diff --git a/CVE-2022/CVE-2022-249xx/CVE-2022-24975.json b/CVE-2022/CVE-2022-249xx/CVE-2022-24975.json index 3f289ae8657..6c27acdcd0a 100644 --- a/CVE-2022/CVE-2022-249xx/CVE-2022-24975.json +++ b/CVE-2022/CVE-2022-249xx/CVE-2022-24975.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24975", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-11T20:15:07.507", - "lastModified": "2024-07-02T14:15:12.013", + "lastModified": "2024-08-01T09:15:02.447", "vulnStatus": "Modified", "cveTags": [ { @@ -110,6 +110,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/", + "source": "cve@mitre.org" + }, { "url": "https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json new file mode 100644 index 00000000000..f474a6d02a3 --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25948.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-25948", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-08-01T08:15:02.203", + "lastModified": "2024-08-01T08:15:02.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event." + }, + { + "lang": "es", + "value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json new file mode 100644 index 00000000000..a420e1d0f36 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28972.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-28972", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-08-01T08:15:02.520", + "lastModified": "2024-08-01T08:15:02.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to information disclosure." + }, + { + "lang": "es", + "value": "Dell InsightIQ, versi\u00f3n 5.0.0, contiene una vulnerabilidad relacionada con el uso de un algoritmo criptogr\u00e1fico da\u00f1ado o riesgoso. Un atacante remoto no autenticado podr\u00eda aprovechar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226567/dsa-2024-211-security-update-for-a-dell-insightiq-broken-or-risky-cryptographic-algorithm-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json new file mode 100644 index 00000000000..b991a9fe7d5 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38481.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38481", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-08-01T08:15:02.767", + "lastModified": "2024-08-01T08:15:02.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event." + }, + { + "lang": "es", + "value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de lectura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json new file mode 100644 index 00000000000..794bfca5b18 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38489.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38489", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-08-01T08:15:02.980", + "lastModified": "2024-08-01T08:15:02.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service (partial) event." + }, + { + "lang": "es", + "value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio (parcial)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json new file mode 100644 index 00000000000..a218e23d31e --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38490.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38490", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-08-01T08:15:03.187", + "lastModified": "2024-08-01T08:15:03.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event." + }, + { + "lang": "es", + "value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41684.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41684.json index 4863e7d338b..4b31b90c662 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41684.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41684.