From adfcaf033cdb990b329cea9eddc7bb8b6ead0596 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 12 Jul 2024 10:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-07-12T10:00:18.938941+00:00 --- CVE-2024/CVE-2024-313xx/CVE-2024-31365.json | 9 ++- CVE-2024/CVE-2024-320xx/CVE-2024-32085.json | 5 +- CVE-2024/CVE-2024-53xx/CVE-2024-5334.json | 9 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5547.json | 9 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5548.json | 9 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5549.json | 4 +- CVE-2024/CVE-2024-57xx/CVE-2024-5712.json | 4 +- CVE-2024/CVE-2024-58xx/CVE-2024-5820.json | 9 ++- CVE-2024/CVE-2024-58xx/CVE-2024-5821.json | 4 +- CVE-2024/CVE-2024-58xx/CVE-2024-5887.json | 4 +- CVE-2024/CVE-2024-59xx/CVE-2024-5926.json | 4 +- CVE-2024/CVE-2024-63xx/CVE-2024-6353.json | 56 ++++++++++++++++++ CVE-2024/CVE-2024-63xx/CVE-2024-6396.json | 8 ++- CVE-2024/CVE-2024-64xx/CVE-2024-6433.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6625.json | 64 +++++++++++++++++++++ README.md | 38 ++++++------ _state.csv | 54 ++++++++--------- 17 files changed, 224 insertions(+), 70 deletions(-) create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6353.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6625.json diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json index 63483858ffe..b87c17fe72b 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json @@ -2,12 +2,17 @@ "id": "CVE-2024-31365", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T08:15:07.827", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-07-12T08:15:10.953", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Post Type Builder (PTB) allows Reflected XSS.This issue affects Post Type Builder (PTB): from n/a through 2.0.8.\n\n" + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Post Type Builder (PTB) allows Reflected XSS.This issue affects Post Type Builder (PTB): from n/a before 2.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Themify Post Type Builder (PTB) permite el XSS reflejado. Este problema afecta al Post Type Builder (PTB): desde n/a antes de 2.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32085.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32085.json index 5094359f5ac..4b2a104436a 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32085.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32085.json @@ -2,12 +2,13 @@ "id": "CVE-2024-32085", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-15T09:15:08.660", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-12T09:15:02.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in AitThemes Citadela Listing.This issue affects Citadela Listing: from n/a through 5.18.1.\n\n" + "value": "Cross-Site Request Forgery (CSRF) vulnerability in AitThemes Citadela Listing.This issue affects Citadela Listing: from n/a before 5.20.0." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5334.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5334.json index 85e6346a594..e61c6782e93 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5334.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5334.json @@ -2,12 +2,17 @@ "id": "CVE-2024-5334", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T18:15:20.223", - "lastModified": "2024-06-27T19:25:12.067", + "lastModified": "2024-07-12T08:15:11.130", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "External Control of File Name or Path in GitHub repository stitionai/devika prior to -." + "value": "A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server." + }, + { + "lang": "es", + "value": "Control externo del nombre o ruta del archivo en el repositorio de GitHub stitionai/devika antes de -." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5547.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5547.json index 84f9cad68a8..c60e154cd3e 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5547.