diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json new file mode 100644 index 00000000000..5a6550f74a2 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37391.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37391", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-22T07:15:01.870", + "lastModified": "2024-07-22T07:15:01.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ProtonVPN before 3.2.10 on Windows mishandles the drive installer path, which should use this: '\"' + ExpandConstant('{autopf}\\Proton\\Drive') + '\"' in Setup/setup.iss." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ProtonVPN/win-app/commit/2e4e25036842aaf48838c6a59f14671b86c20aa7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ProtonVPN/win-app/compare/3.2.9...3.2.10", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json index ce6542a9bca..5764c075d9e 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39236.json @@ -2,13 +2,20 @@ "id": "CVE-2024-39236", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T19:15:05.420", - "lastModified": "2024-07-03T02:05:44.203", + "lastModified": "2024-07-22T07:15:02.050", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input." + "value": "Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input. NOTE: the supplier disputes this because the report is about a user attacking himself." }, { "lang": "es", @@ -55,6 +62,14 @@ { "url": "https://github.com/Aaron911/PoC/blob/main/Gradio.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-9v2f-6vcg-3hgv", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gradio-app/gradio/issues/8853", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json new file mode 100644 index 00000000000..dcbe050d279 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40430.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40430", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-22T07:15:02.207", + "lastModified": "2024-07-22T07:15:02.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In SFTPGO 2.6.2, the JWT implementation lacks cerrtain security measures, such as using JWT ID (JTI) claims, nonces, and proper expiration and invalidation mechanisms." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://alexsecurity.rocks/posts/cve-2024-40430/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41709.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41709.json new file mode 100644 index 00000000000..efd0704f92b --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41709.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41709", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-22T06:15:02.260", + "lastModified": "2024-07-22T06:15:02.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Backdrop CMS before 1.27.3 and 1.28.x before 1.28.2 does not sufficiently sanitize field labels before they are displayed in certain places. This vulnerability is mitigated by the fact that an attacker must have a role with the \"administer fields\" permission." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://backdropcms.org/security/backdrop-sa-core-2024-001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json new file mode 100644 index 00000000000..f2a980b6543 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5004.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5004", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-22T06:15:02.423", + "lastModified": "2024-07-22T06:15:02.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The CM Popup Plugin for WordPress WordPress plugin before 1.6.6 does not sanitise and escape some of the campaign settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/4bea7baa-84a2-4b21-881c-4f17822329e7/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json new file mode 100644 index 00000000000..d6e8959d907 --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5529.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5529", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-22T06:15:02.520", + "lastModified": "2024-07-22T06:15:02.