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41684", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:02.763", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.390", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json index f410faebcd9..1573243a95a 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41685", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:02.977", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.547", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41686.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41686.json index c12bb176213..4b11413b44e 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41686.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41686.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41686", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:03.113", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.640", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41687.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41687.json index 4034a68bfd8..6aced9a96df 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41687.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41687.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41687", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:03.250", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.730", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41688.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41688.json index 7d35abb8b5d..5680722bdc2 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41688.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41688.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41688", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:03.370", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.817", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41689.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41689.json index 2ea0c6eb7d1..91a3325c7af 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41689.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41689.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41689", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:03.490", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.907", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41690.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41690.json index 79a64baa1f4..95bbeb79c77 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41690.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41690.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41690", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:03.623", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:03.990", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41691.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41691.json index 2ea9fb3f06b..ef0f29ccd68 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41691.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41691.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41691", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:03.753", - "lastModified": "2024-07-26T12:38:41.683", + "lastModified": "2024-08-01T08:15:04.083", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41692.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41692.json index 9b961061e54..1a97db29dc0 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41692.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41692.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41692", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T13:15:09.947", - "lastModified": "2024-07-29T14:12:08.783", + "lastModified": "2024-08-01T08:15:04.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225", "source": "vdisclose@cert-in.org.in" } ] diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json index 0f713f2f9ee..772d86f6230 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6975.