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5547.json @@ -2,12 +2,17 @@ "id": "CVE-2024-5547", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T18:15:20.493", - "lastModified": "2024-06-27T19:25:12.067", + "lastModified": "2024-07-12T08:15:11.230", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Relative Path Traversal in GitHub repository stitionai/devika prior to -." + "value": "A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory." + }, + { + "lang": "es", + "value": "Path traversal relativo en el repositorio de GitHub stitionai/devika antes de -." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5548.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5548.json index f44b132695a..4f62a2a2dd5 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5548.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5548.json @@ -2,12 +2,17 @@ "id": "CVE-2024-5548", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T18:15:20.733", - "lastModified": "2024-06-27T19:25:12.067", + "lastModified": "2024-07-12T08:15:11.313", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Path Traversal in GitHub repository stitionai/devika prior to -." + "value": "A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server." + }, + { + "lang": "es", + "value": "Path Traversal en el repositorio de GitHub stitionai/devika antes de -." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json index 96da5b6d5c4..2839198901e 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5549.json @@ -2,13 +2,13 @@ "id": "CVE-2024-5549", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-09T00:15:02.050", - "lastModified": "2024-07-09T18:19:14.047", + "lastModified": "2024-07-12T08:15:11.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Origin Validation Error in GitHub repository stitionai/devika prior to -." + "value": "A CORS misconfiguration in the stitionai/devika repository allows attackers to steal sensitive information such as logs, browser sessions, and settings containing private API keys from other services. This vulnerability also enables attackers to perform actions on behalf of the user, such as deleting projects or sending messages. The issue arises from the lack of proper origin validation, allowing unauthorized cross-origin requests to be executed. The vulnerability is present in all versions of the repository, as no fixed version has been specified." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5712.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5712.json index 7a26714b1d7..6fc9c42aa89 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5712.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5712.json @@ -2,13 +2,13 @@ "id": "CVE-2024-5712", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-28T20:15:02.937", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-12T08:15:11.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) in stitionai/devika" + "value": "A Cross-Site Request Forgery (CSRF) vulnerability was identified in the stitionai/devika application, affecting the latest version. This vulnerability allows attackers to perform unauthorized actions in the context of a victim's browser, such as deleting projects or changing application settings, without any CSRF protection implemented. Successful exploitation disrupts the integrity and availability of the application and its data." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5820.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5820.json index 334bcda16be..91ce6faefc7 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5820.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5820.json @@ -2,12 +2,17 @@ "id": "CVE-2024-5820", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:16.640", - "lastModified": "2024-06-27T19:25:12.067", + "lastModified": "2024-07-12T08:15:11.560", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Authorization in stitionai/devika" + "value": "An unprotected WebSocket connection in the latest version of stitionai/devika (commit ecee79f) allows a malicious website to connect to the backend and issue commands on behalf of the user. The backend serves all listeners on the given socket, enabling any such malicious website to intercept all communication between the user and the backend. This vulnerability can lead to unauthorized command execution and potential server-side request forgery." + }, + { + "lang": "es", + "value": "Autorizaci\u00f3n faltante en stitionai/devika" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5821.