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP QuickLaTeX WordPress plugin before 3.8.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/66d0b4b7-cd4b-4ec4-95c0-d50773cb0b8f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json new file mode 100644 index 00000000000..b85cd438be3 --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5973.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5973", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-22T06:15:02.590", + "lastModified": "2024-07-22T06:15:02.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The MasterStudy LMS WordPress Plugin WordPress plugin before 3.3.24 does not prevent students from creating instructor accounts, which could be used to get access to functionalities they shouldn't have." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/59abfb7c-d5ea-45f2-ab9a-4391978e3805/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6243.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6243.json new file mode 100644 index 00000000000..03e7bedc79f --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6243.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6243", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-22T06:15:02.663", + "lastModified": "2024-07-22T06:15:02.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HTML Forms WordPress plugin before 1.3.33 does not sanitize and escape the form message inputs, allowing high-privilege users, such as administrators, to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disabled." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/f4097877-ba19-4738-a994-9593b9a5a635/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json new file mode 100644 index 00000000000..51fa8f34f4d --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6244.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6244", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-22T06:15:02.737", + "lastModified": "2024-07-22T06:15:02.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The PZ Frontend Manager WordPress plugin before 1.0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/73ba55a5-6cff-40fc-9686-30c50f060732/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6271.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6271.json new file mode 100644 index 00000000000..cd0749f8717 --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6271.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6271", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-22T06:15:02.810", + "lastModified": "2024-07-22T06:15:02.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Community Events WordPress plugin before 1.5 does not have CSRF check in place when deleting events, which could allow attackers to make a logged in admin delete arbitrary events via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/44d9d085-34cb-490f-a3f5-f9eafae85ab8/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 68319d04293..6f8e33a38f1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-22T06:00:18.240608+00:00 +2024-07-22T08:00:18.628514+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-22T05:15:03.537000+00:00 +2024-07-22T07:15:02.207000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257692 +257701 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `9` -- [CVE-2024-41703](CVE-2024/CVE-2024-417xx/CVE-2024-41703.json) (`2024-07-22T05:15:03.450`) -- [CVE-2024-41704](CVE-2024/CVE-2024-417xx/CVE-2024-41704.json) (`2024-07-22T05:15:03.537`) -- [CVE-2024-6969](CVE-2024/CVE-2024-69xx/CVE-2024-6969.json) (`2024-07-22T04:15:01.973`) -- [CVE-2024-6970](CVE-2024/CVE-2024-69xx/CVE-2024-6970.json) (`2024-07-22T04:15:02.567`) +- [CVE-2024-37391](CVE-2024/CVE-2024-373xx/CVE-2024-37391.json) (`2024-07-22T07:15:01.870`) +- [CVE-2024-40430](CVE-2024/CVE-2024-404xx/CVE-2024-40430.json) (`2024-07-22T07:15:02.207`) +- [CVE-