diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json index def56840c8b..30cc1362e55 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22948.json @@ -2,9 +2,13 @@ "id": "CVE-2022-22948", "sourceIdentifier": "security@vmware.com", "published": "2022-03-29T18:15:08.040", - "lastModified": "2022-04-08T12:58:23.517", + "lastModified": "2024-07-18T01:00:03.190", "vulnStatus": "Analyzed", "cveTags": [], + "cisaExploitAdd": "2024-07-17", + "cisaActionDue": "2024-08-07", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24806.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24806.json index 378c5d16ac5..b79ce244f1a 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24806.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24806", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-07T22:15:10.173", - "lastModified": "2024-06-10T17:16:20.457", + "lastModified": "2024-07-18T01:15:13.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -147,6 +147,10 @@ "Vendor Advisory" ] }, + { + "url": "https://gitlab.kitware.com/cmake/cmake/-/issues/26112", + "source": "security-advisories@github.com" + }, { "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00005.html", "source": "security-advisories@github.com" diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json index 96512b1d58f..3e1bfe1082c 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json @@ -2,9 +2,13 @@ "id": "CVE-2024-28995", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-06-06T09:15:14.167", - "lastModified": "2024-06-11T17:47:22.867", + "lastModified": "2024-07-18T01:00:03.197", "vulnStatus": "Analyzed", "cveTags": [], + "cisaExploitAdd": "2024-07-17", + "cisaActionDue": "2024-08-07", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "SolarWinds Serv-U Path Traversal Vulnerability ", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34102.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34102.json index f021e1fed2b..2adb1c31dfc 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34102.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34102.json @@ -2,9 +2,13 @@ "id": "CVE-2024-34102", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T09:15:10.380", - "lastModified": "2024-07-09T16:00:38.170", + "lastModified": "2024-07-18T01:00:03.197", "vulnStatus": "Analyzed", "cveTags": [], + "cisaExploitAdd": "2024-07-17", + "cisaActionDue": "2024-08-07", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39678.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39678.json new file mode 100644 index 00000000000..1d8e39786fb --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39678.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39678", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-18T01:15:14.197", + "lastModified": "2024-07-18T01:15:14.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cooked is a recipe plugin for WordPress. The Cooked plugin is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-pp3h-ghxf-r9pc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39679.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39679.json new file mode 100644 index 00000000000..9dbbe322042 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39679.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39679", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-18T01:15:14.450", + "lastModified": "2024-07-18T01:15:14.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-2jh3-9939-c4rc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39680.