From 73ee09a34a6972036b88e9508336e4db612f6e63 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 11 Jul 2024 16:03:16 +0000 Subject: [PATCH] Auto-Update: 2024-07-11T16:00:18.806565+00:00 --- CVE-2020/CVE-2020-273xx/CVE-2020-27352.json | 15 +- CVE-2023/CVE-2023-211xx/CVE-2023-21113.json | 27 +- CVE-2023/CVE-2023-274xx/CVE-2023-27433.json | 7 +- CVE-2023/CVE-2023-322xx/CVE-2023-32295.json | 5 +- CVE-2023/CVE-2023-419xx/CVE-2023-41915.json | 6 +- CVE-2023/CVE-2023-448xx/CVE-2023-44853.json | 40 +- CVE-2023/CVE-2023-456xx/CVE-2023-45651.json | 7 +- CVE-2023/CVE-2023-459xx/CVE-2023-45919.json | 39 +- CVE-2023/CVE-2023-481xx/CVE-2023-48194.json | 45 +- CVE-2023/CVE-2023-495xx/CVE-2023-49595.json | 69 +- CVE-2023/CVE-2023-498xx/CVE-2023-49867.json | 69 +- CVE-2023/CVE-2023-502xx/CVE-2023-50239.json | 68 +- CVE-2023/CVE-2023-508xx/CVE-2023-50806.json | 14 +- CVE-2023/CVE-2023-508xx/CVE-2023-50807.json | 14 +- CVE-2023/CVE-2023-64xx/CVE-2023-6494.json | 15 +- CVE-2024/CVE-2024-215xx/CVE-2024-21526.json | 12 +- CVE-2024/CVE-2024-217xx/CVE-2024-21740.json | 40 +- CVE-2024/CVE-2024-231xx/CVE-2024-23151.json | 28 +- CVE-2024/CVE-2024-236xx/CVE-2024-23697.json | 27 +- CVE-2024/CVE-2024-237xx/CVE-2024-23711.json | 39 +- CVE-2024/CVE-2024-237xx/CVE-2024-23736.json | 39 +- CVE-2024/CVE-2024-237xx/CVE-2024-23767.json | 40 +- CVE-2024/CVE-2024-249xx/CVE-2024-24974.json | 79 ++- CVE-2024/CVE-2024-250xx/CVE-2024-25076.json | 39 +- CVE-2024/CVE-2024-266xx/CVE-2024-26621.json | 6 +- CVE-2024/CVE-2024-26xx/CVE-2024-2659.json | 23 +- CVE-2024/CVE-2024-274xx/CVE-2024-27459.json | 79 ++- CVE-2024/CVE-2024-276xx/CVE-2024-27602.json | 40 +- CVE-2024/CVE-2024-276xx/CVE-2024-27628.json | 39 +- CVE-2024/CVE-2024-279xx/CVE-2024-27903.json | 74 ++- CVE-2024/CVE-2024-288xx/CVE-2024-28872.json | 44 ++ CVE-2024/CVE-2024-291xx/CVE-2024-29153.json | 14 +- CVE-2024/CVE-2024-294xx/CVE-2024-29461.json | 28 +- CVE-2024/CVE-2024-297xx/CVE-2024-29778.json | 64 +- CVE-2024/CVE-2024-297xx/CVE-2024-29780.json | 64 +- CVE-2024/CVE-2024-297xx/CVE-2024-29781.json | 64 +- CVE-2024/CVE-2024-297xx/CVE-2024-29785.json | 64 +- CVE-2024/CVE-2024-297xx/CVE-2024-29786.json | 56 +- CVE-2024/CVE-2024-297xx/CVE-2024-29787.json | 56 +- CVE-2024/CVE-2024-298xx/CVE-2024-29849.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31311.json | 39 +- CVE-2024/CVE-2024-313xx/CVE-2024-31315.json | 27 +- CVE-2024/CVE-2024-313xx/CVE-2024-31316.json | 27 +- CVE-2024/CVE-2024-313xx/CVE-2024-31317.json | 39 +- CVE-2024/CVE-2024-313xx/CVE-2024-31322.json | 39 +- CVE-2024/CVE-2024-313xx/CVE-2024-31324.json | 27 +- CVE-2024/CVE-2024-313xx/CVE-2024-31327.json | 27 +- CVE-2024/CVE-2024-313xx/CVE-2024-31332.json | 27 +- CVE-2024/CVE-2024-313xx/CVE-2024-31334.json | 39 +- CVE-2024/CVE-2024-313xx/CVE-2024-31339.json | 27 +- CVE-2024/CVE-2024-318xx/CVE-2024-31897.json | 403 +++++++++++- CVE-2024/CVE-2024-327xx/CVE-2024-32759.json | 4 +- CVE-2024/CVE-2024-328xx/CVE-2024-32891.json | 56 +- CVE-2024/CVE-2024-328xx/CVE-2024-32892.json | 64 +- CVE-2024/CVE-2024-328xx/CVE-2024-32893.json | 60 +- CVE-2024/CVE-2024-328xx/CVE-2024-32894.json | 64 +- CVE-2024/CVE-2024-328xx/CVE-2024-32897.json | 64 +- CVE-2024/CVE-2024-328xx/CVE-2024-32898.json | 64 +- CVE-2024/CVE-2024-328xx/CVE-2024-32899.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32900.json | 68 +- CVE-2024/CVE-2024-329xx/CVE-2024-32901.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32903.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32904.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32905.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32906.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32907.json | 56 +- CVE-2024/CVE-2024-329xx/CVE-2024-32908.json | 64 +- CVE-2024/CVE-2024-329xx/CVE-2024-32909.json | 56 +- CVE-2024/CVE-2024-333xx/CVE-2024-33326.json | 39 +- CVE-2024/CVE-2024-346xx/CVE-2024-34602.json | 433 ++++++++++++- CVE-2024/CVE-2024-346xx/CVE-2024-34603.json | 268 +++++++- CVE-2024/CVE-2024-347xx/CVE-2024-34723.json | 27 +- CVE-2024/CVE-2024-347xx/CVE-2024-34726.json | 39 +- CVE-2024/CVE-2024-34xx/CVE-2024-3410.json | 27 +- CVE-2024/CVE-2024-356xx/CVE-2024-35672.json | 7 +- CVE-2024/CVE-2024-364xx/CVE-2024-36451.json | 39 +- CVE-2024/CVE-2024-364xx/CVE-2024-36453.json | 27 +- CVE-2024/CVE-2024-366xx/CVE-2024-36676.json | 39 +- CVE-2024/CVE-2024-36xx/CVE-2024-3651.json | 66 +- CVE-2024/CVE-2024-371xx/CVE-2024-37151.json | 72 +++ CVE-2024/CVE-2024-373xx/CVE-2024-37389.json | 128 +++- CVE-2024/CVE-2024-375xx/CVE-2024-37528.json | 403 +++++++++++- CVE-2024/CVE-2024-377xx/CVE-2024-37770.json | 39 +- CVE-2024/CVE-2024-378xx/CVE-2024-37829.json | 39 +- CVE-2024/CVE-2024-378xx/CVE-2024-37871.json | 39 +- CVE-2024/CVE-2024-379xx/CVE-2024-37999.json | 58 +- CVE-2024/CVE-2024-380xx/CVE-2024-38071.json | 85 ++- CVE-2024/CVE-2024-383xx/CVE-2024-38330.json | 62 +- CVE-2024/CVE-2024-385xx/CVE-2024-38534.json | 68 ++ CVE-2024/CVE-2024-385xx/CVE-2024-38535.json | 76 +++ CVE-2024/CVE-2024-385xx/CVE-2024-38536.json | 64 ++ CVE-2024/CVE-2024-389xx/CVE-2024-38959.json | 39 +- CVE-2024/CVE-2024-389xx/CVE-2024-38972.json | 34 +- CVE-2024/CVE-2024-389xx/CVE-2024-38987.json | 43 +- CVE-2024/CVE-2024-390xx/CVE-2024-39001.json | 43 +- CVE-2024/CVE-2024-390xx/CVE-2024-39018.json | 43 +- CVE-2024/CVE-2024-390xx/CVE-2024-39071.json | 39 +- CVE-2024/CVE-2024-391xx/CVE-2024-39119.json | 43 +- CVE-2024/CVE-2024-391xx/CVE-2024-39171.json | 45 +- CVE-2024/CVE-2024-392xx/CVE-2024-39251.json | 39 +- CVE-2024/CVE-2024-393xx/CVE-2024-39329.json | 39 +- CVE-2024/CVE-2024-397xx/CVE-2024-39723.json | 64 +- CVE-2024/CVE-2024-398xx/CVE-2024-39828.json | 39 +- CVE-2024/CVE-2024-398xx/CVE-2024-39886.json | 39 +- CVE-2024/CVE-2024-400xx/CVE-2024-40035.json | 39 +- CVE-2024/CVE-2024-400xx/CVE-2024-40036.json | 39 +- CVE-2024/CVE-2024-400xx/CVE-2024-40038.json | 39 +- CVE-2024/CVE-2024-403xx/CVE-2024-40328.json | 39 +- CVE-2024/CVE-2024-403xx/CVE-2024-40333.json | 39 +- CVE-2024/CVE-2024-403xx/CVE-2024-40336.json | 39 +- CVE-2024/CVE-2024-407xx/CVE-2024-40726.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40727.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40730.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40731.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40734.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40735.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40736.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40739.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40742.json | 34 +- CVE-2024/CVE-2024-54xx/CVE-2024-5488.json | 27 +- CVE-2024/CVE-2024-56xx/CVE-2024-5681.json | 22 +- CVE-2024/CVE-2024-57xx/CVE-2024-5711.json | 54 +- CVE-2024/CVE-2024-60xx/CVE-2024-6026.json | 27 +- CVE-2024/CVE-2024-61xx/CVE-2024-6138.json | 27 +- CVE-2024/CVE-2024-62xx/CVE-2024-6229.json | 49 +- CVE-2024/CVE-2024-62xx/CVE-2024-6235.json | 14 +- CVE-2024/CVE-2024-62xx/CVE-2024-6286.json | 14 +- CVE-2024/CVE-2024-63xx/CVE-2024-6387.json | 6 +- CVE-2024/CVE-2024-65xx/CVE-2024-6539.json | 62 +- CVE-2024/CVE-2024-66xx/CVE-2024-6602.json | 31 +- CVE-2024/CVE-2024-66xx/CVE-2024-6606.json | 31 +- CVE-2024/CVE-2024-66xx/CVE-2024-6611.json | 43 +- CVE-2024/CVE-2024-66xx/CVE-2024-6612.json | 43 +- CVE-2024/CVE-2024-66xx/CVE-2024-6679.json | 133 ++++ README.md | 66 +- _state.csv | 684 ++++++++++---------- 136 files changed, 7098 insertions(+), 695 deletions(-) create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28872.json create mode 100644 CVE-2024/CVE-2024-371xx/CVE-2024-37151.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38534.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38535.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38536.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6679.json diff --git a/CVE-2020/CVE-2020-273xx/CVE-2020-27352.json b/CVE-2020/CVE-2020-273xx/CVE-2020-27352.json index 6af14c078ae..3de3e2e075b 100644 --- a/CVE-2020/CVE-2020-273xx/CVE-2020-27352.json +++ b/CVE-2020/CVE-2020-273xx/CVE-2020-27352.json @@ -2,8 +2,9 @@ "id": "CVE-2020-27352", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-21T20:15:10.630", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-11T15:05:04.077", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://bugs.launchpad.net/snapd/+bug/1910456", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json index 93b1776ef1f..224c0696cab 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21113", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:10.717", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:05.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En m\u00faltiples ubicaciones, existe una posible omisi\u00f3n de permiso debido a un agente confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/build/soong/+/e7b7f0833dc47ade981eddfbf462dcc143dddd10", diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27433.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27433.json index 0ead5e14ab2..fc0e6019e1e 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27433.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27433.json @@ -2,12 +2,13 @@ "id": "CVE-2023-27433", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-04T14:15:10.587", - "lastModified": "2023-10-05T18:10:37.703", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:15:10.777", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Make Paths Relative plugin <=\u00a01.3.0 versions." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Make Paths Relative allows Cross Site Request Forgery.This issue affects Make Paths Relative: from n/a through 1.3.0." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json index 1fbe369cd4e..db29268cca3 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json @@ -2,12 +2,13 @@ "id": "CVE-2023-32295", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-11T12:15:07.707", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-11T15:15:10.923", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Authorization vulnerability in Alex Tselegidis Easy!Appointments.This issue affects Easy!Appointments: from n/a through 1.3.2.\n\n" + "value": "Missing Authorization vulnerability in Alex Tselegidis Easy!Appointments.This issue affects Easy!Appointments: from n/a through 1.3.3." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json index db65eabf8f7..82d101eb68b 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41915", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-09T22:15:09.530", - "lastModified": "2024-07-10T23:15:09.923", + "lastModified": "2024-07-11T14:15:12.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -132,6 +132,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/10/6", "source": "cve@mitre.org" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/11/3", + "source": "cve@mitre.org" + }, { "url": "https://docs.openpmix.org/en/latest/security.html", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44853.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44853.json index 0e16e46d001..31b0e5ec5c1 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44853.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44853.json @@ -2,8 +2,9 @@ "id": "CVE-2023-44853", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T04:15:08.960", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-07-11T15:05:11.010", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Cobham SAILOR VSAT Ku v.164B019, que permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para la funci\u00f3n sub_219C4 en el archivo acu_web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://pine-amphibian-9b9.notion.site/SAILOR-Ku-Software-RCE-and-Privilege-Escalation-Diagnostics-report-0f3923d0ed434705b7ed4a6174218c2b?pvs=4", diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json index 4d54007c151..8ea08f34389 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json @@ -2,12 +2,13 @@ "id": "CVE-2023-45651", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-16T09:15:11.190", - "lastModified": "2023-10-19T17:30:00.853", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:15:11.087", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi WP Attachments plugin <=\u00a05.0.6 versions." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi WP Attachments allows Cross Site Request Forgery.This issue affects WP Attachments: from n/a through 5.0.11." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45919.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45919.json index f38af7dc81f..21bb59af846 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45919.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45919.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45919", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T05:15:47.030", - "lastModified": "2024-07-10T15:15:10.657", + "lastModified": "2024-07-11T15:05:12.067", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que Mesa 23.0.4 conten\u00eda un b\u00fafer sobrele\u00eddo en glXQueryServerString(). NOTA: esto est\u00e1 en disputa porque no hay situaciones comunes en las que los usuarios requieran una operaci\u00f3n ininterrumpida con un servidor controlador de atacante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/47", diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json index 7d78977af2a..50fdc1cac09 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48194.json @@ -2,16 +2,55 @@ "id": "CVE-2023-48194", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:08.790", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T15:05:13.020", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \\x0. After executing set_client_qos, control over the gp register can be obtained." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Tenda AC8v4 .V16.03.34.09 debido a que sscanf y el \u00faltimo d\u00edgito de s8 se sobrescriben con \\x0. Despu\u00e9s de ejecutar set_client_qos, se puede obtener el control sobre el registro gp." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://tenda.com", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49595.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49595.json index bc567f941bf..cf46f63aba6 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49595.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49595.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49595", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:05.323", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T15:59:57.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa rollback_control_code functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa rollback_control_code de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes de red especialmente manipuladas pueden provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una secuencia de solicitudes para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1878", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49867.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49867.json index 48f4ba3ed55..150e02ff4e3 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49867.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49867.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49867", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:05.543", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T15:59:27.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa formWsc de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una serie de solicitudes HTTP para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +61,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1904", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50239.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50239.json index ac58326aefe..9e30c2a6aea 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50239.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50239.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50239", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-08T16:15:05.770", - "lastModified": "2024-07-08T16:35:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T15:59:15.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `interfacename` request's parameter." + }, + { + "lang": "es", + "value": "Existen dos vulnerabilidades de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad boa set_RadvdInterfaceParam de Realtek rtl819x Jungle SDK v3.4.11. Una serie de solicitudes de red especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una secuencia de solicitudes para activar estas vulnerabilidades. Este desbordamiento del b\u00fafer basado en pila est\u00e1 relacionado con el par\u00e1metro de solicitud \"interfacename\"." } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -47,10 +61,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "7891A085-C128-426B-A8BB-70E688CAAF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*", + "matchCriteriaId": "79082BA3-FBC4-4F38-8897-37E70D7B83D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59DE58EE-DF41-48A2-B048-65A0666808F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1893", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json index 1558399b1ae..c89bd4ae263 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50806", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:10.820", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:15.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json index 2f6e3357789..b88529236bf 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50807", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:11.020", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:15.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6494.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6494.json index 46be5c141e1..2314a631ebd 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6494.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6494.json @@ -2,8 +2,9 @@ "id": "CVE-2023-6494", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-13T09:15:06.917", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-11T15:05:17.510", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3069323%40woo-smart-quick-view&new=3069323%40woo-smart-quick-view&sfp_email=&sfph_mail=", diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json index 4437692134e..430ea322d1d 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21526", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.733", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:20.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-241" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21740.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21740.json index abd9b2ee800..06d4e8a2546 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21740.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21740.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21740", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T21:15:57.190", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-07-11T15:05:22.467", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Los dispositivos Artery AT32F415CBT7 y AT32F421C8T7 tienen control de acceso incorrecto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://tches.iacr.org/index.php/TCHES/article/view/11422/10927", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23151.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23151.json index 0374725b6b3..4506498c6da 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23151.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23151.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23151", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T04:15:12.567", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-07-11T15:05:24.300", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un archivo 3DM creado con fines malintencionados, cuando se analiza en ASMkern229A.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json index d6da9f9ec62..52f30135a1e 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23697", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.047", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:24.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En RGXCreateHWRTData_aux de rgxta3d.c existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un uso after free. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json index fb147cc68c4..08e9b9362ab 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23711", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.227", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:25.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En DevmemXIntUnreserveRange de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23736.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23736.json index 21a0d88698a..2e80014a360 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23736.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23736.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23736", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T22:15:02.767", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-11T15:05:26.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Request Forgery (CSRF) en savignano S/Notify anterior a 4.0.2 para Confluence permite a los atacantes manipular el certificado S/MIME de la clave PGP de un usuario a trav\u00e9s de un enlace malicioso o un correo electr\u00f3nico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://help.savignano.net/snotify-email-encryption/sa-2023-11-28#SA-2023-11-28-CSRFbasedvulnerabilityinuserupload", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json index cab12a44d76..13c08bf032a 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23767", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:13.057", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-11T15:05:27.593", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en la versi\u00f3n 3 del firmware HMS Anybus X-Gateway AB7832-F. El protocolo HICP permite cambios no autenticados en las configuraciones de red de un dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://sensepost.com/blog/2024/targeting-an-industrial-protocol-gateway/", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json index 058dc526c3e..b1f4fca80d7 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24974", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.103", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:47:54.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,8 +15,41 @@ "value": "El servicio interactivo en OpenVPN 2.6.9 y versiones anteriores permite acceder remotamente al canal del servicio OpenVPN, lo que permite a un atacante remoto interactuar con el servicio interactivo privilegiado OpenVPN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security@openvpn.net", "type": "Secondary", @@ -28,18 +61,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionEndExcluding": "2.5.10", + "matchCriteriaId": "62343D14-4C89-4E6F-9C74-46E7EEAF79CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.10", + "matchCriteriaId": "0E77CFBC-2014-4588-B77C-C34E333645A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json index f80686e4b91..5e3180412dd 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25076", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T20:15:02.933", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:28.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en los dispositivos Renesas SmartBond DA14691, DA14695, DA14697 y DA14699. La funci\u00f3n bootrom responsable de validar el encabezado del producto Flash utiliza directamente un valor de tama\u00f1o controlable por el usuario (Longitud de la secci\u00f3n de configuraci\u00f3n de Flash) para controlar una lectura desde el dispositivo QSPI en un b\u00fafer de tama\u00f1o fijo, lo que resulta en un desbordamiento del b\u00fafer y la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2024-0001.md", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json index d00cfb0df21..546f41493ce 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26621.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:50.340", - "lastModified": "2024-07-10T23:15:10.040", + "lastModified": "2024-07-11T14:15:13.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -57,6 +57,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/10/8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/11/4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2659.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2659.json index b81bee7b08b..68553e8c994 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2659.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2659.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2659", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-04-15T18:15:10.837", - "lastModified": "2024-04-15T19:12:25.887", + "lastModified": "2024-07-11T15:05:36.393", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json index 70b47ddb663..5bd7e6e5d11 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27459", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.303", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:47:26.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,8 +15,41 @@ "value": "El servicio interactivo en OpenVPN 2.6.9 y versiones anteriores permite a un atacante enviar datos provocando un desbordamiento de pila que puede usarse para ejecutar c\u00f3digo arbitrario con m\u00e1s privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security@openvpn.net", "type": "Secondary", @@ -28,18 +61,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionEndExcluding": "2.5.10", + "matchCriteriaId": "62343D14-4C89-4E6F-9C74-46E7EEAF79CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.10", + "matchCriteriaId": "0E77CFBC-2014-4588-B77C-C34E333645A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27602.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27602.json index d865c24b6f3..72897356784 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27602.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27602.json @@ -2,8 +2,9 @@ "id": "CVE-2024-27602", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T21:15:45.957", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-07-11T15:05:30.183", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Alldata V0.4.6 es vulnerable a un control de acceso incorrecto. Se han filtrado un total de muchos documentos de interfaz de m\u00f3dulos. Por ejemplo, el m\u00f3dulo /api/system/v2/api-docs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Raybye/fee21f1a5b3a9ab54359818281478034", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json index ad7d2da1a7a..f1f9ca54198 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27628.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27628", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T19:15:05.180", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-11T15:05:31.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en DCMTK v.3.6.8 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente del m\u00e9todo EctEnhancedCT." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json index 0224fc8383c..abb361a2464 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27903", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.390", - "lastModified": "2024-07-09T16:22:25.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:46:26.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "security@openvpn.net", "type": "Secondary", @@ -51,18 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionEndExcluding": "2.5.10", + "matchCriteriaId": "62343D14-4C89-4E6F-9C74-46E7EEAF79CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.10", + "matchCriteriaId": "0E77CFBC-2014-4588-B77C-C34E333645A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html", - "source": "security@openvpn.net" + "source": "security@openvpn.net", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json new file mode 100644 index 00000000000..da2e0fbb5fa --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-28872", + "sourceIdentifier": "security-officer@isc.org", + "published": "2024-07-11T15:15:11.377", + "lastModified": "2024-07-11T15:15:11.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TLS certificate validation code is flawed. An attacker can obtain a TLS certificate from the Stork server and use it to connect to the Stork agent. Once this connection is established with the valid certificate, the attacker can send malicious commands to a monitored service (Kea or BIND 9), possibly resulting in confidential data loss and/or denial of service. It should be noted that this vulnerability is not related to BIND 9 or Kea directly, and only customers using the Stork management tool are potentially affected.\nThis issue affects Stork versions 0.15.0 through 1.15.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-officer@isc.org", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.9, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://kb.isc.org/docs/cve-2024-28872", + "source": "security-officer@isc.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json index 24a01fe2bed..a6fcbea93aa 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29153", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:10.827", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:33.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29461.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29461.json index 64ae88e2f5d..95ea7a2ff40 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29461.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29461.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29461", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T14:15:07.597", - "lastModified": "2024-04-15T13:15:51.577", + "lastModified": "2024-07-11T15:05:34.270", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Un problema en Floodlight SDN OpenFlow Controller v.1.2 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s del componente datapath id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://gist.github.com/ErodedElk/399a226905c574efe705e3bff77955e3", diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29778.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29778.json index 31cf15d112c..c676ba5202b 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29778.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29778.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29778", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:51.857", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:29:52.413", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En ProtocolPsDedicatedBearInfoAdapter::processQosSession de protocolpsadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29780.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29780.json index 65bae3d5615..daed1710c96 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29780.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29780.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29780", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:51.950", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:32:47.390", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En hwbcc_ns_deprivilege de trusty/user/base/lib/hwbcc/client/hwbcc.c, existe una posible divulgaci\u00f3n de datos de pila no inicializados debido a datos no inicializados. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29781.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29781.json index 7a6839d8f56..2ece615b2cb 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29781.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29781.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29781", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.027", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:35:15.730", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En ss_AnalyzeOssReturnResUssdArgIe de ss_OssAsnManagement.c, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json index 91d73d96faa..e4e74241fb8 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29785", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.180", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:26:38.663", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En aur_get_state de aurora.c, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json index 800d623758c..eb7e576da2d 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29786", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.257", - "lastModified": "2024-07-03T01:52:35.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:10:32.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json index 251511b8fcd..e70d9ee3a27 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29787.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29787", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.340", - "lastModified": "2024-07-03T01:52:36.