Auto-Update: 2024-08-13T08:00:25.647843+00:00

This commit is contained in:
cad-safe-bot 2024-08-13 08:03:20 +00:00
parent 27003173b6
commit 083a6c1d9d
6 changed files with 351 additions and 40 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-6724",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-13T06:15:04.083",
"lastModified": "2024-08-13T06:15:04.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Generate Images WordPress plugin before 5.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-6823",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-13T06:15:05.120",
"lastModified": "2024-08-13T06:15:05.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation involving the mla-inline-edit-upload-scripts AJAX action in all versions up to, and including, 3.18. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-settings.php#L32",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3133909/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/media-library-assistant/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a446fe7-c97a-436e-b494-b924e6518297?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,84 @@
{
"id": "CVE-2024-7247",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-13T06:15:05.777",
"lastModified": "2024-08-13T06:15:05.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Gallery and Countdown widgets in all versions up to, and including, 5.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/bdt-uikit.js#L4223",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/ep-scripts.js#L514",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/ep-scripts.js#L576",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3133714/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3133714/#file1110",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3130355%40bdthemes-element-pack-lite&new=3130355%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/bdthemes-element-pack-lite/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86068c50-2f24-4af9-a20f-704d52e98ce2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,148 @@
{
"id": "CVE-2024-7715",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-13T07:15:13.677",
"lastModified": "2024-08-13T07:15:13.677",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_photo_search.md",
"source": "cna@vuldb.com"
},
{
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274281",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274281",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.389261",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-13T06:00:17.899409+00:00
2024-08-13T08:00:25.647843+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-13T05:15:14.027000+00:00
2024-08-13T07:15:13.677000+00:00
```
### Last Data Feed Release
@ -33,31 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259663
259667
```
### CVEs added in the last Commit
Recently added CVEs: `18`
Recently added CVEs: `4`
- [CVE-2024-28166](CVE-2024/CVE-2024-281xx/CVE-2024-28166.json) (`2024-08-13T04:15:06.867`)
- [CVE-2024-33003](CVE-2024/CVE-2024-330xx/CVE-2024-33003.json) (`2024-08-13T04:15:07.380`)
- [CVE-2024-33005](CVE-2024/CVE-2024-330xx/CVE-2024-33005.json) (`2024-08-13T04:15:07.740`)
- [CVE-2024-39591](CVE-2024/CVE-2024-395xx/CVE-2024-39591.json) (`2024-08-13T05:15:13.347`)
- [CVE-2024-41730](CVE-2024/CVE-2024-417xx/CVE-2024-41730.json) (`2024-08-13T04:15:08.050`)
- [CVE-2024-41731](CVE-2024/CVE-2024-417xx/CVE-2024-41731.json) (`2024-08-13T04:15:08.330`)
- [CVE-2024-41732](CVE-2024/CVE-2024-417xx/CVE-2024-41732.json) (`2024-08-13T04:15:08.637`)
- [CVE-2024-41733](CVE-2024/CVE-2024-417xx/CVE-2024-41733.json) (`2024-08-13T04:15:08.987`)
- [CVE-2024-41734](CVE-2024/CVE-2024-417xx/CVE-2024-41734.json) (`2024-08-13T05:15:13.587`)
- [CVE-2024-41735](CVE-2024/CVE-2024-417xx/CVE-2024-41735.json) (`2024-08-13T04:15:09.323`)
- [CVE-2024-41736](CVE-2024/CVE-2024-417xx/CVE-2024-41736.json) (`2024-08-13T04:15:09.607`)
- [CVE-2024-41737](CVE-2024/CVE-2024-417xx/CVE-2024-41737.json) (`2024-08-13T04:15:10.003`)
- [CVE-2024-42373](CVE-2024/CVE-2024-423xx/CVE-2024-42373.json) (`2024-08-13T05:15:13.800`)
- [CVE-2024-42374](CVE-2024/CVE-2024-423xx/CVE-2024-42374.json) (`2024-08-13T04:15:10.283`)
- [CVE-2024-42375](CVE-2024/CVE-2024-423xx/CVE-2024-42375.json) (`2024-08-13T04:15:10.567`)
- [CVE-2024-42376](CVE-2024/CVE-2024-423xx/CVE-2024-42376.json) (`2024-08-13T04:15:10.837`)
- [CVE-2024-42377](CVE-2024/CVE-2024-423xx/CVE-2024-42377.json) (`2024-08-13T04:15:11.290`)
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2024-08-13T05:15:14.027`)
- [CVE-2024-6724](CVE-2024/CVE-2024-67xx/CVE-2024-6724.json) (`2024-08-13T06:15:04.083`)
- [CVE-2024-6823](CVE-2024/CVE-2024-68xx/CVE-2024-6823.json) (`2024-08-13T06:15:05.120`)
- [CVE-2024-7247](CVE-2024/CVE-2024-72xx/CVE-2024-7247.json) (`2024-08-13T06:15:05.777`)
- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-13T07:15:13.677`)
### CVEs modified in the last Commit

