diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1182.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1182.json new file mode 100644 index 00000000000..fe0c72ea760 --- /dev/null +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1182.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-1182", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-07-04T09:15:02.743", + "lastModified": "2024-07-04T09:15:02.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code by storing a specially crafted DLL in a specific folder when GENESIS64 and MC Works64 are installed with the Pager agent in the alarm multi-agent notification feature." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU98894016/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1573.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1573.json new file mode 100644 index 00000000000..ca3a08fbba7 --- /dev/null +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1573.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-1573", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-07-04T09:15:03.260", + "lastModified": "2024-07-04T09:15:03.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Authentication vulnerability in the mobile monitoring feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting.\n * \u201cAutomatic log in\u201d option is enabled in the security setting.\n * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account.\n * The IcoAnyGlass IIS Application Pool account is included in GENESIS64TM and MC Works64 Security and has permission to log in." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU98894016/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1574.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1574.json new file mode 100644 index 00000000000..7d0967ae00a --- /dev/null +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1574.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-1574", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-07-04T09:15:03.720", + "lastModified": "2024-07-04T09:15:03.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in the licensing feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-470" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU98894016/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34584.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34584.json index 92ee197e036..0b6ac6a32a7 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34584.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34584.json @@ -2,47 +2,15 @@ "id": "CVE-2024-34584", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-07-02T10:15:06.233", - "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-04T09:15:04.093", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper privilege management in SumeNNService prior to SMR Jul-2024 Release 1 allows local attackers to start privileged service." - }, - { - "lang": "es", - "value": "La gesti\u00f3n inadecuada de privilegios en SumeNNService antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar un servicio privilegiado." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. Reason: An additional patch is required." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "mobile.security@samsung.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.4, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 2.5, - "impactScore": 5.9 - } - ] - }, - "references": [ - { - "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07", - "source": "mobile.security@samsung.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39884.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39884.json new file mode 100644 index 00000000000..eb83d78da15 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39884.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39884", + "sourceIdentifier": "security@apache.org", + "published": "2024-07-04T09:15:04.237", + "lastModified": "2024-07-04T09:15:04.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.\u00a0 \u00a0\"AddType\" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.\n\nUsers are recommended to upgrade to version 2.4.61, which fixes this issue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://httpd.apache.org/security/vulnerabilities_24.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3904.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3904.json new file mode 100644 index 00000000000..fe583cc4a2d --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3904.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-3904", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-07-04T09:15:04.317", + "lastModified": "2024-07-04T09:15:04.