diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json new file mode 100644 index 00000000000..f40fe4efe87 --- /dev/null +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1747.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-1747", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:01.980", + "lastModified": "2024-08-01T06:15:01.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/17e45d4d-0ee1-4863-a8a4-df8587f448ec/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json new file mode 100644 index 00000000000..838e4da2293 --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25947.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25947", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-08-01T07:15:02.140", + "lastModified": "2024-08-01T07:15:02.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json new file mode 100644 index 00000000000..d0a3b35d333 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2843.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-2843", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:02.367", + "lastModified": "2024-08-01T06:15:02.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some places, which could allow attackers to make logged in admin users delete users via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/fec4e077-4c4e-4618-bfe8-61fdba59b696/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json new file mode 100644 index 00000000000..91a62392fb9 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2872.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-2872", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:02.443", + "lastModified": "2024-08-01T06:15:02.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/15d3150c-673c-4c36-ac5e-85767d78b9eb/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json new file mode 100644 index 00000000000..4d60ad8921d --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3983.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3983", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:02.517", + "lastModified": "2024-08-01T06:15:02.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/e4059d66-07b9-4f1a-a461-d6e8f0e98eec/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json new file mode 100644 index 00000000000..42b2f7510f0 --- /dev/null +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4090.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4090", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:02.587", + "lastModified": "2024-08-01T06:15:02.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any WordPress plugin before 2.7.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/aedcb986-0f2b-4852-baf1-6cb61e83e109/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json new file mode 100644 index 00000000000..d206703e138 --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5330.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-5330", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-01T07:15:02.520", + "lastModified": "2024-08-01T07:15:02.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Breakdance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the breakdance_css_file_paths_cache parameter in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://breakdance.com/breakdance-2-0-now-available/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9dbd26f5-b75e-41a3-aefb-d6c8cc2cec7b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json new file mode 100644 index 00000000000..7ba5b0cc540 --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5331.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-5331", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-01T07:15:02.783", + "lastModified": "2024-08-01T07:15:02.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Breakdance plugin for WordPress is vulnerable to unauthorized access of data in all versions up to, and including, 1.7.