From c60b9af2a05267d25c367e8a0acbb1f99587798b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 2 Jul 2024 22:04:23 +0000 Subject: [PATCH] Auto-Update: 2024-07-02T22:01:30.378301+00:00 --- CVE-2021/CVE-2021-428xx/CVE-2021-42860.json | 10 +- CVE-2021/CVE-2021-472xx/CVE-2021-47285.json | 46 +------ CVE-2022/CVE-2022-290xx/CVE-2022-29072.json | 10 +- CVE-2022/CVE-2022-296xx/CVE-2022-29622.json | 10 +- CVE-2022/CVE-2022-306xx/CVE-2022-30636.json | 29 +++++ CVE-2023/CVE-2023-245xx/CVE-2023-24531.json | 37 ++++++ CVE-2024/CVE-2024-383xx/CVE-2024-38391.json | 22 +--- CVE-2024/CVE-2024-385xx/CVE-2024-38537.json | 72 ++++++++++ CVE-2024/CVE-2024-393xx/CVE-2024-39315.json | 60 +++++++++ CVE-2024/CVE-2024-393xx/CVE-2024-39322.json | 76 +++++++++++ CVE-2024/CVE-2024-393xx/CVE-2024-39324.json | 76 +++++++++++ CVE-2024/CVE-2024-393xx/CVE-2024-39325.json | 76 +++++++++++ CVE-2024/CVE-2024-393xx/CVE-2024-39326.json | 64 +++++++++ CVE-2024/CVE-2024-393xx/CVE-2024-39362.json | 26 +--- CVE-2024/CVE-2024-64xx/CVE-2024-6452.json | 137 ++++++++++++++++++++ README.md | 54 +++----- _state.csv | 79 ++++++----- 17 files changed, 733 insertions(+), 151 deletions(-) create mode 100644 CVE-2022/CVE-2022-306xx/CVE-2022-30636.json create mode 100644 CVE-2023/CVE-2023-245xx/CVE-2023-24531.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38537.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39315.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39322.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39324.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39325.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39326.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6452.json diff --git a/CVE-2021/CVE-2021-428xx/CVE-2021-42860.json b/CVE-2021/CVE-2021-428xx/CVE-2021-42860.json index 8724c944f27..bb493087590 100644 --- a/CVE-2021/CVE-2021-428xx/CVE-2021-42860.json +++ b/CVE-2021/CVE-2021-428xx/CVE-2021-42860.json @@ -2,8 +2,16 @@ "id": "CVE-2021-42860", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-26T12:15:07.693", - "lastModified": "2024-05-17T02:01:40.627", + "lastModified": "2024-07-02T21:15:10.270", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47285.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47285.json index 9fa79f6c289..f543b8fe2d0 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47285.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47285.json @@ -2,51 +2,15 @@ "id": "CVE-2021-47285", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:16.653", - "lastModified": "2024-05-21T16:54:26.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-02T20:15:04.637", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/nfc/rawsock.c: fix a permission check bug\n\nThe function rawsock_create() calls a privileged function sk_alloc(), which requires a ns-aware check to check net->user_ns, i.e., ns_capable(). However, the original code checks the init_user_ns using capable(). So we replace the capable() with ns_capable()." - }, - { - "lang": "es", - "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/nfc/rawsock.c: corrige un error de verificaci\u00f3n de permisos. La funci\u00f3n rawsock_create() llama a una funci\u00f3n privilegiada sk_alloc(), que requiere una verificaci\u00f3n ns-aware para verificar net-> user_ns, es decir, ns_capable(). Sin embargo, el c\u00f3digo original verifica init_user_ns usando able(). Entonces reemplazamos el capaz() con ns_capable()." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/1e5cab50208c8fb7351b798cb1d569debfeb994a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/38cb2e23188af29c43966acee9dbb18b62e26cfe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/8ab78863e9eff11910e1ac8bcf478060c29b379e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/90d0a3c76965d7a10fc87c07be3e9714e2130d5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/c08e0be44759d0b5affc5888be4aa5e536873335", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/ec72482564ff99c6832d33610d9f8ab7ecc81b6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29072.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29072.json index 45059a463f7..5c15f117d0b 100644 --- a/CVE-2022/CVE-2022-290xx/CVE-2022-29072.json +++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29072.json @@ -2,8 +2,16 @@ "id": "CVE-2022-29072", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-15T20:15:12.313", - "lastModified": "2024-05-17T02:08:03.793", + "lastModified": "2024-07-02T20:15:05.033", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-296xx/CVE-2022-29622.json b/CVE-2022/CVE-2022-296xx/CVE-2022-29622.json index 7d7559d2899..828fd093e74 100644 --- a/CVE-2022/CVE-2022-296xx/CVE-2022-29622.json +++ b/CVE-2022/CVE-2022-296xx/CVE-2022-29622.json @@ -2,8 +2,16 @@ "id": "CVE-2022-29622", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-16T14:15:08.027", - "lastModified": "2024-05-17T02:08:19.550", + "lastModified": "2024-07-02T21:15:10.390", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-306xx/CVE-2022-30636.json b/CVE-2022/CVE-2022-306xx/CVE-2022-30636.json new file mode 100644 index 00000000000..2449228e897 --- /dev/null +++ b/CVE-2022/CVE-2022-306xx/CVE-2022-30636.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2022-30636", + "sourceIdentifier": "security@golang.org", + "published": "2024-07-02T20:15:05.173", + "lastModified": "2024-07-02T20:15:05.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\\..\\asd becomes ..\\..\\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://go.dev/cl/408694", + "source": "security@golang.org" + }, + { + "url": "https://go.dev/issue/53082", + "source": "security@golang.org" + }, + { + "url": "https://pkg.go.dev/vuln/GO-2024-2961", + "source": "security@golang.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json new file mode 100644 index 00000000000..daaba142b0f --- /dev/null +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2023-24531", + "sourceIdentifier": "security@golang.org", + "published": "2024-07-02T20:15:05.270", + "lastModified": "2024-07-02T20:15:05.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making \"go env\" print them out." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://go.dev/cl/488375", + "source": "security@golang.org" + }, + { + "url": "https://go.dev/cl/493535", + "source": "security@golang.org" + }, + { + "url": "https://go.dev/issue/58508", + "source": "security@golang.org" + }, + { + "url": "https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ", + "source": "security@golang.org" + }, + { + "url": "https://pkg.go.dev/vuln/GO-2024-2962", + "source": "security@golang.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38391.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38391.json index 262ef2ff74f..efab6379919 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38391.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38391.json @@ -2,27 +2,15 @@ "id": "CVE-2024-38391", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:11.030", - "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-02T20:15:05.730", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/region: Fix cxlr_pmem leaks\n\nBefore this error path, cxlr_pmem pointed to a kzalloc() memory, free\nit to avoid this memory leaking." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/1c987cf22d6b65ade46145c03eef13f0e3e81d83", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/24b9362c9fa57f9291b380a3cc77b8b5c9fa27da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/eef8d414b07a1e85c1367324fb6c6a46b79269bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38537.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38537.json new file mode 100644 index 00000000000..16237f371a5 --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38537.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-38537", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-02T20:15:05.860", + "lastModified": "2024-07-02T20:15:05.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Fides is an open-source privacy engineering platform. `fides.js`, a client-side script used to interact with the consent management features of Fides, used the `polyfill.io` domain in a very limited edge case, when it detected a legacy browser such as IE11 that did not support the fetch standard. Therefore it was possible for users of legacy, pre-2017 browsers who navigate to a page serving `fides.js` to download and execute malicious scripts from the `polyfill.io` domain when the domain was compromised and serving malware. No exploitation of `fides.js` via `polyfill.io` has been identified as of time of publication.\n\nThe vulnerability has been patched in Fides version `2.39.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. On Thursday, June 27, 2024, Cloudflare and Namecheap intervened at a domain level to ensure `polyfill.io` and its subdomains could not resolve to the compromised service, rendering this vulnerability unexploitable. Prior to the domain level intervention, there were no server-side workarounds and the confidentiality, integrity, and availability impacts of this vulnerability were high. Clients could ensure they were not affected by using a modern browser that supported the fetch standard." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], + "references": [ + { + "url": "https://fetch.spec.whatwg.org", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ethyca/fides/commit/868c4d629760572192bd61db34f5a4458ed12005", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ethyca/fides/pull/5026", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ethyca/fides/security/advisories/GHSA-cvw4-c69g-7v7m", + "source": "security-advisories@github.com" + }, + { + "url": "https://sansec.io/research/polyfill-supply-chain-attack", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json new file mode 100644 index 00000000000..25bc46a19da --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39315", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-02T20:15:06.110", + "lastModified": "2024-07-02T20:15:06.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json new file mode 100644 index 00000000000..d1294f5da90 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-39322", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-02T21:15:10.997", + "lastModified": "2024-07-02T21:15:10.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "aimeos/ai-admin-jsonadm is the Aimeos e-commerce JSON API for administrative tasks. In versions prior to 2020.10.13, 2021.10.6, 2022.10.3, 2023.10.4, and 2024.4.2, improper access control allows editors to remove admin group and locale configuration in the Aimeos backend. Versions 2020.10.13, 2021.10.6, 2022.10.3, 2023.10.4, and 2024.4.2 contain a fix for the issue.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/02a063fbd616d4e0a5aaf89f1642a856aa5ac5a5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/16d013d0e28cecd19781f434d83fabebcc78cdc2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/4c966e02bd52589c3c9382777cfe170eddf17b00", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/640954243ce85c2c303a00dd6481ed39b3d218fb", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/7d1c05e8368b0a6419820fe402deac9960500026", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-jsonadm/security/advisories/GHSA-8fj2-587w-5whr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json new file mode 100644 index 00000000000..c4f6c929b48 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-39324", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-02T21:15:11.213", + "lastModified": "2024-07-02T21:15:11.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "aimeos/ai-admin-graphql is the Aimeos GraphQL API admin interface. Starting in version 2022.04.1 and prior to versions 2022.10.10, 2023.10.6, and 2024.4.2, improper access control allows a editors to manage own services via GraphQL API which isn't allowed in the JQAdm front end. Versions 2022.10.10, 2023.10.6, and 2024.4.2 contain a patch for the issue.