diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24856.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24856.json index cb43a436a1b..fb7155cb5db 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24856.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24856.json @@ -2,12 +2,12 @@ "id": "CVE-2024-24856", "sourceIdentifier": "security@openanolis.org", "published": "2024-04-17T09:15:07.743", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-05-29T08:15:33.740", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a\nsuccessful allocation, but the subsequent code directly dereferences the\npointer that receives it, which may lead to null pointer dereference.\n\nTo fix this issue, a null pointer check should be added. If it is null, \nreturn exception code AE_NO_MEMORY.\n\n" + "value": "The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a\nsuccessful allocation, but the subsequent code directly dereferences the\npointer that receives it, which may lead to null pointer dereference.\n\nTo fix this issue, a null pointer check should be added. If it is null, \nreturn exception code AE_NO_MEMORY." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3412.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3412.json new file mode 100644 index 00000000000..342ed72534e --- /dev/null +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3412.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-3412", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-29T09:15:09.103", + "lastModified": "2024-05-29T09:15:09.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP STAGING WordPress Backup Plugin \u2013 Migration Backup Restore plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the wpstg_processing AJAX action in all versions up to, and including, 3.4.3. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3076275/wp-staging/trunk/Framework/Network/AjaxBackupDownloader.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ebb1072-ea05-4914-961d-0d8f20248078?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json new file mode 100644 index 00000000000..bd24a7900a2 --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36015", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-05-29T08:15:33.880", + "lastModified": "2024-05-29T08:15:33.880", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4810.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4810.json index a68021a5f57..345bca4e759 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4810.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4810.json @@ -2,58 +2,14 @@ "id": "CVE-2024-4810", "sourceIdentifier": "security@openanolis.org", "published": "2024-05-14T16:17:35.907", - "lastModified": "2024-05-14T19:17:55.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-29T08:15:33.960", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.\n" - }, - { - "lang": "es", - "value": "En Register_device, el valor de retorno de ida_simple_get no est\u00e1 marcado, por lo que ida_simple_get utilizar\u00e1 un valor de \u00edndice no v\u00e1lido. Para solucionar este problema, se debe verificar el \u00edndice despu\u00e9s de ida_simple_get. Cuando el valor del \u00edndice es anormal, se debe imprimir un mensaje de advertencia, se debe descartar el puerto y se debe registrar el valor." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\nThis CVE has been replaced by\u00a0CVE-2024-36015." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "security@openanolis.org", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 0.8, - "impactScore": 4.0 - } - ] - }, - "weaknesses": [ - { - "source": "security@openanolis.org", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], - "references": [ - { - "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=9008", - "source": "security@openanolis.org" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json new file mode 100644 index 00000000000..69e589872f1 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5086", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-29T08:15:34.060", + "lastModified": "2024-05-29T08:15:34.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Essential Addons for Elementor PRO \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Team Member Carousel widget in all Pro versions up to, and including, 5.8.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://essential-addons.com/changelog/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7773b98-537f-4f4e-98d6-db61d2bffe8c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b2e79ce2264..22d48989267 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-29T08:00:39.757813+00:00 +2024-05-29T10:00:29.760428+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-29T07:15:10.177000+00:00 +2024-05-29T09:15:09.103000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252030 +252033 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `3` -- [CVE-2024-3050](CVE-2024/CVE-2024-30xx/CVE-2024-3050.json) (`2024-05-29T06:18:32.417`) -- [CVE-2024-36014](CVE-2024/CVE-2024-360xx/CVE-2024-36014.json) (`2024-05-29T07:15:10.177`) -- [CVE-2024-3921](CVE-2024/CVE-2024-39xx/CVE-2024-3921.json) (`2024-05-29T06:18:32.520`) -- [CVE-2024-3937](CVE-2024/CVE-2024-39xx/CVE-2024-3937.json) (`2024-05-29T06:18:32.597`) -- [CVE-2024-4419](CVE-2024/CVE-2024-44xx/CVE-2024-4419.json) (`2024-05-29T06:18:32.683`) +- [CVE-2024-3412](CVE-2024/CVE-2024-34xx/CVE-2024-3412.json) (`2024-05-29T09:15:09.103`) +- [CVE-2024-36015](CVE-2024/CVE-2024-360xx/CVE-2024-36015.json) (`2024-05-29T08:15:33.880`) +- [CVE-2024-5086](CVE-2024/CVE-2024-50xx/CVE-2024-5086.json) (`2024-05-29T08:15:34.060`) ### CVEs modified in the last Commit -Recently modified CVEs: `8` +Recently modified CVEs: `2` -- [CVE-2023-25330](CVE-2023/CVE-2023-253xx/CVE-2023-25330.json) (`2024-05-29T07:15:09.457`) -- [CVE-2024-24862](CVE-2024/CVE-2024-248xx/CVE-2024-24862.json) (`2024-05-29T07:15:09.833`) -- [CVE-2024-24863](CVE-2024/CVE-2024-248xx/CVE-2024-24863.json) (`2024-05-29T07:15:09.983`) -- [CVE-2024-26592](CVE-2024/CVE-2024-265xx/CVE-2024-26592.json) (`2024-05-29T06:16:36.020`) -- [CVE-2024-26594](CVE-2024/CVE-2024-265xx/CVE-2024-26594.json) (`2024-05-29T06:16:36.423`) -- [CVE-2024-26622](CVE-2024/CVE-2024-266xx/CVE-2024-26622.json) (`2024-05-29T06:16:40.300`) -- [CVE-2024-35548](CVE-2024/CVE-2024-355xx/CVE-2024-35548.json) (`2024-05-29T07:15:10.090`) -- [CVE-2024-36010](CVE-2024/CVE-2024-360xx/CVE-2024-36010.json) (`2024-05-29T06:18:31.813`) +- [CVE-2024-24856](CVE-2024/CVE-2024-248xx/CVE-2024-24856.json) (`2024-05-29T08:15:33.740`) +- [CVE-2024-4810](CVE-2024/CVE-2024-48xx/CVE-2024-4810.json) (`2024-05-29T08:15:33.960`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7456a7bb097..6fe2081c323 100644 --- a/_state.csv +++ b/_state.csv @@ -218409,7 +218409,7 @@ CVE-2023-2531,0,0,c83dd950c83b61c0fe7562b9760b3effe0a186ead28319873fb98426b3bb74 CVE-2023-25313,0,0,9d5ef8d51e55eeddc9005d2cc360a7c4b52e22678060bea6afc93b08d4e89254,2023-05-04T19:05:02.003000 CVE-2023-25314,0,0,3743d0c9e50521d70cf11419f7682afb137701fa142843839545a4d06772b76a,2023-05-03T20:36:34.593000 CVE-2023-2533,0,0,5b291b5a4da0ce270a0998cf7579a2d92bb41802c75dee372670f3b39c86c5b6,2023-07-06T06:15:09.187000 -CVE-2023-25330,0,1,8429243715bbe0953c6a02830696b3fd9f6ed6ba5431191f567981ef1b995f8f,2024-05-29T07:15:09.457000 +CVE-2023-25330,0,0,8429243715bbe0953c6a02830696b3fd9f6ed6ba5431191f567981ef1b995f8f,2024-05-29T07:15:09.457000 CVE-2023-2534,0,0,cbf2235e236a9fecbc915b515384698385bb8cee3f0db459609fb77cb994f702,2023-05-16T14:13:26.960000 CVE-2023-25341,0,0,fa344079d8be14284c0f6dc2c48e8132fa76a4b5cbfe5a1dfbd5509ee2d24917,2024-03-29T12:45:02.937000 CVE-2023-25344,0,0,70930816741e589876da5cc17dad38d72bdcf8c6364a31653eeeff2e7e5aab9f,2023-03-18T03:50:33.213000 @@ -244552,15 +244552,15 @@ CVE-2024-2485,0,0,53bdabc7d27333b3979a26e76631f61bb2a78db011bf366104f4cb0ce5f9b7 CVE-2024-24850,0,0,652490ba0ed83980506bcf4c7e3a9ad65010ac8cd59cdee6424f69f7b08c43da,2024-04-11T12:47:44.137000 CVE-2024-24851,0,0,89b0ce0e1b89498319283526ccf647e886e1b93dad7360d46d143c4ded486c13,2024-05-28T17:11:55.903000 CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000 -CVE-2024-24856,0,0,3fbede9fb1e1a49098a519a6ab755d5eecca4b4d89d1aee012dd0c022772657b,2024-04-17T12:48:07.510000 +CVE-2024-24856,0,1,897c9d51329abb27267fec6558272306b15cef7c8a7ba7af0923ea3fa5117d63,2024-05-29T08:15:33.740000 CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000 CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000 CVE-2024-24859,0,0,e679ba08f49ce2259e6fae9f7247bb624101b65d866a2698d5f41c0ab1e599e7,2024-02-10T04:06:05.623000 CVE-2024-2486,0,0,20b275da7efa694e75834bad35ce25afdc0896f4e8ec89b73dff1adc38044be1,2024-05-17T02:38:15.227000 CVE-2024-24860,0,0,cc439582f3b205787436e95c2e570817bcdd2c0b521aeea3ff157e2bc11704f7,2024-02-14T19:50:10.803000 CVE-2024-24861,0,0,6b40afdcfeaef4379ad19505bbc3196ca9bd79cff347b2f5b0473b639a0022c5,2024-02-10T04:05:59.040000 -CVE-2024-24862,0,1,af2c1a0f3aae6b0c803a668ceffe7824bd607ed8e7ed1abf8aab616f56b37272,2024-05-29T07:15:09.833000 -CVE-2024-24863,0,1,f9060e23f685b87313f1b9f83084cfae7fe30cbfff18bd587fbc4f8a4d5d1745,2024-05-29T07:15:09.983000 +CVE-2024-24862,0,0,af2c1a0f3aae6b0c803a668ceffe7824bd607ed8e7ed1abf8aab616f56b37272,2024-05-29T07:15:09.833000 +CVE-2024-24863,0,0,f9060e23f685b87313f1b9f83084cfae7fe30cbfff18bd587fbc4f8a4d5d1745,2024-05-29T07:15:09.983000 CVE-2024-24864,0,0,cb2feb3346fb11cc5b4be9ff84c56cdf4de4a5045cdc4255bc9349b2b8259736,2024-02-10T04:05:22.843000 CVE-2024-24865,0,0,69d1d9e6b7dcdc1a41fcca26c5c38135753d56b8f5d02ca0d16d1408ab64d3a6,2024-02-07T23:30:50.313000 CVE-2024-24866,0,0,7234eb10c2179098475da368126463933a93e4c44ee1e87fac56ce5cbea64b85,2024-02-13T19:48:45.207000 @@ -245622,9 +245622,9 @@ CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b75 CVE-2024-2659,0,0,f70d39261e85fb28ecf8b90e66824a1515a67332ae1cb9fb94b78b0878034f3f,2024-04-15T19:12:25.887000 CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000 CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000 -CVE-2024-26592,0,1,195dd56f81d7c1170ff6ffa2e3f15abaac7ab70f9840c18d47f5736f2d0726df,2024-05-29T06:16:36.020000 +CVE-2024-26592,0,0,195dd56f81d7c1170ff6ffa2e3f15abaac7ab70f9840c18d47f5736f2d0726df,2024-05-29T06:16:36.020000 CVE-2024-26593,0,0,98e4a4e90fea8bbd21c17da9b47a219607d5ce75195bf465a61fda95e4390501,2024-04-19T17:58:44.667000 -CVE-2024-26594,0,1,ef8231d71a2530f1046a07ef738b3a2c0e18ee0b67c23c787cb250bae5aa2076,2024-05-29T06:16:36.423000 +CVE-2024-26594,0,0,ef8231d71a2530f1046a07ef738b3a2c0e18ee0b67c23c787cb250bae5aa2076,2024-05-29T06:16:36.423000 CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000 CVE-2024-26596,0,0,ec7de6cfd89ff8a670c626a8cfceb80cf8d6a85a0db935f1a22cdd71fbe71243,2024-04-17T19:54:59.240000 CVE-2024-26597,0,0,c485f672f2d5b1fb393f658111b877d60c67f5a38eb6ee86a5344b881a0760a2,2024-04-17T19:46:28.827000 @@ -245655,7 +245655,7 @@ CVE-2024-26619,0,0,4bc519bd153c025ad692ee69af117d5945ba0b94f5c3e5862c457953e2f5d CVE-2024-2662,0,0,f67fa5f3bbbaf2e8acff0e892a68fc06e4217f99a75dec53361b235392202bd4,2024-05-14T16:13:02.773000 CVE-2024-26620,0,0,d9644d90006553a6ef7df3ce5b7de0b26190c676351738b9b2539bec3ef4ee61,2024-03-12T12:40:13.500000 CVE-2024-26621,0,0,eba0c21ed3ef4cfa6360555e22a44f48e6f6b17a1f446df92f554dd254f62ab7,2024-03-06T23:15:07.297000 -CVE-2024-26622,0,1,03c94fd54466683019f58d6d9d711b02224ce800328499ff39a3516cb5766b31,2024-05-29T06:16:40.300000 +CVE-2024-26622,0,0,03c94fd54466683019f58d6d9d711b02224ce800328499ff39a3516cb5766b31,2024-05-29T06:16:40.300000 CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000 CVE-2024-26624,0,0,9575e38401ed951dd513d0e1852942215c7c9e9bc3c5371fd0da3ac3a0eac967,2024-03-27T14:15:10.163000 CVE-2024-26625,0,0,546958066aac924bfdcd0f2de2dea97f607ed5075b04c8674342940f6016b457,2024-03-06T15:18:08.093000 @@ -248159,7 +248159,7 @@ CVE-2024-30496,0,0,50a31bcaca5773f5ce9c3fdbb31ca64736ba1254cea673c1a7efc11cd4ce0 CVE-2024-30497,0,0,bf99efef4d0af83c364bb0b8a4eb0c3e3d40aa31feb9a4dd43c63dc65056301a,2024-04-01T01:12:59.077000 CVE-2024-30498,0,0,a00a9780c3686a137f3a2bb4db6c83495981e02d4ba83c562afdaf07c2535e5f,2024-04-01T01:12:59.077000 CVE-2024-30499,0,0,5670d73c9b52955b44811b2abb66b835ae33f024bfd3c3fb5761cb97b456a88a,2024-04-01T01:12:59.077000 -CVE-2024-3050,1,1,766d378fed30f0b24d52b027a5b5b87858c78e22c9675eb724493e7c93e1a230,2024-05-29T06:18:32.417000 +CVE-2024-3050,0,0,766d378fed30f0b24d52b027a5b5b87858c78e22c9675eb724493e7c93e1a230,2024-05-29T06:18:32.417000 CVE-2024-30500,0,0,90060ce93d9b777bf408384995deb72e4a1aed07c4c8c982cc42b7b14f216fb8,2024-04-01T01:12:59.077000 CVE-2024-30501,0,0,530b818ec81e31bb69a6f5be968c772a6c6083c65877652c170900d8a15af2c1,2024-04-01T01:12:59.077000 CVE-2024-30502,0,0,b5928ad8d35fd866480848c7df56c8cb1177949affc93071bc57083422f2cfc9,2024-04-01T01:12:59.077000 @@ -250096,6 +250096,7 @@ CVE-2024-34099,0,0,a5986ac74e6b192dfee0f6656002b6da38300bc4846a845af7e18d0e591fa CVE-2024-34100,0,0,d3c0a25a5afbb7abe23e48a0ccffbfabed32f430bdde6425683076da7ff2f5a6,2024-05-15T16:40:19.330000 CVE-2024-34101,0,0,d4650521d311c5f5db989961cb59afe8f4d3fccf28beebc265bb44f9beb6fac8,2024-05-15T16:40:19.330000 CVE-2024-3411,0,0,1527ccef7805d20e12db1e61173246b27470986be341d9b24d7b20f806f94433,2024-04-30T19:35:36.960000 +CVE-2024-3412,1,1,808c3608237160ea0ad09dfb9cc4bede529eac08fd30764882ec95ecfc6f5c36,2024-05-29T09:15:09.103000 CVE-2024-3413,0,0,8bf7e231eaef8a1fb270998ee982f12463c5a7d17ff17eb8735dbc8fc584bd57,2024-05-17T02:39:54.073000 