2024-41709](CVE-2024/CVE-2024-417xx/CVE-2024-41709.json) (`2024-07-22T06:15:02.260`) +- [CVE-2024-5004](CVE-2024/CVE-2024-50xx/CVE-2024-5004.json) (`2024-07-22T06:15:02.423`) +- [CVE-2024-5529](CVE-2024/CVE-2024-55xx/CVE-2024-5529.json) (`2024-07-22T06:15:02.520`) +- [CVE-2024-5973](CVE-2024/CVE-2024-59xx/CVE-2024-5973.json) (`2024-07-22T06:15:02.590`) +- [CVE-2024-6243](CVE-2024/CVE-2024-62xx/CVE-2024-6243.json) (`2024-07-22T06:15:02.663`) +- [CVE-2024-6244](CVE-2024/CVE-2024-62xx/CVE-2024-6244.json) (`2024-07-22T06:15:02.737`) +- [CVE-2024-6271](CVE-2024/CVE-2024-62xx/CVE-2024-6271.json) (`2024-07-22T06:15:02.810`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-07-22T05:15:02.137`) +- [CVE-2024-39236](CVE-2024/CVE-2024-392xx/CVE-2024-39236.json) (`2024-07-22T07:15:02.050`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f979b5f07fe..a90fbc63348 100644 --- a/_state.csv +++ b/_state.csv @@ -242063,7 +242063,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,1,1041b5083d840295cba3f80f118172fc6fc248e00680e8c7ad6175b67c9facae,2024-07-22T05:15:02.137000 +CVE-2024-1394,0,0,1041b5083d840295cba3f80f118172fc6fc248e00680e8c7ad6175b67c9facae,2024-07-22T05:15:02.137000 CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000 CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000 @@ -254119,6 +254119,7 @@ CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcf CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000 +CVE-2024-37391,1,1,f31b4be5cc86c80ddcefbdc12ffa2853b59319d3bd642beaa6dfbbd8294ab2fd,2024-07-22T07:15:01.870000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 CVE-2024-37405,0,0,ff056e1e6b71205230bf39333b4a3618e5032f8631acafb990972570435f5468,2024-07-12T16:34:58.687000 @@ -255005,7 +255006,7 @@ CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19b CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000 CVE-2024-3923,0,0,c2a620888229e913021be3366cfd9f75cdf87c5d652acf18a88f48f7b1cc1363,2024-05-14T16:11:39.510000 -CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000 +CVE-2024-39236,0,1,c8d928d9a5630ba124061e9440f748d6ef23d7529229eb5d36ff67980d7754df,2024-07-22T07:15:02.050000 CVE-2024-3924,0,0,235edb1f62c7ed0711c125c27cb00d729af2f8ac46c7bf2f24b9a6a03738d7f9,2024-05-30T18:19:11.743000 CVE-2024-39241,0,0,6c9e66d61f808f289e73ef5e082b4ef9e90adef5ef2134d5cf4f6fc9039027fb,2024-06-27T12:47:19.847000 CVE-2024-39242,0,0,e3eb7a012acf6340415356da5a03611477f43128e0a62f1b9ba41102eb115bff,2024-06-27T12:47:19.847000 @@ -255417,6 +255418,7 @@ CVE-2024-4042,0,0,96d4041426aa53c8eaed5efb2fa5542195ac0f31740a6b227c0436d63b09d3 CVE-2024-40420,0,0,6e460149a3e6ef0d0e6e77ad5f5ac9ffef80b9a3e82ab52e80f4b03f5aaffd87,2024-07-18T12:28:43.707000 CVE-2024-40425,0,0,ed5ea69d78e69de5a03f2dea647d2c038f05f8f6ff89f420995c2c0d1881d668,2024-07-17T13:34:20.520000 CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000 +CVE-2024-40430,1,1,c10b76b5d25bbeffc79e7aea18b6810ab94841cc96da47436969ade14f4aa8dd,2024-07-22T07:15:02.207000 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dde95,2024-07-17T13:34:20.520000 @@ -255731,8 +255733,9 @@ CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d5070886 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 -CVE-2024-41703,1,1,2598211c0d1ea764b056de8764a14b42eb3df5245f2aa555ef5fe61b743c4228,2024-07-22T05:15:03.450000 -CVE-2024-41704,1,1,4a9cff301e1e7693882ad1e493bb5e36dbe5db1aab3e62115dbda896d8bb70e3,2024-07-22T05:15:03.537000 +CVE-2024-41703,0,0,2598211c0d1ea764b056de8764a14b42eb3df5245f2aa555ef5fe61b743c4228,2024-07-22T05:15:03.450000 +CVE-2024-41704,0,0,4a9cff301e1e7693882ad1e493bb5e36dbe5db1aab3e62115dbda896d8bb70e3,2024-07-22T05:15:03.537000 +CVE-2024-41709,1,1,5ff46cc3730c2e4305a12f1f05556fbf8716e0eb957527f3f2720e30b8edf60c,2024-07-22T06:15:02.260000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 @@ -256446,6 +256449,7 @@ CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e