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:05:47.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json index 02cbd6b30a9..1ccb865f1d7 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29849", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-22T23:15:08.683", - "lastModified": "2024-07-03T01:52:47.767", + "lastModified": "2024-07-11T15:05:34.760", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-288" + "value": "CWE-287" } ] } diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json index b02114701ca..7178bb900ab 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31311", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.840", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:38.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En increment_annotation_count de stats_event.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/StatsD/+/b6aab6c000ab85f4e4d8bb3941bcc33800550374", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json index b918f534d6e..5a6eb7967f2 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31315", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.080", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:39.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En m\u00faltiples funciones de ManagedServices.java, existe una forma posible de ocultar una aplicaci\u00f3n con acceso a notificaciones en la configuraci\u00f3n de notificaciones de dispositivos y aplicaciones debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/a9ee2793068235ff423d08cc0964870c054d1983", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json index 8dd071b11de..c0db0d3934b 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31316", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.140", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:39.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En onResult de AccountManagerService.java, existe una forma posible de realizar un inicio de actividad en segundo plano arbitrario debido a una falta de coincidencia de paquetes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/3457d82f8e265ad615b38f6a2aa3c33f1e100cb9", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json index 7395a172e2e..845a0cb8a2a 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31317", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.197", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:39.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En m\u00faltiples funciones de ZygoteProcess.java, existe una manera posible de lograr la ejecuci\u00f3n de c\u00f3digo como cualquier aplicaci\u00f3n a trav\u00e9s de WRITE_SECURE_SETTINGS debido a una deserializaci\u00f3n insegura. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/e25a0e394bbfd6143a557e1019bb7ad992d11985", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json index 7cdf5b4dbb5..e0c9846ff3e 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31322", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.433", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:40.467", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En updateServicesLocked de AccessibilityManagerService.java, existe una forma posible de ocultar una aplicaci\u00f3n de la Configuraci\u00f3n mientras se conserva el Servicio de Accesibilidad debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/c1bc907a649addd5b97d489fd39afb956164a46c", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json index d41af56ffaa..4078e00d540 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31324", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.563", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:41.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En hide de WindowState.java, existe una forma posible de omitir la protecci\u00f3n contra secuestro/superposici\u00f3n iniciando la actividad en modo vertical primero y luego rot\u00e1ndola al modo horizontal. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/f16cc1135b414906164eb8fc55a76971b0e36c21", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json index 36d39b9b1b2..4dbc972e458 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31327", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.820", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:41.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En m\u00faltiples funciones de MessageQueueBase.h, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/system/libfmq/+/79bbf4aeef4b254c52da670a972e22956c8c659d", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json index 1a62f3dd72e..fee4ba23576 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31332", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.947", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:41.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En varias ubicaciones, existe una manera posible de evitar una restricci\u00f3n para agregar nuevas conexiones Wi-Fi debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/d1f9e61e4480116838c7a642b54c217506361266", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json index 5d71170271a..a230c79ca9b 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31334", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.010", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:41.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En DevmemIntFreeDefBackingPage de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-07-01", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json index 37faa4cc0f9..9f0014cfa13 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31339", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.137", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:42.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En m\u00faltiples funciones de StatsService.cpp, existe una posible corrupci\u00f3n de la memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/StatsD/+/795a0da721992432cae20fc9be21bcbce318bf5a", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json index b38502e429e..85a99abcb7b 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31897", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T03:15:02.200", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:52:52.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,389 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0.0", + "versionEndIncluding": "18.0.2", + "matchCriteriaId": "716DF694-558C-4115-B70E-E434602BA933" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0.1", + "versionEndIncluding": "19.0.3", + "matchCriteriaId": "00B3BADE-C2D9-40BC-BAD0-39FCA9FC563B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0.1", + "versionEndIncluding": "20.0.3", + "matchCriteriaId": "F99EDA35-605B-4AC3-AFFA-F6507F1DD8E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "AF7E2601-47E6-4111-9DE0-C3C01705884A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "AECC2FB4-0D29-45DB-AB55-B6C6C6A8BB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "B8F5E495-92A5-419D-884B-C82D6AA5B56B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "508939AF-58FC-4E12-B4E2-B11865B603F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "C5B419DE-4597-4A33-861D-5530BDA9E679" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "00EE653A-0EAD-489B-9610-6BEE3295AAEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "06B644E7-7EB2-4AB6-9D30-EA0602373FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "838846CB-8436-40D1-9C3B-FBA2426351E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "60AC2B63-2F8A-40E7-B2E0-4A06F79E1F7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*", + "matchCriteriaId": "A8D6EB68-3804-494D-B12A-2E96E31D1B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "21D8DE68-5651-4068-B978-79B28F2DC5D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "BBEA972A-A41E-44C9-8D35-1A991D3384B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "D3009F4E-7157-43D3-B6A0-2531CDE619BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "1DA97C23-9B80-4956-9873-317902A0D804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "1D0B6203-C775-4C5E-BAE9-C956E718F261" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "257A7A17-7EDF-4E23-88A6-216BC29EC467" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "26FF217B-1BD4-46E5-8023-2B2989FF7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "C60E58EA-C4D5-4D4D-8C9B-3EC33A7027E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_009:*:*:*:*:*:*", + "matchCriteriaId": "7817670E-5649-42A9-B5F9-7586D7AEB4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_010:*:*:*:*:*:*", + "matchCriteriaId": "FC7F85E8-8185-418A-B25F-8E64A58177DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_011:*:*:*:*:*:*", + "matchCriteriaId": "37616DCD-C26C-44EA-AA7F-732DC128FFE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_012:*:*:*:*:*:*", + "matchCriteriaId": "26CAC076-6FED-49E2-BF33-230F1D1195F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_013:*:*:*:*:*:*", + "matchCriteriaId": "5A88C56C-22CC-4791-BB33-C1494E7F41EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_014:*:*:*:*:*:*", + "matchCriteriaId": "12652B2E-307E-4568-920B-A869914ED650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_015:*:*:*:*:*:*", + "matchCriteriaId": "8F4E242F-BDF4-4CFE-B808-4A4B7A6FAD0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_016:*:*:*:*:*:*", + "matchCriteriaId": "88E736CF-CA6E-400B-9AE3-2C58D2265752" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_017:*:*:*:*:*:*", + "matchCriteriaId": "02488B2F-8D6E-4BDC-8DA9-45F5EBC42049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_018:*:*:*:*:*:*", + "matchCriteriaId": "854F4AF8-B712-446E-9DE1-A2496D5E9C1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_019:*:*:*:*:*:*", + "matchCriteriaId": "CF3F1B62-089B-41ED-AD3E-F31F8E967F18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_020:*:*:*:*:*:*", + "matchCriteriaId": "ABB843C3-F26D-43A5-AD3E-9D30D00339D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_021:*:*:*:*:*:*", + "matchCriteriaId": "42A67A28-CBF1-4C37-A217-F4789ED1850E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_022:*:*:*:*:*:*", + "matchCriteriaId": "BFEF1033-B100-400A-9B2B-94AEE3A7B94A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_023:*:*:*:*:*:*", + "matchCriteriaId": "5F109F93-1CE8-4F86-9070-73012ED0FE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_024:*:*:*:*:*:*", + "matchCriteriaId": "6CC66606-EE8D-4273-832A-4A0391B5DBAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_025:*:*:*:*:*:*", + "matchCriteriaId": "8CEF57DE-61D6-41E6-8C34-06A1F859F9AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_026:*:*:*:*:*:*", + "matchCriteriaId": "7C441A0C-5FE4-4F7A-8E88-85E198790D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_028:*:*:*:*:*:*", + "matchCriteriaId": "9A6F6F2E-0ED8-4478-BFC5-92C736323A63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_029:*:*:*:*:*:*", + "matchCriteriaId": "1D823E07-4F45-4EBC-99AF-81C412330586" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_030:*:*:*:*:*:*", + "matchCriteriaId": "AE588317-A913-429C-88E8-059425506E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_031:*:*:*:*:*:*", + "matchCriteriaId": "B0E18893-9158-4712-B879-7ADD2EB619AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_032:*:*:*:*:*:*", + "matchCriteriaId": "DFBF74EF-1B70-4FDE-A13F-6695C72E4638" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_033:*:*:*:*:*:*", + "matchCriteriaId": "C3A5C102-A3D4-456D-B985-E556E37044A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F22E2017-86A6-4CD1-8192-7A5DF0A1D818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "31BC7CBD-C728-481C-AC5F-110FD7799B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "49793CE0-A419-4937-89B4-B6A8F0E22C0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "E7ABFE27-D890-4AF4-8686-296F4DB90F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "BE746B2B-EECA-4332-9A24-8EF23BDA1B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "CEE539C9-6AF2-4B02-8916-2AC7D4A93C2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "72743164-5279-4FB6-86EE-EBE5B8CD6D1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "517C5EDE-5104-4E22-B9C6-64DFBA7650C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "7A81368D-744B-4886-96C7-1755A27C0AAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "5B823170-57D5-4329-B41A-6C347982E00B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "AAE375C3-E995-415F-A349-A45998764910" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "A402E881-759D-4B59-985D-4DDA49327147" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "939B5364-0CF8-480A-B15A-B1FD9D9560EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "9BD80442-5DB1-44AC-B4FC-6EDF4162586B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "01632D44-1A4A-4C1A-A19D-8E815617B905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "12CE606B-49F1-425F-A00B-23E3C91CCB0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "581B838C-3242-46E8-B2A7-343734FEA3DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "287F9B5E-AD36-422B-80D5-9B51BA64F993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "0B20AAF4-0EC3-467A-96C6-102124A191DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0EA264AE-2691-4C84-BAB6-82BEECC7435F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "91E7E70A-765F-47EC-8DDD-82BFFE14A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "F3A493A2-6835-4A52-9C0C-1C828C3AF662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "F5D82427-AC22-4C48-9AC8-B1922082FDF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "0767E445-1D61-4879-AB3A-2E6259CF4AF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "BA3388C6-DFAD-403E-9699-305B2146B883" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288178", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159332", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json index c5c92fec242..5b51f850b5a 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json @@ -2,13 +2,13 @@ "id": "CVE-2024-32759", "sourceIdentifier": "productsecurity@jci.com", "published": "2024-07-10T18:15:03.220", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:15:11.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Under certain circumstances the Software House C?CURE 9000 installer will utilize weak credentials." + "value": "Under certain circumstances the Software House C\u25cfCURE 9000 installer will utilize weak credentials." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json index c19a071853a..eeaaef52e44 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32891", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.690", - "lastModified": "2024-07-03T01:57:12.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:05:11.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32892.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32892.json index 1c98db22120..e6d6c9ba93f 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32892.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32892.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32892", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.770", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:04:49.010", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En handle_init de goodix/main/main.c, existe una posible corrupci\u00f3n de memoria debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json index 97eab59852f..b582c3665b1 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32893", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.847", - "lastModified": "2024-07-03T01:57:13.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:04:33.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,20 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-704" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +85,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32894.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32894.json index f57c38e6f02..19de77087df 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32894.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32894.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32894", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.923", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:03:46.810", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En bc_get_converted_received_bearer de bc_utilities.c, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32897.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32897.json index 7c1da95e62f..a78209ddf6c 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32897.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32897.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32897", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.150", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:28:06.287", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En ProtocolCdmaCallWaitingIndAdapter::GetCwInfo() de protocolsmsadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n y comprometer el firmware de banda base. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32898.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32898.json index 78298cfbe3f..758094e30c6 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32898.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32898.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32898", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.223", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:28:44.707", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En ProtocolCellIdentityParserV4::Parse() de protocolnetadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32899.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32899.json index 546c6c4929b..2038b37d153 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32899.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32899.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32899", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.287", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:22:06.627", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En gpu_pm_power_off_top_nolock de pixel_gpu_power.c, existe un posible compromiso de la memoria protegida debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda llevar a una escalada local de privilegios a TEE sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32900.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32900.json index e7f81b65b0d..c82af59e1cf 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32900.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32900.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32900", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.357", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:22:34.243", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,70 @@ "value": "En lwis_fence_signal de lwis_debug.c, existe un posible Use after Free debido a un bloqueo inadecuado. Esto podr\u00eda llevar a una escalada local de privilegios desde la etiqueta hal_camera_default SELinux sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json index d2e9f51f71f..0fefa9964b5 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32901.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32901", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.430", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T14:23:01.377", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En v4l2_smfc_qbuf de smfc-v4l2-ioctls.c, hay una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32903.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32903.json index 98aa6c733c7..c65fea48e62 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32903.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32903.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32903", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.583", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:15:02.090", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En prepare_response_locked de lwis_transaction.c, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32904.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32904.json index 578eab15b27..6b2f5e1eb57 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32904.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32904.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32904", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.657", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:14:41.203", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En ProtocolVsimOperationAdapter() de protocolvsimadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json index 78aad79e50e..463aeaa40ad 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32905.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32905", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.730", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:13:21.467", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En circ_read de link_device_memory_legacy.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32906.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32906.json index 7860767e374..63bc8cc80cc 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32906.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32906.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32906", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.810", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:13:02.713", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En AcvpOnMessage de avcp.cpp, existe un posible EOP debido a datos no inicializados. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json index d4365ba95e9..efa2c519bb1 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32907.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32907", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.877", - "lastModified": "2024-07-03T01:57:15.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:10:44.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json index f10327354d2..01dfc01245e 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32908.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32908", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:54.957", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:07:31.087", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En sec_media_protect de media.c, existe una posible omisi\u00f3n de permiso debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json index ec64904748f..8ddb176f8b8 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32909.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32909", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.027", - "lastModified": "2024-07-03T01:57:16.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T15:05:52.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json index f1675ee4d7f..cf827f546ca 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33326", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.210", - "lastModified": "2024-07-11T04:15:04.567", + "lastModified": "2024-07-11T15:05:43.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en el componente XsltResultControllerHtml.jsp de Lumisxp v15.0.xa v16.1.x permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro lumPageID." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/10", diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json index 8828f5659a9..804ebc4e1c0 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34602", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-07-08T07:15:02.663", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:49:05.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,417 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json index 406a7419ed4..ee526ab21e9 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34603", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-07-08T07:15:04.100", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:48:47.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,252 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json index 5016ba652ba..f6b5e43fc03 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34723", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.407", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:45.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En onTransact de ParcelableListBinder.java, existe una forma posible de robar mAllowlistToken para iniciar una aplicaci\u00f3n en segundo plano debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/c702bb71811993960debe0c18fcf8834cfa2454f", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json index d8f013ec47c..34c985ce9b8 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34726", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.680", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:45.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En PVRSRV_MMap de pvr_bridge_k.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-07-01", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json index 16a8e760ffa..ab3cf74ed45 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3410.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3410", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-09T06:15:02.263", - "lastModified": "2024-07-09T18:19:14.047", + "lastModified": "2024-07-11T15:06:16.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento de WordPress DN Footer Contacts anterior a 1.6.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e2067637-45f3-4b42-96ca-85867c4c0409/", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35672.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35672.json index 7cde7f6d522..4b4211a4cb2 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35672.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35672.json @@ -2,12 +2,13 @@ "id": "CVE-2024-35672", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T19:20:08.967", - "lastModified": "2024-06-11T14:21:04.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:15:11.733", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16." + "value": "Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.19." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json index 830d339ab2c..5cb3bb9a982 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36451", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.040", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:47.857", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de manejo incorrecto de permisos o privilegios insuficientes en el m\u00f3dulo ajaxterm de Webmin anterior a 2.003. Si se aprovecha esta vulnerabilidad, un usuario no autorizado puede secuestrar una sesi\u00f3n de consola. Como resultado, se pueden hacer referencias a datos dentro de un sistema, se puede alterar una p\u00e1gina web o se puede detener permanentemente un servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN81442045/", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json index 16f124fb95e..f43a935a3b7 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36453", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.177", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:48.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Existe una vulnerabilidad de Cross Site Scripting en session_login.cgi de las versiones de Webmin anteriores a la 1.970 y de las versiones de Usermin anteriores a la 1.820. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto. Como resultado, una p\u00e1gina web puede verse alterada o se puede divulgar informaci\u00f3n confidencial, como una credencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN81442045/", diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json index 6ff3e28c561..635d4dd1227 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36676", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T22:15:02.467", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:49.017", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en BookStack anterior a v24.05.1 permite a los atacantes confirmar los usuarios existentes del sistema y realizar notificaciones de DoS por correo electr\u00f3nico dirigidas a trav\u00e9s de formularios p\u00fablicos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/BookStackApp/BookStack/issues/4993", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json index 5ca29a9e322..92cc3fd25cc 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3651", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-07T18:15:09.827", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:58:01.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kjd:internationalized_domain_names_in_applications:3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "58AE756B-C46B-418C-A3CD-DD0CEE78ABB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kjd/idna/commit/1d365e17e10d72d0b7876316fc7b9ca0eebdd38d", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37151.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37151.json new file mode 100644 index 00000000000..5825251a2b9 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37151.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-37151", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T15:15:11.847", + "lastModified": "2024-07-11T15:15:11.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. \nMishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/9d5c4273cb7e5ca65f195f7361f0d848c85180e0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/aab7f35c76721df19403a7c0c0025feae12f3b6b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-qrp7-g66m-px24", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7041", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7042", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json index 68f7960de68..a9e780f3ca1 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37389", "sourceIdentifier": "security@apache.org", "published": "2024-07-08T08:15:10.847", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:48:32.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@apache.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@apache.org", "type": "Secondary", @@ -51,10 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0", + "versionEndExcluding": "1.27.0", + "matchCriteriaId": "D9D4EA18-4E49-4BEA-B450-60769AE53E84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1:*:*:*:*:*:*", + "matchCriteriaId": "D147AF4C-74C3-41AE-B5A5-24051AC1458B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc1:*:*:*:*:*:*", + "matchCriteriaId": "8F5DBC6B-2239-4349-A836-EFB8BA720145" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc2:*:*:*:*:*:*", + "matchCriteriaId": "B366BC5E-6845-40C3-9A2E-89BF99BC0C84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc3:*:*:*:*:*:*", + "matchCriteriaId": "96565E7C-0CE5-439C-9B81-551DC0B7CB9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc4:*:*:*:*:*:*", + "matchCriteriaId": "7547CA64-3DEC-4322-96CA-C732E132DC3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc5:*:*:*:*:*:*", + "matchCriteriaId": "8067F8FC-2183-4302-A7EE-29912E68F1A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc6:*:*:*:*:*:*", + "matchCriteriaId": "B1C2A606-5B3A-47C7-A94A-9BBA6E4B330F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2:*:*:*:*:*:*", + "matchCriteriaId": "200043CB-5676-4005-97B8-C95BCFF3EE0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc1:*:*:*:*:*:*", + "matchCriteriaId": "73A9B62D-47A5-41B3-8E7C-86DED14A230D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc2:*:*:*:*:*:*", + "matchCriteriaId": "923C9C51-206A-4C12-A60D-3E9DE7808BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc3:*:*:*:*:*:*", + "matchCriteriaId": "98CF1F86-BE1E-410E-A425-873081B9B353" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc4:*:*:*:*:*:*", + "matchCriteriaId": "34AD9B07-0C66-487A-9D32-A75C99852EE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone3:*:*:*:*:*:*", + "matchCriteriaId": "1DE8050C-59BA-4789-B211-7AC0D0E696BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone3-rc1:*:*:*:*:*:*", + "matchCriteriaId": "665BBA63-AF45-4B9F-BA0E-6C900E675270" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/yso9fr0wtff53nk046h1o83hdyb1lrxh", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json index 092c37e0b12..e393e242f65 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37528", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T03:15:02.450", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:49:28.