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6975", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:11.640", - "lastModified": "2024-07-31T20:15:07.613", + "lastModified": "2024-08-01T09:15:03.097", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration fileThis issue affects SDP Client before 5.10.34." + "value": "Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration file.\nThis issue affects SDP Client before 5.10.34." + }, + { + "lang": "es", + "value": " Escalada de privilegios locales del cliente SDP de Cato Networks Windows SDP a trav\u00e9s del archivo de configuraci\u00f3n openssl. Este problema afecta a SDP Client anterior a la versi\u00f3n 5.10.34." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json index 056682419e3..1515a5548bc 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 3gp2 file uploads in all versions up to, and including, 7.5.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the 3gp2 file." + }, + { + "lang": "es", + "value": "El complemento Blog2Social: Social Media Auto Post & Scheduler para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos 3gp2 en todas las versiones hasta la 7.5.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo 3gp2." } ], "metrics": { diff --git a/README.md b/README.md index 9428f0cbb1d..bc8869ef223 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-01T08:00:17.086040+00:00 +2024-08-01T10:00:16.930093+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-01T07:15:03.300000+00:00 +2024-08-01T09:15:03.097000+00:00 ``` ### Last Data Feed Release @@ -33,31 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -258722 +258727 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `5` -- [CVE-2024-1747](CVE-2024/CVE-2024-17xx/CVE-2024-1747.json) (`2024-08-01T06:15:01.980`) -- [CVE-2024-25947](CVE-2024/CVE-2024-259xx/CVE-2024-25947.json) (`2024-08-01T07:15:02.140`) -- [CVE-2024-2843](CVE-2024/CVE-2024-28xx/CVE-2024-2843.json) (`2024-08-01T06:15:02.367`) -- [CVE-2024-2872](CVE-2024/CVE-2024-28xx/CVE-2024-2872.json) (`2024-08-01T06:15:02.443`) -- [CVE-2024-3983](CVE-2024/CVE-2024-39xx/CVE-2024-3983.json) (`2024-08-01T06:15:02.517`) -- [CVE-2024-4090](CVE-2024/CVE-2024-40xx/CVE-2024-4090.json) (`2024-08-01T06:15:02.587`) -- [CVE-2024-5330](CVE-2024/CVE-2024-53xx/CVE-2024-5330.json) (`2024-08-01T07:15:02.520`) -- [CVE-2024-5331](CVE-2024/CVE-2024-53xx/CVE-2024-5331.json) (`2024-08-01T07:15:02.783`) -- [CVE-2024-5678](CVE-2024/CVE-2024-56xx/CVE-2024-5678.json) (`2024-08-01T07:15:03.053`) -- [CVE-2024-6496](CVE-2024/CVE-2024-64xx/CVE-2024-6496.json) (`2024-08-01T06:15:02.660`) -- [CVE-2024-6529](CVE-2024/CVE-2024-65xx/CVE-2024-6529.json) (`2024-08-01T06:15:02.737`) -- [CVE-2024-7302](CVE-2024/CVE-2024-73xx/CVE-2024-7302.json) (`2024-08-01T07:15:03.300`) +- [CVE-2024-25948](CVE-2024/CVE-2024-259xx/CVE-2024-25948.json) (`2024-08-01T08:15:02.203`) +- [CVE-2024-28972](CVE-2024/CVE-2024-289xx/CVE-2024-28972.json) (`2024-08-01T08:15:02.520`) +- [CVE-2024-38481](CVE-2024/CVE-2024-384xx/CVE-2024-38481.json) (`2024-08-01T08:15:02.767`) +- [CVE-2024-38489](CVE-2024/CVE-2024-384xx/CVE-2024-38489.json) (`2024-08-01T08:15:02.980`) +- [CVE-2024-38490](CVE-2024/CVE-2024-384xx/CVE-2024-38490.json) (`2024-08-01T08:15:03.187`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `12` +- [CVE-2022-24975](CVE-2022/CVE-2022-249xx/CVE-2022-24975.json) (`2024-08-01T09:15:02.447`) +- [CVE-2024-41684](CVE-2024/CVE-2024-416xx/CVE-2024-41684.json) (`2024-08-01T08:15:03.390`) +- [CVE-2024-41685](CVE-2024/CVE-2024-416xx/CVE-2024-41685.json) (`2024-08-01T08:15:03.547`) +- [CVE-2024-41686](CVE-2024/CVE-2024-416xx/CVE-2024-41686.json) (`2024-08-01T08:15:03.640`) +- [CVE-2024-41687](CVE-2024/CVE-2024-416xx/CVE-2024-41687.json) (`2024-08-01T08:15:03.730`) +- [CVE-2024-41688](CVE-2024/CVE-2024-416xx/CVE-2024-41688.json) (`2024-08-01T08:15:03.817`) +- [CVE-2024-41689](CVE-2024/CVE-2024-416xx/CVE-2024-41689.json) (`2024-08-01T08:15:03.907`) +- [CVE-2024-41690](CVE-2024/CVE-2024-416xx/CVE-2024-41690.json) (`2024-08-01T08:15:03.990`) +- [CVE-2024-41691](CVE-2024/CVE-2024-416xx/CVE-2024-41691.json) (`2024-08-01T08:15:04.083`) +- [CVE-2024-41692](CVE-2024/CVE-2024-416xx/CVE-2024-41692.json) (`2024-08-01T08:15:04.173`) +- [CVE-2024-6975](CVE-2024/CVE-2024-69xx/CVE-2024-6975.json) (`2024-08-01T09:15:03.097`) +- [CVE-2024-7302](CVE-2024/CVE-2024-73xx/CVE-2024-7302.json) (`2024-08-01T07:15:03.300`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5e69c917bc2..042c79c0ce6 