diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0158.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0158.json new file mode 100644 index 00000000000..7a6597fe594 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0158.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0158", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-02T07:15:02.370", + "lastModified": "2024-07-02T07:15:02.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json new file mode 100644 index 00000000000..b5d82242815 --- /dev/null +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1427.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-1427", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-02T06:15:02.253", + "lastModified": "2024-07-02T06:15:02.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The The Post Grid \u2013 Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the section title tag attribute in all versions up to, and including, 7.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32852.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32852.json new file mode 100644 index 00000000000..d42b2b30650 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32852.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32852", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-02T07:15:03.103", + "lastModified": "2024-07-02T07:15:03.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.0 contain use of a broken or risky cryptographic algorithm vulnerability. An unprivileged network malicious attacker could potentially exploit this vulnerability, leading to data leaks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226569/dsa-2024-255-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32853.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32853.json new file mode 100644 index 00000000000..263c7266f54 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32853.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32853", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-02T07:15:03.357", + "lastModified": "2024-07-02T07:15:03.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.2 contain an execution with unnecessary privileges vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226569/dsa-2024-255-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32854.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32854.json new file mode 100644 index 00000000000..42c6746b86f --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32854.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32854", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-07-02T07:15:03.593", + "lastModified": "2024-07-02T07:15:03.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privilege attacker could potentially exploit this vulnerability, leading to privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226569/dsa-2024-255-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json new file mode 100644 index 00000000000..09e6d6f1c1f --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3999.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3999", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-02T06:15:04.050", + "lastModified": "2024-07-02T06:15:04.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The EazyDocs WordPress plugin before 2.5.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json new file mode 100644 index 00000000000..05ccabab1f2 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4627.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4627", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-02T06:15:04.400", + "lastModified": "2024-07-02T06:15:04.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Rank Math SEO WordPress plugin before 1.0.219 does not sanitise and escape some of its settings, which could allow users with access to the General Settings (by default admin, however such access can be given to lower roles via the Role Manager feature of the Rank Math SEO WordPress plugin before 1.0.219) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5219.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5219.json new file mode 100644 index 00000000000..5f8b8c649da --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5219.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-5219", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-02T07:15:03.853", + "lastModified": "2024-07-02T07:15:03.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy Google Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file upload feature in all versions up to, and including, 1.11.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/google-maps-easy/tags/1.11.15/modules/icons/mod.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3105921/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4af9c623-1539-4afc-9dcd-3f97d29aa4f3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json new file mode 100644 index 00000000000..631464fadf2 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5606", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-02T06:15:04.760", + "lastModified": "2024-07-02T06:15:04.