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,389 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0.0", + "versionEndIncluding": "18.0.2", + "matchCriteriaId": "716DF694-558C-4115-B70E-E434602BA933" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0.1", + "versionEndIncluding": "19.0.3", + "matchCriteriaId": "00B3BADE-C2D9-40BC-BAD0-39FCA9FC563B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0.1", + "versionEndIncluding": "20.0.3", + "matchCriteriaId": "F99EDA35-605B-4AC3-AFFA-F6507F1DD8E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "AF7E2601-47E6-4111-9DE0-C3C01705884A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "AECC2FB4-0D29-45DB-AB55-B6C6C6A8BB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "B8F5E495-92A5-419D-884B-C82D6AA5B56B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "508939AF-58FC-4E12-B4E2-B11865B603F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "C5B419DE-4597-4A33-861D-5530BDA9E679" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "00EE653A-0EAD-489B-9610-6BEE3295AAEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "06B644E7-7EB2-4AB6-9D30-EA0602373FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "838846CB-8436-40D1-9C3B-FBA2426351E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "60AC2B63-2F8A-40E7-B2E0-4A06F79E1F7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*", + "matchCriteriaId": "A8D6EB68-3804-494D-B12A-2E96E31D1B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "21D8DE68-5651-4068-B978-79B28F2DC5D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "BBEA972A-A41E-44C9-8D35-1A991D3384B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "D3009F4E-7157-43D3-B6A0-2531CDE619BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "1DA97C23-9B80-4956-9873-317902A0D804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "1D0B6203-C775-4C5E-BAE9-C956E718F261" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "257A7A17-7EDF-4E23-88A6-216BC29EC467" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "26FF217B-1BD4-46E5-8023-2B2989FF7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "C60E58EA-C4D5-4D4D-8C9B-3EC33A7027E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_009:*:*:*:*:*:*", + "matchCriteriaId": "7817670E-5649-42A9-B5F9-7586D7AEB4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_010:*:*:*:*:*:*", + "matchCriteriaId": "FC7F85E8-8185-418A-B25F-8E64A58177DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_011:*:*:*:*:*:*", + "matchCriteriaId": "37616DCD-C26C-44EA-AA7F-732DC128FFE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_012:*:*:*:*:*:*", + "matchCriteriaId": "26CAC076-6FED-49E2-BF33-230F1D1195F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_013:*:*:*:*:*:*", + "matchCriteriaId": "5A88C56C-22CC-4791-BB33-C1494E7F41EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_014:*:*:*:*:*:*", + "matchCriteriaId": "12652B2E-307E-4568-920B-A869914ED650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_015:*:*:*:*:*:*", + "matchCriteriaId": "8F4E242F-BDF4-4CFE-B808-4A4B7A6FAD0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_016:*:*:*:*:*:*", + "matchCriteriaId": "88E736CF-CA6E-400B-9AE3-2C58D2265752" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_017:*:*:*:*:*:*", + "matchCriteriaId": "02488B2F-8D6E-4BDC-8DA9-45F5EBC42049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_018:*:*:*:*:*:*", + "matchCriteriaId": "854F4AF8-B712-446E-9DE1-A2496D5E9C1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_019:*:*:*:*:*:*", + "matchCriteriaId": "CF3F1B62-089B-41ED-AD3E-F31F8E967F18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_020:*:*:*:*:*:*", + "matchCriteriaId": "ABB843C3-F26D-43A5-AD3E-9D30D00339D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_021:*:*:*:*:*:*", + "matchCriteriaId": "42A67A28-CBF1-4C37-A217-F4789ED1850E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_022:*:*:*:*:*:*", + "matchCriteriaId": "BFEF1033-B100-400A-9B2B-94AEE3A7B94A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_023:*:*:*:*:*:*", + "matchCriteriaId": "5F109F93-1CE8-4F86-9070-73012ED0FE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_024:*:*:*:*:*:*", + "matchCriteriaId": "6CC66606-EE8D-4273-832A-4A0391B5DBAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_025:*:*:*:*:*:*", + "matchCriteriaId": "8CEF57DE-61D6-41E6-8C34-06A1F859F9AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_026:*:*:*:*:*:*", + "matchCriteriaId": "7C441A0C-5FE4-4F7A-8E88-85E198790D48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_028:*:*:*:*:*:*", + "matchCriteriaId": "9A6F6F2E-0ED8-4478-BFC5-92C736323A63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_029:*:*:*:*:*:*", + "matchCriteriaId": "1D823E07-4F45-4EBC-99AF-81C412330586" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_030:*:*:*:*:*:*", + "matchCriteriaId": "AE588317-A913-429C-88E8-059425506E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_031:*:*:*:*:*:*", + "matchCriteriaId": "B0E18893-9158-4712-B879-7ADD2EB619AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_032:*:*:*:*:*:*", + "matchCriteriaId": "DFBF74EF-1B70-4FDE-A13F-6695C72E4638" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_033:*:*:*:*:*:*", + "matchCriteriaId": "C3A5C102-A3D4-456D-B985-E556E37044A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F22E2017-86A6-4CD1-8192-7A5DF0A1D818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "31BC7CBD-C728-481C-AC5F-110FD7799B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "49793CE0-A419-4937-89B4-B6A8F0E22C0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "E7ABFE27-D890-4AF4-8686-296F4DB90F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "BE746B2B-EECA-4332-9A24-8EF23BDA1B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "CEE539C9-6AF2-4B02-8916-2AC7D4A93C2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "72743164-5279-4FB6-86EE-EBE5B8CD6D1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "517C5EDE-5104-4E22-B9C6-64DFBA7650C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "7A81368D-744B-4886-96C7-1755A27C0AAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "5B823170-57D5-4329-B41A-6C347982E00B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "AAE375C3-E995-415F-A349-A45998764910" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "A402E881-759D-4B59-985D-4DDA49327147" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "939B5364-0CF8-480A-B15A-B1FD9D9560EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "9BD80442-5DB1-44AC-B4FC-6EDF4162586B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "01632D44-1A4A-4C1A-A19D-8E815617B905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "12CE606B-49F1-425F-A00B-23E3C91CCB0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "581B838C-3242-46E8-B2A7-343734FEA3DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "287F9B5E-AD36-422B-80D5-9B51BA64F993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "0B20AAF4-0EC3-467A-96C6-102124A191DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0EA264AE-2691-4C84-BAB6-82BEECC7435F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "91E7E70A-765F-47EC-8DDD-82BFFE14A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "F3A493A2-6835-4A52-9C0C-1C828C3AF662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "F5D82427-AC22-4C48-9AC8-B1922082FDF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "0767E445-1D61-4879-AB3A-2E6259CF4AF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "BA3388C6-DFAD-403E-9699-305B2146B883" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294293", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159332", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json index a92e8d0925b..105554d8cce 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37770", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T18:15:04.983", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:53.090", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que 14Finger v1.1 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) en la funci\u00f3n de huellas dactilares. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios mediante un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/b1ackc4t/14Finger/issues/13", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json index fe85c75d67f..ec64506e7dc 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37829", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:14.770", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:05:54.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Outline <= v0.76.1 permite a los atacantes ejecutar un ataque de secuestro de sesi\u00f3n mediante la interacci\u00f3n del usuario con un magic sign-in link manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], "references": [ { "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-37829", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json index 5df147aab37..9bf7a9da6b1 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37871", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.767", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:05:55.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en login.php en Itsourcecode Online Discussion Forum Project en PHP con C\u00f3digo Fuente 1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro email." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/TThuyyy/cve1/issues/1", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json index e507090f670..494f90f67f6 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37999", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-08T11:15:10.487", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:44:57.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "productcert@siemens.com", "type": "Secondary", @@ -85,8 +105,18 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,10 +125,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:medicalis_workflow_orchestrator:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B41D288A-8939-4C75-94C9-F199CE866B20" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-501799", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json index 1e6c7a35fce..8f965cb98c7 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38071.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38071", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:40.677", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:47:39.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Licensing Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio Windows Remote Desktop Licensing" } ], "metrics": { @@ -36,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -47,10 +61,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7159", + "matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6054", + "matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2582", + "matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1009", + "matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json index 9b387f12fd1..eccd923f111 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38330", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T02:15:01.963", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:53:16.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/295227", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159615", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38534.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38534.json new file mode 100644 index 00000000000..e91fc5c9951 --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38534.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-38534", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T15:15:12.350", + "lastModified": "2024-07-11T15:15:12.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Crafted modbus traffic can lead to unlimited resource accumulation within a flow. Upgrade to 7.0.6. Set a limited stream.reassembly.depth to reduce the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/a753cdbe84caee3b66d0bf49b2712d29a50d67ae", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-59qg-h357-69fq", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6987", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6988", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38535.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38535.json new file mode 100644 index 00000000000..b944bbecdea --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38535.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-38535", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T15:15:12.557", + "lastModified": "2024-07-11T15:15:12.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Suricata can run out of memory when parsing crafted HTTP/2 traffic. Upgrade to 6.0.20 or 7.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/62d5cac1b8483d5f9d2b79833a4e59f5d80129b7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/c82fa5ca0d1ce0bd8f936e0b860707a6571373b2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-cg8j-7mwm-v563", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7104", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7105", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7112", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38536.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38536.json new file mode 100644 index 00000000000..e1885731193 --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38536.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-38536", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-11T15:15:12.760", + "lastModified": "2024-07-11T15:15:12.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. A memory allocation failure due to `http.memcap` being reached leads to a NULL-ptr reference leading to a crash. Upgrade to 7.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-j32j-4w6g-94hh", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7029", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7033", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json index 1a88171e887..a644c9ea6e1 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38959", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.040", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:03.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Creativeitem Academy LMS Learning Management System v.6.8.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de cadena." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40geetmadan22/reflected-cross-site-scripting-on-academy-lms-learning-management-system-product-4ab04ef51022", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json index 3374f3d211d..52f973a4ced 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38972", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:10.703", - "lastModified": "2024-07-11T03:00:24.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:04.187", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json index 9a583ff188f..9ee08e9e563 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38987.json @@ -2,16 +2,55 @@ "id": "CVE-2024-38987", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:04.717", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-11T15:06:05.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "aofl cli-lib v3.14.0 was discovered to contain a prototype pollution via the component defaultsDeep. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que aofl cli-lib v3.14.0 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s del componente defaultsDeep. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/29636943e6989e67f38251580cbcea73", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json index 4ff9e4515c4..c65c6ccf4af 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39001.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39001", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.397", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-11T15:06:05.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ag-grid-enterprise v31.3.2 was discovered to contain a prototype pollution via the component _ModuleSupport.jsonApply. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que ag-grid-enterprise v31.3.2 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s del componente _ModuleSupport.jsonApply. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json index cc9520a9d35..15bdd0c674e 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39018.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39018", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.950", - "lastModified": "2024-07-01T16:37:39.040", + "lastModified": "2024-07-11T15:06:06.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "harvey-woo cat5th/key-serializer v0.2.5 was discovered to contain a prototype pollution via the function \"query\". This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que harvey-woo cat5th/key-serializer v0.2.5 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n \"consulta\". Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/be75c60307b2292884cc03cebd361f3f", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json index 59a49f1dfc7..931a13d9278 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39071", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.237", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:07.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Fujian Kelixun <=7.6.6.4391 es vulnerable a la inyecci\u00f3n SQL en send_event.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Y5neKO/561a038dab8584c1448aad3013b9c2c7", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39119.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39119.json index dcfc8c8e735..7f731d672ec 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39119.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39119.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39119", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T13:15:10.850", - "lastModified": "2024-07-02T17:44:45.700", + "lastModified": "2024-07-11T15:06:08.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/info_deal.php?mudi=rev&nohrefStr=close." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de admin/info_deal.php?mudi=rev&nohrefStr=close." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2477231995/cms/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json index 2c9d596de86..e3d80e76319 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39171.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39171", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T17:15:48.367", - "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T15:06:09.273", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Travel in PHPVibe v11.0.46 due to incomplete blacklist checksums and directory checks, which can lead to code execution via writing specific statements to .htaccess and code to a file with a .png suffix." + }, + { + "lang": "es", + "value": "Directory travel en PHPVibe v11.0.46 debido a sumas de verificaci\u00f3n de lista negra y verificaciones de directorio incompletas, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo mediante la escritura de declaraciones espec\u00edficas en .htaccess y c\u00f3digo en un archivo con un sufijo .png." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://phpvibe.com", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json index 05a8a5e0080..57484066445 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39251", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T19:15:05.480", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-11T15:06:10.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el componente ControlCenter.sys/ControlCenter64.sys de ThundeRobot Control Center v2.0.0.10 permite a los atacantes acceder a informaci\u00f3n confidencial, ejecutar c\u00f3digo arbitrario o escalar privilegios mediante el env\u00edo de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-782" + } + ] + } + ], "references": [ { "url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/ThundeRobot_Control_center", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json index 355cf8436e5..91ee149b3b3 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39329", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T05:15:12.097", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:11.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.7 y 4.2 anterior a 4.2.14. El m\u00e9todo django.contrib.auth.backends.ModelBackend.authenticate() permite a atacantes remotos enumerar usuarios mediante un ataque de sincronizaci\u00f3n que involucra solicitudes de inicio de sesi\u00f3n para usuarios con una contrase\u00f1a inutilizable." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-208" + } + ] + } + ], "references": [ { "url": "https://docs.djangoproject.com/en/dev/releases/security/", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json index 8deddc7e438..a312fb508c9 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39723", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T01:15:12.283", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:54:10.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:storage_virtualize:8.6:*:*:*:*:*:*:*", + "matchCriteriaId": "42E2161E-7444-43FE-BA82-DA2103104A5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/295935", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159333", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39828.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39828.json index a53c7cbec10..ad526788cac 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39828.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39828", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T22:15:04.287", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-11T15:06:13.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "R74n Sandboxels 1.9 a 1.9.5 permite XSS a trav\u00e9s de un mensaje en un archivo de juego guardado modificado. Esto se solucion\u00f3 en una revisi\u00f3n de 1.9.5 el 29 de junio de 2024." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ggod2/sandboxels_xss_test", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json index 165de499054..f2eefff43a0 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39886", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.247", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:15.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n 3.4.2 y anteriores de la aplicaci\u00f3n TONE store contiene un problema con el canal principal desprotegido. Dado que la aplicaci\u00f3n TONE store se comunica con el sitio web de TONE store en texto plano, un ataque man-in-the-middle puede permitir a un atacante obtener y/o alterar las comunicaciones de la aplicaci\u00f3n afectada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-419" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN28515217/", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json index 58a821c0c03..f9d2f1b0a3d 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40035", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.450", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:06:18.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userLevel_deal.php?mudi=add." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/pangchunyuhack/cms/blob/main/60/csrf.md", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json index a09d05db09a..dec2c582b8a 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40036", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.527", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:06:18.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userGroup_deal.php?mudi=add&nohrefStr=close" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/pangchunyuhack/cms/blob/main/61/csrf.md", diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json index 81a0b7c6840..a089205816d 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40038", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.677", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-07-11T15:06:19.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userScore_deal.php?mudi=rev" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/pangchunyuhack/cms/blob/main/63/csrf.md", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json index 487845e13c6..99ab2ef87f1 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40328", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.497", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:20.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/memberOnline_deal.php?mudi=del&dataType=&dataID=6" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/Tank992/cms/blob/main/70/csrf.md", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json index 786afcb4a16..de704272555 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40333", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.680", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:21.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/softBak_deal.php?mudi=del&dataID=2" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Tank992/cms/blob/main/68/csrf.md", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json index 6b70daaaa05..480eda362b9 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40336", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T14:15:12.620", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:22.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "idccms v1.35 es vulnerable a Cross Site Scripting (XSS) dentro de la 'Image Advertising Management'." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Tank992/cms/blob/main/73/readme.md", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json index 6151affe5c3..6b588659d0e 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40726.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40726", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.110", - "lastModified": "2024-07-11T02:58:57.177", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:22.967", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json index 485b55d2f9e..587ba3260bc 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40727.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40727", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.187", - "lastModified": "2024-07-11T02:59:07.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:23.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json index 24be08954d2..4db138e2b9d 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40730", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.440", - "lastModified": "2024-07-11T02:59:34.663", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:24.660", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json index abd0587705f..227d6b01d99 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40731", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.520", - "lastModified": "2024-07-11T02:57:45.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:25.460", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json index e7b510bd552..3223103b258 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40734", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.787", - "lastModified": "2024-07-11T02:58:16.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:26.257", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json index 6f9bb086fbb..9d6e3d784d1 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40735", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.867", - "lastModified": "2024-07-11T02:58:27.747", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:27.070", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json index dc21f6581d1..cd030146a79 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40736", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:11.947", - "lastModified": "2024-07-11T02:58:38.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:27.890", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json index f956d805f7d..29c4d0b768f 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40739", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:12.187", - "lastModified": "2024-07-11T02:57:27.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:28.767", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json index 0c59b4dd381..487d7846bab 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40742", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T18:15:12.430", - "lastModified": "2024-07-11T02:54:19.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-11T15:06:29.580", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json index 4603267734e..b673f41b269 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5488.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5488", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-09T06:15:03.030", - "lastModified": "2024-07-09T18:19:14.047", + "lastModified": "2024-07-11T15:06:31.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento SEOPress WordPress anterior a 7.9 no protege adecuadamente algunas de sus rutas API REST, lo que combinado con otra vulnerabilidad de inyecci\u00f3n de objetos puede permitir a atacantes no autenticados deserializar cadenas de dispositivos maliciosos, comprometiendo el sitio si hay una cadena adecuada presente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json index 4d49d9d6ae4..e9de357064b 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5681", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T09:15:04.360", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:31.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json index a415e7da440..1ddcdd0dc32 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5711", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-08T00:15:01.940", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:54:55.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stitionai:devika:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01B28543-C82C-4AAE-9E6D-386DB7A6364F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/6c00ff84-574b-4b4f-bd58-aa7ec1809662", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json index 243abdc4e57..e9c40cb9574 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6026", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.987", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:33.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento Slider by 10Web para WordPress anterior a 1.2.56 no sanitiza ni escapa a algunas de sus opciones de diapositivas, lo que podr\u00eda permitir a los usuarios autenticados acceder a los Sliders (de forma predeterminada, Administrador, sin embargo, esto se puede cambiar a trav\u00e9s del complemento Slider by 10Web WordPress anterior a 1.2 .56) y la capacidad de agregar im\u00e1genes (Editor+) para realizar ataques de Cross Site Scripting almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/01609d84-e9eb-46a9-b2cc-fe7e0c982984/", diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json index 4634a1cf873..b65fb44fe62 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6138", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:03.083", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:33.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Secure Copy Content Protection and Content Locking de Wordpress anterior a 4.0.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9ef2a8d8-39d5-45d3-95de-e7bac4b7382d/", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json index e5f634e7505..5b8a7d46a94 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6229", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-07T16:15:02.013", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T15:03:15.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quivr:quivr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.0.281", + "matchCriteriaId": "722DE352-4E03-4519-BDB9-2DC6C56D4A83" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/2ee71e9e-2cf5-41a4-8440-d75758018786", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json index ddda139cad4..b62a3659a8b 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6235", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T19:15:11.973", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:34.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://support.citrix.com/article/CTX677998", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json index c8a9931c322..3f9c7933e5b 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6286", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:11.210", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-11T15:06:34.997", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://support.citrix.com/article/CTX678036", diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json index 5b669798769..0679b857958 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6387.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-01T13:15:06.467", - "lastModified": "2024-07-11T04:15:05.403", + "lastModified": "2024-07-11T14:15:13.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -567,6 +567,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/11/1", "source": "secalert@redhat.