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aimeos/ai-admin-graphql/commit/4eabc2b973509ffa5924e7f88c8f87ee96e93b38", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-graphql/commit/687059d7eb2e1d55a09ed72dad3814f35edad038", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-graphql/commit/a839a5adf16fee4221d444b7d2f5140d8cabf0ac", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-graphql/commit/acbb044620f4ff8e8d78a775cd205ec47cf119b3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-admin-graphql/security/advisories/GHSA-jj68-cp4v-98qf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json new file mode 100644 index 00000000000..e6de06efdff --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-39325", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-02T21:15:11.433", + "lastModified": "2024-07-02T21:15:11.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "aimeos/ai-controller-frontend is the Aimeos frontend controller. Prior to versions 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15, aimeos/ai-controller-frontend doesn't reset the payment status of a user's basket after the user completes a purchase. Versions 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15 fix this issue.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-841" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aimeos/ai-controller-frontend/commit/16b8837d2466e3665b3c826ce87934b01a847268", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-controller-frontend/commit/24a57001e56759d1582d2a0080fc1ca3ba328630", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-controller-frontend/commit/28549808e0f6432a34cd3fb95556deeb86ca276d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-controller-frontend/commit/b1960c0b6e5ee93111a5360c9ce949b3e7528cf7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-controller-frontend/commit/dafa072783bb692f111ed092d9d2932c113eb855", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aimeos/ai-controller-frontend/security/advisories/GHSA-m9gv-6p22-qgmj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39326.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39326.json new file mode 100644 index 00000000000..0fa4ccd1bc4 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39326.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-39326", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-02T21:15:11.657", + "lastModified": "2024-07-02T21:15:11.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SkillTree is a micro-learning gamification platform. Prior to version 2.12.6, the endpoint \n`/admin/projects/{projectname}/skills/{skillname}/video` (and probably others) is open to a cross-site request forgery (CSRF) vulnerability. Due to the endpoint being CSRFable e.g POST request, supports a content type that can be exploited (multipart file upload), makes a state change and has no CSRF mitigations in place (samesite flag, CSRF token). It is possible to perform a CSRF attack against a logged in admin account, allowing an attacker that can target a logged in admin of Skills Service to modify the videos, captions, and text of the skill. Version 2.12.6 contains a patch for this issue.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NationalSecurityAgency/skills-service/blob/24dd22f43306fc616e4580fb8bb88f66b5d9b41d/service/src/main/java/skills/controller/AdminController.groovy#L574", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NationalSecurityAgency/skills-service/commit/68d4235ddcb16e4f33fc7f19d14ff917817a366c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NationalSecurityAgency/skills-service/security/advisories/GHSA-9624-qwxr-jr4j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39362.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39362.json index f8a2de4214e..74ffee0c9a0 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39362.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39362.json @@ -2,31 +2,15 @@ "id": "CVE-2024-39362", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.327", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-02T20:15:06.353", + "vulnStatus": "Rejected", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: acpi: Unbind mux adapters before delete\n\nThere is an issue with ACPI overlay table removal specifically related\nto I2C multiplexers.\n\nConsider an ACPI SSDT Overlay that defines a PCA9548 I2C mux on an\nexisting I2C bus. When this table is loaded we see the creation of a\ndevice for the overall PCA9548 chip and 8 further devices - one\ni2c_adapter each for the mux channels. These are all bound to their\nACPI equivalents via an eventual invocation of acpi_bind_one().\n\nWhen we unload the SSDT overlay we run into the problem. The ACPI\ndevices are deleted as normal via acpi_device_del_work_fn() and the\nacpi_device_del_list.\n\nHowever, the following warning and stack trace is output as the\ndeletion does not go smoothly:\n------------[ cut here ]------------\nkernfs: can not remove 'physical_node', no directory\nWARNING: CPU: 1 PID: 11 at fs/kernfs/dir.c:1674 kernfs_remove_by_name_ns+0xb9/0xc0\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u128:0 Not tainted 6.8.0-rc6+ #1\nHardware name: congatec AG conga-B7E3/conga-B7E3, BIOS 5.13 05/16/2023\nWorkqueue: kacpi_hotplug acpi_device_del_work_fn\nRIP: 0010:kernfs_remove_by_name_ns+0xb9/0xc0\nCode: e4 00 48 89 ef e8 07 71 db ff 5b b8 fe ff ff ff 5d 41 5c 41 5d e9 a7 55 e4 00 0f 0b eb a6 48 c7 c7 f0 38 0d 9d e8 97 0a d5 ff <0f> 0b eb dc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90\nRSP: 0018:ffff9f864008fb28 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8ef90a8d4940 RCX: 0000000000000000\nRDX: ffff8f000e267d10 RSI: ffff8f000e25c780 RDI: ffff8f000e25c780\nRBP: ffff8ef9186f9870 R08: 0000000000013ffb R09: 00000000ffffbfff\nR10: 00000000ffffbfff R11: ffff8f000e0a0000 R12: ffff9f864008fb50\nR13: ffff8ef90c93dd60 R14: ffff8ef9010d0958 R15: ffff8ef9186f98c8\nFS: 0000000000000000(0000) GS:ffff8f000e240000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f48f5253a08 CR3: 00000003cb82e000 CR4: 00000000003506f0\nCall Trace:\n \n ? kernfs_remove_by_name_ns+0xb9/0xc0\n ? __warn+0x7c/0x130\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n ? report_bug+0x171/0x1a0\n ? handle_bug+0x3c/0x70\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n acpi_unbind_one+0x108/0x180\n device_del+0x18b/0x490\n ? srso_return_thunk+0x5/0x5f\n ? srso_return_thunk+0x5/0x5f\n device_unregister+0xd/0x30\n i2c_del_adapter.part.0+0x1bf/0x250\n i2c_mux_del_adapters+0xa1/0xe0\n i2c_device_remove+0x1e/0x80\n device_release_driver_internal+0x19a/0x200\n bus_remove_device+0xbf/0x100\n device_del+0x157/0x490\n ? __pfx_device_match_fwnode+0x10/0x10\n ? srso_return_thunk+0x5/0x5f\n device_unregister+0xd/0x30\n i2c_acpi_notify+0x10f/0x140\n notifier_call_chain+0x58/0xd0\n blocking_notifier_call_chain+0x3a/0x60\n acpi_device_del_work_fn+0x85/0x1d0\n process_one_work+0x134/0x2f0\n worker_thread+0x2f0/0x410\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe3/0x110\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2f/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n \n---[ end trace 0000000000000000 ]---\n...