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5821.json index 1696dfef641..e9048a45327 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5821.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5821.json @@ -2,13 +2,13 @@ "id": "CVE-2024-5821", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-03T18:15:05.857", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-12T08:15:11.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Access Control in stitionai/devika" + "value": "The vulnerability allows an attacker to access sensitive files on the server by confusing the agent with incorrect file names. When a user requests the content of a file with a misspelled name, the agent attempts to correct the command and inadvertently reveals the content of the intended file, such as /etc/passwd. This can lead to unauthorized access to sensitive information and potential server compromise." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5887.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5887.json index a2997b546cd..8c858efe233 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5887.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5887.json @@ -2,13 +2,13 @@ "id": "CVE-2024-5887", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-03T18:15:06.113", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-12T08:15:11.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) in stitionai/devika" + "value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in stitionai/devika due to a loosely set CORS policy. This vulnerability allows an attacker to exploit any API endpoint if the user hosting the server visits an attacker-controlled website. The impact includes the ability to read and write files on the system, create or delete projects, and change settings. However, it does not allow sending messages or commands to the model via WebSocket." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5926.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5926.json index c1702e31af6..34b92186adc 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5926.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5926.json @@ -2,13 +2,13 @@ "id": "CVE-2024-5926", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-30T01:15:09.707", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-07-12T08:15:11.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Path Traversal: '\\..\\filename' in GitHub repository stitionai/devika prior to -." + "value": "A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6353.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6353.json new file mode 100644 index 00000000000..3be24f7fc1d --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6353.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6353", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-12T09:15:02.683", + "lastModified": "2024-07-12T09:15:02.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Wallet for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'search[value]' parameter in all versions up to, and including, 1.5.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woo-wallet/trunk/includes/class-woo-wallet-ajax.php#L393", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3116025/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/woo-wallet/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7d5a077-8836-4c28-8884-5047585a99e5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6396.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6396.json index eb847924e11..095f65c4ec8 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6396.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6396.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6396", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-12T00:15:01.647", - "lastModified": "2024-07-12T00:15:01.647", + "lastModified": "2024-07-12T08:15:11.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Path Traversal: '\\..