From 7e9baab0b505e2f9927c99f0fe05c0341dc3ff66 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 16 Jul 2024 12:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-07-16T12:00:17.806834+00:00 --- CVE-2023/CVE-2023-528xx/CVE-2023-52886.json | 41 +++++++++++++++ CVE-2024/CVE-2024-398xx/CVE-2024-39887.json | 56 +++++++++++++++++++++ CVE-2024/CVE-2024-64xx/CVE-2024-6457.json | 52 +++++++++++++++++++ CVE-2024/CVE-2024-65xx/CVE-2024-6579.json | 56 +++++++++++++++++++++ CVE-2024/CVE-2024-66xx/CVE-2024-6621.json | 56 +++++++++++++++++++++ README.md | 25 ++++----- _state.csv | 25 +++++---- 7 files changed, 286 insertions(+), 25 deletions(-) create mode 100644 CVE-2023/CVE-2023-528xx/CVE-2023-52886.json create mode 100644 CVE-2024/CVE-2024-398xx/CVE-2024-39887.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6457.json create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6579.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6621.json diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52886.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52886.json new file mode 100644 index 00000000000..a5d0bff4040 --- /dev/null +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52886.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2023-52886", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-07-16T10:15:02.493", + "lastModified": "2024-07-16T10:15:02.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix race by not overwriting udev->descriptor in hub_port_init()\n\nSyzbot reported an out-of-bounds read in sysfs.c:read_descriptors():\n\nBUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883\nRead of size 8 at addr ffff88801e78b8c8 by task udevd/5011\n\nCPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-g40f71e7cd3c6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351\n print_report mm/kasan/report.c:462 [inline]\n kasan_report+0x11c/0x130 mm/kasan/report.c:572\n read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883\n...\nAllocated by task 758:\n...\n __do_kmalloc_node mm/slab_common.c:966 [inline]\n __kmalloc+0x5e/0x190 mm/slab_common.c:979\n kmalloc include/linux/slab.h:563 [inline]\n kzalloc include/linux/slab.h:680 [inline]\n usb_get_configuration+0x1f7/0x5170 drivers/usb/core/config.c:887\n usb_enumerate_device drivers/usb/core/hub.c:2407 [inline]\n usb_new_device+0x12b0/0x19d0 drivers/usb/core/hub.c:2545\n\nAs analyzed by Khazhy Kumykov, the cause of this bug is a race between\nread_descriptors() and hub_port_init(): The first routine uses a field\nin udev->descriptor, not expecting it to change, while the second\noverwrites it.\n\nPrior to commit 45bf39f8df7f (\"USB: core: Don't hold device lock while\nreading the \"descriptors\" sysfs file\") this race couldn't occur,\nbecause the routines were mutually exclusive thanks to the device\nlocking. Removing that locking from read_descriptors() exposed it to\nthe race.\n\nThe best way to fix the bug is to keep hub_port_init() from changing\nudev->descriptor once udev has been initialized and registered.\nDrivers expect the descriptors stored in the kernel to be immutable;\nwe should not undermine this expectation. In fact, this change should\nhave been made long ago.\n\nSo now hub_port_init() will take an additional argument, specifying a\nbuffer in which to store the device descriptor it reads. (If udev has\nnot yet been initialized, the buffer pointer will be NULL and then\nhub_port_init() will store the device descriptor in udev as before.)\nThis eliminates the data race responsible for the out-of-bounds read.