\nrepeated 7 more times, 1 for each channel of the mux\n...\n\nThe issue is that the binding of the ACPI devices to their peer I2C\nadapters is not correctly cleaned up. Digging deeper into the issue we\nsee that the deletion order is such that the ACPI devices matching the\nmux channel i2c adapters are deleted first during the SSDT overlay\nremoval. For each of the channels we see a call to i2c_acpi_notify()\nwith ACPI_RECONFIG_DEVICE_REMOVE but, because these devices are not\nactually i2c_clients, nothing is done for them.\n\nLater on, after each of the mux channels has been dealt with, we come\nto delete the i2c_client representing the PCA9548 device. This is the\ncall stack we see above, whereby the kernel cleans up the i2c_client\nincluding destruction of the mux and its channel adapters. At this\npoint we do attempt to unbind from the ACPI peers but those peers \n---truncated---" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/3f858bbf04dbac934ac279aaee05d49eb9910051", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4f08050a47a59d199e214d711b989bb4f5150373", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/90dd0592b3b005d6f15c4e23e1364d3ae95e588d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b1574c8c0a80bd587a7651bf64f00be1f5391d27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6452.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6452.json new file mode 100644 index 00000000000..d2bd26b2f50 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6452.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-6452", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-02T20:15:06.860", + "lastModified": "2024-07-02T20:15:06.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file AdminGoodscontroller.java. The manipulation of the argument goodsId/goodsSn/name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270235." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/linlinjava/litemall/issues/548", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.270235", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.270235", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.367635", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a75f5f4ad7b..472c718db05 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-02T20:00:31.367819+00:00 +2024-07-02T22:01:30.378301+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-02T19:15:12.773000+00:00 +2024-07-02T21:15:11.657000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255774 +255783 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `9` -- [CVE-2022-25477](CVE-2022/CVE-2022-254xx/CVE-2022-25477.json) (`2024-07-02T19:15:11.757`) -- [CVE-2022-25478](CVE-2022/CVE-2022-254xx/CVE-2022-25478.json) (`2024-07-02T19:15:11.870`) -- [CVE-2022-25479](CVE-2022/CVE-2022-254xx/CVE-2022-25479.json) (`2024-07-02T19:15:11.957`) -- [CVE-2022-25480](CVE-2022/CVE-2022-254xx/CVE-2022-25480.json) (`2024-07-02T19:15:12.037`) -- [CVE-2024-39206](CVE-2024/CVE-2024-392xx/CVE-2024-39206.json) (`2024-07-02T18:15:03.290`) -- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-02T18:15:03.447`) -- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-02T18:15:03.710`) -- [CVE-2024-6341](CVE-2024/CVE-2024-63xx/CVE-2024-6341.json) (`2024-07-02T18:15:03.900`) -- [CVE-2024-6381](CVE-2024/CVE-2024-63xx/CVE-2024-6381.json) (`2024-07-02T18:15:03.963`) -- [CVE-2024-6382](CVE-2024/CVE-2024-63xx/CVE-2024-6382.json) (`2024-07-02T18:15:04.337`) +- [CVE-2022-30636](CVE-2022/CVE-2022-306xx/CVE-2022-30636.json) (`2024-07-02T20:15:05.173`) +- [CVE-2023-24531](CVE-2023/CVE-2023-245xx/CVE-2023-24531.json) (`2024-07-02T20:15:05.270`) +- [CVE-2024-38537](CVE-2024/CVE-2024-385xx/CVE-2024-38537.json) (`2024-07-02T20:15:05.860`) +- [CVE-2024-39315](CVE-2024/CVE-2024-393xx/CVE-2024-39315.json) (`2024-07-02T20:15:06.110`) +- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-07-02T21:15:10.997`) +- [CVE-2024-39324](CVE-2024/CVE-2024-393xx/CVE-2024-39324.json) (`2024-07-02T21:15:11.213`) +- [CVE-2024-39325](CVE-2024/CVE-2024-393xx/CVE-2024-39325.json) (`2024-07-02T21:15:11.433`) +- [CVE-2024-39326](CVE-2024/CVE-2024-393xx/CVE-2024-39326.json) (`2024-07-02T21:15:11.657`) +- [CVE-2024-6452](CVE-2024/CVE-2024-64xx/CVE-2024-6452.json) (`2024-07-02T20:15:06.860`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` +Recently modified CVEs: `6` -- [CVE-2017-20012](CVE-2017/CVE-2017-200xx/CVE-2017-20012.json) (`2024-07-02T19:15:10.913`) -- [CVE-2021-40978](CVE-2021/CVE-2021-409xx/CVE-2021-40978.json) (`2024-07-02T18:15:03.000`) -- [CVE-2021-43574](CVE-2021/CVE-2021-435xx/CVE-2021-43574.json) (`2024-07-02T19:15:11.297`) -- [CVE-2021-45364](CVE-2021/CVE-2021-453xx/CVE-2021-45364.json) (`2024-07-02T19:15:11.420`) -- [CVE-2021-45952](CVE-2021/CVE-2021-459xx/CVE-2021-45952.json) (`2024-07-02T19:15:11.557`) -- [CVE-2022-25514](CVE-2022/CVE-2022-255xx/CVE-2022-25514.json) (`2024-07-02T19:15:12.117`) -- [CVE-2022-25517](CVE-2022/CVE-2022-255xx/CVE-2022-25517.json) (`2024-07-02T19:15:12.233`) -- [CVE-2023-5038](CVE-2023/CVE-2023-50xx/CVE-2023-5038.json) (`2024-07-02T18:09:41.080`) -- [CVE-2024-34596](CVE-2024/CVE-2024-345xx/CVE-2024-34596.json) (`2024-07-02T18:04:25.130`) -- [CVE-2024-34597](CVE-2024/CVE-2024-345xx/CVE-2024-34597.json) (`2024-07-02T18:04:57.147`) -- [CVE-2024-34599](CVE-2024/CVE-2024-345xx/CVE-2024-34599.json) (`2024-07-02T18:05:26.327`) -- [CVE-2024-34600](CVE-2024/CVE-2024-346xx/CVE-2024-34600.json) (`2024