015-6178,0,0,cfadc4407bff85becaba2bda32527557741b9668d971689a13799664949ea3a0,2023-11-07T02:26:33.597000 @@ -81344,7 +81344,7 @@ CVE-2015-8647,0,0,6bd1e93fd9c440093adb3f75e284e3039fceab9b562b29df5d7a0a948d21cb CVE-2015-8648,0,0,0e68ef771430dc1642eeac4ca8ed2a0ec2340c9186d02671af8289608f746fe8,2017-02-17T02:59:09.717000 CVE-2015-8649,0,0,c5bbf84b53ab71ce493c99028298aa30a152ee69b3792ee635e7ebd49759a90f,2017-02-17T02:59:09.797000 CVE-2015-8650,0,0,7313ec26c0bbca452e9027f7b678d9e0eae52f5a76737ec7613dde5479506263,2017-02-17T02:59:09.873000 -CVE-2015-8651,0,0,d8b585f8d262016e6d1463802bd883b2acd8f65c091e25b83cf7297b3e113228,2017-02-17T02:59:09.950000 +CVE-2015-8651,0,1,9c458cff21fd44ccf4ffde6e0e4949804a2e98f660a2185bcc191f79c5445aa1,2024-07-01T17:43:25.627000 CVE-2015-8652,0,0,b2ca14a444449a068c11ca0f0da7429e9ad53c507807090b1d96f065aef796b2,2023-05-08T13:29:02.290000 CVE-2015-8653,0,0,58097a744976f0b04795b575f15364d646ca455745f56da178c19bc4a5f3144d,2023-05-08T13:29:02.290000 CVE-2015-8654,0,0,7577e473c463e0d5795feddd633678c0de32502b275ee301ea217382e6c4665d,2023-05-08T13:29:02.290000 @@ -82244,7 +82244,7 @@ CVE-2016-0030,0,0,0d6a6f7954e7bbacc49dd91a704045f331fede4724267227eb2b1245590e7d CVE-2016-0031,0,0,98ee828fee94e5dc83b6fe8e51f81bcb09c5056b3ba3a0d2727015e5251dbd84,2020-04-09T13:26:49.583000 CVE-2016-0032,0,0,d77fc2129a6a5999c4c3d333c15e470f73b735d87df820cf4c33ad5a963e7232,2020-04-09T13:27:09.990000 CVE-2016-0033,0,0,8055d018419f7ee3fd3955c30f70de3cec7d3ea15248f357dddb82015785143f,2018-10-12T22:10:48.533000 -CVE-2016-0034,0,0,ba6774f15fce06de9e553627358c4df616febe5e0e69860d95905c308a272531,2018-10-12T22:10:48.720000 +CVE-2016-0034,0,1,505890c79c9a5175156a63bf808b20ea73ff07966a5a408d3f042e30562d28e5,2024-07-01T17:56:03.857000 CVE-2016-0035,0,0,ac98614e5103a805c0dae754293b57b3feaad6204b1e972305c570eaa47d017c,2018-10-12T22:10:48.923000 CVE-2016-0036,0,0,9646286a909a5c863f95c0bb389ed37dcfdee12c3dbcf06c9b35f35ac69fe8ec,2019-05-15T18:42:49.827000 CVE-2016-0037,0,0,4ea6ef1490c7d221c4878fe1468fc1b891018106e8b15f1d9f9b99ba400dccf6,2019-05-08T22:03:15.720000 @@ -138378,7 +138378,7 @@ CVE-2019-2519,0,0,80cb8a26de2a58d99b181963daed12ecd759858d5d5f05a1d765a0af10d1fc CVE-2019-2520,0,0,ae5d364f342d6d6e11cbfa1103b72fc4c48c965eceb925e0681dc4c71b896617,2020-08-24T17:37:01.140000 CVE-2019-2521,0,0,895d3d1e42e6880cb82a0d4fefb4c7b7e8f06c7c8e9ae8e0a5e83fb55980297e,2020-08-24T17:37:01.140000 CVE-2019-25210,0,0,07b454351a500643bf67356f1cc70d93fb3da2fec2ffde208a9e57da5b4a69e4,2024-05-17T01:36:44.030000 -CVE-2019-25211,0,1,3551f053251482d7c4eea3a2f2f95512b0513afe16a4257463cbed7289ad3bb9,2024-07-01T12:37:24.220000 +CVE-2019-25211,0,0,3551f053251482d7c4eea3a2f2f95512b0513afe16a4257463cbed7289ad3bb9,2024-07-01T12:37:24.220000 CVE-2019-2522,0,0,ae55dddc2cf216d0836c321fa3f09f9eb54cf6815873c5427c0842a495c7f153,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,2420d5fa367bd9afc8efca036c098c95836d2845178df0523b9e6ef463059e04,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,23ed838788d5538a8e4757f53d25252723d39ac2a7a29dd85ea00493a946f02f,2020-08-24T17:37:01.140000 @@ -195990,7 +195990,7 @@ CVE-2022-27537,0,0,921b0370a064e6c66676a61cfdeff07d6c6d04bc3ca7b839174740829af03 CVE-2022-27538,0,0,249f5be3e9b39d633c92919b84d02015816e4423af4cf975b765430fb91f4716,2023-02-16T21:59:04.027000 CVE-2022-27539,0,0,89576ebdaff45cf10436f65488ea1060d8fb4295ef4f82967a948869364f6de5,2023-06-28T20:09:40.707000 CVE-2022-2754,0,0,0e0f4008598b3866746bf3e5aee56da4f49a23b3179bb6bece9688299f3820ba,2022-09-21T06:28:06.090000 -CVE-2022-27540,0,1,c7a2e01f21c744aaf1fad5f226c4a727dc6c9cfe76c05321ee737be76079a8ba,2024-07-01T12:37:24.220000 +CVE-2022-27540,0,0,c7a2e01f21c744aaf1fad5f226c4a727dc6c9cfe76c05321ee737be76079a8ba,2024-07-01T12:37:24.220000 CVE-2022-27541,0,0,3d6efa17e2a474be5e41adb6775036d0f158523f32ce57cf62154797f223ac18,2023-06-28T20:09:53.083000 CVE-2022-27544,0,0,d75315ba5cd3d9cb8adf29633c1c9b54c0678137a0441bdb7e80df2b22b24cc2,2022-07-27T22:40:03.920000 CVE-2022-27545,0,0,5d57f98791760f09bf7d908f75eebe296b09ecdad39ee494394f84d6a8533530,2022-07-27T22:36:45.790000 @@ -204687,7 +204687,7 @@ CVE-2022-38379,0,0,428787175c578693384b489df4a2b8cdcc2b9e56c491740ff8a1b7056571e CVE-2022-3838,0,0,2b3493d4948c4c37348af61a59172e3d9b6c97f426da6305df38912f30462d5d,2023-11-07T03:51:51.887000 CVE-2022-38380,0,0,06ba2fa35bb59291f3e6426e3c13f4d3c429bc0f04be5a9a0642274f0b5c8f9f,2022-11-04T14:56:46.817000 CVE-2022-38381,0,0,1d071d4638d13bbbb0953ae145422e2ec1a438ce32282da9c0c76f050bcf608e,2022-11-04T15:03:40.800000 -CVE-2022-38383,0,1,66c59fde59945d36ff421371770e95940efed64b5627cf4175fea8d83ae78894,2024-07-01T12:37:24.220000 +CVE-2022-38383,0,0,66c59fde59945d36ff421371770e95940efed64b5627cf4175fea8d83ae78894,2024-07-01T12:37:24.220000 CVE-2022-38385,0,0,02825fa13fca67fac2aa42ed4b88196b1389bea3a91c3e48d00af87ff80503ba,2023-11-07T03:50:07.243000 CVE-2022-38386,0,0,fd45c5dc183497347e3c318f666af4cbc914b98867e985d61a2eca4d45bb15b8,2024-05-01T19:50:25.633000 CVE-2022-38387,0,0,f1f9aa2a7c26b06061e2968005bc33433dbf65c68010969746df05d3f98275ee,2023-11-07T03:50:07.340000 @@ -226041,7 +226041,7 @@ CVE-2023-35018,0,0,0740e92751ade7cc18b1f554af4cf823e2aafc087f99c1bc0b052d47163f3 CVE-2023-35019,0,0,7a1aebfa7c1d8452ead17bc55aa79dfd7cccc82a067d10ba856bbab6cefd4f37,2023-08-04T17:23:56.413000 CVE-2023-3502,0,0,302fb1d5bd5743d734a07b72e0538f873a2636c89266e46579bdeab79529bbc5,2024-05-17T02:27:32.370000 CVE-2023-35020,0,0,a56e5414c215dac3cc405b9d4361a2fe76232d53870262091227d01b8aabefa2,2024-01-24T21:38:11.280000 -CVE-2023-35022,0,1,ac694e9c8ffd8fb7368eea470158e18ea431a24bfa5487ba39c286c0c02b290c,2024-07-01T12:37:24.220000 +CVE-2023-35022,0,0,ac694e9c8ffd8fb7368eea470158e18ea431a24bfa5487ba39c286c0c02b290c,2024-07-01T12:37:24.220000 CVE-2023-35024,0,0,1ecf47a0b86bc02884af00b7eabcb558d32c4df794f8d7331a088e35c2b97fda,2023-10-18T21:04:02.917000 CVE-2023-35029,0,0,65adbe0e4dac0fa608e92fc04d22ecaf7d4b82b325012924bbebcbbc80cbf1c0,2023-06-22T16:51:23.137000 CVE-2023-3503,0,0,c6abbd30c8521c47d1ae7cf0398b364788b08345eeb291320098a60d82c9fd2c,2024-05-17T02:27:32.480000 @@ -229917,7 +229917,7 @@ CVE-2023-40165,0,0,ab4e5756d11c5c99a14c74b5f2435b3a7ec37a8508fd8d1103ed13f8c2d14 CVE-2023-40166,0,0,e65129dbfd3b7538a0e791950fa4e4949f5750f316e418a4f293a1ace762d2e1,2023-08-31T16:33:53.880000 CVE-2023-40167,0,0,844221061890a9ee782732b03205b8ad71f2deb86a58157baa3044abcbbc84e9,2023-10-13T01:59:32.977000 CVE-2023-40168,0,0,70a509d5b6e44ab39f20bb6f74d7222f2250c3522969cca155350fac49518d8d,2023-08-24T15:04:49.430000 -CVE-2023-4017,0,1,4e6059facf3e43de1d91594e07e57878b93838ccce97903c7d9e34ea7c8c89f8,2024-07-01T12:37:24.220000 +CVE-2023-4017,0,0,4e6059facf3e43de1d91594e07e57878b93838ccce97903c7d9e34ea7c8c89f8,2024-07-01T12:37:24.220000 CVE-2023-40170,0,0,67e9723fa3a370c77f30ddb3e0da340f391c6067a62d196310c2bd52b2255239,2023-09-15T22:15:14.333000 CVE-2023-40171,0,0,71a7846ed38ba22c187618c817ebcfbd338daee7a019f556400a1c9e3f3a5897,2023-08-24T15:11:33.620000 CVE-2023-40172,0,0,faffa6093066f944ecdc507879750b0d605e40ed8b67b25cd587316c3781dacc,2023-08-23T19:55:36.697000 @@ -232348,6 +232348,7 @@ CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0 CVE-2023-43551,0,0,fff50831b0879e65c4c79b3ec6220cb3ef5a1341ddd3576588de2d2e2a3f6323,2024-06-03T14:46:24.250000 CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000 CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000 +CVE-2023-43554,1,1,b6a60997b150f3491b2134d50416e22685e3e5095284417e88c69faf15a086a8,2024-07-01T16:37:39.040000 CVE-2023-43555,0,0,d0dcf6aa41c197eb1bd37623e2dce49869d747b1acfd889a96ea73711cf86a6d,2024-06-03T14:46:24.250000 CVE-2023-43556,0,0,b8b06ca2bf8ae30c51c8b9a1e28dc1200a038cf79690defb7e3d4b14354cdbbb,2024-06-03T14:46:24.250000 CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000 @@ -237352,9 +237353,9 @@ CVE-2023-50948,0,0,3c02519a72037dff711d5ee48432aa7f2b5638da69466874289b5ec8a9701 CVE-2023-50949,0,0,05099c94caa797bc55ec09b8ff46351e2b7dda33262efba30ca113b16d3acf90,2024-04-12T12:44:04.930000 CVE-2023-50950,0,0,dfea2c60bf930725232ee8dec76ee1dc7db647db5a23e4d3c95d00ce14c241f2,2024-01-24T19:42:29.450000 CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b32d2,2024-02-20T19:50:53.960000 -CVE-2023-50952,0,1,6fb8a6f06e6ea79274476d98fa8b7f4c7c8fe5f78cbf74526726a3c4f21b950e,2024-07-01T12:37:24.220000 -CVE-2023-50953,0,1,6a7df3afd53a32e2774a66668eb39cee23e7c8d11420bbc120edbae979b6e96a,2024-07-01T12:37:24.220000 -CVE-2023-50954,0,1,03e5c9c632759f06d0045591a0608fa87031762cf88a1b42fbb995d9ab529ae8,2024-07-01T12:37:24.220000 +CVE-2023-50952,0,0,6fb8a6f06e6ea79274476d98fa8b7f4c7c8fe5f78cbf74526726a3c4f21b950e,2024-07-01T12:37:24.220000 +CVE-2023-50953,0,0,6a7df3afd53a32e2774a66668eb39cee23e7c8d11420bbc120edbae979b6e96a,2024-07-01T12:37:24.220000 +CVE-2023-50954,0,0,03e5c9c632759f06d0045591a0608fa87031762cf88a1b42fbb995d9ab529ae8,2024-07-01T12:37:24.220000 CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000 CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000 CVE-2023-50959,0,0,568717d1c5e9b7aee1be9083e54c56d344f91074f581c8ef3e925eba18620c0a,2024-04-02T17:56:18.897000 @@ -237362,7 +237363,7 @@ CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d3 CVE-2023-50961,0,0,d711d4a9d8ad627716324633a649c2a8b70ff648c86857e4b94f3b50216da091,2024-03-27T15:49:51.300000 CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000 CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000 -CVE-2023-50964,0,1,05618bc7480072746dd363727665cfce41d13577a3279532051009bea9dc475a,2024-07-01T12:37:24.220000 +CVE-2023-50964,0,0,05618bc7480072746dd363727665cfce41d13577a3279532051009bea9dc475a,2024-07-01T12:37:24.220000 CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000 CVE-2023-50966,0,0,a6b32088d0a5d6ef9a7d587370f326ae2061a7a42b121ce18c85e023136aaec3,2024-03-19T16:33:58.680000 CVE-2023-50967,0,0,bb1533384c54817eac919409a9c4a4f7b98f5730662b59bf4ce17ad616d7daee,2024-04-19T23:15:09.330000 @@ -240680,7 +240681,7 @@ CVE-2024-0099,0,0,922026d11edb09689a5419f4b6981b91f643282898008757d63b84ab582e71 CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000 CVE-2024-0103,0,0,c0f8f807fdf8426bc2106e7af79b6cd7b7308e8ea4f1780be6db3fdc6d1d8cf2,2024-06-17T12:43:31.090000 CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000 -CVE-2024-0153,0,1,687da5d226530ac38f394cd9b952906c5e53ebec74b3ccf6df4062258fc2674f,2024-07-01T12:37:24.220000 +CVE-2024-0153,0,0,687da5d226530ac38f394cd9b952906c5e53ebec74b3ccf6df4062258fc2674f,2024-07-01T12:37:24.220000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 @@ -242445,13 +242446,13 @@ CVE-2024-20072,0,0,c200ff4baf6255d64deb0271583c6f0f747c9ccdf27a663d7a798dfcb83f3 CVE-2024-20073,0,0,a0b25eb428467d36e6c8d6b6d33dfc4191a095e61c25b5d42e8224294b10245c,2024-06-03T14:46:24.250000 CVE-2024-20074,0,0,ae8ea4f1aeb95c2db6d96bbffc4725f4aeeca344255405cba91589fc79862e12,2024-06-03T14:46:24.250000 CVE-2024-20075,0,0,c25b515a91dbc89ebe595fac548aad128c5354b0efe2add6f43a7dd87e7c74de,2024-06-03T14:46:24.250000 -CVE-2024-20076,0,1,7a7cdd6b11d797bc1065c2a69cb9c58eccd1fe55a553f474fcbfe7ead824177f,2024-07-01T12:37:24.220000 -CVE-2024-20077,0,1,078df06cdcdb9fbee70d10a06d71a0c738e3f06468faa637c9b71b99bd9250ed,2024-07-01T12:37:24.220000 -CVE-2024-20078,0,1,f7d8ca3412c1bf1826924b855782cd80652b405b3608aec4d57b9c0cf2c70fb9,2024-07-01T12:37:24.220000 -CVE-2024-20079,0,1,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000 +CVE-2024-20076,0,0,7a7cdd6b11d797bc1065c2a69cb9c58eccd1fe55a553f474fcbfe7ead824177f,2024-07-01T12:37:24.220000 +CVE-2024-20077,0,0,078df06cdcdb9fbee70d10a06d71a0c738e3f06468faa637c9b71b99bd9250ed,2024-07-01T12:37:24.220000 +CVE-2024-20078,0,0,f7d8ca3412c1bf1826924b855782cd80652b405b3608aec4d57b9c0cf2c70fb9,2024-07-01T12:37:24.220000 +CVE-2024-20079,0,0,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000 CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000 -CVE-2024-20080,0,1,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000 -CVE-2024-20081,0,1,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000 +CVE-2024-20080,0,0,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000 +CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000 CVE-2024-2009,0,0,71459ca320e3ba6a6c331932225f22d43a50dc1f7bd5a77e40fa738dd949aeca,2024-05-17T02:37:59.337000 CVE-2024-2011,0,0,845fb303b632df2a82ac2c4f8385a50b893aa8c309406d3fe328481c0cd09158,2024-06-13T18:36:45.417000 CVE-2024-2012,0,0,878efb3776c708b50cfb853377bc9e21e4d99f3747b5a678478141addae0900a,2024-06-13T18:36:45.417000 @@ -242572,6 +242573,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 +CVE-2024-20399,1,1,bb75c3d6009e5feccf8a9ba090bb7f5d7a196209d110ab7ff4cb6997adaadb6b,2024-07-01T17:15:04.383000 CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 @@ -243229,9 +243231,18 @@ CVE-2024-21451,0,0,3a68c9cb135fb79bfe9a5852a24c7fd1f5875fcd798816d60af8d6fb9ada6 CVE-2024-21452,0,0,02d31b115a697c05db35da661c22664c85e8181268bd7542a64483c043b4b7b5,2024-04-12T09:15:09.877000 CVE-2024-21453,0,0,8dc35af31e64bd045ded864e7fcc07424ae51270f4588b919a1a9152eb1b9be2,2024-04-12T09:15:09.977000 CVE-2024-21454,0,0,b257edb5552eb473b4503004e3fc64a602a43324cbc07ac68d19d0a9bcb868c5,2024-04-12T09:15:10.083000 +CVE-2024-21456,1,1,07dcd071bffa0c44180e19b48a0ffe105b7eb0f50ab8d8ce853bf480a4beba79,2024-07-01T16:37:39.040000 +CVE-2024-21457,1,1,c51a832eee10458dc0aeca1412a2479ea404399a1c81e24c09e674525c076ae9,2024-07-01T16:37:39.040000 +CVE-2024-21458,1,1,14c2fad17d35a8a4f6efb9de30e88872b7b8cc29e70f5a85ef675e3349179df6,2024-07-01T16:37:39.040000 CVE-2024-2146,0,0,18e858010f752fe48eba92f669210f471df0d7d5120f3dce1efba4919f090b2b,2024-05-17T02:38:04.200000 +CVE-2024-21460,1,1,0e9df1da73e8e89d3208da73d1fe52ccb4cae7458b59e2c4118f61fa4495704a,2024-07-01T16:37:39.040000 +CVE-2024-21461,1,1,9adf06ea3a2d17b0595d893a4b01e010e5ec314285ba3819f863f42f1203f4c7,2024-07-01T16:37:39.040000 +CVE-2024-21462,1,1,7f4f62b93923e70e6f0061c6a6a972af20bd3d80676b9a4d7adc24c73365f1bf,2024-07-01T16:37:39.040000 CVE-2024-21463,0,0,8f929d15ea58ffe4c907e382121f59ff2b72bea6ff85918078d89258f2adb890,2024-04-12T09:15:10.193000 +CVE-2024-21465,1,1,3e1dac5abf4816a2f1def9ac836d078377b5f3e3e4971c3ea83b094120784cb7,2024-07-01T16:37:39.040000 +CVE-2024-21466,1,1,214b2fa5c6140f13f2d523313417fd06b636cd4166c5763ecef1308a2f4969d7,2024-07-01T16:37:39.040000 CVE-2024-21468,0,0,f2b93df747dc8ffb1a67bf6170c8b74d59ead8db487ef5519f8ed51313b18879,2024-04-12T09:15:10.303000 +CVE-2024-21469,1,1,5a0e43ca387de69963299e78ff42a35d9e2739b9a6e5573dabcf69b8593c9905,2024-07-01T16:37:39.040000 CVE-2024-2147,0,0,3efc249503b7d31cf02f2428bf4511d025fa9f2f838acc89eb93938f9981992f,2024-05-17T02:38:04.293000 CVE-2024-21470,0,0,acd6c1381826abd35aa0c5fc63da2cad3d21675cd9907feb7858c393a543a7f4,2024-04-12T09:15:10.433000 CVE-2024-21471,0,0,e1abb0c50539103876297a632f25378f1444ddda8faad24e49920b56b9ea4a01,2024-05-06T16:00:59.253000 @@ -243244,6 +243255,7 @@ CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4 CVE-2024-21478,0,0,36dfa412cb137cba65151bfea20c0e66b2ab35d0e6033873c7da5a111874076d,2024-06-03T14:46:24.250000 CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000 CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000 +CVE-2024-21482,1,1,7561b73ed526473db4d45c97eb162833eab13e81a0d452b67db4bb6caf2e0cd7,2024-07-01T16:37:39.040000 CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000 CVE-2024-21484,0,0,5f19ab0f68120a92041bdc33d9c29463ccd0d23c1b4da1c7441e6cd0612506af,2024-03-06T14:15:47.533000 CVE-2024-21485,0,0,0775bbbb470f3ac41cc07f785a9ceabee9d1e54c43c7bfd148d7325914f9c235,2024-03-06T14:15:47.760000 @@ -243287,6 +243299,7 @@ CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae654393 CVE-2024-2156,0,0,9875f97b16d433dcae1d17513bfc06f6a88167c3f9be8e020b7e41eaf5e1716f,2024-05-17T02:38:05.157000 CVE-2024-21584,0,0,d66fedfad76e69bf70f964d573fe608d89f94eedd1312d57b206120486115729,2024-03-12T12:40:13.500000 CVE-2024-21585,0,0,6e8206f1fdf94b37b9dcf7444e5790dcbe04c3a87e39f8bb6c4b0625dfa3058a,2024-01-31T00:15:45.920000 +CVE-2024-21586,1,1,6a86b1ca4b4eed666a2e26212ecf2f9640988011f74f79cf972450ee5d5b4381,2024-07-01T17:15:05.193000 CVE-2024-21587,0,0,8f0f5dff561533a0791e40b4445b496c614678c7a31b89022336200c858df596,2024-01-19T17:44:35.830000 CVE-2024-21589,0,0,68b0ee433e5dc2a6e0c5986e659a2299beb8087cc670f80d46b90c5ac3b4a35f,2024-01-19T17:41:50.160000 CVE-2024-2159,0,0,f3be63a7663ddf3b31bfd92d9a748c732237b19d0097a5faff5e36011f65cbaf,2024-04-26T12:58:17.720000 @@ -244402,7 +244415,11 @@ CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65 CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000 CVE-2024-23360,0,0,a0e02beef64771c409bba62a59974a7242efe2beed7ec1a0338b8289be7e2051,2024-06-03T14:46:24.250000 CVE-2024-23363,0,0,0707bd01da1cb508f4a1ec84537ade1624792b9e876ac1f60a112ad96d849177,2024-06-03T14:46:24.250000 +CVE-2024-23368,1,1,8180b4639ea83220498176de7e78708b88091a6f2a71b2bf5cf84238bff611ae,2024-07-01T16:37:39.040000 +CVE-2024-23372,1,1,7519fb06aa0ed092bf1c99fb8933d24ae7c3408390ebe7fd86f7c68a2dbc9495,2024-07-01T16:37:39.040000 +CVE-2024-23373,1,1,39fe96bb830b1086d3b0178680b5afc566021eecde10c0bf0afbcf30bd08a1c3,2024-07-01T16:37:39.040000 CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000 +CVE-2024-23380,1,1,377f8c128db77fa02e9a86f529bfed45986a96dff61429f9c0df47dea4c61b15,2024-07-01T16:37:39.040000 CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000 CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000 CVE-2024-2339,0,0,fdf2e9587a4f32c10532c2236faf6d2db35a7825d1bc11064100d013b4c7d19f,2024-03-08T21:19:43.127000 @@ -244742,7 +244759,7 @@ CVE-2024-23856,0,0,7a070de7fdd5d74cea0874cc007ef2bf0f323d01fd662c9716c69691cbccd CVE-2024-23857,0,0,7eaf19807291540ffb4ed0aaeba2203c48dbce97eb1c38b6829b99f69bea7f4d,2024-02-15T10:15:09.737000 CVE-2024-23858,0,0,179fd096cc74dd5cbbf876bea6a8488b0885e1edc4fe71fbcee8079358c39150,2024-02-15T10:15:09.977000 CVE-2024-23859,0,0,63d22f89061de591ebb6f50f4326d532f8fce7994f1fbe1f5617c0b66052cbc5,2024-02-15T10:15:10.320000 -CVE-2024-2386,0,1,e910438a3934865bd71dc7371b084d92c8554eaa6c70bbb2ec087830c15b9721,2024-07-01T12:37:24.220000 +CVE-2024-2386,0,0,e910438a3934865bd71dc7371b084d92c8554eaa6c70bbb2ec087830c15b9721,2024-07-01T12:37:24.220000 