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39680.json new file mode 100644 index 00000000000..d59cb7e9603 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39680.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39680", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-18T01:15:14.647", + "lastModified": "2024-07-18T01:15:14.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-f2mc-hcp9-6xgr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39681.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39681.json new file mode 100644 index 00000000000..d9d3884db65 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39681.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39681", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-18T01:15:14.850", + "lastModified": "2024-07-18T01:15:14.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-q7p9-2x5h-vxm7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39682.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39682.json new file mode 100644 index 00000000000..5ff771d93ba --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39682.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39682", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-18T01:15:15.043", + "lastModified": "2024-07-18T01:15:15.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-fx69-f77x-84gr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json new file mode 100644 index 00000000000..1431efb3d82 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41184.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-41184", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-18T01:15:15.253", + "lastModified": "2024-07-18T01:15:15.253", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1, an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ce2ceb036df..e9bc5ef8cc3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-17T23:55:17.916470+00:00 +2024-07-18T02:00:19.301584+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-17T22:15:03.923000+00:00 +2024-07-18T01:15:15.253000+00:00 ``` ### Last Data Feed Release @@ -27,31 +27,35 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-07-17T00:00:08.649355+00:00 +2024-07-18T00:00:08.654145+00:00 ``` ### Total Number of included CVEs ```plain -257413 +257419 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `6` -- [CVE-2023-43971](CVE-2023/CVE-2023-439xx/CVE-2023-43971.json) (`2024-07-17T22:15:03.627`) -- [CVE-2024-40492](CVE-2024/CVE-2024-404xx/CVE-2024-40492.json) (`2024-07-17T22:15:03.923`) +- [CVE-2024-39678](CVE-2024/CVE-2024-396xx/CVE-2024-39678.json) (`2024-07-18T01:15:14.197`) +- [CVE-2024-39679](CVE-2024/CVE-2024-396xx/CVE-2024-39679.json) (`2024-07-18T01:15:14.450`) +- [CVE-2024-39680](CVE-2024/CVE-2024-396xx/CVE-2024-39680.json) (`2024-07-18T01:15:14.647`) +- [CVE-2024-39681](CVE-2024/CVE-2024-396xx/CVE-2024-39681.json) (`2024-07-18T01:15:14.850`) +- [CVE-2024-39682](CVE-2024/CVE-2024-396xx/CVE-2024-39682.json) (`2024-07-18T01:15:15.043`) +- [CVE-2024-41184](CVE-2024/CVE-2024-411xx/CVE-2024-41184.json) (`2024-07-18T01:15:15.253`) ### CVEs modified in the last Commit Recently modified CVEs: `4` -- [CVE-2018-25031](CVE-2018/CVE-2018-250xx/CVE-2018-25031.json) (`2024-07-17T22:15:02.130`) -- [CVE-2019-7321](CVE-2019/CVE-2019-73xx/CVE-2019-7321.json) (`2024-07-17T22:15:02.780`) -- [CVE-2021-3407](CVE-2021/CVE-2021-34xx/CVE-2021-3407.json) (`2024-07-17T22:15:03.267`) -- [CVE-2024-3735](CVE-2024/CVE-2024-37xx/CVE-2024-3735.json) (`2024-07-17T22:15:03.767`) +- [CVE-2022-22948](CVE-2022/CVE-2022-229xx/CVE-2022-22948.json) (`2024-07-18T01:00:03.190`) +- [CVE-2024-24806](CVE-2024/CVE-2024-248xx/CVE-2024-24806.json) (`2024-07-18T01:15:13.310`) +- [CVE-2024-28995](CVE-2024/CVE-2024-289xx/CVE-2024-28995.json) (`2024-07-18T01:00:03.197`) +- [CVE-2024-34102](CVE-2024/CVE-2024-341xx/CVE-2024-34102.json) (`2024-07-18T01:00:03.197`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d51305f9337..70edfcedcab 