From c8721453a825b2bb9cafe82be9eb14dc90a89c51 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 8 Jul 2024 12:04:17 +0000 Subject: [PATCH] Auto-Update: 2024-07-08T12:01:24.765109+00:00 --- CVE-2022/CVE-2022-474xx/CVE-2022-47420.json | 7 +- CVE-2023/CVE-2023-286xx/CVE-2023-28696.json | 7 +- CVE-2023/CVE-2023-458xx/CVE-2023-45830.json | 27 +++++- CVE-2024/CVE-2024-235xx/CVE-2024-23519.json | 5 +- CVE-2024/CVE-2024-249xx/CVE-2024-24974.json | 41 ++++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25928.json | 5 +- CVE-2024/CVE-2024-274xx/CVE-2024-27459.json | 41 ++++++++ CVE-2024/CVE-2024-279xx/CVE-2024-27903.json | 41 ++++++++ CVE-2024/CVE-2024-357xx/CVE-2024-35778.json | 7 +- CVE-2024/CVE-2024-379xx/CVE-2024-37999.json | 100 ++++++++++++++++++++ README.md | 25 +++-- _state.csv | 26 ++--- 12 files changed, 295 insertions(+), 37 deletions(-) create mode 100644 CVE-2024/CVE-2024-249xx/CVE-2024-24974.json create mode 100644 CVE-2024/CVE-2024-274xx/CVE-2024-27459.json create mode 100644 CVE-2024/CVE-2024-279xx/CVE-2024-27903.json create mode 100644 CVE-2024/CVE-2024-379xx/CVE-2024-37999.json diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47420.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47420.json index 9c6d93bb1cf..1ad546551cc 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47420.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47420.json @@ -2,12 +2,13 @@ "id": "CVE-2022-47420", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T08:15:21.757", - "lastModified": "2023-11-14T15:35:47.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T10:15:02.050", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.\n\n" + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.12." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28696.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28696.json index fd193caaec3..3407099063a 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28696.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28696.json @@ -2,12 +2,13 @@ "id": "CVE-2023-28696", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-12T22:15:29.560", - "lastModified": "2023-11-16T17:41:01.973", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T11:15:09.923", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in Harish Chouhan, Themeist I Recommend Tplugin <=\u00a03.9.0 versions." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Harish Chouhan, Themeist I Recommend This allows Cross Site Request Forgery.This issue affects I Recommend This: from n/a through 3.9.0." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45830.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45830.json index 5e957f6c865..6d4e5664b01 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45830.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45830.json @@ -2,12 +2,13 @@ "id": "CVE-2023-45830", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:08.790", - "lastModified": "2023-11-14T15:28:18.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T10:15:02.867", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.\n\n" + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.12." }, { "lang": "es", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json index 382b29bb14a..74991727ff8 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json @@ -2,12 +2,13 @@ "id": "CVE-2024-23519", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T01:44:09.110", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-07-08T10:15:03.310", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in M&S Consulting Email Before Download.This issue affects Email Before Download: from n/a through 6.9.7.