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/07/11/3", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:4312", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json index 399264b9429..66eb9ad1954 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6539", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-07T23:15:10.003", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T14:56:20.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,18 +140,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:heyewei:springbootcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-05-28", + "matchCriteriaId": "67885DB0-63EA-4857-BA6A-D863DFC25272" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/heyewei/SpringBootCMS/issues/IA9D7F", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.270450", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270450", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json index e01e0b50c75..24d91295190 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json @@ -2,16 +2,43 @@ "id": "CVE-2024-6602", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.473", - "lastModified": "2024-07-09T18:19:14.047", + "lastModified": "2024-07-11T15:06:37.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A mismatch between allocator and deallocator could have lead to memory corruption. This vulnerability affects Firefox < 128 and Firefox ESR < 115.13." + }, + { + "lang": "es", + "value": "Una falta de coincidencia entre el asignador y el desasignador podr\u00eda haber provocado da\u00f1os en la memoria. Esta vulnerabilidad afecta a Firefox < 128 y Firefox ESR < 115.13." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json index 6b52a44ca1d..1ca02e4d95c 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json @@ -2,16 +2,43 @@ "id": "CVE-2024-6606", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.727", - "lastModified": "2024-07-09T18:18:38.713", + "lastModified": "2024-07-11T15:06:37.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Clipboard code failed to check the index on an array access. This could have lead to an out-of-bounds read. This vulnerability affects Firefox < 128." + }, + { + "lang": "es", + "value": "El c\u00f3digo del portapapeles no pudo verificar el \u00edndice en un acceso a la matriz. Esto podr\u00eda haber dado lugar a una lectura fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox < 128." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902305", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json index 49cb4f480cf..4f49d76f7a5 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json @@ -2,16 +2,55 @@ "id": "CVE-2024-6611", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.047", - "lastModified": "2024-07-09T18:18:38.713", + "lastModified": "2024-07-11T15:06:37.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A nested iframe, triggering a cross-site navigation, could send SameSite=Strict or Lax cookies. This vulnerability affects Firefox < 128." + }, + { + "lang": "es", + "value": "Un iframe anidado, que activa una navegaci\u00f3n entre sitios, podr\u00eda enviar cookies SameSite=Strict o Lax. Esta vulnerabilidad afecta a Firefox < 128." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1275" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json index 6b14df11af4..0c80e6f1da7 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json @@ -2,16 +2,55 @@ "id": "CVE-2024-6612", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.107", - "lastModified": "2024-07-09T18:18:38.713", + "lastModified": "2024-07-11T15:06:38.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CSP violations generated links in the console tab of the developer tools, pointing to the violating resource. This caused a DNS prefetch which leaked that a CSP violation happened. This vulnerability affects Firefox < 128." + }, + { + "lang": "es", + "value": "Las infracciones de CSP generaron enlaces en la pesta\u00f1a de la consola de las herramientas de desarrollador, que apuntaban al recurso infractor. Esto provoc\u00f3 una captaci\u00f3n previa de DNS que filtr\u00f3 que se hab\u00eda producido una infracci\u00f3n de CSP. Esta vulnerabilidad afecta a Firefox < 128." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880374", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6679.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6679.json new file mode 100644 index 00000000000..91f3a458261 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6679.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-6679", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-11T15:15:13.273", + "lastModified": "2024-07-11T15:15:13.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in witmy my-springsecurity-plus up to 2024-07-04. Affected is an unknown function of the file /api/role. The manipulation of the argument params.dataScope leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271152." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/witmy/my-springsecurity-plus/issues/IAAHCR", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.271152", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.271152", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1b7904dc019..1b029285c26 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-11T14:00:19.780454+00:00 +2024-07-11T16:00:18.806565+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-11T13:58:33.960000+00:00 +2024-07-11T15:59:57.840000+00:00 ``` ### Last Data Feed Release @@ -33,44 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256676 +256682 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `6` +- [CVE-2024-28872](CVE-2024/CVE-2024-288xx/CVE-2024-28872.json) (`2024-07-11T15:15:11.377`) +- [CVE-2024-37151](CVE-2024/CVE-2024-371xx/CVE-2024-37151.json) (`2024-07-11T15:15:11.847`) +- [CVE-2024-38534](CVE-2024/CVE-2024-385xx/CVE-2024-38534.json) (`2024-07-11T15:15:12.350`) +- [CVE-2024-38535](CVE-2024/CVE-2024-385xx/CVE-2024-38535.json) (`2024-07-11T15:15:12.557`) +- [CVE-2024-38536](CVE-2024/CVE-2024-385xx/CVE-2024-38536.json) (`2024-07-11T15:15:12.760`) +- [CVE-2024-6679](CVE-2024/CVE-2024-66xx/CVE-2024-6679.json) (`2024-07-11T15:15:13.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `253` +Recently modified CVEs: `128` -- [CVE-2024-6385](CVE-2024/CVE-2024-63xx/CVE-2024-6385.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6397](CVE-2024/CVE-2024-63xx/CVE-2024-6397.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6407](CVE-2024/CVE-2024-64xx/CVE-2024-6407.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6410](CVE-2024/CVE-2024-64xx/CVE-2024-6410.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6411](CVE-2024/CVE-2024-64xx/CVE-2024-6411.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6421](CVE-2024/CVE-2024-64xx/CVE-2024-6421.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6422](CVE-2024/CVE-2024-64xx/CVE-2024-6422.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6433](CVE-2024/CVE-2024-64xx/CVE-2024-6433.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6447](CVE-2024/CVE-2024-64xx/CVE-2024-6447.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6501](CVE-2024/CVE-2024-65xx/CVE-2024-6501.json) (`2024-07-11T13:06:13.187`) -- [CVE-2024-6528](CVE-2024/CVE-2024-65xx/CVE-2024-6528.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6550](CVE-2024/CVE-2024-65xx/CVE-2024-6550.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6554](CVE-2024/CVE-2024-65xx/CVE-2024-6554.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6556](CVE-2024/CVE-2024-65xx/CVE-2024-6556.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6624](CVE-2024/CVE-2024-66xx/CVE-2024-6624.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6644](CVE-2024/CVE-2024-66xx/CVE-2024-6644.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6645](CVE-2024/CVE-2024-66xx/CVE-2024-6645.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6646](CVE-2024/CVE-2024-66xx/CVE-2024-6646.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6647](CVE-2024/CVE-2024-66xx/CVE-2024-6647.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6649](CVE-2024/CVE-2024-66xx/CVE-2024-6649.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6650](CVE-2024/CVE-2024-66xx/CVE-2024-6650.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6652](CVE-2024/CVE-2024-66xx/CVE-2024-6652.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6653](CVE-2024/CVE-2024-66xx/CVE-2024-6653.json) (`2024-07-11T13:15:10.147`) -- [CVE-2024-6666](CVE-2024/CVE-2024-66xx/CVE-2024-6666.json) (`2024-07-11T13:05:54.930`) -- [CVE-2024-6676](CVE-2024/CVE-2024-66xx/CVE-2024-6676.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-40333](CVE-2024/CVE-2024-403xx/CVE-2024-40333.json) (`2024-07-11T15:06:21.320`) +- [CVE-2024-40336](CVE-2024/CVE-2024-403xx/CVE-2024-40336.json) (`2024-07-11T15:06:22.143`) +- [CVE-2024-40726](CVE-2024/CVE-2024-407xx/CVE-2024-40726.json) (`2024-07-11T15:06:22.967`) +- [CVE-2024-40727](CVE-2024/CVE-2024-407xx/CVE-2024-40727.json) (`2024-07-11T15:06:23.850`) +- [CVE-2024-40730](CVE-2024/CVE-2024-407xx/CVE-2024-40730.json) (`2024-07-11T15:06:24.660`) +- [CVE-2024-40731](CVE-2024/CVE-2024-407xx/CVE-2024-40731.json) (`2024-07-11T15:06:25.460`) +- [CVE-2024-40734](CVE-2024/CVE-2024-407xx/CVE-2024-40734.json) (`2024-07-11T15:06:26.257`) +- [CVE-2024-40735](CVE-2024/CVE-2024-407xx/CVE-2024-40735.json) (`2024-07-11T15:06:27.070`) +- [CVE-2024-40736](CVE-2024/CVE-2024-407xx/CVE-2024-40736.json) (`2024-07-11T15:06:27.890`) +- [CVE-2024-40739](CVE-2024/CVE-2024-407xx/CVE-2024-40739.json) (`2024-07-11T15:06:28.767`) +- [CVE-2024-40742](CVE-2024/CVE-2024-407xx/CVE-2024-40742.json) (`2024-07-11T15:06:29.580`) +- [CVE-2024-5488](CVE-2024/CVE-2024-54xx/CVE-2024-5488.json) (`2024-07-11T15:06:31.120`) +- [CVE-2024-5681](CVE-2024/CVE-2024-56xx/CVE-2024-5681.json) (`2024-07-11T15:06:31.987`) +- [CVE-2024-5711](CVE-2024/CVE-2024-57xx/CVE-2024-5711.json) (`2024-07-11T14:54:55.473`) +- [CVE-2024-6026](CVE-2024/CVE-2024-60xx/CVE-2024-6026.json) (`2024-07-11T15:06:33.000`) +- [CVE-2024-6138](CVE-2024/CVE-2024-61xx/CVE-2024-6138.json) (`2024-07-11T15:06:33.753`) +- [CVE-2024-6229](CVE-2024/CVE-2024-62xx/CVE-2024-6229.json) (`2024-07-11T15:03:15.233`) +- [CVE-2024-6235](CVE-2024/CVE-2024-62xx/CVE-2024-6235.json) (`2024-07-11T15:06:34.163`) +- [CVE-2024-6286](CVE-2024/CVE-2024-62xx/CVE-2024-6286.json) (`2024-07-11T15:06:34.997`) +- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-11T14:15:13.510`) +- [CVE-2024-6539](CVE-2024/CVE-2024-65xx/CVE-2024-6539.json) (`2024-07-11T14:56:20.733`) +- [CVE-2024-6602](CVE-2024/CVE-2024-66xx/CVE-2024-6602.json) (`2024-07-11T15:06:37.333`) +- [CVE-2024-6606](CVE-2024/CVE-2024-66xx/CVE-2024-6606.json) (`2024-07-11T15:06:37.647`) +- [CVE-2024-6611](CVE-2024/CVE-2024-66xx/CVE-2024-6611.json) (`2024-07-11T15:06:37.977`) +- [CVE-2024-6612](CVE-2024/CVE-2024-66xx/CVE-2024-6612.json) (`2024-07-11T15:06:38.870`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 816b10952d3..53c7f95e4c2 100644 --- a/_state.csv +++ b/_state.csv @@ -84902,7 +84902,7 @@ CVE-2016-15035,0,0,5f6755d7b8954f99c8a59408f8f16acc9729e5934625607c92e47840a2d0d CVE-2016-15036,0,0,07076d7b6b10f11ba8defba36693bfe2d329aebd04146af9943b1b990af8b465,2024-05-17T01:08:11.543000 CVE-2016-15037,0,0,e0996f3d56e274837426785f5955d0b2f7859ba2600e75ebae6c454114cc0a21,2024-05-17T01:08:11.653000 CVE-2016-15038,0,0,2c93ba0fce36fab919c92b8d09cb4236abbe9a996dbd0e62367874b5ee0f8d0b,2024-05-17T01:08:11.777000 -CVE-2016-15039,0,1,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000 +CVE-2016-15039,0,0,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000 CVE-2016-1504,0,0,e4a5917b190636ab893bfc336d7dce867e27774f351fdae2d20038ff8cc1cac6,2017-09-10T01:29:11.687000 CVE-2016-1505,0,0,603189ae235a59230e4b76c2a9840be41f6129fa2273d823a3008d11b5c9719c,2016-11-28T19:59:55.070000 CVE-2016-1513,0,0,d5c8130dd11ed8123fd26cdd3a19657509909f00f1eaa4a6cfd6e8ec49e54760,2017-09-01T01:29:04.507000 @@ -156057,7 +156057,7 @@ CVE-2020-27349,0,0,ef3b2d3e612e690132545938179929f176a6ba136a61ce8e2ba5a0f22d8d5 CVE-2020-2735,0,0,5ed2dcc843c2aa0f70c01b3b04a7d2d4a91ff944b2732397fc6241efa2aaecff,2020-04-16T13:46:11.010000 CVE-2020-27350,0,0,af17d465acd51bc162bfc23e932ea96c98e49e911a17cd3c85b21ce58f1c65ff,2022-10-29T02:41:36.810000 CVE-2020-27351,0,0,23ce876d0cc9cd7447f4adbd408d27289c1b3011c303be7d699e76c691aa1761,2020-12-14T19:56:18.940000 -CVE-2020-27352,0,0,775271b331d443f05f3811969b3f2c16758eb8ecfab950785d2d834fec0c4dac,2024-06-24T12:57:36.513000 +CVE-2020-27352,0,1,4a70666608c218604060a87760bcd82635c9b6aa8ee6362064961aef35a9390d,2024-07-11T15:05:04.077000 CVE-2020-27353,0,0,dc1a7f42a9a4f966e49a5b6386fd9687eba1eac037e40cb29822574f6ad4b163,2024-06-04T23:15:09.320000 CVE-2020-27354,0,0,45dbf196c098dca554d5a1355d73bf4a1e889b5e4842af65035d79e289fb9b14,2024-06-05T00:15:09.547000 CVE-2020-27355,0,0,a2f55d973e1e8b65f87c5f3fb63316f566dec73ca1e0dd417dfb723f7fe99ad0,2024-06-05T00:15:09.617000 @@ -215077,8 +215077,8 @@ CVE-2023-2111,0,0,d12d5f611db0242bd01d273fc25ed4662a5b74f898d00cba13175efbdabffa CVE-2023-21110,0,0,448ddc060967179af5f5445c64778306c0c9a48146f8ea2fee78ebb2928a75ff,2023-05-24T00:17:35.097000 CVE-2023-21111,0,0,d60f776dfb5277938c8722afaebc3eb264ed711fa330444195ba603c0daaff4f,2023-05-24T00:17:46.907000 CVE-2023-21112,0,0,ee13324abf0bee556eff0ebb74c1e3be9486125c43aac96832142a9bcc1f3d24,2023-05-24T00:17:58.943000 -CVE-2023-21113,0,1,e33a8e1bd748d106b05f0015e5d19fc248022d081f864d70b8b9d72d234394df,2024-07-11T13:06:13.187000 -CVE-2023-21114,0,1,3e2df9d97c140daf83c88d8dfcfaa1f66ada4aa6ce27284c95d2768b9e9d76dc,2024-07-11T13:06:13.187000 +CVE-2023-21113,0,1,5c37ad87c9b9d0755705ea4fe1325214a1e2dc34c7f084bb3023bc3e357f4208,2024-07-11T15:05:05.923000 +CVE-2023-21114,0,0,3e2df9d97c140daf83c88d8dfcfaa1f66ada4aa6ce27284c95d2768b9e9d76dc,2024-07-11T13:06:13.187000 CVE-2023-21115,0,0,5f0194f44da9d9dffdb3c52699125e67e44517f46e47e4143ed7d72707ea546d,2023-06-22T20:53:57.617000 CVE-2023-21116,0,0,5bb72a77f614dd0419d663f693bea7386f42d3fd276c840566406d377360d6b2,2023-05-24T00:19:34.900000 CVE-2023-21117,0,0,75076827c928422e1c5aaeadd94174d05b64dbe6000f0904a8c2f73aa31b477b,2023-05-24T00:19:55.867000 @@ -220225,7 +220225,7 @@ CVE-2023-2743,0,0,07b5a1c1e632fc4cdb18a39b75e7c4456f8da5a73c1bdd9433c488aa795a0d CVE-2023-27430,0,0,65eb7158f195bcc2c82ad775125f60030b17d50e1516069cabe1611b0e9f9a02,2023-05-25T16:24:02.267000 CVE-2023-27431,0,0,055078c928111b4649a91146745522f0449cba599662a5605c45451998d1cc4d,2023-11-17T20:05:40.023000 CVE-2023-27432,0,0,8adffe7598efe8015c93cb88d4fa8bef03c06a1fd1676f56c2e5184e44d8011c,2023-06-28T14:31:07.147000 -CVE-2023-27433,0,0,3045b3551ed1a5092615ea5e785bb397052b8e244e62503c0c4d2cb821f3ceca,2023-10-05T18:10:37.703000 +CVE-2023-27433,0,1,951dbac110451bc5a3ee59ef47264d2914ff05bdd9acb055089bc57d6f25bcbb,2024-07-11T15:15:10.777000 CVE-2023-27434,0,0,462c3c599d83cf9ae5823c6d5e1762e1796f02e0e807cdaa10107961c3a09993,2023-11-17T00:59:13.110000 CVE-2023-27435,0,0,9ee0b26a24164b052dac2fde1a8fceeb40edf049c8cd3b0e7bc5bb12f980dd61,2023-10-05T00:59:40.313000 CVE-2023-27436,0,0,f31d3fc11015ca4a7adce5a26895bf22e2c6d4b93493f8cf48744663acdba6ff,2023-11-15T19:09:41.087000 @@ -223968,7 +223968,7 @@ CVE-2023-32290,0,0,9c4bb9817d78cee1b4574799ae72138f302978bce52c75e2a5c9735dd6937 CVE-2023-32291,0,0,b13582f6df765cf66559182b3cdbd9631340010ec8805f1c99c883fb7685c7b7,2023-12-05T19:18:51.637000 CVE-2023-32292,0,0,5f53c5c7d966a0756c5fa881e0bb188a78cf08738ea5ab4c0cc95dd712222b6e,2023-08-10T03:49:42.763000 CVE-2023-32294,0,0,52188b6bff693079d9ac6f474f38cd8885c0cb6e0c4880457891953576a8f607,2023-09-01T12:06:38.193000 -CVE-2023-32295,0,0,8b3db94b4f7a1a75a89fabb248bab94538da321a01ea4b81c3c6d75720fde60f,2024-04-11T12:47:44.137000 +CVE-2023-32295,0,1,e50c5ab2206bf00b4f1d11ead479c3811757b66e885bebabf6823b11a1f495da,2024-07-11T15:15:10.923000 CVE-2023-32296,0,0,f03a8ea514506a3657b7ae5de5b3e2a51319bb9a0207095e8feafa10f654e241,2023-09-06T22:33:10.717000 CVE-2023-32297,0,0,6f90250aa340a8e57a797df0e623c259d7306f972ae3fcdd367550a5afb2a55d,2024-05-17T18:36:05.263000 CVE-2023-32298,0,0,ec209ee8ba235a06176757af041551cbc9f28aa90a1f2823c42aac846023b685,2023-11-15T16:17:11.723000 @@ -224142,12 +224142,12 @@ CVE-2023-32462,0,0,eab2cc777f5f85ff8761fc5ee995015987757ab93fcac3a65c326245e954e CVE-2023-32463,0,0,9750a40673a889b305f0c4be828913a0f978fe411a5f873158462587e5fdf8bb,2023-07-05T18:33:55.533000 CVE-2023-32464,0,0,5fe2a9e1b1f81ef3f88c0262e22a6a1c5106aec3f427b2176f1d8e930059f067,2023-07-05T18:31:27.907000 CVE-2023-32465,0,0,e56dba3ebf14206bdb73c754f1f8af12f0ace8b2e1fe4dc4b333a99274e40b9d,2023-06-27T18:39:23.987000 -CVE-2023-32467,0,1,92dc670a37cbc195f9aee3f2f699c2fc979d516f1a92fbab736ae2a84445b2ab,2024-07-11T13:05:54.930000 +CVE-2023-32467,0,0,92dc670a37cbc195f9aee3f2f699c2fc979d516f1a92fbab736ae2a84445b2ab,2024-07-11T13:05:54.930000 CVE-2023-32468,0,0,95553f3bae45678b28547c1e48060456ffe7d76cdf483b9ffbc527fabbd48ded,2023-08-03T18:23:50.197000 CVE-2023-32469,0,0,c64f718d771da097b11fa482f724641a50f58bd141ecdac8ef1bd9ca3a93bed7,2023-11-29T19:49:42.947000 CVE-2023-3247,0,0,944c7a9512d0302f40ba18a4d82c1511a534aceb1c4dea9f4a52b787f5bc6104,2023-08-01T16:38:09.033000 CVE-2023-32470,0,0,cf1fb93bb33344b250fa425962be9282d4e9421bfa05744d38e6fb334ebf28ff,2023-09-13T14:37:24.530000 -CVE-2023-32472,0,1,17c2725f723be369591982ed957fd026847faf3ab703e66da6749f40fa5279fc,2024-07-11T13:05:54.930000 +CVE-2023-32472,0,0,17c2725f723be369591982ed957fd026847faf3ab703e66da6749f40fa5279fc,2024-07-11T13:05:54.930000 CVE-2023-32474,0,0,14a7699c96745d2416031df6a87cf303ba86dd81dec884626035282f55099052,2024-02-12T21:37:18.687000 CVE-2023-32475,0,0,8c9b75a20cacd369537034b8fdc6625a4373f1930eb22b83c7d55f78ffd4aa79,2024-06-07T14:56:05.647000 CVE-2023-32476,0,0,f67bfea26297a4cf8c38d5da9786d71b4b8bf1feb4789219a97bb09d5d395732,2023-07-31T17:05:59.917000 @@ -225232,9 +225232,9 @@ CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f CVE-2023-33852,0,0,9cade17d8693f1f4f6baf9b9d4a1a8123b0b3429328184d9655006f7fa78cf0e,2023-08-29T04:43:06.033000 CVE-2023-33855,0,0,17ac4bf5200859893273c798dc7f507d8e5d9d64163eb854ccb4f56258ca20de,2024-03-26T17:09:53.043000 CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000 -CVE-2023-33859,0,1,c7cc13c3bc19312b4eaa2b099e45cecd963259cc049d6c464b855eccb359a400,2024-07-11T13:05:54.930000 +CVE-2023-33859,0,0,c7cc13c3bc19312b4eaa2b099e45cecd963259cc049d6c464b855eccb359a400,2024-07-11T13:05:54.930000 CVE-2023-3386,0,0,872a3b5c10573eee32389d7c2bf09336080231a152241c899e232932e7ac2ac3,2023-08-11T16:11:22.257000 -CVE-2023-33860,0,1,c93725535a9bcd2c5b529956a43c8b730be8a858d9dd2aa0f8db3c7bbd5fe8e2,2024-07-11T13:05:54.930000 +CVE-2023-33860,0,0,c93725535a9bcd2c5b529956a43c8b730be8a858d9dd2aa0f8db3c7bbd5fe8e2,2024-07-11T13:05:54.930000 CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000 CVE-2023-33864,0,0,9481dfccd6fe8fdcdd0fcd5f02ea2fabd7fad2be5bcb7372ae3096a97b3c6781,2023-11-25T11:15:17.167000 CVE-2023-33865,0,0,aba50454b3ae1b2e832808aadc91ca844709ba77db2f1cee74f3d27e5665bb50,2023-11-25T11:15:17.330000 @@ -226062,7 +226062,7 @@ CVE-2023-35002,0,0,fe12ccb8bd97235210aebea5be03bce6254267bf1013ba6d79abbce08247e CVE-2023-35003,0,0,4135b9bdc89a20c0a5b2dafe212a17a0f9cd213c7f1250dbab5a1bb73e6f93a8,2024-02-14T15:01:51.137000 CVE-2023-35004,0,0,d259e19e9f7a9fba09237442776813d3786c9bc18124ea7c0d957372aafcd7f6,2024-04-09T21:15:08.400000 CVE-2023-35005,0,0,def0a84bcddaa69534d8f10559173ed218f141a47d49dd319c3a3169cd9b94a4,2023-06-27T09:02:07.793000 -CVE-2023-35006,0,1,843f81e8cb059793ea8530c64cb22aa7c97430cb87594f70ab3476ec1d0a2b10,2024-07-11T13:05:54.930000 +CVE-2023-35006,0,0,843f81e8cb059793ea8530c64cb22aa7c97430cb87594f70ab3476ec1d0a2b10,2024-07-11T13:05:54.930000 CVE-2023-35009,0,0,4109f92cb7f04882600b2a8c379d296f7fcfab4968ecdf01419b719c21d0bdb6,2024-06-21T19:15:27.300000 CVE-2023-3501,0,0,c9247f16d40d69a821ba4e49f3680c600256e23f0493f65695c4e557d0faf63d,2023-11-07T04:18:51.230000 CVE-2023-35011,0,0,dc06ad65c66503868c60f22446a7b38facc47e1cc19d43996ae8e169ec4d9e0c,2024-06-21T19:15:27.467000 @@ -231315,7 +231315,7 @@ CVE-2023-41910,0,0,ddadb74f9e50737d21120f0b88022d8c15ee68cc56eb3c4577229fb7986d3 CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3be67,2023-10-02T19:02:19.277000 CVE-2023-41913,0,0,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000 CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000 -CVE-2023-41915,0,0,ca0a079d97dd9f25e9b1363dbc30e209a10f89677e357ff69efeae8b50de45f1,2024-07-10T23:15:09.923000 +CVE-2023-41915,0,1,eb4af7dc255b20820c2223dbb394a71a5ac4fe4f18ba74d3375c99078da8c66c,2024-07-11T14:15:12.997000 CVE-2023-41917,0,0,f3161e8d6c620e45be8c901747b972f5e1c375ee92e6d63bc7e00bef339a5387,2024-07-02T12:09:16.907000 CVE-2023-41918,0,0,0856e5fa41285db5b029ff0214e8d51ede0087304c24a711546183f0175c9d9e,2024-07-02T12:09:16.907000 CVE-2023-41919,0,0,6807d33f550dbbb2d90b8f4fce9a8f7ee1053b0fb9f312837bd90277e545973a,2024-07-02T12:09:16.907000 @@ -233234,7 +233234,7 @@ CVE-2023-44847,0,0,cba49a1b873fc30915efb8b7d052a6a483d978ab292b88a5e114d71f695d5 CVE-2023-44848,0,0,ef0da9d1fa134d505d1ced9ba257af557396c56666a8441aefa38c3f9ad924a0,2023-10-14T02:16:39.717000 CVE-2023-4485,0,0,f8ddff49f1e88d9dc86aeb03ea04462ca070eb6b7438f7849aaa70421f6eaac9,2023-11-07T04:22:39.683000 CVE-2023-44852,0,0,d87cc9879129c666974e65587e1ef13aaf22606e4d0f460d3eb6bbe915f83140,2024-04-12T12:43:46.210000 -CVE-2023-44853,0,0,bf03c230d0b4355dd84043746661e667426fd45ab3b65003e02a2b12657fb75b,2024-04-12T12:43:46.210000 +CVE-2023-44853,0,1,063d78de1e79f39a8a7ba8b021087b2fe317ac5c06b40bbf2260beeeda1a9bd3,2024-07-11T15:05:11.010000 CVE-2023-44854,0,0,022cfa266bd41555241c52fee709741d2a44ad3cf7d945d89a15ad185ec4847c,2024-04-12T12:43:46.210000 CVE-2023-44855,0,0,25f61c2b7922b96b8465d95bc00ce7701b948783d451a1e6fcafb1cfa3862d16,2024-04-12T12:43:46.210000 CVE-2023-44856,0,0,e55c1477812be3a3227ba8ae233cc5dc3f767f5e974aca63fee6ab5d3f5eb07f,2024-04-12T12:43:46.210000 @@ -233734,7 +233734,7 @@ CVE-2023-45647,0,0,2f23ecc0cd5c4bff54e92afced818834abe3bc7324454a0567d468ca5ef8a CVE-2023-45648,0,0,2ce1650a5ad84a003327145dd1e95acaad922f0b8931f62a9005cd79e6adc7fa,2023-11-04T06:15:52.537000 CVE-2023-4565,0,0,f507437a4bf315d5d5f78ae5f152f50807cf0a9438aecd5a51435557389ffe5c,2023-09-29T19:48:19.453000 CVE-2023-45650,0,0,d29bc0a4bb51fcd21278115b410401d195852a6805bc43c1e9fc1ed8a33e6675,2023-10-18T20:53:00.570000 -CVE-2023-45651,0,0,15e64110aa556e229de38766d7790175d50ebceedee5fee33314843c5c912a04,2023-10-19T17:30:00.853000 +CVE-2023-45651,0,1,0bfa8e75355b1784b49583fe7c6c3e05b6a12bcc39fde25860f8221a151186c2,2024-07-11T15:15:11.087000 CVE-2023-45652,0,0,6a80c262c9b1000a8feeec1c2abf75fa0ec61ee524feb894b7274cde77a28e45,2024-05-17T18:36:05.263000 CVE-2023-45653,0,0,02e6b84094cc8a18954e8c903f97d13dcc4d334b9119f705dc862314e650f8c6,2023-10-19T17:37:04.863000 CVE-2023-45654,0,0,14e88a4b5268c9d4c04bc136c1aabbb60d4c48be7be5d19bf745091c19b77153,2023-10-19T17:30:30.677000 @@ -233960,7 +233960,7 @@ CVE-2023-45912,0,0,e7b70d01df1e6b7ed29be6cef3a5d24a0188fc4204e45db25f76f5dd91970 CVE-2023-45913,0,0,c40f74c949ae9bbaacc006842b23c4c8c294fca4f9f7192a77c5c9b000ec2e25,2024-05-17T02:29:56.590000 CVE-2023-45916,0,0,b4de35a31730ce89637c5d93cae2af2c0f6956624ee8cf845871fb361731df75,2024-01-29T09:15:42.327000 CVE-2023-45918,0,0,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000 -CVE-2023-45919,0,0,76624af09e7eb3e2fd86daaf58f5891516a97a78ab5ada8d89a292a3d7ad81d7,2024-07-10T15:15:10.657000 +CVE-2023-45919,0,1,361cd7e9ce845b4e9456ae752dbd705f9bb9fd91d71c77fb14877567e5b19231,2024-07-11T15:05:12.067000 CVE-2023-4592,0,0,81f9ec9c7754df484556128f55402d2b2e5da813e76693d6a2e51c67954d6e8c,2023-11-13T18:46:52.950000 CVE-2023-45920,0,0,65d7d2ce0a0262772d3ab5884e97ff83a6493f02729ce45348dc60f1281d548d,2024-05-17T02:29:56.793000 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 @@ -235491,7 +235491,7 @@ CVE-2023-48188,0,0,215b3c362c06f3f67c5f56adafe9b5433496acde9c1298c239fef4711454e CVE-2023-4819,0,0,486c1da204e823d4e3904d929a1e95095c2adfb2e9e8d41b10f2b239f97150b3,2023-11-07T04:23:00.223000 CVE-2023-48192,0,0,1285879b16abdcafa4a056b0a2ae5a60d7ab03d27d3ea5f474efd527a8dd754e,2023-11-29T18:00:50.257000 CVE-2023-48193,0,0,8f22f6af3b763f3aba623fad3c683ebc180c071d282e0bec208eec47a39f0489,2024-06-11T12:15:13.230000 -CVE-2023-48194,0,0,0c6d42266de4eb7c20a055d02569950d5ec38beaeccc92c11e22fb9c36c05426,2024-07-09T18:18:38.713000 +CVE-2023-48194,0,1,365d374bde68242877916b88e49a16d441b185aac65f163a5771b94cc11b811a,2024-07-11T15:05:13.020000 CVE-2023-48197,0,0,31a398840f5127471e0f8ae2cf500de34989ec8d6ef4a8f37794761f9d27492f,2024-01-24T22:15:14.793000 CVE-2023-48198,0,0,6b14067601810d1ec0f8423179bbed0cc917124b62a5a8159de8ad1221e064ad,2023-11-28T21:15:08.420000 CVE-2023-48199,0,0,f91afcad18bf76cb6985296ef753eff7492fd44ba7cdd52526fa9c10ee40f6b8,2023-11-28T21:15:08.477000 @@ -236603,7 +236603,7 @@ CVE-2023-4959,0,0,04db776c6e31210f290cf97982ae47bf29a6d42dd4d4d0f864bc08235a6128 CVE-2023-49590,0,0,ddfdc43cd5584b08ea9e208c1444e6b35b5f2b81e80559573e79c58207eede29,2024-02-14T18:15:46.350000 CVE-2023-49593,0,0,aa321d9e624b8608ab5a453435f6f3a4a1d6a9e2f9f1c15d4e6348f907202b5f,2024-07-08T16:35:46.377000 CVE-2023-49594,0,0,964827d2c50b016923e83500e345b8daef35686b1d4d840606c086c6b703ab4a,2024-01-17T21:15:11.147000 -CVE-2023-49595,0,0,5a0c84d7df2e48dd6c52865854a8e2ae31b2561739411366a13288322a38f091,2024-07-08T16:35:46.377000 +CVE-2023-49595,0,1,c6917dcc72f60ca3a333757882a5eff6b2e1ca248259929e1469e25039b78fae,2024-07-11T15:59:57.840000 CVE-2023-49598,0,0,f21311a5870d33c6d00267bfb1edabf32c3f3d36935aaf458c13cbd552a1dbd2,2024-01-02T19:53:48.547000 CVE-2023-49599,0,0,26bc9ca331158350ffd55dbb3e19c0f5df4aa8eba07f3e59287b262d3f247262,2024-01-17T15:14:39.320000 CVE-2023-4960,0,0,ead2f6df7dc3ef62ad43e7bf5719f8fc950bb797ad00a312f90d4c48e90fdf03,2024-01-17T21:53:01.497000 @@ -236802,7 +236802,7 @@ CVE-2023-49860,0,0,373519125ffb9c375bd014db34920580177bc9208316faad877ca23c0b31f CVE-2023-49862,0,0,b48c0031bf43a748157b60072996a94dfd5c2f37946ee88a1fb9c56e12c9b291,2024-01-18T19:29:20.003000 CVE-2023-49863,0,0,02932461837ce456e599d5347619281544005ffbba312276b5b236b220eeddfa,2024-01-18T19:29:12.637000 CVE-2023-49864,0,0,caabff878c529f0de9ad070f34f3da9e4e25da81db8eed5ca57b2e85ad84de42,2024-01-16T21:11:59.307000 -CVE-2023-49867,0,0,cee2bb9046757f3ab366263d21a3011ae28c276d654723be056235ca4c6172a5,2024-07-08T16:35:46.377000 +CVE-2023-49867,0,1,f313b9d1adf8384b8d25cb4b4edfb5da10a8f43d17c6572cc713a9b0d68f0052,2024-07-11T15:59:27.847000 CVE-2023-4987,0,0,6c85a8c092ecab1ac4cb37aecee0b86761640468ebdbeb60edc4f55c433fd0c3,2024-05-17T02:31:55.033000 CVE-2023-49870,0,0,74783182470b5eb8192c29f0ef755b48ea457cf10c7cbda36d22882767980c7b,2024-02-14T18:15:46.540000 CVE-2023-49872,0,0,c064128b855406dab2d7e88bf3052013420271344e257d0e801d0aaf4ff967d6,2024-02-14T18:15:46.573000 @@ -237032,7 +237032,7 @@ CVE-2023-50233,0,0,b78609742e0f2f28c0d20a9f01a3025a3d74afcc84015bd692a7bd902e47c CVE-2023-50234,0,0,34879917d77735cb709dd5cf4e2dc1a880a8e42fb2c03ed7e54ab6aee874b96d,2024-05-03T12:48:41.067000 CVE-2023-50235,0,0,2898a8d8b9820b4b30273b2a7b7a493d28a5c0203f1186de63a56bcb89255a23,2024-05-03T12:48:41.067000 CVE-2023-50236,0,0,edc68c5e15a12b128eacbb1e47de53200421bba3b688b99fca6704aa07a019ca,2024-05-15T08:15:08.960000 -CVE-2023-50239,0,0,3746bbdfd0e207743a04e1105610cb82832a158dbfa816aab8d07faaff724f41,2024-07-08T16:35:46.377000 +CVE-2023-50239,0,1,540930db115af7f87134e906befaa7ec7527e7dd0d86de2cbe4d18bccc8927c7,2024-07-11T15:59:15.867000 CVE-2023-5024,0,0,e51cd3c3b038e9c6a8d52d79cbdffe449e2e9109436211521e3c1c359b69ccd9,2024-05-17T02:32:47.150000 CVE-2023-50240,0,0,5d8f0f0b4bdaf1f03ad84a263a7c136f76bfc9780a7beb62d7bab75579dd1694,2024-07-08T16:35:46.377000 CVE-2023-50241,0,0,cb6ea0c539af061e121d50db536df839f4f28a81636f344882c80f8398fe2f49,2024-02-14T18:15:46.677000 @@ -237314,9 +237314,9 @@ CVE-2023-5079,0,0,08ac6672159acf69cea4333ef87da7c32cafd59333c06b74d19b42baa7321c CVE-2023-5080,0,0,6a142fa9fe4d669768c0073981351de1258996b6b98c92dd7c3370c182d5051a,2024-01-26T16:02:33.997000 CVE-2023-50803,0,0,e0245185683406393930132a94b475da6a0b1d1d07df0fd68bc97ce9d56e1e90,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,75c8b32f1c902851b302714bc7a121b33ef1436156799cadcb21e4914ed2667f,2024-06-27T16:42:15.310000 -CVE-2023-50805,0,1,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 -CVE-2023-50806,0,1,3547c11b59f1afe32844b435d6c53cf2a17d1394d992f9af5af7f027196a3108,2024-07-11T13:06:13.187000 -CVE-2023-50807,0,1,670af15057c6d47869199992423ff86549ddb3071bc2a69df366817727a5452c,2024-07-11T13:06:13.187000 +CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 +CVE-2023-50806,0,1,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000 +CVE-2023-50807,0,1,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6db7e,2024-02-13T18:23:02.393000 CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000 CVE-2023-50811,0,0,e4d21463d439be20b918caa6cf8d80372ece22f0ede7a7aef6305c4c982019a5,2024-04-29T19:52:21.503000 @@ -240028,7 +240028,7 @@ CVE-2023-6489,0,0,8be5137422e44d9e775f7530defb6286a84af9abdf8da8a38a11072ad60f9c CVE-2023-6491,0,0,cdf7c06784d4d39eba71b6fb1604eda595538e62c28add78cc43a71a5a4b75fd,2024-06-07T14:56:05.647000 CVE-2023-6492,0,0,202ca7b5bc9878cc8ce748874f3e7b02ae4737632c455777af5a1838eccbc49d,2024-06-17T12:43:31.090000 CVE-2023-6493,0,0,f1b44774d19dee2dde0db6057c1c8da6a9052c466b0c843005cf7e84e74e5bad,2024-01-10T15:10:40.807000 -CVE-2023-6494,0,0,e84577867db064082c4fbb5b749302fb02213f52d6d8e07c0caef285009cb8e8,2024-04-15T13:15:31.997000 +CVE-2023-6494,0,1,80dcbf3f6d7d049ebe223948e82130bdff4600f7af5680262795b83b3fc9c537,2024-07-11T15:05:17.510000 CVE-2023-6495,0,0,1666fb84290d79451fa115e60c1f7722eb45964f03f7f090509d5d4ec773b462,2024-06-20T12:44:01.637000 CVE-2023-6496,0,0,87b56518aaf4afd4545cd371dac346e93b19b056714958fa1a42154914cf88c5,2024-01-17T20:24:42.663000 CVE-2023-6497,0,0,5c328723b0d6eb2b6ecefa341ec54fae28ffb5f772896759b50e3e0ea4100eb7,2024-02-01T04:14:30.527000 @@ -240294,7 +240294,7 @@ CVE-2023-6809,0,0,da849ebc66bf4be9594f5a16c6489da06b73ea4d1114ad0ea42cbcbd1d5557 CVE-2023-6810,0,0,3101b378ed04a5c8247ef1debed918ebc9eb8103dd1b234528b91dafd5921a75,2024-05-07T13:39:32.710000 CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a92,2024-04-11T12:47:44.137000 CVE-2023-6812,0,0,1361f65d99954b70532606b17569527f5effc0868c2105952fcff6b7c6c97e71,2024-05-14T19:18:31.490000 -CVE-2023-6813,0,1,b99fbb5ab6b0c24f4fda5f925d7009e5ae7879f495bb6a62d91540b30046e899,2024-07-11T13:05:54.930000 +CVE-2023-6813,0,0,b99fbb5ab6b0c24f4fda5f925d7009e5ae7879f495bb6a62d91540b30046e899,2024-07-11T13:05:54.930000 CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000 CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000 CVE-2023-6816,0,0,cca41eda4debf1a60ab4b1843bc845963914c04ca252d62c2bb38527b5d55418,2024-05-22T17:16:09.970000 @@ -240518,8 +240518,8 @@ CVE-2023-7057,0,0,1200510e25362858ed532b009a0e292074be393ad4f360e521173379910b5f CVE-2023-7058,0,0,cacc9df667e8c882e0e32cb89b832ec7a6fbda5ca7d49b21326dc9e382fd62d2,2024-05-17T02:34:07.313000 CVE-2023-7059,0,0,428e8509ea25f5421df9211fc4410eb4e2d51218db48152cdb8a8b9d12a78f60,2024-05-17T02:34:07.417000 CVE-2023-7060,0,0,870c4c6f56986f33349af68dd953c9d20d9666a23a3fcc4c635253c7bfdfd579,2024-03-17T22:38:29.433000 -CVE-2023-7061,0,1,0c485bb68b8ed35baf8a5dbf129c882dfa3853800295cb5cfc6582a753dca55e,2024-07-11T13:05:54.930000 -CVE-2023-7062,0,1,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c3d,2024-07-11T13:05:54.930000 +CVE-2023-7061,0,0,0c485bb68b8ed35baf8a5dbf129c882dfa3853800295cb5cfc6582a753dca55e,2024-07-11T13:05:54.930000 +CVE-2023-7062,0,0,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c3d,2024-07-11T13:05:54.930000 CVE-2023-7063,0,0,b4ea8b21168c95c8af14241fc9e5a2534b49b7e49280bde929827672bda636ed,2024-01-30T23:02:10.287000 CVE-2023-7064,0,0,7f4540fc1350736b00563486d137005eb84965394302489d22eb2baa20f29e6c,2024-05-02T18:00:37.360000 CVE-2023-7065,0,0,5ddd00584391a648b0a10896ab6d0c67d902e56666c7f70420106fb328c88b9f,2024-05-06T12:44:56.377000 @@ -241206,7 +241206,7 @@ CVE-2024-0615,0,0,10e9b95e3b14afa334aa502fa51e6d881bb541bea334f73849a9a72d161170 CVE-2024-0616,0,0,0addefee1aa97db5b2ed2cb50e129966308587e5be304e347c0e51313f5e0d1c,2024-02-29T13:49:29.390000 CVE-2024-0617,0,0,2b29c9dcb902adb6d7fa2a7239592f59172aa71b48eb580467357783ec488280,2024-02-02T05:07:58.277000 CVE-2024-0618,0,0,d2f3e36418148fff4d6561d37ee90895c751d19c805420890718b517a62e3679,2024-02-01T04:15:46.393000 -CVE-2024-0619,0,1,8b583f82d82d3a290e686ef05e05eba1f1a5eb74d442bb753f06735dcb259b9a,2024-07-11T13:05:54.930000 +CVE-2024-0619,0,0,8b583f82d82d3a290e686ef05e05eba1f1a5eb74d442bb753f06735dcb259b9a,2024-07-11T13:05:54.930000 CVE-2024-0620,0,0,82d1aec1f4e92e94a4b790d50d4fef13f8f0f51914933146bb5433950dc11be5,2024-02-29T13:49:29.390000 CVE-2024-0621,0,0,7c096da1f0b55d356c7cddd509bb1318b902c746a7d193746f1ae47268e11400,2024-02-29T13:49:29.390000 CVE-2024-0622,0,0,e186536dcc4d5eb54c215571bac19acf437efbeb21d4ea8cb00afffb19198b17,2024-02-20T16:15:08.007000 @@ -242325,7 +242325,7 @@ CVE-2024-1841,0,0,39b2aee15bd218c5f0ab2f7c5cc3fd949f7c8705e3573f0315e5f3107f7c80 CVE-2024-1842,0,0,0e20681dfde5286f0a06faaec929b1d3b2d16095090d24a3b41be5a6d299e939,2024-05-02T18:00:37.360000 CVE-2024-1843,0,0,381f1dba7504e2dd4844c9284f47a0574c276b6a0dafd5dcab8a395be3a46549,2024-03-13T18:15:58.530000 CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b5116,2024-03-20T13:00:16.367000 -CVE-2024-1845,0,1,86ddd66d130a34445efe74ac9719a4ec429eec387ae4090fddf5a7a5cf159ae3,2024-07-11T13:05:54.930000 +CVE-2024-1845,0,0,86ddd66d130a34445efe74ac9719a4ec429eec387ae4090fddf5a7a5cf159ae3,2024-07-11T13:05:54.930000 CVE-2024-1846,0,0,ef5b5743243fde26f19bda8d3441988876e0bebaf27eaa4fdca21b8d69d3b82c,2024-04-15T13:15:31.997000 CVE-2024-1847,0,0,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000 @@ -242683,7 +242683,7 @@ CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889 CVE-2024-2043,0,0,460bc52876e8486363c6c006eee49a91636701c262b01e4f4016a237e9fb24ba,2024-05-02T18:00:37.360000 CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000 CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000 -CVE-2024-20456,0,1,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 +CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-2047,0,0,f6af9a907c75b30af19c751de94b50a261c712e37b1ab2431a6d631b3cdcbf81,2024-04-01T01:12:59.077000 CVE-2024-2048,0,0,05426595deab542816a9148a3f314c11d3c8ee92e0bc66aaa695588f4419f428,2024-06-10T17:16:25.067000 CVE-2024-2049,0,0,45a8a24699fa22957aeb55c579059bc5f371d9047c6689f63550502f48fd731a,2024-03-12T16:02:33.900000 @@ -242829,11 +242829,11 @@ CVE-2024-20778,0,0,e976407642c5bb35b6116530469966aa2101f0b51f16cbc18fee45e534c89 CVE-2024-20779,0,0,6fd5665d768cb852ea47732221a85e067d0080ad0de1ca2d2241cb625c59d9ad,2024-04-10T13:23:38.787000 CVE-2024-2078,0,0,1f3625edc40ce981dfa798326c49d364352417c97edbdeb08f2797c1a0a609b2,2024-03-01T14:04:04.827000 CVE-2024-20780,0,0,ec1b341950c30681e570ac487b080ed639019cf375cf8a334e95e6a235124aee,2024-04-10T13:23:38.787000 -CVE-2024-20781,0,1,c9381d7a8e128d589956bae43d6c08e975bb0ceefd2abe2f5b027bd7c4ddda5b,2024-07-11T13:06:13.187000 -CVE-2024-20782,0,1,6352ae3607d0778a124cc19bd8f3907469984d87f1bf4ddafc8da07bec674e35,2024-07-11T13:06:13.187000 -CVE-2024-20783,0,1,e3c41da7cac451d23d3d69c35b57756c6d529567e5b01e9dff346a1f0aa2eabb,2024-07-11T13:06:13.187000 +CVE-2024-20781,0,0,c9381d7a8e128d589956bae43d6c08e975bb0ceefd2abe2f5b027bd7c4ddda5b,2024-07-11T13:06:13.187000 +CVE-2024-20782,0,0,6352ae3607d0778a124cc19bd8f3907469984d87f1bf4ddafc8da07bec674e35,2024-07-11T13:06:13.187000 +CVE-2024-20783,0,0,e3c41da7cac451d23d3d69c35b57756c6d529567e5b01e9dff346a1f0aa2eabb,2024-07-11T13:06:13.187000 CVE-2024-20784,0,0,1a11c22dc3d5493786ff44d6b5bf7f743e8a25aa9204c11602f758d61ef5a078,2024-06-14T19:30:15.503000 -CVE-2024-20785,0,1,72382244c2b06df64a4bd267e62eecf7964d1ef3608fa1568e1322b65776363b,2024-07-11T13:06:13.187000 +CVE-2024-20785,0,0,72382244c2b06df64a4bd267e62eecf7964d1ef3608fa1568e1322b65776363b,2024-07-11T13:06:13.187000 CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000 CVE-2024-20791,0,0,6ae32de89b08b66010819c96a63cf49f80a9e718d1409ae2a6de7b882e299c4b,2024-05-16T13:03:05.353000 CVE-2024-20792,0,0,a8a71e807ddcdd15b2aca7fa7925ba09db515fd84458ec98a3300e57fc319478,2024-05-16T13:03:05.353000 @@ -243327,7 +243327,7 @@ CVE-2024-21412,0,0,15fcbc84e561d705d3329fe36d52ac6f3132d8a4e1421d2eae50dca16c535 CVE-2024-21413,0,0,947151b0ad9489675859c46209ccae83bb837b04e5bbe77ba7b528af79662a39,2024-05-29T00:15:34.720000 CVE-2024-21414,0,0,e662fe180a11a9ec80fb61225a526100cc15d391e196615a4ebbe28715d59a0d,2024-07-09T18:18:38.713000 CVE-2024-21415,0,0,2c1b45a293d43cea991427b75edccc4f765ea544651132f15fdd7ff3af783122,2024-07-09T18:18:38.713000 -CVE-2024-21417,0,1,b49ef9a4a1641236078c066f567251303fbb25636e983b46ec501a6c4a0c9cb3,2024-07-11T13:05:54.930000 +CVE-2024-21417,0,0,b49ef9a4a1641236078c066f567251303fbb25636e983b46ec501a6c4a0c9cb3,2024-07-11T13:05:54.930000 CVE-2024-21418,0,0,6fbe65289f7d87b34991c17b12db87eb2d8f0ad5b10086c98e42aa516bf11cfa,2024-05-29T00:15:34.853000 CVE-2024-21419,0,0,029987aebbeea99b8cf3ad95df60d5cac83c3ab05805c0fcb8848b83a1e3ed9f,2024-04-11T20:15:30.777000 CVE-2024-2142,0,0,775c587e23838eccc1f05d84b61c4d1b983fbea738158d2b5672ec0ee3392f88,2024-04-01T01:12:59.077000 @@ -243430,12 +243430,12 @@ CVE-2024-21518,0,0,01d6f2ab49352480cf19019c7c7e4b7fa996341e6363bf5c2aff55de9f9b4 CVE-2024-21519,0,0,bf9643fa21c9312ad7f9de95a92dae918c8943fd492bc976b0551db532a526a1,2024-06-27T13:15:55.027000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de015,2024-07-04T15:15:10.210000 -CVE-2024-21521,0,1,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000 -CVE-2024-21522,0,1,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000 -CVE-2024-21523,0,1,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b829f,2024-07-11T13:05:54.930000 -CVE-2024-21524,0,1,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000 -CVE-2024-21525,0,1,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 -CVE-2024-21526,0,1,b5b349f1c409b3918b1d786c4e9a50aaa51ca5024ddd9e0451d91d7949f4823e,2024-07-11T13:05:54.930000 +CVE-2024-21521,0,0,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000 +CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000 +CVE-2024-21523,0,0,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b829f,2024-07-11T13:05:54.930000 +CVE-2024-21524,0,0,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000 +CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 +CVE-2024-21526,0,1,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae6543935d,2024-05-17T02:38:05.063000 @@ -243558,7 +243558,7 @@ CVE-2024-21737,0,0,a90af93e6af88ab1e63750439f8a51408da352f40c4dd8d5d341f3011c62b CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819f3a,2024-01-11T22:54:02.190000 CVE-2024-21739,0,0,07f93ee1de6db4cd150e8044f6df8dfeec5c0df6671390dcd392c083d70bdcb1,2024-06-26T12:44:29.693000 CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000 -CVE-2024-21740,0,0,80331fbcb4933bf7f4b07b3e6c688ccc6372ad93a7d99105a5d11a968ea5fbe7,2024-06-26T12:44:29.693000 +CVE-2024-21740,0,1,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000 CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000 @@ -243625,7 +243625,7 @@ CVE-2024-21827,0,0,812c74c9ba8d71849167f2a6716a320f7245bf6b8b90ac7020ded0508bcc1 CVE-2024-21828,0,0,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000 CVE-2024-2183,0,0,d2fc5903dd12fc59dfdda0bd9c528b50368a6c295b02593ecad0115a711b3755,2024-04-10T13:23:38.787000 CVE-2024-21831,0,0,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 -CVE-2024-21832,0,1,b93e97c977c1ff9d86228ddc2f96fb82351ac437a6a7246217b6f2ee1634b627,2024-07-11T13:05:54.930000 +CVE-2024-21832,0,0,b93e97c977c1ff9d86228ddc2f96fb82351ac437a6a7246217b6f2ee1634b627,2024-07-11T13:05:54.930000 CVE-2024-21833,0,0,ceb241ba49765ec41e1f5c93de46c788d7e9b7c1ad1c8402dac89dd59fbd6da9,2024-07-03T23:15:02.253000 CVE-2024-21834,0,0,adfdacc4c0ad7fb798fc6feea300b691936e258291634c57f962c7e425f92b08,2024-04-02T12:50:42.233000 CVE-2024-21835,0,0,fb0916fa42539929733a385b3b3838d919de0dc39f62f3f217cea291341fe53a,2024-06-07T17:48:28.307000 @@ -243705,7 +243705,7 @@ CVE-2024-21988,0,0,6d98a65c82c7e5efbca9ec9e46767cf60b6e116825eaf3026bae79fbf289f CVE-2024-21989,0,0,ff0faa596af54ed5ae8099ba628458de998e57d9e93fbba155c9de7f27b73b08,2024-04-18T13:04:28.900000 CVE-2024-2199,0,0,31e85cc8f708ae33d11caf88fb8f95bb65ee9b7c3962b91a3deeeb287e629ff4,2024-07-02T23:15:10.617000 CVE-2024-21990,0,0,0b4ba6f896ec2fdb9c7522d6449f5c0166971932fa2ba6c5f18beb5ae9a5b96a,2024-04-18T13:04:28.900000 -CVE-2024-21993,0,1,bec1cb1a899f83d01555cece7d7239988767e734e499b33253776f6b7390f928,2024-07-11T13:05:54.930000 +CVE-2024-21993,0,0,bec1cb1a899f83d01555cece7d7239988767e734e499b33253776f6b7390f928,2024-07-11T13:05:54.930000 CVE-2024-2200,0,0,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000 CVE-2024-22002,0,0,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000 @@ -243721,7 +243721,7 @@ CVE-2024-22014,0,0,79bf9edaea087eb4739d179f2ed69981a390cf89f67c6fe45526acb6cb488 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,eda129adeae4ecfa4b275b7bc6bb5638800d036cf47c85fe2baa6a803f743c01,2024-06-10T17:16:18.773000 -CVE-2024-22018,0,1,758e098553841aa4e95907daba98817e80b75855924331359240d59251bae8de,2024-07-11T13:05:54.930000 +CVE-2024-22018,0,0,758e098553841aa4e95907daba98817e80b75855924331359240d59251bae8de,2024-07-11T13:05:54.930000 CVE-2024-22019,0,0,49190872720c4c119c607cdd3cd1206179dcd2b84c9cd0a4595a1040743a11fe,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000 CVE-2024-22020,0,0,56e2cf9f05f5e347798c1cc85e525de5d4d601bc1bbfb2ffd2b6893095268df9,2024-07-09T18:19:14.047000 @@ -243943,7 +243943,7 @@ CVE-2024-22276,0,0,84ef821328733e6d2023f2ca9295825f754ca59ef6a3ea10fbc3d2996560b CVE-2024-22277,0,0,df1070c2ee97a5142cf7d246346e6f4b881b400ac527c2ddf38c129b4d9a4ead,2024-07-05T12:55:51.367000 CVE-2024-22279,0,0,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000 CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000 -CVE-2024-22280,0,1,1f2d2cef600b06f4df8e32e8c31549d4dd3cfb8c940eba142dae42796a085875,2024-07-11T13:05:54.930000 +CVE-2024-22280,0,0,1f2d2cef600b06f4df8e32e8c31549d4dd3cfb8c940eba142dae42796a085875,2024-07-11T13:05:54.930000 CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000 CVE-2024-22283,0,0,f9f0bb31955cdc5efe0fe68bd93a1968461b937d4826bd6ada9de29ff0f15691,2024-02-01T04:13:41.033000 CVE-2024-22284,0,0,6bdde6ee668a94e34697b63e60243d3bba5e1198be225d5e35c53bee953243fe,2024-01-30T17:43:02.180000 @@ -244023,7 +244023,7 @@ CVE-2024-22370,0,0,13df6251176042b21f4cc7eccb2248918a53b76e3179e3ca6bd1e1e82fbd0 CVE-2024-22371,0,0,4bde0f360e03417565b1053dc8e4d6f3c0a609d9b4bebdd79ac08f66edab383f,2024-02-26T16:32:25.577000 CVE-2024-22372,0,0,b1b41923d4d5e3a62f9aafb5eb6f291d0486263d2806b04c051fd8c8c54bfad1,2024-01-30T22:17:49.987000 CVE-2024-22373,0,0,335e31983512bb047b0b0675b05e42b4dcf880eb56ab5a7f58f3d5a0599ff4db,2024-05-05T03:15:06.740000 -CVE-2024-22377,0,1,b693b4fc319745a0043eeca746a2e33454d1287a4cd84b198ef91e6fc51b0780,2024-07-11T13:05:54.930000 +CVE-2024-22377,0,0,b693b4fc319745a0043eeca746a2e33454d1287a4cd84b198ef91e6fc51b0780,2024-07-11T13:05:54.930000 CVE-2024-22379,0,0,e7e4dc7efc34442a801dda04ff6376e66c93de9b5fc822840ad69aed866a77f9,2024-05-17T18:36:05.263000 CVE-2024-2238,0,0,afd0d461b63ffbf0cdec79f63894ae69a7d59a0b22846a34ff25432e2a9728b9,2024-03-13T18:15:58.530000 CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea1b7,2024-01-30T22:14:24.967000 @@ -244032,7 +244032,7 @@ CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a376 CVE-2024-22384,0,0,22d927b3eda23e776929f3eee7e12761fd0a5866a79fd2edf20febc4242f7c70,2024-05-17T18:36:05.263000 CVE-2024-22385,0,0,83fe63d5df6ef3c9cc40e2c081e8f947a095c2af1ce72eddf83967c3653b9c45,2024-06-25T12:24:17.873000 CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe22d,2024-02-10T04:05:26.383000 -CVE-2024-22387,0,1,1a95a570ac3588db4a5548100f806e18e2b84fae1da8d1437c4ebbe7d29dcac3,2024-07-11T13:05:54.930000 +CVE-2024-22387,0,0,1a95a570ac3588db4a5548100f806e18e2b84fae1da8d1437c4ebbe7d29dcac3,2024-07-11T13:05:54.930000 CVE-2024-22388,0,0,c4d155a1650cf8d6f3af35aa33a3624b01d880288d632870cec483f12be1e88c,2024-02-14T20:59:09.660000 CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000 CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000 @@ -244107,7 +244107,7 @@ CVE-2024-22472,0,0,4ab7182b892f9b0334d117f1f559304c9baa050ae6c095fdd3688919803d9 CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000 CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000 CVE-2024-22476,0,0,60113de5203fd0482e93e1b4831aae6a8481d7af395b44816e328a4839c1a542,2024-05-17T18:36:05.263000 -CVE-2024-22477,0,1,241f0861df618e15c75cd88b1d2903619d3fa8ef2657b7ce8dd89b03011e7932,2024-07-11T13:05:54.930000 +CVE-2024-22477,0,0,241f0861df618e15c75cd88b1d2903619d3fa8ef2657b7ce8dd89b03011e7932,2024-07-11T13:05:54.930000 CVE-2024-2248,0,0,374ae133749e87c1bfc3e3b06f3536538020f4728090035fd4ef183cc4a5c8dd,2024-05-15T16:40:19.330000 CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000 CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000 @@ -244397,7 +244397,7 @@ CVE-2024-23147,0,0,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e0 CVE-2024-23148,0,0,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 CVE-2024-23149,0,0,242d8caf5deb75b9fbd1f60b635cd54b2b743a36dfa977ecbeafb68c5bb6441d,2024-06-25T12:24:17.873000 CVE-2024-23150,0,0,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 -CVE-2024-23151,0,0,b29d40e3cefbbec81e68405bffac98bc5e7c10dc76dec3d6cd672fea6115bc13,2024-06-25T12:24:17.873000 +CVE-2024-23151,0,1,53d13e8b9ba2cd63d85aa3df3bb17c4d39810557d3e3d9a803388619628364a3,2024-07-11T15:05:24.300000 CVE-2024-23152,0,0,c5c382b3ba462bda0286084969263304e92f041f435cc9b3b38363a1158fa042,2024-06-25T12:24:17.873000 CVE-2024-23153,0,0,a9475572f3855658e511a61491406daf3a3db34baa0f7eeec4405b900cc5c36f,2024-07-03T01:47:35.377000 CVE-2024-23154,0,0,602e96827d2a402dbec8eeda4b14e220087b363940e263d35c0ecc3fd1600d12,2024-07-03T01:47:35.613000 @@ -244430,7 +244430,7 @@ CVE-2024-23190,0,0,add17161c7c8505b6ba715b4898e70540bf15ecced41ee84c2b2e0388a683 CVE-2024-23191,0,0,459948535d54516570f8d837aea6f84683ce700a59124af1293fdc8518256e81,2024-04-11T11:15:48.497000 CVE-2024-23192,0,0,ddfbef4409196a7a3eeb03bbc2422d0e54ca57b797a5b47e231d14cc76bbe3c5,2024-04-11T11:15:48.570000 CVE-2024-23193,0,0,9ed5265a66f9c70d7ccff4abeefe790c7cf0947a268e6262d972b6cd9f8a8bce,2024-05-07T01:15:06.497000 -CVE-2024-23194,0,1,089c2460385496ae22f7a90553a23720c6ebf4be452b1a50dfaeb1dc5b6ea1ab,2024-07-11T13:05:54.930000 +CVE-2024-23194,0,0,089c2460385496ae22f7a90553a23720c6ebf4be452b1a50dfaeb1dc5b6ea1ab,2024-07-11T13:05:54.930000 CVE-2024-23196,0,0,916695e8de6ad88a7eb739e09a11651ad9458fb3044e054e85a4e9fe2ce054c9,2024-02-10T04:06:14.577000 CVE-2024-23201,0,0,0f8fb4c7d86a834d8d9bd84c59d7ac097591ba1ab57e91c147b21ce025d3951c,2024-03-13T23:15:45.840000 CVE-2024-23203,0,0,a7d3b9c842d401a26cd60b5363d9fd931ec7b6ace08dfe359efc5de9e4d5324f,2024-03-13T22:15:09.117000 @@ -244549,7 +244549,7 @@ CVE-2024-23313,0,0,13245e21fab07d527abf4d414da9107709ee7261ac0f2eced3f2c2d5a62b3 CVE-2024-23314,0,0,dd6112b5494f5f3b553193d89c0ec5a0dd61b4aa5a1d51fde0a6bbf84929e386,2024-02-14T18:04:45.380000 CVE-2024-23315,0,0,489df2a8d3fe3bcb88b79c0636401c3a2725b9dd3103a02a30360cc9ee690d08,2024-06-10T18:15:26.180000 CVE-2024-23316,0,0,3812af16e295e83e786aa1aab37645db678f576659c563c821a5d9097cdb6f6f,2024-06-03T14:46:24.250000 -CVE-2024-23317,0,1,b3d4db9a6c4ba1ce642dcb721062f8e13232707c61d4a2c28ce4845f9c04f28e,2024-07-11T13:05:54.930000 +CVE-2024-23317,0,0,b3d4db9a6c4ba1ce642dcb721062f8e13232707c61d4a2c28ce4845f9c04f28e,2024-07-11T13:05:54.930000 CVE-2024-23319,0,0,6250a98d8fb4de9dc7adf992ef419352b4c640948bb204f9b6b1a6a1e471f523,2024-02-15T18:44:04.737000 CVE-2024-2332,0,0,bad3de665e7a6fe09fc285529837f450dd66b631476d3cb654444ad8c9c674ae,2024-05-17T02:38:10.740000 CVE-2024-23320,0,0,ee2624eedcd0c08c0309a46e353f298bafcc0ebbc7e5a02fe31e837cfcf5accf,2024-02-23T19:31:25.817000 @@ -244629,7 +244629,7 @@ CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c CVE-2024-2348,0,0,1b2471f8551c69b217b1850b52d1bf1e7f9aea8e8dfc43b59c7bf2992281c35f,2024-04-10T13:23:38.787000 CVE-2024-23480,0,0,746423a9c0519d4cd61a53767c7c801bf960cd35765efe9e634ac2b6a706568b,2024-05-01T19:50:25.633000 CVE-2024-23482,0,0,9bbfaddb28c8d4f40fa7310b24a63cdb6abbe6ffffa800b3d9da686c071e8fa5,2024-03-26T17:09:53.043000 -CVE-2024-23485,0,1,38bd12cd670dc8914ed1a69d5f3e4cdb68de743b90161b77f3a9b23901dd7300,2024-07-11T13:05:54.930000 +CVE-2024-23485,0,0,38bd12cd670dc8914ed1a69d5f3e4cdb68de743b90161b77f3a9b23901dd7300,2024-07-11T13:05:54.930000 CVE-2024-23486,0,0,19778667fd58f188ebd5dce67e80ee87824728dd11d9e77fe76b5575568144f6,2024-07-08T14:17:34.250000 CVE-2024-23487,0,0,a175e3c04cbc36aafa8849dd45382b7985448c7b7394b27b709a0973fe2c1d2f,2024-05-17T18:36:05.263000 CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000 @@ -244800,10 +244800,10 @@ CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000 CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 CVE-2024-23692,0,0,69dc5620f25e89b82c3c217a9f13f591bf678b6676983ea09fe8288d200080b3,2024-07-10T14:05:27.370000 -CVE-2024-23695,0,1,97b1bbf9668e4f1ff263ecc5095fb2ce50165cd2bc27914c0badab59b62b53eb,2024-07-11T13:06:13.187000 -CVE-2024-23696,0,1,189ee607710420766ee01561621adc5b7bb56059b2d08cc9a92c0d5f1f7c4d8e,2024-07-11T13:06:13.187000 -CVE-2024-23697,0,1,27a6083f785e35c6545c4b591de518748b769ef19139ee47602db369d8b522b9,2024-07-11T13:06:13.187000 -CVE-2024-23698,0,1,40d89ec45289d1881bb4b87dba8c0bb9402bcb28d0514ce7732acc7634aad369,2024-07-11T13:06:13.187000 +CVE-2024-23695,0,0,97b1bbf9668e4f1ff263ecc5095fb2ce50165cd2bc27914c0badab59b62b53eb,2024-07-11T13:06:13.187000 +CVE-2024-23696,0,0,189ee607710420766ee01561621adc5b7bb56059b2d08cc9a92c0d5f1f7c4d8e,2024-07-11T13:06:13.187000 +CVE-2024-23697,0,1,17c4488491744d62a05050e622b3358721ca6fdbe4baba48f22a7b460908a580,2024-07-11T15:05:24.920000 +CVE-2024-23698,0,0,40d89ec45289d1881bb4b87dba8c0bb9402bcb28d0514ce7732acc7634aad369,2024-07-11T13:06:13.187000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 CVE-2024-23704,0,0,3ab2415bdb26ba29dae3109785e9f4b7ad9e6e4e471a3ed83e21564f6ce311e3,2024-07-03T01:47:59.750000 CVE-2024-23705,0,0,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768400,2024-07-03T01:48:00.597000 @@ -244813,7 +244813,7 @@ CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68 CVE-2024-23709,0,0,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000 CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 -CVE-2024-23711,0,1,01567fc11d5a2c4a8179e5900ea51dd5fd1cd144af5b23377ad86f419aaf2c21,2024-07-11T13:06:13.187000 +CVE-2024-23711,0,1,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000 @@ -244828,7 +244828,7 @@ CVE-2024-23731,0,0,204152b9ab32090d3f201504afd34c062c39bfd578f661ea797bbd83dd0dc CVE-2024-23732,0,0,042666c99b3635fb407c7af7c818760f4159a23a8e9e6c2822d5ba07aae8999c,2024-01-26T21:11:51.840000 CVE-2024-23734,0,0,3ab7c6257ca38ed9d7477d57e04d8b8398661cc4195ecc99bf38a750580483b1,2024-04-10T19:49:51.183000 CVE-2024-23735,0,0,cc8e5b54f96dbe13960a98eb0656f3844c314b70a551360f5a5c0009603693b8,2024-04-10T19:49:51.183000 -CVE-2024-23736,0,0,6ecff3f00723734bca1a188faee41d91da7d122c245c592e9cdcc73f45a71912,2024-07-02T12:09:16.907000 +CVE-2024-23736,0,1,bcd223ae0db7879befee0415fb371b15c3be00a7450081b37507ddd44cb2eebb,2024-07-11T15:05:26.800000 CVE-2024-23737,0,0,d4ffd6dd100fdc4a0d40bd51b5a0ee6bddac8cf5eac0ee6a0f29c8fa7350a5f1,2024-07-02T12:09:16.907000 CVE-2024-23738,0,0,84fc715227e9c81d0ea24ba6cabdcd4b9ebaaa4af8fffc242edc7617abf88d5e,2024-05-17T02:36:37.750000 CVE-2024-23739,0,0,1dc14ca5b2f1048d31e09e11f0d951d9c59e5d8342f40e05e67a4d783040d706,2024-02-16T16:15:57.830000 @@ -244857,7 +244857,7 @@ CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000 CVE-2024-23765,0,0,a9bf9ddaf0ea53521841e4a7d5249d26363bad2b049c64b95ac86a5fafa6d151,2024-06-27T12:47:19.847000 CVE-2024-23766,0,0,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000 -CVE-2024-23767,0,0,c123c2989650a70e6c7d5f568469b1c99b3cb5d77a8ff0fadade34b74ac4b8d2,2024-06-27T12:47:19.847000 +CVE-2024-23767,0,1,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000 CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000 CVE-2024-2377,0,0,3193bacb38964a76865be4cdd2e9adb774f62e3213cbbc5f66850373a4fcad8d,2024-04-30T17:52:35.057000 @@ -245569,7 +245569,7 @@ CVE-2024-24963,0,0,f7ac6d9beae69472289af258cfa7df94f3fb587efc26344b96102b05f5639 CVE-2024-24964,0,0,6aeb3e68bcce4e30c320efc8bbc0ba8ea40b022ead3c928aca7667e8626ff2cf,2024-03-12T12:40:13.500000 CVE-2024-24966,0,0,a6e715310d1619966fe5747d39679f64ae1b61eb46bb4d8fceaf05df6847efb8,2024-02-14T18:04:45.380000 CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd8b,2024-05-17T02:38:15.830000 -CVE-2024-24974,0,0,2a6f71d2cc8c0eb432e23bd3ddcb827a064b2ef1986a3563594a668bc7ee1e7d,2024-07-08T15:49:22.437000 +CVE-2024-24974,0,1,58746381295b34b611cdb4edd106ea5da27c78c578480d54a0db25ca5467d003,2024-07-11T14:47:54.920000 CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000 @@ -245599,7 +245599,7 @@ CVE-2024-2501,0,0,b5cf131f2289d74297b2dbc19cfb603ec735e9b1cc811c1a98b1a3682a5e2b CVE-2024-25015,0,0,9e3fb0e1b7fcacd31ed03c6bf1d8c74e8df0ea773f9522b8badc41515a1603bd,2024-05-01T19:50:25.633000 CVE-2024-25016,0,0,7e9eb7e6fcca7e9c1cce27612a823457d13842f65d70f0e121b2ced7865b5e82,2024-03-04T13:58:23.447000 CVE-2024-25021,0,0,268da4d399cf08337d73768c3fd4fa53ef33e5f2d74019133c16ace4407a10a2,2024-02-22T19:07:27.197000 -CVE-2024-25023,0,1,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 +CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 CVE-2024-25026,0,0,344f711c12452613ac496513cc20b35ee5a15e42d46963ece9afb539eac0ee4f,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,506fa0f038304c2bb065c6aafbb038363984a8c8037945872a1b74013246a31c,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,d48a17c1d5ef1bfa6fbe7d5b73144f127d39825001bfd50aa27289e6a7875699,2024-04-08T18:48:40.217000 @@ -245622,8 +245622,8 @@ CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525 CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000 CVE-2024-2507,0,0,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000 CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000 -CVE-2024-25076,0,1,bef783be33037b5a37302d3b1fb068517df513278c0918ed83b3657759d016dc,2024-07-11T13:05:54.930000 -CVE-2024-25077,0,1,7eac67ae98b31640cc323f8f90a86c0baf27eb357da01b5c4f82ab8eafeeba64,2024-07-11T13:05:54.930000 +CVE-2024-25076,0,1,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000 +CVE-2024-25077,0,0,7eac67ae98b31640cc323f8f90a86c0baf27eb357da01b5c4f82ab8eafeeba64,2024-07-11T13:05:54.930000 CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c62f,2024-04-01T12:49:00.877000 @@ -246230,7 +246230,7 @@ CVE-2024-26015,0,0,91bd66afc3c2abf869a3d76bed02c232c2c3a3c155933975bf6c3d38e6149 CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 -CVE-2024-2602,0,1,2f9e8e954b78cbb2d431070e9456ec4cc1494d059bf8de639af2c69ac5367c3b,2024-07-11T13:05:54.930000 +CVE-2024-2602,0,0,2f9e8e954b78cbb2d431070e9456ec4cc1494d059bf8de639af2c69ac5367c3b,2024-07-11T13:05:54.930000 CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000 CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50e1e,2024-05-29T13:02:09.280000 CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000 @@ -246616,7 +246616,7 @@ CVE-2024-26586,0,0,db0ea9b3345f5fd7a96c34d4148df3d02fd7f8fdc030d1d623c6c871c61c6 CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000 CVE-2024-26588,0,0,a12e329faae009d801e11973c8a72020a4a4a89d8da3b097e68d3f4be6ee8827,2024-03-18T18:02:15.647000 CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b7555f,2024-03-18T17:56:56.953000 -CVE-2024-2659,0,0,f70d39261e85fb28ecf8b90e66824a1515a67332ae1cb9fb94b78b0878034f3f,2024-04-15T19:12:25.887000 +CVE-2024-2659,0,1,b83fd8ab8e061134bb60113327231a109e3796c337cb9867ba6104dc42d78ef5,2024-07-11T15:05:36.393000 CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000 CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000 CVE-2024-26592,0,0,195dd56f81d7c1170ff6ffa2e3f15abaac7ab70f9840c18d47f5736f2d0726df,2024-05-29T06:16:36.020000 @@ -246651,7 +246651,7 @@ CVE-2024-26618,0,0,b4ee02e43411773445d9502213c0c8ee13dbb28e9adadb6062e2443b8f287 CVE-2024-26619,0,0,4bc519bd153c025ad692ee69af117d5945ba0b94f5c3e5862c457953e2f5d4bd,2024-03-12T12:40:13.500000 CVE-2024-2662,0,0,f67fa5f3bbbaf2e8acff0e892a68fc06e4217f99a75dec53361b235392202bd4,2024-05-14T16:13:02.773000 CVE-2024-26620,0,0,d9644d90006553a6ef7df3ce5b7de0b26190c676351738b9b2539bec3ef4ee61,2024-03-12T12:40:13.500000 -CVE-2024-26621,0,0,b7ecfb322a157dec7618566e7b66e107324db99cc27d9506a03d658275c424bb,2024-07-10T23:15:10.040000 +CVE-2024-26621,0,1,8c52ea307cbfe42c219bd75a4f03872be3a0d33c33581f01c9650a5759221bf8,2024-07-11T14:15:13.210000 CVE-2024-26622,0,0,429b8c79ac7bc8a6f352b05f3ec787ee7dce1baf63c22803c7866fe6ab98869f,2024-06-25T22:15:19.240000 CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000 CVE-2024-26624,0,0,9575e38401ed951dd513d0e1852942215c7c9e9bc3c5371fd0da3ac3a0eac967,2024-03-27T14:15:10.163000 @@ -247162,12 +247162,12 @@ CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d506 CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000 CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000 CVE-2024-2709,0,0,f4d31bf466dd83e1847d553cf0a3bb09712a5fa83628223c69b729872cb64e17,2024-05-17T02:38:26.403000 -CVE-2024-27090,0,1,1286ab2c8b413930f751745c9454c21dff1b90d18e81696da752385d37043463,2024-07-11T13:05:54.930000 +CVE-2024-27090,0,0,1286ab2c8b413930f751745c9454c21dff1b90d18e81696da752385d37043463,2024-07-11T13:05:54.930000 CVE-2024-27091,0,0,58ecd8a96ef6f650b7d3c6ff6b05851611594128b34909d27a436679cef1102c,2024-03-27T15:49:51.300000 CVE-2024-27092,0,0,d29804f8da91855d6bf2c97046f8c4ca58e3a02ea6326a3e526f30254e2615ec,2024-02-29T13:49:29.390000 CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000 CVE-2024-27094,0,0,3eb9d388805681273fe676dee514eb17768b55ae9e888103a362a03c5b963467,2024-03-21T12:58:51.093000 -CVE-2024-27095,0,1,89fc6d111b3761dcb87d31e97987341669065c381c2406887f635016420bca04,2024-07-11T13:05:54.930000 +CVE-2024-27095,0,0,89fc6d111b3761dcb87d31e97987341669065c381c2406887f635016420bca04,2024-07-11T13:05:54.930000 CVE-2024-27096,0,0,894f84a8f35148cbaeda9b34b2b2f12d5ff563f2928b15a6110bff9a018bb47b,2024-03-18T19:40:00.173000 CVE-2024-27097,0,0,119cd9ece0e90261671b57d6900026bac78dfbf4d2981ae69a65322120d02a50,2024-03-14T12:52:16.723000 CVE-2024-27098,0,0,c30df5c26e61dcf06585d0b82c2ff5020648cb39dac27e46934cf3772eacbcc0,2024-03-18T19:40:00.173000 @@ -247403,9 +247403,9 @@ CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000 CVE-2024-2736,0,0,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000 CVE-2024-27360,0,0,ef90b211e38e26de7cd6ad266f9667b57752920efeb0c78d69800f0173df48ef,2024-07-09T18:18:38.713000 -CVE-2024-27361,0,1,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000 +CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000 CVE-2024-27362,0,0,f6cf094287aa89a818448bb40454e447472a3a4a0dff2e33d58ba4042270372a,2024-07-09T18:18:38.713000 -CVE-2024-27363,0,1,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 +CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6439,2024-06-27T16:42:33.073000 CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000 CVE-2024-27372,0,0,65a4e6083a0e4ea46660ce2ac40164e0a6aada29e2b404abc66d633a42676525,2024-06-27T16:41:21.603000 @@ -247420,8 +247420,8 @@ CVE-2024-2738,0,0,6819e123d1b9c89828d0cda96e445b3a2cfd159134a3eaf302a0f1f8d1cb62 CVE-2024-27380,0,0,fe99e5b0b6a32955bbb2a97d0c59955e408cb595f242be59059137109c57d1b8,2024-06-27T15:52:55.140000 CVE-2024-27381,0,0,dfb48a4eb36601401d92ca4620e42f680a10dcbb1fedb7a9b2d55aeb35bb13fe,2024-06-27T15:54:29.327000 CVE-2024-27382,0,0,4b4614f80e2cd4338001a4dcf7a438515a0711d28f6a394f90940bf9d7dba162,2024-06-27T15:54:47.727000 -CVE-2024-27385,0,1,a8ff5721869809d86378a35ea14de52f50181997e74bd473ef6acf6bde877c72,2024-07-11T13:06:13.187000 -CVE-2024-27386,0,1,fc4cea0bb829ddabe38318e96ec4ebb778a06573a5710fa4d1426ba9bcb2a344,2024-07-11T13:06:13.187000 +CVE-2024-27385,0,0,a8ff5721869809d86378a35ea14de52f50181997e74bd473ef6acf6bde877c72,2024-07-11T13:06:13.187000 +CVE-2024-27386,0,0,fc4cea0bb829ddabe38318e96ec4ebb778a06573a5710fa4d1426ba9bcb2a344,2024-07-11T13:06:13.187000 CVE-2024-27388,0,0,d19acc876d6bed76abe4867a16c703c3b3105cc5fd5265605b3dfe06a10deeb7,2024-06-27T13:15:57.940000 CVE-2024-27389,0,0,84e8f98d7373f585e11251f165e8a3d401d2ea257f6532e4408157e8a9f0a9ee,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,01f4358b131d63aa6c4b85d098b6d7ce2028f8434e497e05210c81006774d4d9,2024-04-15T13:15:31.997000 @@ -247489,7 +247489,7 @@ CVE-2024-27453,0,0,4fa62fb0431b68f90533abee1343406b0149f9efe637bd75fc3a77179a8be CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 -CVE-2024-27459,0,0,10440232796ebc5df7d034a2fbebe753437849e50adba619ca90618ce892c085,2024-07-08T15:49:22.437000 +CVE-2024-27459,0,1,1c710877657ae7244cb55fca6385dc18847bb0964570ba742574dcae6bd24b68,2024-07-11T14:47:26.447000 CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000 CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 @@ -247537,7 +247537,7 @@ CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c5 CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000 CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000 -CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000 +CVE-2024-27602,0,1,ff68a7dfbe76578be745d2be853eb13367fbf75dc768ea067191484500d8515d,2024-07-11T15:05:30.183000 CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000 CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000 CVE-2024-27609,0,0,f5d2fceb3a71c480d99c4c75cd0a83ffe0e0dd3a726d0869ef9aadec6a003cba,2024-04-01T01:12:59.077000 @@ -247552,7 +247552,7 @@ CVE-2024-27623,0,0,2fddee8e74e15c6e7895f22777fd9ac33928389d1ff6851e7ceeb0e05ed9e CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7b4c,2024-03-05T14:27:46.090000 CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000 CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000 -CVE-2024-27628,0,0,faa71788c87c317049fdc79ef56c77e632eee6d27397d0a91223336e9c422e45,2024-07-01T12:37:24.220000 +CVE-2024-27628,0,1,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c7d2,2024-07-11T15:05:31.010000 CVE-2024-27629,0,0,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000 CVE-2024-2763,0,0,915a4db607b8067b26a412109e7e5ccfc1290182e3b3b563c2eda7d6ee1f9e77,2024-05-17T02:38:28.787000 CVE-2024-27630,0,0,c166a75eb868b94e3d44b8631307a3b16a1a3175bacac14103c1a38615b66cc2,2024-04-11T06:15:06.270000 @@ -247715,7 +247715,7 @@ CVE-2024-2790,0,0,beedd0090f34846cee86bfcc16559ecd216425fdfa14e63be8297a23ca53ac CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 CVE-2024-27901,0,0,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 -CVE-2024-27903,0,0,ccdb0f52fe0bc4ee02a36296f374b0d64aa1d0b4db223d51f201349e3ddfd00e,2024-07-09T16:22:25.120000 +CVE-2024-27903,0,1,7a16b56caf0aadbdfc143727319a91c26c6417220b554521d1e591b4babb7dec,2024-07-11T14:46:26.300000 CVE-2024-27905,0,0,11f71bd2f04a983e03ffa738540da2ab3b19fd866be937104a685343c8bfc7f6,2024-05-17T02:37:34.130000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 @@ -247860,7 +247860,7 @@ CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0 CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000 CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000 CVE-2024-28067,0,0,0af34335bd5c50d512b8c109c02a349e9b931cbcda3258c91f6a4aa62f373bc1,2024-07-09T18:18:38.713000 -CVE-2024-28068,0,1,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000 +CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-2807,0,0,ceddd5b2cd81d31fee5f18b8bacde7f821c00daf332201952118e19cfa7a07c3,2024-05-17T02:38:31.100000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 @@ -248246,7 +248246,7 @@ CVE-2024-28794,0,0,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596 CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 CVE-2024-28797,0,0,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000 CVE-2024-28798,0,0,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000 -CVE-2024-2880,0,1,da9f66136a4e405c98fa118628e6d055e361fbc270d38a907c168d05ca657568,2024-07-11T13:05:54.930000 +CVE-2024-2880,0,0,da9f66136a4e405c98fa118628e6d055e361fbc270d38a907c168d05ca657568,2024-07-11T13:05:54.930000 CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000 @@ -248256,8 +248256,8 @@ CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000 -CVE-2024-28827,0,1,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 -CVE-2024-28828,0,1,effd5c4bcdab1da8b5602b97379b2b3d0f31c4be4db7768189ae6b7bd7dec824,2024-07-11T13:05:54.930000 +CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 +CVE-2024-28828,0,0,effd5c4bcdab1da8b5602b97379b2b3d0f31c4be4db7768189ae6b7bd7dec824,2024-07-11T13:05:54.930000 CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,0345769512c8d0617caa5313f559fdb9de7066aaa2f880b3d0fe2b7aa28290e3,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000 @@ -248291,6 +248291,7 @@ CVE-2024-28869,0,0,bed6e8ba3681250027e8ebaede92ab26ffb4384953b59d036748ca14616df CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b49,2024-07-03T01:53:38.087000 CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d0161c,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000 +CVE-2024-28872,1,1,ea98a920229e26ec637d5da3a2fcb14be46e73e0827865714c33420c5094748e,2024-07-11T15:15:11.377000 CVE-2024-28877,0,0,883039bbb8a02fedae5005218a87450c4b734f262948f425805257c253ab9e71,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 @@ -248525,7 +248526,7 @@ CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000 CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29152,0,0,c92904cfed16837c6741a6aae634cd863038c196f5243ffb888a5a789d858f82,2024-06-25T20:15:11.353000 -CVE-2024-29153,0,1,2b568d7bc3c06e07520098a6844fb0b38fdbf697da68e6c3ee5f5ae754eb75c5,2024-07-11T13:06:13.187000 +CVE-2024-29153,0,1,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000 @@ -248691,7 +248692,7 @@ CVE-2024-29454,0,0,aa15960195507983d36d6e2ba6fe52c5783793504e2d3e8d91a9bb9866998 CVE-2024-29455,0,0,34e13e15e8ba1247bab4074112a2a8e07941c50f23ef976a2aa4934ef2701aea,2024-05-27T01:15:15.573000 CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000 CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000 -CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000 +CVE-2024-29461,0,1,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000 CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000 CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000 CVE-2024-2947,0,0,b68097f442084c413bcea33d1d0c33d19fa9ae07d0edeb3af3b79bd708e6dc65,2024-06-12T09:15:17.717000 @@ -248800,16 +248801,16 @@ CVE-2024-29774,0,0,b6d746daf0a9f89389e69183d03895d6675922cbbb66d6ef5358d6a524251 CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a707,2024-03-27T15:49:41.437000 CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000 CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000 -CVE-2024-29778,0,0,302cc21a15840cbaaf364e25bb4d62fe83ec2b5178f0b725c3654f4294fd62d0,2024-06-17T12:43:31.090000 +CVE-2024-29778,0,1,7078d531588620b0c0a9a375e79820625449ca74fed04f4f1c661ccf6ea1bfeb,2024-07-11T14:29:52.413000 CVE-2024-2978,0,0,10402db073fcc83eb9c3960e5a0172007bd5a71eeec44391bbdfbccc34dc921e,2024-05-17T02:38:40.007000 -CVE-2024-29780,0,0,dbb5b28e79357605c44be97580280388890d8927ed9d86b1dba54bfaf3205e97,2024-06-17T12:43:31.090000 -CVE-2024-29781,0,0,b6224f330ff358aa94180da085366f464fc49ccb8c9a11cf2901ca1712188182,2024-06-17T12:43:31.090000 +CVE-2024-29780,0,1,ff87a8b15c39bcf6bb6551c6c4365634fc9c65ec4425784140a90dbc2abce6ed,2024-07-11T14:32:47.390000 +CVE-2024-29781,0,1,63313f0b9e181cbad852afadaa2499622f864bd882c6aa203150c0c579f83bd1,2024-07-11T14:35:15.730000 CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000 CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000 -CVE-2024-29784,0,1,ba30017bc144f71b7965325aaa3311ae3dfeac682cda889e9f2a82b841d1ef8a,2024-07-11T13:53:03.173000 -CVE-2024-29785,0,0,6acf4d5e192a210ba9b844d54adbd79774477e59fb13750c29056bd3f9129dd1,2024-06-17T12:43:31.090000 -CVE-2024-29786,0,0,6ea1aba11793e88e3539f0a1fa716e9f6f197bd5c9e2809ecb83b2a20665ce3b,2024-07-03T01:52:35.427000 -CVE-2024-29787,0,0,8b3227822d531960b3be4bdc2e1a147750039f680413f3ae3fe72ae67cdc3673,2024-07-03T01:52:36.683000 +CVE-2024-29784,0,0,ba30017bc144f71b7965325aaa3311ae3dfeac682cda889e9f2a82b841d1ef8a,2024-07-11T13:53:03.173000 +CVE-2024-29785,0,1,9c4015230d39c343f799f72d25ace92e517029eb78fba9439d139dca26282d4c,2024-07-11T14:26:38.663000 +CVE-2024-29786,0,1,e1868240b5396da7688572c39896b1abbc484d583db68ded9c72ec430f89b162,2024-07-11T14:10:32.990000 +CVE-2024-29787,0,1,c9997f4a551624f9a0dd794be1a718140cce0102248650b8c444287c7a404243,2024-07-11T14:05:47.960000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000 @@ -248872,7 +248873,7 @@ CVE-2024-29843,0,0,0e7cac2423043e71c46c0b1e43ac9a8c810800e1746f633c825d47d92993e CVE-2024-29844,0,0,0b2bf20574d5156f6a667769b4d5660c6c41f0f9a81de3ca328a866e5a169d72,2024-04-15T13:15:31.997000 CVE-2024-29846,0,0,ecf705f8a3f3d5200a5c3119a1c5f5c4508879a9b659519aff9f7061bee1cc64,2024-07-03T01:52:46.270000 CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875c84,2024-07-03T01:52:46.980000 -CVE-2024-29849,0,0,f0326930a23ff5c9419ec7504b4b4f26a8016e21eb2c16c17808ae35e2984b26,2024-07-03T01:52:47.767000 +CVE-2024-29849,0,1,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000 CVE-2024-2985,0,0,fa2452bdca8bf817e9c39173e50c9398ab81e8bbe363c5d181d5470655c888f8,2024-05-17T02:38:40.683000 CVE-2024-29850,0,0,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000 CVE-2024-29851,0,0,218edcf6feb0effa72e3a8c5b814479d3c2c35c93f48749732d1e5886bf0b9db,2024-05-24T01:15:30.977000 @@ -249985,29 +249986,29 @@ CVE-2024-31307,0,0,3f5cc937ab88653c521e8123aa958a6b4450c9885bb5904e6f6e49e54659f CVE-2024-31308,0,0,5e2ae5593f1ea9760ae6e8cbc575821053a6196641c6e6bb427e79b97acb4828,2024-04-08T18:48:40.217000 CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db555819d8,2024-05-01T18:15:23.233000 CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000 -CVE-2024-31310,0,1,39c8b5f3047a90424057280556e039d7fcd0c87d4c13a730727031fa30d92c6d,2024-07-11T13:06:13.187000 -CVE-2024-31311,0,1,5f5c16b93dc89d74c1c64519405dcb798d8a6175c6d09a8e665f5b15504d78d4,2024-07-11T13:06:13.187000 -CVE-2024-31312,0,1,3e59aee3cfa2f94cb0ef2f4dd0a4353f30db5e3e79096083a0ada05027297595,2024-07-11T13:06:13.187000 -CVE-2024-31313,0,1,0fa1a93bf76d2578fececf6790601468789f9798bc4a9d3c04594cde67bd0b37,2024-07-11T13:06:13.187000 -CVE-2024-31314,0,1,f79a503fa2b5e6b0ca89cfce664066f03d71aa556965c71aeebf162d04cdcf57,2024-07-11T13:06:13.187000 -CVE-2024-31315,0,1,93691d4127345d06d4f975e9e696cf2d6d422b0f3fbe14b702e05390d628f282,2024-07-11T13:06:13.187000 -CVE-2024-31316,0,1,6b5f24e340d0cf309e98a56a6c4cbd381d4b4352a616197304eee36afb985ef0,2024-07-11T13:06:13.187000 -CVE-2024-31317,0,1,1cfe22ebd5bd5bf9bb790911e838de1cf78ed04ae58571ce5fba442b6396099f,2024-07-11T13:06:13.187000 -CVE-2024-31318,0,1,0d84f6fe565a6fef6c3462da1416e29e0311757f0491192516023b784222f940,2024-07-11T13:05:54.930000 -CVE-2024-31319,0,1,d82c7bc64b10488b9b1926aa61d01961ce06d41701085112500f540f682b462a,2024-07-11T13:05:54.930000 -CVE-2024-31320,0,1,fd0c569760394346ae816f996a976a14ed1c320bd30c9cc5b55f0ef9b67b63e1,2024-07-11T13:05:54.930000 -CVE-2024-31322,0,1,7a13bd68f6b1c7fe6ae74de10d3305bba51ee91b81b8b3b9eebd03083a5a7664,2024-07-11T13:05:54.930000 -CVE-2024-31323,0,1,a544d9a9ff2aa21c5fbb6fe91279f4ddfa1669db09487516ebfbf1d931a1974e,2024-07-11T13:05:54.930000 -CVE-2024-31324,0,1,c0f75bbf1e949b6b889f120fbeb42dc1e871fce1afcf711f41b5f0c928b7185e,2024-07-11T13:05:54.930000 -CVE-2024-31325,0,1,80e33a4833f6237bc4765f36ccc9a7e3eece55e1504b9aeb71a9c9792949a23e,2024-07-11T13:05:54.930000 -CVE-2024-31326,0,1,284eae06442124a693f10717424ff9de135112a9a37355db24d271d9f53a0149,2024-07-11T13:05:54.930000 -CVE-2024-31327,0,1,2ef29ffe86a08f0831b7bb2a92b31fa5fe1af5b9b162e1788d4651897aea14f8,2024-07-11T13:05:54.930000 +CVE-2024-31310,0,0,39c8b5f3047a90424057280556e039d7fcd0c87d4c13a730727031fa30d92c6d,2024-07-11T13:06:13.187000 +CVE-2024-31311,0,1,bc87f5eff00ede1d1c04389c216e60b2a2a407288e31ea28ec5028c636a65054,2024-07-11T15:05:38.153000 +CVE-2024-31312,0,0,3e59aee3cfa2f94cb0ef2f4dd0a4353f30db5e3e79096083a0ada05027297595,2024-07-11T13:06:13.187000 +CVE-2024-31313,0,0,0fa1a93bf76d2578fececf6790601468789f9798bc4a9d3c04594cde67bd0b37,2024-07-11T13:06:13.187000 +CVE-2024-31314,0,0,f79a503fa2b5e6b0ca89cfce664066f03d71aa556965c71aeebf162d04cdcf57,2024-07-11T13:06:13.187000 +CVE-2024-31315,0,1,285e9341c5dea2df00bd2c416691a1faeb9d23f21a318a12574fefeadc97541f,2024-07-11T15:05:39.143000 +CVE-2024-31316,0,1,32fc8a7b1b224122566c3d79a73274ea9359c3c71dbd47a6b8920e485bc01265,2024-07-11T15:05:39.377000 +CVE-2024-31317,0,1,800d561c71c022ae12380b47f0bffa09b01b8580803da3962bc9386025c4d930,2024-07-11T15:05:39.587000 +CVE-2024-31318,0,0,0d84f6fe565a6fef6c3462da1416e29e0311757f0491192516023b784222f940,2024-07-11T13:05:54.930000 +CVE-2024-31319,0,0,d82c7bc64b10488b9b1926aa61d01961ce06d41701085112500f540f682b462a,2024-07-11T13:05:54.930000 +CVE-2024-31320,0,0,fd0c569760394346ae816f996a976a14ed1c320bd30c9cc5b55f0ef9b67b63e1,2024-07-11T13:05:54.930000 +CVE-2024-31322,0,1,d20c4b5ba34b42a0392eed2de4ecf00db6c97fef76cc64c816a4b4ded912e267,2024-07-11T15:05:40.467000 +CVE-2024-31323,0,0,a544d9a9ff2aa21c5fbb6fe91279f4ddfa1669db09487516ebfbf1d931a1974e,2024-07-11T13:05:54.930000 +CVE-2024-31324,0,1,97d477007c60c4e7e015994eba22a07898b7757a6832226ecfcf605a078ce0fe,2024-07-11T15:05:41.280000 +CVE-2024-31325,0,0,80e33a4833f6237bc4765f36ccc9a7e3eece55e1504b9aeb71a9c9792949a23e,2024-07-11T13:05:54.930000 +CVE-2024-31326,0,0,284eae06442124a693f10717424ff9de135112a9a37355db24d271d9f53a0149,2024-07-11T13:05:54.930000 +CVE-2024-31327,0,1,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 CVE-2024-3133,0,0,a7a7a4865524243743a9c88c08b8282b249ad835f6a96871747e7128048107a2,2024-06-07T19:15:24.213000 -CVE-2024-31331,0,1,ee3681b08cae6852ac0e24740bae3fb33eb861eb45c84d3034c14aed4d2a99ec,2024-07-11T13:05:54.930000 -CVE-2024-31332,0,1,52868f771e8f9f8046bb3d19550431cb1d1b23ac51101c56896baa0529d69cfc,2024-07-11T13:05:54.930000 -CVE-2024-31334,0,1,505d0a7195cf32a0d8005338af1bbe2f3acc69e5506b65c5e2e2ce726225f7ff,2024-07-11T13:05:54.930000 -CVE-2024-31335,0,1,7b94e1c7e2fff90cd056259c618020e41ea9dda128606e5b08242f9be882f42e,2024-07-11T13:05:54.930000 -CVE-2024-31339,0,1,d842eecc2743a2fe995de325a1733d346b74325c181dda07d57e292f38e3be81,2024-07-11T13:05:54.930000 +CVE-2024-31331,0,0,ee3681b08cae6852ac0e24740bae3fb33eb861eb45c84d3034c14aed4d2a99ec,2024-07-11T13:05:54.930000 +CVE-2024-31332,0,1,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 +CVE-2024-31334,0,1,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 +CVE-2024-31335,0,0,7b94e1c7e2fff90cd056259c618020e41ea9dda128606e5b08242f9be882f42e,2024-07-11T13:05:54.930000 +CVE-2024-31339,0,1,1b3aa03c0632b08b72325f6db66c9d2fa95219630c9b26fbdff47f9b0fe118cb,2024-07-11T15:05:42.757000 CVE-2024-3134,0,0,e04064345e517c38325e3c54708d3b5c2565ae5cbcc3f4d3393427e4c611d4fe,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31341,0,0,d4166215cbddfa0324e008e571dea19e89ceb3a6d8e359be3d6c61b47b5bedf9,2024-05-17T18:36:05.263000 @@ -250328,7 +250329,7 @@ CVE-2024-31890,0,0,eda850bb7869648d895763435641ab97f0cfe4aeba8f677c829b9f47f4e39 CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000 CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000 CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000 -CVE-2024-31897,0,0,2d8eec36cb7be2c8aef11633916897f01ca7ba5fac50856c9112223f7996357d,2024-07-08T15:49:22.437000 +CVE-2024-31897,0,1,a9f6dffdef42db63de321f283f9008f4cc590873723e0b6ff14df57c7407f3ac,2024-07-11T14:52:52.907000 CVE-2024-31898,0,0,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000 CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000 CVE-2024-31902,0,0,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000 @@ -250685,7 +250686,7 @@ CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb CVE-2024-32465,0,0,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000 CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000 CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000 -CVE-2024-32469,0,1,a9e5def06e4db8472decc90b984fed9339b3fda0e27ed47a28dbd2f3e4aaa483,2024-07-11T13:05:54.930000 +CVE-2024-32469,0,0,a9e5def06e4db8472decc90b984fed9339b3fda0e27ed47a28dbd2f3e4aaa483,2024-07-11T13:05:54.930000 CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000 CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000 CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000 @@ -250875,7 +250876,7 @@ CVE-2024-32663,0,0,5314dda8d87e66deb792118e9f1226c91443ff732a3d0787c2a306f63625c CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66145,2024-05-07T20:07:58.737000 CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 -CVE-2024-32670,0,1,11e459444671f45b9f26d0cdaea8328e4da91a68f683a4e2c21fd5a0bc52f597,2024-07-11T13:05:54.930000 +CVE-2024-32670,0,0,11e459444671f45b9f26d0cdaea8328e4da91a68f683a4e2c21fd5a0bc52f597,2024-07-11T13:05:54.930000 CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000 CVE-2024-32673,0,0,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000 CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 @@ -250961,7 +250962,7 @@ CVE-2024-32754,0,0,607be943cbec19ebc26898f36a5e33ae0135cc060ad9e54e1f721e2b27b87 CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000 -CVE-2024-32759,0,1,7c7315c67eca6ca87b6219c7219d6592c894d679ee2457c385dac7a3c3446a5c,2024-07-11T13:05:54.930000 +CVE-2024-32759,0,1,e561891056edc630b07789b7eea3e9c4ca316a3bd4320f86e19aed48b57191eb,2024-07-11T15:15:11.627000 CVE-2024-3276,0,0,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1fe,2024-07-08T14:19:01.997000 CVE-2024-32760,0,0,67074d2cb149a548f5ca201a895261189c469e9d7c384fe074a8d7f159cb359a,2024-06-10T18:15:34.203000 CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000 @@ -251072,26 +251073,26 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9 CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000 CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000 CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000 -CVE-2024-32891,0,0,8a0f5363d9fa6b1b1d084c97d802fb52ab823370d67e6fcfdd19d9b8bf57ceb5,2024-07-03T01:57:12.270000 -CVE-2024-32892,0,0,d09cf621a5198640d1590bf812307f6494b4f7236754c48113551ae4952a9d05,2024-06-17T12:43:31.090000 -CVE-2024-32893,0,0,0c1878ef4b8a7d4b4acf328abd68508f07e7b92789dcfcb4c893201f835ef8ad,2024-07-03T01:57:13.633000 -CVE-2024-32894,0,0,1fee7d149001a152aa78b170399fbb77214c62b2843c8bc991616757309d5d12,2024-06-17T12:43:31.090000 -CVE-2024-32895,0,1,3b5e93f479d0a309808bc7ab37e73f0b736af7b90a097c9affa7582da06b56cb,2024-07-11T13:58:33.960000 +CVE-2024-32891,0,1,c51a973b7029c344fedc0ca35231006f50e6ba4e1865b40154956cad18052b36,2024-07-11T14:05:11.717000 +CVE-2024-32892,0,1,6a017ad3b0c485077b83258ac2bcaa1581888670cd70963636eab58dba47d221,2024-07-11T14:04:49.010000 +CVE-2024-32893,0,1,b11c36070d9dea986999a56213dd8e5d4f6f27474c49daf549b45061c7426f08,2024-07-11T14:04:33.807000 +CVE-2024-32894,0,1,ba70a76f8b71eb537b49cee6f7fa1a0772490fb4332fb5fa1e4daabf4368ae19,2024-07-11T14:03:46.810000 +CVE-2024-32895,0,0,3b5e93f479d0a309808bc7ab37e73f0b736af7b90a097c9affa7582da06b56cb,2024-07-11T13:58:33.960000 CVE-2024-32896,0,0,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000 -CVE-2024-32897,0,0,4fc5f5a460c93bb0780e03b36b9c9aaf78b9c8c9778a57de9d64a615622f29cc,2024-06-17T12:43:31.090000 -CVE-2024-32898,0,0,dbe7241acfd745ff54bd5f0779b9ba062f0846b5eaffdbdf1772f5da50654c30,2024-06-17T12:43:31.090000 -CVE-2024-32899,0,0,1fa76a3766c2befa12f68cc07845b1b461a678de0b835ce3e5011f07f790b2d8,2024-06-17T12:43:31.090000 +CVE-2024-32897,0,1,90e26042088ada707b934da98a5303718a15c9664281ad13fb45655a7f047677,2024-07-11T14:28:06.287000 +CVE-2024-32898,0,1,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f63479422a,2024-07-11T14:28:44.707000 +CVE-2024-32899,0,1,340496ecc0d2e0aeac26e79f6c9fe8ba7bf118c672601a30b8ddfc0e1352d2fa,2024-07-11T14:22:06.627000 CVE-2024-3290,0,0,0ad1b84ced42c9f8a7789dc01b4a01dc3eea4ac518ae7e87d453cc71fd0f450a,2024-05-17T18:35:35.070000 -CVE-2024-32900,0,0,96261e8ef1c2884873b97f1bad5198de6a56be8dd940ce84a415e12da5bbec2c,2024-06-17T12:43:31.090000 -CVE-2024-32901,0,0,f50911eebb5339d2ea2a2152e895560d3377ec125a8c19a5ffea6f917797d733,2024-06-17T12:43:31.090000 +CVE-2024-32900,0,1,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000 +CVE-2024-32901,0,1,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000 CVE-2024-32902,0,0,3ebbe8411081db4082bdb0363bed0385f59552cb49e3c4245a8448b5cd92c0aa,2024-06-17T12:43:31.090000 -CVE-2024-32903,0,0,93e670072f9d2b482a8f504a8514776c0f289ba8f85365c76415e3b1dc44a39f,2024-06-17T12:43:31.090000 -CVE-2024-32904,0,0,2035ed8e2e2a565c2d9db5032953ccaf4fad84f0fd671940fde1df0af13b4700,2024-06-17T12:43:31.090000 -CVE-2024-32905,0,0,d670a9241a3bdf998e13f75e7120c696612525b30b4d025868886f8cc8b392db,2024-06-17T12:43:31.090000 -CVE-2024-32906,0,0,907618472b4cb1ef279d4db4d523e0aa39ecda75eb634d2958bf785214529a58,2024-06-17T12:43:31.090000 -CVE-2024-32907,0,0,ecf352ba7f122d5e499c50e4fb6a50b8f36f0142b4f18285166dda88585a4524,2024-07-03T01:57:15.760000 -CVE-2024-32908,0,0,5e17516d74c81a571eb46e1e40f4e2ff9d7648d3b36532375875a466d92fd5b0,2024-06-17T12:43:31.090000 -CVE-2024-32909,0,0,0271a6d7e80d0421d9b45d3c4e1d1b7f725eb29d18c395ad0687c7cee94a0f6f,2024-07-03T01:57:16.980000 +CVE-2024-32903,0,1,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000 +CVE-2024-32904,0,1,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000 +CVE-2024-32905,0,1,2eb41f0e9cf9f3f2b219d556555b371f4f2bedea99fc9e25c35c0e862b4a23e1,2024-07-11T15:13:21.467000 +CVE-2024-32906,0,1,09fc4e5210ea82962a397f90475a93836b6dc6161443f25a2b71164b58f1e099,2024-07-11T15:13:02.713000 +CVE-2024-32907,0,1,14dfd1aaa25a46fea5214540e8b9086c0e794eff9e7591e8b296e1769fd633c5,2024-07-11T15:10:44.407000 +CVE-2024-32908,0,1,312c1682636aeea08a2f2a9045f0fc01526c00f32557a30c9ee32dc9a3e3ada2,2024-07-11T15:07:31.087000 +CVE-2024-32909,0,1,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000 CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000 CVE-2024-32910,0,0,29cf6a0531855d50f315c3452df6e0eb31144ad7ac2ecf6b02a60ca456807cc8,2024-06-17T12:43:31.090000 CVE-2024-32911,0,0,e16102a4588453c66372cc339d8de78a8fe0bf75217d40b17bff15240917476b,2024-06-17T12:43:31.090000 @@ -251240,7 +251241,7 @@ CVE-2024-33227,0,0,dba47dc6901331cd8b2c437b00c864f39f98ab616998125012a5d6f0fc649 CVE-2024-33228,0,0,f3448597a287250f65febdc50573b1814b9e5e5281e20e4e28a9c439a03cbb22,2024-05-22T18:59:20.240000 CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000 CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000 -CVE-2024-3325,0,1,193bc1753a3fc6fd93e30259616a7293fd0fe95b6e6f92a0eca662fdfb52453b,2024-07-11T13:05:54.930000 +CVE-2024-3325,0,0,193bc1753a3fc6fd93e30259616a7293fd0fe95b6e6f92a0eca662fdfb52453b,2024-07-11T13:05:54.930000 CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000 CVE-2024-33253,0,0,9724c511857718d0a8259b3f2abfa4544637a582271dda703908f0d9d40ec502,2024-06-17T12:43:31.090000 CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000 @@ -251274,7 +251275,7 @@ CVE-2024-33308,0,0,c51602bb951dc504524489be700ba980c6849c038059ed7b24a552934a0ff CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867601,2024-05-17T02:39:23.810000 CVE-2024-3331,0,0,5769fc47c1644a784687913176ff51174f40b1dc158ef3146eb07b8f4d35b9c7,2024-06-27T19:25:12.067000 CVE-2024-3332,0,0,6475dd8615470e05caa4cfca0bde81007e5136e29693035b9a6ba3bc47d4e7b4,2024-07-05T12:55:51.367000 -CVE-2024-33326,0,0,b90f29482e3bcb6c2b44c820dead0a36809bf9caec6cc328c780a1108f67fd54,2024-07-11T04:15:04.567000 +CVE-2024-33326,0,1,d73ab10e37e6fff7acaaff3cdf41abf13e6156ac0dfdf9f1bbe625be5e918e4a,2024-07-11T15:05:43.450000 CVE-2024-33327,0,0,11853dac14c64dea04c3fc1d14076059697e4360541f7f4148789b175d5cb655,2024-07-11T04:15:04.777000 CVE-2024-33328,0,0,fcc2c106d7db5e2b3ce84edb4c966112499f1f44ab7ff06c82fffe3937775387,2024-07-11T04:15:04.947000 CVE-2024-33329,0,0,01adda01577489cdd90fc465b37d3b119462b0d0936052d760de6d53a020a4a5,2024-07-11T04:15:05.070000 @@ -251758,7 +251759,7 @@ CVE-2024-34096,0,0,b211b538fffe9abfd3a63762f76226325b711bcb377209279662a8a0721f8 CVE-2024-34097,0,0,80fabf82621e388228ad3681519752bd50189e2d3b21266b60e2b336e675dc88,2024-05-15T16:40:19.330000 CVE-2024-34098,0,0,b12c4c03c14c7ac462d32d4a1e50d77fdbffead011cc26736694e970715f1621,2024-05-15T16:40:19.330000 CVE-2024-34099,0,0,a5986ac74e6b192dfee0f6656002b6da38300bc4846a845af7e18d0e591fa17c,2024-05-15T16:40:19.330000 -CVE-2024-3410,0,0,d3f1a155755667926cb55b7bfbd33efb5c0e26bee1f4306e65461688d01a869d,2024-07-09T18:19:14.047000 +CVE-2024-3410,0,1,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000 CVE-2024-34100,0,0,d3c0a25a5afbb7abe23e48a0ccffbfabed32f430bdde6425683076da7ff2f5a6,2024-05-15T16:40:19.330000 CVE-2024-34101,0,0,d4650521d311c5f5db989961cb59afe8f4d3fccf28beebc265bb44f9beb6fac8,2024-05-15T16:40:19.330000 CVE-2024-34102,0,0,8b1e6e557dce53483243926c2b72d923bdfc128d2c064f0699990d66fcdbe8e2,2024-07-09T16:00:38.170000 @@ -251780,13 +251781,13 @@ CVE-2024-34119,0,0,2b28f435955ad18fc8fcb42f0ece270dcf2db721e55508a9a5713cf979769 CVE-2024-3412,0,0,eba0eb1a658dd1d7813104d95660e0a431a5e786fc8e6854f237ea1b5879eab4,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,5d7df179ca1b4156f6cc057947fff0d548e9af4c6b85c2f9635b6b268004f3b7,2024-06-14T20:02:45.567000 CVE-2024-34122,0,0,4f9228b802a53076ae2e05a9634541c34d86113269eb50413207e641d1aa51eb,2024-07-02T17:44:45.700000 -CVE-2024-34123,0,1,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 +CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 CVE-2024-34129,0,0,d3dc43049d80f783794d9399825be80ea683040539452e8a7be93120bda8c4de,2024-06-13T18:35:19.777000 CVE-2024-3413,0,0,8bf7e231eaef8a1fb270998ee982f12463c5a7d17ff17eb8735dbc8fc584bd57,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,89584332f9dd3125064424fac4aabed722eb075df05ba25c9a02617aa8a6856c,2024-06-13T18:35:19.777000 -CVE-2024-34139,0,1,31d5c4a8a58cc938349a57ec1f1fa8db5c0718d4f925f1121432b335f8c9c667,2024-07-11T13:06:13.187000 +CVE-2024-34139,0,0,31d5c4a8a58cc938349a57ec1f1fa8db5c0718d4f925f1121432b335f8c9c667,2024-07-11T13:06:13.187000 CVE-2024-3414,0,0,69231815197d8c759df4a79a39950c8d4f6258471ea32f1c29be1a7038b6ec47,2024-05-17T02:39:54.160000 -CVE-2024-34140,0,1,d42a485cda9b4c14ee3827526c2ca3f4dbd317f45889049c0298065354f30d82,2024-07-11T13:06:13.187000 +CVE-2024-34140,0,0,d42a485cda9b4c14ee3827526c2ca3f4dbd317f45889049c0298065354f30d82,2024-07-11T13:06:13.187000 CVE-2024-34141,0,0,0328c765f70a818d854683e04e980b09961525d5dd8879ace860d192776bc00d,2024-06-25T12:24:17.873000 CVE-2024-34142,0,0,c526b1831039e375b135e55cb58a71752c1b1dd1103a82d9d4050eb194a5f7f7,2024-06-25T12:24:17.873000 CVE-2024-34144,0,0,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000 @@ -252092,8 +252093,8 @@ CVE-2024-34599,0,0,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71 CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000 CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000 CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 -CVE-2024-34602,0,0,f351caede943efd7324bd45f876ac04d9b65bcd105b5e13de85fcc84acb087bc,2024-07-08T15:49:22.437000 -CVE-2024-34603,0,0,c01a64457a3bee42af7c5f1633273296c0f21e3d83c542aad0881238f7c8d114,2024-07-08T15:49:22.437000 +CVE-2024-34602,0,1,a60646663cb8bf2eacd70cfaa4af39d147258b355ffc1f4917ce8b43a426de00,2024-07-11T14:49:05.190000 +CVE-2024-34603,0,1,b2a7efbfdb851e561adba39caae4f17a953dcd69be4ed4e578d4b1a9a528f9aa,2024-07-11T14:48:47.467000 CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000 CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000 CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000 @@ -252138,13 +252139,13 @@ CVE-2024-34715,0,0,caff2451aacd33d9c1785db66ba7b81c7f2c3b630c6b9d2ce069d8a61cc25 CVE-2024-34716,0,0,86dd1938143b344fc361262a3b1c662de4efbcaa04e6b10cb049ee8700b9a271,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,2b916dc6a1e09850236d38da24f3e36a503c2d4e64c7e637d4f378867f8ef155,2024-05-14T19:17:55.627000 CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 -CVE-2024-34720,0,1,ad9e8e18334149cc86a5b7493717ca793d637ad8533bb7504c9258989530a492,2024-07-11T13:05:54.930000 -CVE-2024-34721,0,1,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000 -CVE-2024-34722,0,1,c260ecb3dbfb3ee293b3ce1efe4ba187888cf5868c63b0406fd7450095747907,2024-07-11T13:05:54.930000 -CVE-2024-34723,0,1,f4857b782f202665c6d21686d6676e2a94629913a685bc714558d5ffdb0a6c3e,2024-07-11T13:05:54.930000 -CVE-2024-34724,0,1,4da53c90a9b873ce90ea05a00658380d5b584241eb1232fc8a30445b4f3d9630,2024-07-11T13:05:54.930000 -CVE-2024-34725,0,1,98e9d37a940b2073d776990c8ea0e21b460d0fca7f102ef542f0502f179475c7,2024-07-11T13:05:54.930000 -CVE-2024-34726,0,1,490ca003d093fff54f3005804c29431a8b57ce31132aa4a7f4b6f3507b79aa85,2024-07-11T13:05:54.930000 +CVE-2024-34720,0,0,ad9e8e18334149cc86a5b7493717ca793d637ad8533bb7504c9258989530a492,2024-07-11T13:05:54.930000 +CVE-2024-34721,0,0,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000 +CVE-2024-34722,0,0,c260ecb3dbfb3ee293b3ce1efe4ba187888cf5868c63b0406fd7450095747907,2024-07-11T13:05:54.930000 +CVE-2024-34723,0,1,36e1d31ff280bd2515129a3078844d3841f9954790c36988b12cf571242a9f30,2024-07-11T15:05:45.123000 +CVE-2024-34724,0,0,4da53c90a9b873ce90ea05a00658380d5b584241eb1232fc8a30445b4f3d9630,2024-07-11T13:05:54.930000 +CVE-2024-34725,0,0,98e9d37a940b2073d776990c8ea0e21b460d0fca7f102ef542f0502f179475c7,2024-07-11T13:05:54.930000 +CVE-2024-34726,0,1,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-3473,0,0,ecf07ac84ad9a3f593fb990c7a6940d333eabefd6a4358103eba0f21665023d1,2024-05-02T18:00:37.360000 CVE-2024-3474,0,0,92034c6e8e03ef9947dcf9fd02cc16997c4bf0b4b196a87ecd9d32a4fbd7f10b,2024-05-02T13:27:25.103000 CVE-2024-34749,0,0,fe5f41bd42e695276d38161b9a2d636fec6ebfca2120aa0bc8cb065f0e443352,2024-06-04T19:20:02.877000 @@ -252334,7 +252335,7 @@ CVE-2024-35140,0,0,45c3bb60ea04b1120d4f838be7226beea8411238e0d1eeb8dfdc4424ca0b5 CVE-2024-35142,0,0,2e771ea16b161d7fa34214dfdb10478412ee26ce44f8ad533bb2991294386c64,2024-05-31T19:14:47.793000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 CVE-2024-35153,0,0,86727db419cb843920e5cd4c7a87cf5b7fde13fc70ca82a13eb4d069ddb821d5,2024-06-27T19:25:12.067000 -CVE-2024-35154,0,1,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 +CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 CVE-2024-35155,0,0,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000 CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000 @@ -252625,7 +252626,7 @@ CVE-2024-35669,0,0,50fdf0a24706bbfb18b8d81f89a1a124dc9b63509d660740d809f07073f8b CVE-2024-3567,0,0,6c98824b61fbf01fa2e17d4630ab262f6d678625fc1c8f56ac29573cad1df238,2024-06-10T18:39:52.067000 CVE-2024-35670,0,0,b47b6d86ae05a8cb55f18ead8897a2d59e2d4fe072a8348cc9c3af0c4830540f,2024-06-11T14:32:50.147000 CVE-2024-35671,0,0,fd5ff04d66fb106c6ca271e8de1db731d8e556a5aecc794bb3c98d6bdac41f1f,2024-06-13T18:36:45.417000 -CVE-2024-35672,0,0,f5cde77be8b977a403dcc5da9d3170558a42d1cdb8b3dd29d71d6133c17991f5,2024-06-11T14:21:04.210000 +CVE-2024-35672,0,1,36402c609c6f10c2c4ab99769d453a53c0ccdb977852c177a10eab32a78fbc3e,2024-07-11T15:15:11.733000 CVE-2024-35673,0,0,2711db729ce9cbebdbfc8bb8cda940b111717768b11f75e605988c758f807568,2024-06-14T18:14:49.347000 CVE-2024-35674,0,0,83ea165a8a309b2a7c99f91f27d6ab747e72840d8c9398d8fec8255e0f1eb9a7,2024-06-18T18:10:50.157000 CVE-2024-35675,0,0,2ddb4dad047f65a8b834345449c654352fcacfb965b8ff1d42078ac11d7774c5,2024-06-10T02:52:08.267000 @@ -253289,10 +253290,10 @@ CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8 CVE-2024-3643,0,0,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d3b,2024-05-16T13:03:05.353000 CVE-2024-3644,0,0,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 -CVE-2024-36450,0,1,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000 -CVE-2024-36451,0,1,82df1f139b889f620bdbbc36200ece748111b300f87c92ef073574309e68e5bc,2024-07-11T13:05:54.930000 -CVE-2024-36452,0,1,de0ddf9ec46c34a45ea45b28170f7953241f05d2c2c229b8d849dbb88c728f2a,2024-07-11T13:05:54.930000 -CVE-2024-36453,0,1,70605f8bfd250a2fc52d22eef74e04fa9d7bd01676146b6b8e44458c23a927ff,2024-07-11T13:05:54.930000 +CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000 +CVE-2024-36451,0,1,0282b5798612593892f8b22f51a38ce8164272f8754ea7af1c514e9b953ab154,2024-07-11T15:05:47.857000 +CVE-2024-36452,0,0,de0ddf9ec46c34a45ea45b28170f7953241f05d2c2c229b8d849dbb88c728f2a,2024-07-11T13:05:54.930000 +CVE-2024-36453,0,1,4f2b528f0e3096ddd2a4aee4fe033e97d4113146188596ed5c407d648083f582,2024-07-11T15:05:48.797000 CVE-2024-36454,0,0,119ecbd34abcc47a263eca5a7b8a20f07f9103015a4c85c0f4c832e1c8eae2d9,2024-06-13T18:36:09.013000 CVE-2024-36459,0,0,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 @@ -253319,7 +253320,7 @@ CVE-2024-36500,0,0,257fd399a14a7141c50c9e2046f94aaac781c0de172f7af5b46d8dab39ba2 CVE-2024-36501,0,0,31cf8d7c71722235c9f044b51d6c28f28965439d43fd3f0fcf21214d656b125f,2024-06-17T12:42:04.623000 CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc44342549d0,2024-06-17T12:42:04.623000 CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000 -CVE-2024-3651,0,0,8821f4cdcd404e8a3949e21d008cf13cf8482c495df0667a422ca05edf2db665,2024-07-08T15:49:22.437000 +CVE-2024-3651,0,1,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 CVE-2024-36526,0,0,1ef54497acba69e484a273933341aeb22209d47656c43c34648a5bf39e748b3e,2024-07-09T18:18:38.713000 @@ -253374,7 +253375,7 @@ CVE-2024-36670,0,0,98051372c03c4f8daf963a6b52983fb8a9582924dc9f1a3de21e1b0831613 CVE-2024-36673,0,0,c3fdb493385fd7349af8a7f0f647aa65a0c25320dc90b659d1425197d89ce5bd,2024-06-11T18:27:20.950000 CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000 CVE-2024-36675,0,0,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000 -CVE-2024-36676,0,1,a5d327aee08516df56e93de37a5203192b293f35b0cda1a8900cc2e634ae4ff4,2024-07-11T13:05:54.930000 +CVE-2024-36676,0,1,a6f2730c67158cf77e7177475d528da2c111a9270c55f8edde3fbb0f8476e94d,2024-07-11T15:05:49.017000 CVE-2024-36677,0,0,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000 CVE-2024-36678,0,0,c0825943f1d5219c9624193357755cc06a7e20f8bcb4f135a8b3456b8cac03b6,2024-07-03T02:03:29.450000 CVE-2024-36679,0,0,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0c1d,2024-07-03T02:03:30.273000 @@ -253636,11 +253637,11 @@ CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4 CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000 CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 -CVE-2024-37110,0,1,22f8d158d06eab5c827b62e4e01a4e15ed273058bbfba1db2001625565816b18,2024-07-11T13:05:54.930000 +CVE-2024-37110,0,0,22f8d158d06eab5c827b62e4e01a4e15ed273058bbfba1db2001625565816b18,2024-07-11T13:05:54.930000 CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000 CVE-2024-37112,0,0,906b6afd1221b533b38819c616c93e995b341fa67c658fbfc350c9fd924bc330,2024-07-09T18:19:14.047000 -CVE-2024-37113,0,1,37d3d4abcaab1ee13f503423a0fed9458bee73e3912cbad0e423bdb46e50b8dc,2024-07-11T13:05:54.930000 -CVE-2024-37115,0,1,c4756c61d3182bc7983d562b038bd1b97c9dd3293a1a84c5b8fb1495fbe9c68f,2024-07-11T13:05:54.930000 +CVE-2024-37113,0,0,37d3d4abcaab1ee13f503423a0fed9458bee73e3912cbad0e423bdb46e50b8dc,2024-07-11T13:05:54.930000 +CVE-2024-37115,0,0,c4756c61d3182bc7983d562b038bd1b97c9dd3293a1a84c5b8fb1495fbe9c68f,2024-07-11T13:05:54.930000 CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 @@ -253657,11 +253658,12 @@ CVE-2024-37140,0,0,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34 CVE-2024-37141,0,0,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000 CVE-2024-37145,0,0,5c583bad753181323e403ceb6f4418c69209cee6463fe8ada19cf90c7991fb5f,2024-07-02T12:09:16.907000 CVE-2024-37146,0,0,d5817f16e70393732c114867d4a0a6a7a44408de06d35e1f4b6b81d6827c298f,2024-07-02T12:09:16.907000 -CVE-2024-37147,0,1,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000 -CVE-2024-37148,0,1,80bea212d724fd8426f29ccd28ad47ac03ff4315e23f67a8b6a1a81a53973b06,2024-07-11T13:05:54.930000 -CVE-2024-37149,0,1,62da2a22ca18555c3b147f38a3030ae567e778beceec162cc580c895135a35f0,2024-07-11T13:05:54.930000 +CVE-2024-37147,0,0,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000 +CVE-2024-37148,0,0,80bea212d724fd8426f29ccd28ad47ac03ff4315e23f67a8b6a1a81a53973b06,2024-07-11T13:05:54.930000 +CVE-2024-37149,0,0,62da2a22ca18555c3b147f38a3030ae567e778beceec162cc580c895135a35f0,2024-07-11T13:05:54.930000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000 +CVE-2024-37151,1,1,e318eb9efc28cf4a8de13391434038dbda7c22f59eebc0c8cb67a28655779714,2024-07-11T15:15:11.847000 CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000 CVE-2024-37153,0,0,61a2831c55890f9a410cc075d806b38e60c3b9609259f6ca16f7a060d646905b,2024-06-07T14:56:05.647000 CVE-2024-37154,0,0,58669c60bd370ee58122b9f7af67de36a61a42702559484c7a8e000321217599,2024-06-07T14:56:05.647000 @@ -253696,7 +253698,7 @@ CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0 CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000 CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000 CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000 -CVE-2024-37205,0,1,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000 +CVE-2024-37205,0,0,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000 CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000 CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000 CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000 @@ -253723,7 +253725,7 @@ CVE-2024-37260,0,0,71ae32d07f60a869d4092274a4024739c347edcdf7f6c400a5ce16269ff56 CVE-2024-37266,0,0,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000 CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000 CVE-2024-3727,0,0,8e07517a9dca0048f3a5546e14ea5eaec2b195c195e356a5ec35a7e996ce9012,2024-07-03T17:15:04.780000 -CVE-2024-37270,0,1,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 +CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d24b,2024-06-13T18:35:19.777000 CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000 @@ -253747,7 +253749,7 @@ CVE-2024-37307,0,0,307a9077f465a844bb3929ae05a1dcebcb701d8b2ae344b6539171566dfcc CVE-2024-37308,0,0,789ac1ee79bf50a380c8842b793e1f03cbcea96755a8db8c09ad817d1922f353,2024-06-13T18:35:19.777000 CVE-2024-37309,0,0,665df876b2164bd39f49af0dbd8eb55d8bda11b715021fb1a958468109ece0ed,2024-06-13T18:35:19.777000 CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000 -CVE-2024-37310,0,1,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601463,2024-07-11T13:05:54.930000 +CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601463,2024-07-11T13:05:54.930000 CVE-2024-37312,0,0,ba4f355e4f74a8bde30dcfd48ce758e7796e43079453cb77192f0999aacce83a,2024-06-17T12:42:04.623000 