100644 --- a/_state.csv +++ b/_state.csv @@ -193982,7 +193982,7 @@ CVE-2022-24971,0,0,b0ec64ce85d02676128b2391e83c3a0904b022f7f222dffc5466868a30d12 CVE-2022-24972,0,0,8ca286053ef211cb717e8d7ba05404f77cb656fa6c149573f4f398c341507249,2023-04-05T03:34:41.627000 CVE-2022-24973,0,0,6650a12e7f7242fbdbdddfd89df53b30a62a61449f0bbf1e3070c5cf8806ef6a,2023-04-05T03:35:31.440000 CVE-2022-24974,0,0,fba3a9c12ff147ef841443e5fe2e4f3e297e031a813c3be9c249e2f40a5ba227,2022-05-11T00:21:33.083000 -CVE-2022-24975,0,0,090928d5f9d7c099d5773345efee0557e0185c91541eaf0adff9eb64b31ff24e,2024-07-02T14:15:12.013000 +CVE-2022-24975,0,1,60a38241a1999df0b051f185d939ee92807ebaf4a33cfc59a64a863ae2e75245,2024-08-01T09:15:02.447000 CVE-2022-24976,0,0,9d164c5ffac11b9a353375464b382d1507e31d1dcd0776c643e98607a371d3ac,2022-02-23T15:51:09.573000 CVE-2022-24977,0,0,991181fb0f347b7660a40d47a98a2df1472959b4e57cf91f9ea277e9ff907058,2022-02-24T15:12:00.587000 CVE-2022-24978,0,0,50d845b969b7e012c0869852e6f86b59f8ebbb78f2d6ace97d66ac19b3bf3cde,2023-08-08T14:22:24.967000 @@ -242434,7 +242434,7 @@ CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4 CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 CVE-2024-1745,0,0,2df7fa4c4fa47f53e57d7b3e9d1babc8c2b1750e2bc785796313c72e8ffb6593,2024-03-26T12:55:05.010000 CVE-2024-1746,0,0,8022383f443dbbb627f1c414153375fa50b320afeba598d9c8de3dc5c8a81f57,2024-04-15T13:15:31.997000 -CVE-2024-1747,1,1,bba88062968e921ca1473ab61d2b6b3e36b1f4c0248a27106c749c99d98abf88,2024-08-01T06:15:01.980000 +CVE-2024-1747,0,0,bba88062968e921ca1473ab61d2b6b3e36b1f4c0248a27106c749c99d98abf88,2024-08-01T06:15:01.980000 CVE-2024-1748,0,0,225d9c0ba3d2388d2e1d2564afa842c8e38abf8b0b7cfc5e0b1ec6fc81b6c96c,2024-05-17T02:35:34.880000 CVE-2024-1749,0,0,f620be6c4367805be5c83719352e695698d105470ce084642dece004f1c7c3f4,2024-05-17T02:35:35.020000 CVE-2024-1750,0,0,7f9ce3864064263c9a72249a090e6a4b7033b154fc6d744d107ff4cdf65d126b,2024-05-17T02:35:35.177000 @@ -246477,7 +246477,8 @@ CVE-2024-25942,0,0,ed9972b2a67908fa134e82ba51db8b6dda164f88a17fdef5830f031dbe673 CVE-2024-25943,0,0,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000 CVE-2024-25944,0,0,ab1a6f9559c2c17591ef013078bdc7d1074a6939146b74afdf8354c958a2a210,2024-04-01T01:12:59.077000 CVE-2024-25946,0,0,a113fddf4e672678a1d14cda275154cb9972765501ae2bed1e5e6a531e4a4550,2024-03-28T20:53:20.813000 -CVE-2024-25947,1,1,485470e617d7bd91b0ac4d1200f519b4198e68df5c5f6a749aa66b3078909a80,2024-08-01T07:15:02.140000 +CVE-2024-25947,0,0,485470e617d7bd91b0ac4d1200f519b4198e68df5c5f6a749aa66b3078909a80,2024-08-01T07:15:02.140000 +CVE-2024-25948,1,1,b1a8daba18f532e18688c786c199b0f61a9f31e5acabf8fcf1766745102f2aa8,2024-08-01T08:15:02.203000 CVE-2024-25949,0,0,cf19f3ab0bbae3d1ff74313cc0fe0f90bdd6c260c977bc35c843079a46627a59,2024-06-13T18:36:09.010000 CVE-2024-2595,0,0,e521c63ef6b03578b7bb7372b5bef2fecd2a3eebcba151ea7fc07a4fe787ff2a,2024-03-18T19:40:00.173000 CVE-2024-25951,0,0,3b1032e7dee2277c1cd9087f14c93f6b15f85f0de6dddc7df9693edc271d4b00,2024-03-11T01:32:39.697000 @@ -248437,7 +248438,7 @@ CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c CVE-2024-28424,0,0,ecd6a99ae0759c71ad1c7af9ca074920e1fe2279be45e00b413aeaea6bf2f2f8,2024-03-14T20:11:36.180000 CVE-2024-28425,0,0,a141e56038f4e753e81d857ec1e84aae2f8aa855ba4e2973635a5dc63a3d9ae9,2024-03-14T20:11:36.180000 