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to export form submissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://breakdance.com/breakdance-2-0-now-available/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe8d453-21f0-43e2-84d3-3c520ab9c308?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json new file mode 100644 index 00000000000..7d849079847 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5678.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5678", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-08-01T07:15:03.053", + "lastModified": "2024-08-01T07:15:03.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine Applications Manager versions\u00a0170900 and below are vulnerable to the authenticated admin-only SQL Injection in the Create Monitor feature." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2024-5678.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json new file mode 100644 index 00000000000..64777f3bb18 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6496.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6496", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:02.660", + "lastModified": "2024-08-01T06:15:02.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Light Poll WordPress plugin through 1.0.0 does not have CSRF checks when deleting polls, which could allow attackers to make logged in users perform such action via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/d598eabd-a87a-4e3e-be46-a5c5cc3f130e/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json new file mode 100644 index 00000000000..076ab97f649 --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6529.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6529", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-01T06:15:02.737", + "lastModified": "2024-08-01T06:15:02.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ultimate Classified Listings WordPress plugin before 1.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json new file mode 100644 index 00000000000..056682419e3 --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-7302", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-01T07:15:03.300", + "lastModified": "2024-08-01T07:15:03.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 3gp2 file uploads in all versions up to, and including, 7.5.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the 3gp2 file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/blog2social/tags/7.5.4/includes/Ajax/Post.php#L78", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3128861/", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3128861/#file434", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/blog2social/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94afe3e2-a1f1-470b-afaf-c7926beaec9a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a263d2638e4..9428f0cbb1d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-01T06:00:17.276976+00:00 +2024-08-01T08:00:17.086040+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-01T05:15:10.573000+00:00 +2024-08-01T07:15:03.300000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258710 +258722 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `12` -- [CVE-2024-1715](CVE-2024/CVE-2024-17xx/CVE-2024-1715.json) (`2024-08-01T04:15:04.367`) -- [CVE-2024-2090](CVE-2024/CVE-2024-20xx/CVE-2024-2090.json) (`2024-08-01T05:15:09.993`) -- [CVE-2024-6698](CVE-2024/CVE-2024-66xx/CVE-2024-6698.json) (`2024-08-01T04:15:04.767`) -- [CVE-2024-7338](CVE-2024/CVE-2024-73xx/CVE-2024-7338.json) (`2024-08-01T04:15:05.017`) -- [CVE-2024-7339](CVE-2024/CVE-2024-73xx/CVE-2024-7339.json) (`2024-08-01T04:15:05.320`) -- [CVE-2024-7342](CVE-2024/CVE-2024-73xx/CVE-2024-7342.json) (`2024-08-01T05:15:10.303`) -- [CVE-2024-7343](CVE-2024/CVE-2024-73xx/CVE-2024-7343.json) (`2024-08-01T05:15:10.573`) +- [CVE-2024-1747](CVE-2024/CVE-2024-17xx/CVE-2024-1747.json) (`2024-08-01T06:15:01.980`) +- [CVE-2024-25947](CVE-2024/CVE-2024-259xx/CVE-2024-25947.json) (`2024-08-01T07:15:02.140`) +- [CVE-2024-2843](CVE-2024/CVE-2024-28xx/CVE-2024-2843.json) (`2024-08-01T06:15:02.367`) +- [CVE-2024-2872](CVE-2024/CVE-2024-28xx/CVE-2024-2872.json) (`2024-08-01T06:15:02.443`) +- [CVE-2024-3983](CVE-2024/CVE-2024-39xx/CVE-2024-3983.json) (`2024-08-01T06:15:02.517`) +- [CVE-2024-4090](CVE-2024/CVE-2024-40xx/CVE-2024-4090.json) (`2024-08-01T06:15:02.587`) +- [CVE-2024-5330](CVE-2024/CVE-2024-53xx/CVE-2024-5330.json) (`2024-08-01T07:15:02.520`) +- [CVE-2024-5331](CVE-2024/CVE-2024-53xx/CVE-2024-5331.json) (`2024-08-01T07:15:02.783`) +- [CVE-2024-5678](CVE-2024/CVE-2024-56xx/CVE-2024-5678.json) (`2024-08-01T07:15:03.053`) +- [CVE-2024-6496](CVE-2024/CVE-2024-64xx/CVE-2024-6496.json) (`2024-08-01T06:15:02.660`) +- [CVE-2024-6529](CVE-2024/CVE-2024-65xx/CVE-2024-6529.json) (`2024-08-01T06:15:02.737`) +- [CVE-2024-7302](CVE-2024/CVE-2024-73xx/CVE-2024-7302.json) (`2024-08-01T07:15:03.300`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index bc102f5eed9..5e69c917bc2 100644 --- a/_state.csv +++ b/_state.csv @@ -242404,7 +242404,7 @@ CVE-2024-1711,0,0,8da112f3097be36e5a03e0ede9f41c01ed4c7e0029ec48f53a0b02c63e79d0 CVE-2024-1712,0,0,2706cad7a11fec91f38938cc077ef2589480c703025fecbc08338dcd88a6afe0,2024-04-15T13:15:31.997000 CVE-2024-1713,0,0,e37c1d591c60ce6420c1a8f513ed83f4365b07beb0b63047a411871aff3ed555,2024-03-15T12:53:06.423000 CVE-2024-1714,0,0,89f5925d48309652312dfa6936852577b82bb527296f4567de0ae860b9af2880,2024-03-07T13:52:27.110000 -CVE-2024-1715,1,1,6138b94270722d0092ff53f0b2c8ffdff3a07b1d773f954069698108b40daa6f,2024-08-01T04:15:04.367000 +CVE-2024-1715,0,0,6138b94270722d0092ff53f0b2c8ffdff3a07b1d773f954069698108b40daa6f,2024-08-01T04:15:04.367000 CVE-2024-1716,0,0,c5f5d9a61c9aa9da7a42d2c2603e3f8d0ce08ac19f5354115847d2e53bbebf64,2024-05-02T18:00:37.360000 CVE-2024-1717,0,0,0972da8fc5e5f6236802b364284b15bfd904079e9cdd316b293f6c1517b8b02b,2024-06-04T16:57:41.053000 CVE-2024-1718,0,0,8f00858e2fb091044c9d726487547ff27c3d43ee3b63311cf8df3291da694c7e,2024-06-04T16:57:41.053000 @@ -242434,6 +242434,7 @@ CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4 CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 CVE-2024-1745,0,0,2df7fa4c4fa47f53e57d7b3e9d1babc8c2b1750e2bc785796313c72e8ffb6593,2024-03-26T12:55:05.010000 CVE-2024-1746,0,0,8022383f443dbbb627f1c414153375fa50b320afeba598d9c8de3dc5c8a81f57,2024-04-15T13:15:31.997000 +CVE-2024-1747,1,1,bba88062968e921ca1473ab61d2b6b3e36b1f4c0248a27106c749c99d98abf88,2024-08-01T06:15:01.980000 CVE-2024-1748,0,0,225d9c0ba3d2388d2e1d2564afa842c8e38abf8b0b7cfc5e0b1ec6fc81b6c96c,2024-05-17T02:35:34.880000 CVE-2024-1749,0,0,f620be6c4367805be5c83719352e695698d105470ce084642dece004f1c7c3f4,2024-05-17T02:35:35.020000 CVE-2024-1750,0,0,7f9ce3864064263c9a72249a090e6a4b7033b154fc6d744d107ff4cdf65d126b,2024-05-17T02:35:35.177000 @@ -243166,7 +243167,7 @@ CVE-2024-20896,0,0,f5a79ceeb25ba9647cc21d9543d8800186d8f9878e72a48e8635d8a794830 CVE-2024-20897,0,0,b4907e5ec226b893be4856201e70d18b101abd8c29a80b91c03b5cd7e58521bb,2024-07-05T15:56:19.790000 CVE-2024-20898,0,0,cca3eeadcac09bbca92b2c130b68dfddff8b8a1ceb0b17efa6f710b9770bba6b,2024-07-05T17:11:39.327000 CVE-2024-20899,0,0,1ea5d3c975e5b8e190a2ecdcdb2ffe2594326badefc6428838ae53a3dbe043d3,2024-07-05T17:11:57.943000 -CVE-2024-2090,1,1,d0f185b95ea4846cc7f0564ace325a7938c2de7017e560c0a42f21b52adb1bcf,2024-08-01T05:15:09.993000 +CVE-2024-2090,0,0,d0f185b95ea4846cc7f0564ace325a7938c2de7017e560c0a42f21b52adb1bcf,2024-08-01T05:15:09.993000 CVE-2024-20900,0,0,dd950b876d70624a07b7af1c0b796b44690939cd5e1be274d843ac0163ab8cf9,2024-07-05T17:11:51.040000 CVE-2024-20901,0,0,5f9dc6d7e5ec003b4ebac42377482eb7121a0918aab2f40a5dfa15c434211c61,2024-07-05T17:12:08.827000 CVE-2024-20903,0,0,c9ef8d846e3822bbe70c984e58a2c7d206219c2d005aefebbfe48d3291a64941,2024-02-20T19:51:05.510000 @@ -246476,6 +246477,7 @@ CVE-2024-25942,0,0,ed9972b2a67908fa134e82ba51db8b6dda164f88a17fdef5830f031dbe673 CVE-2024-25943,0,0,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000 CVE-2024-25944,0,0,ab1a6f9559c2c17591ef013078bdc7d1074a6939146b74afdf8354c958a2a210,2024-04-01T01:12:59.077000 