diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json new file mode 100644 index 00000000000..bc5ce245e2e --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52291.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2023-52291", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-17T09:15:02.410", + "lastModified": "2024-07-17T09:15:02.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nBackground:\n\nIn the \"Project\" module, the maven build args\u00a0\u00a0\u201c<\u201d operator causes command injection. e.g : \u201c< (curl\u00a0 http://xxx.com )\u201d will be executed as a command injection,\n\nMitigation:\n\nall users should upgrade to 2.1.4,\u00a0 The \"<\" operator will blocked\u3002\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/pl6xgzoqrl4kcn0nt55zjbsx8dn80mkf", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json new file mode 100644 index 00000000000..1715361650a --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29737.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-29737", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-17T09:15:02.527", + "lastModified": "2024-07-17T09:15:02.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nMitigation:\n\nall users should upgrade to 2.1.4\n\nBackground info:\n\nLog in to Streampark using the default username (e.g. test1, test2, test3) and the default password (streampark). Navigate to the Project module, then add a new project. Enter the git repository address of the project and input `touch /tmp/success_2.1.2` as the \"Build Argument\". Note that there is no verification and interception of the special character \"`\". As a result, you will find that this injection command will be successfully executed after executing the build.\n\nIn the latest version, the special symbol ` is intercepted.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/xhx7jt1t24s6d7o435wxng8t0ojfbfh5", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json new file mode 100644 index 00000000000..a0dc5a0fbdc --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30471.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-30471", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-17T09:15:02.640", + "lastModified": "2024-07-17T09:15:02.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in user self-registration.\nThis allows an attacker to potentially request the creation of multiple accounts with the same email address until the email address is registered, creating many identical users and corrupting StreamPipe's user management.\nThis issue affects Apache StreamPipes: through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/8yodrmohgcybq900or3d4hc1msl230fr", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json new file mode 100644 index 00000000000..96796d4d6d7 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31070.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-31070", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-17T09:15:02.813", + "lastModified": "2024-07-17T09:15:02.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Initialization of a resource with an insecure default vulnerability in FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allows a remote unauthenticated attacker to access telnet service unlimitedly." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/vu/JVNVU96424864/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json new file mode 100644 index 00000000000..628ae3c4c50 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31979.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-31979", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-17T09:15:02.907", + "lastModified": "2024-07-17T09:15:02.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installation process of pipeline elements.\nPreviously, StreamPipes allowed users to configure custom endpoints from which to install additional pipeline elements. \nThese endpoints were not properly validated, allowing an attacker to get StreamPipes to send an HTTP GET request to an arbitrary address.\nThis issue affects Apache StreamPipes: through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/8lryp3bxnby9kmk13odkz2jbfdjfvf0y", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json new file mode 100644 index 00000000000..34d25e24e96 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36475.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-36475", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-17T09:15:03.013", + "lastModified": "2024-07-17T09:15:03.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain an active debug code vulnerability. If a user who knows how to use the debug function logs in to the product, the debug function may be used and an arbitrary OS command may be executed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/vu/JVNVU96424864/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json new file mode 100644 index 00000000000..42966b67526 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-36491", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-17T09:15:03.090", + "lastModified": "2024-07-17T09:15:03.