From 654291a322f33f2e893c2a5b5addef5c5794efda Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 26 Jun 2024 04:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-06-26T04:00:18.814476+00:00 --- CVE-2023/CVE-2023-294xx/CVE-2023-29483.json | 6 ++- CVE-2024/CVE-2024-289xx/CVE-2024-28973.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29173.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29174.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29175.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29176.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29177.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-51xx/CVE-2024-5173.json | 47 ++++++++++++++++ CVE-2024/CVE-2024-51xx/CVE-2024-5181.json | 59 +++++++++++++++++++++ README.md | 25 ++++----- _state.csv | 26 +++++---- 11 files changed, 471 insertions(+), 22 deletions(-) create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28973.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29173.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29174.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29175.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29176.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29177.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5173.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5181.json diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json index 709de96aff5..1c2f5a66c0b 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29483", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T14:15:12.010", - "lastModified": "2024-06-10T17:16:11.793", + "lastModified": "2024-06-26T02:15:09.210", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -40,6 +40,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0001/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json new file mode 100644 index 00000000000..42818d92117 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28973", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-26T03:15:09.640", + "lastModified": "2024-06-26T03:15:09.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json new file mode 100644 index 00000000000..bd7ca949068 --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29173.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29173", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-26T03:15:09.877", + "lastModified": "2024-06-26T03:15:09.877", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to disclosure of information on the application or remote client." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29174.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29174.json new file mode 100644 index 00000000000..e3193ebde1f --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29174.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29174", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-26T03:15:10.100", + "lastModified": "2024-06-26T03:15:10.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized access to application data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29175.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29175.json new file mode 100644 index 00000000000..434b3e24dba --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29175.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29175", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-26T03:15:10.303", + "lastModified": "2024-06-26T03:15:10.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json new file mode 100644 index 00000000000..cc607b28986 --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29176", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-26T03:15:10.533", + "lastModified": "2024-06-26T03:15:10.533", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a buffer overflow vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to an application crash or execution of arbitrary code on the vulnerable application's underlying operating system with privileges of the vulnerable application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-788" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29177.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29177.json new file mode 100644 index 00000000000..e7465fdbc8d --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29177.