CVE-2024-23860,0,0,6632cbbf88be694b99a54a9686f448c6c76767ee921ebba92af7b1d8dcf41923,2024-02-15T10:15:10.567000 CVE-2024-23861,0,0,1e0a03b0e05ef6048d2c622678e2eb6612c0b797636e9b5ad09792d3e7721feb,2024-02-15T10:15:10.917000 CVE-2024-23862,0,0,857cda3f242d87fabecd43e75af37484c6e5f8b7cb4875ca14d61eda019d5ca8,2024-02-15T10:15:11.193000 @@ -245156,6 +245173,7 @@ CVE-2024-24743,0,0,0f9fe8c46f95fe6a826ca3990c6a9cc5f65190a01cad4e6f6e9f271c18043 CVE-2024-24746,0,0,f413651119509d8bbe183d33262f3389272a068e9c6e43f6cac823758e402119,2024-05-01T18:15:14.767000 CVE-2024-24747,0,0,f1a9181559802764d3abc2532f673fd70e99148bf526b7e772b90a95095b418a,2024-02-09T15:18:00.510000 CVE-2024-24748,0,0,ecaeb1145f78c27b3263c7d08a914384649823870ed552d13ac62854d31ce79b,2024-03-17T22:38:29.433000 +CVE-2024-24749,1,1,5f93ca0c37091f830e6dbaaf0bd4100f1018f43580b01385381ea1404a5024a9,2024-07-01T16:37:39.040000 CVE-2024-2475,0,0,217b3852eba1552a23ac999c983aecc21d18a764f179fbfb3a08ea63fa4dac64,2024-03-29T12:45:02.937000 CVE-2024-24750,0,0,5d454a471477096dcce9165932bd9f7dbfe957ed7386b0aaadc1aef0b1c490d7,2024-04-19T07:15:09.330000 CVE-2024-24751,0,0,d7cdd447dea44769ed0f4c8f1ccd48a28b546d2b3034d970475d4af6ca53e646,2024-02-13T19:45:42.327000 @@ -245397,16 +245415,16 @@ CVE-2024-25027,0,0,506fa0f038304c2bb065c6aafbb038363984a8c8037945872a1b74013246a CVE-2024-25029,0,0,d48a17c1d5ef1bfa6fbe7d5b73144f127d39825001bfd50aa27289e6a7875699,2024-04-08T18:48:40.217000 CVE-2024-2503,0,0,5456a0b13b40102166dfd1cda8940dfe9ff4664673bbe7b6a7953c477d674561,2024-05-02T18:00:37.360000 CVE-2024-25030,0,0,6e16b2526be8abef4237aa975d66d5ed678d7c0d907efb0dcc09108160949092,2024-06-10T18:15:27.247000 -CVE-2024-25031,0,1,469453639d4aa429d76da5acfd1e1972c3ace1bf2c3c85b252deeb41e11b70a1,2024-07-01T12:37:24.220000 +CVE-2024-25031,0,0,469453639d4aa429d76da5acfd1e1972c3ace1bf2c3c85b252deeb41e11b70a1,2024-07-01T12:37:24.220000 CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000 -CVE-2024-25041,0,1,7928ae57a8bc2dc3a8c04d59e5aa30b1327837d78f88e428ea9c9bbae0acf7f7,2024-07-01T12:37:24.220000 +CVE-2024-25041,0,0,7928ae57a8bc2dc3a8c04d59e5aa30b1327837d78f88e428ea9c9bbae0acf7f7,2024-07-01T12:37:24.220000 CVE-2024-25046,0,0,4397b23573a65e79c16052f58f281291388123ce903b9df7b4059c81aac5ce1a,2024-06-10T18:15:27.350000 CVE-2024-25047,0,0,64419cf1d56aa51442fec48f489740b8b22b015f011042cff3e462c703444ca0,2024-06-21T19:15:30.053000 CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000 CVE-2024-2505,0,0,f9efd81999a67e571786699340d45ecbc4af4577ba4f92360cdbb165e79506a4,2024-04-29T12:42:03.667000 CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000 CVE-2024-25052,0,0,a1c8165788344cec6c26b0ce1cd1c907b8a407a30045684a7d709a32eba309a1,2024-06-13T18:35:19.777000 -CVE-2024-25053,0,1,a7c1d494e85c793a8b85597c57f93ed8af694871477cfb34ba8468c39dbbe4ad,2024-07-01T12:37:24.220000 +CVE-2024-25053,0,0,a7c1d494e85c793a8b85597c57f93ed8af694871477cfb34ba8468c39dbbe4ad,2024-07-01T12:37:24.220000 CVE-2024-2506,0,0,e15f8d6bb21612e515765b00c070f0acb363bd444917e661aa5401c0b47082de,2024-06-03T14:46:24.250000 CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000 CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000 @@ -245946,7 +245964,7 @@ CVE-2024-2594,0,0,bde31fdaab09a079b8da0d26da3ff2fd7469b156a031f2e67457f19c614e87 CVE-2024-25940,0,0,0f284eb6797ffd015c122aeeb19f68755aac0aac9d9f404601b2b09d1a1b9b82,2024-04-19T07:15:09.657000 CVE-2024-25941,0,0,0620596476a272ab01a4a766ab6af38a519cd30d123423fbbdbdd109f3a89b18,2024-06-10T19:15:53.077000 CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46 -CVE-2024-25943,0,1,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000 +CVE-2024-25943,0,0,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000 CVE-2024-25944,0,0,0c942868260e254f0ec88d12c198d84ea5267c121ead95446b5b00550e047e17,2024-04-01T01:12:59.077000 CVE-2024-25946,0,0,6f496894c0996dd20db51bddadbb7b8f4613518a0a22790fcd21a192873f3411,2024-03-28T20:53:20.813000 CVE-2024-25949,0,0,28dd1d310f71410ca26db9f24ad82830e2205559dd220b22f64be17580b64f1f,2024-06-13T18:36:09.010000 @@ -247322,8 +247340,8 @@ CVE-2024-27623,0,0,2fddee8e74e15c6e7895f22777fd9ac33928389d1ff6851e7ceeb0e05ed9e CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7b4c,2024-03-05T14:27:46.090000 CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000 CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000 -CVE-2024-27628,0,1,faa71788c87c317049fdc79ef56c77e632eee6d27397d0a91223336e9c422e45,2024-07-01T12:37:24.220000 -CVE-2024-27629,0,1,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000 +CVE-2024-27628,0,0,faa71788c87c317049fdc79ef56c77e632eee6d27397d0a91223336e9c422e45,2024-07-01T12:37:24.220000 +CVE-2024-27629,0,0,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000 CVE-2024-2763,0,0,915a4db607b8067b26a412109e7e5ccfc1290182e3b3b563c2eda7d6ee1f9e77,2024-05-17T02:38:28.787000 CVE-2024-27630,0,0,c166a75eb868b94e3d44b8631307a3b16a1a3175bacac14103c1a38615b66cc2,2024-04-11T06:15:06.270000 CVE-2024-27631,0,0,d8dcd2de2ab076578039d2fc8d07b397b3cb994ac2e3f6cf562a97f0cf407dc3,2024-04-11T06:15:06.560000 @@ -247530,7 +247548,7 @@ CVE-2024-27956,0,0,194fe594f0f82199e60d61684a1f7c8db8c04bdf57c93a45e71af1bb25f78 CVE-2024-27957,0,0,3bb51417dd78fa81cd8d3e079ab9ae6ed1b9709468847cb623b9c9568eef40f4,2024-03-17T22:38:29.433000 CVE-2024-27958,0,0,3c69427bef710d3f7bb781ce81b405984dd58d08367be619f590c223ad730fd4,2024-03-17T22:38:29.433000 CVE-2024-27959,0,0,b6158d09fbe57e466eaa147e639a460dd447ef6efe99a61800919c1426ccc29c,2024-03-17T22:38:29.433000 -CVE-2024-2796,0,0,40f83fb33f4fa292a363b62c84df176246a04da8a7040a6965ddecb98d4131ac,2024-04-18T18:25:55.267000 +CVE-2024-2796,0,1,3d44c6201a2a3363380fbacee1a38246c05a7907f941963241152ffdb7a21198,2024-07-01T15:15:16.793000 CVE-2024-27960,0,0,f24cb349f10cfa74e91704c4186cd8ad2d36e2e6ec0ef021d33bdec9575a5822,2024-03-17T22:38:29.433000 CVE-2024-27961,0,0,f8aa7d138d3bc8c32b44cd00e2345672372b1720c63bb0bc0998e3ab4b908ae3,2024-03-17T22:38:29.433000 CVE-2024-27962,0,0,17f6594cb4e48407b3b28a4d52db42d5a531934fbaefcd58b5c585ffd5201450,2024-03-21T19:47:03.943000 @@ -247990,10 +248008,10 @@ CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f26 CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000 CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000 CVE-2024-28793,0,0,0971b91b249c500bf4e72fc37951e1fea5132a60c7834326b93f07f92baebfb6,2024-06-10T18:15:29.983000 -CVE-2024-28794,0,1,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596155,2024-07-01T12:37:24.220000 -CVE-2024-28795,0,1,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 -CVE-2024-28797,0,1,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000 -CVE-2024-28798,0,1,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000 +CVE-2024-28794,0,0,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596155,2024-07-01T12:37:24.220000 +CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 +CVE-2024-28797,0,0,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000 +CVE-2024-28798,0,0,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000 CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000 @@ -248168,10 +248186,10 @@ CVE-2024-29034,0,0,abbcb2dba15b8f4921d05a8db211631f1cd87e65f2de49321a196077424f0 CVE-2024-29035,0,0,21701c3dd0407a32f3860c33eba458ab5265ec3a8caf169794b15ed3942b0b5e,2024-04-17T15:31:50.160000 CVE-2024-29036,0,0,f20370765a1c49d0a0bad775fe00268f4f8d50d24ef66d07a4f7dc0500570ad3,2024-03-21T12:58:51.093000 CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11aadc,2024-03-21T12:58:51.093000 -CVE-2024-29038,0,1,05c9a5e0e88713c6ed7f7b51747c9e0457a8b16cb11c423d76ebba30109cceaf,2024-07-01T12:37:24.220000 -CVE-2024-29039,0,1,ddb2af3d6258726aacc9170d1bb5e873b3c8db301d5b1bc2db262d122d79ce98,2024-07-01T12:37:24.220000 +CVE-2024-29038,0,0,05c9a5e0e88713c6ed7f7b51747c9e0457a8b16cb11c423d76ebba30109cceaf,2024-07-01T12:37:24.220000 +CVE-2024-29039,0,0,ddb2af3d6258726aacc9170d1bb5e873b3c8db301d5b1bc2db262d122d79ce98,2024-07-01T12:37:24.220000 CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000 -CVE-2024-29040,0,1,6dc4c74085741fe48e095b8ec200d71224a358b6b607ecd146b4e9609c29a4ab,2024-07-01T12:37:24.220000 +CVE-2024-29040,0,0,6dc4c74085741fe48e095b8ec200d71224a358b6b607ecd146b4e9609c29a4ab,2024-07-01T12:37:24.220000 CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000 CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000 CVE-2024-29043,0,0,a6b5a5b270ee9b198f94a0f09e59dfb944c5cad6bfa0e71af6c157ac0edbbe91,2024-04-10T13:24:00.070000 @@ -249612,14 +249630,14 @@ CVE-2024-31216,0,0,d81eedaba41c66ff5403344865ad7320029e4218bc907b5fcd390407a8729 CVE-2024-31217,0,0,5f9cfb0e61249f70dadebe14e4e4386911d46ac33fe3ecd5dce212e07cce5f8c,2024-06-13T18:36:09.010000 CVE-2024-31218,0,0,7bde3095db5888b85ce9669e8bb2502e2c0767a6efc1fdc83c6973eaeb264970,2024-04-08T18:49:25.863000 CVE-2024-31219,0,0,d2d2811e70f71b6e8f1f63a3f7bda6856d7eb5bcd23ce2727f866e79d3b49966,2024-04-15T19:12:25.887000 -CVE-2024-3122,0,1,f499bd3334132166b1136e99d883b62905d0bf4a53683e18fa1a73b357bee121,2024-07-01T12:37:24.220000 +CVE-2024-3122,0,0,f499bd3334132166b1136e99d883b62905d0bf4a53683e18fa1a73b357bee121,2024-07-01T12:37:24.220000 