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allow a remote unauthenticated attacker to execute an arbitrary OS command, obtain and/or alter sensitive information, and be able to cause a denial of service (DoS) condition." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/vu/JVNVU96424864/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json new file mode 100644 index 00000000000..a3e00bd6077 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39863.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-39863", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-17T08:15:01.933", + "lastModified": "2024-07-17T08:15:01.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/40475", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/gxkvs279f1mbvckv5q65worr6how20o3", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json new file mode 100644 index 00000000000..0dc416b7936 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39877.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-39877", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-17T08:15:02.073", + "lastModified": "2024-07-17T08:15:02.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/40522", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/1xhj9dkp37d6pzn24ll2mf94wbqnb2y1", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json new file mode 100644 index 00000000000..bc8588483cb --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40617", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-07-17T09:15:03.163", + "lastModified": "2024-07-17T09:15:03.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://fenics.fujitsu.com/networkservice/m2m/download/update-m.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN25583987/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5582.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5582.json new file mode 100644 index 00000000000..0bf7e285971 --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5582.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5582", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-17T08:15:02.180", + "lastModified": "2024-07-17T08:15:02.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'url' attribute within the Q&A Block widget in all versions up to, and including, 1.33 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/schema-and-structured-data-for-wp/tags/1.31/modules/elementor/widgets/qanda-block.php#L355", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/schema-and-structured-data-for-wp/trunk/modules/elementor/widgets/class-qanda-block.php#L369", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/schema-and-structured-data-for-wp/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab650b99-ab15-4ddc-a622-cb43ab554ba7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5703.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5703.json new file mode 100644 index 00000000000..6a2c6b1d798 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5703.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-5703", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-17T08:15:02.370", + "lastModified": "2024-07-17T08:15:02.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized API access due to a missing capability check in all versions up to, and including, 5.7.26. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access the API (provided it is enabled) and add, edit, and delete audience users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/email-subscribers/trunk/lite/admin/class-es-rest-api-admin.php#L25", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3118326/email-subscribers/trunk/lite/admin/class-es-rest-api-admin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22283650-36bf-43e5-a57e-a91025fb2af7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6047.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6047.json index 4fe1078f7da..538acc58d72 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6047.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6047.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6047", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-06-17T06:15:09.237", - "lastModified": "2024-06-17T14:15:13.040", + "lastModified": "2024-07-17T08:15:02.570", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6220.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6220.json new file mode 100644 index 00000000000..2d74a9a9cb5 --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6220.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-6220", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-17T08:15:02.730", + "lastModified": "2024-07-17T08:15:02.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The \u7b80\u6570\u91c7\u96c6\u5668 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/keydatas/trunk/keydatas.