100644 --- a/_state.csv +++ b/_state.csv @@ -121310,7 +121310,7 @@ CVE-2018-25028,0,0,f8d63491deeceb41c450ce7c162bc94d0fb413c8d161119b1512c342b0865 CVE-2018-25029,0,0,7ccab6ea2195b5dd76c36bd6ed569ce887f6f05b36621177f20eebf813cdbf51,2022-02-09T15:45:48.157000 CVE-2018-2503,0,0,9d55343570c109a43add370d783b903ac0623bf175f051499f55aca47eacbde0,2021-09-09T17:17:24.160000 CVE-2018-25030,0,0,02a9358d201382a704d7f138a3119bd7ee0e360fc4e5a40b1eee38c35559e1b9,2022-04-04T19:13:21.520000 -CVE-2018-25031,0,1,56b5c39642e66e28458e6230fe48a4a43fea94a41f4c78621d3a983bf632abd5,2024-07-17T22:15:02.130000 +CVE-2018-25031,0,0,56b5c39642e66e28458e6230fe48a4a43fea94a41f4c78621d3a983bf632abd5,2024-07-17T22:15:02.130000 CVE-2018-25032,0,0,3012a2b19a039592d330912db6df82bf4697afa3b316ff1ce8a29e7eafe5a03d,2023-11-07T02:56:26.393000 CVE-2018-25033,0,0,f0629aee2eebec42636f555818f70093ddc02b3111bf52c252c0cab48b37702c,2022-10-06T17:50:38.090000 CVE-2018-25034,0,0,2a8e3f404ad2ceab1cf87b8301be191bb8486d945ca7af8c9e79480c3e1bfdf4,2024-05-17T01:27:25.100000 @@ -141894,7 +141894,7 @@ CVE-2019-7315,0,0,655babeca8c8699ebe56def6d52ff3c4b5fbcee0d182a155d3e1a91e48b210 CVE-2019-7316,0,0,22e4f7dc81144e2f39b945be48c90c90554c014ce135857c8859d70d0fe2a95f,2020-10-07T08:15:11.913000 CVE-2019-7317,0,0,e3ac777710ff4108a7e59a3307fb05f90498d96734fa188ef7979b224d8a565d,2022-05-23T15:02:40.667000 CVE-2019-7319,0,0,ff03b6e890c756d023fcb6ea16e98e9b0a55bbdac32849e3402df42d3c97907c,2020-08-24T17:37:01.140000 -CVE-2019-7321,0,1,1d6b4993fae010ef0105848e03183914a19e00a1b2660bc7ad64c145cfe06bde,2024-07-17T22:15:02.780000 +CVE-2019-7321,0,0,1d6b4993fae010ef0105848e03183914a19e00a1b2660bc7ad64c145cfe06bde,2024-07-17T22:15:02.780000 CVE-2019-7323,0,0,d44784f70f4d24610b0d52acad664b5c526cfbb90381285299d127aa60c8eb76,2020-08-24T17:37:01.140000 CVE-2019-7324,0,0,66e1fc0708200fe70c650fed6c8ccf3507f0ad4b917597a4f02c24924038664e,2019-05-30T04:29:02.260000 CVE-2019-7325,0,0,162a3d8901e60b0c954b54fdf54634a60920b838e996dcdd8f23ac89a4ca4a01,2019-02-04T20:13:58.267000 @@ -177328,7 +177328,7 @@ CVE-2021-34066,0,0,5126193e9c71443b4a22f0935088fa7ee82f64eda0c2e1df14adc32887a0c CVE-2021-34067,0,0,5a0a61b0c0d0fc042b1c83eea1073d85b4330e36961e3ff3b94e800d392c3b4b,2021-06-28T19:28:44.813000 CVE-2021-34068,0,0,e8d6b8018740e03c17e69dafb24f61ac0f7df5e531dcd9c94ca32e3517286dc9,2021-06-28T19:29:26.300000 CVE-2021-34069,0,0,e7ad0b523697bec4aab65c5ddce8d4c5ab89991372a77313f0b10b216b14192d,2021-06-28T19:31:38.967000 -CVE-2021-3407,0,1,9ec547d9916a8df0fd80f06512c6626cd94433c9980bd1ba6593fcd09b446511,2024-07-17T22:15:03.267000 +CVE-2021-3407,0,0,9ec547d9916a8df0fd80f06512c6626cd94433c9980bd1ba6593fcd09b446511,2024-07-17T22:15:03.267000 CVE-2021-34070,0,0,104b59404eff79ab9d17bb47922cec730764feabe226adb513d4f02b90a5274d,2021-06-28T19:47:06.480000 CVE-2021-34071,0,0,1d01218a96968960fb6b41dc5ea96329b5d0429e0dfec032a981cd29856b82f2,2021-06-28T19:28:22.080000 CVE-2021-34073,0,0,6673cbd9119103710430438dc8240a1499ffc7e7ed800b0a61b4e18eb60755fc,2022-02-02T18:57:52.867000 @@ -192121,7 +192121,7 @@ CVE-2022-22944,0,0,676327d4717b5599b517d5b9312003bcf76a812f9682a770d499e471fe26d CVE-2022-22945,0,0,bdfdc441e34f91eac1742b462e9c0a34fe3ccbc2ba19b6adc6510fa95bca2424,2022-02-24T19:34:56.947000 