CVE-2024-25946,0,0,a113fddf4e672678a1d14cda275154cb9972765501ae2bed1e5e6a531e4a4550,2024-03-28T20:53:20.813000 +CVE-2024-25947,1,1,485470e617d7bd91b0ac4d1200f519b4198e68df5c5f6a749aa66b3078909a80,2024-08-01T07:15:02.140000 CVE-2024-25949,0,0,cf19f3ab0bbae3d1ff74313cc0fe0f90bdd6c260c977bc35c843079a46627a59,2024-06-13T18:36:09.010000 CVE-2024-2595,0,0,e521c63ef6b03578b7bb7372b5bef2fecd2a3eebcba151ea7fc07a4fe787ff2a,2024-03-18T19:40:00.173000 CVE-2024-25951,0,0,3b1032e7dee2277c1cd9087f14c93f6b15f85f0de6dddc7df9693edc271d4b00,2024-03-11T01:32:39.697000 @@ -248435,6 +248437,7 @@ CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c CVE-2024-28424,0,0,ecd6a99ae0759c71ad1c7af9ca074920e1fe2279be45e00b413aeaea6bf2f2f8,2024-03-14T20:11:36.180000 CVE-2024-28425,0,0,a141e56038f4e753e81d857ec1e84aae2f8aa855ba4e2973635a5dc63a3d9ae9,2024-03-14T20:11:36.180000 CVE-2024-28429,0,0,d1463630e21be77443b70427954efe3756b4a41822fd121d66c94f7528f881a0,2024-03-13T14:28:45.217000 +CVE-2024-2843,1,1,4895415438190c94406cd89e69182d21ea05ffa00577f1f67fedd6f982ec7a8b,2024-08-01T06:15:02.367000 CVE-2024-28430,0,0,e694b5aca86262438d0540e9c897e671f295f2b82cd8f6ab688d6e70320d9a61,2024-03-13T14:28:45.217000 CVE-2024-28431,0,0,8fa73f38068ed582ca772506eb7716c8cb270f1afc451299119c169e18fc0496,2024-03-13T14:28:45.217000 CVE-2024-28432,0,0,d4feae1a91594686399f8946ac7d18a6f1fe8ae89dec56cc02626608077bbfd0,2024-03-13T14:28:45.217000 @@ -248550,6 +248553,7 @@ CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 CVE-2024-28717,0,0,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000 CVE-2024-28718,0,0,17b78e31f850547b3e404b5336a5f452e3a516e939f6e425ec310b4ed9273277,2024-04-15T13:15:51.577000 +CVE-2024-2872,1,1,7d2c48b0ecdc472ddefeeaae58852037401c96bffa31f58efc16c68407506857,2024-08-01T06:15:02.443000 CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000 CVE-2024-28725,0,0,759d7ace03ce49bd50f051acc14ff68a184bc288c90f7002afe9cdf646d255bc,2024-05-07T13:39:32.710000 CVE-2024-2873,0,0,ed9040959ed5f40d916defffcff03f64da72505082c3b91fe33a6506c19636e1,2024-03-26T12:55:05.010000 @@ -255551,6 +255555,7 @@ CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9 CVE-2024-39826,0,0,afc70f78da14ad22cac1b695b7ec211098e49242f19223081d17abce3c71095c,2024-07-16T13:43:58.773000 CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955cd82,2024-07-16T13:43:58.773000 CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 +CVE-2024-3983,1,1,1f8df5f31240f1196d1c9d779c3b56a448b2e17cf205ce30df1742c82acb0ded,2024-08-01T06:15:02.517000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 @@ -255910,6 +255915,7 @@ CVE-2024-40895,0,0,28ffbfad907ecd6e6665d2dbecd78214d48d230f78fe3bf5c93e6b599c909 CVE-2024-40897,0,0,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000 CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000 CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000 +CVE-2024-4090,1,1,855074d3c79710ef5f4103aa21317adbfbba962b40309ff8b9c00edd41ef92e8,2024-08-01T06:15:02.587000 CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000 CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000 CVE-2024-40902,0,0,2f7d4ca94747f48550a0025dcb58bda474d1a7adef8eacd89e2d7ec7535468d0,2024-07-24T18:52:23.540000 @@ -257465,6 +257471,8 @@ CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000 CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000 CVE-2024-5329,0,0,de038a5f353969046987a50080542fc21e5e9831f920643fcbf4110d57688954,2024-06-11T17:42:26.677000 +CVE-2024-5330,1,1,aa8b20eb4eca56a764c854b8fd469cf90539949cd0655af41122a9ffc25771b9,2024-08-01T07:15:02.520000 +CVE-2024-5331,1,1,59e680925298e50577f0d849de545a2b68ff077838b33f095a86e2637a604947,2024-08-01T07:15:02.783000 CVE-2024-5332,0,0,b929b6d33cd728a86a1419cab1a953f1c1e8520fdf1d886c7808fd1a5444df6e,2024-06-26T12:44:29.693000 CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 @@ -257742,6 +257750,7 @@ CVE-2024-5674,0,0,19a588e59b6b0a5cd86582f1d6ecebdb5fae3e091de3e9e5a8f682eaf8708c CVE-2024-5675,0,0,c94a13a2a4b4b541f4d9019f3017bff689f5579f32759b7a87deb8cdfe0fb73d,2024-06-11T18:14:02.017000 