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ae7971-7bdf-4369-b04b-fb48ea5b9518?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0a7ff0f39a5..3723de366d1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-17T08:00:18.775605+00:00 +2024-07-17T10:00:18.371008+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-17T07:15:03.873000+00:00 +2024-07-17T09:15:03.163000+00:00 ``` ### Last Data Feed Release @@ -33,30 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257347 +257360 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `13` -- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-17T07:15:01.973`) -- [CVE-2024-41010](CVE-2024/CVE-2024-410xx/CVE-2024-41010.json) (`2024-07-17T07:15:02.183`) -- [CVE-2024-5251](CVE-2024/CVE-2024-52xx/CVE-2024-5251.json) (`2024-07-17T07:15:02.260`) -- [CVE-2024-5252](CVE-2024/CVE-2024-52xx/CVE-2024-5252.json) (`2024-07-17T07:15:02.483`) -- [CVE-2024-5253](CVE-2024/CVE-2024-52xx/CVE-2024-5253.json) (`2024-07-17T07:15:02.690`) -- [CVE-2024-5254](CVE-2024/CVE-2024-52xx/CVE-2024-5254.json) (`2024-07-17T07:15:02.883`) -- [CVE-2024-5255](CVE-2024/CVE-2024-52xx/CVE-2024-5255.json) (`2024-07-17T07:15:03.073`) -- [CVE-2024-6033](CVE-2024/CVE-2024-60xx/CVE-2024-6033.json) (`2024-07-17T07:15:03.263`) -- [CVE-2024-6467](CVE-2024/CVE-2024-64xx/CVE-2024-6467.json) (`2024-07-17T07:15:03.493`) -- [CVE-2024-6660](CVE-2024/CVE-2024-66xx/CVE-2024-6660.json) (`2024-07-17T07:15:03.683`) -- [CVE-2024-6669](CVE-2024/CVE-2024-66xx/CVE-2024-6669.json) (`2024-07-17T07:15:03.873`) +- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-17T09:15:02.410`) +- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-17T09:15:02.527`) +- [CVE-2024-30471](CVE-2024/CVE-2024-304xx/CVE-2024-30471.json) (`2024-07-17T09:15:02.640`) +- [CVE-2024-31070](CVE-2024/CVE-2024-310xx/CVE-2024-31070.json) (`2024-07-17T09:15:02.813`) +- [CVE-2024-31979](CVE-2024/CVE-2024-319xx/CVE-2024-31979.json) (`2024-07-17T09:15:02.907`) +- [CVE-2024-36475](CVE-2024/CVE-2024-364xx/CVE-2024-36475.json) (`2024-07-17T09:15:03.013`) +- [CVE-2024-36491](CVE-2024/CVE-2024-364xx/CVE-2024-36491.json) (`2024-07-17T09:15:03.090`) +- [CVE-2024-39863](CVE-2024/CVE-2024-398xx/CVE-2024-39863.json) (`2024-07-17T08:15:01.933`) +- [CVE-2024-39877](CVE-2024/CVE-2024-398xx/CVE-2024-39877.json) (`2024-07-17T08:15:02.073`) +- [CVE-2024-40617](CVE-2024/CVE-2024-406xx/CVE-2024-40617.json) (`2024-07-17T09:15:03.163`) +- [CVE-2024-5582](CVE-2024/CVE-2024-55xx/CVE-2024-5582.json) (`2024-07-17T08:15:02.180`) +- [CVE-2024-5703](CVE-2024/CVE-2024-57xx/CVE-2024-5703.json) (`2024-07-17T08:15:02.370`) +- [CVE-2024-6220](CVE-2024/CVE-2024-62xx/CVE-2024-6220.json) (`2024-07-17T08:15:02.730`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-6047](CVE-2024/CVE-2024-60xx/CVE-2024-6047.json) (`2024-07-17T08:15:02.570`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ee77c8feaf9..1c8e896cefb 100644 --- a/_state.csv +++ b/_state.csv @@ -238453,6 +238453,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000 CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000 CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000 +CVE-2023-52291,1,1,62b19fa704ecae2c8dc0031950e39edea10a55b8751c9c99de83ab6a950ad510,2024-07-17T09:15:02.410000 CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000 CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000 CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000 @@ -248959,6 +248960,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710 CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000 CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000 +CVE-2024-29737,1,1,abee47fe398bb76f7f243555e81bf7a2f13c2526bbc00b1a6baf3ad1e78684ea,2024-07-17T09:15:02.527000 CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000 CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000 CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000 @@ -249655,6 +249657,7 @@ CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288 CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6667,2024-04-01T01:12:59.077000 CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000 CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000 +CVE-2024-30471,1,1,bab2c9efe7e710556c873bd56d11e5580a5090baf8adfd2fc81152a538f625d6,2024-07-17T09:15:02.640000 CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000 @@ -250007,6 +250010,7 @@ CVE-2024-31064,0,0,09fc7c8df13203efb1ca9057b678e29517d4a825c266b7d99eb7440ce2a3e CVE-2024-31065,0,0,7a59dbe54933bf84c1cc682e8d045b6969f111bdbc4c97f8279c44771dded5df,2024-03-28T20:53:20.813000 CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd82687004ae,2024-04-15T13:15:51.577000 CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000 +CVE-2024-31070,1,1,0163dd520ae494ecf8899eea3488e5c2fc1bd852069703b4b9690ddd9000a756,2024-07-17T09:15:02.813000 CVE-2024-31071,0,0,38e67c605bc28fae8948bdb29e4e1fea108746bc02f8e7ba298a38c41a90d442,2024-07-03T18:01:57.697000 CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000 