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Default Permissions vulnerability in Smart Device Communication Gateway preinstalled on MELIPC Series MI5122-VW firmware versions \"05\" to \"07\" allows a local attacker to execute arbitrary code by saving a malicious file to a specific folder. As a result, the attacker may disclose, tamper with, destroy or delete information in the product, or cause a denial-of-service (DoS) condition on the product." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-003_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5641.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5641.json new file mode 100644 index 00000000000..2204584f38b --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5641.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-5641", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-04T08:15:01.980", + "lastModified": "2024-07-04T08:15:01.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The One Click Order Re-Order plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ced_ocor_save_general_setting' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the plugin settings, including adding stored cross-site scripting." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/one-click-order-reorder/trunk/includes/class-basket-order.php#L489", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3110914/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a297784-96cd-4135-a8f1-e50f3a0d71bd?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6318.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6318.json new file mode 100644 index 00000000000..8732df4c3be --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6318.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-6318", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-04T09:15:04.653", + "lastModified": "2024-07-04T09:15:04.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The IMGspider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_img_file' function in all versions up to, and including, 2.3.10. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/imgspider/tags/2.3.10/classes/post.class.php#L122", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3107741/imgspider", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/306f00e4-9a70-48be-a91e-e396643a8129?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6319.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6319.json new file mode 100644 index 00000000000..e0359c8f574 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6319.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-6319", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-04T09:15:05.087", + "lastModified": "2024-07-04T09:15:05.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The IMGspider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload' function in all versions up to, and including, 2.3.10. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/imgspider/tags/2.3.10/classes/post.class.php#L189", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3107741/imgspider", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/63a4a077-c99e-4742-9fa1-f323fd24b950?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6434.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6434.json new file mode 100644 index 00000000000..14a1dfcb027 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6434.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-6434", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-04T09:15:05.410", + "lastModified": "2024-07-04T09:15:05.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 4.10.35. This is due to processing user-supplied input as a regular expression. This makes it possible for authenticated attackers, with Author-level access and above, to create and query a malicious post title, resulting in slowing server resources." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/class-premium-template-tags.php#L1676", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3110991/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c59d95a-b7f1-4a04-bbf4-bab2c42d6d75?