From 925e2d6dbf2e0ef578be8a90c5b627894af9d617 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 11 Jul 2024 10:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-07-11T10:00:18.532132+00:00 --- CVE-2024/CVE-2024-26xx/CVE-2024-2602.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-384xx/CVE-2024-38433.json | 60 +++++++++++++++++++++ CVE-2024/CVE-2024-56xx/CVE-2024-5679.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-56xx/CVE-2024-5680.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-56xx/CVE-2024-5681.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-65xx/CVE-2024-6528.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-66xx/CVE-2024-6666.json | 4 ++ README.md | 29 ++++------ _state.csv | 34 +++++++----- 9 files changed, 375 insertions(+), 32 deletions(-) create mode 100644 CVE-2024/CVE-2024-26xx/CVE-2024-2602.json create mode 100644 CVE-2024/CVE-2024-384xx/CVE-2024-38433.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5679.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5680.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5681.json create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6528.json diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json new file mode 100644 index 00000000000..4ffc011da58 --- /dev/null +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-2602", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-07-11T09:15:03.030", + "lastModified": "2024-07-11T09:15:03.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path\nTraversal') vulnerability exists that could result in remote code execution when an authenticated\nuser executes a saved project file that has been tampered by a malicious actor." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-03.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json new file mode 100644 index 00000000000..019e159179e --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38433", + "sourceIdentifier": "cna@cyber.gov.il", + "published": "2024-07-11T08:15:10.623", + "lastModified": "2024-07-11T08:15:10.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nuvoton - CWE-305: Authentication Bypass by Primary Weakness\n\nAn attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock\n\nreference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code\n\nexecution." + }, + { + "lang": "es", + "value": "Nuvoton - CWE-305: Omisi\u00f3n de autenticaci\u00f3n por debilidad primaria Un atacante con acceso de escritura a SPI-Flash en un subsistema BMC NPCM7xx que utiliza el c\u00f3digo de referencia Nuvoton BootBlock puede modificar el encabezado de la imagen u-boot en flash analizado por BootBlock, lo que podr\u00eda provocar a la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@cyber.gov.il", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@cyber.gov.il", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "cna@cyber.gov.il" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json new file mode 100644 index 00000000000..56ef5d9fe27 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5679", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-07-11T09:15:03.523", + "lastModified": "2024-07-11T09:15:03.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service, or\nkernel memory leak when a malicious actor with local user access crafts a script/program using\nan IOCTL call in the Foxboro.sys driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-02.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json new file mode 100644 index 00000000000..da9e8ff1a9f --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5680", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-07-11T09:15:03.923", + "lastModified": "2024-07-11T09:15:03.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-129: Improper Validation of Array Index vulnerability exists that could cause local denial-of-service when a malicious actor with local user access crafts a script/program using an IOCTL\ncall in the Foxboro.sys driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-02.