\n\n" + "value": "Cross-Site Request Forgery (CSRF) vulnerability in M&S Consulting Email Before Download.This issue affects Email Before Download: from n/a through 6.9.7." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json new file mode 100644 index 00000000000..b5ee0dc6324 --- /dev/null +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-24974", + "sourceIdentifier": "security@openvpn.net", + "published": "2024-07-08T11:15:10.103", + "lastModified": "2024-07-08T11:15:10.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@openvpn.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974", + "source": "security@openvpn.net" + }, + { + "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/", + "source": "security@openvpn.net" + }, + { + "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html", + "source": "security@openvpn.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25928.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25928.json index 40e75d951fa..191b557bfef 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25928.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25928.json @@ -2,12 +2,13 @@ "id": "CVE-2024-25928", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-23T12:15:46.467", - "lastModified": "2024-02-23T16:14:43.447", + "lastModified": "2024-07-08T10:15:03.440", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sitepact.This issue affects Sitepact: from n/a through 1.0.5.\n\n" + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sitepact.This issue affects Sitepact: from n/a through 1.0.5." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json new file mode 100644 index 00000000000..e39be4aedc8 --- /dev/null +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-27459", + "sourceIdentifier": "security@openvpn.net", + "published": "2024-07-08T11:15:10.303", + "lastModified": "2024-07-08T11:15:10.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@openvpn.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459", + "source": "security@openvpn.net" + }, + { + "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/", + "source": "security@openvpn.net" + }, + { + "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html", + "source": "security@openvpn.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json new file mode 100644 index 00000000000..25dd20f409f --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-27903", + "sourceIdentifier": "security@openvpn.net", + "published": "2024-07-08T11:15:10.390", + "lastModified": "2024-07-08T11:15:10.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@openvpn.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-283" + } + ] + } + ], + "references": [ + { + "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903", + "source": "security@openvpn.net" + }, + { + "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/", + "source": "security@openvpn.net" + }, + { + "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html", + "source": "security@openvpn.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35778.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35778.json index 14a6fc37ca1..811fa8cc225 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35778.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35778.json @@ -2,12 +2,13 @@ "id": "CVE-2024-35778", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-21T16:15:11.910", - "lastModified": "2024-06-24T19:15:07.360", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T10:15:03.573", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John West Slideshow SE allows PHP Local File Inclusion.This issue affects Slideshow SE: from n/a through 2.5.17." + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John West Slideshow SE PHP Local File Inclusion.This issue affects Slideshow SE: from n/a through 2.5.17." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json new file mode 100644 index 00000000000..3ab455730c2 --- /dev/null +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-37999", + "sourceIdentifier": "productcert@siemens.com", + "published": "2024-07-08T11:15:10.487", + "lastModified": "2024-07-08T11:15:10.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Medicalis Workflow Orchestrator (All versions). The affected application executes as a trusted account with high privileges and network access. This could allow an authenticated local attacker to escalate privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-282" + } + ] + } + ], + "references": [ + { + "url": "https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-501799", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0f7709cad9a..3bccc10b950 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-08T10:01:12.197410+00:00 +2024-07-08T12:01:24.765109+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-08T09:15:02.867000+00:00 +2024-07-08T11:15:10.487000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255988 +255992 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `4` -- [CVE-2024-37389](CVE-2024/CVE-2024-373xx/CVE-2024-37389.json) (`2024-07-08T08:15:10.847`) +- [CVE-2024-24974](CVE-2024/CVE-2024-249xx/CVE-2024-24974.json) (`2024-07-08T11:15:10.103`) +- [CVE-2024-27459](CVE-2024/CVE-2024-274xx/CVE-2024-27459.json) (`2024-07-08T11:15:10.303`) +- [CVE-2024-27903](CVE-2024/CVE-2024-279xx/CVE-2024-27903.json) (`2024-07-08T11:15:10.390`) +- [CVE-2024-37999](CVE-2024/CVE-2024-379xx/CVE-2024-37999.json) (`2024-07-08T11:15:10.487`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `6` -- [CVE-2023-26531](CVE-2023/CVE-2023-265xx/CVE-2023-26531.json) (`2024-07-08T09:15:02.397`) -- [CVE-2023-49188](CVE-2023/CVE-2023-491xx/CVE-2023-49188.json) (`2024-07-08T09:15:02.663`) -- [CVE-2024-34603](CVE-2024/CVE-2024-346xx/CVE-2024-34603.json) (`2024-07-08T07:15:04.100`) -- [CVE-2024-34804](CVE-2024/CVE-2024-348xx/CVE-2024-34804.json) (`2024-07-08T09:15:02.867`) +- [CVE-2022-47420](CVE-2022/CVE-2022-474xx/CVE-2022-47420.json) (`2024-07-08T10:15:02.050`) +- [CVE-2023-28696](CVE-2023/CVE-2023-286xx/CVE-2023-28696.json) (`2024-07-08T11:15:09.923`) +- [CVE-2023-45830](CVE-2023/CVE-2023-458xx/CVE-2023-45830.json) (`2024-07-08T10:15:02.867`) +- [CVE-2024-23519](CVE-2024/CVE-2024-235xx/CVE-2024-23519.json) (`2024-07-08T10:15:03.310`) +- [CVE-2024-25928](CVE-2024/CVE-2024-259xx/CVE-2024-25928.json) (`2024-07-08T10:15:03.440`) +- [CVE-2024-35778](CVE-2024/CVE-2024-357xx/CVE-2024-35778.json) (`2024-07-08T10:15:03.573`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7d68b74aace..822a6123177 100644 --- a/_state.csv +++ b/_state.csv @@ -211271,7 +211271,7 @@ CVE-2022-47417,0,0,635a9cd4333581eb34c546266ff712f0437854cda7b239eb47e7ce40c113c CVE-2022-47418,0,0,034e0f4ab2ba37ecdc5664d0671de0dad6ce472962d588acb057903742cb0db1,2023-02-16T17:50:55.420000 CVE-2022-47419,0,0,969bdc63d491a4ab9aeb03cd6c1074824a3a10ed29e459d655b32f46b7c07909,2023-03-16T17:15:09.247000 CVE-2022-4742,0,0,ac683660b843012effc49ed771e7e3a0d41714f914609e7c435a26d18616ef2f,2024-05-17T02:16:54.913000 -CVE-2022-47420,0,0,31b555b0dfe2456c9cbc09c49c6a692e49ef04564e055298377aa79e45d9b1e0,2023-11-14T15:35:47.717000 +CVE-2022-47420,0,1,880106f38441c8fddd71b5d1efae01c6a4ed7be15fa99aa6ec33a3d4a0547d1f,2024-07-08T10:15:02.050000 