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 93209d57e6f..ae705e47fc5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-04T08:01:51.182195+00:00 +2024-07-04T10:03:38.103043+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-04T07:15:10.927000+00:00 +2024-07-04T09:15:05.410000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255856 +255865 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `9` +- [CVE-2024-1182](CVE-2024/CVE-2024-11xx/CVE-2024-1182.json) (`2024-07-04T09:15:02.743`) +- [CVE-2024-1573](CVE-2024/CVE-2024-15xx/CVE-2024-1573.json) (`2024-07-04T09:15:03.260`) +- [CVE-2024-1574](CVE-2024/CVE-2024-15xx/CVE-2024-1574.json) (`2024-07-04T09:15:03.720`) +- [CVE-2024-3904](CVE-2024/CVE-2024-39xx/CVE-2024-3904.json) (`2024-07-04T09:15:04.317`) +- [CVE-2024-39884](CVE-2024/CVE-2024-398xx/CVE-2024-39884.json) (`2024-07-04T09:15:04.237`) +- [CVE-2024-5641](CVE-2024/CVE-2024-56xx/CVE-2024-5641.json) (`2024-07-04T08:15:01.980`) +- [CVE-2024-6318](CVE-2024/CVE-2024-63xx/CVE-2024-6318.json) (`2024-07-04T09:15:04.653`) +- [CVE-2024-6319](CVE-2024/CVE-2024-63xx/CVE-2024-6319.json) (`2024-07-04T09:15:05.087`) +- [CVE-2024-6434](CVE-2024/CVE-2024-64xx/CVE-2024-6434.json) (`2024-07-04T09:15:05.410`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `1` -- [CVE-2023-33919](CVE-2023/CVE-2023-339xx/CVE-2023-33919.json) (`2024-07-04T07:15:10.190`) -- [CVE-2023-7270](CVE-2023/CVE-2023-72xx/CVE-2023-7270.json) (`2024-07-04T07:15:10.497`) -- [CVE-2024-31484](CVE-2024/CVE-2024-314xx/CVE-2024-31484.json) (`2024-07-04T07:15:10.583`) -- [CVE-2024-31485](CVE-2024/CVE-2024-314xx/CVE-2024-31485.json) (`2024-07-04T07:15:10.720`) -- [CVE-2024-31486](CVE-2024/CVE-2024-314xx/CVE-2024-31486.json) (`2024-07-04T07:15:10.823`) -- [CVE-2024-5672](CVE-2024/CVE-2024-56xx/CVE-2024-5672.json) (`2024-07-04T07:15:10.927`) +- [CVE-2024-34584](CVE-2024/CVE-2024-345xx/CVE-2024-34584.json) (`2024-07-04T09:15:04.093`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b772bc93a8c..d1463409b11 100644 --- a/_state.csv +++ b/_state.csv @@ -225280,7 +225280,7 @@ CVE-2023-33915,0,0,bef751cb2392ba80ffc5bfe2452df666eb5fca1c0c602cb155de7ce8b795e CVE-2023-33916,0,0,ec8dde4d626d50c7a190c2dafc658a4cf23bb09a165bd11614e523674dca093a,2023-09-07T22:10:13.420000 CVE-2023-33917,0,0,c0d4fed743edf140cb005fcb59deef567e3e63f2611ecb807d488919e21b974b,2023-09-07T22:10:26.873000 CVE-2023-33918,0,0,8426773b09bc72338393f8ab4555dd843b4db1c3c5fc59c9feec94bd1936b58a,2023-09-07T22:10:36.430000 -CVE-2023-33919,0,1,aa5c649e41e5d4546fe66d014a833d50f65f32863ad8f3cdc044c1aaca5cb79a,2024-07-04T07:15:10.190000 +CVE-2023-33919,0,0,aa5c649e41e5d4546fe66d014a833d50f65f32863ad8f3cdc044c1aaca5cb79a,2024-07-04T07:15:10.190000 CVE-2023-3392,0,0,ccfc4d3cb4472586b1ef254d78c33838614fd17466a3724a7a63ce97644d334e,2023-11-07T04:18:40.383000 CVE-2023-33920,0,0,071e18d64554b17ef528a1999d536c21732eff3e8fb740e75f8fbffe97efb5e9,2023-07-11T18:15:16.023000 CVE-2023-33921,0,0,07b7199a0555d54698c588bd945cb4f829d2d6b7fec6496985dc3dcb69d6ae56,2023-07-11T18:15:16.093000 @@ -240626,7 +240626,7 @@ CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede55 CVE-2023-7259,0,0,291fdf96791c66804d1f0d3fb86a244e544f8112f70bc253658c7b47edf99960,2024-06-04T19:18:14.193000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,1c4cfb34070a7ce4966884df1379f77375459d76b20ac1f3cbf195ee6437fa6a,2024-06-11T13:54:12.057000 -CVE-2023-7270,0,1,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000 +CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000 CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000 CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000 CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000 @@ -241662,6 +241662,7 @@ CVE-2024-1178,0,0,1d79d2baf0c52babf00a18f14ce6291cb7fba70afba005e5722ced55b2d8af CVE-2024-1179,0,0,021c629d3779737b7d82b050f297fa166d2dce17da45eec990d84ef3164da439,2024-04-02T12:50:42.233000 CVE-2024-1180,0,0,67cc918e7b225376383a234e7a182443eae07c7dc034d299d9771cc94c55c9b6,2024-04-03T17:24:18.150000 CVE-2024-1181,0,0,3878a855f0577e7ef140d59905a2ce6431a946183d23ae64dcb6feffc50f80bc,2024-03-20T13:00:16.367000 +CVE-2024-1182,1,1,97dd760accba3f9619b5db747b46c1d99d415aa78de66c6e87be5742637c5d6c,2024-07-04T09:15:02.743000 CVE-2024-1183,0,0,ad3d5dd53b834e77fe27d619baf926c439310129c1f2f0d669e6120516ae79a3,2024-04-16T13:24:07.103000 CVE-2024-1184,0,0,023de5aadf78be1bb550c307602914123c4a319819f238db99009f5ee03b6925,2024-05-17T02:35:16.900000 CVE-2024-1185,0,0,0bdb213dbdb0433604bf4f6f8c159144762d1971d8fe18244dfa60142ddf3fc4,2024-06-26T15:15:19.220000 @@ -242023,6 +242024,8 @@ CVE-2024-1569,0,0,4b71bedec4a1528fa42ec60009db4665ea96567ec249e5864edd831fa0bb98 CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000 CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000 CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000 +CVE-2024-1573,1,1,525026c1a1d2dc269cdc0824f8b93c4407a053b0a85eff2fec0031cccd4f9e9d,2024-07-04T09:15:03.260000 +CVE-2024-1574,1,1,56d863daf3f49f005e1f6b5e3bd1cc334888364aca430a39a69808f44d9b50a1,2024-07-04T09:15:03.720000 CVE-2024-1576,0,0,6db392527516528e14eb0ea0191722707d0a406a5c4d32feed7275ee783f8c4b,2024-06-13T18:36:09.010000 CVE-2024-1577,0,0,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000 CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000 @@ -249945,9 +249948,9 @@ CVE-2024-31480,0,0,86a08888be6144dad7f109bcbc1e02bef137f5ec61892a589a8c1d32bdd1d CVE-2024-31481,0,0,3cfd49abb9f667805e469e5ad5364d7cc935c3e4cd673de3efb106e0bfc78efb,2024-07-03T01:55:02.813000 CVE-2024-31482,0,0,89e6919adebfceffee7b9ef72fc557a7257e2359e0de4d03c9ea7df82ed31700,2024-07-03T01:55:03.583000 CVE-2024-31483,0,0,bde678327370835d1aa36e347db01998d4ec66a2275c4946d48e0c638b6c74ca,2024-05-15T16:40:19.330000 -CVE-2024-31484,0,1,5672ec4ee0d3e43ec96c288a3709774dcab1167571e972ebbb5dbd475cfc8bb9,2024-07-04T07:15:10.583000 -CVE-2024-31485,0,1,95e7eeaa8d3876cb40bd1169861bc0a7332c54b51b97ae90600f4cdafa502dad,2024-07-04T07:15:10.720000 -CVE-2024-31486,0,1,8bbeb872b9695d04b4cd3936fc99563ad2e7fa2388523728e9f4697b70eb399e,2024-07-04T07:15:10.823000 +CVE-2024-31484,0,0,5672ec4ee0d3e43ec96c288a3709774dcab1167571e972ebbb5dbd475cfc8bb9,2024-07-04T07:15:10.583000 +CVE-2024-31485,0,0,95e7eeaa8d3876cb40bd1169861bc0a7332c54b51b97ae90600f4cdafa502dad,2024-07-04T07:15:10.720000 +CVE-2024-31486,0,0,8bbeb872b9695d04b4cd3936fc99563ad2e7fa2388523728e9f4697b70eb399e,2024-07-04T07:15:10.823000 CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000 CVE-2024-31488,0,0,8fd4ea2d7a10d03e6cc8df9fdf21315abd98246cc112d9626a2dc74747d004e0,2024-05-14T19:17:55.627000 CVE-2024-3149,0,0,1cacbb29f9ddcc59e6c60c0392e5807353110e97934b561ed3eff00ed3bff641,2024-06-07T14:56:05.647000 @@ -251846,7 +251849,7 @@ CVE-2024-34580,0,0,19940bb2c544766cd6c53ffdca8fb9e214f270c8b9158a8629c2ecdb51324 CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000 CVE-2024-34582,0,0,589200e4299098a43f17589b3359a4252ec2c8c3c5fc845d002a18066ab71c11,2024-07-03T02:00:41.190000 CVE-2024-34583,0,0,d92099cb2aacb9940a376e2e0c9537aa23ff3e9bc91c630cc7027a285ebda73d,2024-07-02T12:09:16.907000 -CVE-2024-34584,0,0,66f579d58d0cc7857dc55afaee042ff4470394e6d336c56a30139b656962b66c,2024-07-02T12:09:16.907000 +CVE-2024-34584,0,1,8e6f74275c7d42c51cc63abbe20a1a32c65348536b87a8575709018bb0cfcfc2,2024-07-04T09:15:04.093000 CVE-2024-34585,0,0,ee8a251702fee14d8824e610a55296979d395fc30ca6242ef0d771950dd8a16c,2024-07-02T12:09:16.907000 CVE-2024-34586,0,0,85ea0e1776d595c70d1b77b7c2a6e5386b5196b05d554fbb5d36eb03a3aca46d,2024-07-02T12:09:16.907000 CVE-2024-34587,0,0,12a6bb49f8fa1d3da9fa63d0f36b9f078a4757ebe15d04c02460d0cd53601e2b,2024-07-02T12:09:16.907000 @@ -253996,6 +253999,7 @@ CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db39 CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 +CVE-2024-3904,1,1,c5765cf5b9d9395a166e5f9497abbc0c75afd17eef49668e50ad189eeca3d838,2024-07-04T09:15:04.317000 CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000 CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000 @@ -254158,6 +254162,7 @@ CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 +CVE-2024-39884,1,1,91cbd8ded2e4683c39dfef6707444bdb9aba0a44a7e9eae96339027dc4b99d07,2024-07-04T09:15:04.237000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000 @@ -255448,6 +255453,7 @@ CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3 CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000 CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000 CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000 +CVE-2024-5641,1,1,302257d539c3a4fe0e3331a2a68b0052238d89c20df69a4f9616726a8c28637c,2024-07-04T08:15:01.980000 CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000 CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000 @@ -255466,7 +255472,7 @@ CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b56016278 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000 -CVE-2024-5672,0,1,f5a12bcb715953ed5e26da08bd0383fadd90bbd0ce6d756b0add14944c6f54d5,2024-07-04T07:15:10.927000 +CVE-2024-5672,0,0,f5a12bcb715953ed5e26da08bd0383fadd90bbd0ce6d756b0add14944c6f54d5,2024-07-04T07:15:10.927000 CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 @@ -255805,6 +255811,8 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372 CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000 CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 +CVE-2024-6318,1,1,e033378ac4544687400474837a8b9fb1fb7ef6cbc1b4ab7f07f0cd63fde00254,2024-07-04T09:15:04.653000 +CVE-2024-6319,1,1,1c94f040c5cd0de82491b8e7d77e2e4bd7efa09bf92ae831fabe7dcf4f48e7be,2024-07-04T09:15:05.087000 CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 @@ -255842,6 +255850,7 @@ CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc8 CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000 CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000 CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000 +CVE-2024-6434,1,1,159c06c28af995898176b2d52f1d50311b3051bc0d4d4281e9110d212e9abad5,2024-07-04T09:15:05.410000 CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000