CVE-2022-22946,0,0,73897096059cc424e53bda43ae5450b515058d43231cccbf62c5a84242160584,2023-02-22T17:46:02.053000 CVE-2022-22947,0,0,738b6d7713474e3640f15bcd0d152fc4f07008ff7eed844c4608516845220bea,2023-07-24T13:47:34.933000 -CVE-2022-22948,0,0,a43fbcbb1fce95a7750267b08cf594d82d68cc322b284678dd17a81da734613c,2022-04-08T12:58:23.517000 +CVE-2022-22948,0,1,ce21bf3961b0ce4d12a0e857c996b766bc1e28e4173002304b3c80c3d6835a13,2024-07-18T01:00:03.190000 CVE-2022-2295,0,0,e4b52112ad8f99baa7a29a7f5984129d950df22bc437645727743c1c8383cf88,2023-11-07T03:46:26.940000 CVE-2022-22950,0,0,bc50cb5b67d3eab9006ffdc7603f3dd6c3d4b852de6313ed43aa1f6a3b01b571,2022-06-22T13:53:48.523000 CVE-2022-22951,0,0,15080fd6724635e5906f80ec4801576fa6eb657b857d86f9f47fc7611d4882fa,2022-03-29T18:07:19.457000 @@ -232814,7 +232814,7 @@ CVE-2023-43959,0,0,3e0508b282ce13b7ab31b65b36da1089fb9bc1c29185cb09f3c4226ee594b CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000 CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000 CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000 -CVE-2023-43971,1,1,d37f04505d6675450d12a28946952c7ea0f6f258eeb49605afad64439970130f,2024-07-17T22:15:03.627000 +CVE-2023-43971,0,0,d37f04505d6675450d12a28946952c7ea0f6f258eeb49605afad64439970130f,2024-07-17T22:15:03.627000 CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000 CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000 CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000 @@ -245637,7 +245637,7 @@ CVE-2024-24802,0,0,a3054874cea3e4ddec20762d87678c546be7a7cac44d0c43b4a45ea605093 CVE-2024-24803,0,0,74e92479f62cd0411139e8b183d7dd3bc446eea167bcdbacd6856d4b7e385883,2024-02-16T16:19:58.613000 CVE-2024-24804,0,0,e6025e87c4f7965ab7255f018b77982a520eae47324b8f9c7078be3b4a7f8f69,2024-02-16T16:21:45.077000 CVE-2024-24805,0,0,7e421e9c4abbd7f7f2c7445a2833db520e5bed2f438e49450ca7d917d4321daa,2024-03-26T12:55:05.010000 -CVE-2024-24806,0,0,ce954d27b3923b0affac08bf1505b879c1560fb122f1573ebd6e239d04c8fc1a,2024-06-10T17:16:20.457000 +CVE-2024-24806,0,1,1688aa2dcd3688974086948b2067d49d2894195562807705bbdc1ffc220c3c57,2024-07-18T01:15:13.310000 CVE-2024-24807,0,0,41060939121a77a6243ea5618e33da445c7c71ec0e8a937d01b8188d0ed19963,2024-02-12T21:41:24.647000 CVE-2024-24808,0,0,cb4631cbca81298fbc763dc04fda77ba611e821808a71c52cd98e8c732ece1cf,2024-02-13T22:48:57.290000 CVE-2024-24809,0,0,f93dd64bdf57f87913d977db705a10f553354641c48f0bbfc502a4b0d9bc66d3,2024-04-10T19:49:51.183000 @@ -248620,7 +248620,7 @@ CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 CVE-2024-28992,0,0,19a63c4052cdaff0d7746db7eeae97f54e5681bf9669cce818ddbbe24f83c37f,2024-07-17T15:15:13.623000 CVE-2024-28993,0,0,eb2584493870b2cc973f87466125031a7ce8888dd862a361e8286f2ec84e3c54,2024-07-17T15:15:13.860000 -CVE-2024-28995,0,0,676b16f660765af69774a2536c884c955247c2299098c9e12021fd7eab69b47f,2024-06-11T17:47:22.867000 +CVE-2024-28995,0,1,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000 CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000 CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000 CVE-2024-2900,0,0,9bd5558f52cf3da4bca76efc39f079db00859b82397c98864e9f0561a07bb703,2024-05-17T02:38:36.333000 @@ -252023,7 +252023,7 @@ CVE-2024-34099,0,0,348209bc0dad2be9d67513a23a3e024e95a59b4c00a0cf1f3dbd4d6fed8a4 CVE-2024-3410,0,0,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000 CVE-2024-34100,0,0,16a99aff4b4caad000c1a0ba35879f8d0022c815a7936897694c2a34486071ff,2024-05-15T16:40:19.330000 