CVE-2024-28429,0,0,d1463630e21be77443b70427954efe3756b4a41822fd121d66c94f7528f881a0,2024-03-13T14:28:45.217000 -CVE-2024-2843,1,1,4895415438190c94406cd89e69182d21ea05ffa00577f1f67fedd6f982ec7a8b,2024-08-01T06:15:02.367000 +CVE-2024-2843,0,0,4895415438190c94406cd89e69182d21ea05ffa00577f1f67fedd6f982ec7a8b,2024-08-01T06:15:02.367000 CVE-2024-28430,0,0,e694b5aca86262438d0540e9c897e671f295f2b82cd8f6ab688d6e70320d9a61,2024-03-13T14:28:45.217000 CVE-2024-28431,0,0,8fa73f38068ed582ca772506eb7716c8cb270f1afc451299119c169e18fc0496,2024-03-13T14:28:45.217000 CVE-2024-28432,0,0,d4feae1a91594686399f8946ac7d18a6f1fe8ae89dec56cc02626608077bbfd0,2024-03-13T14:28:45.217000 @@ -248553,7 +248554,7 @@ CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000 CVE-2024-28717,0,0,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000 CVE-2024-28718,0,0,17b78e31f850547b3e404b5336a5f452e3a516e939f6e425ec310b4ed9273277,2024-04-15T13:15:51.577000 -CVE-2024-2872,1,1,7d2c48b0ecdc472ddefeeaae58852037401c96bffa31f58efc16c68407506857,2024-08-01T06:15:02.443000 +CVE-2024-2872,0,0,7d2c48b0ecdc472ddefeeaae58852037401c96bffa31f58efc16c68407506857,2024-08-01T06:15:02.443000 CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000 CVE-2024-28725,0,0,759d7ace03ce49bd50f051acc14ff68a184bc288c90f7002afe9cdf646d255bc,2024-05-07T13:39:32.710000 CVE-2024-2873,0,0,ed9040959ed5f40d916defffcff03f64da72505082c3b91fe33a6506c19636e1,2024-03-26T12:55:05.010000 @@ -248733,6 +248734,7 @@ CVE-2024-28969,0,0,9aaf419f4a0f5578c1d360d21c88466bed088175329d02d5a4c08af5237b8 CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000 CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000 CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000 +CVE-2024-28972,1,1,d756f6addda93a7c284b986668a27e56ee364102435016902868a5e7a7d25511,2024-08-01T08:15:02.520000 CVE-2024-28973,0,0,c5833936687fc47280c5de84f71bab0362ecad8e5c2b89ba9d836c1b9ea2e1df,2024-06-26T12:44:29.693000 CVE-2024-28974,0,0,9abba18f604ec1e999d11794eb149d52c94c8b05cbfba16cb362e87c9a7f33fd,2024-05-29T19:50:25.303000 CVE-2024-28976,0,0,c0cfcb815492d56170eba26ed04c4ed5dc48c34f8cfcf09f6c5238d2d54ddae0,2024-04-24T13:39:42.883000 @@ -254885,7 +254887,10 @@ CVE-2024-38476,0,0,b3d9539bc16644d562156587edde82f59f7e5b8caca519713a03097d766f3 CVE-2024-38477,0,0,4e865b7fff5c5346863d587e484df8d5b457292ae17a1b95a338aa934a1871cd,2024-07-12T14:15:15.430000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 +CVE-2024-38481,1,1,bb72467f4e9afb2c4aa8a39e9674a8464de905722f00f950bfbff293f40ed790,2024-08-01T08:15:02.767000 +CVE-2024-38489,1,1,69ac789f31c4f03380ba303a395be773598cc5e427669db419e4462c13ad5bde,2024-08-01T08:15:02.980000 CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000 +CVE-2024-38490,1,1,da01ec7368c210ec9846fa69a0c396245ebbd3f153dbc63b210c9af31363abbc,2024-08-01T08:15:03.187000 CVE-2024-38491,0,0,45eb77a065b351e283c19fca52dbc0c415810a9854c6f93524e9a875f4b79ec5,2024-07-16T13:43:58.773000 CVE-2024-38492,0,0,2fff266f3514c7b21683e88c34d78fd98dc9ab17c356d1ffe5e976b9d4dacf92,2024-07-16T13:43:58.773000 CVE-2024-38493,0,0,7dab0c3b3c94bc494d9811e28eb01ed63c0107f6df03b64859d1b0c9c94817ec,2024-07-16T13:43:58.773000 @@ -255555,7 +255560,7 @@ CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9 CVE-2024-39826,0,0,afc70f78da14ad22cac1b695b7ec211098e49242f19223081d17abce3c71095c,2024-07-16T13:43:58.773000 CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955cd82,2024-07-16T13:43:58.773000 CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 -CVE-2024-3983,1,1,1f8df5f31240f1196d1c9d779c3b56a448b2e17cf205ce30df1742c82acb0ded,2024-08-01T06:15:02.517000 +CVE-2024-3983,0,0,1f8df5f31240f1196d1c9d779c3b56a448b2e17cf205ce30df1742c82acb0ded,2024-08-01T06:15:02.517000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 @@ -255915,7 +255920,7 @@ CVE-2024-40895,0,0,28ffbfad907ecd6e6665d2dbecd78214d48d230f78fe3bf5c93e6b599c909 