-07-02T18:05:54.487`) -- [CVE-2024-34601](CVE-2024/CVE-2024-346xx/CVE-2024-34601.json) (`2024-07-02T18:07:05.737`) -- [CVE-2024-4268](CVE-2024/CVE-2024-42xx/CVE-2024-4268.json) (`2024-07-02T18:08:17.817`) -- [CVE-2024-6011](CVE-2024/CVE-2024-60xx/CVE-2024-6011.json) (`2024-07-02T18:07:31.577`) -- [CVE-2024-6012](CVE-2024/CVE-2024-60xx/CVE-2024-6012.json) (`2024-07-02T18:07:54.430`) -- [CVE-2024-6088](CVE-2024/CVE-2024-60xx/CVE-2024-6088.json) (`2024-07-02T18:08:38.550`) -- [CVE-2024-6099](CVE-2024/CVE-2024-60xx/CVE-2024-6099.json) (`2024-07-02T18:08:53.233`) -- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-02T19:15:12.773`) +- [CVE-2021-42860](CVE-2021/CVE-2021-428xx/CVE-2021-42860.json) (`2024-07-02T21:15:10.270`) +- [CVE-2021-47285](CVE-2021/CVE-2021-472xx/CVE-2021-47285.json) (`2024-07-02T20:15:04.637`) +- [CVE-2022-29072](CVE-2022/CVE-2022-290xx/CVE-2022-29072.json) (`2024-07-02T20:15:05.033`) +- [CVE-2022-29622](CVE-2022/CVE-2022-296xx/CVE-2022-29622.json) (`2024-07-02T21:15:10.390`) +- [CVE-2024-38391](CVE-2024/CVE-2024-383xx/CVE-2024-38391.json) (`2024-07-02T20:15:05.730`) +- [CVE-2024-39362](CVE-2024/CVE-2024-393xx/CVE-2024-39362.json) (`2024-07-02T20:15:06.353`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fbbbf114e66..e5d5e0574b5 100644 --- a/_state.csv +++ b/_state.csv @@ -102325,7 +102325,7 @@ CVE-2017-20007,0,0,1ef2d7c0fb54f5a141b1f6731bc589cb69df6baf5e7320d99c31d3f3ea4ac CVE-2017-20008,0,0,88f84d0f419302bafac197fc514089eea45eaa5cd48d23d163fb1663bbd4e1ee,2021-11-29T19:29:06.613000 CVE-2017-2001,0,0,312a92e77c3ddf8cb9ab8d8feabaa1fcb4cfba105f2e50663b3a5c78da15ef11,2023-11-07T02:43:26.440000 CVE-2017-20011,0,0,e3df82239d4cb8be8a96b66406f511a287f7d90f2e2c52c8a54e86ffccd2b3bf,2024-05-17T01:17:17.850000 -CVE-2017-20012,0,1,637e2f46326ae880f717725b687e4c18ac5948369e41c6c17aff8d1a5f20a7c2,2024-07-02T19:15:10.913000 +CVE-2017-20012,0,0,637e2f46326ae880f717725b687e4c18ac5948369e41c6c17aff8d1a5f20a7c2,2024-07-02T19:15:10.913000 CVE-2017-20013,0,0,0bf0b14bc1cc2fd50dcb605df434cc792523e7553968d30f83316b5b34b67926,2024-06-06T17:15:49.113000 CVE-2017-20014,0,0,053fcf47daf469f634007239b24248182464fa12d850d4afabc39368dee59ca8,2024-05-17T01:17:18.230000 CVE-2017-20015,0,0,6553b6770018959593405cf9a98bb61f61d76597d96c3fb4084ef993db17840e,2024-05-17T01:17:18.420000 @@ -182580,7 +182580,7 @@ CVE-2021-40971,0,0,62e8cd79ac0d2c99f092d1dd3e1a2071d09df91eca6efb1fd7c5dbebf041c CVE-2021-40972,0,0,e2d887ff9f27740bfd2a2cc80eebbd80933d3565a6b0acbed8044b548dd49e7d,2021-10-04T17:15:49.503000 CVE-2021-40973,0,0,f81499affd2c45bd4c194146d61aa100e856705701a5f8334d093c18dc177698,2021-10-04T17:15:20.627000 CVE-2021-40975,0,0,d3067b5333ad341ead9b157fdbbd9db337a9fe5fe8efd49372ec536ea04bddac,2021-10-04T17:10:37.283000 -CVE-2021-40978,0,1,426761cc8ac574b3c8476a90a0500155bc865266ca70c7b7fd8c0b1cd9299dac,2024-07-02T18:15:03 +CVE-2021-40978,0,0,426761cc8ac574b3c8476a90a0500155bc865266ca70c7b7fd8c0b1cd9299dac,2024-07-02T18:15:03 CVE-2021-4098,0,0,f94d1e6f44ce27c564a3a928b05d68cd29ffb09c94fdfa8f66d65e99aca5cb69,2023-08-08T14:22:24.967000 CVE-2021-40981,0,0,bb492111b8395251c1dd28ac707dccb7128fc51e6219c4d7f92d92227b94a7d8,2021-10-01T20:08:58.547000 CVE-2021-40985,0,0,17e39f07aa4a962e7b20459eb612fa50e926f0b0a631f78f9e8f54c0d205fe8a,2023-08-08T14:21:49.707000 @@ -183965,7 +183965,7 @@ CVE-2021-42856,0,0,04fc02433af4523c021972b760a933efcaf1ab6117df3da8a0dab8fc85658 CVE-2021-42857,0,0,25aacf5389053a3c60fd0479c2afb182ccedfad768fb9c1c03a0bfc2335a254c,2022-03-15T14:38:05.977000 CVE-2021-42859,0,0,989d3a91f9be5405b01a5719a7bc39eab0bf12c7a115a0066fb318285c133485,2024-05-17T02:01:40.523000 CVE-2021-4286,0,0,d6cd1237c5ad166dd2b6d5551ef17d7396a81bb899129d8eae0d044a05021927,2024-05-17T02:03:32.010000 -CVE-2021-42860,0,0,ee4d9160e4c5ec7c7da7660f755186be02c532e92d0bfe3e42b662d15f00a40c,2024-05-17T02:01:40.627000 +CVE-2021-42860,0,1,657242089e71454a2352e2ad77cf846e060929047ba50eaf4665200a325957e5,2024-07-02T21:15:10.270000 CVE-2021-42863,0,0,cddb02c59b2e2f748ed6602df3e3a01f6961ee6f1aa769f5820950a5ae9b5fcb,2022-05-23T14:23:34.097000 CVE-2021-42866,0,0,02799d479d491fb486032d5e0024081b0dd03781585808008d6feaa6f6f08a55,2022-04-07T19:42:04.227000 CVE-2021-42867,0,0,29332b352d00dd44c6a9ab8b5eadc64c1352478e1c82cc9760ecabaae52ba7fc,2022-04-07T13:17:52.230000 @@ -184490,7 +184490,7 @@ CVE-2021-43570,0,0,86562232d4d28034cd7f523730ac34fee09b0bebf728ed039c3366ea75fff CVE-2021-43571,0,0,d8720870d7e0c23c53a21bd1379428f4c9f8af146d374a4b9b479010164a6b4b,2021-11-12T19:59:21.110000 CVE-2021-43572,0,0,0f626dfba2f80232f110f034867a79ae37cb647d640c39cd81a1a4eed5ad4c7c,2022-03-24T15:57:18.287000 CVE-2021-43573,0,0,c7326ecf40c2812d6f14c276e1010ea255db02789102bcc053f2dd8e665324ab,2021-12-21T19:59:03.880000 -CVE-2021-43574,0,1,f8bdcc7cfe5e84cc5d1d67b34bf98eceec44e1ffe0fcbb5345dbb7811c5ea41a,2024-07-02T19:15:11.297000 +CVE-2021-43574,0,0,f8bdcc7cfe5e84cc5d1d67b34bf98eceec44e1ffe0fcbb5345dbb7811c5ea41a,2024-07-02T19:15:11.297000 CVE-2021-43575,0,0,c60bd71c607cb82c2be73d14dc1f6741bd1145ad4b9086d11b259af3165e339d,2024-05-17T02:01:57.027000 CVE-2021-43576,0,0,91dd1f5f8e047b82ac3a97aeae835e391bb96f704d9dc1783322fe2642c5e708,2023-11-22T21:33:01.017000 CVE-2021-43577,0,0,7ca2e1fc9c23eb260ccdd63a004754cc53228a40b983112be8a584b13fbfe84a,2023-11-22T21:32:53.473000 @@ -185628,7 +185628,7 @@ CVE-2021-45346,0,0,8a987db60d153f4f502120e5f7a66bf565ee828d5b7274c140b4b5afab909 CVE-2021-45347,0,0,6ddfed6efb5e7c057d03cd791f12db98220bdba3eeaa93766586a7df4bcca45b,2022-02-23T14:16:16.767000 CVE-2021-45348,0,0,752ad5782aecfcd4011e294ccf97b7101a9364e3a0173061405bc311500f325e,2022-02-23T16:07:23.697000 CVE-2021-45357,0,0,6af78fec96b7d1ebe952d2ff58c9c03d0bdfb317f46128f191e1f4ba91ef67a3,2022-02-15T18:51:39.097000 -CVE-2021-45364,0,1,263089291d39a63e3473877bd284426a11c28abc90a420782ca0937106a8d2d6,2024-07-02T19:15:11.420000 +CVE-2021-45364,0,0,263089291d39a63e3473877bd284426a11c28abc90a420782ca0937106a8d2d6,2024-07-02T19:15:11.420000 CVE-2021-45379,0,0,476dd86af7d4237d1b55e97e8005a863a4e51e43e24433ac9d5430509de31c48,2022-07-12T17:42:04.277000 CVE-2021-45380,0,0,6f108cd93c5c99f00a666585efe72c850e843619505ae8d69b745ddf3307a9c5,2022-01-27T16:09:05.753000 