\n\nThe changes to hub_port_init() appear more extensive than they really\nare, because of indentation changes resulting from an attempt to avoid\nwriting to other parts of the usb_device structure after it has been\ninitialized. Similar changes should be made to the code that reads\nthe BOS descriptor, but that can be handled in a separate patch later\non. This patch is sufficient to fix the bug found by syzbot." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/7fe9d87996062f5eb0ca476ad0257f79bf43aaf5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8186596a663506b1124bede9fde6f243ef9f37ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9d241c5d9a9b7ad95c90c6520272fe404d5ac88f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b4a074b1fb222164ed7d5c0b8c922dc4a0840848", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39887.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39887.json new file mode 100644 index 00000000000..9daeb1bcbe8 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39887.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39887", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-16T10:15:03.380", + "lastModified": "2024-07-16T10:15:03.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLOWED_SQL_FUNCTIONS has been introduced. This key disallows the use of the following PostgreSQL functions: version, query_to_xml, inet_server_addr, and inet_client_addr. Additional functions can be added to this list for increased protection.\n\nThis issue affects Apache Superset: before 4.0.2.\n\nUsers are recommended to upgrade to version 4.0.2, which fixes the issue.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/j55vm41jg3l0x6w49zrmvbf3k0ts5fqz", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6457.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6457.json new file mode 100644 index 00000000000..fa1b119ad06 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6457.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-6457", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-16T11:15:10.097", + "lastModified": "2024-07-16T11:15:10.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HUSKY \u2013 Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018woof_author\u2019 parameter in all versions up to, and including, 1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_author/index.php#L102", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3116888/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfdf7b1-9bb8-4c1d-a00a-ca1e44440cab?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6579.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6579.json new file mode 100644 index 00000000000..27c3929a682 --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6579.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6579", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-16T10:15:03.797", + "lastModified": "2024-07-16T10:15:03.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Web and WooCommerce Addons for WPBakery Builder plugin for WordPress is vulnerable to unauthorized plugin settings modification due to a missing capability check on several plugin functions in all versions up to, and including, 1.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change some of the plugin settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L102", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L114", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L125", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/746b77c9-64f8-43e8-9c2a-ce6bc35fd24c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6621.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6621.json new file mode 100644 index 00000000000..cd94a6d4960 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6621.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6621", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-16T11:15:10.357", + "lastModified": "2024-07-16T11:15:10.