CVE-2024-3414,0,0,69231815197d8c759df4a79a39950c8d4f6258471ea32f1c29be1a7038b6ec47,2024-05-17T02:39:54.160000 CVE-2024-34144,0,0,161e418bd2efea8731bcf0c84ef4939748aabfddbc9f310a20f204f2b5cb4158,2024-05-02T18:00:37.360000 @@ -250623,7 +250624,7 @@ CVE-2024-35510,0,0,30a8df46a3e82cb9a49b6d46388775d9ce22f7a7e041e6f242649c184deb5 CVE-2024-35511,0,0,ea6bec715c2be1f1847939bb60dceb6055099d28a5c25a139fb3576085be396e,2024-05-28T21:16:31.610000 CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000 CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000 -CVE-2024-35548,0,1,2d0ca9edc7a874f33d1226e7d1c2f7a404f55a606727ef2c3eff75addcf60e66,2024-05-29T07:15:10.090000 +CVE-2024-35548,0,0,2d0ca9edc7a874f33d1226e7d1c2f7a404f55a606727ef2c3eff75addcf60e66,2024-05-29T07:15:10.090000 CVE-2024-35550,0,0,b3c85fa0d88560018d8c46302ba1cba82a3adc9c9d9315f8092c405b1f662d91,2024-05-22T14:30:41.953000 CVE-2024-35551,0,0,bced5ed716b8a6cde6b8827aca76efe4aa3a304eed485f9c2d1140453267c787,2024-05-22T14:30:41.953000 CVE-2024-35552,0,0,f6913d712c73cbd84cae10dae0421fd278caa25b1bc3c8cb3704337f3de4daaa,2024-05-22T14:30:41.953000 @@ -250907,11 +250908,12 @@ CVE-2024-36007,0,0,bace6d01e45fd1ccafc8d859aedf7a749eac210227e433ff869d7163c2def CVE-2024-36008,0,0,b493791ac38e9bce379fffa8527fb1375e336955ef4e0593e57b93fb98dda20a,2024-05-24T01:12:07.637000 CVE-2024-36009,0,0,15f923bced529676a5fe31919731b4b2cf86d40903d825546adc2d3dde1279bb,2024-05-20T13:00:04.957000 CVE-2024-3601,0,0,fc79ccecd0a0bbb79cd9c210153588f7d4590d9827348da641a07d91a9dbdb6c,2024-05-02T18:00:37.360000 -CVE-2024-36010,0,1,2843e205b9e9b17b5fb3357cdae71842164efb1f33700d0fc205102dad316114,2024-05-29T06:18:31.813000 +CVE-2024-36010,0,0,2843e205b9e9b17b5fb3357cdae71842164efb1f33700d0fc205102dad316114,2024-05-29T06:18:31.813000 CVE-2024-36011,0,0,abd5638cc1cfdef36e14f7c96bf2fc845d42601d602cfe73690b22754ed47103,2024-05-24T01:15:30.977000 CVE-2024-36012,0,0,99a87dfc7b0fc5371c51d11442e2aebe0c642c881f6f8e57147716a4b47febdf,2024-05-24T01:15:30.977000 CVE-2024-36013,0,0,1251c8e9d1d9ec0619ca01193822062d3235b343811763ddc34f761263e594d9,2024-05-25T15:15:09.070000 -CVE-2024-36014,1,1,3db48460f39cbfe864f0cd3d4eec25a191e3786109e567e9a2f29b0bd37dcb87,2024-05-29T07:15:10.177000 +CVE-2024-36014,0,0,3db48460f39cbfe864f0cd3d4eec25a191e3786109e567e9a2f29b0bd37dcb87,2024-05-29T07:15:10.177000 +CVE-2024-36015,1,1,4952b5d2980b7546732c91617b2923f556e4e452adb6aaf39757cf3c2e89ba5f,2024-05-29T08:15:33.880000 CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000 CVE-2024-36037,0,0,0f6f02ecbfa932c634fa472570a56c7201914f9b8fefa1f5fa9e003f7709a6de,2024-05-28T12:39:28.377000 CVE-2024-36039,0,0,a8363180f0299206d54e6558901cb5cddfc68c9874309661faf6b2f8a76377e4,2024-05-21T16:53:56.550000 @@ -251188,7 +251190,7 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e CVE-2024-3917,0,0,55f83f03b9292263c532dbe29e254e7b9925f1a39645bd6835596489dfabe52b,2024-05-24T01:15:30.977000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 -CVE-2024-3921,1,1,1f8fb938865eab4024c2213594e914f80476f767de3f6eadbfc5f075c50f861b,2024-05-29T06:18:32.520000 +CVE-2024-3921,0,0,1f8fb938865eab4024c2213594e914f80476f767de3f6eadbfc5f075c50f861b,2024-05-29T06:18:32.520000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,b62a8fbb5cbf577eaf3c7a81b1c47c6d426f2a5dda5ebe7d2d0cc2ac17b12044,2024-05-22T12:46:53.887000 @@ -251198,7 +251200,7 @@ CVE-2024-3931,0,0,e22ac9b330de34ffd0826895a71fc25f4c0d9f18776ea985f00f3d67211768 CVE-2024-3932,0,0,c0d9a67b2c517f2563118cc1f9a01d2e8e41cb18884f915915898eddf3b5dc57,2024-05-17T02:40:11.913000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 -CVE-2024-3937,1,1,a49ec8b802ceeb0dd9d8e7b5651deefffbfd5355c0434e742b9cff0bf1e3dd23,2024-05-29T06:18:32.597000 +CVE-2024-3937,0,0,a49ec8b802ceeb0dd9d8e7b5651deefffbfd5355c0434e742b9cff0bf1e3dd23,2024-05-29T06:18:32.597000 CVE-2024-3939,0,0,8db4cbfcc78e197894431199cdad6af4ac1ac13ee2f1028e231ba1f907931766,2024-05-28T12:39:28.377000 CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000 CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000 @@ -251477,7 +251479,7 @@ CVE-2024-4411,0,0,c7fa179581fd2f838a938c9431cc636dd9fa2af2bec9103de58ade770f105c CVE-2024-4413,0,0,cca9f27cd31d87a0c2b601e673b97ef7118798e076ad06575846010a4eaaeef8,2024-05-14T16:11:39.510000 CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d8642e,2024-05-14T16:11:39.510000 CVE-2024-4418,0,0,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000 -CVE-2024-4419,1,1,75e6d9506c469113ec5e7e7712e1f57237b35224021d929f8bda4b3d8c186420,2024-05-29T06:18:32.683000 +CVE-2024-4419,0,0,75e6d9506c469113ec5e7e7712e1f57237b35224021d929f8bda4b3d8c186420,2024-05-29T06:18:32.683000 CVE-2024-4420,0,0,9b75921df8e16106b48e4c0d4f1fc07ba699b6ee751657d557cf95a2815ddc11,2024-05-21T12:37:59.687000 CVE-2024-4423,0,0,e0dbe4a46d2bfb02a06f5f6dd7941b892a0e354e08a517bf9732a9750b61686d,2024-05-14T16:11:39.510000 CVE-2024-4424,0,0,620360b6d69d7e46500e9eab3db8f094f558ee3037a5afde7000ad6722a43c71,2024-05-14T16:11:39.510000 @@ -251735,7 +251737,7 @@ CVE-2024-4806,0,0,4e56c9b468f84644ee0c3a9a9256fa476661f20e49725816cd22e89dc4f764 CVE-2024-4807,0,0,74f269c7d4930b1f3eee7b1fb82118d4f176724bf215c5880f6d1ab89e9e8d80,2024-05-17T02:40:38.770000 CVE-2024-4808,0,0,31aace84eb5cf8ae7b33b4f67a8927defaac7e795c19b6dbc527982928e508d3,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,7d320268a192d6a7e649c019bd6d23f956e23a8f483ed33433feed7e66ef6c5b,2024-05-17T02:40:38.980000 -CVE-2024-4810,0,0,edf593532b54467cd93e16980d17d484559f142f639b53611ad866b57c4f744e,2024-05-14T19:17:55.627000 +CVE-2024-4810,0,1,c71ec4cc1ddb906248abb5b717b1e9cae79dac31d38b7ef77deffef387924854,2024-05-29T08:15:33.960000 CVE-2024-4813,0,0,84e805e8542cdd6b2e1d55ac1682e91ebda69e1619200c06c67c6116bd5311de,2024-05-17T02:40:39.120000 CVE-2024-4814,0,0,330d0ef424c4ec1d706471f27d8befcd6dd2c156d29d4da8bd7fc8e35812f0c3,2024-05-17T02:40:39.217000 CVE-2024-4815,0,0,9ecee40ac47d938a93e4403bd52dbf0a6aee8b0bb4e3465c2a0b732376379b40,2024-05-17T02:40:39.313000 @@ -251862,6 +251864,7 @@ CVE-2024-5069,0,0,ba08e8e8bcbfda52deadb370fc7ea1815ec75d330a1a6cac8b3535eedbca52 CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000 CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,e4f2e80bdbf4fc55d46c60837ef7c898ce9ad88d4ef317ea9d17542cafaf4d9d,2024-05-24T01:15:30.977000 +CVE-2024-5086,1,1,fa76696464e3153e3a730d5a0f8ed154d35a1cd780c99bcc10b42598f97b6968,2024-05-29T08:15:34.060000 CVE-2024-5088,0,0,670ed03c49211ecb2fb7d707640c3762718821887df98f6c48b414573abc37eb,2024-05-20T13:00:34.807000 CVE-2024-5092,0,0,42d960073f235db3a1d896466f3bea026be5b117dc5effbb8a82da60874fb373,2024-05-22T12:46:53.887000 CVE-2024-5093,0,0,43583e5d5599318ca8361e11df2b1426cf64062056b890908733810061229db5,2024-05-20T13:00:34.807000