CVE-2021-45382,0,0,791195509994558b2fe50ccff9fe2eee931a6f2a59e8c4e9076783a755c3b606,2023-08-08T14:21:49.707000 @@ -186093,7 +186093,7 @@ CVE-2021-45948,0,0,aa333e5d4ef741615dc91397f23746c51354909ba25f677e4792b49d1dd33 CVE-2021-45949,0,0,482388125623aa6279df429f2dc9cc60889d7ac914cf406e02d98f6a7c096758,2023-11-07T03:39:56.663000 CVE-2021-45950,0,0,e6f588831fe33ed379954793cc97502c21d90aa30c977e9511339cca5d278860,2022-01-11T16:00:25.127000 CVE-2021-45951,0,0,8ad0edf2f740aca93c1c42b357fb6d1fa1849c9ba550d6bd195565cdf057038b,2024-05-17T02:02:52.427000 -CVE-2021-45952,0,1,f1e579c49bb95a7f9bfbb0f5ae28465611d6f1140361974fc65b2f0f49dc424c,2024-07-02T19:15:11.557000 +CVE-2021-45952,0,0,f1e579c49bb95a7f9bfbb0f5ae28465611d6f1140361974fc65b2f0f49dc424c,2024-07-02T19:15:11.557000 CVE-2021-45953,0,0,1b95c9ece70fbfe4bdcc319bf8f26e71d575de2f9d9237efaec7f4f2ceb02bd2,2024-05-17T02:02:52.617000 CVE-2021-45954,0,0,42bf16816a22914661974a1ddfef604acc4d319ec833dae86e66a79af326cd3b,2024-05-17T02:02:52.697000 CVE-2021-45955,0,0,f7dd2eecfd1949ab9909f8157e5116f1df7dca0fb9b6479ed1ea09b210d066be,2024-06-11T16:15:16.080000 @@ -187101,7 +187101,7 @@ CVE-2021-47281,0,0,593aea6f832a6c532eeb85f4c4c58c4c07715365e7ef8e62c7d3ce5ea69f7 CVE-2021-47282,0,0,62215ebff03dbff1784bc17c7de1c05aee2b7455f65ee32fbef82e14b765e992,2024-05-21T16:54:26.047000 CVE-2021-47283,0,0,0ff0fec851130d9f4c124e66410697fa89f2725fd5fbd9a87a792eabb7ae2619,2024-05-21T16:54:26.047000 CVE-2021-47284,0,0,6803845eb42c6e2028dde34255810396c0f218a68b17abd67007b27796d3dcd1,2024-05-21T16:54:26.047000 -CVE-2021-47285,0,0,348ae77348ef8ba5d7542350bc86f60db73d51ce7707c5c6aa7fc5eb8051c70e,2024-05-21T16:54:26.047000 +CVE-2021-47285,0,1,996ea18361ebd04fd45b1694fe1d9404484a2740395fd8ca2c06e472a7098e5f,2024-07-02T20:15:04.637000 CVE-2021-47286,0,0,b15e11781385fad96e49b76e139430d572cbbf1b8011cb250a6bdc2187552ec2,2024-05-21T16:54:26.047000 CVE-2021-47287,0,0,4414a4e5dfd31932f41a2b5e5bf416a5a7bb5ecb095d728c8b74b53d52aa09c1,2024-05-21T16:54:26.047000 CVE-2021-47288,0,0,f9616c139c2b4d34b236abb9a5482235ead43886427819bff5198662ac4e4ac0,2024-05-21T16:54:26.047000 @@ -194354,10 +194354,10 @@ CVE-2022-25464,0,0,231fd3080576b3684ae82435ee901df2499bdd2b12996f22985cb04f4c481 CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000 CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000 CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000 -CVE-2022-25477,1,1,d20a27df31d38af0afc20c681228c4a914eabe55303b966622f4ed5bb1b1ce37,2024-07-02T19:15:11.757000 -CVE-2022-25478,1,1,70e7c014b7b7f01e5419065792c5e0879950224514b5eee9a13a25f85d4890c3,2024-07-02T19:15:11.870000 -CVE-2022-25479,1,1,bbcbe3ce2d31a511def7cbae6b0c5276bdbdd0c47a66e512186e701cee1954bd,2024-07-02T19:15:11.957000 -CVE-2022-25480,1,1,b85c1709cb146bb1b0393a679e804a8c10249abb28f64a7e7994dfbec0265b6b,2024-07-02T19:15:12.037000 +CVE-2022-25477,0,0,d20a27df31d38af0afc20c681228c4a914eabe55303b966622f4ed5bb1b1ce37,2024-07-02T19:15:11.757000 +CVE-2022-25478,0,0,70e7c014b7b7f01e5419065792c5e0879950224514b5eee9a13a25f85d4890c3,2024-07-02T19:15:11.870000 +CVE-2022-25479,0,0,bbcbe3ce2d31a511def7cbae6b0c5276bdbdd0c47a66e512186e701cee1954bd,2024-07-02T19:15:11.957000 +CVE-2022-25480,0,0,b85c1709cb146bb1b0393a679e804a8c10249abb28f64a7e7994dfbec0265b6b,2024-07-02T19:15:12.037000 CVE-2022-25481,0,0,421b401b20e9e22f5ad772dff507a3a1e2483021fab730987885599f766afa84,2024-06-04T19:17:14.633000 CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000 CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000 @@ -194383,10 +194383,10 @@ CVE-2022-2551,0,0,eadba0841a48cf0a4cb48730644089435cc911dc05c8092013570e61fb503e CVE-2022-25510,0,0,6c9234ed5c243f504bf1470963aa31e79d875caf1de309bd283d6748b56e19a8,2022-03-22T12:48:27.790000 CVE-2022-25511,0,0,4fc08a55d1ff09caaefda592dcf03e3e1b5ae70380d09725c3f26b5d168bae51,2022-03-22T13:00:15.057000 CVE-2022-25512,0,0,b1c52ac21af7250e857ad7d3985d7bc7f57879f1a24979d1fb5e09eddb0eb7d3,2022-03-22T12:47:36.107000 -CVE-2022-25514,0,1,c0738e9082d55248ec0ed222e7cc5a9e33f95ed6f786abf32761ade60fb9ffee,2024-07-02T19:15:12.117000 +CVE-2022-25514,0,0,c0738e9082d55248ec0ed222e7cc5a9e33f95ed6f786abf32761ade60fb9ffee,2024-07-02T19:15:12.117000 CVE-2022-25515,0,0,53c5e558fae01f40b3a5aadbb97b5bbeb06bac138ba14390673b326e64384a6b,2024-05-17T02:06:40.303000 CVE-2022-25516,0,0,f89599fa7cc5c9923e78c56260802b7890855a896d1ef50fd2ac3a9e4c658b62,2024-05-17T02:06:40.397000 -CVE-2022-25517,0,1,6faf1dbce2bef1c30d4cea2e300b41ca13d0cfd1f02308ff89bb96129a33692e,2024-07-02T19:15:12.233000 +CVE-2022-25517,0,0,6faf1dbce2bef1c30d4cea2e300b41ca13d0cfd1f02308ff89bb96129a33692e,2024-07-02T19:15:12.233000 CVE-2022-25518,0,0,d1a9366eab4bd91c59f6bf12692e59eb1c69dbadcaea3ad3132182cbffcfd280,2022-03-28T20:08:30.037000 CVE-2022-2552,0,0,125fa71079048e18e7435d117a5f8b319e30f8387bf3eb810bcd3b5b3c73dabb,2023-11-07T03:46:39.677000 CVE-2022-25521,0,0,369c8b3e5327b316aa0ef07431129995f3d0b64c4960eae6c42480cc301fc961,2023-11-07T03:44:47.390000 @@ -197227,7 +197227,7 @@ CVE-2022-29062,0,0,c41b4432fc4d695bbbd23b6b405ec97ee785697e1378c543208360edce67f CVE-2022-29063,0,0,ce51654fad4b422bf44095e792066b47319cdf2b2cf4b5e709c5e639728f39ad,2022-09-08T12:17:45.683000 CVE-2022-2907,0,0,293ede5ffcd58ca6a13533a64b99af5d2845f0339227cc289db402e7c57b7b2d,2023-01-25T03:26:18.393000 CVE-2022-29071,0,0,e6baea940619b2319d3c760552864cf30d765258ba5a8787026981ddcab64b43,2023-07-21T16:44:30.400000 -CVE-2022-29072,0,0,7d449a769fe58615e26f5f50d40c37e8d99e201bb165e4a524a0da0e6b98c684,2024-05-17T02:08:03.793000 +CVE-2022-29072,0,1,95dfdfca036dbefce3f7ce3479dd06344f2f52df9c51b31f00398239cd258f9a,2024-07-02T20:15:05.033000 CVE-2022-29077,0,0,544545211c1510f2f2df31bedf1abcd89d6acf9851e111a0c2ee69c4412bc1c3,2022-05-04T15:41:05.170000 CVE-2022-29078,0,0,953ce71eb690d5ba25ee94af6fb6eb2a7f1d4bc790a314bd5cb757098506953c,2023-08-08T14:22:24.967000 CVE-2022-2908,0,0,0d8fdace1ffb499f9d4408487913e3b2317dd008f5796eb7cce343a36073a92e,2023-08-08T14:22:24.967000 @@ -197706,7 +197706,7 @@ CVE-2022-29618,0,0,85bffd581df774a112669f14df0da784f907f0d8fc33949d0c933465cb570 CVE-2022-29619,0,0,04616838172ccb6373be77762d8edb1438492c280de84e75a450a31e0392055d,2023-07-21T16:55:28.250000 