CVE-2024-5001,0,0,6e789f4b84b7c30c10b52ba7371d899ee31aa38697e534b21234e708adacc825,2024-06-06T14:17:35.017000 CVE-2024-5002,0,0,f7860d79f0c4960d9f9f9b184eddce2d975db46219a58cb625ab73e627c58cc7,2024-07-15T13:00:34.853000 CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000 +CVE-2024-5004,1,1,cb025f636736cf0460f004a5bbea07cba8d10d72043592cebccdd90057b8e137,2024-07-22T06:15:02.423000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000 CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000 @@ -256889,6 +256893,7 @@ CVE-2024-5523,0,0,d7a88b58421b5d1ae546562c97be2066f98eb204a278a9729ed09f63f682e1 CVE-2024-5524,0,0,acc6c718843a634b3681eccc60375ca60bf82b8427b94da2351e444fa46af424,2024-05-31T13:01:46.727000 CVE-2024-5525,0,0,02c49ace47b04c4d76443f16f3ee0a6fe51259c43b6dd84bf29c79a7efe72454,2024-05-31T13:01:46.727000 CVE-2024-5526,0,0,60bf48d4ea40ca252e5afebf1dc1ad6e5a4db01756ddf2bd31cc94e151a8720b,2024-06-11T17:25:55.677000 +CVE-2024-5529,1,1,b9320287f6c6a6f7762bfb41bc248823898214c41496ba80975e0df27e237ff0,2024-07-22T06:15:02.520000 CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,6e18bd4c00ec4db4743368aa05b5d810d40ae0d6bb9ac604deef69554fbe362e,2024-06-11T13:54:12.057000 CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000 @@ -257190,6 +257195,7 @@ CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84d0,2024-07-09T18:19:14.047000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 +CVE-2024-5973,1,1,348e73ebb2c1d9af5db89f8c0cc88cff69ce28d9dc21185913a84573fdd0b84e,2024-07-22T06:15:02.590000 CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000 CVE-2024-5977,0,0,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000 @@ -257371,6 +257377,8 @@ CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ff CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 +CVE-2024-6243,1,1,b743dc66a8f145f2334558c485a7fb62dc24b7df803f27e7a5a0484e5e03db87,2024-07-22T06:15:02.663000 +CVE-2024-6244,1,1,eed0e06d5acfe6e78ac08ac2f3721346eaa60e8e5fa346b3a6bd5cbda123b210,2024-07-22T06:15:02.737000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 CVE-2024-6251,0,0,4ff3c6977b6838552fca6fd96450148c0a810a0b49d59064a41fd5d7df8c3900,2024-06-24T12:57:36.513000 CVE-2024-6252,0,0,f925951499780a86ba894fc39baf0f6088fcb6c4e2787ea242a732a2e35ea460,2024-06-26T19:15:14.383000 @@ -257385,6 +257393,7 @@ CVE-2024-6266,0,0,20534bd9562365f2e6a746e76af397ec0ac4597526b88e144b7ab5fafa0d22 CVE-2024-6267,0,0,693665502396a8f2760ff0a194782c5c48821dd90ed508792042af1972e2adac,2024-06-24T15:15:12.093000 CVE-2024-6268,0,0,e3e35d0049e774331d2151e442525bd992cba867b327c069ba368c32d8bd87bf,2024-06-26T20:15:16.893000 CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000 +CVE-2024-6271,1,1,d208479bc7de563d91b4887450d7b37a6318c7369d823d8c50b9ed507b351e66,2024-07-22T06:15:02.810000 CVE-2024-6273,0,0,ee5202b6a0bcfc7a40a266aa2aa86d2d546d7d0a335d210650da452fe4ac0950,2024-06-25T13:15:50.403000 CVE-2024-6274,0,0,5445e5244574eb35dee4d3a86757e63aa764a2dd3baf93da96725400aa49bff7,2024-06-24T12:57:36.513000 CVE-2024-6275,0,0,34263dcde8e1b5222af573d3152e1f6b3c783b399a6e9b4a2a7c05be9cba88fa,2024-06-25T16:15:25.923000 @@ -257689,5 +257698,5 @@ CVE-2024-6965,0,0,6c351cdc4064cc46ee917a63de22386a755b19b526c56b30bffb098af0ef18 CVE-2024-6966,0,0,9c3060d89f3bea2d1909840931a2cb42bd85ea53c436c0c8e8f2f5782ed7a005,2024-07-22T03:15:02.310000 CVE-2024-6967,0,0,929e12cfc5cef9710e4c8172367054253a7298c282d9533a17f7bb9f018d9198,2024-07-22T03:15:02.767000 CVE-2024-6968,0,0,55227f289ab6d5e420211f0bc592cf32307b13d00865d23045cb451205a5a7d5,2024-07-22T03:15:03.213000 -CVE-2024-6969,1,1,de5294af5a057281052bc8debdd11b3ca7d9a3341c37afa4aa7b0795a8fd2cbf,2024-07-22T04:15:01.973000 -CVE-2024-6970,1,1,a59d2cd10aa16d9cf1c68cf6297cb430ec5105caa069ef52b87ce90c18b8758a,2024-07-22T04:15:02.567000 +CVE-2024-6969,0,0,de5294af5a057281052bc8debdd11b3ca7d9a3341c37afa4aa7b0795a8fd2cbf,2024-07-22T04:15:01.973000 +CVE-2024-6970,0,0,a59d2cd10aa16d9cf1c68cf6297cb430ec5105caa069ef52b87ce90c18b8758a,2024-07-22T04:15:02.567000