\\filename' in aimhubio/aim" + "value": "A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution. " + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n `_backup_run` en aimhubio/aim versi\u00f3n 3.19.3 permite a atacantes remotos sobrescribir cualquier archivo en el servidor host y filtrar datos arbitrarios. La vulnerabilidad surge debido al manejo inadecuado de los par\u00e1metros `run_hash` y `repo.path`, que pueden manipularse para crear y escribir en rutas de archivos arbitrarias. Esto puede provocar una denegaci\u00f3n de servicio al sobrescribir archivos cr\u00edticos del sistema, p\u00e9rdida de datos privados y posible ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json index 7209a4fde72..20ea937ec2b 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json @@ -2,13 +2,13 @@ "id": "CVE-2024-6433", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-10T01:15:10.370", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-07-12T08:15:11.963", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Relative Path Traversal in GitHub repository stitionai/devika prior to -." + "value": "The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6625.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6625.json new file mode 100644 index 00000000000..9547286b5d3 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6625.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-6625", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-12T08:15:12.047", + "lastModified": "2024-07-12T08:15:12.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP Total Branding \u2013 Complete branding solution for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento WP Total Branding \u2013 Complete branding solution para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 1.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-total-branding/trunk/includes/modules/login.php#L87", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3115880/wp-total-branding/trunk/includes/modules/login.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3115880/wp-total-branding/trunk/includes/options/login.php", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/wp-total-branding/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3b6ac92f-2ad1-4528-b157-5e49d6f224a5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 428540a8ffd..16e7c0690d6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-12T08:00:17.869465+00:00 +2024-07-12T10:00:18.938941+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-12T07:15:02.387000+00:00 +2024-07-12T09:15:02.683000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256740 +256742 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `2` -- [CVE-2024-0974](CVE-2024/CVE-2024-09xx/CVE-2024-0974.json) (`2024-07-12T06:15:01.977`) -- [CVE-2024-2430](CVE-2024/CVE-2024-24xx/CVE-2024-2430.json) (`2024-07-12T06:15:03.173`) -- [CVE-2024-2640](CVE-2024/CVE-2024-26xx/CVE-2024-2640.json) (`2024-07-12T06:15:03.433`) -- [CVE-2024-2696](CVE-2024/CVE-2024-26xx/CVE-2024-2696.json) (`2024-07-12T06:15:03.680`) -- [CVE-2024-3112](CVE-2024/CVE-2024-31xx/CVE-2024-3112.json) (`2024-07-12T06:15:03.937`) -- [CVE-2024-4753](CVE-2024/CVE-2024-47xx/CVE-2024-4753.json) (`2024-07-12T06:15:04.190`) -- [CVE-2024-5626](CVE-2024/CVE-2024-56xx/CVE-2024-5626.json) (`2024-07-12T06:15:04.420`) -- [CVE-2024-5811](CVE-2024/CVE-2024-58xx/CVE-2024-5811.json) (`2024-07-12T06:15:04.670`) -- [CVE-2024-6022](CVE-2024/CVE-2024-60xx/CVE-2024-6022.json) (`2024-07-12T06:15:04.893`) -- [CVE-2024-6023](CVE-2024/CVE-2024-60xx/CVE-2024-6023.json) (`2024-07-12T06:15:05.130`) -- [CVE-2024-6024](CVE-2024/CVE-2024-60xx/CVE-2024-6024.json) (`2024-07-12T06:15:05.340`) -- [CVE-2024-6555](CVE-2024/CVE-2024-65xx/CVE-2024-6555.json) (`2024-07-12T06:15:05.560`) -- [CVE-2024-6588](CVE-2024/CVE-2024-65xx/CVE-2024-6588.json) (`2024-07-12T07:15:02.387`) +- [CVE-2024-6353](CVE-2024/CVE-2024-63xx/CVE-2024-6353.json) (`2024-07-12T09:15:02.683`) +- [CVE-2024-6625](CVE-2024/CVE-2024-66xx/CVE-2024-6625.json) (`2024-07-12T08:15:12.047`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `13` +- [CVE-2024-31365](CVE-2024/CVE-2024-313xx/CVE-2024-31365.json) (`2024-07-12T08:15:10.953`) +- [CVE-2024-32085](CVE-2024/CVE-2024-320xx/CVE