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29177", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-26T03:15:10.767", + "lastModified": "2024-06-26T03:15:10.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the reuse of disclosed information to gain unauthorized access to the application report." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json new file mode 100644 index 00000000000..88c6a2f6def --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5173", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-26T02:15:09.340", + "lastModified": "2024-06-26T02:15:09.340", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Video player widget settings in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.5.3/includes/widgets/htmega_videoplayer.php#L549", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aac9569e-d33d-45b3-bd03-2e7f48536ae5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5181.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5181.json new file mode 100644 index 00000000000..3bbc327ea1f --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5181.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5181", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-06-26T03:15:10.987", + "lastModified": "2024-06-26T03:15:10.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulating the path of the vulnerable binary file specified in the backend parameter, allowing the execution of arbitrary code on the system. This issue is due to improper neutralization of special elements used in an OS command, leading to potential full control over the affected system." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/c6e3cb58-6fa4-4207-bb92-ae7644174661", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index efc1647ffae..4a8fb3fcb0f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-26T02:00:17.716740+00:00 +2024-06-26T04:00:18.814476+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-26T01:15:47.890000+00:00 +2024-06-26T03:15:10.987000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255207 +255215 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `8` -- [CVE-2024-24764](CVE-2024/CVE-2024-247xx/CVE-2024-24764.json) (`2024-06-26T01:15:47.890`) -- [CVE-2024-29953](CVE-2024/CVE-2024-299xx/CVE-2024-29953.json) (`2024-06-26T00:15:10.030`) -- [CVE-2024-29954](CVE-2024/CVE-2024-299xx/CVE-2024-29954.json) (`2024-06-26T00:15:10.263`) -- [CVE-2024-38364](CVE-2024/CVE-2024-383xx/CVE-2024-38364.json) (`2024-06-26T00:15:10.480`) -- [CVE-2024-38526](CVE-2024/CVE-2024-385xx/CVE-2024-38526.json) (`2024-06-26T00:15:10.703`) -- [CVE-2024-4869](CVE-2024/CVE-2024-48xx/CVE-2024-4869.json) (`2024-06-26T00:15:10.897`) -- [CVE-2024-5460](CVE-2024/CVE-2024-54xx/CVE-2024-5460.json) (`2024-06-26T00:15:11.093`) +- [CVE-2024-28973](CVE-2024/CVE-2024-289xx/CVE-2024-28973.json) (`2024-06-26T03:15:09.640`) +- [CVE-2024-29173](CVE-2024/CVE-2024-291xx/CVE-2024-29173.json) (`2024-06-26T03:15:09.877`) +- [CVE-2024-29174](CVE-2024/CVE-2024-291xx/CVE-2024-29174.json) (`2024-06-26T03:15:10.100`) +- [CVE-2024-29175](CVE-2024/CVE-2024-291xx/CVE-2024-29175.json) (`2024-06-26T03:15:10.303`) +- [CVE-2024-29176](CVE-2024/CVE-2024-291xx/CVE-2024-29176.json) (`2024-06-26T03:15:10.533`) +- [CVE-2024-29177](CVE-2024/CVE-2024-291xx/CVE-2024-29177.json) (`2024-06-26T03:15:10.767`) +- [CVE-2024-5173](CVE-2024/CVE-2024-51xx/CVE-2024-5173.json) (`2024-06-26T02:15:09.340`) +- [CVE-2024-5181](CVE-2024/CVE-2024-51xx/CVE-2024-5181.json) (`2024-06-26T03:15:10.987`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2024-5806](CVE-2024/CVE-2024-58xx/CVE-2024-5806.json) (`2024-06-26T00:15:11.293`) +- [CVE-2023-29483](CVE-2023/CVE-2023-294xx/CVE-2023-29483.json) (`2024-06-26T02:15:09.210`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 980dc7d7ef2..3207b9e6bd4 100644 --- a/_state.csv +++ b/_state.csv @@ -222025,7 +222025,7 @@ CVE-2023-29478,0,0,b8816fd379116a9658fe2e6b5bf8ede3cd6cd8304602609f4ebdc5e031017 CVE-2023-29479,0,0,06be28527e8ae189696b5b4630b8a95b1a9ab1762ec506bceeabcb087549a5b6,2023-05-03T16:56:35.370000 CVE-2023-2948,0,0,9a6fb2710fd01742a8a1f56ed60584990b1e57cdad15bf4483f762bde0ae3001,2023-06-01T03:51:17.350000 CVE-2023-29480,0,0,dfdf5cca08da002a2fb7e71a82997529e7cce5ab1441bf822fc4d3ef19faf67d,2023-05-03T17:11:10.983000 -CVE-2023-29483,0,0,b7f2e26804f3f077075b08d4da76092558a90bb82a0eeaf030fd1e8a7530e235,2024-06-10T17:16:11.793000 +CVE-2023-29483,0,1,8cc3254e8c968205ec55f58b579339a8a173fd7e4da1c6da67fef08d6a255795,2024-06-26T02:15:09.210000 CVE-2023-29484,0,0,000b064d3e4f77963a1ebc20470463df295eefbcfe041d2381eda6140393531e,2023-10-24T13:39:23.563000 CVE-2023-29485,0,0,8ce7c9cd62122e06f276946371c481b04e48171988a33fbb0804b124f9344982,2023-12-29T02:21:17.843000 CVE-2023-29486,0,0,1e82bcbb65ec280e5307b66cc060d77aa5b0c1b395708eff7bfb4c61472c11c7,2023-12-29T02:20:40.423000 @@ -245122,7 +245122,7 @@ CVE-2024-24760,0,0,594ada425d15a322e3f99c422c4b0f972382ba4b06e7c8a0c717620b32aab CVE-2024-24761,0,0,f5eac0618ee154794d07ce4f478624bae3215db8694682143ff6dbdc5db1e3ca,2024-03-06T21:42:48.053000 CVE-2024-24762,0,0,a7cf7384426b8870b434de7e00d3a1d16f7b399a4804ad1be81b6ff5f0245082,2024-02-17T02:15:52.700000 CVE-2024-24763,0,0,d3d10c4404a25ab91ba5900f9f4433bf2e3db86ddd4c01b5399c2cabfe532355,2024-02-20T19:50:53.960000 -CVE-2024-24764,1,1,358fa806be83c92f23415e242070c610d8f46dbce823244e974f49980a7f8da3,2024-06-26T01:15:47.890000 +CVE-2024-24764,0,0,358fa806be83c92f23415e242070c610d8f46dbce823244e974f49980a7f8da3,2024-06-26T01:15:47.890000 CVE-2024-24765,0,0,d4e092e03ff38847b8fb4953a3b2c4b9c1a3da8cedc2236971507409fb416552,2024-03-06T21:42:48.053000 CVE-2024-24766,0,0,f87e50a4000cb92af6a7930ee1d7171e8e2a69d0d8f8e017d8f56fc485535257,2024-03-06T21:42:48.053000 CVE-2024-24767,0,0,ea24984314aeb3ff2151e28966f94b67d2b6ccb20d9e7417a6389a5c24bcc1ed,2024-03-06T21:42:48.053000 @@ -248052,6 +248052,7 @@ CVE-2024-28969,0,0,0d46f305bfcdd2aeb8896dc74821c5d2eeb84b39b3a56a357f2be0e0423a2 CVE-2024-2897,0,0,0e1e1d677ec9e72b6995e546603f98ab77935f85885a6483b68b217559eb34fe,2024-06-04T19:19:19.267000 CVE-2024-28970,0,0,5bffd12458b221b41ea3b33f5f0020bc2e9dc510db5d065982a4e953584ee03e,2024-06-13T18:36:09.013000 CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000 +CVE-2024-28973,1,1,019da7517e327021608351b5a638e3160a21874ff261df61863b1e7e8695d0e9,2024-06-26T03:15:09.640000 CVE-2024-28974,0,0,81a5bba2a762d0674b42f5cdf64af2db18e6b20fdc63a42838587e31bbd76d2a,2024-05-29T19:50:25.303000 CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000 CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37f95,2024-04-24T13:39:42.883000 @@ -248212,6 +248213,11 @@ CVE-2024-29168,0,0,55eaa2f8aa34951f2678d17cd09a8762011ab04d052991a6497f1ac90304a CVE-2024-29169,0,0,a02805aa944e613162d66dc748a6a46569f5a7dce5956826de0d7f8e99e21193,2024-06-13T18:35:19.777000 CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000 CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000 +CVE-2024-29173,1,1,70ac3ac13a35e920798411569a961af5d7a25a998965a99bd2b5593d3c9e47f7,2024-06-26T03:15:09.877000 +CVE-2024-29174,1,1,83c5e25972461137ca31b78634820d90b2d6efc155fad75b729798a6a5fe7a54,2024-06-26T03:15:10.100000 +CVE-2024-29175,1,1,b3316a8b97b3f488995898ec0279c25cfc91fae25f16ae4a9f6526a9a7820d75,2024-06-26T03:15:10.303000 +CVE-2024-29176,1,1,2f9347f0ac00905d49db00a36d30ed218368df9ff0343519594aebcd7c856c14,2024-06-26T03:15:10.533000 +CVE-2024-29177,1,1,1ec7e1f5d6388a26840fbe486fd2ecde2fcf68752fda0647ca97ee4e253d21cd,2024-06-26T03:15:10.767000 CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000 CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000 CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000 @@ -248627,8 +248633,8 @@ CVE-2024-2995,0,0,89218e2c0ab16118b6716e42dcc7ae77885e1ea2436151ccfacfbce504d640 CVE-2024-29950,0,0,59d0dc7b41788e98cd313b2897de3b183cd3675df6f723ff671afe20bfa20432,2024-04-17T20:08:21.887000 CVE-2024-29951,0,0,6925a52af5105d475e345d844926848365b048c62a2d3f697034b8967d354270,2024-04-18T13:04:28.900000 CVE-2024-29952,0,0,a080202dc3806a65e4bf2066cba6f0509ab2487b03cc3575d217fb6ebe9d555c,2024-04-18T13:04:28.900000 -CVE-2024-29953,1,1,53abb4f1851313c37b2d9a4448fd162901f9a7ffbb5b547dac637f5f7dae2927,2024-06-26T00:15:10.030000 -CVE-2024-29954,1,1,4315c5b9aa34cf656b0628f5ac2caae585635d7b9fcf2699b58b96c3e237d362,2024-06-26T00:15:10.263000 +CVE-2024-29953,0,0,53abb4f1851313c37b2d9a4448fd162901f9a7ffbb5b547dac637f5f7dae2927,2024-06-26T00:15:10.030000 +CVE-2024-29954,0,0,4315c5b9aa34cf656b0628f5ac2caae585635d7b9fcf2699b58b96c3e237d362,2024-06-26T00:15:10.263000 CVE-2024-29955,0,0,47a53812514a7578906cfe4f12e13f4ef474d0421763eaa923aee25ceff7b533,2024-04-18T13:04:28.900000 CVE-2024-29956,0,0,126826bc7262b3fd52d7ec8c2ab9f240aff208f37ad9157a7c1a3fe5fe08dca2,2024-04-18T13:04:28.900000 