CVE-2024-31220,0,0,5364fec01a2c522837b9bb1f12dd2e109f09573a57ee59445d858fa07dd681f7,2024-04-08T18:49:25.863000 CVE-2024-31221,0,0,093d7a2a638171e5d3f8cc3b06e5a6b3ca8a7674a42c7ed40ef62927f76d1926,2024-04-08T18:48:40.217000 CVE-2024-31224,0,0,2f84ceb3d774709c2492171042eddaeb6b6b98a31b06a1f67434414d962c7206,2024-04-08T18:48:40.217000 CVE-2024-31225,0,0,775bf5be18a8afccd8a3d22e12b068c166a2b602aedd7e1dec0c49e92715b97b,2024-06-10T18:15:31.123000 CVE-2024-31226,0,0,c551125ecb7e722e7d385d0ba4ae8e898eaf339efee9a69cd1ef9cc05b64e374,2024-05-17T18:36:31.297000 CVE-2024-31229,0,0,7de33a876b6efca66be6426e83eb27e50104659e2ffe406707b9d46bf22d8ac4,2024-04-18T13:04:28.900000 -CVE-2024-3123,0,1,7969034960d8468f2e42c9820543aa0d78630ff8823b9e15099413e2773c7cfb,2024-07-01T12:37:24.220000 +CVE-2024-3123,0,0,7969034960d8468f2e42c9820543aa0d78630ff8823b9e15099413e2773c7cfb,2024-07-01T12:37:24.220000 CVE-2024-31230,0,0,52cfa4cc0c105e0f4a014468a390d1fae46fb176c8f9a3fd8a419c5888fe92a6,2024-04-10T19:49:51.183000 CVE-2024-31231,0,0,7a90a67619902f8027cbac8e85a666345818bb13d73948331e7d74a3cfb3017b,2024-05-17T18:36:05.263000 CVE-2024-31232,0,0,cad67a9aeb5c3124c1be880038f56dec45c67ef781e0ef4774805dcd0727d613,2024-05-17T18:36:05.263000 @@ -250027,16 +250045,16 @@ CVE-2024-31890,0,0,eda850bb7869648d895763435641ab97f0cfe4aeba8f677c829b9f47f4e39 CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000 CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000 CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000 -CVE-2024-31898,0,1,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000 +CVE-2024-31898,0,0,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000 CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000 -CVE-2024-31902,0,1,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000 +CVE-2024-31902,0,0,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000 CVE-2024-31904,0,0,f581f8d898f5db4b0367557c06fa4b666380cc23610e816c03e35138e889ca3c,2024-05-24T01:15:30.977000 CVE-2024-31907,0,0,74fc5f408c523c3e380d6171f8d45977925714d441f8877405f43a83b33e5a79,2024-05-31T19:14:47.793000 CVE-2024-31908,0,0,4b6f6f2b5b77469838acbfd64e3ebfdfd371146b18e2852e2c5d6403c944f986,2024-05-31T19:14:47.793000 CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000 -CVE-2024-31912,0,1,aa5d92155d9377e0899275b7b0915f442f67adec5eede7394462364595dad2c3,2024-07-01T12:37:24.220000 +CVE-2024-31912,0,0,aa5d92155d9377e0899275b7b0915f442f67adec5eede7394462364595dad2c3,2024-07-01T12:37:24.220000 CVE-2024-31916,0,0,94e61806cd426947094e5a291fb007ed965faafbc808f6c8a1747542f47fbfa2,2024-06-27T19:25:12.067000 -CVE-2024-31919,0,1,e1a4bcababa8183e9c4ef14f216a1b44c4b8ca5fab574febb55bdd32f858ecdc,2024-07-01T12:37:24.220000 +CVE-2024-31919,0,0,e1a4bcababa8183e9c4ef14f216a1b44c4b8ca5fab574febb55bdd32f858ecdc,2024-07-01T12:37:24.220000 CVE-2024-3192,0,0,4debefdd9bd6bc1b3acbeb91a28d7567aa83fcce418dfeae513fcc01b4da6f91,2024-06-04T19:20:17.017000 CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000 CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000 @@ -251754,12 +251772,13 @@ CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25 CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000 CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000 CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000 +CVE-2024-34696,1,1,1697446274bb3cd395c26226b01c7397470c20a75a90bbad0605ce462858be0c,2024-07-01T16:37:39.040000 CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000 CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000 CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000 CVE-2024-3470,0,0,736c8b21abac392de8987478bb4430873353b2c43829321b68bed57cd49a65ed,2024-04-19T16:19:49.043000 CVE-2024-34701,0,0,5a8c02ffa2fcadb317d10fc6ec8b451b4dcf3f6eab6c63ebf616f401a02dac46,2024-05-14T16:12:23.490000 -CVE-2024-34703,0,1,50ae767dd64caa4e000da1f40c8cdbe5042bb6b22c8a9fc5a9800ebff102bcb2,2024-07-01T12:37:24.220000 +CVE-2024-34703,0,0,50ae767dd64caa4e000da1f40c8cdbe5042bb6b22c8a9fc5a9800ebff102bcb2,2024-07-01T12:37:24.220000 CVE-2024-34704,0,0,48d6359679289248ce803dfb7b75c17011aaace7b08a8c9d1fc68e47f081bf3e,2024-05-14T16:12:23.490000 CVE-2024-34706,0,0,4726580e4aef314a5fbec04fe3b48a640bc06fa468e915ceb8e4adce9150430f,2024-05-14T16:12:23.490000 CVE-2024-34707,0,0,4ed4d85a391d834d7fb079efda0834353a1979685e57868a3cb454f56a7390b7,2024-05-14T16:12:23.490000 @@ -251950,18 +251969,18 @@ CVE-2024-35102,0,0,781492c1bcdcbb91cc24f5b5ff3eacf4542faa6544199a3dcb435c0e7da31 CVE-2024-35108,0,0,3d160490977cee5bde1d3bbae750736ca9206a5392ad0c8f4f20b1d705d7e1b9,2024-05-15T16:40:19.330000 CVE-2024-35109,0,0,1723de5edad4801c113dd0d41cbe0df6c36d556c862ef08d4faf7caa71ed9098,2024-05-15T16:40:19.330000 CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209b46,2024-05-17T18:36:05.263000 -CVE-2024-35116,0,1,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000 -CVE-2024-35119,0,1,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000 +CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000 +CVE-2024-35119,0,0,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000 CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000 -CVE-2024-35137,0,1,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000 -CVE-2024-35139,0,1,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3dfc,2024-07-01T12:37:24.220000 +CVE-2024-35137,0,0,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000 +CVE-2024-35139,0,0,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3dfc,2024-07-01T12:37:24.220000 CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000 CVE-2024-35140,0,0,45c3bb60ea04b1120d4f838be7226beea8411238e0d1eeb8dfdc4424ca0b5ad7,2024-05-31T19:14:47.793000 CVE-2024-35142,0,0,2e771ea16b161d7fa34214dfdb10478412ee26ce44f8ad533bb2991294386c64,2024-05-31T19:14:47.793000 CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000 CVE-2024-35153,0,0,86727db419cb843920e5cd4c7a87cf5b7fde13fc70ca82a13eb4d069ddb821d5,2024-06-27T19:25:12.067000 -CVE-2024-35155,0,1,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000 -CVE-2024-35156,0,1,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 +CVE-2024-35155,0,0,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000 +CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 CVE-2024-3516,0,0,c67f1b1a12bf3a4087d8b779d182fd3cd73d7fc172668a9a1561ab7e0601a8e1,2024-04-19T23:15:12.003000 CVE-2024-35162,0,0,096de883de595ba1679c139890301da91a94c85a87a466687ddcd8baf8fe1502,2024-05-22T12:46:53.887000 CVE-2024-35165,0,0,caf63944f08ce101dd14e275b41e5ef9dcf2b386ad9b4bb6b8d83ed28c45d5eb,2024-05-14T16:11:39.510000 @@ -252846,6 +252865,7 @@ CVE-2024-36377,0,0,5b3a74790b8404bb50e8903b0a58fbf2f5e8fe3533f993e13f46a55b82f39 CVE-2024-36378,0,0,9a645ab04ee516fa09b03bc4e8214d07cbca3e9e91fbad3f5da1fbc4f30ef72c,2024-05-29T15:18:26.427000 CVE-2024-36383,0,0,024d8f4d1ca5f23e8a0ddc855e927c6f952336db279cffee80e19f08304118ee,2024-05-28T12:39:28.377000 CVE-2024-36384,0,0,2ec0cce63a143f80e95d7d72dd49a2947294c5f3ef9bfcaa5dd3f4682e62278f,2024-05-28T12:39:28.377000 +CVE-2024-36387,1,1,55d6bb5f5f4caca9fea17645776897ad58d0c8c8ca4dd78c53dd7fe8b227214d,2024-07-01T19:15:03.497000 CVE-2024-36388,0,0,c862c36965d96dd7dbce4ad8e507845635d584cc35880dbb4a1f42f921fb4889,2024-06-03T14:46:24.250000 CVE-2024-36389,0,0,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966ccd5,2024-06-03T14:46:24.250000 CVE-2024-36390,0,0,b28e05065e61bd7a9bb35d69c3db1c5b9fc640899f1d11e151111ef78e00d787,2024-06-03T14:46:24.250000 @@ -252859,6 +252879,7 @@ CVE-2024-36397,0,0,b682d6f470c0dada217073740a5ad29ca1b1f9032f70f4edd7bab7bdfb1f6 CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000 +CVE-2024-36401,1,1,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000 CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000 CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000 CVE-2024-36407,0,0,3fa9b8688b87bb89923ff6af2953ac9e3c3d75823a9915954eac5e78dc625b42,2024-06-12T18:17:38.777000 @@ -252876,6 +252897,10 @@ CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513 CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000 CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 +CVE-2024-36420,1,1,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df602,2024-07-01T16:37:39.040000 +CVE-2024-36421,1,1,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000 +CVE-2024-36422,1,1,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000 +CVE-2024-36423,1,1,5808d21430c442b51dfdaf4a352327f95bb4f4fbb5dcea8ace51ffa5a292fa95,2024-07-01T19:15:03.627000 CVE-2024-36426,0,0,b4e77ad9e3c809414d8917ef0e48e37b5fd9f4bf9093f3155502aee0ee6063a0,2024-05-28T12:39:28.377000 CVE-2024-36427,0,0,293226c6bcd994263dc2fdfe762b698685b7c5a39208c64b5ce6ccf8d2a3d9bc,2024-05-29T19:50:25.303000 CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8d2a,2024-05-28T12:39:28.377000 @@ -252943,7 +252968,7 @@ CVE-2024-36599,0,0,9a15a33c7489ab37c6a5fa2897d627b0bcd61f22458c24f2c9412064d5ed8 CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000 CVE-2024-36600,0,0,528d617ba99d44422001ec52e277c8720af143b7d8228ce2c53d51a37cabe886,2024-06-17T12:42:04.623000 