CVE-2024-40897,0,0,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000 CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000 CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000 -CVE-2024-4090,1,1,855074d3c79710ef5f4103aa21317adbfbba962b40309ff8b9c00edd41ef92e8,2024-08-01T06:15:02.587000 +CVE-2024-4090,0,0,855074d3c79710ef5f4103aa21317adbfbba962b40309ff8b9c00edd41ef92e8,2024-08-01T06:15:02.587000 CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000 CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000 CVE-2024-40902,0,0,2f7d4ca94747f48550a0025dcb58bda474d1a7adef8eacd89e2d7ec7535468d0,2024-07-24T18:52:23.540000 @@ -256282,16 +256287,16 @@ CVE-2024-41671,0,0,c3887e08a19f6a4662d206364ee646486b6ffd74972535a505600e6869433 CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000 CVE-2024-41676,0,0,4edd6c50f14612f7776f922c6baad3f4ffc072867d1278ee28662409b50e6afc,2024-07-29T16:21:52.517000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 -CVE-2024-41684,0,0,15187a16e3d50aa920a17db9f9940d7239fa5ed873cbc7a8cfd9738753dd0bc2,2024-07-26T12:38:41.683000 -CVE-2024-41685,0,0,4f956c9758e7eb71f9f90f7b5468f25ce9be3aedf0fb0f5c33d2639621a5dd4a,2024-07-26T12:38:41.683000 -CVE-2024-41686,0,0,71bdf1de9830b023fadf6e6ed824e54f05b37f8d80deb626edf937d98e875b35,2024-07-26T12:38:41.683000 -CVE-2024-41687,0,0,09e07e888289ae16012859b2d10e80b35264957162a494e901402da12edd251c,2024-07-26T12:38:41.683000 -CVE-2024-41688,0,0,b58e28e21aa6b4430d721f31f39e8d6756c267436991282570a3fe510078f9e5,2024-07-26T12:38:41.683000 -CVE-2024-41689,0,0,e25a894d3c83cbce543b44e8d652d5dc0ac5545adea56f8ed329b98800a6ee33,2024-07-26T12:38:41.683000 +CVE-2024-41684,0,1,c04c7a72cb63ae7eeb8584b102c76882304d9bf5cb81d153e75d8ddb331bc6dc,2024-08-01T08:15:03.390000 +CVE-2024-41685,0,1,93eaff307f4f8791a8e8ff304ad0c9cc6b3c2580cc14efd1e8266bfdcba69042,2024-08-01T08:15:03.547000 +CVE-2024-41686,0,1,0d750b3e1e6c898024728468d3ecdbea6b50cb803a8aba6286daab29ba27ba2d,2024-08-01T08:15:03.640000 +CVE-2024-41687,0,1,236ced32c22135d66076b15c4bc6f24fb950953a526ecc4c5b2d92335e257049,2024-08-01T08:15:03.730000 +CVE-2024-41688,0,1,746c3c2890722cb9f7b8ea8d96eb0b8363f7ff857349b769b2e6b8f58085985d,2024-08-01T08:15:03.817000 +CVE-2024-41689,0,1,9be2d562482cfc3d064e5ab5fb8d77d4697f05af7dc97a600649153ea522a427,2024-08-01T08:15:03.907000 CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000 -CVE-2024-41690,0,0,b18dad298671eb03eedc4db03bead7013ec614b16f648a4382d81a719b2d2fc8,2024-07-26T12:38:41.683000 -CVE-2024-41691,0,0,8445b625b8d8bbb501668875ad0019a23a5b4798b2ca9bb16e1f7ec443c79eb0,2024-07-26T12:38:41.683000 -CVE-2024-41692,0,0,0194fb9931aafdb4d2f1b1685143b7b5f004cffb9bb337e8efb40ab4dc65d8ec,2024-07-29T14:12:08.783000 +CVE-2024-41690,0,1,35be90cc2bd7acfab9e39dbfe92412aec5993182e9d5569f04dfd886d5d74ef0,2024-08-01T08:15:03.990000 +CVE-2024-41691,0,1,76c5ab4f047190ae82bc420dbc882ff72fa817dfca623de9877d2ccfc2eb5ed1,2024-08-01T08:15:04.083000 +CVE-2024-41692,0,1,76fce59975fea7d60513f610577bf9eb48ded8abd0f97ff5d106b232ba29c3fb,2024-08-01T08:15:04.173000 CVE-2024-41693,0,0,1ab2b4b7ed8f921d2bbd47d1a0a36dd7d080353c42c5a60fc142ad6c40def5b1,2024-07-30T13:32:45.943000 CVE-2024-41694,0,0,2beb2cafa0b59f0afe42f2c196fff55bc2e400d880d35147a1b32c39271b6739,2024-07-30T13:32:45.943000 CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfcc87,2024-07-30T13:32:45.943000 @@ -257471,8 +257476,8 @@ CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000 CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000 CVE-2024-5329,0,0,de038a5f353969046987a50080542fc21e5e9831f920643fcbf4110d57688954,2024-06-11T17:42:26.677000 -CVE-2024-5330,1,1,aa8b20eb4eca56a764c854b8fd469cf90539949cd0655af41122a9ffc25771b9,2024-08-01T07:15:02.520000 -CVE-2024-5331,1,1,59e680925298e50577f0d849de545a2b68ff077838b33f095a86e2637a604947,2024-08-01T07:15:02.783000 +CVE-2024-5330,0,0,aa8b20eb4eca56a764c854b8fd469cf90539949cd0655af41122a9ffc25771b9,2024-08-01T07:15:02.520000 +CVE-2024-5331,0,0,59e680925298e50577f0d849de545a2b68ff077838b33f095a86e2637a604947,2024-08-01T07:15:02.783000 CVE-2024-5332,0,0,b929b6d33cd728a86a1419cab1a953f1c1e8520fdf1d886c7808fd1a5444df6e,2024-06-26T12:44:29.693000 CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 @@ -257750,7 +257755,7 @@ CVE-2024-5674,0,0,19a588e59b6b0a5cd86582f1d6ecebdb5fae3e091de3e9e5a8f682eaf8708c CVE-2024-5675,0,0,c94a13a2a4b4b541f4d9019f3017bff689f5579f32759b7a87deb8cdfe0fb73d,2024-06-11T18:14:02.017000 CVE-2024-5676,0,0,ac70690e5e5a82915ea8b21175c3316ecbf6493d45f7e6ea6d37cbb46bb6c2ce,2024-06-24T05:15:09.600000 CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 -CVE-2024-5678,1,1,ec0eebbcae34fc7e7afbf6baa7acc0bf570b67cb5cd152170a8fdac0025f5fbe,2024-08-01T07:15:03.053000 +CVE-2024-5678,0,0,ec0eebbcae34fc7e7afbf6baa7acc0bf570b67cb5cd152170a8fdac0025f5fbe,2024-08-01T07:15:03.053000 CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000 CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000 CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000 @@ -258314,7 +258319,7 @@ CVE-2024-6490,0,0,8a5877d317a0eed7b1ae7b123dbc62aa28ad8c8fd8f1b2bd14476905cfed0a CVE-2024-6491,0,0,777eb845cac0fc56ad6345347b6b7dff4d99542463073dd5b5752a23e8a26dec,2024-07-22T13:00:53.287000 CVE-2024-6492,0,0,82f79625038ad5debf137137104e45e1e353947b9c4b14df742baece7a047a71,2024-07-17T13:34:20.520000 CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000 -CVE-2024-6496,1,1,43f5bc899f7b576e992b610d27fb07beccb54a6935873953b6f84243b1c8c315,2024-08-01T06:15:02.660000 +CVE-2024-6496,0,0,43f5bc899f7b576e992b610d27fb07beccb54a6935873953b6f84243b1c8c315,2024-08-01T06:15:02.660000 CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000 @@ -258332,7 +258337,7 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 -CVE-2024-6529,1,1,7d9ecbacb802f6a5ce3e4ab0c48539ed1c07a408b68bf91ec20a6b99341e19f6,2024-08-01T06:15:02.737000 +CVE-2024-6529,0,0,7d9ecbacb802f6a5ce3e4ab0c48539ed1c07a408b68bf91ec20a6b99341e19f6,2024-08-01T06:15:02.737000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000 CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 @@ -258559,7 +258564,7 @@ CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 CVE-2024-6973,0,0,76295ec3ebe0bf6ab46ddfd52badda08304b88e18a3d20fac7cbdb819136f0e1,2024-07-31T20:15:07.293000 CVE-2024-6974,0,0,7ef6b4f17e4d77510d507310e8365d24dcc0e8cace8ef658dfe2a033fdd6390d,2024-07-31T20:15:07.513000 -CVE-2024-6975,0,0,ca22a0195c509fab1d61f45e1ebeb84f6b19100e4b5911ad1431e1cb83d20538,2024-07-31T20:15:07.613000 +CVE-2024-6975,0,1,1b3bb18e08f814d7b2cc57908ec6de8ca6a8253cf52b1302675be3c13edfb1b5,2024-08-01T09:15:03.097000 CVE-2024-6977,0,0,3121777bd0a52ccf3540d69bf9a48fe1c1b7f86ef36c5a72b5a200933b1d9fe6,2024-07-31T17:15:11.860000 CVE-2024-6978,0,0,e2bc736f85bea0c52e162540a00648045c9f82e172db71c285eab8cf5b35db1f,2024-07-31T20:15:07.717000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 @@ -258692,7 +258697,7 @@ CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2b CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000 CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799ae9,2024-07-31T14:15:08.080000 -CVE-2024-7302,1,1,184ecf12b0245488f943fa0b7b48e96aeeaaa0427a8485fba3f7509b022125fb,2024-08-01T07:15:03.300000 +CVE-2024-7302,0,1,eb848575f59647066e1f15d90b3f2f1e5ea9438ae4b28a66c4f233e32054cb49,2024-08-01T07:15:03.300000 CVE-2024-7303,0,0,d7f72dd61499e6619ce7f5b3ddfad21cf84d8b933f5b61aad0d5acbabf0695d7,2024-07-31T12:57:02.300000 CVE-2024-7306,0,0,41d2dc73352be3adbe3da1c5ddee86e5aba159cd2a5da8e89aabb430dec59115,2024-07-31T12:57:02.300000 CVE-2024-7307,0,0,880aa0ea5c84e56fdc3b5eb36854e1998bc80835f78667a7a6ad57104577d4f7,2024-07-31T12:57:02.300000