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The RSS Aggregator \u2013 RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wprss_activate_feed_source' and 'wprss_pause_feed_source' functions in all versions up to, and including, 4.23.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate or pause existing RSS feeds." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php#L12", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php#L28", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php?rev=3118231", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e37331b-0b75-41ee-b390-532efd674cc1?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index df3a27e2004..77099448007 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-16T10:00:18.244546+00:00 +2024-07-16T12:00:17.806834+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-16T09:15:03.460000+00:00 +2024-07-16T11:15:10.357000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257088 +257093 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `5` -- [CVE-2023-52290](CVE-2023/CVE-2023-522xx/CVE-2023-52290.json) (`2024-07-16T08:15:02.050`) -- [CVE-2024-1937](CVE-2024/CVE-2024-19xx/CVE-2024-1937.json) (`2024-07-16T09:15:02.257`) -- [CVE-2024-2691](CVE-2024/CVE-2024-26xx/CVE-2024-2691.json) (`2024-07-16T09:15:02.497`) -- [CVE-2024-3587](CVE-2024/CVE-2024-35xx/CVE-2024-3587.json) (`2024-07-16T09:15:02.693`) -- [CVE-2024-3779](CVE-2024/CVE-2024-37xx/CVE-2024-3779.json) (`2024-07-16T09:15:02.877`) -- [CVE-2024-41008](CVE-2024/CVE-2024-410xx/CVE-2024-41008.json) (`2024-07-16T08:15:02.240`) -- [CVE-2024-5852](CVE-2024/CVE-2024-58xx/CVE-2024-5852.json) (`2024-07-16T09:15:03.093`) -- [CVE-2024-6565](CVE-2024/CVE-2024-65xx/CVE-2024-6565.json) (`2024-07-16T09:15:03.280`) -- [CVE-2024-6570](CVE-2024/CVE-2024-65xx/CVE-2024-6570.json) (`2024-07-16T09:15:03.460`) +- [CVE-2023-52886](CVE-2023/CVE-2023-528xx/CVE-2023-52886.json) (`2024-07-16T10:15:02.493`) +- [CVE-2024-39887](CVE-2024/CVE-2024-398xx/CVE-2024-39887.json) (`2024-07-16T10:15:03.380`) +- [CVE-2024-6457](CVE-2024/CVE-2024-64xx/CVE-2024-6457.json) (`2024-07-16T11:15:10.097`) +- [CVE-2024-6579](CVE-2024/CVE-2024-65xx/CVE-2024-6579.json) (`2024-07-16T10:15:03.797`) +- [CVE-2024-6621](CVE-2024/CVE-2024-66xx/CVE-2024-6621.json) (`2024-07-16T11:15:10.357`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-6559](CVE-2024/CVE-2024-65xx/CVE-2024-6559.json) (`2024-07-16T07:15:02.373`) ## Download and Usage diff --git a/_state.csv b/_state.csv index efcd38ea1bd..6bed22e8b55 100644 --- a/_state.csv +++ b/_state.csv @@ -238344,7 +238344,7 @@ CVE-2023-52286,0,0,d57c75df7d4ddd4390fb4bc0cb787c8d5ccb33cbef5a941d5aa3217832550 CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9cdc0,2024-01-24T18:40:15.637000 CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000 CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000 -CVE-2023-52290,1,1,399464231e49f20d23c72354bf5bf48a11eea79c84ca0e19d03bd235db0575a9,2024-07-16T08:15:02.050000 +CVE-2023-52290,0,0,399464231e49f20d23c72354bf5bf48a11eea79c84ca0e19d03bd235db0575a9,2024-07-16T08:15:02.050000 CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000 CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000 CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000 @@ -238944,6 +238944,7 @@ CVE-2023-52882,0,0,e51efc18668383cabb6a1a97b2fa54b9809b5bd71d28b08d72a7fdf9caf29 CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000 CVE-2023-52884,0,0,bbf325b5c1ed57a9d1f4ab6303e0df9c8a8b60b96f00c7266f34fe596a2f1382,2024-06-21T11:22:01.687000 CVE-2023-52885,0,0,e5c658cfc56d45f1e026b5e9d3b2354382c669c4a8a58f5c853288778028aada,2024-07-15T13:00:34.853000 +CVE-2023-52886,1,1,95f860132fb440ef5db5a693cde04172b145869bb82e837d027d0e58b83d8654,2024-07-16T10:15:02.493000 CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000 CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000 @@ -242424,7 +242425,7 @@ CVE-2024-1933,0,0,7fbc0f24622f50a410caa37f8d4d0022d31f3ba694aaa208855480ee88f0fa CVE-2024-1934,0,0,df6bc0820efaa227ff0593f2f377a2941dbe3870867c525b59689743a10c0b3a,2024-04-10T13:23:38.787000 CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da56b,2024-03-13T18:15:58.530000 CVE-2024-1936,0,0,b663fea20770354eab8754ae6925549962e39174687f5155b204d5fec65f6ae3,2024-03-23T12:15:08.453000 -CVE-2024-1937,1,1,e4267aecc6d36cf0089bfd3a7de2bf38a789e042581a5e82e29812af34d12152,2024-07-16T09:15:02.257000 +CVE-2024-1937,0,0,e4267aecc6d36cf0089bfd3a7de2bf38a789e042581a5e82e29812af34d12152,2024-07-16T09:15:02.257000 CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000 CVE-2024-1939,0,0,bb8e8d14c3c98da37e63f3c0963deaed3de9feadfccc15528efb01aca2c53754,2024-03-07T23:15:07.250000 CVE-2024-1940,0,0,4f9f4862eb1e6b7652f757b60ccb034b4f77619e6171d9f3805603ac6e0c779f,2024-06-06T13:59:09.023000 @@ -246984,7 +246985,7 @@ CVE-2024-26906,0,0,42532862975f8bdf6c218bb08e8c76f0bdeb5f292a8c20c2de1b8755512c9 CVE-2024-26907,0,0,00d718a412070a4297719ea0fb3f7b55969fac373e166e4b352e4dbc743daf28,2024-06-25T22:15:25.960000 CVE-2024-26908,0,0,5ecc683879bcc08f4a65e6b0675afebd2da7cfed4f9fada740f88a540c7f8b1e,2024-04-30T08:15:17.140000 CVE-2024-26909,0,0,e3d7941f07403bc0745f4894278d17e22a07c87692715dac5395fbc71a84fef3,2024-04-29T19:45:21.680000 -CVE-2024-2691,1,1,c8155cf95104d3314cc19d2c5bb788d687f54a9effa3d22a2941545abbd34823,2024-07-16T09:15:02.497000 +CVE-2024-2691,0,0,c8155cf95104d3314cc19d2c5bb788d687f54a9effa3d22a2941545abbd34823,2024-07-16T09:15:02.497000 CVE-2024-26910,0,0,954b55e4bd1d42e5ff1449b1b11f06a07bc8c27711bedf28e87052fdaee0aafd,2024-06-25T22:15:26.080000 CVE-2024-26911,0,0,8ea2c917a6f00806416f32a6fbb36b2b35e7e18ca96874650f1bec8c514fcc80,2024-04-29T19:17:11.627000 CVE-2024-26912,0,0,7c8d0e30edc101bfc2f9acae1bf1398abcf215c4aec3726d727c7375cc839a46,2024-04-29T19:20:57.410000 @@ -252865,7 +252866,7 @@ CVE-2024-35866,0,0,d0cc46812d56583865578aa7a7be2bec064126c2ec11cb3bbce2698115126 CVE-2024-35867,0,0,68386f3591f3f188a7476fa5855f8ac1dc116de9bd02ee457a082f6580699d33,2024-06-10T18:15:35.320000 CVE-2024-35868,0,0,631a0c47c7e0f65d439b8d71d6b3955aaa25bc09ab742cc924c15db6f46c8b06,2024-05-20T13:00:04.957000 CVE-2024-35869,0,0,630ed395e8d0f836b200232a6be2974e06759cee7a4d75dd11d6f714bebe5b1a,2024-07-03T02:02:21.027000 -CVE-2024-3587,1,1,88b9b543afe49e9f934075704f8082a980511b2f85cc799b5dd54b8dae7b2bb8,2024-07-16T09:15:02.693000 +CVE-2024-3587,0,0,88b9b543afe49e9f934075704f8082a980511b2f85cc799b5dd54b8dae7b2bb8,2024-07-16T09:15:02.693000 CVE-2024-35870,0,0,5a4167864efc3408c5c38cf8552b084d6c8e10c92910519cd2e6cedd908441ad,2024-05-20T13:00:04.957000 CVE-2024-35871,0,0,56b9e1c7cf8cc227a53238857c6c657b9eb9a1a650e2c064780cac494ab192c4,2024-06-25T22:15:31.897000 CVE-2024-35872,0,0,a0f59ba2a5d815fbc998062ea3a953e4acbf876ea21309bca7a7ecb80bc6c92e,2024-05-20T13:00:04.957000 @@ -253997,7 +253998,7 @@ CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000 CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000 -CVE-2024-3779,1,1,91cee144c8c80dcf7bc1667f9cc8611fac537eb0e56447cc423f1b595ce894d9,2024-07-16T09:15:02.877000 +CVE-2024-3779,0,0,91cee144c8c80dcf7bc1667f9cc8611fac537eb0e56447cc423f1b595ce894d9,2024-07-16T09:15:02.877000 CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000 CVE-2024-37791,0,0,5b4a77640e01b5f5901f77da4cf3e217016c11878e7475119bb550241e2deb0e,2024-06-20T12:44:01.637000 CVE-2024-37794,0,0,0173114c4850547998c4a3719d0197d2f797f34c9e250dbc5cfe23ea2cc8953b,2024-07-03T02:04:43.130000 @@ -254897,6 +254898,7 @@ CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bc CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000 CVE-2024-39884,0,0,820d6f61ede8e42a2beabc4b322a42eecc24064bf6142891f1909848431996b5,2024-07-12T14:15:16.640000 CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000 +CVE-2024-39887,1,1,fa7d2a734a057d0930b288c8c3ecef13f855e852c225bf49ff576829c5d9a630,2024-07-16T10:15:03.380000 CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 @@ -255201,7 +255203,7 @@ CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054 CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000 CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000 CVE-2024-41007,0,0,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000 -CVE-2024-41008,1,1,661ecdbcb3ca98cbdd2da931d1a244c9e6ccdaf7950933bf8c08cc771f962839,2024-07-16T08:15:02.240000 +CVE-2024-41008,0,0,661ecdbcb3ca98cbdd2da931d1a244c9e6ccdaf7950933bf8c08cc771f962839,2024-07-16T08:15:02.240000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000 @@ -256625,7 +256627,7 @@ CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000 CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000 CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000 -CVE-2024-5852,1,1,86ceec61c837be95a959741a38099dee81d338c029d4fc32b9bec0e93f1eb706,2024-07-16T09:15:03.093000 +CVE-2024-5852,0,0,86ceec61c837be95a959741a38099dee81d338c029d4fc32b9bec0e93f1eb706,2024-07-16T09:15:03.093000 CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000 CVE-2024-5855,0,0,470fd388735694b7759ccf5036e6a18639fe074b164bc2d2da9695a799e80c03,2024-07-09T18:19:14.047000 CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc72,2024-07-09T18:19:14.047000 @@ -256986,6 +256988,7 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 +CVE-2024-6457,1,1,7987e557c2c95095adc4ad17acf4ed1e2acc7eba81f89223deeca3346bc09dcb,2024-07-16T11:15:10.097000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000 CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000 @@ -257018,12 +257021,13 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6 CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6557,0,0,e9ee209561e99679c20203ca6d94da1a0bb55042ea3baa698cb80a889557bbdd,2024-07-16T05:15:15.073000 -CVE-2024-6559,0,1,16d00b9dee0dd009d20e82307398dc314aff9f5ca223c39785f9792cbd3709f1,2024-07-16T07:15:02.373000 +CVE-2024-6559,0,0,16d00b9dee0dd009d20e82307398dc314aff9f5ca223c39785f9792cbd3709f1,2024-07-16T07:15:02.373000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 -CVE-2024-6565,1,1,e7bb9ab08c108dc5070f2ca7ce46012474968cec63ff45f286f24d7239498860,2024-07-16T09:15:03.280000 -CVE-2024-6570,1,1,ccdbc86ad4745a63c6205119102457147a7c895153aa9ebe1080a60ef714da42,2024-07-16T09:15:03.460000 +CVE-2024-6565,0,0,e7bb9ab08c108dc5070f2ca7ce46012474968cec63ff45f286f24d7239498860,2024-07-16T09:15:03.280000 +CVE-2024-6570,0,0,ccdbc86ad4745a63c6205119102457147a7c895153aa9ebe1080a60ef714da42,2024-07-16T09:15:03.460000 CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000 +CVE-2024-6579,1,1,a0d916f5ee4dd254726798359f0bc3afc6dffb6f97426f2dcd8f47cc4f912602,2024-07-16T10:15:03.797000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 @@ -257043,6 +257047,7 @@ CVE-2024-6612,0,0,ec773de601f2439d4a30794cb33ecbe4d766cb102d1b031aeb7c612ae57eb7 CVE-2024-6613,0,0,972e81253130c3ea1fca72705a438fd241a2b5ffe08560847fb64da88d1289db,2024-07-09T18:18:38.713000 CVE-2024-6614,0,0,1be1fa04167dbe1739c8748fecedef47a7bd73d4360fbc6878e091dbbe1de7b2,2024-07-09T18:18:38.713000 CVE-2024-6615,0,0,7bf7f5fde3708291832ebfaaca065d46b502caca4507586f81d1026c39461379,2024-07-09T18:18:38.713000 +CVE-2024-6621,1,1,0120997ff260c74340cb1d016c95dd3114a00638d7a855e82645f855d0462929,2024-07-16T11:15:10.357000 CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000 CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000