CVE-2022-2962,0,0,4bda1dc88413f0ce73dd3eed5ecc11ffeb5485f1edef4bdb55c675f17727b4b3,2023-06-28T20:40:49.643000 CVE-2022-29620,0,0,2438a942554d3d3f0ef1f68ae9510bb3e56de95da9b83f6dc48791d3160004bc,2024-05-17T02:08:19.453000 -CVE-2022-29622,0,0,2358f0cab35f083c6ea218cc4e4c3b367c8b6eca287defb6c9c38e8408685ce3,2024-05-17T02:08:19.550000 +CVE-2022-29622,0,1,b1bd4620d2d3da889a4fd5b663a04ee4dd49925e9851e6f2812bdb5412cd599b,2024-07-02T21:15:10.390000 CVE-2022-29623,0,0,f0f61383da3ef16de1f798f3a42e8485b6f0f77293ab82345f867acd3120c559,2022-05-24T20:14:43.230000 CVE-2022-29624,0,0,63022d472eefe17122d555ac15c6ed08f13e85324e3dd023fb705b3fcea0bc9a,2022-06-11T02:26:12.640000 CVE-2022-29627,0,0,abbdad8a7497f46959f3de961ed1f67cc3075f02885458d7de87213e93cbc0f3,2022-06-12T02:12:18.457000 @@ -198507,6 +198507,7 @@ CVE-2022-30632,0,0,f214153a7d78a1f18ea22ef856e8035d77e066ffe05cf4d3cd2d155a8fe2b CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000 CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000 CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000 +CVE-2022-30636,1,1,df65df6d00162ec5c51e728ac283a8b64cdff82eb9fad9e1d7038e5344dcc46f,2024-07-02T20:15:05.173000 CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000 CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000 CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000 @@ -217971,6 +217972,7 @@ CVE-2023-24528,0,0,899533432d6d75cedea57fd4563bb59a08ab30d04e09c55b0e4759297d9a5 CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000 CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000 CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000 +CVE-2023-24531,1,1,fc3a256028dc5784865c8ad03aaa11c5d539b8376a35686eafced66686e50439,2024-07-02T20:15:05.270000 CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000 CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000 CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000 @@ -237084,7 +237086,7 @@ CVE-2023-50376,0,0,c951f73eaa1568ec16d7bbf28755aacf2580409c4a177851a557b18edbeae CVE-2023-50377,0,0,3acd97ab69c2403c419288f2e19070989327aa6f1425e1a9c076820c259b93c2,2023-12-27T21:34:56.883000 CVE-2023-50378,0,0,0f4c193757a21745622df68ec0aa88b8a213c4603a70a54e94c4c05a8dadb60b,2024-05-01T18:15:11.097000 CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000 -CVE-2023-5038,0,1,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000 +CVE-2023-5038,0,0,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000 CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000 CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000 CVE-2023-50387,0,0,86a696af4d06d31d7c5b6089ba1f856732aed20b18c54efa9645210962ecc2d6,2024-06-10T17:16:15.963000 @@ -251832,12 +251834,12 @@ CVE-2024-34592,0,0,1ee566894c302fe71c1461f3cb79ed1769518d89d3dacecde74d15f8e8648 CVE-2024-34593,0,0,d0d46e6c2e8354b7e8a937f69d30c13f185f05d9ae10963fe18b687300e08e91,2024-07-02T18:00:59.957000 CVE-2024-34594,0,0,3de419a0d5e895f0825619bb1589a252bf8b02077e22739a191c778c10e81ca5,2024-07-02T18:01:18.317000 CVE-2024-34595,0,0,dd0586c7cfd65915e93146d51ca5ff123e3b81570ba9d26c8a9115ce97611928,2024-07-02T18:01:45.897000 -CVE-2024-34596,0,1,fcdc3c4cd7f2ddccc5baab24c45bb080a012db69a4c4fd9d1e2199232a02d063,2024-07-02T18:04:25.130000 -CVE-2024-34597,0,1,13b9d58520354a07fd602b21daf74a4b55131c9cdff7953a8f333c22c9abc246,2024-07-02T18:04:57.147000 -CVE-2024-34599,0,1,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71615,2024-07-02T18:05:26.327000 +CVE-2024-34596,0,0,fcdc3c4cd7f2ddccc5baab24c45bb080a012db69a4c4fd9d1e2199232a02d063,2024-07-02T18:04:25.130000 +CVE-2024-34597,0,0,13b9d58520354a07fd602b21daf74a4b55131c9cdff7953a8f333c22c9abc246,2024-07-02T18:04:57.147000 +CVE-2024-34599,0,0,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71615,2024-07-02T18:05:26.327000 CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000 -CVE-2024-34600,0,1,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000 -CVE-2024-34601,0,1,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 +CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000 +CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000 CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000 CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000 @@ -253702,7 +253704,7 @@ CVE-2024-38385,0,0,6ede95b10b5fd3bf97325d6d6e002e23e38a0e008a909e36d40ae711b1be8 CVE-2024-38388,0,0,7c0bb01f9b9fb79d83dbd6e2c27fd6e239bc8d3e90d248b1b279840e35bf7176,2024-06-21T11:22:01.687000 CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000 CVE-2024-38390,0,0,d3cec8cf37055d7984956bdcdf2d47c2af6b037bed7779bdf5635c68af266a42,2024-06-21T11:22:01.687000 -CVE-2024-38391,0,0,206598253aa7ecd2c57a2dfa2300253bd76dfb89400b4ffe2d9c269e1efae83b,2024-06-21T11:22:01.687000 +CVE-2024-38391,0,1,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b054,2024-07-02T20:15:05.730000 CVE-2024-38394,0,0,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000 CVE-2024-38395,0,0,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000 CVE-2024-38396,0,0,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000 @@ -253768,6 +253770,7 @@ CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725 CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 +CVE-2024-38537,1,1,b13261faf80ca2cfe6630aff4816c714858af9e7bce4a6263f68e63ffd658697,2024-07-02T20:15:05.860000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 @@ -253980,7 +253983,7 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e CVE-2024-3917,0,0,55f83f03b9292263c532dbe29e254e7b9925f1a39645bd6835596489dfabe52b,2024-05-24T01:15:30.977000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 -CVE-2024-39206,1,1,8cab33503027debb462a815aaa1f3da3d0625928338f1e658c10a9f2aa642bef,2024-07-02T18:15:03.290000 +CVE-2024-39206,0,0,8cab33503027debb462a815aaa1f3da3d0625928338f1e658c10a9f2aa642bef,2024-07-02T18:15:03.290000 CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 CVE-2024-39208,0,0,299e5852229d2647ff0440f276fa367c28bfc141139d729c8061f6806a3c58e2,2024-06-28T10:27:00.920000 CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 @@ -254016,9 +254019,14 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880 CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000 CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000 CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000 +CVE-2024-39315,1,1,c5bbf81bf069b4fb24aabf28416dacd9ae348b783f7fe91b0c98e926aeb81fe0,2024-07-02T20:15:06.110000 CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000 CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000 +CVE-2024-39322,1,1,171a1e59b227f6655441aecfe36fb284632d041071b03b3a000a2ccc0feb4a76,2024-07-02T21:15:10.997000 CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000 +CVE-2024-39324,1,1,04ab9c8763685159f533c7d96d83ab8247d560d949d6ea5428fce08afab5bc1d,2024-07-02T21:15:11.213000 +CVE-2024-39325,1,1,fb628c0a6246b721ccdcf88743ebf44736eda766d0e7d7c4b84f8d1662576544,2024-07-02T21:15:11.433000 +CVE-2024-39326,1,1,a16c463704800186fd98549c3f5764f8d0de863d0b43b19aa8b0f49702f6b013,2024-07-02T21:15:11.657000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 CVE-2024-39331,0,0,c5bb3e665b31aacdbf907c7032da4f6d49d6bc82a59a96e6be39b1d4f66a92fd,2024-06-29T07:15:02.060000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 @@ -254030,7 +254038,7 @@ CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000 CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 -CVE-2024-39362,0,0,bcce186b51714eacaaf90ea1482046e3d6827a91536ea638843d27b3ed4e9904,2024-06-25T18:50:42.040000 +CVE-2024-39362,0,1,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000 CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000 CVE-2024-39373,0,0,e8547465f255c8b2bfa815c6c69701860e17426665d7ce1342eed3a8c2dce8f2,2024-06-27T17:11:52.390000 @@ -254102,8 +254110,8 @@ CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b7 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 -CVE-2024-39891,1,1,3d4b41a13a0ab5478a6ca83e6f5ba1427c7171d941e8b0954e51acc85bbc9f29,2024-07-02T18:15:03.447000 -CVE-2024-39894,1,1,c968489b60e34628f9bade5d12d3eb7cbc6bf7492988d91234687e1aa6697daf,2024-07-02T18:15:03.710000 +CVE-2024-39891,0,0,3d4b41a13a0ab5478a6ca83e6f5ba1427c7171d941e8b0954e51acc85bbc9f29,2024-07-02T18:15:03.447000 +CVE-2024-39894,0,0,c968489b60e34628f9bade5d12d3eb7cbc6bf7492988d91234687e1aa6697daf,2024-07-02T18:15:03.710000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 @@ -254321,7 +254329,7 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162 CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000 CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000 -CVE-2024-4268,0,1,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000 +CVE-2024-4268,0,0,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000 CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000 CVE-2024-4271,0,0,b387f99302f91201ccece9e8c147bcdfc30a6615cd2543471e3490cd41180d93,2024-06-17T12:42:04.623000 CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000 @@ -255587,8 +255595,8 @@ CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0 CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000 CVE-2024-6008,0,0,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000 CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000 -CVE-2024-6011,0,1,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000 -CVE-2024-6012,0,1,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000 +CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000 +CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000 CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000 CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000 CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000 @@ -255627,9 +255635,9 @@ CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb3 CVE-2024-6084,0,0,7af730199a10f594b6ce1f1e9ecc3a7779c7858f9e2bf364f776ef80922995a6,2024-06-20T12:44:01.637000 CVE-2024-6085,0,0,9ec0c5a378f12acda708e36f1fd937b6a37e47da0cf78939f5184a1970e8c26d,2024-06-27T19:25:12.067000 CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd05154,2024-06-27T19:25:12.067000 -CVE-2024-6088,0,1,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000 +CVE-2024-6088,0,0,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000 CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000 -CVE-2024-6099,0,1,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000 +CVE-2024-6099,0,0,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000 CVE-2024-6100,0,0,2b903b3a6c63696aea9a10797071b5fd7d0b6547a8f1416ee7dc4ff992de4ff5,2024-06-21T13:15:13.077000 CVE-2024-6101,0,0,3b6bc52ab046ce2a9a29c26d80fa3342c59ba956272c0888c64da753b102c8a5,2024-06-21T13:15:13.187000 CVE-2024-6102,0,0,229621a473a3fa4bd90193f7d8f9e1a06a3142a4c3e1de71a8a1ff5fb584365f,2024-06-21T13:15:13.277000 @@ -255738,7 +255746,7 @@ CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067 CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 -CVE-2024-6341,1,1,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 +CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 CVE-2024-6354,0,0,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000 @@ -255754,9 +255762,9 @@ CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c1 CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000 CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000 CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000 -CVE-2024-6381,1,1,a09652e91088f2db66780ef34f86f48ba3a9585a4235bac448c9de5b7fb0f71a,2024-07-02T18:15:03.963000 -CVE-2024-6382,1,1,7e5cb9f8ced547c25e3e6457ed9c604091d0375fe07946f8cc94b1c315e5b165,2024-07-02T18:15:04.337000 -CVE-2024-6387,0,1,a0c29745cdbaa40491ee5b9f8fafb66b569aff5358e60e1fa7646d0d233aa9d4,2024-07-02T19:15:12.773000 +CVE-2024-6381,0,0,a09652e91088f2db66780ef34f86f48ba3a9585a4235bac448c9de5b7fb0f71a,2024-07-02T18:15:03.963000 +CVE-2024-6382,0,0,7e5cb9f8ced547c25e3e6457ed9c604091d0375fe07946f8cc94b1c315e5b165,2024-07-02T18:15:04.337000 +CVE-2024-6387,0,0,a0c29745cdbaa40491ee5b9f8fafb66b569aff5358e60e1fa7646d0d233aa9d4,2024-07-02T19:15:12.773000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 @@ -255773,3 +255781,4 @@ CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a221 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000 +CVE-2024-6452,1,1,c5351dc5e4a17b0c64a0b82d5ad2914d7d7c7e83140585c70101988d17ac33d5,2024-07-02T20:15:06.860000