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Quiz and Survey Master (QSM) WordPress plugin before 9.0.2 is vulnerable does not validate and escape the question_id parameter in the qsm_bulk_delete_question_from_database AJAX action, leading to a SQL injection exploitable by Contributors and above role" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json new file mode 100644 index 00000000000..6b44ae7a4dc --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5767.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5767", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-02T06:15:05.063", + "lastModified": "2024-07-02T06:15:05.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The sitetweet WordPress plugin through 0.2 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6172.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6172.json new file mode 100644 index 00000000000..540755f6233 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6172.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6172", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-02T07:15:04.080", + "lastModified": "2024-07-02T07:15:04.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the db parameter in all versions up to, and including, 5.7.25 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/email-subscribers/trunk/lite/includes/db/class-es-db-contacts.php#L834", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3107964/email-subscribers#file4", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3107964%40email-subscribers%2Ftrunk&old=3104864%40email-subscribers%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/email-subscribers/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13629598-d45d-4ff5-aeb5-6ac881d25183?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 49a5c3f773f..127cbac066d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-02T06:03:19.897901+00:00 +2024-07-02T08:01:22.797783+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-02T05:15:10.470000+00:00 +2024-07-02T07:15:04.080000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255645 +255656 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `11` -- [CVE-2024-5349](CVE-2024/CVE-2024-53xx/CVE-2024-5349.json) (`2024-07-02T05:15:10.470`) -- [CVE-2024-5419](CVE-2024/CVE-2024-54xx/CVE-2024-5419.json) (`2024-07-02T04:15:03.417`) +- [CVE-2024-0158](CVE-2024/CVE-2024-01xx/CVE-2024-0158.json) (`2024-07-02T07:15:02.370`) +- [CVE-2024-1427](CVE-2024/CVE-2024-14xx/CVE-2024-1427.json) (`2024-07-02T06:15:02.253`) +- [CVE-2024-32852](CVE-2024/CVE-2024-328xx/CVE-2024-32852.json) (`2024-07-02T07:15:03.103`) +- [CVE-2024-32853](CVE-2024/CVE-2024-328xx/CVE-2024-32853.json) (`2024-07-02T07:15:03.357`) +- [CVE-2024-32854](CVE-2024/CVE-2024-328xx/CVE-2024-32854.json) (`2024-07-02T07:15:03.593`) +- [CVE-2024-3999](CVE-2024/CVE-2024-39xx/CVE-2024-3999.json) (`2024-07-02T06:15:04.050`) +- [CVE-2024-4627](CVE-2024/CVE-2024-46xx/CVE-2024-4627.json) (`2024-07-02T06:15:04.400`) +- [CVE-2024-5219](CVE-2024/CVE-2024-52xx/CVE-2024-5219.json) (`2024-07-02T07:15:03.853`) +- [CVE-2024-5606](CVE-2024/CVE-2024-56xx/CVE-2024-5606.json) (`2024-07-02T06:15:04.760`) +- [CVE-2024-5767](CVE-2024/CVE-2024-57xx/CVE-2024-5767.json) (`2024-07-02T06:15:05.063`) +- [CVE-2024-6172](CVE-2024/CVE-2024-61xx/CVE-2024-6172.json) (`2024-07-02T07:15:04.080`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2023-45924](CVE-2023/CVE-2023-459xx/CVE-2023-45924.json) (`2024-07-02T04:15:02.707`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 71d766bf4bf..cda51c40f19 100644 --- a/_state.csv +++ b/_state.csv @@ -233908,7 +233908,7 @@ CVE-2023-45920,0,0,65d7d2ce0a0262772d3ab5884e97ff83a6493f02729ce45348dc60f1281d5 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 CVE-2023-45922,0,0,f553ee1024e9d6617aab805459a8f8d42a6afe3ed3edac7d3660a9abfa0accf0,2024-06-10T21:15:49.337000 CVE-2023-45923,0,0,5946dd1d30e5db85cc88e2299cbbf78c4c1c23d4d9e7d4f1539852b51a3b5d93,2024-01-30T06:15:45.300000 -CVE-2023-45924,0,1,c926b02314dc345741852f008b67bf13126173d04318d481458a620d3701c4ab,2024-07-02T04:15:02.707000 +CVE-2023-45924,0,0,c926b02314dc345741852f008b67bf13126173d04318d481458a620d3701c4ab,2024-07-02T04:15:02.707000 CVE-2023-45925,0,0,318183d9ce7e7d4f33e1f7efbaf455f4711625e4eb7e1530869992147c22e3f4,2024-06-04T19:17:49.370000 CVE-2023-45926,0,0,b31fd162068a0734b2b75498e371bf05938747f0b8d935b26b2fd650b2446211,2024-01-30T06:15:45.480000 CVE-2023-45927,0,0,6aed1e8c1cac976d39372a205b9cf2acc98f0084185486e97f5992573dfcc834,2024-03-27T12:29:30.307000 @@ -240686,6 +240686,7 @@ CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 CVE-2024-0157,0,0,41fed5a7ef369641bb15bf9550fed42a9eeae2e067e07d2e271c0541b33e5dbb,2024-04-15T13:15:51.577000 +CVE-2024-0158,1,1,f719c2f2af097df06247b3e6a076f3130e4c787405fceaeb5a5aff2c76efd9fa,2024-07-02T07:15:02.370000 CVE-2024-0159,0,0,2ad1cb026904adca39b92e28c0c2ad3b954009db9f9d73bdfde530f15bd720ee,2024-04-10T13:23:38.787000 CVE-2024-0160,0,0,acf37357b63e17ec6b69243dc66e2a43c83d975039aad08e677fd75ee36776b8,2024-06-13T18:36:09.013000 CVE-2024-0161,0,0,73817f9b8418eb2b694637c6f29b853142572f0b28368cfdbc90d03735fa61fd,2024-03-13T18:16:18.563000 @@ -241860,6 +241861,7 @@ CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe7 CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000 CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000 CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000 +CVE-2024-1427,1,1,f582813854a5a1b993a126d6469ece680b91c8bc98831db5549931b7580f506f,2024-07-02T06:15:02.253000 CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000 CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000 CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000 @@ -250746,6 +250748,9 @@ CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4 CVE-2024-32849,0,0,911a7e29746f175fb19c3c12d66bd3772f826858bf332bb5f36bdbd074fef2ea,2024-06-11T13:54:12.057000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 CVE-2024-32850,0,0,e2d3ad4052fd34b4d59fd5011cddd317b3140c292d5e36efda816fa3450f0d6b,2024-05-31T13:01:46.727000 +CVE-2024-32852,1,1,db13ff0b712913701db49911c3d7620785edc25f890a27edd6c5f95fd85de5f5,2024-07-02T07:15:03.103000 +CVE-2024-32853,1,1,a245542f5af713a07b102c1e7d742bdab775b6098c306089da68b8f4928d8c71,2024-07-02T07:15:03.357000 +CVE-2024-32854,1,1,efc0235dbd68be68b56def999a5df490d60899811bddda4b012d98dd4b4edd36,2024-07-02T07:15:03.593000 CVE-2024-32855,0,0,8cb97336fb50074b0c95cfbd9b638b900dee92e764d86802a9c150ab163d7f17,2024-06-25T12:24:17.873000 CVE-2024-32856,0,0,c66e0032823df2ab62cafb6d5a2421b4fad1250be2cc10f286c67e596ee15268,2024-06-13T18:35:19.777000 CVE-2024-32858,0,0,79d18eec7b44766d877a51554ad6fffacddeb7b9d7d3ee892654656112996acb,2024-06-13T18:35:19.777000 @@ -254010,6 +254015,7 @@ CVE-2024-3993,0,0,60132f24d182886d3025f810ce7decb14e0293094944605569519b576c9039 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 +CVE-2024-3999,1,1,1319f8fa1354f67630d1d25ce7d60b32d7ce47975623d4b4578cc2ef36f46067,2024-07-02T06:15:04.050000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 @@ -254526,6 +254532,7 @@ CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e861 CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000 CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000 CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000 +CVE-2024-4627,1,1,b2a0c060007b6b5302cc084a21ef47fc26d810d1be28ce388f5dbd3e0d902ac6,2024-07-02T06:15:04.400000 CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000 CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000 @@ -254991,6 +254998,7 @@ CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bb CVE-2024-5215,0,0,f42221106c0d0e877d05b8e2e26cf7673e58a6d4a9fc7867210cc0dc29795334,2024-06-26T12:44:29.693000 CVE-2024-5216,0,0,f74916bcde595c5203a7e0644e281dc01f68ce529e1f3e14cc74a2e3eb525ca3,2024-06-25T12:24:17.873000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 +CVE-2024-5219,1,1,3068168a0b26787cbb051f48e31a633a471487d63e18a46f4773372e45d552ab,2024-07-02T07:15:03.853000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 CVE-2024-5221,0,0,6f51797e5b3c0557a37760dbd03fa62a550b475fd63c18dbeda417440e82bc1e,2024-06-11T17:45:05.337000 CVE-2024-5222,0,0,9cd621b08cb54b50b47cb4a9273cbece7a7137c6658b676a1e89f8c7b1f01084,2024-06-11T17:10:40.303000 @@ -255087,7 +255095,7 @@ CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000 CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000 CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000 -CVE-2024-5349,1,1,85557eac67d554f3ce5fd7f8757b2207254b02f98452d8cca1253d1c38939da0,2024-07-02T05:15:10.470000 +CVE-2024-5349,0,0,85557eac67d554f3ce5fd7f8757b2207254b02f98452d8cca1253d1c38939da0,2024-07-02T05:15:10.470000 CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000 CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000 CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000 @@ -255151,7 +255159,7 @@ CVE-2024-5413,0,0,7e9a221441ea2188d01aa42e534f11d3e951030583aa76eb413a65755ac241 CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000 CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000 CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000 -CVE-2024-5419,1,1,aaa3b393659d9c39e0bea3330559e3996e45e38ca74316b1e91752cdcfb0ae53,2024-07-02T04:15:03.417000 +CVE-2024-5419,0,0,aaa3b393659d9c39e0bea3330559e3996e45e38ca74316b1e91752cdcfb0ae53,2024-07-02T04:15:03.417000 CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000 CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000 CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000 @@ -255261,6 +255269,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 +CVE-2024-5606,1,1,bb1c510ec140f988a927cc9d86595b87e8a7e4c6e1307613c6fc14bb665cb482,2024-07-02T06:15:04.760000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000 @@ -255345,6 +255354,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000 +CVE-2024-5767,1,1,ce14c316cc5e9e5289bf9edeae8df0d07b0ec54764f27ea8324646456c36a736,2024-07-02T06:15:05.063000 CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000 CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000 CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000 @@ -255542,6 +255552,7 @@ CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837 CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000 CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000 CVE-2024-6162,0,0,bd502c2e3c0167c78ca1c8188e0261103b8f8aa5eaa8e4a394c72d49dddda11b,2024-06-20T16:07:50.417000 +CVE-2024-6172,1,1,afb53abf9ca965ccafe175b6f0a8122966f8429fa4f90adf58fcdc488f7eda07,2024-07-02T07:15:04.080000 CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000 CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000 CVE-2024-6178,0,0,00ba2b35f2bf326cfb9273c7e4ce551fc75b5ea6ed8191a2797d46901c2c36b7,2024-06-20T15:16:58.507000