CVE-2022-47421,0,0,909a31b732f66c3e8fc0e70af24ab96bd602aef69df50553cf3e4a18b52e301c,2023-07-27T13:51:48.583000 CVE-2022-47422,0,0,cfa404de4cf789d7955a86205735e769b78327b3cc416f4085f3eafd76065e44,2023-11-07T03:56:14.373000 CVE-2022-47423,0,0,1910e3bd817b35427f5ca4aedfe0bf985e3aa4e10830059d963f12b37e182042,2023-05-16T22:08:09.307000 @@ -219640,7 +219640,7 @@ CVE-2023-26528,0,0,de53b1b2365d082b16b3e52476599015c39991bd236b22656587fd68c2487 CVE-2023-26529,0,0,9c86f8a783ccfd1f1e41d892b0db8dd3fe1abff5ea8ae669029a676e57a1754f,2023-11-07T04:09:37.600000 CVE-2023-2653,0,0,0e0a3a49c4bec46a7cceaf51372840b53f07b29fb0f57002bda7f4b682a6e70b,2024-05-17T02:23:07.510000 CVE-2023-26530,0,0,fb64b33e1966b9ed3009e9d92488933c1e46806691006672d22a22d9ebd4bc0e,2023-08-22T00:56:35.657000 -CVE-2023-26531,0,1,fe01822521ff89bdb05fb8289d9cecffa6980a7671aabe2077aa791e958071ab,2024-07-08T09:15:02.397000 +CVE-2023-26531,0,0,fe01822521ff89bdb05fb8289d9cecffa6980a7671aabe2077aa791e958071ab,2024-07-08T09:15:02.397000 CVE-2023-26532,0,0,7f0b35ad1cf0fcbd24dc9f1216197cb177b6520f4478684c2c08cca69f327b17,2023-11-27T22:08:32.057000 CVE-2023-26533,0,0,8d39412f80f99869d331564890ce6e042d03ea07290c69b81e1612dd5faab023,2023-12-06T17:43:35.347000 CVE-2023-26534,0,0,15c4231e630b7398008d9551a749fa9246bb7f2677305d8d75759252628df3c6,2023-06-28T07:14:06.263000 @@ -221360,7 +221360,7 @@ CVE-2023-28692,0,0,9eeeb31b9be4c6221c6981aa9d1382357797c409afb0b545f19b12a1930e4 CVE-2023-28693,0,0,64907546fbaf9b5fa936aa1a85b50be5389af397bfb2a16035f5a1047c9a7e4c,2023-08-22T00:57:12.023000 CVE-2023-28694,0,0,5d75a53cf595b009101740c0546d514500e613112c9c77f8e4e8a5622d9aca6e,2023-11-16T17:42:33.970000 CVE-2023-28695,0,0,3c4a88778d94ca3148dfe924dcf21981aa68fbfa7edb43157864dac77cf9e02b,2023-06-28T07:09:40.910000 -CVE-2023-28696,0,0,b779231ef810df2f0156efc6c85b8155ddd54afaed9c042ce5ea15106cea094c,2023-11-16T17:41:01.973000 +CVE-2023-28696,0,1,e49880fa6d255b02ff6645d543520b978124efa9035a4f0863cb3c7c3042ad9d,2024-07-08T11:15:09.923000 CVE-2023-28697,0,0,89a3ca92d94ed91c3e20593cc4ac52ecda3fdfed4ed0d6d310f1bb57ec468ea0,2023-05-05T20:47:35.427000 CVE-2023-28698,0,0,260adf9749b48bc3b6df9b562f43004c450adf42dcd4f642208008d4dcae6670,2023-06-09T17:25:28.657000 CVE-2023-28699,0,0,2627978ca24cc13877a7f1f52874bf25b97cf287afe22c7920d04d9bcf10c0d7,2023-06-09T18:14:12.563000 @@ -233852,7 +233852,7 @@ CVE-2023-45826,0,0,fb4fdde2234a33997d031bde8bd96295768aa3cdeb0dcb1add36c3acf5e6b CVE-2023-45827,0,0,590a647d29b19685fbfbe01785d9adf29e729c96d9c4a8d18d11575e526cfd85,2023-11-14T17:10:21.330000 CVE-2023-45829,0,0,db9ba82ffe5d1f5fff85be3763ba24364418a37f0f40cc8151741c9237329dc3,2023-10-28T03:27:33.903000 CVE-2023-4583,0,0,85ab38c041a18fe4db57795cdd74632fbc7117248d6b6649b4b77180e2aefd32,2023-09-14T03:52:30.463000 -CVE-2023-45830,0,0,39cce3f5faeabcb484ac80bfc93a03058df22042cf4528d2804b36f43e0b5a82,2023-11-14T15:28:18.677000 +CVE-2023-45830,0,1,e93c56ded03c8deb613479cc3ad121b8f246009db67f735a112274b94d28e1d1,2024-07-08T10:15:02.867000 CVE-2023-45831,0,0,84e9d1ab1480dc235dc2ea17be9ed8751be45e4582ba809608522a674460db6e,2023-10-19T18:35:15.887000 CVE-2023-45832,0,0,8975d161566acb2b4bf8b65aa328c03dede2ad45247cdaf8335849c5b3ecfdf5,2023-11-01T16:02:09.867000 CVE-2023-45833,0,0,b7bbdad9727a29315d7f4b6c0df4f950baf4990b7ef84e51ede97765d08188c3,2023-11-01T15:37:22.227000 @@ -236302,7 +236302,7 @@ CVE-2023-49183,0,0,2e675f6060b1d0f3f34c75175ec2e7ad4f737511b8336158dd45bef3681ae CVE-2023-49184,0,0,d5000ae1b227810f39b2b9b0da886c37cda56c5bb7329d1ed93f858de6759550,2023-12-19T20:43:19.030000 CVE-2023-49185,0,0,b6277b639298401f8399c0dce995cbfcf5d945a31862630dbc2cba961ff9cdf0,2023-12-19T20:45:06.317000 