-2024-32085.json) (`2024-07-12T09:15:02.230`) +- [CVE-2024-5334](CVE-2024/CVE-2024-53xx/CVE-2024-5334.json) (`2024-07-12T08:15:11.130`) +- [CVE-2024-5547](CVE-2024/CVE-2024-55xx/CVE-2024-5547.json) (`2024-07-12T08:15:11.230`) +- [CVE-2024-5548](CVE-2024/CVE-2024-55xx/CVE-2024-5548.json) (`2024-07-12T08:15:11.313`) +- [CVE-2024-5549](CVE-2024/CVE-2024-55xx/CVE-2024-5549.json) (`2024-07-12T08:15:11.390`) +- [CVE-2024-5712](CVE-2024/CVE-2024-57xx/CVE-2024-5712.json) (`2024-07-12T08:15:11.477`) +- [CVE-2024-5820](CVE-2024/CVE-2024-58xx/CVE-2024-5820.json) (`2024-07-12T08:15:11.560`) +- [CVE-2024-5821](CVE-2024/CVE-2024-58xx/CVE-2024-5821.json) (`2024-07-12T08:15:11.640`) +- [CVE-2024-5887](CVE-2024/CVE-2024-58xx/CVE-2024-5887.json) (`2024-07-12T08:15:11.723`) +- [CVE-2024-5926](CVE-2024/CVE-2024-59xx/CVE-2024-5926.json) (`2024-07-12T08:15:11.797`) +- [CVE-2024-6396](CVE-2024/CVE-2024-63xx/CVE-2024-6396.json) (`2024-07-12T08:15:11.883`) +- [CVE-2024-6433](CVE-2024/CVE-2024-64xx/CVE-2024-6433.json) (`2024-07-12T08:15:11.963`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ea593b51bf2..7e1b9c4d712 100644 --- a/_state.csv +++ b/_state.csv @@ -241531,7 +241531,7 @@ CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c39355 CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000 CVE-2024-0972,0,0,2a8d3a85f6223a6c38540c13150a8805bcc289466ff43a37dc35cbb6bde1ee58,2024-06-06T14:17:35.017000 CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000 -CVE-2024-0974,1,1,35743e316fbd5bd2047d79c5dd66d90f0f92d67f3c6b8a448670c8ab72da0761,2024-07-12T06:15:01.977000 +CVE-2024-0974,0,0,35743e316fbd5bd2047d79c5dd66d90f0f92d67f3c6b8a448670c8ab72da0761,2024-07-12T06:15:01.977000 CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000 CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000 CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000 @@ -245159,7 +245159,7 @@ CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f84 CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000 CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000 CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 -CVE-2024-2430,1,1,fc140285546718ea235d58e87be2326789dd8854d5c2f3b2bf18d7536424e887,2024-07-12T06:15:03.173000 +CVE-2024-2430,0,0,fc140285546718ea235d58e87be2326789dd8854d5c2f3b2bf18d7536424e887,2024-07-12T06:15:03.173000 CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000 CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 @@ -246551,7 +246551,7 @@ CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ec CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46 CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000 CVE-2024-2639,0,0,0a379ca73fbb79fdbd8f18fc8cd7d5818278eb25b07ecfab9db46031f52aaa19,2024-05-17T02:38:22.540000 -CVE-2024-2640,1,1,2622fb8ff167d44ed8ee16f4e8f1e686049bb2e924ac61ba7bfed6799057625c,2024-07-12T06:15:03.433000 +CVE-2024-2640,0,0,2622fb8ff167d44ed8ee16f4e8f1e686049bb2e924ac61ba7bfed6799057625c,2024-07-12T06:15:03.433000 CVE-2024-2641,0,0,f8817d39db046b0703540421bdc7defa8773388c970d95d9af56a10acaf6505b,2024-05-17T02:38:22.647000 CVE-2024-2642,0,0,8e9139118e526637636dbb75ee7b325451ccf936f521c86702bbdd8ba223ba4d,2024-05-17T02:38:22.743000 CVE-2024-2644,0,0,10576652d4b00db27dae15790aec2d4421a3f554442aef5d73285e025d9ff0d8,2024-06-05T20:15:12.680000 @@ -247026,7 +247026,7 @@ CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2 CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000 CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000 CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000 -CVE-2024-2696,1,1,7b7f0b87184f2d4d17f2ef9027db945f0b670024e9fd284f14c6faff181b461f,2024-07-12T06:15:03.680000 +CVE-2024-2696,0,0,7b7f0b87184f2d4d17f2ef9027db945f0b670024e9fd284f14c6faff181b461f,2024-07-12T06:15:03.680000 CVE-2024-26960,0,0,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000 CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000 CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000 @@ -249855,7 +249855,7 @@ CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97 CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000 CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000 CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000 -CVE-2024-3112,1,1,c5dd46570e82e042ad28a609d645b3bd6689c18b631599ab974c1831a690774a,2024-07-12T06:15:03.937000 +CVE-2024-3112,0,0,c5dd46570e82e042ad28a609d645b3bd6689c18b631599ab974c1831a690774a,2024-07-12T06:15:03.937000 CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000 CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d849,2024-04-01T01:12:59.077000 CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000 @@ -250044,7 +250044,7 @@ CVE-2024-31361,0,0,54b7a8e25813717c94d5927287f93d481a46dd500982f29ec2be0642b1f9b CVE-2024-31362,0,0,07dbc6b7d174a62013a95c6495d145f304872e44cb127cd0a441c5aaa770bb42,2024-04-15T13:15:51.577000 CVE-2024-31363,0,0,84f67f9d25afff088706430a57f4c1645b6f378ea1b4650ec35620c6a3badb06,2024-04-15T13:15:51.577000 CVE-2024-31364,0,0,bf928c6c40c2bd1cc4f1c5de0db847b3c5ba04166008fbe2ac06499669595b46,2024-04-15T13:15:51.577000 -CVE-2024-31365,0,0,c940557b1d8090d7c4b40b91442276e3021286d8a5d5418b8ff9252921cde6e4,2024-04-09T12:48:04.090000 +CVE-2024-31365,0,1,fac5d7858ae00c4198bda4d0db7d42b586225a93755fdca53b6e65ea3f2d2851,2024-07-12T08:15:10.953000 CVE-2024-31366,0,0,75b2b689edca4c4fe2cdb7df1b8ed82e64c11b89b9b73cbce127601f1ecfacae,2024-04-09T12:48:04.090000 CVE-2024-31367,0,0,81120db09e405ceec023426aa5eb20efd22769d9230dda89ff3bacac48f33f54,2024-04-09T12:48:04.090000 CVE-2024-31368,0,0,2075bbe380281b0997c3990fa2ac90c9c87c399d3ddf4c8c8d5afff7621d8b06,2024-04-09T12:48:04.090000 @@ -250480,7 +250480,7 @@ CVE-2024-32081,0,0,5c1d2b416607e839837a003b1073b14df77cdee76eb662d1e3aec29aeff65 CVE-2024-32082,0,0,d6793a42d63a5b66bd996e80396a9a30335e882106f6c04be804aa2a3936f3a5,2024-04-15T13:15:31.997000 CVE-2024-32083,0,0,e66e40e26022a1e0763bc878bbdc8feaffe474b54f57196f3136bd80c107b035,2024-04-11T13:30:38 CVE-2024-32084,0,0,471e7516d00607c85169133c360fc6ced518260327467ed3a794c748685f3d51,2024-04-15T13:15:31.997000 -CVE-2024-32085,0,0,9b4c9e2fb6bc96927eeec1394a8719561dbdd50c9f33542ee0c236e3cd61ec82,2024-04-15T13:15:31.997000 +CVE-2024-32085,0,1,73c6be311b91a482f29881ac0f952d204dc1a0d26fc4830e619cfbaf0fe226ac,2024-07-12T09:15:02.230000 CVE-2024-32086,0,0,8916745d7b15967ced55d4927ce29b30f197f97b3a39836b39c4ceffcdf58e4d,2024-04-17T12:48:31.863000 CVE-2024-32087,0,0,5b82ea46214428d965f4505ef14a371ca536fde7796b874f715623ff0a1f16c9,2024-04-15T13:15:31.997000 CVE-2024-32088,0,0,d54b0f9aa73f1da84983b35b9f2f514565a119c386370ddf079df19f0dad4167,2024-04-15T13:15:31.997000 @@ -255498,7 +255498,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000 CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000 CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000 -CVE-2024-4753,1,1,b3ef2309929abf5d543ed5b4df009173219fa7d0e9c13da237f0413ef81c648e,2024-07-12T06:15:04.190000 +CVE-2024-4753,0,0,b3ef2309929abf5d543ed5b4df009173219fa7d0e9c13da237f0413ef81c648e,2024-07-12T06:15:04.190000 CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000 @@ -255954,7 +255954,7 @@ CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c689876 CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000 CVE-2024-5329,0,0,d0611aba519e3b4dd99e1f039e6e2f0eb2cd7ab02594b1f6812432d5e7c027f4,2024-06-11T17:42:26.677000 CVE-2024-5332,0,0,38119dd9a5428b9df2c1e792798f9c7c98836decd72ef41908a87c0a23701c2a,2024-06-26T12:44:29.693000 -CVE-2024-5334,0,0,72943680f9bf237867afcd67b3106198c40d9560ff77959e19319ef9068be817,2024-06-27T19:25:12.067000 +CVE-2024-5334,0,1,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000 CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000 CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000 @@ -256125,9 +256125,9 @@ CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e6190 CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000 CVE-2024-5544,0,0,dc180b504fcb3a2003d6a08111fbd0a7a95f9d21df8e253c1af1716f464343f6,2024-07-05T14:46:56.023000 CVE-2024-5545,0,0,9270f54f7803e859f3c51cd9a03c613d31e2403f79820ead3f02bc3b56a4bf36,2024-07-05T15:12:08.467000 -CVE-2024-5547,0,0,10fc933ab96f74e48222460cfee3e0b1d295bbaa26e68f34704c5127d22daf4a,2024-06-27T19:25:12.067000 -CVE-2024-5548,0,0,0dab8d0a6f7f4b5d3115df8861f1ab0c0c70d1308be14527ce7ee2ffa61fade4,2024-06-27T19:25:12.067000 -CVE-2024-5549,0,0,8a417ee66a71abc76bfae5acb49d7feca85c7d8e54f3f159a82d5e97cedb3814,2024-07-09T18:19:14.047000 +CVE-2024-5547,0,1,30803f020db51b7398a94ab478cc6cb1ea70aecfbbe13ac1b895b9f9fa592338,2024-07-12T08:15:11.230000 +CVE-2024-5548,0,1,6a07d64078300a9d20971a8757a67f3f4682659414ef6d1de11cb6b5c54c02e2,2024-07-12T08:15:11.313000 +CVE-2024-5549,0,1,2db2267d047672e6871a7836da6ae7aa97f316bb2880c93f204c63f2960062f6,2024-07-12T08:15:11.390000 CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000 CVE-2024-5551,0,0,fe2ff56c261c11c34cfc92fd4dff768d263978728e8caa50b89ded66a68c1f4c,2024-06-17T12:42:04.623000 CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000 @@ -256165,7 +256165,7 @@ CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d367 CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144fd,2024-06-10T02:52:08.267000 CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000 CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 -CVE-2024-5626,1,1,7e133737f43d053f813abe59bccc601d2b37ed3a35e15bd1e9dc8033caf1b17c,2024-07-12T06:15:04.420000 +CVE-2024-5626,0,0,7e133737f43d053f813abe59bccc601d2b37ed3a35e15bd1e9dc8033caf1b17c,2024-07-12T06:15:04.420000 CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000 CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000 CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000 @@ -256232,7 +256232,7 @@ CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000 -CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 +CVE-2024-5712,0,1,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 @@ -256291,12 +256291,12 @@ CVE-2024-5802,0,0,d43f6c3699f8442d9285759c2e90cb7a4ef138460339054d721f73295a23e6 CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000 CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000 CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000 -CVE-2024-5811,1,1,6841d5b00cca51dfa8f2f54b5ce765a92098964f97404baa5af0c21cdaef38e0,2024-07-12T06:15:04.670000 +CVE-2024-5811,0,0,6841d5b00cca51dfa8f2f54b5ce765a92098964f97404baa5af0c21cdaef38e0,2024-07-12T06:15:04.670000 CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000 CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000 -CVE-2024-5820,0,0,40e5523c17b003adbda0efbab055fe88c8ffe6387f321010b47ba3ba7dc113ac,2024-06-27T19:25:12.067000 -CVE-2024-5821,0,0,ac8597dfd124c68baa20d2ec3fba9ddeb4b2feac6ed4b72f128b801d51b635ec,2024-07-05T12:55:51.367000 +CVE-2024-5820,0,1,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000 +CVE-2024-5821,0,1,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000 CVE-2024-5822,0,0,56a6bfde1d559870c5646a0b76a29e939be7faac2a950947fe32abc1f4907e47,2024-06-27T19:25:12.067000 CVE-2024-5824,0,0,71b3b99a3563d3bd6941378b1fc516ea3658f7355f6e899285275a2e97c693cb,2024-06-27T19:25:12.067000 CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000 @@ -256339,7 +256339,7 @@ CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000 CVE-2024-5885,0,0,3a664b64c018213b23c270dac1c0f4e2c55b9d60dc4c41c7b81af3f039474644,2024-06-27T19:25:12.067000 CVE-2024-5886,0,0,0c13c4ee009af0d9946120b2238809bd0a7459b4e90701a2a72b91121b1d711b,2024-06-20T11:15:56.580000 -CVE-2024-5887,0,0,d25778d63809ce83c5015ef22b9910bd8e243f7933286be4466b9eb7c41e1b1a,2024-07-05T12:55:51.367000 +CVE-2024-5887,0,1,b04b5c7b4b15d64c5cf22488efaad36a00c28f1156ac18ebf5f7780ec4f915ae,2024-07-12T08:15:11.723000 CVE-2024-5889,0,0,ebd4b75d771d00f2396bbc91f1ca197e49e2f67600230e37c6f00ba36324b089,2024-07-01T12:37:24.220000 CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000 CVE-2024-5892,0,0,890747e3858b777381fac245c58cda030faeadae1530ec4012d9670fde261a4e,2024-06-13T18:36:09.013000 @@ -256362,7 +256362,7 @@ CVE-2024-5913,0,0,e09fa300f42c3066d0a6d6e758e3f3cfea839eecb0d836963ee331dd9715d6 CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000 -CVE-2024-5926,0,0,5989118d1e74694dc8d29d11155e46063f80693ec0514642081f5dd4d07f562d,2024-07-01T12:37:24.220000 +CVE-2024-5926,0,1,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000 CVE-2024-5933,0,0,43c62c8c7b78a3986e6c8a8e384c2c83973a07919e7ff71c58e74be82b63ae22,2024-06-27T19:25:12.067000 