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json new file mode 100644 index 00000000000..91c128b1803 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5681", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-07-11T09:15:04.360", + "lastModified": "2024-07-11T09:15:04.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-20: Improper Input Validation vulnerability exists that could cause local denial-of-service,\nprivilege escalation, and potentially kernel execution when a malicious actor with local user\naccess crafts a script/program using an IOCTL call in the Foxboro.sys driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-02.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json new file mode 100644 index 00000000000..e6db396e66d --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6528", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-07-11T09:15:04.867", + "lastModified": "2024-07-11T09:15:04.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site\nScripting') vulnerability exists that could cause a vulnerability leading to a cross-site scripting\ncondition where attackers can have a victim\u2019s browser run arbitrary JavaScript when they visit a\npage containing the injected payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-04.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json index 3adad9581c8..87004082717 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP ERP plugin for WordPress is vulnerable to SQL Injection via the \u2018vendor_id\u2019 parameter in all versions up to, and including, 1.13.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Accounting Manager access (erp_ac_view_sales_summary capability) and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WP ERP para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'vendor_id' en todas las versiones hasta la 1.13.0 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de Accounting Manager (capacidad erp_ac_view_sales_summary) y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/README.md b/README.md index 4d2b70e56de..ffe3611dd38 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-11T08:00:18.497604+00:00 +2024-07-11T10:00:18.532132+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-11T07:15:07.233000+00:00 +2024-07-11T09:15:04.867000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256667 +256673 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `6` -- [CVE-2024-1845](CVE-2024/CVE-2024-18xx/CVE-2024-1845.json) (`2024-07-11T06:15:02.613`) -- [CVE-2024-2880](CVE-2024/CVE-2024-28xx/CVE-2024-2880.json) (`2024-07-11T07:15:02.840`) -- [CVE-2024-4655](CVE-2024/CVE-2024-46xx/CVE-2024-4655.json) (`2024-07-11T06:15:02.750`) -- [CVE-2024-5257](CVE-2024/CVE-2024-52xx/CVE-2024-5257.json) (`2024-07-11T07:15:04.257`) -- [CVE-2024-5444](CVE-2024/CVE-2024-54xx/CVE-2024-5444.json) (`2024-07-11T06:15:02.830`) -- [CVE-2024-5470](CVE-2024/CVE-2024-54xx/CVE-2024-5470.json) (`2024-07-11T07:15:04.833`) -- [CVE-2024-6025](CVE-2024/CVE-2024-60xx/CVE-2024-6025.json) (`2024-07-11T06:15:02.913`) -- [CVE-2024-6026](CVE-2024/CVE-2024-60xx/CVE-2024-6026.json) (`2024-07-11T06:15:02.987`) -- [CVE-2024-6138](CVE-2024/CVE-2024-61xx/CVE-2024-6138.json) (`2024-07-11T06:15:03.083`) -- [CVE-2024-6256](CVE-2024/CVE-2024-62xx/CVE-2024-6256.json) (`2024-07-11T07:15:05.430`) -- [CVE-2024-6385](CVE-2024/CVE-2024-63xx/CVE-2024-6385.json) (`2024-07-11T07:15:06.123`) -- [CVE-2024-6624](CVE-2024/CVE-2024-66xx/CVE-2024-6624.json) (`2024-07-11T07:15:06.697`) -- [CVE-2024-6666](CVE-2024/CVE-2024-66xx/CVE-2024-6666.json) (`2024-07-11T07:15:07.233`) +- [CVE-2024-2602](CVE-2024/CVE-2024-26xx/CVE-2024-2602.json) (`2024-07-11T09:15:03.030`) +- [CVE-2024-38433](CVE-2024/CVE-2024-384xx/CVE-2024-38433.json) (`2024-07-11T08:15:10.623`) +- [CVE-2024-5679](CVE-2024/CVE-2024-56xx/CVE-2024-5679.json) (`2024-07-11T09:15:03.523`) +- [CVE-2024-5680](CVE-2024/CVE-2024-56xx/CVE-2024-5680.json) (`2024-07-11T09:15:03.923`) +- [CVE-2024-5681](CVE-2024/CVE-2024-56xx/CVE-2024-5681.json) (`2024-07-11T09:15:04.360`) +- [CVE-2024-6528](CVE-2024/CVE-2024-65xx/CVE-2024-6528.json) (`2024-07-11T09:15:04.867`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2023-51103](CVE-2023/CVE-2023-511xx/CVE-2023-51103.json) (`2024-07-11T06:15:02.293`) +- [CVE-2024-6666](CVE-2024/CVE-2024-66xx/CVE-2024-6666.json) (`2024-07-11T07:15:07.233`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9a29fd042b4..c3437063559 