CVE-2023-49187,0,0,81995564cd401d0d066a0dc7261569a5ffb0837b171050d33a27c61c90483de6,2023-12-19T20:22:11.963000 -CVE-2023-49188,0,1,67bc196c55897bbe5e6e5ae2196a0067888a23ca1fc2090533d10c1feb63c692,2024-07-08T09:15:02.663000 +CVE-2023-49188,0,0,67bc196c55897bbe5e6e5ae2196a0067888a23ca1fc2090533d10c1feb63c692,2024-07-08T09:15:02.663000 CVE-2023-49189,0,0,95bbd96e9ec7f5da63c94c1e5827b56177be7ed187de737936c906acd31f4dd5,2023-12-21T16:48:17.663000 CVE-2023-4919,0,0,3b93cda20a1b77a48164e0c6d3027eba6d2bfcc93f418435f4ad08d5d42e790b,2023-11-07T04:23:10.030000 CVE-2023-49190,0,0,7d830fa095412d91a51036c9e09f47da8a17ce8103c61b31e671df98dfb4780e,2023-12-21T16:49:34.847000 @@ -244546,7 +244546,7 @@ CVE-2024-23515,0,0,9b3019b1da03057d41a7c6e89ecb38b2748c5a51cdf0834f8b10325e87cbc CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000 CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000 CVE-2024-23518,0,0,e82205aa1cd91c76680d095c7c704b5dcdfd5a3a67bbbd441a2e9e6b50fd4983,2024-06-13T18:36:45.417000 -CVE-2024-23519,0,0,4d28ec0c6447c5e765bfd28438ace7e6750c3a1e16dfeea04dd8418971fdb577,2024-02-29T13:49:29.390000 +CVE-2024-23519,0,1,8b42ee58afd4a3aa0b353806dfdefab0d93a59a36e591524df295fb60d282c81,2024-07-08T10:15:03.310000 CVE-2024-2352,0,0,57630273c197eaed8b3c3f6d93ff32d48d806b15015e610cf5486ce468752335,2024-05-17T02:38:11.410000 CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6576,2024-03-26T12:55:05.010000 CVE-2024-23521,0,0,730570d3fab4981f342ddac4e5e20062a977b742ff2bfc0200348b686b695481,2024-06-13T18:36:45.417000 @@ -245451,6 +245451,7 @@ CVE-2024-24963,0,0,f7ac6d9beae69472289af258cfa7df94f3fb587efc26344b96102b05f5639 CVE-2024-24964,0,0,6aeb3e68bcce4e30c320efc8bbc0ba8ea40b022ead3c928aca7667e8626ff2cf,2024-03-12T12:40:13.500000 CVE-2024-24966,0,0,a6e715310d1619966fe5747d39679f64ae1b61eb46bb4d8fceaf05df6847efb8,2024-02-14T18:04:45.380000 CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd8b,2024-05-17T02:38:15.830000 +CVE-2024-24974,1,1,f43a480522cbc61c35b9a75bdd6c9532ee59e8cdae93bb2aa498d949ececb731,2024-07-08T11:15:10.103000 CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000 @@ -246021,7 +246022,7 @@ CVE-2024-25924,0,0,a0edb21bf6d2717b16ef31e3c4d1e7b08239622f70f8352aa46b8f51f82ec CVE-2024-25925,0,0,82d957b757a9a6d1fdcc74598b42ef2704a1b9fe963dd50d48ef8264fc879a6b,2024-02-26T16:32:25.577000 CVE-2024-25926,0,0,a204994523df9b30b0668bf02b40e244c5082d74f1a5f398b1221a8cff9b190e,2024-03-27T12:29:30.307000 CVE-2024-25927,0,0,70ec221cb23fdd951e839b39a19a816e5c7a4881399308a30cbec9cd2c6f2d65,2024-02-28T14:06:45.783000 -CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121575,2024-02-23T16:14:43.447000 +CVE-2024-25928,0,1,fd24c28c5a2106d771e03de6727087950c7f1273f0c987997f5bb867af2abd16,2024-07-08T10:15:03.440000 CVE-2024-25929,0,0,91b91221033a2dc3b1a568aed929b693e98283cc5f7998cc2e9542bf6d839284,2024-06-10T02:52:08.267000 CVE-2024-2593,0,0,01b65e909e6089e83d99d5b5b680ad312732071d94371d890adbb9973ac995e4,2024-03-18T19:40:00.173000 CVE-2024-25930,0,0,2b173292b99bf990b44991f1b3d0d5093a9f41028ae431c81e582b61a91befc8,2024-02-29T13:49:29.390000 @@ -247352,6 +247353,7 @@ CVE-2024-27453,0,0,4fa62fb0431b68f90533abee1343406b0149f9efe637bd75fc3a77179a8be CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 +CVE-2024-27459,1,1,68d9baa047ec8829992cd91c7aa9539644df9d2f9a98e79ebd79c967be77040f,2024-07-08T11:15:10.303000 CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000 CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 @@ -247573,6 +247575,7 @@ CVE-2024-2790,0,0,beedd0090f34846cee86bfcc16559ecd216425fdfa14e63be8297a23ca53ac CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 CVE-2024-27901,0,0,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 +CVE-2024-27903,1,1,d11a0b2c96f23704bf63864c34d48a5cf70337102c518f45009f46af63078823,2024-07-08T11:15:10.390000 CVE-2024-27905,0,0,11f71bd2f04a983e03ffa738540da2ab3b19fd866be937104a685343c8bfc7f6,2024-05-17T02:37:34.130000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 @@ -251890,7 +251893,7 @@ CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab8174 CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000 CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 CVE-2024-34602,0,0,a092ec376b20b5bae003e3af1b412b2662656f4989316a07694f2689d75bbbb4,2024-07-08T07:15:02.663000 -CVE-2024-34603,0,1,09eef9607bb516b8f931b0fb1ca16807a9027d1191d223bb4f866dff768ab3be,2024-07-08T07:15:04.100000 +CVE-2024-34603,0,0,09eef9607bb516b8f931b0fb1ca16807a9027d1191d223bb4f866dff768ab3be,2024-07-08T07:15:04.100000 CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000 CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000 CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000 @@ -251980,7 +251983,7 @@ CVE-2024-34800,0,0,86c2747c3a96d291be880702f2f8a1bb4679cc66d13fbbf0cf4c80b6c3772 CVE-2024-34801,0,0,0b1a4ab0468bb98a950b8edf087ff2c536030eeba11e5be47337600f37c39c40,2024-06-03T14:46:24.250000 CVE-2024-34802,0,0,0e49233d84194178a4d9b1b84c4ef45995110e8bbf1416904c517ba7839fb5e2,2024-06-12T13:32:45.327000 CVE-2024-34803,0,0,3bacd90aafced0596a908c7bddcf15434c904fd7688d7a7dfb5d78f5281cf184,2024-06-03T14:46:24.250000 -CVE-2024-34804,0,1,47720cdf6115b63aa02c7f403e22a073628f6ce441cc468fab5e642dd29d8865,2024-07-08T09:15:02.867000 +CVE-2024-34804,0,0,47720cdf6115b63aa02c7f403e22a073628f6ce441cc468fab5e642dd29d8865,2024-07-08T09:15:02.867000 CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000 CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000 CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000 @@ -252510,7 +252513,7 @@ CVE-2024-35771,0,0,528377e8b245533dbff20e4b0dd7328468397780793d88ed8bf6cc52e2f75 CVE-2024-35772,0,0,2d0d9c98f803d200fae5d0e084d548bff2c25e4891c370629239ed163d3750c6,2024-06-24T19:26:14.460000 CVE-2024-35774,0,0,b04163e5e3aed962a8bb022fff4f15fd9953a3840984351341e879118df53ab8,2024-06-24T18:43:57.633000 CVE-2024-35776,0,0,843520135517b374d77f0b73e5d208e8aee82b3db16cc26ae6b37a47d0e96e08,2024-06-24T18:49:09.500000 -CVE-2024-35778,0,0,5682b632dfc51cfacdddf5bb47d14c3256bcf6bd9ead6064f4b1ae3ebc67c8b1,2024-06-24T19:15:07.360000 +CVE-2024-35778,0,1,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000 CVE-2024-35779,0,0,08d2aa367351b69a649cc12f9302f4c59f9bed6fe925bf37e513bed83cbc3764,2024-06-24T18:40:26.157000 CVE-2024-35780,0,0,0cb83863c03783254bdbb259245f43349fceaa55402150e68b96501fc1a18c7e,2024-06-20T12:44:01.637000 CVE-2024-35781,0,0,8ad2da87cca362f8f311ac7da3875897822d38c021b6c490689c42a05fe866f5,2024-06-24T19:15:58.517000 @@ -253526,7 +253529,7 @@ CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67 CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000 -CVE-2024-37389,1,1,eb49ab026d347a0f0672e015074c79d1b9639f4e450caaa9b01e59a990b09593,2024-07-08T08:15:10.847000 +CVE-2024-37389,0,0,eb49ab026d347a0f0672e015074c79d1b9639f4e450caaa9b01e59a990b09593,2024-07-08T08:15:10.847000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 @@ -253702,6 +253705,7 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027 CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000 CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000 CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000 +CVE-2024-37999,1,1,97f06bd07832c67fa474c988dae9f15fb92130b11c561bcd5a9960264b2750f3,2024-07-08T11:15:10.487000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000