CVE-2024-5676,0,0,ac70690e5e5a82915ea8b21175c3316ecbf6493d45f7e6ea6d37cbb46bb6c2ce,2024-06-24T05:15:09.600000 CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 +CVE-2024-5678,1,1,ec0eebbcae34fc7e7afbf6baa7acc0bf570b67cb5cd152170a8fdac0025f5fbe,2024-08-01T07:15:03.053000 CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000 CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000 CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000 @@ -258305,6 +258314,7 @@ CVE-2024-6490,0,0,8a5877d317a0eed7b1ae7b123dbc62aa28ad8c8fd8f1b2bd14476905cfed0a CVE-2024-6491,0,0,777eb845cac0fc56ad6345347b6b7dff4d99542463073dd5b5752a23e8a26dec,2024-07-22T13:00:53.287000 CVE-2024-6492,0,0,82f79625038ad5debf137137104e45e1e353947b9c4b14df742baece7a047a71,2024-07-17T13:34:20.520000 CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000 +CVE-2024-6496,1,1,43f5bc899f7b576e992b610d27fb07beccb54a6935873953b6f84243b1c8c315,2024-08-01T06:15:02.660000 CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000 @@ -258322,6 +258332,7 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 +CVE-2024-6529,1,1,7d9ecbacb802f6a5ce3e4ab0c48539ed1c07a408b68bf91ec20a6b99341e19f6,2024-08-01T06:15:02.737000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 @@ -258416,7 +258427,7 @@ CVE-2024-6687,0,0,8da08526b23d42202f04689532c9fc543d8d2a947afc7d51db690c4ccd57fa CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 CVE-2024-6695,0,0,b8b8eb834b1b9a9af206e3d65440d92cd68142fa9e3d4c45cc66092e8f4a1c06,2024-07-31T12:57:02.300000 -CVE-2024-6698,1,1,8b174c79c18bb7bae6c8548720caba4acaef081cf5267f9263f38e3446291c69,2024-08-01T04:15:04.767000 +CVE-2024-6698,0,0,8b174c79c18bb7bae6c8548720caba4acaef081cf5267f9263f38e3446291c69,2024-08-01T04:15:04.767000 CVE-2024-6699,0,0,6e43517d823543b1bfe29f11155aa061b1b3007e0c0d0141333897dcac3700cf,2024-07-30T13:32:45.943000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -258681,6 +258692,7 @@ CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2b CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000 CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799ae9,2024-07-31T14:15:08.080000 +CVE-2024-7302,1,1,184ecf12b0245488f943fa0b7b48e96aeeaaa0427a8485fba3f7509b022125fb,2024-08-01T07:15:03.300000 CVE-2024-7303,0,0,d7f72dd61499e6619ce7f5b3ddfad21cf84d8b933f5b61aad0d5acbabf0695d7,2024-07-31T12:57:02.300000 CVE-2024-7306,0,0,41d2dc73352be3adbe3da1c5ddee86e5aba159cd2a5da8e89aabb430dec59115,2024-07-31T12:57:02.300000 CVE-2024-7307,0,0,880aa0ea5c84e56fdc3b5eb36854e1998bc80835f78667a7a6ad57104577d4f7,2024-07-31T12:57:02.300000 @@ -258704,8 +258716,8 @@ CVE-2024-7334,0,0,f6436d883d35ac14c8fd706811d0faed09a47eddb9b3a278251585eebdf496 CVE-2024-7335,0,0,a8ca3ff100d2550a49bfae7a68b6f2b3f03844acfea91fd620bb94479ff0f69a,2024-08-01T02:15:02.900000 CVE-2024-7336,0,0,98cf8001247af131404ed726a56cdfaacc3fdaabc0ae9ad0f26633ec52cc05a2,2024-08-01T03:15:01.717000 CVE-2024-7337,0,0,5c858aa4e8d61610786b879cb485d1cfae507d8e6ee88f3cf4437d95bb969bf6,2024-08-01T03:15:01.987000 -CVE-2024-7338,1,1,5ca436c675332615d8472ada164111a0c43f4d26f7f9e9473b555222c97b3f65,2024-08-01T04:15:05.017000 -CVE-2024-7339,1,1,3ecc5f2b99e2c4d942d5c82dec227718fe6729e0e2181213034de3ecaba6e767,2024-08-01T04:15:05.320000 +CVE-2024-7338,0,0,5ca436c675332615d8472ada164111a0c43f4d26f7f9e9473b555222c97b3f65,2024-08-01T04:15:05.017000 +CVE-2024-7339,0,0,3ecc5f2b99e2c4d942d5c82dec227718fe6729e0e2181213034de3ecaba6e767,2024-08-01T04:15:05.320000 CVE-2024-7340,0,0,fce15548fae9b804b40d57548bf30df09df1870e3bdee4ca04fd99c2c05c0232,2024-07-31T15:15:11.203000 -CVE-2024-7342,1,1,31e5c18f200a0e6bbc2bdf008f370d297be6b78b5cdba87cb4106aea8591d9aa,2024-08-01T05:15:10.303000 -CVE-2024-7343,1,1,a231ea27c24a1aa191b64a77a4557c9c0c06ff509504e00395df5f3a25945b8b,2024-08-01T05:15:10.573000 +CVE-2024-7342,0,0,31e5c18f200a0e6bbc2bdf008f370d297be6b78b5cdba87cb4106aea8591d9aa,2024-08-01T05:15:10.303000 +CVE-2024-7343,0,0,a231ea27c24a1aa191b64a77a4557c9c0c06ff509504e00395df5f3a25945b8b,2024-08-01T05:15:10.573000