CVE-2024-31077,0,0,2f0093d39cf5c7659611f858795c8621f6dfa183946b9e96395aae4eaaeca6eb,2024-04-23T12:52:09.397000 @@ -250606,6 +250610,7 @@ CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb9 CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000 +CVE-2024-31979,1,1,6b14c84ffc58edd58a41ecfbd5160fff2143fc78b2cb21639cdb3e6a54c014f1,2024-07-17T09:15:02.907000 CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000 CVE-2024-31981,0,0,f2d3a632894e526ffc79a652f25d3a7da1db8610794379510e264c8e37958abd,2024-04-11T12:47:44.137000 @@ -253538,6 +253543,7 @@ CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000 CVE-2024-36472,0,0,2535bb51ccaa28f537e77e0ccd5fbdc4d19f82667f3e7465a3e9bc19e2a787a8,2024-05-28T17:11:47.007000 CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c553,2024-06-11T13:54:12.057000 +CVE-2024-36475,1,1,7ed238432d05eb271990281df74f025e6cc8942b35a974274c6e54341354fecc,2024-07-17T09:15:03.013000 CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000 CVE-2024-36478,0,0,3d7ccc3e5e506ff24ae4133973c4756e3313941d8345b88b77b0a392d064c726,2024-06-21T11:22:01.687000 CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c7c4,2024-06-24T19:26:47.037000 @@ -253547,6 +253553,7 @@ CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910 CVE-2024-36484,0,0,b7f6e9f2300585891eaa5f57928160b50fffe9b2c3ba452d5f6777346d3497a0,2024-06-21T11:22:01.687000 CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 +CVE-2024-36491,1,1,bee8271f86d23d3c668c3502644384e1a0cb386889748b2f6837aaba8e75afd3,2024-07-17T09:15:03.090000 CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000 CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000 @@ -255071,6 +255078,7 @@ CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c6 CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000 CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000 CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000 +CVE-2024-39863,1,1,3ee723b3a0c5125399d16a11c9512cee9b9c778f3dc938dfafec6e536a9c710a,2024-07-17T08:15:01.933000 CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000 CVE-2024-39865,0,0,1431947f48c63c3f2f289bcb05288d0cda08dff5370e915fbcca9f419224f5d7,2024-07-09T18:19:14.047000 CVE-2024-39866,0,0,4ed5613c5836c63f5d6549bcb87208902b3beb2ec94b1529e5dacfcf651468b3,2024-07-09T18:19:14.047000 @@ -255085,6 +255093,7 @@ CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704c CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000 CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000 CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000 +CVE-2024-39877,1,1,2dd18cb0b88e6a0324377a5b3b12d23db63fbeca30132a0cd8cd7be0689f19f6,2024-07-17T08:15:02.073000 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000 @@ -255251,6 +255260,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000 CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000 CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 +CVE-2024-40617,1,1,656b360985193ec4b40c91a0040f362a6e595795c29738b7048f16eedba12e75,2024-07-17T09:15:03.163000 CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000 CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000 CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000 @@ -255418,8 +255428,8 @@ CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71f CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000 CVE-2024-41007,0,0,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000 CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000 -CVE-2024-41009,1,1,e5b81427b73a7a659ab3d92e9b0d7880f34e9bf363b4b23d516646ecfbf7861a,2024-07-17T07:15:01.973000 -CVE-2024-41010,1,1,b1691e45737b2b208a2830f3341ef6e6a5b6991a3b7c35dc85fb1a3a07095eb6,2024-07-17T07:15:02.183000 +CVE-2024-41009,0,0,e5b81427b73a7a659ab3d92e9b0d7880f34e9bf363b4b23d516646ecfbf7861a,2024-07-17T07:15:01.973000 +CVE-2024-41010,0,0,b1691e45737b2b208a2830f3341ef6e6a5b6991a3b7c35dc85fb1a3a07095eb6,2024-07-17T07:15:02.183000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000 @@ -256400,11 +256410,11 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317 CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000 CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000 CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000 -CVE-2024-5251,1,1,ba3d2c0f12a0aad18985c34197dfb5c6f863f2d1e893878b1f224a89df5cde00,2024-07-17T07:15:02.260000 -CVE-2024-5252,1,1,37756dffba5d6bea70d1c95fddbd7f3af71cbff02ac71c7267e8e00c27d1d747,2024-07-17T07:15:02.483000 -CVE-2024-5253,1,1,419a036fdbe28fd90488f2a8ac36952ccbed00272c62d9610ceb07cdd772123a,2024-07-17T07:15:02.690000 -CVE-2024-5254,1,1,3d10c9b130bb6e37beefe49df8fbb12e54bbf8fbc808a8d229669162c22546c6,2024-07-17T07:15:02.883000 -CVE-2024-5255,1,1,5ca464b4e7b83fa9891b4810da9d3130521e6735749a82e6d1faf0587e2a8362,2024-07-17T07:15:03.073000 +CVE-2024-5251,0,0,ba3d2c0f12a0aad18985c34197dfb5c6f863f2d1e893878b1f224a89df5cde00,2024-07-17T07:15:02.260000 +CVE-2024-5252,0,0,37756dffba5d6bea70d1c95fddbd7f3af71cbff02ac71c7267e8e00c27d1d747,2024-07-17T07:15:02.483000 +CVE-2024-5253,0,0,419a036fdbe28fd90488f2a8ac36952ccbed00272c62d9610ceb07cdd772123a,2024-07-17T07:15:02.690000 +CVE-2024-5254,0,0,3d10c9b130bb6e37beefe49df8fbb12e54bbf8fbc808a8d229669162c22546c6,2024-07-17T07:15:02.883000 +CVE-2024-5255,0,0,5ca464b4e7b83fa9891b4810da9d3130521e6735749a82e6d1faf0587e2a8362,2024-07-17T07:15:03.073000 CVE-2024-5256,0,0,7546c1517da1882e18d942ab700b65cdd397cd67565c940d6efb24b85fa1c2bd,2024-06-07T14:56:05.647000 CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000 CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000 @@ -256666,6 +256676,7 @@ CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8a CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000 CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000 CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000 +CVE-2024-5582,1,1,bda1b1adad5ca655f44a526dc76a413b3ed087946a37e2dd235f07db40a34651,2024-07-17T08:15:02.180000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000 CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000 @@ -256754,6 +256765,7 @@ CVE-2024-5699,0,0,c6a42ec507c58416dc30ca6ed956f1ded247800b2c9b3cf1e9a175eb88ff9b CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000 CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b1128f,2024-06-11T13:54:12.057000 CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000 +CVE-2024-5703,1,1,9706e49d4615235ada62fb6d426611eb128f3510e8f9c0c65bd057b8fd0fc817,2024-07-17T08:15:02.370000 CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000 @@ -256958,7 +256970,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702 CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000 CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000 -CVE-2024-6033,1,1,15c25de796ebfbab9e44a812131dc54f93a03e716bec334742145fa1535f6aae,2024-07-17T07:15:03.263000 +CVE-2024-6033,0,0,15c25de796ebfbab9e44a812131dc54f93a03e716bec334742145fa1535f6aae,2024-07-17T07:15:03.263000 CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000 CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 @@ -256970,7 +256982,7 @@ CVE-2024-6043,0,0,9a8214fcd16bf01d325c97e688ae6245e010f64d01a5df33ef8c749a0d5352 CVE-2024-6044,0,0,4f21043ce144607b18656c689e724820f609703d237d24dbe17227d3f52b49e9,2024-06-17T12:42:04.623000 CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee94266,2024-06-17T12:42:04.623000 CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000 -CVE-2024-6047,0,0,64cbd7bb00dd96a251d35b437434b06509bf45d7928521d6c8dc9260967706f3,2024-06-17T14:15:13.040000 +CVE-2024-6047,0,1,3a90a77d82081ca792239f937c9e32a45aca8eadbd9fe3df9a38e907e2ab40c9,2024-07-17T08:15:02.570000 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,af0f9fc577c3e44fa6616ba0473858c6a88d9ea48cff0078f9cf415e610d9fc1,2024-07-01T16:37:39.040000 CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000 @@ -257086,6 +257098,7 @@ CVE-2024-6215,0,0,720f1739703095287552164316882a6b926c156c15e89c7dc7084a2a8b1f11 CVE-2024-6216,0,0,99a638bb9b091862ee1125e5c2af18142e9f2a446dc1f5e54add6d69d774b8bc,2024-06-24T20:15:11.177000 CVE-2024-6217,0,0,caeef107ec037a20535b69bf461e75c9da91ce4fd887edb01336f60c235444b1,2024-06-21T11:22:01.687000 CVE-2024-6218,0,0,3cb8a30d4ddfe61bdea61d401bfb5f7d243e9ab40309c0377a9f4fcd89ff6826,2024-06-21T15:15:16.547000 +CVE-2024-6220,1,1,0f2fb7730cf82d192a68e0e93d4a2014d253ff648c0c5f39b2e26f9e11aa8ac6,2024-07-17T08:15:02.730000 CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08ae,2024-07-12T17:05:39.070000 CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000 CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000 @@ -257227,7 +257240,7 @@ CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000 CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000 CVE-2024-6465,0,0,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000 -CVE-2024-6467,1,1,83ea8485c4f51411157c8a01fb9be399a5fe9907669d9a8fad6b15129616725c,2024-07-17T07:15:03.493000 +CVE-2024-6467,0,0,83ea8485c4f51411157c8a01fb9be399a5fe9907669d9a8fad6b15129616725c,2024-07-17T07:15:03.493000 CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000 CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 @@ -257300,11 +257313,11 @@ CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6655,0,0,0485248ee98682a7d1526979650a74114bd662162c8fc1626488ee79436e31bf,2024-07-16T18:00:02.110000 -CVE-2024-6660,1,1,8420d82493fd4a45d30ce8c67e0a72efbb8840ded71fe90edd6bf51e51d65ad1,2024-07-17T07:15:03.683000 +CVE-2024-6660,0,0,8420d82493fd4a45d30ce8c67e0a72efbb8840ded71fe90edd6bf51e51d65ad1,2024-07-17T07:15:03.683000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000 -CVE-2024-6669,1,1,61a6470650ec4ecffd67c04da2ad00a814e79b0427dcfaa8a7c533cc93f27a07,2024-07-17T07:15:03.873000 +CVE-2024-6669,0,0,61a6470650ec4ecffd67c04da2ad00a814e79b0427dcfaa8a7c533cc93f27a07,2024-07-17T07:15:03.873000 CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000 CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000