CVE-2024-36604,0,0,38f77f753935bc42c015eb31deee2068198d6e188158d2d88cd9ce30dd28f28e,2024-06-11T14:24:17.413000 -CVE-2024-3661,0,0,b665f3ebe2f700b6f4e02ebfa9bd2f64cd39c43e37b9374c2fdfbf4a8d208373,2024-05-08T22:15:49.103000 +CVE-2024-3661,0,1,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000 CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000 CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000 CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000 @@ -253140,7 +253165,22 @@ CVE-2024-36977,0,0,211593e58fc9135f9893829a9f2e1a8571662349bd4f1f6e872c0294a0b0d CVE-2024-36978,0,0,880aef92604c27e5578b53720d6ee7e213e82be3de9f91ee8b3173e75f4b8a26,2024-06-21T14:15:12.407000 CVE-2024-36979,0,0,b5c86fe1e151f03cc7911f2db726f75e908559d8b3402d6614d6fdbd11ceb079,2024-06-20T12:44:01.637000 CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 +CVE-2024-36982,1,1,720a5b29c19528b08c004e2599ee7e91f40c5a0e49d020171bd060cc0e38fbf9,2024-07-01T17:15:06.030000 +CVE-2024-36983,1,1,e43bfd769871b02d44243c832ff88bf98d414065a6e43d02d2fa773cd4498ed9,2024-07-01T17:15:06.257000 +CVE-2024-36984,1,1,59f38e31051cbae9a7f72e47830f76d1f4d0d40626a1f73f85b280c4707511d1,2024-07-01T17:15:06.480000 +CVE-2024-36985,1,1,625d81328994a9375519a36f109304e783aacae4b24bf73ca8ba1b84aea43e2a,2024-07-01T17:15:06.703000 +CVE-2024-36986,1,1,588be6516e79175f5538e55c5f2c40835c0537cc41649b2736379bd3359cc6eb,2024-07-01T17:15:06.910000 +CVE-2024-36987,1,1,97397ca055e5b25c254e8a51a2ad1e55181ea6cd07c7693d048edec5ce41d8da,2024-07-01T17:15:07.120000 +CVE-2024-36989,1,1,f348477479b7e2ca8e81aeca2e93931bbe6cf16a5a693b9192caeb1e3e4ee99e,2024-07-01T17:15:07.380000 CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000 +CVE-2024-36990,1,1,feccf877e17235ceb014ab433e830d2444660c43dbe5a714bb8737061fda8da7,2024-07-01T17:15:07.600000 +CVE-2024-36991,1,1,b38b5fd71eaba6416504e65ad0df2874f4caab08652393639de506ac8184b334,2024-07-01T17:15:07.860000 +CVE-2024-36992,1,1,c7e2cb783ce677910c6c02e042570745035c219cb8fac10c9c2a2b5376e5fc79,2024-07-01T17:15:08.077000 +CVE-2024-36993,1,1,15b97f35a4d9fbdb2278cca4b7f372a5f592a51db873c4e61e4e019c28fa7e93,2024-07-01T17:15:08.290000 +CVE-2024-36994,1,1,d0d04d362d3212c5b95bb7ce9ec6ce25c55edfa0be721b31dce546aea166d122,2024-07-01T17:15:08.500000 +CVE-2024-36995,1,1,93a08d8e2d5b8511aa21eb125b70d14197a6298e2bd37af958d3c76aa037351c,2024-07-01T17:15:08.707000 +CVE-2024-36996,1,1,6919ea94da08dc971161b98fc08f1f24bc4def3bdaaba05b42502a26d5766ae2,2024-07-01T17:15:08.917000 +CVE-2024-36997,1,1,838e31730e1b08e055d05fdb50ee396471d474145e4b628a303f7c706c036c5e,2024-07-01T17:15:09.143000 CVE-2024-36999,0,0,e623ac69d78c1d872fd9d23ebed97cd66e8b6293086bcd7909366177ce71d4fe,2024-06-25T12:24:17.873000 CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 CVE-2024-37000,0,0,a7ce938c2375111dcdf9fa56d08df7bf8307bd849e0b0ce2b6f89977fd5cc422,2024-06-25T12:24:17.873000 @@ -253213,6 +253253,8 @@ CVE-2024-37139,0,0,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bd CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000 CVE-2024-37140,0,0,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34579,2024-06-26T12:44:29.693000 CVE-2024-37141,0,0,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000 +CVE-2024-37145,1,1,5e7043b940d4d81444d5ca800a839309a64d040e40da1c7e8a1f81a2e86d239a,2024-07-01T19:15:03.853000 +CVE-2024-37146,1,1,28416a03fc0d822a32d3396dc39ac2a0ceb9489e176ce09612e8d31a9fd4a714,2024-07-01T19:15:04.070000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000 CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000 @@ -253270,6 +253312,7 @@ CVE-2024-37294,0,0,dba61618bee02ef566742444e7eb5067ca185e0e0eae11447db5592bae3ee CVE-2024-37295,0,0,662d929824214c7fff6239fd0cadb69f087cb8fadd0e20b8c2ce1e7a7f7cea9a,2024-06-13T18:36:45.417000 CVE-2024-37296,0,0,826a4550d8e9d39613007103b9df8380921c5398e5d4340e9a94d8f4d4fd6545,2024-06-13T18:36:45.417000 CVE-2024-37297,0,0,844fdaf34ac899555229d4e1974e5dea6d78c5be5b55398949dab756934b53d6,2024-06-13T18:36:09.010000 +CVE-2024-37298,1,1,d90789612b8869d5579049898d1c3f374ebfb9b769fecef892daa5a24164f456,2024-07-01T19:15:04.283000 CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000 CVE-2024-37300,0,0,7a8b0144b5518f42a2503b23de88b2ac1dd643d024476f6cf726712d7722e352,2024-06-13T18:36:09.010000 CVE-2024-37301,0,0,450b2bcc32537519af2d171a1a4f4dec398481df24494eefa7c4bfacafd1cdd4,2024-06-13T18:36:09.013000 @@ -253310,8 +253353,8 @@ CVE-2024-37367,0,0,aac603db5bb919680e2cd819ce6cb6ca25ea592fb28f92a3759e9a2fd18ea CVE-2024-37368,0,0,956c028a8638d3a3e19949beb7545c84f68f21d91e6b291904004a55453a08ce,2024-06-17T12:42:04.623000 CVE-2024-37369,0,0,7108a286445619350057461b39fedff0137563337148ca5c14290fc641ad2c5e,2024-06-17T12:42:04.623000 CVE-2024-3737,0,0,e288f29127240d626de190f33aa5cc85cc615dc26f102a0c00221aa9708716e3,2024-05-17T02:40:05.887000 -CVE-2024-37370,0,1,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000 -CVE-2024-37371,0,1,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 +CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000 +CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 CVE-2024-3738,0,0,0968d9618a10c036b25eaa390531466819e491a5c992bcf4c715af4b591b9121,2024-05-17T02:40:05.977000 CVE-2024-37383,0,0,c0362d3d95fe11bdc30f3c36377b27485de734d675fe1b90f60703cfe5051656,2024-06-17T15:15:51.517000 CVE-2024-37384,0,0,2bdb7db18773042dbfcf7b4442179738e059134c1a70f1a6d09b92e8cfe2872e,2024-06-17T15:15:51.640000 @@ -253463,7 +253506,7 @@ CVE-2024-37899,0,0,d1ca9681182b91f088e5f797405e7825c7152f645c96ca832bd3fa971ed68 CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000 CVE-2024-37902,0,0,64cca10e7e3ace20e9d59c9293b434dbb2c9acda55554e640303530aeeaef0aa,2024-06-20T12:44:22.977000 CVE-2024-37904,0,0,7359ae18b288eca288056e2ff119b59a0b9c9bbf3f0e5a23aea1f27fd550dd3f,2024-06-20T12:44:01.637000 -CVE-2024-37905,0,1,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000 +CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000 CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000 CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000 CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000 @@ -253524,7 +253567,7 @@ CVE-2024-38312,0,0,a025bc282a0932c71cb95ccc5342a2a383a8f77cb388790ae2ac3d82d89cf CVE-2024-38313,0,0,1c234fe7a87659718d48f2a88e14944f64c41ea923fa0d6325e8d4b1e192fda1,2024-06-17T12:43:31.090000 CVE-2024-38319,0,0,b424d3c1ce5233c9ed183de13fbb6b30d800a84b86175662e040e79a80011cf5,2024-06-24T12:57:36.513000 CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 -CVE-2024-38322,0,1,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 +CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f77e,2024-05-03T04:15:09.043000 @@ -253541,9 +253584,9 @@ CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45 CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000 CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000 CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 -CVE-2024-38371,0,1,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000 +CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000 CVE-2024-38373,0,0,44bd01362bd05dfdecb2d241c2e4e4fe52c2264760c405bf6f3f48fb0d969aff,2024-06-26T15:02:05.100000 -CVE-2024-38374,0,1,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000 +CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000 CVE-2024-38375,0,0,ded65bab8580f207fa6313539998812618b08a20bbdd5d51ce7200bdf863d856,2024-06-27T12:47:19.847000 CVE-2024-38379,0,0,d0af2d7e81a6285c1c7099c958a4a50ce3d2f639bd068091599f2b1327853e0b,2024-06-24T12:57:36.513000 CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 @@ -253585,8 +253628,14 @@ CVE-2024-38468,0,0,d4c6d48d530a65ce7d90662f3fd07d6f0801b061b80f57001958e3c05da71 CVE-2024-38469,0,0,61f8d4e00b8eb0d7cc440bb61aa54e448e7d0cf937bc39055bad05a42163dd83,2024-06-20T12:44:22.977000 CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000 CVE-2024-38470,0,0,4c268a4f5b43704204ee0794f0d14b8ed1a9214a7b71a5011526bcfa496d0f17,2024-06-20T12:44:22.977000 +CVE-2024-38472,1,1,8ffb46c12bd8d431e0c0c987e97a25e214579f1730a18340b552e6eb55cf6eea,2024-07-01T19:15:04.563000 +CVE-2024-38473,1,1,d21e0856d8185b878740b4ebbb1476c02411ae9b8efdbaaf23c78a0caa733c1b,2024-07-01T19:15:04.657000 +CVE-2024-38474,1,1,b5c48db99dbb237478cf4ffcd8bb4477b835688d62f83221ddb3623f160b4b3d,2024-07-01T19:15:04.760000 +CVE-2024-38475,1,1,562efb50429591c25efbc74f1f37c8bec5dcbe875539786fa9dbbf3dfbf556df,2024-07-01T19:15:04.883000 +CVE-2024-38476,1,1,0021e1bbd87c9469815c8c2032faa10839ab1262bc0298cabcbb2112e3d12dc5,2024-07-01T19:15:04.977000 +CVE-2024-38477,1,1,4594f8a978440be2aaa74df16a3605c0d784eb6c001f169de2cc265b8bb10e9c,2024-07-01T19:15:05.083000 CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000 -CVE-2024-38480,0,1,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 +CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000 CVE-2024-3850,0,0,bbe49076d39470df53cdf5186eea91a2b4a40256492f588a1ab86bd1ba5244b0,2024-06-12T18:12:56.413000 CVE-2024-38504,0,0,1e5426a2fc921f282b30067463f89deeb7f3dcc78ec818fa823270612233ac4d,2024-06-20T12:44:01.637000 @@ -253594,23 +253643,24 @@ CVE-2024-38505,0,0,be5aaa1dcdfd8c2aa334d5f57235bcc4cc51742ebd9414669481e2364aff4 CVE-2024-38506,0,0,f0cad7be1bf66b2843860132c4a1c6f7d61e84c638e965683ddee0cfb22e3838,2024-06-20T12:44:01.637000 CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09585,2024-06-20T12:44:01.637000 CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000 -CVE-2024-38514,0,1,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000 +CVE-2024-38513,1,1,d86dcd99d4ef7cfcee7d6e0d74f36baa99978f9f8448376941eae63fcd21152a,2024-07-01T19:15:05.173000 +CVE-2024-38514,0,0,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000 CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000 CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 -CVE-2024-38518,0,1,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000 +CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-38520,0,0,41960473f376d2053670358f1b74b11612e5d6f0cfeae75c4ae0b80f5904ac0a,2024-06-27T12:47:19.847000 -CVE-2024-38521,0,1,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae8c7,2024-07-01T12:37:24.220000 -CVE-2024-38522,0,1,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000 +CVE-2024-38521,0,0,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae8c7,2024-07-01T12:37:24.220000 +CVE-2024-38522,0,0,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000 CVE-2024-38523,0,0,ac61dc2188539e4a5eb60d89d7d71145cb5cdc9b9c189d4c888f2c0f8ba6ad05,2024-06-28T10:27:00.920000 -CVE-2024-38525,0,1,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000 +CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000 CVE-2024-38526,0,0,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000 CVE-2024-38527,0,0,9d30e9caf22ebe74cba027d0e20fbdb3b1d3bd82d6438824209935ed0cb0babb,2024-06-27T12:47:19.847000 -CVE-2024-38528,0,1,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000 +CVE-2024-38528,0,0,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 -CVE-2024-38531,0,1,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 -CVE-2024-38532,0,1,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 -CVE-2024-38533,0,1,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 +CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 +CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 +CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 @@ -253770,29 +253820,30 @@ CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24 CVE-2024-38950,0,0,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c99923c,2024-06-27T12:47:19.847000 CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000 +CVE-2024-38953,1,1,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 -CVE-2024-38987,1,1,ed58d31c516be72d666726b08edbac80706bab687fc25a13e50121a9ae969b73,2024-07-01T13:15:04.717000 -CVE-2024-38990,1,1,f23de5039421dfb7ce2bb09ac68360cc581a98701f750121cff63fa52613d8d2,2024-07-01T13:15:04.807000 -CVE-2024-38991,1,1,a94a96142e09f3725c5f33e89e688fe6584ed030410b6ecf0d70d1e8c4518c2e,2024-07-01T13:15:04.863000 -CVE-2024-38992,1,1,e35d94cefd99f2cf0fcdc61c724f05a8623da7edcb9abb1e81769daa2818cfe8,2024-07-01T13:15:04.930000 -CVE-2024-38993,1,1,71a4d0af421ed5a829d6616d580d813af4c9db0671d1f92861bdabac78700dfc,2024-07-01T13:15:04.987000 -CVE-2024-38994,1,1,fc4ead1b214157ecf2fc185633c9fea55f43dc8acf0ead5fb3b0505cfa18364f,2024-07-01T13:15:05.047000 -CVE-2024-38996,1,1,9a18ced6674a21c6041303b26bfad9b9471a01ea23907adedc220f78a054f0e2,2024-07-01T13:15:05.103000 -CVE-2024-38997,1,1,75d30105ccc08685530318a2915f6bf79cfc35d01fb4e3b7e46279e5a10429b9,2024-07-01T13:15:05.160000 -CVE-2024-38998,1,1,348e2d3a2591692bdd188f4d13094f55e5530c1224de259338b9d8cd8f3e8039,2024-07-01T13:15:05.223000 -CVE-2024-38999,1,1,d13a04f1e9c136983594f08878c950c7e826267a802a2baa0a7f916ec9d8f52c,2024-07-01T13:15:05.280000 +CVE-2024-38987,0,1,8e5543bc013d5021cfb12250ec622bf33ff663f5974b5e9efe103d174baf7a3b,2024-07-01T16:37:39.040000 +CVE-2024-38990,0,1,c74cd76d2342a02a975f887b4d58b34e2c6967f32f55f6fd8b807d2643621113,2024-07-01T16:37:39.040000 +CVE-2024-38991,0,1,5c180588e2b6a01b28db3752bc9cc96858ae39a00587154860cda4368a7ff8f6,2024-07-01T16:37:39.040000 +CVE-2024-38992,0,1,2e570cd2eed251f271f85b2df9a7002fa24ca413722447a3a914590d4b8bf475,2024-07-01T16:37:39.040000 +CVE-2024-38993,0,1,73faa3d497e0a33b4def022c7b84272bb8e78951f2326d7a1ad62b5574b382c0,2024-07-01T16:37:39.040000 +CVE-2024-38994,0,1,623ae3fa8a384c5debb1199bb0204554766de971953ebe0c7f7023a769b62c61,2024-07-01T16:37:39.040000 +CVE-2024-38996,0,1,db790449014448ae87f3425d74a96423d4f25d3eefecfad29430c49fe7e6d233,2024-07-01T16:37:39.040000 +CVE-2024-38997,0,1,c7d47980841a9b0ae67023e8210b95e8881571b72e18f736bd58e90bcdf41491,2024-07-01T16:37:39.040000 +CVE-2024-38998,0,1,edfa0696537e6dc5d0b8e23e28f2391be4352521b0c7fab8f861b804209c04e8,2024-07-01T16:37:39.040000 +CVE-2024-38999,0,1,b189bad1ee2babac6b8006a78d8cc7a5bb62af267315bd0a3288f0e149de22ab,2024-07-01T16:37:39.040000 CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000 -CVE-2024-39000,1,1,9915c57c9b03ed36f96252e6eabf3df389c3ccbe49eb69c8b76b58648064ef25,2024-07-01T13:15:05.340000 -CVE-2024-39001,1,1,63a3f5fdb9fc7d9bb0fef035bfad14164d6c65d69e570075e68f892948c30689,2024-07-01T13:15:05.397000 -CVE-2024-39002,1,1,9a8a8f91eca87b13d5cefd59a79f4a4ccfcb549905f50055a483eff1c802d9ff,2024-07-01T13:15:05.450000 -CVE-2024-39003,1,1,4ffe2c187b3f6a781815d031b24637c7b3efd680fac3f07a9c03441ea87485ad,2024-07-01T13:15:05.513000 -CVE-2024-39008,1,1,23e22db6f3a0de2eae82efcc8d107b63fee2fff89cda5088f26043a3438068a9,2024-07-01T13:15:05.590000 -CVE-2024-39013,1,1,0cb2f9055742ad2f49ec66b379ee9a7e82cb7d0c30cf91f544e495584be1927d,2024-07-01T13:15:05.650000 -CVE-2024-39014,1,1,1d174bb9bc614bea9ce88f1a35d678a4532ab18fce9fa04ca8199c6774603c02,2024-07-01T13:15:05.703000 -CVE-2024-39015,1,1,42b52c28ed72916c8ecf40f6f0649bde0c6f2421728d4ea7e3cee2106f090d4e,2024-07-01T13:15:05.767000 -CVE-2024-39016,1,1,f10ea2eefb6c18f61cd0372309413105fee75790d1ea27b0942e6cd3bff062bc,2024-07-01T13:15:05.823000 -CVE-2024-39017,1,1,6c025a442e9cecaae66309088c1ab8ad1dbef1c26cffe152b4ad64cda04740b8,2024-07-01T13:15:05.893000 -CVE-2024-39018,1,1,0467f48d8b8fd53dc6e05a8419b68bed85b12c5dce888b6c5a06d932f0debf8b,2024-07-01T13:15:05.950000 +CVE-2024-39000,0,1,865535b7d65e1d3e0f5a4a2042012fe524a4722997fb77655f1e5a1e941f9c7a,2024-07-01T16:37:39.040000 +CVE-2024-39001,0,1,82f6001aa2dce6119be50984c18101b4a6aacb440c096b445d257d239da9aac4,2024-07-01T16:37:39.040000 +CVE-2024-39002,0,1,f730aa8ef147d70b2879c78c6f1f0ff1f81c5a139e4c9775f359b7cb8ab78f63,2024-07-01T16:37:39.040000 +CVE-2024-39003,0,1,e5716538bdbd78a5bfa5a9af017cbf026b973b733106e9129e879a9709c8ab3f,2024-07-01T16:37:39.040000 +CVE-2024-39008,0,1,cb7f345a6d5a41be6d2526fac2444be15490818f118d2679ea4e85f1012f9719,2024-07-01T16:37:39.040000 +CVE-2024-39013,0,1,7f8924a5f1b67cca0d5ab6af0e7a96c4ff89036dd75053e53c271e93cc4cf209,2024-07-01T16:37:39.040000 +CVE-2024-39014,0,1,85f2582cc6d7f5ddbf77aca86106a65d54d3111a3f65f930f3405599f2535e10,2024-07-01T16:37:39.040000 +CVE-2024-39015,0,1,8f692a337ec522916ee5f18e47a1f67b243e32141d1032ce0a36774d8ca787f7,2024-07-01T16:37:39.040000 +CVE-2024-39016,0,1,3bc798c511e27939051e75e20febf350d59572d35beeee3b4abe958c2f9ddd4d,2024-07-01T16:37:39.040000 +CVE-2024-39017,0,1,10be03ac062a097d6757c937b88f1e992120572b4e181895f1486ee51c2d3d2d,2024-07-01T16:37:39.040000 +CVE-2024-39018,0,1,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000 @@ -253825,11 +253876,13 @@ CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e341 CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 +CVE-2024-39236,1,1,017b4d12d9ef0c2f7e4104a47f66ab75591267ab350fff91c91f2d4d1e0967a4,2024-07-01T19:15:05.420000 CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000 CVE-2024-39241,0,0,afa83ae007b8cddb769c7423e9b1caee4c0fe8b440470f4e2aca6500f4f35cee,2024-06-27T12:47:19.847000 CVE-2024-39242,0,0,e6a42d26f8742e08c6e87c2f9736f6a5d1c92d4e99728f3f16ba7aaa3565d9e9,2024-06-27T12:47:19.847000 CVE-2024-39243,0,0,b8130c621cb0dfb964c1992defd80d667f6acc85382d7b6cd314c7c97d98e637,2024-06-27T12:47:19.847000 CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000 +CVE-2024-39251,1,1,83aa84a253642014d74820cef4da4b5f960d62ee567a8bb1c69173eeea049f29,2024-07-01T19:15:05.480000 CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,b62a8fbb5cbf577eaf3c7a81b1c47c6d426f2a5dda5ebe7d2d0cc2ac17b12044,2024-05-22T12:46:53.887000 CVE-2024-39276,0,0,9d8b391f90466ab92d8bd0be64a929bc81937a2a7adc7e28ba18e29f385bdac0,2024-06-25T18:50:42.040000 @@ -253842,8 +253895,9 @@ CVE-2024-39293,0,0,ba4d7546a3208d93eda31b60f338bfefc59f223d8a82bb5367fc84df5351b CVE-2024-39296,0,0,e260e24d75f61f9e507cbecbe3ae9f7cc9539275110e5bb8afeebe70ced8da66,2024-06-25T18:50:42.040000 CVE-2024-39298,0,0,62f081e1204433b72614003aee17d6ba0c526eacd01605580713226a64a6e578,2024-06-25T18:50:42.040000 CVE-2024-39301,0,0,557c328019f730a5c8c669db41be6ae8d457cdc115700b93300b3651fff5aa25,2024-06-25T18:50:42.040000 -CVE-2024-39302,0,1,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000 -CVE-2024-39307,0,1,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000 +CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000 +CVE-2024-39303,1,1,570da85f74a800db45595a310d300ec8d2937d6a9616181c043d1959403ae091,2024-07-01T19:15:05.540000 +CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000 CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000 CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 @@ -253868,11 +253922,11 @@ CVE-2024-3939,0,0,8db4cbfcc78e197894431199cdad6af4ac1ac13ee2f1028e231ba1f9079317 CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000 CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000 CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000 -CVE-2024-39427,0,1,78160e98483fcc3aec226f5c047b3b1c0e863dcf72104b16f54bef5ce01d8702,2024-07-01T12:37:24.220000 -CVE-2024-39428,0,1,c278d22063c70f7bf9c06407a2b45919d470d1d910aa9da6476a8683a3973a23,2024-07-01T12:37:24.220000 -CVE-2024-39429,0,1,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bdef41,2024-07-01T12:37:24.220000 +CVE-2024-39427,0,0,78160e98483fcc3aec226f5c047b3b1c0e863dcf72104b16f54bef5ce01d8702,2024-07-01T12:37:24.220000 +CVE-2024-39428,0,0,c278d22063c70f7bf9c06407a2b45919d470d1d910aa9da6476a8683a3973a23,2024-07-01T12:37:24.220000 +CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bdef41,2024-07-01T12:37:24.220000 CVE-2024-3943,0,0,e07ef944084da93a178b1d893c19c63f640132688c11e19da99f30e04e5e47e2,2024-05-30T13:15:41.297000 -CVE-2024-39430,0,1,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000 +CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000 CVE-2024-3945,0,0,87d1ab8fe16ba408f307c5379ed22b3c751c5d4b07b1a3f5bec08826673ff46f,2024-05-30T13:15:41.297000 CVE-2024-39458,0,0,fddd464380a09267e09b57b66272561b89c59455a10d641fa61f771d4f530d41,2024-06-27T12:47:19.847000 CVE-2024-39459,0,0,d1d8498393c450e178fa7bc147e75f870b75d424b183c32cba625d84c2757e63,2024-06-27T12:47:19.847000 @@ -253897,6 +253951,7 @@ CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 +CVE-2024-39573,1,1,167c4a1505a6562e31649ba24c74fba60e3ed0212b2b4d7b2e0b94be92a8f873,2024-07-01T19:15:05.760000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 @@ -253916,14 +253971,16 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91 CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000 CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 -CVE-2024-39828,0,1,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000 +CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 -CVE-2024-39840,0,1,cf0cef2e05329a1216f74981ebbc4dbc7d10ee8168b70073e5c435ffc0748588,2024-07-01T12:37:24.220000 -CVE-2024-39846,0,1,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 -CVE-2024-39848,0,1,a406e2b5eebf34f795b980d155db1a7147865fe617aee30717a15aea5ad0bfcf,2024-07-01T12:37:24.220000 +CVE-2024-39840,0,0,cf0cef2e05329a1216f74981ebbc4dbc7d10ee8168b70073e5c435ffc0748588,2024-07-01T12:37:24.220000 +CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 +CVE-2024-39848,0,0,a406e2b5eebf34f795b980d155db1a7147865fe617aee30717a15aea5ad0bfcf,2024-07-01T12:37:24.220000 CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000 -CVE-2024-39853,1,1,614ce4e6b1998c31f6250e746f1f7b62bc498fd80a6e4b9b7e2f8f5f2605f133,2024-07-01T13:15:06.013000 +CVE-2024-39853,0,1,2169eba1d28bdc589b024da57c04aeaf5c002fb75bec5b315c751dfe63b8af60,2024-07-01T16:37:39.040000 CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000 +CVE-2024-39878,1,1,42bd5d378e20b9d91b9be0886685939196ff3f97b01ad8896764241ffb3201b5,2024-07-01T17:15:09.350000 +CVE-2024-39879,1,1,43fc0280d82b5c301f40c640c2fb20503de08e49e91c00c8c3342ccd75375f20,2024-07-01T17:15:09.573000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 @@ -253931,14 +253988,14 @@ CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 CVE-2024-3993,0,0,60132f24d182886d3025f810ce7decb14e0293094944605569519b576c903995,2024-06-17T12:42:04.623000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 -CVE-2024-3995,0,1,6d3e6f6cd4c72294e5e7c28c1ac75c89fb114da3e88fc3375d7179257e92fe77,2024-07-01T12:37:24.220000 +CVE-2024-3995,0,1,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 CVE-2024-4005,0,0,db2b7e4cfe0f4bbe30f1cbadd95b4d8d4dea02eb8785d8f487b316678c44068d,2024-06-17T12:42:04.623000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 -CVE-2024-4007,1,1,ea11516500722210b6c05a007ec9e1eaa6b7db62a0d30554fbe50b2ecd3bc5b7,2024-07-01T13:15:06.077000 +CVE-2024-4007,0,1,f23e193a2ac303efeb52b231cdfb7f68a21ff7ce4ccf120b52f049303bd3ddaa,2024-07-01T16:37:39.040000 CVE-2024-4008,0,0,d029b79ac31ad712a3b682c30b4ebfe0bc85fbedb677b90d81d7c6af81a5600e,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,82f6778b19e61d18cb6bad03fb43730c90019cd4ed3dad3648b480d1adbe3427,2024-06-18T17:01:19.897000 CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000 @@ -254699,7 +254756,7 @@ CVE-2024-4930,0,0,6ff76d7aaffb879ad1ba04c82aee4d6862810bf82c41e96981364c74ee8131 CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2a3,2024-06-04T19:20:54.543000 CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000 CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000 -CVE-2024-4934,0,1,f52144af553eb515dced795070f99e99d77931d910da0436f916f26c1830041a,2024-07-01T12:37:24.220000 +CVE-2024-4934,0,0,f52144af553eb515dced795070f99e99d77931d910da0436f916f26c1830041a,2024-07-01T12:37:24.220000 CVE-2024-4936,0,0,a731ea39a2abdd8ed5ffb7274944b4c3b5578233bd6509536eab3c4454adaafe,2024-06-17T12:42:04.623000 CVE-2024-4939,0,0,6859feec38f69c636602db339fa7ab03b302bd67a24dc957bb8f045d97aede0c,2024-06-11T17:08:33.350000 CVE-2024-4940,0,0,cb78cb49a43bd348a99dcd2f7e1d39ee831dc08e65c1988e89651f8662313063,2024-06-24T12:57:36.513000 @@ -254789,7 +254846,7 @@ CVE-2024-5056,0,0,5222bc315bf81dabb7f1134f85e7a3f8505dd3db79a8b19065f69d6579b775 CVE-2024-5058,0,0,637bd6f1f70bb3cfae7399c322e9c60e1da8c71180964fd405021291b54a0ed9,2024-06-24T19:18:35.517000 CVE-2024-5059,0,0,76adb31a0d874845cc73a32032185732178d0aa5e8e38a32237d0afd9c50a472,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,908e82bd4ef2431179c104b39273fb8e5e968812815f848a9881f7577e0ff35b,2024-05-24T13:03:05.093000 -CVE-2024-5062,0,1,c4bfd24b428765fb9ddf19e7205629f5a96898980bd431291729b4911f485626,2024-07-01T12:37:24.220000 +CVE-2024-5062,0,0,c4bfd24b428765fb9ddf19e7205629f5a96898980bd431291729b4911f485626,2024-07-01T12:37:24.220000 CVE-2024-5063,0,0,4f3b2bf7eda673978295341e9126ac2adcd5414f29702cc0cdbc012db466ad60,2024-06-04T19:20:57.760000 CVE-2024-5064,0,0,8095cec9a36e031c818592c3e6e560630244970853fe1a2d62ef41815d0461b5,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,854da1df0c358fed714b464bc000dc33fba39a0799286dd037bd479cf98e0180,2024-06-04T19:20:57.977000 @@ -254892,7 +254949,7 @@ CVE-2024-5188,0,0,f341cd733a67fef7a36812a8f7aa63c3db307a7b91bf1e7665add6435f1983 CVE-2024-5189,0,0,cd3bb13050c91870eb5838446a9e82835db405d95874bd44f6318a59b19e235d,2024-06-13T18:36:45.417000 CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000 CVE-2024-5191,0,0,db26f7ce160c714e95bc5c218e0073766ff2ed099b5e6969334cbfc827ce4bc3,2024-06-24T19:25:23.943000 -CVE-2024-5192,0,1,94ac7fbc597a0df9997971e94cdeab1dfd0f73279acaa9016d8372a4009213da,2024-07-01T12:37:24.220000 +CVE-2024-5192,0,0,94ac7fbc597a0df9997971e94cdeab1dfd0f73279acaa9016d8372a4009213da,2024-07-01T12:37:24.220000 CVE-2024-5193,0,0,4619a3332fd1de828c7e949279cabe4a2b063d71a4e227126d8bf6d303fb6eb4,2024-06-04T19:21:01.867000 CVE-2024-5194,0,0,2277a7390d0159b3dc2e5dfd100175220ffc5f5725f8c88a7a9344e62a79d516,2024-06-04T19:21:01.977000 CVE-2024-5195,0,0,f6d192ea152622e2514b6c95ac0c9e8770ec516eb328b6bc7a2579d1133e54f5,2024-06-04T19:21:02.077000 @@ -255176,7 +255233,7 @@ CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047 CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000 CVE-2024-5596,0,0,c69cbcadf0a7f1e5940d842c2c9e90907cbda728581a745e7acd494576e03c9c,2024-06-24T12:57:36.513000 CVE-2024-5597,0,0,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000 -CVE-2024-5598,0,1,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c1c,2024-07-01T12:37:24.220000 +CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c1c,2024-07-01T12:37:24.220000 CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 @@ -255193,7 +255250,7 @@ CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3 CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000 CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000 CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000 -CVE-2024-5642,0,0,7b25f43c33c92189aa58dfe27c3529e76b5c1727a65112b54b10daf8f290647f,2024-06-28T19:15:07.357000 +CVE-2024-5642,0,1,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000 CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000 CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a0888246,2024-06-20T12:44:01.637000 @@ -255209,7 +255266,7 @@ CVE-2024-5661,0,0,e5f9f024a347e2b9638122ecde70323a03d416b3bde93f8e4f604cfeef08f4 CVE-2024-5662,0,0,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec26,2024-06-28T10:27:00.920000 CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 -CVE-2024-5666,0,1,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 +CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000 CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 @@ -255236,7 +255293,7 @@ CVE-2024-5700,0,0,bf41828814d49bd1ca21d234dd56d9b9baae6eae1faa482eef0b223ac08cde CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8ce,2024-06-11T13:54:12.057000 CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 -CVE-2024-5712,0,1,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 +CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 CVE-2024-5727,0,0,1fbc88a30e9a1b5b66ae83f1b3e85e2a5fb8114d9d41f9dac322c2902c1d92bd,2024-06-28T10:27:00.920000 @@ -255283,7 +255340,7 @@ CVE-2024-5785,0,0,b8e4d96c063df13aad53416cef79463db3c390621a0b569b6ab0f4db2568be CVE-2024-5786,0,0,ed5396800d42f59a8cc5d452fd1faa0265b1965bb10ec68fd437a404a4a909e1,2024-06-10T18:06:22.600000 CVE-2024-5787,0,0,a3d405a0f4e66faab3a863affeada58e47a227c5d73cf2b53ea525af4385d342,2024-06-13T18:36:09.010000 CVE-2024-5788,0,0,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000 -CVE-2024-5790,0,1,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000 +CVE-2024-5790,0,0,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000 CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000 CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000 @@ -255291,13 +255348,13 @@ CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c15 CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000 CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000 -CVE-2024-5819,0,1,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000 +CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000 CVE-2024-5820,0,0,40e5523c17b003adbda0efbab055fe88c8ffe6387f321010b47ba3ba7dc113ac,2024-06-27T19:25:12.067000 CVE-2024-5822,0,0,56a6bfde1d559870c5646a0b76a29e939be7faac2a950947fe32abc1f4907e47,2024-06-27T19:25:12.067000 CVE-2024-5824,0,0,71b3b99a3563d3bd6941378b1fc516ea3658f7355f6e899285275a2e97c693cb,2024-06-27T19:25:12.067000 CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000 CVE-2024-5826,0,0,e0d3dade8a07433249d59b1aea8b4c0765b07d04d2f9cc584b2c1dc787708da4,2024-06-27T19:25:12.067000 -CVE-2024-5827,0,1,2115c4e97523e0aa0a8beec64c71961c8ec1201ab92e9e9dd09f28cef85192d3,2024-07-01T12:37:24.220000 +CVE-2024-5827,0,0,2115c4e97523e0aa0a8beec64c71961c8ec1201ab92e9e9dd09f28cef85192d3,2024-07-01T12:37:24.220000 CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000 CVE-2024-5830,0,0,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000 CVE-2024-5831,0,0,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000 @@ -255330,7 +255387,7 @@ CVE-2024-5871,0,0,83e6d3ea3d7363cdcbcb485d9161ada2b3d6bba887290fa58ab89820983d40 CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000 CVE-2024-5885,0,0,3a664b64c018213b23c270dac1c0f4e2c55b9d60dc4c41c7b81af3f039474644,2024-06-27T19:25:12.067000 CVE-2024-5886,0,0,0c13c4ee009af0d9946120b2238809bd0a7459b4e90701a2a72b91121b1d711b,2024-06-20T11:15:56.580000 -CVE-2024-5889,0,1,ebd4b75d771d00f2396bbc91f1ca197e49e2f67600230e37c6f00ba36324b089,2024-07-01T12:37:24.220000 +CVE-2024-5889,0,0,ebd4b75d771d00f2396bbc91f1ca197e49e2f67600230e37c6f00ba36324b089,2024-07-01T12:37:24.220000 CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000 CVE-2024-5892,0,0,890747e3858b777381fac245c58cda030faeadae1530ec4012d9670fde261a4e,2024-06-13T18:36:09.013000 CVE-2024-5893,0,0,8bbdd4fceee6f55f46acaf4e2e772cd5b071a8548251271838818c6acd356beb,2024-06-13T18:36:09.010000 @@ -255348,13 +255405,13 @@ CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000 -CVE-2024-5926,0,1,5989118d1e74694dc8d29d11155e46063f80693ec0514642081f5dd4d07f562d,2024-07-01T12:37:24.220000 +CVE-2024-5926,0,0,5989118d1e74694dc8d29d11155e46063f80693ec0514642081f5dd4d07f562d,2024-07-01T12:37:24.220000 CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000 CVE-2024-5933,0,0,43c62c8c7b78a3986e6c8a8e384c2c83973a07919e7ff71c58e74be82b63ae22,2024-06-27T19:25:12.067000 CVE-2024-5934,0,0,688a30e1a6237b69634d3ab7eb078a5b0fdbb09f93730eb6244fa568165f0ccc,2024-06-14T16:15:14.647000 CVE-2024-5935,0,0,21662e5830e79e4b40d11ee8d4ca61a28a55ce393198f32f5a0fb22a492448a1,2024-06-27T19:25:12.067000 CVE-2024-5936,0,0,dab5c088e03544c88b5524610f0cab10458f16230a50e10902868220b9e1d9db,2024-06-27T19:25:12.067000 -CVE-2024-5942,0,1,91637ecc81e7589bc0eaad02ef323d1d25bb9ad71b90d21943c07b937e076993,2024-07-01T12:37:24.220000 +CVE-2024-5942,0,0,91637ecc81e7589bc0eaad02ef323d1d25bb9ad71b90d21943c07b937e076993,2024-07-01T12:37:24.220000 CVE-2024-5945,0,0,16d17edcf79dde7bc004547e40419569c5bdcb3c9d1fafd4da124c600699d701,2024-06-24T19:24:00.433000 CVE-2024-5947,0,0,7906fe5496c2633ac624599b4fcbe00d50eb988a8b518b82e602f8ca90719dc3,2024-06-17T12:43:31.090000 CVE-2024-5948,0,0,b50c023e3e038877d6c3f637d61b3c39fec4c81c008590663dc7a0096fec685c,2024-06-17T12:43:31.090000 @@ -255405,6 +255462,7 @@ CVE-2024-6045,0,0,2dcda6a0cbff8cd9e195f4d3ab65f0210762794017ec56ef72ed3655d46b17 CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c344,2024-06-18T11:15:52.513000 CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000 CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000 +CVE-2024-6050,1,1,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000 @@ -255446,7 +255504,7 @@ CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e8364631 CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000 CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 -CVE-2024-6130,0,1,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 +CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000 CVE-2024-6139,0,0,5267393f199f3e6d04675c179e30c182dfe9af96089cf21d4ca0eef7a0895473,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,23f480e47c156f1dad9ad13e0d7590969d38d5491fbe00b3021017412ace7767,2024-06-20T12:44:01.637000 @@ -255498,7 +255556,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 -CVE-2024-6265,0,1,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000 +CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000 CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000 CVE-2024-6267,0,0,d0d81696a0fe56042eb20b9f0c7d606c3ec4ab44f43adaf7633e08749cae8d6a,2024-06-24T15:15:12.093000 CVE-2024-6268,0,0,f6b5ab227c5a0cba5e0d9764b3a65d1dea83e5d9d7e49ede9770a3daceae2872,2024-06-26T20:15:16.893000 @@ -255537,7 +255595,7 @@ CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e35 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 CVE-2024-6354,0,0,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000 CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000 -CVE-2024-6363,0,1,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000 +CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000 CVE-2024-6367,0,0,7207995286cd77894417e443ceec13186f4617a3d835dc70f545e6022e4f6dc9,2024-06-27T12:47:19.847000 CVE-2024-6368,0,0,15233ad7ff1f989e7bdf86db89d9527b042f90cc8844e61c0b9d2d12d522b414,2024-06-27T18:15:21.083000 CVE-2024-6369,0,0,c793378edfea0b2a8c32a50d08899943167a983433e0948af5044c43e0a7ad33,2024-06-27T12:47:19.847000 @@ -255546,16 +255604,18 @@ CVE-2024-6371,0,0,4c649bc248258025ed325d77948a1f8525c46141bb22c90a65b416ad94095e CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000 CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000 CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000 -CVE-2024-6387,1,1,def0cd53bff2180f22c8386406858a074b5d800b54f09a90a201f896b646bc47,2024-07-01T13:15:06.467000 +CVE-2024-6375,1,1,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000 +CVE-2024-6376,1,1,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000 +CVE-2024-6387,0,1,bbe5287c80348c6c5eb476ea80c57557c69d7b3a93ee33f1331d87bccd4ebc3f,2024-07-01T19:15:06.037000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 -CVE-2024-6402,0,1,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 -CVE-2024-6403,0,1,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 -CVE-2024-6405,0,1,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 -CVE-2024-6414,0,1,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 -CVE-2024-6415,0,1,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 -CVE-2024-6416,0,1,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 -CVE-2024-6417,0,1,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000 -CVE-2024-6418,0,1,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000 -CVE-2024-6419,0,1,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 -CVE-2024-6424,1,1,2322218d8ccd442e034bc04efb06decf5dba85d2673806f1b6db6fb6b6b4910d,2024-07-01T13:15:06.690000 -CVE-2024-6425,1,1,df671561299025e9d439ba96a2d660e26f555163397ba92a938dc0f695e82466,2024-07-01T13:15:06.927000 +CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 +CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 +CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 +CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 +CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 +CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 +CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000 +CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000 +CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 +CVE-2024-6424,0,1,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000 +CVE-2024-6425,0,1,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000