CVE-2024-29957,0,0,fecc998428c3db04062cf2ac371ef979be5cd87fa510b5833cc1b2291494a722,2024-04-19T13:10:25.637000 @@ -253393,7 +253399,7 @@ CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405 CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9bac5b,2024-06-20T12:43:25.663000 CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000 CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000 -CVE-2024-38364,1,1,3520408cf146cb16a953a56509b341631635084fbc5bbe68b5bf4cdd589099a1,2024-06-26T00:15:10.480000 +CVE-2024-38364,0,0,3520408cf146cb16a953a56509b341631635084fbc5bbe68b5bf4cdd589099a1,2024-06-26T00:15:10.480000 CVE-2024-38369,0,0,e5224b159d7a692db6492ffb5b88e69bbb6fbeca83c40da9d8cb17f66e90849e,2024-06-24T19:26:35.967000 CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 CVE-2024-38373,0,0,952ca8d4b23b60efe2e71a3a686b8a383ac5ed143363159c119120ce9ab78a09,2024-06-24T19:26:35.967000 @@ -253447,7 +253453,7 @@ CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09 CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000 CVE-2024-38516,0,0,3cfe3aecdb8e607df3ee76ed7741edae9748253a2b742e5575ff711298712797,2024-06-25T21:15:59.957000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 -CVE-2024-38526,1,1,9a027a18b0e43b60c3249e98e6e4e3271914f58314123162240385cf3ae4de25,2024-06-26T00:15:10.703000 +CVE-2024-38526,0,0,9a027a18b0e43b60c3249e98e6e4e3271914f58314123162240385cf3ae4de25,2024-06-26T00:15:10.703000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 @@ -254395,7 +254401,7 @@ CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078 CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000 CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000 -CVE-2024-4869,1,1,593e5fb5799155f397a96e871dc7fca6c762d99ed945ee53bb54b1ba5ddac4a0,2024-06-26T00:15:10.897000 +CVE-2024-4869,0,0,593e5fb5799155f397a96e871dc7fca6c762d99ed945ee53bb54b1ba5ddac4a0,2024-06-26T00:15:10.897000 CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000 CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000 CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462a1,2024-06-20T12:44:01.637000 @@ -254624,9 +254630,11 @@ CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8bee CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000 CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000 CVE-2024-5172,0,0,c11e28cee00d03ca550aa31f6a4a4e2619eb7f584486db6cbc532617ccc0d3c9,2024-06-20T12:44:01.637000 +CVE-2024-5173,1,1,3813c7c85f8bdc8e9bf1d287bd890858530abee0a3a487e39cf5d772019b1784,2024-06-26T02:15:09.340000 CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000 +CVE-2024-5181,1,1,73e7801bd51baa660163f2cdef183babc6f2e9ee4742c1086d027bd9bc51282e,2024-06-26T03:15:10.987000 CVE-2024-5182,0,0,05eb067250c704bd4c420313ce1da2aeb70843fd4dce4dbb10fdc9fbc9defbb8,2024-06-20T12:43:25.663000 CVE-2024-5184,0,0,de97ef0558df300043d1123a6fe8d6e2df5444a09bff76f28ec8a01317d2d79c,2024-06-18T17:06:20.257000 CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000 @@ -254834,7 +254842,7 @@ CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e454 CVE-2024-5455,0,0,fba0854666bb0b703a1a17496073d4cacfc80d7dfcf08ea3fd5bf7812a480359,2024-06-21T11:22:01.687000 CVE-2024-5458,0,0,9de49bd96b675511c7046065b94648120f7be327e28ebfffc7c76c5b629abe0a,2024-06-18T10:15:10.870000 CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000 -CVE-2024-5460,1,1,43ac837f57e384725fb6e9f39d6687eb5f899e829fc03221538b834ea94a5270,2024-06-26T00:15:11.093000 +CVE-2024-5460,0,0,43ac837f57e384725fb6e9f39d6687eb5f899e829fc03221538b834ea94a5270,2024-06-26T00:15:11.093000 CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000 CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339bb3,2024-06-17T12:42:04.623000 CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000 @@ -254997,7 +255005,7 @@ CVE-2024-5787,0,0,a3d405a0f4e66faab3a863affeada58e47a227c5d73cf2b53ea525af4385d3 CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000 CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000 CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000 -CVE-2024-5806,0,1,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000 +CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000 CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000 CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000