100644 --- a/_state.csv +++ b/_state.csv @@ -237541,7 +237541,7 @@ CVE-2023-5110,0,0,aa2dedd230a09466e5f993029374102669462a4f6fe8a57158d8d4cb442de9 CVE-2023-51100,0,0,a4131e6c440f588b64e248645152e6e6454ab203871157c89e2ac0e8f59db4a4,2023-12-30T03:19:12.080000 CVE-2023-51101,0,0,715bd2375e465539f78b9589de724a3b44b5b751f2a2bdeeadbb172b19954d10,2023-12-30T03:19:13.923000 CVE-2023-51102,0,0,43e4885799f2da8dffd65a72e501f08b192ea7fe94ed89bfde6db81b2efa7f22,2023-12-30T03:19:15.973000 -CVE-2023-51103,0,1,f36b901e2ee5bb745eddb6ee56710943c4ddf6c5e84570c286f2359d421ec38b,2024-07-11T06:15:02.293000 +CVE-2023-51103,0,0,f36b901e2ee5bb745eddb6ee56710943c4ddf6c5e84570c286f2359d421ec38b,2024-07-11T06:15:02.293000 CVE-2023-51104,0,0,4e7f57d88a96c53c8983850e0ce64f7f7f64d18b84efb70425e41eb2b5c6ccf2,2024-07-09T21:15:11.690000 CVE-2023-51105,0,0,4abe2872b1e377f4ee0d31e3315aedcd1a647380c8a18113bab0a1851833e7a2,2024-07-10T20:15:02.820000 CVE-2023-51106,0,0,2ad42e3fc60bf937fccd789a94702f6663bceff82ffdd09e8001ab565c4bd666,2024-03-18T04:15:08.790000 @@ -242325,7 +242325,7 @@ CVE-2024-1841,0,0,39b2aee15bd218c5f0ab2f7c5cc3fd949f7c8705e3573f0315e5f3107f7c80 CVE-2024-1842,0,0,0e20681dfde5286f0a06faaec929b1d3b2d16095090d24a3b41be5a6d299e939,2024-05-02T18:00:37.360000 CVE-2024-1843,0,0,381f1dba7504e2dd4844c9284f47a0574c276b6a0dafd5dcab8a395be3a46549,2024-03-13T18:15:58.530000 CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b5116,2024-03-20T13:00:16.367000 -CVE-2024-1845,1,1,65a665498588e4fcbf29db2f750e852102f0a98dbb8c9f38599c7757f1366aab,2024-07-11T06:15:02.613000 +CVE-2024-1845,0,0,65a665498588e4fcbf29db2f750e852102f0a98dbb8c9f38599c7757f1366aab,2024-07-11T06:15:02.613000 CVE-2024-1846,0,0,ef5b5743243fde26f19bda8d3441988876e0bebaf27eaa4fdca21b8d69d3b82c,2024-04-15T13:15:31.997000 CVE-2024-1847,0,0,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000 @@ -246230,6 +246230,7 @@ CVE-2024-26015,0,0,91bd66afc3c2abf869a3d76bed02c232c2c3a3c155933975bf6c3d38e6149 CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 +CVE-2024-2602,1,1,38e8e4760ade88d60bb952633e9d049dd1e2be6399b53e6e5a4df913912eca5c,2024-07-11T09:15:03.030000 CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000 CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50e1e,2024-05-29T13:02:09.280000 CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000 @@ -248245,7 +248246,7 @@ CVE-2024-28794,0,0,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596 CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 CVE-2024-28797,0,0,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000 CVE-2024-28798,0,0,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000 -CVE-2024-2880,1,1,17a6bfe5fca6888fb379d8c277ac31d5925e385b05e8f536a8485474006839a6,2024-07-11T07:15:02.840000 +CVE-2024-2880,0,0,17a6bfe5fca6888fb379d8c277ac31d5925e385b05e8f536a8485474006839a6,2024-07-11T07:15:02.840000 CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000 @@ -254209,6 +254210,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,3714727f8bfcc9e282c2717dad223df765a696413b267002faf1df27a5ac73ea,2024-06-17T12:42:04.623000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 +CVE-2024-38433,1,1,bb19380620c0f898c2545b519cc23ac43657f7a890dd5a2342f5e7e57129f75b,2024-07-11T08:15:10.623000 CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000 CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000 CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000 @@ -255365,7 +255367,7 @@ CVE-2024-4651,0,0,7a1073040800fe83444723cdc7dc81dd54cd1cc8604732f5c58643190867c3 