CVE-2024-5934,0,0,688a30e1a6237b69634d3ab7eb078a5b0fdbb09f93730eb6244fa568165f0ccc,2024-06-14T16:15:14.647000 @@ -256417,9 +256417,9 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32 CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000 CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000 CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000 -CVE-2024-6022,1,1,04717dc72e4f900d230391c94514f514539e2d6f03457c1e6e01c07b085e71d5,2024-07-12T06:15:04.893000 -CVE-2024-6023,1,1,f5555e51bcd69fa72d32d9adab18d78136da09acba35a1ff3db6a47b83f92f36,2024-07-12T06:15:05.130000 -CVE-2024-6024,1,1,2ffd72208cdfb4095e9eec145debe41add807f1416cbe1e1b74657cdf6309221,2024-07-12T06:15:05.340000 +CVE-2024-6022,0,0,04717dc72e4f900d230391c94514f514539e2d6f03457c1e6e01c07b085e71d5,2024-07-12T06:15:04.893000 +CVE-2024-6023,0,0,f5555e51bcd69fa72d32d9adab18d78136da09acba35a1ff3db6a47b83f92f36,2024-07-12T06:15:05.130000 +CVE-2024-6024,0,0,2ffd72208cdfb4095e9eec145debe41add807f1416cbe1e1b74657cdf6309221,2024-07-12T06:15:05.340000 CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000 CVE-2024-6026,0,0,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33 CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000 @@ -256617,6 +256617,7 @@ CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec1 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 +CVE-2024-6353,1,1,60e79ca6935a5dd12c748c7b34b6e74fc753b07368fbd692e1846394a1a48906,2024-07-12T09:15:02.683000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000 CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000 @@ -256639,7 +256640,7 @@ CVE-2024-6387,0,0,395c005beff8f885469a6af0c5f20c1084f41c03d3787849b420e64606fd49 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000 CVE-2024-6392,0,0,ec793e6c9b92035de93057d702bc41bb77320cffcbb7442912aa4b55a0ccd130,2024-07-11T22:15:02.820000 -CVE-2024-6396,0,0,674c607bebda9722a2774953690d6eda0ed7e5c526dfeff4113246dca8f86bf7,2024-07-12T00:15:01.647000 +CVE-2024-6396,0,1,65f0bbdb6c33407d9f43c98786e1afc26272e7ff25488d98ea8db8c2bfb7091c,2024-07-12T08:15:11.883000 CVE-2024-6397,0,0,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 @@ -256661,7 +256662,7 @@ CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc8 CVE-2024-6426,0,0,f8400a1dd26a0192767404ca5f7752c12cf287ce03e2990002fc305f7bc08efa,2024-07-05T17:10:26.683000 CVE-2024-6427,0,0,4e3c2a8d1e984293b7a508d6724a6a3f7998f367f7900ab80f87cf0d36ad12b5,2024-07-05T17:10:44.997000 CVE-2024-6428,0,0,8095b4dcd35f897b4650661c439e7e332797ada1bd3807e53dae0badb2379a85,2024-07-05T17:08:11.060000 -CVE-2024-6433,0,0,d602ab3dc41aef42850f40bee564814e8e233db523dba7834f636c439b366593,2024-07-11T13:05:54.930000 +CVE-2024-6433,0,1,4cb445c95e15de0c345d2cc06e9508b276183ca5d50834d0b48eec3d0df1757b,2024-07-12T08:15:11.963000 CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000 CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 @@ -256696,12 +256697,12 @@ CVE-2024-6531,0,0,ab53755983129ee35c1ebf76acedd24cf0a7993ae85dcf721db49ee0a8f8cc CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000 -CVE-2024-6555,1,1,34e77b0d71ab261578ec7e224b96bc260ce4cb3066ee4d5d28345bbbf1a1a387,2024-07-12T06:15:05.560000 +CVE-2024-6555,0,0,34e77b0d71ab261578ec7e224b96bc260ce4cb3066ee4d5d28345bbbf1a1a387,2024-07-12T06:15:05.560000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 -CVE-2024-6588,1,1,ca4afaea17787f5483b2819c0c113b78343a4ecedd1dcf411a61a2d3febe92bf,2024-07-12T07:15:02.387000 +CVE-2024-6588,0,0,ca4afaea17787f5483b2819c0c113b78343a4ecedd1dcf411a61a2d3febe92bf,2024-07-12T07:15:02.387000 CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000 CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000 CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000 @@ -256720,6 +256721,7 @@ CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000 CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000 CVE-2024-6624,0,0,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000 +CVE-2024-6625,1,1,52a0a73f111a61d26ef30a94bc2c3ceb26f9452f1d383413724e2976a1ad908d,2024-07-12T08:15:12.047000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000 CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000