CVE-2024-34101,0,0,d241a941311347a3e02d5d35bda706d1089d6d6f767584d8dcfa622e3001e4e4,2024-05-15T16:40:19.330000 -CVE-2024-34102,0,0,8b1e6e557dce53483243926c2b72d923bdfc128d2c064f0699990d66fcdbe8e2,2024-07-09T16:00:38.170000 +CVE-2024-34102,0,1,f536eb73d9ffa51de1c60d0da7cdbc91c1a0278d2ed255da17cedda31f00687f,2024-07-18T01:00:03.197000 CVE-2024-34103,0,0,8e858e6deebf3dd74486b084ebc01e723dadd4c1741289465f9eef03525519ca,2024-07-09T15:36:11.363000 CVE-2024-34104,0,0,0c3b9794948346667daf712c1fa8aea7e59869808e596eca4e201c3b2e06e87d,2024-07-09T15:36:40.730000 CVE-2024-34105,0,0,279c20cbee5e4f9fb4c4f5bc11b2ac4f0b15f01288e2ef51f37efbef66bcba62,2024-07-09T15:34:26.507000 @@ -254065,7 +254065,7 @@ CVE-2024-37346,0,0,a4475e8bc16526d4a2cd923965b515305302813fd73edbfa3f18575d405f6 CVE-2024-37347,0,0,6e7baea952ef385b67b23083cebbb129c77e5630de3ec6d82658c88bc410c4ea,2024-06-21T11:22:01.687000 CVE-2024-37348,0,0,49b92234970ec422b020245ff1e6f7259c16f36e8db6b7b874fd77e08ed0a6ef,2024-06-21T11:22:01.687000 CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000 -CVE-2024-3735,0,1,867967ad258d810aceaf10910dcdbb6596bc335686c253a30799183e4a1efe20,2024-07-17T22:15:03.767000 +CVE-2024-3735,0,0,867967ad258d810aceaf10910dcdbb6596bc335686c253a30799183e4a1efe20,2024-07-17T22:15:03.767000 CVE-2024-37350,0,0,db322a02568c197ff2f4cce28d07f13a6d84645dcf6fb2d6d98030bff57992f6,2024-06-21T11:22:01.687000 CVE-2024-37351,0,0,5d28c3ae9e671d4e970680119129fdfd5cef4f93d0af956f6a6aef99cac6535d,2024-06-21T11:22:01.687000 CVE-2024-37352,0,0,8cb2d15b6cc19b492a4019e2458fe1e37bdb4a8988d34a37da730385b336d322,2024-06-21T11:22:01.687000 @@ -255061,7 +255061,12 @@ CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bc CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000 CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000 CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000 +CVE-2024-39678,1,1,6cdbe347637ab1f23c22720cd52e57f8d5b0d304694d574abaf524872a3d022e,2024-07-18T01:15:14.197000 +CVE-2024-39679,1,1,451cf8c9372f3467583a53494466ff2200c12b9b363278fa9735a9966bcc0d36,2024-07-18T01:15:14.450000 CVE-2024-3968,0,0,6e8a3540463fef006a115080523279717acfbbd27b5f9241de34d6d7c04d7716,2024-05-15T18:35:11.453000 +CVE-2024-39680,1,1,cc48024f75d5a6dc740e660c22180d9e8abb171be4f57b5e5972ea8bf4382779,2024-07-18T01:15:14.647000 +CVE-2024-39681,1,1,b7143624a5a8d96f70453d6634cf263e3163cbc000f3776d0f69b99e4c796e21,2024-07-18T01:15:14.850000 +CVE-2024-39682,1,1,e7fa5b5fc85367eeb4ddc275c92cf92d9007fe076293bbd6142028cda6308b64,2024-07-18T01:15:15.043000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 CVE-2024-39684,0,0,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000 CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 @@ -255254,7 +255259,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dde95,2024-07-17T13:34:20.520000 CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 -CVE-2024-40492,1,1,dcf98c4743de8f845862878ba9266e6187a1618cf1ef468007fbfaafcf221ffc,2024-07-17T22:15:03.923000 +CVE-2024-40492,0,0,dcf98c4743de8f845862878ba9266e6187a1618cf1ef468007fbfaafcf221ffc,2024-07-17T22:15:03.923000 CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000 CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000 CVE-2024-40515,0,0,aa3af036b6952485bf51fdea15dd678b9b42e4cd0dbbfc73284a7100fad8108a,2024-07-17T13:34:20.520000 @@ -255492,6 +255497,7 @@ CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 +CVE-2024-41184,1,1,8f999a9f4e2a7f8e9dfc5120773102efb66c2c004a73207b947644ab9ec949c0,2024-07-18T01:15:15.253000 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000