CVE-2024-4652,0,0,5a9d123e7dc162b2780d21e171c5f7bd67b56d13b67e6af24f7924f686cdd9ec,2024-06-04T19:20:44.873000 CVE-2024-4653,0,0,695819124007e1fa87749621ef4d62ddcb026ccafa0c20f99f5ec61618107b32,2024-06-04T19:20:44.990000 CVE-2024-4654,0,0,eca077048d127add67f133585649496d1af539c8d39e41b186d99947e2c0e50e,2024-06-04T19:20:45.100000 -CVE-2024-4655,1,1,7c22b4975dcb72ee29c4354ed269f18f346339341d5519ac7b971db8a2facbd4,2024-07-11T06:15:02.750000 +CVE-2024-4655,0,0,7c22b4975dcb72ee29c4354ed269f18f346339341d5519ac7b971db8a2facbd4,2024-07-11T06:15:02.750000 CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d332548405180,2024-05-15T16:40:19.330000 CVE-2024-4661,0,0,e86145aa3dfc1a1e846a3970af65d72463f2a51aba17ea6b9d5a34de37b2fc53,2024-06-10T02:52:08.267000 CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000 @@ -255850,7 +255852,7 @@ CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c7 CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000 CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de6328191e,2024-06-07T14:56:05.647000 CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000 -CVE-2024-5257,1,1,f184a802f391b16bcb38e650e37ea03f95116520e3ec1051aeb9e53f39cbbce0,2024-07-11T07:15:04.257000 +CVE-2024-5257,0,0,f184a802f391b16bcb38e650e37ea03f95116520e3ec1051aeb9e53f39cbbce0,2024-07-11T07:15:04.257000 CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000 CVE-2024-5259,0,0,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 @@ -256003,7 +256005,7 @@ CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2 CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 CVE-2024-5441,0,0,a7bb50aeb84e17ae0f6968b8ffc04aee2cb8a84b24c26594cbc0250db6319333,2024-07-09T18:19:14.047000 CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000 -CVE-2024-5444,1,1,d3f63c772b302041890933ebf637b6c3e30604947c104a9329885c757ae2ab68,2024-07-11T06:15:02.830000 +CVE-2024-5444,0,0,d3f63c772b302041890933ebf637b6c3e30604947c104a9329885c757ae2ab68,2024-07-11T06:15:02.830000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 @@ -256021,7 +256023,7 @@ CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339b CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000 -CVE-2024-5470,1,1,8510346b5fe53365cd1305101c4d92af57bc0cb15622a6b25d6e261bfd9b16c6,2024-07-11T07:15:04.833000 +CVE-2024-5470,0,0,8510346b5fe53365cd1305101c4d92af57bc0cb15622a6b25d6e261bfd9b16c6,2024-07-11T07:15:04.833000 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 @@ -256156,6 +256158,9 @@ CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 CVE-2024-5676,0,0,7110ec4f1d7a030c3f52d0d64b45a1f2c788bd0c12290f7487a0ece147b33240,2024-06-24T05:15:09.600000 CVE-2024-5677,0,0,048a9d3e6f244fe163aa7534ab2dad91831ede34eb1e44dfdf068946bc641680,2024-07-10T02:15:03.570000 +CVE-2024-5679,1,1,6b8e5c2a8649a4bf5f9b28b23b36e532b02eeb8b5f9ad1a61ed718dfa53d7fe3,2024-07-11T09:15:03.523000 +CVE-2024-5680,1,1,62b934ae3fb2beb15b3130324450d9ef12e29fe8a397f66fd06c63c85ec3e0e5,2024-07-11T09:15:03.923000 +CVE-2024-5681,1,1,1d87695789e8cea7f7b3e20a847e1a5786be6b5214dfc5bdcc396d2784b592ef,2024-07-11T09:15:04.360000 CVE-2024-5683,0,0,416fdce68077ec4a3eabb7881f93e8b3f956fda57e2d7ec858b12f0a2abb9f15,2024-06-24T12:57:36.513000 CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000 @@ -256363,8 +256368,8 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32 CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000 CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000 CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000 -CVE-2024-6025,1,1,3cb4fdfae5b0aa1d267caa2e5bddcf600f375514eb7204901b48fefb734a78ff,2024-07-11T06:15:02.913000 -CVE-2024-6026,1,1,90fca20fa5bac3e58c918bd2a413ee2ae1ff5f560bb9a73637fcd29b45021c5a,2024-07-11T06:15:02.987000 +CVE-2024-6025,0,0,3cb4fdfae5b0aa1d267caa2e5bddcf600f375514eb7204901b48fefb734a78ff,2024-07-11T06:15:02.913000 +CVE-2024-6026,0,0,90fca20fa5bac3e58c918bd2a413ee2ae1ff5f560bb9a73637fcd29b45021c5a,2024-07-11T06:15:02.987000 CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a53cebc0801a7944b049693d6e4ba090f6ff8943c9a085ad6c29614624cd6988,2024-06-25T12:24:17.873000 CVE-2024-6036,0,0,9c40c5bcd05d9b6168425666513e1b805aecf8096340a0971d6e55598f8c851b,2024-07-10T23:15:14.227000 @@ -256430,7 +256435,7 @@ CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000 -CVE-2024-6138,1,1,d5ee41fe3da4fa8e774a2e1dec8a0b8fc868fdcc94e3d869edd9f1ec7055ea85,2024-07-11T06:15:03.083000 +CVE-2024-6138,0,0,d5ee41fe3da4fa8e774a2e1dec8a0b8fc868fdcc94e3d869edd9f1ec7055ea85,2024-07-11T06:15:03.083000 CVE-2024-6139,0,0,5267393f199f3e6d04675c179e30c182dfe9af96089cf21d4ca0eef7a0895473,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,23f480e47c156f1dad9ad13e0d7590969d38d5491fbe00b3021017412ace7767,2024-06-20T12:44:01.637000 CVE-2024-6143,0,0,8ecb1606cf08b70c452136729986c382308670f8f5aa74c9caba844228d971e4,2024-06-20T12:44:01.637000 @@ -256501,7 +256506,7 @@ CVE-2024-6250,0,0,d65ae5fe4d151231819cfece0198aae82e2009a318154594bfd2da65c5baac CVE-2024-6251,0,0,76d6a56e1b2f86f9d8f71f51691147da73df155a07e8f8a63cfd8ad441487e4d,2024-06-24T12:57:36.513000 CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debccf,2024-06-26T19:15:14.383000 CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 -CVE-2024-6256,1,1,bbaa06c1b28f4fccfd39612ae1acc78f3c70149ef436bb25f2e91d150b691037,2024-07-11T07:15:05.430000 +CVE-2024-6256,0,0,bbaa06c1b28f4fccfd39612ae1acc78f3c70149ef436bb25f2e91d150b691037,2024-07-11T07:15:05.430000 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000 @@ -256576,7 +256581,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 -CVE-2024-6385,1,1,9d1fc2ae101a45caef95b756b0870f3949aab2c962ee2724ef0d0237bc0aa4f2,2024-07-11T07:15:06.123000 +CVE-2024-6385,0,0,9d1fc2ae101a45caef95b756b0870f3949aab2c962ee2724ef0d0237bc0aa4f2,2024-07-11T07:15:06.123000 CVE-2024-6387,0,0,5d65fd70c1d8c6b7a5aed89dcca753d45414c4dce967dc5a869d91f9a08e890f,2024-07-11T04:15:05.403000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000 @@ -256627,6 +256632,7 @@ CVE-2024-6524,0,0,a7a803cd0c4b163adf24a214658dd36dbf3d93b3905b2171e3d08048b915cb CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b927,2024-07-08T15:30:11.133000 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000 +CVE-2024-6528,1,1,eb3917ab4af2a4d64c6c126ac428a6693e543eb861d6e7dd91f2961dfda45f60,2024-07-11T09:15:04.867000 CVE-2024-6539,0,0,af7a9107d7b462a59e1314d81ee0ea249c00edb3c899ac73079834fee3e5a982,2024-07-08T15:49:22.437000 CVE-2024-6550,0,0,5d1ac2302fccc411850552add6961beebffbcf8502b1c5101339eaaf0570c4d7,2024-07-10T04:15:04.290000 CVE-2024-6554,0,0,da04ed49e1032c5eeb38aec508c64e0eb4fcf081b7573a33fd1beb1760a9131f,2024-07-11T04:15:06.387000 @@ -256651,7 +256657,7 @@ CVE-2024-6612,0,0,8ea660f335d1e8552a64db073fe7466306fd1f2e5cc9fbb77910ed6aa806d5 CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c0a,2024-07-09T18:18:38.713000 CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000 CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000 -CVE-2024-6624,1,1,510e53e90f3f7c6bba8084aafc0f2d567850c84f7ef8b1f74bad787bb3e04592,2024-07-11T07:15:06.697000 +CVE-2024-6624,0,0,510e53e90f3f7c6bba8084aafc0f2d567850c84f7ef8b1f74bad787bb3e04592,2024-07-11T07:15:06.697000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000 CVE-2024-6644,0,0,4ac0927b6bee710b6d7aa47a319df161deab572b53510067cbeff9a5913bdd4c,2024-07-10T17:15:12.980000 @@ -256664,5 +256670,5 @@ CVE-2024-6652,0,0,bb195bcf49fd2fd72b66d8f572cddf80628a2817e7552a8b1e09e5044328f1 CVE-2024-6653,0,0,7705d8b07a5385d3e6216c0be5a58a100c471b6ce2659cc97a5d58ac8c43ef88,2024-07-11T00:15:02.313000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 -CVE-2024-6666,1,1,522e6ea36fc61bccbb6d2808e0f6092f1710e3a5131df329df9a6f3f5bada627,2024-07-11T07:15:07.233000 +CVE-2024-6666,0,1,5640f874a4a123b5e84bcf8b9571deb9dc23e2d175e1f970315a0fe386bca6a0,2024-07-11T07:15:07.233000 CVE-2024-6676,0,0,e0e595eb4b676327f8f19a66094c02e3519fd63fe68c5d0fb376bddbcdc89b0e,2024-07-11T03:15:03.787000