CVE-2024-37313,0,0,bad34f14f8fcac47115250f6ec4bbac8493c061a0b49da4b4fbe2645f7a82474,2024-06-17T12:42:04.623000 CVE-2024-37314,0,0,bbb529e96a1bf18f91583a0e4981cbc0e945b7a77e11c3672e59d0ae8b6a6421,2024-06-17T12:42:04.623000 @@ -253803,7 +253805,7 @@ CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67 CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000 -CVE-2024-37389,0,0,c0a13b8fa894cb8d08fa22bae9dc75d31042a18f1b408b7fc213f507ef92c08d,2024-07-08T15:49:22.437000 +CVE-2024-37389,0,1,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 @@ -253839,21 +253841,21 @@ CVE-2024-37486,0,0,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5b CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000 CVE-2024-37494,0,0,b88e83b573725f4d6071fa3bac5e334c7dc8623314e237fe1108a022bee0ee27,2024-07-09T18:19:14.047000 CVE-2024-37497,0,0,f3a028679a67965f61b937156a53d1c18994178b3cd3c35e2a4dd898dd2a4aa7,2024-07-09T18:19:14.047000 -CVE-2024-37498,0,1,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000 +CVE-2024-37498,0,0,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000 CVE-2024-37499,0,0,f79cc5cf94609c9d5258a38082f5705921e4f313d9316f7fd282a1335ce3d3df,2024-07-09T18:19:14.047000 CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 CVE-2024-37501,0,0,b78cf79ca308008e9008944af9630d58467f84a62f039c6a1e72ef46a8059faa,2024-07-09T18:19:14.047000 CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 -CVE-2024-37504,0,1,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 +CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 CVE-2024-37513,0,0,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-37520,0,0,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000 -CVE-2024-37528,0,0,dcc35f546d6b7f143e08b2e796afc57ba01587f3b3341db2d2f1e11d1d9405d8,2024-07-08T15:49:22.437000 +CVE-2024-37528,0,1,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 -CVE-2024-37539,0,1,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000 +CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000 CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000 -CVE-2024-37541,0,1,1f46bbe98bcc26e8385382a14ef7dedf6c0e9f6a09394a6b26798763f5000b58,2024-07-11T13:13:15.977000 +CVE-2024-37541,0,0,1f46bbe98bcc26e8385382a14ef7dedf6c0e9f6a09394a6b26798763f5000b58,2024-07-11T13:13:15.977000 CVE-2024-37542,0,0,6d89e302c059e61e6dee79263ba1d9b292db94b7349a74f25580291f658a0ce4,2024-07-08T15:49:22.437000 CVE-2024-37546,0,0,95bca18091533d24779b9d9541af789d17a54cddb8f47507626120eab0314784,2024-07-08T15:49:22.437000 CVE-2024-37547,0,0,da07cdaafbcdf5f6f48dcc010bdacf6feb2c6627ede1b87455a66a3564df588f,2024-07-08T15:49:22.437000 @@ -253940,7 +253942,7 @@ CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc34243b0,2024-07-08T16:41:23.650000 CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f325,2024-07-08T16:37:28.323000 CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000 -CVE-2024-37770,0,1,90a7e8f972f371a966f4dcaf34dcbf47b46d3c00663fe1bb1b1b3eb0e8cde6e9,2024-07-11T13:05:54.930000 +CVE-2024-37770,0,1,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000 CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000 CVE-2024-37791,0,0,aac0a75365a73d05a49838e7a7b1ba90a794339affdf6e30eec1aa9fd749c48e,2024-06-20T12:44:01.637000 @@ -253959,9 +253961,9 @@ CVE-2024-37820,0,0,0a0996a8947e2895e99ed868e2f9dddf9b73eaadf620faf0715e497fd47a9 CVE-2024-37821,0,0,dad227ff1e39e1e08a617033ca30de21cc87f5062f829537e300bad0e33ab0a8,2024-07-03T02:04:48.313000 CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000 CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000 -CVE-2024-37829,0,1,9b73d14757acd9b5a1d4d8ac21b274f9fa0e367223e25c502d550fcd9f8a8ca1,2024-07-11T13:05:54.930000 +CVE-2024-37829,0,1,1e83f5827db2aebd4e043417419d588d621c3e555f2d66c999e782ce41670452,2024-07-11T15:05:54.680000 CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000 -CVE-2024-37830,0,1,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122afec,2024-07-11T13:06:13.187000 +CVE-2024-37830,0,0,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122afec,2024-07-11T13:06:13.187000 CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000 CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 @@ -253971,12 +253973,12 @@ CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000 -CVE-2024-37865,0,1,afa406c73653f017546305f09b19c359bf5691bd7386c950c60dfcea42c3cf59,2024-07-11T13:05:54.930000 +CVE-2024-37865,0,0,afa406c73653f017546305f09b19c359bf5691bd7386c950c60dfcea42c3cf59,2024-07-11T13:05:54.930000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 -CVE-2024-37870,0,1,0021ada25c2ba8466304ad46788adea08218f84efb7f6d0bba03ba76aad30b01,2024-07-11T13:06:13.187000 -CVE-2024-37871,0,1,aa9890ff0ae413f80f04a048dace30a03437abb067b5b547db98731fdbf9d876,2024-07-11T13:06:13.187000 -CVE-2024-37872,0,1,d08275c05be50432c03c5ad56489a099130fb68799f56932f00af7082219c5d4,2024-07-11T13:06:13.187000 -CVE-2024-37873,0,1,aa8b3b2aad2e3927f58b95e8f826c6c2da0db8ab8e6880847c0cc4eecf275fb0,2024-07-11T13:06:13.187000 +CVE-2024-37870,0,0,0021ada25c2ba8466304ad46788adea08218f84efb7f6d0bba03ba76aad30b01,2024-07-11T13:06:13.187000 +CVE-2024-37871,0,1,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b317,2024-07-11T15:05:55.507000 +CVE-2024-37872,0,0,d08275c05be50432c03c5ad56489a099130fb68799f56932f00af7082219c5d4,2024-07-11T13:06:13.187000 +CVE-2024-37873,0,0,aa8b3b2aad2e3927f58b95e8f826c6c2da0db8ab8e6880847c0cc4eecf275fb0,2024-07-11T13:06:13.187000 CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000 CVE-2024-37878,0,0,6ab5285f65d3836bfce4373eeb59284bc38e780244a86b2dd9df8f43f28d93d7,2024-06-13T18:36:09.010000 CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000 @@ -254023,17 +254025,17 @@ CVE-2024-37974,0,0,dfc3c75b51e50ce6f8088d248adddcc721c138400e8f3a51211a6df941233 CVE-2024-37975,0,0,0379e1fb3fee56719b10aafc84bc4d77924a9c2c055fdec77fc3f1884abda39c,2024-07-09T18:18:38.713000 CVE-2024-37977,0,0,f47f8b621b5dcee65340c6657ec712f617d2fe8bf8a4c602f2b0c3cb9fa66926,2024-07-09T18:18:38.713000 CVE-2024-37978,0,0,868ba15e50cdf25648e409e7f700f1f6ec06c7e1296005e0f1e13b9c664af6c0,2024-07-09T18:18:38.713000 -CVE-2024-3798,0,1,bb3c730aae494e2730a92b5d383c6df62ac07389833b14c4e15164a45fb4d7c2,2024-07-11T13:05:54.930000 +CVE-2024-3798,0,0,bb3c730aae494e2730a92b5d383c6df62ac07389833b14c4e15164a45fb4d7c2,2024-07-11T13:05:54.930000 CVE-2024-37981,0,0,d0a194094cce4ea4fa26be36ad567f878363b7ab0e3a73c3ce3496dd636c3768,2024-07-09T18:18:38.713000 CVE-2024-37984,0,0,661e877897f48deeba7f2b8906f18e3db9d8306f818f3e6d9ab1bfc048bacb9f,2024-07-09T18:18:38.713000 CVE-2024-37986,0,0,35347a55f6fe6bfb5b12edd95fe64ac3bf27f2eb6b52d7f793c6f43d6581664d,2024-07-09T18:18:38.713000 CVE-2024-37987,0,0,aa23196855f0aafc038d24a288ca20b3e67802fe46a356448fbefff51b5cdd24,2024-07-09T18:18:38.713000 CVE-2024-37988,0,0,2249a5a94ff62fbd1049e849814709b898dd042c53980bc1ebb966a779e1b45f,2024-07-09T18:18:38.713000 CVE-2024-37989,0,0,dcd9251350b8312f967ccfaf6bed908ce52042da267c0e5378c80314fb15c24a,2024-07-09T18:18:38.713000 -CVE-2024-3799,0,1,3a96a27c53ed7e1d7cf2579e3ed9f69ec7ff0985324452d5e5c94bdef3f87f3a,2024-07-11T13:05:54.930000 +CVE-2024-3799,0,0,3a96a27c53ed7e1d7cf2579e3ed9f69ec7ff0985324452d5e5c94bdef3f87f3a,2024-07-11T13:05:54.930000 CVE-2024-37996,0,0,cba58d6ac90829d8d67ffd07f834ee70e887bc5c716a09a919d4b05a760695de,2024-07-09T18:19:14.047000 CVE-2024-37997,0,0,459dadeefbbac0d82b1c0c2a892387565fe96e62452959c2d684100f700aa64e,2024-07-09T18:19:14.047000 -CVE-2024-37999,0,0,2d39b716db03797e18d7479260305690f3ed6e27f89fd5f1e73a83d3c2ff359b,2024-07-08T15:49:22.437000 +CVE-2024-37999,0,1,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-38010,0,0,3461604452db863cea0374a4db8c11a9f6d691f87cb91dd9676efa380092ec2e,2024-07-09T18:18:38.713000 @@ -254086,7 +254088,7 @@ CVE-2024-38068,0,0,7aec38c4a9c167694ce42df8f3a9ca87f5bcb58fd50a5928f5a75f85101d9 CVE-2024-38069,0,0,a0b3d0207f6ca940ad376624326ecbd373bc1c1bf12037482ef1d1a974ac49e8,2024-07-09T18:18:38.713000 CVE-2024-3807,0,0,0018248fbe5cd3ad3d19de6c834f7e1f73352b7bbd9c92aa03f6a65e0b3f3d96,2024-05-14T16:11:39.510000 CVE-2024-38070,0,0,6d783cba0ab00bf76f35e4bab6e84029bb887237907f5e64952558dee021d92b,2024-07-09T18:18:38.713000 -CVE-2024-38071,0,0,1010e295e6eab5b3956161ac48e0cef387aa69e7b69fb5b06a6ab369be5c6ceb,2024-07-09T18:18:38.713000 +CVE-2024-38071,0,1,8da2364a3ae2228361f313a329533be39e734051820a4a426208a407d8a52407,2024-07-11T14:47:39.197000 CVE-2024-38072,0,0,86b7e18b91a90af8df2d0c013b3bb2421c7d53b207bed58b7e7387a1c2b6d703,2024-07-09T18:18:38.713000 CVE-2024-38073,0,0,56e4d1951cb5bac2d562a0c70bccd3573098b798a15c5ce3a563445f960816ad,2024-07-09T18:18:38.713000 CVE-2024-38074,0,0,c0a843abfb5a8b8c595f204778ac7258ce13c13886138a3eb856055572c32965,2024-07-09T18:18:38.713000 @@ -254154,7 +254156,7 @@ CVE-2024-3829,0,0,3665a2ef01b9d2a532a67b6bd535e92cc829779e81e658e1b77983bbc06d00 CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000 CVE-2024-38294,0,0,5ead4befff2b61ceb0efdd186e7234e4e666514924ffa35ab4e04f3aea639e9b,2024-06-13T18:36:09.010000 CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f708b,2024-06-13T18:36:09.010000 -CVE-2024-38301,0,1,f2a37402ef8b0d31ff3ea0e1d564c9225d55bf4ff53ba3d88dbb3b4cbe725ed6,2024-07-11T13:05:54.930000 +CVE-2024-38301,0,0,f2a37402ef8b0d31ff3ea0e1d564c9225d55bf4ff53ba3d88dbb3b4cbe725ed6,2024-07-11T13:05:54.930000 CVE-2024-38306,0,0,e0aec5c158deb0f01179376e98c8bad40403be7c0bb21d50ea0989f9fb4a8b33,2024-06-25T18:50:42.040000 CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000 CVE-2024-38312,0,0,a025bc282a0932c71cb95ccc5342a2a383a8f77cb388790ae2ac3d82d89cfc0a,2024-06-17T12:43:31.090000 @@ -254164,7 +254166,7 @@ CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 -CVE-2024-38330,0,0,653d6c4746fe821775fa6c90764cf2d57a108aecec5cc44075995b1cad35b0dd,2024-07-08T15:49:22.437000 +CVE-2024-38330,0,1,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000 CVE-2024-3834,0,0,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000 CVE-2024-38344,0,0,9ab5a9367a4478293ac2379112f78ca200a2cb316c550e5b0a6b06a397872c02,2024-07-05T12:55:51.367000 CVE-2024-38345,0,0,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000 @@ -254173,8 +254175,8 @@ CVE-2024-38347,0,0,5765bd81529938cb4f4fd2014b4f526c5c45b5ac2280b7f219f3c1913944d CVE-2024-38348,0,0,d76ac40595953765ae6aa7072c9f7b614003a66a456cd40d15acbc09f7e58829,2024-07-11T02:50:33.110000 CVE-2024-38351,0,0,fc316049b1243ceecf4f16bb932622b3d32a9ec242887e0258f3f20fe77446f1,2024-06-20T12:44:01.637000 CVE-2024-38352,0,0,13a6e81e4d4d40a0591843c161ee638c75aac348990bf4d2603a4c2fb8cf2a30,2024-06-19T18:15:11.507000 -CVE-2024-38353,0,1,c7fbc5157bea63c7f1f1bd15e83eaa811940abad1a21b06d85ae750a0936fa30,2024-07-11T13:05:54.930000 -CVE-2024-38354,0,1,a398cde25eca89dc6b1d83fb1dcdb59eac37ee93c0b7d44a7093b8c323e0d1ff,2024-07-11T13:05:54.930000 +CVE-2024-38353,0,0,c7fbc5157bea63c7f1f1bd15e83eaa811940abad1a21b06d85ae750a0936fa30,2024-07-11T13:05:54.930000 +CVE-2024-38354,0,0,a398cde25eca89dc6b1d83fb1dcdb59eac37ee93c0b7d44a7093b8c323e0d1ff,2024-07-11T13:05:54.930000 CVE-2024-38355,0,0,548f855fd76fea3ae91cbde1441c70071a7c7d1a3d657b48a4999a1a744b1672,2024-06-20T12:43:25.663000 CVE-2024-38356,0,0,4d5684a2a5b21833c79b0d8355427fc3daf538540dd8f7d1cfa341630e75ced1,2024-06-20T12:43:25.663000 CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405801,2024-06-20T12:43:25.663000 @@ -254210,7 +254212,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,3714727f8bfcc9e282c2717dad223df765a696413b267002faf1df27a5ac73ea,2024-06-17T12:42:04.623000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 -CVE-2024-38433,0,1,ad87a013a62a702cd441ee6f303036185b91e7bf26e9c9464c23bdbbec5fda5f,2024-07-11T13:05:54.930000 +CVE-2024-38433,0,0,ad87a013a62a702cd441ee6f303036185b91e7bf26e9c9464c23bdbbec5fda5f,2024-07-11T13:05:54.930000 CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000 CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000 CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000 @@ -254255,7 +254257,7 @@ CVE-2024-38513,0,0,1368ed636d2ce5b196281db8def21fabd9a411fc039fddaf211605e85a645 CVE-2024-38514,0,0,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000 CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000 CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 -CVE-2024-38517,0,1,1ee5531e39fd840e5f62a1d43dd9dd60da5a03d5606175c657fbdbc7b47451e6,2024-07-11T13:06:13.187000 +CVE-2024-38517,0,0,1ee5531e39fd840e5f62a1d43dd9dd60da5a03d5606175c657fbdbc7b47451e6,2024-07-11T13:06:13.187000 CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000 CVE-2024-38519,0,0,3b366d37f50f101cb2bfcdc78fd05441af2a546f95a42ed60fc08615be04c6b0,2024-07-04T00:15:01.980000 CVE-2024-3852,0,0,23d67cc6cd9eaaffcbcd8c6df21d1387cf7355b2b4540b1c97d43e33361312ed,2024-07-03T02:06:44.987000 @@ -254271,6 +254273,9 @@ CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 +CVE-2024-38534,1,1,c0a0268eb6dc0ccabd16a59acf04374c40a300c5eca897f9450cd78d82214fc9,2024-07-11T15:15:12.350000 +CVE-2024-38535,1,1,6ea34674964ee49501737b630f33cbab30b45496e799b1ebf114cbef42452fc7,2024-07-11T15:15:12.557000 +CVE-2024-38536,1,1,af18ee3a446c1cff4b120893bccb919e889a9b5494030f0cf12a30dbf3274675,2024-07-11T15:15:12.760000 CVE-2024-38537,0,0,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 @@ -254414,7 +254419,7 @@ CVE-2024-38867,0,0,0af4e9111bae51f100e999bc3575e9e0f2f1178105282f6eb0eb905ae57e1 CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000 CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 CVE-2024-38874,0,0,84b324545c03e3af351829556c1e9c9a1e19bfbe37e66a75476dbe17e7f3fa44,2024-06-21T11:22:01.687000 -CVE-2024-38875,0,1,4d06e52d66bb088dd3308d190e26b07e3fc88a2feccdd57bcaf91bfbd4544ec0,2024-07-11T13:05:54.930000 +CVE-2024-38875,0,0,4d06e52d66bb088dd3308d190e26b07e3fc88a2feccdd57bcaf91bfbd4544ec0,2024-07-11T13:05:54.930000 CVE-2024-3888,0,0,edb7c29072abf78278f8742356d5aae8212665d8818b230c40ee3cc957ee71c6,2024-06-04T16:57:41.053000 CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000 CVE-2024-38892,0,0,7f56674c04e74351dd21325ea04280a43fbeb1fd2a47bbef7c9364d4479e55d9,2024-07-03T02:05:22.090000 @@ -254435,13 +254440,13 @@ CVE-2024-38950,0,0,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c999 CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000 CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000 -CVE-2024-38959,0,1,35d58c096e8c181ef68bad7fe16bdc3a566065930291ece358634b3804188291,2024-07-11T13:05:54.930000 -CVE-2024-38963,0,1,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000 +CVE-2024-38959,0,1,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 +CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 CVE-2024-38970,0,0,91e8208e5384541de7bb386d755fd4eb6bf4f61a3ae0e0940aabeee93bae88f6,2024-07-09T18:18:38.713000 CVE-2024-38971,0,0,dbcb37d6e160e35ce881158758f6ae2e24bc77c4d53fd897245319338a4ba293,2024-07-09T18:18:38.713000 -CVE-2024-38972,0,0,3e32669dc1d64afb6b809bbef8a21f9c499736eb989ba959932684d681ec7ea1,2024-07-11T03:00:24.250000 -CVE-2024-38987,0,0,8e5543bc013d5021cfb12250ec622bf33ff663f5974b5e9efe103d174baf7a3b,2024-07-01T16:37:39.040000 +CVE-2024-38972,0,1,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000 +CVE-2024-38987,0,1,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000 CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 CVE-2024-38992,0,0,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000 @@ -254453,7 +254458,7 @@ CVE-2024-38998,0,0,9282cac0cc3c8cf49c21643b99000efeea36726d969c8a628d3f29607a285 CVE-2024-38999,0,0,9b50bc5436037bd68caf4dfd664d8e190d38dffb5c1ff1f9ba9cfb924ccd240d,2024-07-09T16:22:46.603000 CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000 CVE-2024-39000,0,0,32efdb5372127bd496fcf75bbda16a003e610532bd5eb87d5181962cfafa1b6c,2024-07-03T02:05:34.347000 -CVE-2024-39001,0,0,82f6001aa2dce6119be50984c18101b4a6aacb440c096b445d257d239da9aac4,2024-07-01T16:37:39.040000 +CVE-2024-39001,0,1,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84b9f,2024-07-11T15:06:05.870000 CVE-2024-39002,0,0,f730aa8ef147d70b2879c78c6f1f0ff1f81c5a139e4c9775f359b7cb8ab78f63,2024-07-01T16:37:39.040000 CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000 CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000 @@ -254462,7 +254467,7 @@ CVE-2024-39014,0,0,85f2582cc6d7f5ddbf77aca86106a65d54d3111a3f65f930f3405599f2535 CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000 CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000 CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 -CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000 +CVE-2024-39018,0,1,487d2d2021a1fc3e6565cf47ccad7b4f66c1ad362659f92eecb24e6b9790a4a5,2024-07-11T15:06:06.723000 CVE-2024-39019,0,0,49f6923e7308cc94a507864c15bf4235170455a2d5e0ce49f075b9ff7427c130,2024-07-09T16:22:48.323000 CVE-2024-39020,0,0,f3dad96d08cf85365c782d609ec6f6e7c042df2976c73457f6a2464976a50377,2024-07-09T16:22:49.137000 CVE-2024-39021,0,0,1738b6fec91bfd00d0237390d12ea763f1a28b36e28c39eec9a265e784512e4c,2024-07-09T17:15:48.083000 @@ -254471,21 +254476,21 @@ CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662 CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 CVE-2024-39028,0,0,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 -CVE-2024-39031,0,1,87594f9a7543935ed567cc144c4b357bcfeca07ea5de64b557316e2820044b7c,2024-07-11T13:05:54.930000 +CVE-2024-39031,0,0,87594f9a7543935ed567cc144c4b357bcfeca07ea5de64b557316e2820044b7c,2024-07-11T13:05:54.930000 CVE-2024-3904,0,0,e776b30b1479be2ac2ba614a0e013b808dadbdf28dffb2a6f17cc6a76062926f,2024-07-05T12:55:51.367000 CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000 -CVE-2024-39063,0,1,c1e0ac7f9481d76fe7fdb16a6eaacaab5e66b9b0a0a18edcff2fd308e8920150,2024-07-11T13:06:13.187000 -CVE-2024-39069,0,1,1b9a692823854c9e7b388ef3d138bfa20ebe2a96df75dd2813f998599aa58897,2024-07-11T13:05:54.930000 +CVE-2024-39063,0,0,c1e0ac7f9481d76fe7fdb16a6eaacaab5e66b9b0a0a18edcff2fd308e8920150,2024-07-11T13:06:13.187000 +CVE-2024-39069,0,0,1b9a692823854c9e7b388ef3d138bfa20ebe2a96df75dd2813f998599aa58897,2024-07-11T13:05:54.930000 CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000 -CVE-2024-39071,0,1,7c74af8ef579039c6deede59d85921c55f61ca2b6c6f5baa6420b9d85543b66f,2024-07-11T13:05:54.930000 -CVE-2024-39072,0,1,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000 +CVE-2024-39071,0,1,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26f77,2024-07-11T15:06:07.560000 +CVE-2024-39072,0,0,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000 CVE-2024-3908,0,0,85d7a8c4b6c04a1bc64d61b9b16434d97a56cd08e916479d8cc7f65ce540b05b,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354ef,2024-06-04T19:20:26.763000 CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,6eeafc1e9950113810b3241de143f425fb712a6056a7d9427d70bea9bc4d702e,2024-07-09T18:18:38.713000 -CVE-2024-39119,0,0,1a69b24f1f94ef8540905f4cb9572420f76889d8a155c3d3a5e32d4b0cb231f3,2024-07-02T17:44:45.700000 +CVE-2024-39119,0,1,335f0358240af17c362e55e8a97871d20387542a8ff60c6e91f13df6b4480ed8,2024-07-11T15:06:08.390000 CVE-2024-3912,0,0,40b98d6972fd8b29682fb9d5c479312d61b03f7aa0ccbcb16e7844b5a5f893f3,2024-06-17T12:42:04.623000 CVE-2024-39129,0,0,9312806d832c51933c3038527273101f0daf3190355080fae05f2347855542dc,2024-06-28T10:27:00.920000 CVE-2024-39130,0,0,df5f818c69686396dd3eb68339897ebffa1b11bf7906d37001b874abe3136d64,2024-07-03T02:05:38.450000 @@ -254505,11 +254510,11 @@ CVE-2024-39158,0,0,cce9aef03924ed944acf28cea35a7f6e5bd4872826f71e46c93899a9929f6 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 -CVE-2024-39171,0,0,f9e3b60744fcd49938a54605a8d8cfd6802b6b8c90ab9d021ae399691b2b9e2f,2024-07-09T18:18:38.713000 +CVE-2024-39171,0,1,2bae745bd20a8a50108ac45e74e7c8f330bffee671eff97c857b1f66693cac29,2024-07-11T15:06:09.273000 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 -CVE-2024-39181,0,1,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 +CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 CVE-2024-39202,0,0,46931c5bd077676b75e1b50a276f5344591efd9210d3fc017968681e45dcdf25,2024-07-08T16:35:46.377000 @@ -254533,7 +254538,7 @@ CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2 CVE-2024-39248,0,0,7a563316fd3453bbdb2eea83c64c484bfa847d40ebdeede8de43d451f8cafde1,2024-07-05T12:55:51.367000 CVE-2024-39249,0,0,a8f23e36f9dec7b6dd0c3ed6214de893182dd9a10ec50f4f0f0e7c02e4cdf075,2024-07-09T06:15:01.913000 CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000 -CVE-2024-39251,0,0,11bb5a05e3dee260dab5143009f39b990145aeda6e37f3232c0fb54201edd825,2024-07-02T12:09:16.907000 +CVE-2024-39251,0,1,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,b62a8fbb5cbf577eaf3c7a81b1c47c6d426f2a5dda5ebe7d2d0cc2ac17b12044,2024-05-22T12:46:53.887000 CVE-2024-39276,0,0,9d8b391f90466ab92d8bd0be64a929bc81937a2a7adc7e28ba18e29f385bdac0,2024-06-25T18:50:42.040000 @@ -254566,9 +254571,9 @@ CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346 CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 -CVE-2024-39329,0,1,451f08ba6b4804b6c8190e5947c817855528118fe7efe36876c6f0445f70bb69,2024-07-11T13:05:54.930000 +CVE-2024-39329,0,1,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a3903f,2024-07-11T15:06:11.477000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 -CVE-2024-39330,0,1,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000 +CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000 @@ -254631,33 +254636,33 @@ CVE-2024-39484,0,0,a445c76503df3c2b08ea3e5bff9e0551e6280c35730c3d8354635c9d4c9c0 CVE-2024-39485,0,0,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000 CVE-2024-39486,0,0,77cff8922a497e9f5f3a2c54a76728f0d6b7e7d5f3ffc0649161a58f4b404b51,2024-07-08T15:49:22.437000 CVE-2024-39487,0,0,a753ee835b7e39ba050c96e915c7182f4ab084e4115de59996f349f1dcc33193,2024-07-09T18:19:14.047000 -CVE-2024-39488,0,1,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000 -CVE-2024-39489,0,1,b6de719e47b1b3ed46dc78de5550750533ba478cd05afb0e344e7e71729d5564,2024-07-11T13:05:54.930000 -CVE-2024-39490,0,1,a8cddc58398343c24172558bf85f4c7a72ad4cfe7677faf71fbe027877601e3a,2024-07-11T13:05:54.930000 -CVE-2024-39491,0,1,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000 -CVE-2024-39492,0,1,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000 -CVE-2024-39493,0,1,edb61e2bdcc22b19fdda7456b1765ba09bdac53634d9f36b25d7f9ffc79b9375,2024-07-11T13:05:54.930000 +CVE-2024-39488,0,0,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000 +CVE-2024-39489,0,0,b6de719e47b1b3ed46dc78de5550750533ba478cd05afb0e344e7e71729d5564,2024-07-11T13:05:54.930000 +CVE-2024-39490,0,0,a8cddc58398343c24172558bf85f4c7a72ad4cfe7677faf71fbe027877601e3a,2024-07-11T13:05:54.930000 +CVE-2024-39491,0,0,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000 +CVE-2024-39492,0,0,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000 +CVE-2024-39493,0,0,edb61e2bdcc22b19fdda7456b1765ba09bdac53634d9f36b25d7f9ffc79b9375,2024-07-11T13:05:54.930000 CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000 -CVE-2024-39511,0,1,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000 -CVE-2024-39512,0,1,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000 -CVE-2024-39513,0,1,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000 -CVE-2024-39514,0,1,6867df5f52f908f491ae646c1df8207b42c79f3d12187b6cec6f6552286fc92f,2024-07-11T13:05:54.930000 -CVE-2024-39517,0,1,ed12fbdd5935917e9b7f1e56184a21b312ea157822adf531c0ee87bdb0d202c2,2024-07-11T13:05:54.930000 -CVE-2024-39518,0,1,7f7ecf1dc91f43c4d2cd601e79a0cb63e34c06bbd9c6fdf0d6bfc073379626de,2024-07-11T13:05:54.930000 +CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000 +CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000 +CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000 +CVE-2024-39514,0,0,6867df5f52f908f491ae646c1df8207b42c79f3d12187b6cec6f6552286fc92f,2024-07-11T13:05:54.930000 +CVE-2024-39517,0,0,ed12fbdd5935917e9b7f1e56184a21b312ea157822adf531c0ee87bdb0d202c2,2024-07-11T13:05:54.930000 +CVE-2024-39518,0,0,7f7ecf1dc91f43c4d2cd601e79a0cb63e34c06bbd9c6fdf0d6bfc073379626de,2024-07-11T13:05:54.930000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f43,2024-05-14T16:11:39.510000 CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 -CVE-2024-39554,0,1,607b6e2d09565242cea8dabcf216d7050a2b93324b4645878cad8b169c28c359,2024-07-11T13:05:54.930000 -CVE-2024-39555,0,1,2f4320b551c6e22d863307bba36cd5d725d7060ed4b026ce642dd6f86bb7e040,2024-07-11T13:05:54.930000 -CVE-2024-39556,0,1,647fdc524ccc7990194a12b5e61500593bd5f260b420aa3369c383e0ab67df27,2024-07-11T13:05:54.930000 -CVE-2024-39557,0,1,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863959,2024-07-11T13:05:54.930000 -CVE-2024-39558,0,1,2c8234bb1e56f02b1dd69b6d7d1c452c66a728f5c6ba35ca2896bb6d30eada6e,2024-07-11T13:05:54.930000 -CVE-2024-39559,0,1,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000 +CVE-2024-39554,0,0,607b6e2d09565242cea8dabcf216d7050a2b93324b4645878cad8b169c28c359,2024-07-11T13:05:54.930000 +CVE-2024-39555,0,0,2f4320b551c6e22d863307bba36cd5d725d7060ed4b026ce642dd6f86bb7e040,2024-07-11T13:05:54.930000 +CVE-2024-39556,0,0,647fdc524ccc7990194a12b5e61500593bd5f260b420aa3369c383e0ab67df27,2024-07-11T13:05:54.930000 +CVE-2024-39557,0,0,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863959,2024-07-11T13:05:54.930000 +CVE-2024-39558,0,0,2c8234bb1e56f02b1dd69b6d7d1c452c66a728f5c6ba35ca2896bb6d30eada6e,2024-07-11T13:05:54.930000 +CVE-2024-39559,0,0,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 -CVE-2024-39560,0,1,60f24b3402f82ce62c23f2b509a2c041517e26bdb7d49fcda0ce914e25587466,2024-07-11T13:05:54.930000 -CVE-2024-39561,0,1,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000 -CVE-2024-39562,0,1,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000 -CVE-2024-39565,0,1,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000 +CVE-2024-39560,0,0,60f24b3402f82ce62c23f2b509a2c041517e26bdb7d49fcda0ce914e25587466,2024-07-11T13:05:54.930000 +CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000 +CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000 +CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000 CVE-2024-39567,0,0,7b194844163bcf526e5adc38cee5e584dfd615ab7311f788e296e35db5f76246,2024-07-09T18:19:14.047000 CVE-2024-39568,0,0,155da4fcd07a352c9fe4061336a48a1bfe3bd89ed7e98a66130b41e632263aa3,2024-07-09T18:19:14.047000 CVE-2024-39569,0,0,52889f68709bb42505429361fd8cbaa37b3cfa3fede130db2e5e3c1d1167ce5b,2024-07-09T18:19:14.047000 @@ -254676,7 +254681,7 @@ CVE-2024-39598,0,0,f83a7bf0b757c59666d0d48d25e10023a227b3391b984159eed2e11a978c8 CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000 CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 -CVE-2024-39614,0,1,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 +CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000 @@ -254686,12 +254691,12 @@ CVE-2024-39675,0,0,d0af7a5b3ca0ecdc840f81a24c22054a519a9c3aba3eafc6b5ad75a5c5c09 CVE-2024-39677,0,0,964d42b7e6f6658ef106b3a61b4dac74f8cf60cf8f733007f303b8eb8080b02d,2024-07-08T15:49:22.437000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 -CVE-2024-39684,0,1,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000 +CVE-2024-39684,0,0,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000 CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 -CVE-2024-39693,0,1,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 +CVE-2024-39693,0,0,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 CVE-2024-39695,0,0,fbaaa4e185fc8d8718a1bd681584149a106333fea090ef242205e9fceffe21eb,2024-07-09T14:47:19.767000 CVE-2024-39696,0,0,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000 CVE-2024-39697,0,0,9186fda2eab5f78df936964a06e0cbab87d706d772078d108f219ea7a02555a3,2024-07-09T18:19:14.047000 @@ -254704,7 +254709,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0bec,2024-06-17T12:42:04.623000 -CVE-2024-39723,0,0,5c9ac9247f202b4e44d018c1bf563c3c99fab88966852c141d2958342a6492f2,2024-07-08T15:49:22.437000 +CVE-2024-39723,0,1,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000 CVE-2024-39742,0,0,96ea1b8cccc8beabe35a1ae1bd29920440299002d9bdd07983b0f871a337ec60,2024-07-08T15:49:22.437000 CVE-2024-39743,0,0,20ff608aae9e81ed05e5df9fc95082741cc897036de0c408e1e444e17ba2e42f,2024-07-08T15:49:22.437000 @@ -254712,7 +254717,7 @@ CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 -CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000 +CVE-2024-39828,0,1,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 @@ -254738,27 +254743,27 @@ CVE-2024-39876,0,0,169343b5c12b9a1b2d2efbf07cd5193a2e3d213649798f2964b07aa764af7 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 -CVE-2024-39880,0,1,36b0f01990c70662f6a76f5465d867d453cd73de89d829ef36b42a6741e6a854,2024-07-11T13:05:54.930000 -CVE-2024-39881,0,1,adf0b4fcb696b07b94720317071702eedcd1fdaba37c9e2a964066676ba014b9,2024-07-11T13:05:54.930000 -CVE-2024-39882,0,1,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bceaf,2024-07-11T13:05:54.930000 -CVE-2024-39883,0,1,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000 +CVE-2024-39880,0,0,36b0f01990c70662f6a76f5465d867d453cd73de89d829ef36b42a6741e6a854,2024-07-11T13:05:54.930000 +CVE-2024-39881,0,0,adf0b4fcb696b07b94720317071702eedcd1fdaba37c9e2a964066676ba014b9,2024-07-11T13:05:54.930000 +CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bceaf,2024-07-11T13:05:54.930000 +CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000 CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000 -CVE-2024-39886,0,1,a2e387a2acfa229c74c2586e0ca497807b1ac870990e1fc7124f8fb418d96c3b,2024-07-11T13:05:54.930000 +CVE-2024-39886,0,1,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000 CVE-2024-39888,0,0,f7637ae0feee5d9d70653d284f2ffea6d3641a46c662eba72b67bcab442feb69,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 CVE-2024-39894,0,0,374900c11a12dc50ea15b6655eaae44b2fde3969c29fbbba5a961315eede48a8,2024-07-08T14:18:56.393000 CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000 -CVE-2024-39897,0,1,38f11367ba3345f659ee85a48448fecd8dec6f5b40a44a93fa8c3972047a7c01,2024-07-11T13:06:13.187000 -CVE-2024-39899,0,1,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df94c,2024-07-11T13:06:13.187000 +CVE-2024-39897,0,0,38f11367ba3345f659ee85a48448fecd8dec6f5b40a44a93fa8c3972047a7c01,2024-07-11T13:06:13.187000 +CVE-2024-39899,0,0,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df94c,2024-07-11T13:06:13.187000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 -CVE-2024-39900,0,1,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000 -CVE-2024-39901,0,1,1d3e3b80615ba41835c485f10254821d67a955b0119b59f5c90d08afdfefd99d,2024-07-11T13:05:54.930000 +CVE-2024-39900,0,0,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000 +CVE-2024-39901,0,0,1d3e3b80615ba41835c485f10254821d67a955b0119b59f5c90d08afdfefd99d,2024-07-11T13:05:54.930000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 -CVE-2024-39927,0,1,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000 +CVE-2024-39927,0,0,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000 CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-39930,0,0,17eb00e73f46631dbd6316a3ab19a74b1e7ba74e9179cfe94efb0d39751660c6,2024-07-05T12:55:51.367000 @@ -254777,12 +254782,12 @@ CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816f CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 -CVE-2024-40034,0,1,4cf8988f789e771f9437deec1701e32aa0f490e66c431d68611599e17f7a3fda,2024-07-11T13:06:13.187000 -CVE-2024-40035,0,1,132a4be04465293ff4a980beb5e05717ee193abbcec3723f2f5efc0d66102554,2024-07-11T13:06:13.187000 -CVE-2024-40036,0,1,43743d13cbc1664edc8e42ac01bfa8ea60d7948686927fc6316bd722e6e77712,2024-07-11T13:06:13.187000 -CVE-2024-40037,0,1,5b8f3102a79caae73d78a17fd7828e0eef05bb7293789c0b49fe9eb0d327e242,2024-07-11T13:06:13.187000 -CVE-2024-40038,0,1,2e746b3880a55c0b28aa2e00208cacc10d29ef1e708fe36e08ceeb39c802d4ac,2024-07-11T13:06:13.187000 -CVE-2024-40039,0,1,5fe22166e82da251f322629ecfd29e5ec1ca0efd0c75b10b572505aa3450e595,2024-07-11T13:06:13.187000 +CVE-2024-40034,0,0,4cf8988f789e771f9437deec1701e32aa0f490e66c431d68611599e17f7a3fda,2024-07-11T13:06:13.187000 +CVE-2024-40035,0,1,08afa9ac3de4546260e7d7e9807069bfe04d3f04c382ea1bbbe122e2cf535d36,2024-07-11T15:06:18.003000 +CVE-2024-40036,0,1,6571820d2e1a1dc301c44df53b57ff0785351c2dfcb2d72964621db254f59f05,2024-07-11T15:06:18.893000 +CVE-2024-40037,0,0,5b8f3102a79caae73d78a17fd7828e0eef05bb7293789c0b49fe9eb0d327e242,2024-07-11T13:06:13.187000 +CVE-2024-40038,0,1,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000 +CVE-2024-40039,0,0,5fe22166e82da251f322629ecfd29e5ec1ca0efd0c75b10b572505aa3450e595,2024-07-11T13:06:13.187000 CVE-2024-4005,0,0,db2b7e4cfe0f4bbe30f1cbadd95b4d8d4dea02eb8785d8f487b316678c44068d,2024-06-17T12:42:04.623000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 CVE-2024-4007,0,0,f23e193a2ac303efeb52b231cdfb7f68a21ff7ce4ccf120b52f049303bd3ddaa,2024-07-01T16:37:39.040000 @@ -254804,14 +254809,14 @@ CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f10 CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4032,0,0,52c6b9eccf7e021076c0ce344d44b2f19b27dbd5716fada0f5ba921e591652d5,2024-06-20T12:44:22.977000 -CVE-2024-40328,0,1,7cd595aa5b39bb59d05641e21b3a254ae9a9ef8b54295cf4bb9a74afc0714ea3,2024-07-11T13:05:54.930000 -CVE-2024-40329,0,1,41a26c01ffafb441378d739e427645a780e000487130d0d08f992cdf38346dd3,2024-07-11T13:05:54.930000 +CVE-2024-40328,0,1,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000 +CVE-2024-40329,0,0,41a26c01ffafb441378d739e427645a780e000487130d0d08f992cdf38346dd3,2024-07-11T13:05:54.930000 CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000 -CVE-2024-40331,0,1,bfb06d8fdc6b8050e721142c9677bd6207d960362f2abfc1c2513136b9a0c674,2024-07-11T13:05:54.930000 -CVE-2024-40332,0,1,2e3f95a9a025aa6ffb4896b255ee7c825d63bc3b4c97904f258ca3134e6768a8,2024-07-11T13:05:54.930000 -CVE-2024-40333,0,1,9ee32bf3c137039954d15c4d0aa756da5b4ab29cf1081c7675c565582e34bf51,2024-07-11T13:05:54.930000 -CVE-2024-40334,0,1,0f6416c66a2f7a24655624e914eca89a0566237a51d1e09767a4a1fc38d9e48f,2024-07-11T13:05:54.930000 -CVE-2024-40336,0,1,6756e62ac73e88613b0a9940ec3cddb24928fafbdc56431357029b4f7971fba0,2024-07-11T13:05:54.930000 +CVE-2024-40331,0,0,bfb06d8fdc6b8050e721142c9677bd6207d960362f2abfc1c2513136b9a0c674,2024-07-11T13:05:54.930000 +CVE-2024-40332,0,0,2e3f95a9a025aa6ffb4896b255ee7c825d63bc3b4c97904f258ca3134e6768a8,2024-07-11T13:05:54.930000 +CVE-2024-40333,0,1,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e7fd,2024-07-11T15:06:21.320000 +CVE-2024-40334,0,0,0f6416c66a2f7a24655624e914eca89a0566237a51d1e09767a4a1fc38d9e48f,2024-07-11T13:05:54.930000 +CVE-2024-40336,0,1,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000 CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000 CVE-2024-4036,0,0,a384819513ae72390ab82c2a7b5ea2fdbb1087d8a7f4dfd460e817b5f8f6a48f,2024-05-02T18:00:37.360000 @@ -254820,8 +254825,8 @@ CVE-2024-4038,0,0,bcee2fa5b2489836af4ab9c65caafd6eced0b2bbd0ce06913efc5e02957c74 CVE-2024-4039,0,0,cfdce9a10bb12a92a3dc5b97194d2925027fafc434caeab17aac25e26b57811c,2024-05-14T16:11:39.510000 CVE-2024-4040,0,0,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000 CVE-2024-4041,0,0,eb91b240ef125b96ca72e19c4e4b4f0865365edd07fdbe934106504507637e12,2024-05-14T16:11:39.510000 -CVE-2024-40412,0,1,91f079dffe6bd9c9a907ca91cc30b4b1a6afa7dd99f6de13d3e9b4e2bfd4438d,2024-07-11T13:05:54.930000 -CVE-2024-40417,0,1,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 +CVE-2024-40412,0,0,91f079dffe6bd9c9a907ca91cc30b4b1a6afa7dd99f6de13d3e9b4e2bfd4438d,2024-07-11T13:05:54.930000 +CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 CVE-2024-4042,0,0,0e138f60785a8eea473d0d945af61b2ea42931feecdaf6ebd49f8dd479a2b25a,2024-06-07T14:56:05.647000 CVE-2024-4043,0,0,6af9720af6118fb183f8125f22f9123aff9cbd64639b4a3b02a251bb0a5a463e,2024-05-24T01:15:30.977000 CVE-2024-4044,0,0,24332ace72d4390c16ec3b8977440043e797db2d7d42445b64fa06b462f42633,2024-05-14T16:11:39.510000 @@ -254845,7 +254850,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000 CVE-2024-4061,0,0,731822e6f24cd811e7f06812f39ade81c9a66c6b1046f4d45903066a1f181f99,2024-05-21T12:37:59.687000 CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 -CVE-2024-40618,0,1,dfde754a0de766ec9f89111f0ca6917fdc9cd1f25c1bacf5501f340e4ad22258,2024-07-11T13:05:54.930000 +CVE-2024-40618,0,0,dfde754a0de766ec9f89111f0ca6917fdc9cd1f25c1bacf5501f340e4ad22258,2024-07-11T13:05:54.930000 CVE-2024-4062,0,0,7fcbe6e50148b9b5e05d3025a893191a4aca3bb309243ec182c3df8f6e2a0587,2024-06-04T19:20:29.007000 CVE-2024-4063,0,0,10c24a204d439c4cd3340a486d9bc67fc982c548c71c2d3a385738d7e6499dc1,2024-06-04T19:20:29.120000 CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a17,2024-05-17T02:40:14.223000 @@ -254857,27 +254862,27 @@ CVE-2024-4069,0,0,f8d2f2628e60be749b9734b09218105a0396eae1a8a4c94b50114640615c82 CVE-2024-4070,0,0,611b2353a344eebf4d3d821b72a7661978c51598fabebbafad7cb3b8eb92ba73,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,1e5173381da62898dd2d89e779aa47e534c3be7a31fd5b5ef289e0ef19550704,2024-05-17T02:40:14.747000 CVE-2024-4072,0,0,784007d6b97ec8386adb736eb517146413a15dc1e1dcfd437022813999836276,2024-05-17T02:40:14.847000 -CVE-2024-40726,0,0,bdd27d3d99f7c0ae6dc0e785e4745e87f17ba47f532cc22502cdd21c9f5264d1,2024-07-11T02:58:57.177000 -CVE-2024-40727,0,0,eef1b0d8f556e2683be219b6ad201971b4b59fb77f2d2e3790c87a8f5a60cbd9,2024-07-11T02:59:07.627000 +CVE-2024-40726,0,1,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000 +CVE-2024-40727,0,1,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000 CVE-2024-40728,0,0,d97174880a17752231869c0d95676d772e9b6b0c723f3642cbcef679b7e80f73,2024-07-11T02:59:17.007000 CVE-2024-40729,0,0,ab9a5f69d2218c381a3d8eb0951f2534776cc72de1841bef50510a4cdbfd408e,2024-07-11T02:59:25.527000 CVE-2024-4073,0,0,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000 -CVE-2024-40730,0,0,0151b360494bc38f284351ca546950e35b93e513c739ca471f007293fc9c90cb,2024-07-11T02:59:34.663000 -CVE-2024-40731,0,0,3c2e3cb468055dc1ae6f5343bf9e475a86b0c20f9c8169f40be68e60c2ed447e,2024-07-11T02:57:45.750000 +CVE-2024-40730,0,1,1cc14fb59c6f7d6e2445fb5fa075eb77949d56b0440370270ca4661f8666658c,2024-07-11T15:06:24.660000 +CVE-2024-40731,0,1,02c409bee09a11ef6564d0a63d02e90c06f87384bd64c832db96f277238b93c4,2024-07-11T15:06:25.460000 CVE-2024-40732,0,0,aaac9956c124a2027f493d570ac5f5afb108a8f4e40df7a87b1b5a06d59072c2,2024-07-11T02:57:54.827000 CVE-2024-40733,0,0,1d1ef568d0570292be66c38cd2ec06c0c84643812e8670e45581c98f79f3b349,2024-07-11T02:58:05.973000 -CVE-2024-40734,0,0,199c57c98319dbb45d333dc97143efbd0f7ccd11eb6c3f6193a56f28acbecc40,2024-07-11T02:58:16.737000 -CVE-2024-40735,0,0,7b1089f48c252c4c47084b7da58fd7bd934e1455b863043848b3bbf40fcab656,2024-07-11T02:58:27.747000 -CVE-2024-40736,0,0,7aabba5fc66dcc73edb663ffc8ce640ee27b35d2210626bb71f78d41a1f1c9f3,2024-07-11T02:58:38.027000 +CVE-2024-40734,0,1,ae67754d2aa8ab2bb99bd190fad26bf8602a907bf15e5ce8d99620aba36af08f,2024-07-11T15:06:26.257000 +CVE-2024-40735,0,1,c0e8abbd2165e486ea716f6888f141faa83a5857bfe2e1f37bee6a172e0666c7,2024-07-11T15:06:27.070000 +CVE-2024-40736,0,1,f1b462fba073bceb74e6eb24d562b30eda97cf61ccc374bf8b6f02058019995f,2024-07-11T15:06:27.890000 CVE-2024-40737,0,0,5c25c9eed7ed75db9fdc73701f207d2b594740be8aaddbb777a3a080641bcac9,2024-07-11T02:56:03.807000 CVE-2024-40738,0,0,258771ceb39ad9b08ba5b176b0c2d1e36f1197008ad4f753eaeb7b39c3a5688e,2024-07-11T02:57:13.407000 -CVE-2024-40739,0,0,0db9134de1314997fab600ef08f3ed513c405ab8dcf66958c1c799c397e1cf6e,2024-07-11T02:57:27.580000 +CVE-2024-40739,0,1,4b2f3d973ba2f00f373d83ccd1e53a9697f5a21e12783d6291446f254a7898b9,2024-07-11T15:06:28.767000 CVE-2024-4074,0,0,0eb3d84ea134f52e33abc34cb068e49511715452b56aeac28482d1d153123edb,2024-05-17T02:40:15.077000 CVE-2024-40740,0,0,ee2ab6b2d7e1edae21ac57ec7c719455baac814ba7f21c1ea74f0831ad78d95d,2024-07-11T02:54:42.557000 CVE-2024-40741,0,0,ddd0ff9476ed1ff47a6c6ea90383139e3fceeb76685fa77b077d9f9786ebe979,2024-07-11T02:54:30.653000 -CVE-2024-40742,0,0,6a3bedaa848e5df96fdcf8c837c015f053f6eb9a57ab6613e692a76a4dfad1cb,2024-07-11T02:54:19.547000 +CVE-2024-40742,0,1,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-4075,0,0,61cfb92eb2dc2fb6e0ff8370e47bd10bfd7f8ca1c4517b0742f92f6865b710f5,2024-05-17T02:40:15.170000 -CVE-2024-40750,0,1,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 +CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000 CVE-2024-4078,0,0,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000 CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997fc,2024-05-14T16:11:39.510000 @@ -255367,7 +255372,7 @@ CVE-2024-4651,0,0,7a1073040800fe83444723cdc7dc81dd54cd1cc8604732f5c58643190867c3 CVE-2024-4652,0,0,5a9d123e7dc162b2780d21e171c5f7bd67b56d13b67e6af24f7924f686cdd9ec,2024-06-04T19:20:44.873000 CVE-2024-4653,0,0,695819124007e1fa87749621ef4d62ddcb026ccafa0c20f99f5ec61618107b32,2024-06-04T19:20:44.990000 CVE-2024-4654,0,0,eca077048d127add67f133585649496d1af539c8d39e41b186d99947e2c0e50e,2024-06-04T19:20:45.100000 -CVE-2024-4655,0,1,8c2124989ee3cd890b4c00ec8d95a0d9b4b49e43f090dc065aa9a10ff43dbfa3,2024-07-11T13:05:54.930000 +CVE-2024-4655,0,0,8c2124989ee3cd890b4c00ec8d95a0d9b4b49e43f090dc065aa9a10ff43dbfa3,2024-07-11T13:05:54.930000 CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d332548405180,2024-05-15T16:40:19.330000 CVE-2024-4661,0,0,e86145aa3dfc1a1e846a3970af65d72463f2a51aba17ea6b9d5a34de37b2fc53,2024-06-10T02:52:08.267000 CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000 @@ -255542,7 +255547,7 @@ CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152 CVE-2024-4862,0,0,edcbe7924a96735f669863aa954e0b80b2f2f909fa86acc0b68d2b031ff4d4fc,2024-07-09T18:19:14.047000 CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000 -CVE-2024-4866,0,1,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 +CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,af51c1eee226c4cbb50e264de1c7a9cc126d126278458819152cafca85d017ce,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000 @@ -255551,7 +255556,7 @@ CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462 CVE-2024-4874,0,0,e489f4227689f3d8a28a1c171b72c6312c838f037435967f317d135bb1153eae,2024-06-24T19:41:12.293000 CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000 -CVE-2024-4879,0,1,8c50d254612a54826fe682a82d21f0b2b4445e00a7b92ddeb58ff80ea8fd6f94,2024-07-11T13:05:54.930000 +CVE-2024-4879,0,0,8c50d254612a54826fe682a82d21f0b2b4445e00a7b92ddeb58ff80ea8fd6f94,2024-07-11T13:05:54.930000 CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 CVE-2024-4883,0,0,4968eaa5ac5e1ee17a980c68456ded7b931eebe67d4a414b20bc214305c03a05,2024-06-26T12:44:29.693000 @@ -255788,7 +255793,7 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812 CVE-2024-5173,0,0,1d07a8c869bc825cf73f46bac935aee62b58e8e6badef703c708e935b6259cfb,2024-06-26T12:44:29.693000 CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 -CVE-2024-5178,0,1,848f230b17b9b68b88d15ee9c3e105cf264e6a27521f878cebaf54aa0058cba6,2024-07-11T13:05:54.930000 +CVE-2024-5178,0,0,848f230b17b9b68b88d15ee9c3e105cf264e6a27521f878cebaf54aa0058cba6,2024-07-11T13:05:54.930000 CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000 CVE-2024-5181,0,0,1490518c3f763a5bc28caf27f315947d0d04f2023e03f107a32a0e693b85b149,2024-06-26T12:44:29.693000 CVE-2024-5182,0,0,05eb067250c704bd4c420313ce1da2aeb70843fd4dce4dbb10fdc9fbc9defbb8,2024-06-20T12:43:25.663000 @@ -255820,7 +255825,7 @@ CVE-2024-5213,0,0,5a68006f91028e70fb3202f4e898c6483c20faed2d33be845b22e07c07dc81 CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000 CVE-2024-5215,0,0,f42221106c0d0e877d05b8e2e26cf7673e58a6d4a9fc7867210cc0dc29795334,2024-06-26T12:44:29.693000 CVE-2024-5216,0,0,f74916bcde595c5203a7e0644e281dc01f68ce529e1f3e14cc74a2e3eb525ca3,2024-06-25T12:24:17.873000 -CVE-2024-5217,0,1,a3220db8b5d820ce86a337822efd787589de45cbc58a37f6871f986ce72ad63e,2024-07-11T13:05:54.930000 +CVE-2024-5217,0,0,a3220db8b5d820ce86a337822efd787589de45cbc58a37f6871f986ce72ad63e,2024-07-11T13:05:54.930000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 @@ -255852,7 +255857,7 @@ CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c7 CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000 CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de6328191e,2024-06-07T14:56:05.647000 CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000 -CVE-2024-5257,0,1,d76a55929787a659b765daf65115193bb507164089a71d3d6dd8a4ae03e3f106,2024-07-11T13:05:54.930000 +CVE-2024-5257,0,0,d76a55929787a659b765daf65115193bb507164089a71d3d6dd8a4ae03e3f106,2024-07-11T13:05:54.930000 CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000 CVE-2024-5259,0,0,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 @@ -256005,7 +256010,7 @@ CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2 CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 CVE-2024-5441,0,0,a7bb50aeb84e17ae0f6968b8ffc04aee2cb8a84b24c26594cbc0250db6319333,2024-07-09T18:19:14.047000 CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000 -CVE-2024-5444,0,1,e0b9b65e689c0742c5dc95f0a56d12e8c1a79b1d7cbeb9381ec169917f5ba16b,2024-07-11T13:05:54.930000 +CVE-2024-5444,0,0,e0b9b65e689c0742c5dc95f0a56d12e8c1a79b1d7cbeb9381ec169917f5ba16b,2024-07-11T13:05:54.930000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 @@ -256023,7 +256028,7 @@ CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339b CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000 -CVE-2024-5470,0,1,cd6bb597082116607199989bf09a83f1021c14ba1b3a6e58a1ea8473d53137df,2024-07-11T13:05:54.930000 +CVE-2024-5470,0,0,cd6bb597082116607199989bf09a83f1021c14ba1b3a6e58a1ea8473d53137df,2024-07-11T13:05:54.930000 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 @@ -256034,10 +256039,10 @@ CVE-2024-5482,0,0,deb4cff32cf3f87f89ff2e26ffd7a2390ad03b8acd8adef3ed5769f2b5cc7a CVE-2024-5483,0,0,50ef873fd9ba2b134eb7743380749d7bf41a18a6183eddc44371799e9b77b44b,2024-06-11T17:19:17.143000 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 -CVE-2024-5488,0,0,36664283baf396592c4e35eea335f5722cbf42bf1f5665184ae35a27e595d9e7,2024-07-09T18:19:14.047000 +CVE-2024-5488,0,1,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,9bb79263edce390c6997c8d9f9fe7d295077e49147dbdcc1c480d08892e3d2f5,2024-06-11T18:15:01.617000 -CVE-2024-5491,0,1,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 -CVE-2024-5492,0,1,ef9d60420cc278300dad8633c6d5a4d9cec47839ae67a5efd349eac4679c005a,2024-07-11T13:05:54.930000 +CVE-2024-5491,0,0,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 +CVE-2024-5492,0,0,ef9d60420cc278300dad8633c6d5a4d9cec47839ae67a5efd349eac4679c005a,2024-07-11T13:05:54.930000 CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 CVE-2024-5494,0,0,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc903d,2024-07-03T02:08:59.420000 CVE-2024-5495,0,0,0a1c44916768f321aa0f99dcbbf7835c3f375f68104a303716ad9e841a86c5f0,2024-06-10T17:16:34.740000 @@ -256147,7 +256152,7 @@ CVE-2024-5659,0,0,dbb598e16e86b9c719d485b541188ff6e8ea72d57c8ec148ee2290d2bb1f42 CVE-2024-5661,0,0,64c610f4ac197974e4a9f4370e828aefe9bbaabb0bf444795d194a1356128a89,2024-07-02T14:43:40.460000 CVE-2024-5662,0,0,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec26,2024-06-28T10:27:00.920000 CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000 -CVE-2024-5664,0,1,3daba34112ffc15ab14e7e66b41cb4d94002be0e467de37777afa664cf939f2a,2024-07-11T13:05:54.930000 +CVE-2024-5664,0,0,3daba34112ffc15ab14e7e66b41cb4d94002be0e467de37777afa664cf939f2a,2024-07-11T13:05:54.930000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 CVE-2024-5669,0,0,ddd7772a6277d903bcf1d89da44667af6e9a3df4fd3440e71ca75c5d1aad7a37,2024-07-09T18:19:14.047000 @@ -256157,10 +256162,10 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 CVE-2024-5676,0,0,7110ec4f1d7a030c3f52d0d64b45a1f2c788bd0c12290f7487a0ece147b33240,2024-06-24T05:15:09.600000 -CVE-2024-5677,0,1,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 -CVE-2024-5679,0,1,1b9c56cba527d158192215e0e30fd1c10c228f839f81c2546d99ba6401c926c5,2024-07-11T13:05:54.930000 -CVE-2024-5680,0,1,3ebe734c1513dc7f890bbd2e7aa8b63fd3b360493fbd000759fe3ddff9cc4ed7,2024-07-11T13:05:54.930000 -CVE-2024-5681,0,1,d9e9cc4fa7a92c79eb41f6e51c1ec5add3d22dec102138950a140d8fa1549bc3,2024-07-11T13:05:54.930000 +CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 +CVE-2024-5679,0,0,1b9c56cba527d158192215e0e30fd1c10c228f839f81c2546d99ba6401c926c5,2024-07-11T13:05:54.930000 +CVE-2024-5680,0,0,3ebe734c1513dc7f890bbd2e7aa8b63fd3b360493fbd000759fe3ddff9cc4ed7,2024-07-11T13:05:54.930000 +CVE-2024-5681,0,1,e75aad538cc247dd1e5bde981cd563107711f3dbf3f4d2d7b927f1a9751e70a6,2024-07-11T15:06:31.987000 CVE-2024-5683,0,0,416fdce68077ec4a3eabb7881f93e8b3f956fda57e2d7ec858b12f0a2abb9f15,2024-06-24T12:57:36.513000 CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000 @@ -256183,7 +256188,7 @@ CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8 CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000 CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 -CVE-2024-5711,0,0,36900df12a60df985efa67ab5ec7170d3f5b9e7d88be290fdaf1be32dc6cea47,2024-07-08T15:49:22.437000 +CVE-2024-5711,0,1,53a6821510c2996abe324dcc88905d46757c2bc5f945db408170acaa09c6e226,2024-07-11T14:54:55.473000 CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 @@ -256235,7 +256240,7 @@ CVE-2024-5787,0,0,7676e1b0ab184e8654efc91f56a8d84cd9d6d539bf642c0a4ff7f743a62b9d CVE-2024-5788,0,0,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000 CVE-2024-5790,0,0,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000 CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000 -CVE-2024-5792,0,1,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd3a,2024-07-11T13:05:54.930000 +CVE-2024-5792,0,0,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd3a,2024-07-11T13:05:54.930000 CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000 CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000 @@ -256306,10 +256311,10 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000 CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000 CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000 -CVE-2024-5910,0,1,90cc21d0847234b3526638233dffb575bd78298c2136f3076c84a2e819ba4a1f,2024-07-11T13:05:54.930000 -CVE-2024-5911,0,1,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000 -CVE-2024-5912,0,1,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000 -CVE-2024-5913,0,1,e09fa300f42c3066d0a6d6e758e3f3cfea839eecb0d836963ee331dd9715d64e,2024-07-11T13:05:54.930000 +CVE-2024-5910,0,0,90cc21d0847234b3526638233dffb575bd78298c2136f3076c84a2e819ba4a1f,2024-07-11T13:05:54.930000 +CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000 +CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000 +CVE-2024-5913,0,0,e09fa300f42c3066d0a6d6e758e3f3cfea839eecb0d836963ee331dd9715d64e,2024-07-11T13:05:54.930000 CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000 @@ -256368,13 +256373,13 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32 CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000 CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000 CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000 -CVE-2024-6025,0,1,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000 -CVE-2024-6026,0,1,0d6a5216426616ee83cf6c92950c870af6e75ec5b4de2c9f55776dd001c586c2,2024-07-11T13:05:54.930000 +CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000 +CVE-2024-6026,0,1,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33 CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a53cebc0801a7944b049693d6e4ba090f6ff8943c9a085ad6c29614624cd6988,2024-06-25T12:24:17.873000 -CVE-2024-6035,0,1,e543f789bc9a4f00266b9e998e7231d01391f3bf16f7fb9d950923c693c3bd18,2024-07-11T13:05:54.930000 -CVE-2024-6036,0,1,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 -CVE-2024-6037,0,1,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 +CVE-2024-6035,0,0,e543f789bc9a4f00266b9e998e7231d01391f3bf16f7fb9d950923c693c3bd18,2024-07-11T13:05:54.930000 +CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 +CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4dff4db125482f9ecedc7a5fd577549dfaebc98ad18a8caa631a9c29113f6e8d,2024-06-27T19:25:12.067000 CVE-2024-6039,0,0,266923799676f8be01eee28d4a84714045ee9a927bc992eaf897cc5b748105d7,2024-06-17T14:15:12.620000 CVE-2024-6041,0,0,a295768a83c71f46593370532a5a859cd3d130f4e3527299fc42bdf02397e4d4,2024-06-17T14:15:12.733000 @@ -256436,7 +256441,7 @@ CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000 -CVE-2024-6138,0,1,3ba38243649706f868fb4573a050e3d9b42f4641597c22445d000edc1dfa515f,2024-07-11T13:05:54.930000 +CVE-2024-6138,0,1,d6a8df748ee6f04e5f8cc58d52d8b857edad2d6fe2bef6f2b8d4fc2bc8976899,2024-07-11T15:06:33.753000 CVE-2024-6139,0,0,5267393f199f3e6d04675c179e30c182dfe9af96089cf21d4ca0eef7a0895473,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,23f480e47c156f1dad9ad13e0d7590969d38d5491fbe00b3021017412ace7767,2024-06-20T12:44:01.637000 CVE-2024-6143,0,0,8ecb1606cf08b70c452136729986c382308670f8f5aa74c9caba844228d971e4,2024-06-20T12:44:01.637000 @@ -256444,10 +256449,10 @@ CVE-2024-6144,0,0,282f248ec161eadd8599a33b6d11a75bd4ed1ccd1aa15e9b959a4a72d41d30 CVE-2024-6145,0,0,74f99a0157ef2eb5160bc64159bab3cd3614efb0f0cae9420b13288ce6d516ff,2024-06-20T12:44:01.637000 CVE-2024-6146,0,0,835232b778d7e80b1c73cad2f19f1275692bff270d5e664fd4c7fc64973110ef,2024-06-20T12:44:01.637000 CVE-2024-6147,0,0,4a4919271ad23db4250af2d646dfd99f64704c8a0c63e163a55ff156915fc472,2024-06-21T11:22:01.687000 -CVE-2024-6148,0,1,863118c6188e2df31bad7fa26020ca6c91ddeb37e3c120067679f498fce017ca,2024-07-11T13:05:54.930000 -CVE-2024-6149,0,1,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 -CVE-2024-6150,0,1,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 -CVE-2024-6151,0,1,cde1d0f1d46af13ac335bf583d915a9a43a7bc6bfa372676b03728b1f5308a4e,2024-07-11T13:05:54.930000 +CVE-2024-6148,0,0,863118c6188e2df31bad7fa26020ca6c91ddeb37e3c120067679f498fce017ca,2024-07-11T13:05:54.930000 +CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 +CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 +CVE-2024-6151,0,0,cde1d0f1d46af13ac335bf583d915a9a43a7bc6bfa372676b03728b1f5308a4e,2024-07-11T13:05:54.930000 CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837d5,2024-06-21T11:22:01.687000 CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000 CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000 @@ -256484,7 +256489,7 @@ CVE-2024-6195,0,0,880630f7e59fe96c68db9446cad414c3056228167cb15e9eb7f8a5b897e968 CVE-2024-6196,0,0,8d29dbc22f191f0a2e6f5022705b8c2127b1c89230e4a1900a70835df0ab8ad4,2024-06-21T17:15:11.350000 CVE-2024-6206,0,0,a239648c07eb93ed8775dc2c6fd68864bae94b397314d858106207781c570047,2024-06-26T12:44:29.693000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 -CVE-2024-6210,0,1,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 +CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 CVE-2024-6212,0,0,c1e9ad93b654311e54f23eb8816b7040c4009f7be4b90d449446bdaf277f7228,2024-06-21T15:15:16.313000 CVE-2024-6213,0,0,875f788502e9039ff5cde644917f38d937eec3d1fa9cda735bda62057b13f974,2024-06-21T11:22:01.687000 CVE-2024-6214,0,0,f04922fee1928885a13a6b9135dd29d8f0bc0dcf3373a5ce58e6bf8d17734328,2024-06-21T15:15:16.430000 @@ -256495,9 +256500,9 @@ CVE-2024-6218,0,0,080145c08c5ffaf1b0f4fe61601c30772836ccbea26d111bc22bd57681c581 CVE-2024-6222,0,0,7d8ad82668d6d98e0f167e915dde6d9fa8875b44590f66f2e873d05e89e24789,2024-07-09T18:18:38.713000 CVE-2024-6225,0,0,05da1495d7d116987721ea4d8dad783669e833db8afd42c6e9b9d7b36358250e,2024-06-24T19:21:28.450000 CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000 -CVE-2024-6229,0,0,8c75c4089f9bb2b690871cceb6de9502d8662dbaa4dc8109053b9a0e9bdfb643,2024-07-08T15:49:22.437000 -CVE-2024-6235,0,1,0b1e1e0d470471463f89ba25d7bc9348152a709eae56f2ffafa950ec7e27e12e,2024-07-11T13:05:54.930000 -CVE-2024-6236,0,1,294d07111f47e2594afccb77d041edde3630ac9799928242bfa797180655c347,2024-07-11T13:05:54.930000 +CVE-2024-6229,0,1,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000 +CVE-2024-6235,0,1,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 +CVE-2024-6236,0,0,294d07111f47e2594afccb77d041edde3630ac9799928242bfa797180655c347,2024-07-11T13:05:54.930000 CVE-2024-6237,0,0,8eb889363f8a87d3bb3f430f1da56ccf68ff66b11eeffce13455da0850e4107b,2024-07-09T18:18:38.713000 CVE-2024-6238,0,0,01bce4fcd5bf21099e3fa29fb7e34bf0d2a461d152d0ae3d9b913c1fb46d1451,2024-06-25T18:50:42.040000 CVE-2024-6239,0,0,4d98a21d53ef2e5917897cadc254a12ee654ff1e3575a82a15151981272f61b5,2024-06-24T19:06:27.537000 @@ -256507,7 +256512,7 @@ CVE-2024-6250,0,0,d65ae5fe4d151231819cfece0198aae82e2009a318154594bfd2da65c5baac CVE-2024-6251,0,0,76d6a56e1b2f86f9d8f71f51691147da73df155a07e8f8a63cfd8ad441487e4d,2024-06-24T12:57:36.513000 CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debccf,2024-06-26T19:15:14.383000 CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 -CVE-2024-6256,0,1,342c600e43ac64ce30bda39b68adb1a30c31fbb308c868960dc5d8c4fa7f7c83,2024-07-11T13:05:54.930000 +CVE-2024-6256,0,0,342c600e43ac64ce30bda39b68adb1a30c31fbb308c868960dc5d8c4fa7f7c83,2024-07-11T13:05:54.930000 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000 @@ -256528,7 +256533,7 @@ CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c577 CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 CVE-2024-6284,0,0,73ccbe59cd13df171bbc79ab6b910254c728a7cb44133bad73b07b9d4dc26d5e,2024-07-05T12:55:51.367000 CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000 -CVE-2024-6286,0,1,f070489585ed2b009d7c844619c8f89f0869dbfc5b75014af9fcf3f396b20370,2024-07-11T13:05:54.930000 +CVE-2024-6286,0,1,4253fb96346a1918be0a28cd65e6b1adc5e77be00b8a52085fa48d544178b784,2024-07-11T15:06:34.997000 CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000 CVE-2024-6288,0,0,759e3147da1b3805ee22c246688b7816f816dcaacd990c0e2025b974262129c2,2024-06-28T10:27:00.920000 CVE-2024-6290,0,0,f38106d9e1179e3770e59e6eaa72c9e7b486c800903b3806d0d60fbc8ab354e0,2024-07-03T02:09:49.960000 @@ -256582,38 +256587,38 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 -CVE-2024-6385,0,1,5cd1b1d2bb2619e597fdfbc12061290bedb1abf1843381c16b40d3e31cd024b8,2024-07-11T13:05:54.930000 -CVE-2024-6387,0,0,5d65fd70c1d8c6b7a5aed89dcca753d45414c4dce967dc5a869d91f9a08e890f,2024-07-11T04:15:05.403000 +CVE-2024-6385,0,0,5cd1b1d2bb2619e597fdfbc12061290bedb1abf1843381c16b40d3e31cd024b8,2024-07-11T13:05:54.930000 +CVE-2024-6387,0,1,21a708d4237bba73c76a0db3992083b64f6c9fe22ac2d7f0724e5d5e887a9393,2024-07-11T14:15:13.510000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000 -CVE-2024-6397,0,1,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000 +CVE-2024-6397,0,0,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 -CVE-2024-6407,0,1,ec5dc8c03230b8fa5cd2a16eef82cbc157d078945319bc360474d77e784aeadf,2024-07-11T13:05:54.930000 +CVE-2024-6407,0,0,ec5dc8c03230b8fa5cd2a16eef82cbc157d078945319bc360474d77e784aeadf,2024-07-11T13:05:54.930000 CVE-2024-6409,0,0,9bc68adee8126d980e539ed0340617319811b9c1ec91d5c6d49c8bedd8ee2b95,2024-07-10T20:15:04.853000 -CVE-2024-6410,0,1,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 -CVE-2024-6411,0,1,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 +CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 +CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000 CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000 CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 -CVE-2024-6421,0,1,2fe6e0b05086ec8fe1614a33f3714b1b7412a68316b06964410d48a53c099378,2024-07-11T13:05:54.930000 -CVE-2024-6422,0,1,55d1b4b5125b3e6420c56faceebe4743e983319ac647dfed74960e28bff876d9,2024-07-11T13:05:54.930000 +CVE-2024-6421,0,0,2fe6e0b05086ec8fe1614a33f3714b1b7412a68316b06964410d48a53c099378,2024-07-11T13:05:54.930000 +CVE-2024-6422,0,0,55d1b4b5125b3e6420c56faceebe4743e983319ac647dfed74960e28bff876d9,2024-07-11T13:05:54.930000 CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000 CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000 CVE-2024-6426,0,0,f8400a1dd26a0192767404ca5f7752c12cf287ce03e2990002fc305f7bc08efa,2024-07-05T17:10:26.683000 CVE-2024-6427,0,0,4e3c2a8d1e984293b7a508d6724a6a3f7998f367f7900ab80f87cf0d36ad12b5,2024-07-05T17:10:44.997000 CVE-2024-6428,0,0,8095b4dcd35f897b4650661c439e7e332797ada1bd3807e53dae0badb2379a85,2024-07-05T17:08:11.060000 -CVE-2024-6433,0,1,d602ab3dc41aef42850f40bee564814e8e233db523dba7834f636c439b366593,2024-07-11T13:05:54.930000 +CVE-2024-6433,0,0,d602ab3dc41aef42850f40bee564814e8e233db523dba7834f636c439b366593,2024-07-11T13:05:54.930000 CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000 CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000 -CVE-2024-6447,0,1,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 +CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 @@ -256623,7 +256628,7 @@ CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d5 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 -CVE-2024-6501,0,1,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 +CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 @@ -256634,44 +256639,45 @@ CVE-2024-6524,0,0,a7a803cd0c4b163adf24a214658dd36dbf3d93b3905b2171e3d08048b915cb CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b927,2024-07-08T15:30:11.133000 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000 -CVE-2024-6528,0,1,eadd6f4f4be8f81226626302b00f66ebfbebf71ded08e8d23278bcc971f84701,2024-07-11T13:05:54.930000 -CVE-2024-6539,0,0,af7a9107d7b462a59e1314d81ee0ea249c00edb3c899ac73079834fee3e5a982,2024-07-08T15:49:22.437000 -CVE-2024-6550,0,1,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 -CVE-2024-6554,0,1,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000 -CVE-2024-6556,0,1,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 +CVE-2024-6528,0,0,eadd6f4f4be8f81226626302b00f66ebfbebf71ded08e8d23278bcc971f84701,2024-07-11T13:05:54.930000 +CVE-2024-6539,0,1,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 +CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 +CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000 +CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000 CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000 CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000 -CVE-2024-6602,0,0,d1ff783c5dd57788da04ea9a9259d9f3561993a50c353a427b76cce1bf3766e2,2024-07-09T18:19:14.047000 +CVE-2024-6602,0,1,1ef3df5ba86c27dd15c49400b2f4a17f816f649f117c8ab236de74cf67b3b8f0,2024-07-11T15:06:37.333000 CVE-2024-6603,0,0,4ecaf7f985dbded3472c683f2c65d1c14d2799a2b7dcf2b2a55860d4c957784c,2024-07-09T18:19:14.047000 CVE-2024-6604,0,0,ded876613061a5ca60e02a968a482333e8188e2340c41c58460e50b9c735c643,2024-07-09T18:18:38.713000 CVE-2024-6605,0,0,daaffd6e1eb7775c366bd3629df32e5ec237220285a28f594449800d239e72c3,2024-07-09T18:18:38.713000 -CVE-2024-6606,0,0,f864c1684a72549611b7f7fcae4f61ef1f79247e95bb6b2096503289022181c4,2024-07-09T18:18:38.713000 +CVE-2024-6606,0,1,e062605e0b65fb108ca5179cfc9bc0d29f18b47cdd61167b51f9b33faf0c6789,2024-07-11T15:06:37.647000 CVE-2024-6607,0,0,4125d39d31df77d668fb24ccf5c1ced11947df2c4ba369deba85906910908188,2024-07-09T18:18:38.713000 CVE-2024-6608,0,0,e0b85615d2e08968fb3ea9bcf0763d4f346f2fd1f6fb5d15c9d79ca0c6f143f3,2024-07-09T18:18:38.713000 CVE-2024-6609,0,0,f532a8285aec61f63bc1d215d0415fae1421a37936276e9ad08f4683700f018b,2024-07-09T18:18:38.713000 CVE-2024-6610,0,0,1c24792ae39b605f1be07c5e2e3836fd3d6fa372741ef0758f0367b32c7ef3f4,2024-07-09T18:18:38.713000 -CVE-2024-6611,0,0,a25dcfb031bb1c8a6c9b6fef48b3c79624f176477e1f6964d7a1b5addbbe26dc,2024-07-09T18:18:38.713000 -CVE-2024-6612,0,0,8ea660f335d1e8552a64db073fe7466306fd1f2e5cc9fbb77910ed6aa806d566,2024-07-09T18:18:38.713000 +CVE-2024-6611,0,1,2cf8a2ea6e923d1d49b7dbacc811bd766042d08c643188eb0443531f06b279d0,2024-07-11T15:06:37.977000 +CVE-2024-6612,0,1,ec773de601f2439d4a30794cb33ecbe4d766cb102d1b031aeb7c612ae57eb7d9,2024-07-11T15:06:38.870000 CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c0a,2024-07-09T18:18:38.713000 CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000 CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000 -CVE-2024-6624,0,1,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000 +CVE-2024-6624,0,0,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000 CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000 -CVE-2024-6644,0,1,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168f9,2024-07-11T13:05:54.930000 -CVE-2024-6645,0,1,7709f10426c0d613ccf6f32b2adb3ff90e0557b8221acd969c94e4ad9a6fd54e,2024-07-11T13:05:54.930000 -CVE-2024-6646,0,1,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1a0,2024-07-11T13:05:54.930000 -CVE-2024-6647,0,1,6bf36707a5c1ef49215873d67fa852b25a9ef5c7d0d257d226656ba7dd32fcc4,2024-07-11T13:05:54.930000 -CVE-2024-6649,0,1,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000 -CVE-2024-6650,0,1,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000 -CVE-2024-6652,0,1,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000 -CVE-2024-6653,0,1,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 +CVE-2024-6644,0,0,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168f9,2024-07-11T13:05:54.930000 +CVE-2024-6645,0,0,7709f10426c0d613ccf6f32b2adb3ff90e0557b8221acd969c94e4ad9a6fd54e,2024-07-11T13:05:54.930000 +CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1a0,2024-07-11T13:05:54.930000 +CVE-2024-6647,0,0,6bf36707a5c1ef49215873d67fa852b25a9ef5c7d0d257d226656ba7dd32fcc4,2024-07-11T13:05:54.930000 +CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000 +CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000 +CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000 +CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 -CVE-2024-6666,0,1,6ba5e83c4c8007c7f2945dcbaee49cd53299747e7c829220281020263e99c21e,2024-07-11T13:05:54.930000 -CVE-2024-6676,0,1,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 +CVE-2024-6666,0,0,6ba5e83c4c8007c7f2945dcbaee49cd53299747e7c829220281020263e99c21e,2024-07-11T13:05:54.930000 +CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 +CVE-2024-6679,1,1,1a0cc66d963eba4d715626120647d5b84d7eab4652a03e0f0d6e90fdaa8df382,2024-07-11T15:15:13.273000