View File

@ -248371,7 +248371,7 @@ CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bd
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
CVE-2024-28166,1,1,7561ba9adc211a54ff550cf61f548d2df6c3d29c89ba4aad56553fc7158d805c,2024-08-13T04:15:06.867000
CVE-2024-28166,0,0,7561ba9adc211a54ff550cf61f548d2df6c3d29c89ba4aad56553fc7158d805c,2024-08-13T04:15:06.867000
CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000
CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000
CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000
@ -251699,9 +251699,9 @@ CVE-2024-3300,0,0,5ed420ceec7dd67c7a8c90e2661f4216c9dcb91251ff120ca64b2c4babcfd8
CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528578,2024-05-14T19:17:55.627000
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
CVE-2024-33003,1,1,1602f1eee39755514cf50c32ab624620abb60d77d0069d1eb8bb4d10e7f6d86b,2024-08-13T04:15:07.380000
CVE-2024-33003,0,0,1602f1eee39755514cf50c32ab624620abb60d77d0069d1eb8bb4d10e7f6d86b,2024-08-13T04:15:07.380000
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
CVE-2024-33005,1,1,75a50d0d6a57563982befa31a2e9e5eacdf5e969935fcb1a171c87f62269c1e6,2024-08-13T04:15:07.740000
CVE-2024-33005,0,0,75a50d0d6a57563982befa31a2e9e5eacdf5e969935fcb1a171c87f62269c1e6,2024-08-13T04:15:07.740000
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000
@ -255756,7 +255756,7 @@ CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39591,1,1,47b8fbd24f262bf31363d8c62eae4af35dd97966fd65d2ffb9a2d93516dc83d8,2024-08-13T05:15:13.347000
CVE-2024-39591,0,0,47b8fbd24f262bf31363d8c62eae4af35dd97966fd65d2ffb9a2d93516dc83d8,2024-08-13T05:15:13.347000
CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000
CVE-2024-39593,0,0,51f4661ccbaba7452aac7223f24d0b1eb585ba800f6962a627249fa8658c86e6,2024-07-09T18:19:14.047000
CVE-2024-39594,0,0,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000
@ -256716,14 +256716,14 @@ CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c
CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
CVE-2024-41730,1,1,e17bf734c943b6202bbfa811dcc6a7236ac6ce5c1c0f693c29ef095ec38b00b8,2024-08-13T04:15:08.050000
CVE-2024-41731,1,1,455f8a77ca54850f0d8dda84bfc39499d031631c937c80555a015fc961a5f029,2024-08-13T04:15:08.330000
CVE-2024-41732,1,1,50da8c0b315ea9fd7548dda5a7cf64e03c1820450f60d9df33a5e039bf3fcfac,2024-08-13T04:15:08.637000
CVE-2024-41733,1,1,a1c4a714e7b1fde25db1437d340968bdca08ddd7580730ef8cffb3479028a039,2024-08-13T04:15:08.987000
CVE-2024-41734,1,1,60c2a737e28852ce1c0ae950a2bf3192eabf1787dfa51b4c5b646f34b52a9292,2024-08-13T05:15:13.587000
CVE-2024-41735,1,1,64465d3a78bd983d9984c0482f5581488c06987c94a936c9318947b31b86e104,2024-08-13T04:15:09.323000
CVE-2024-41736,1,1,d6fc4b89e5670a772dfb18d393fc0625c1347b587fb15bff596ab120a5a1a548,2024-08-13T04:15:09.607000
CVE-2024-41737,1,1,0bdfb2dd7deafee9a43dbb34847bceaee8248377819c5049ea82baf0bf49fb5e,2024-08-13T04:15:10.003000
CVE-2024-41730,0,0,e17bf734c943b6202bbfa811dcc6a7236ac6ce5c1c0f693c29ef095ec38b00b8,2024-08-13T04:15:08.050000
CVE-2024-41731,0,0,455f8a77ca54850f0d8dda84bfc39499d031631c937c80555a015fc961a5f029,2024-08-13T04:15:08.330000
CVE-2024-41732,0,0,50da8c0b315ea9fd7548dda5a7cf64e03c1820450f60d9df33a5e039bf3fcfac,2024-08-13T04:15:08.637000
CVE-2024-41733,0,0,a1c4a714e7b1fde25db1437d340968bdca08ddd7580730ef8cffb3479028a039,2024-08-13T04:15:08.987000
CVE-2024-41734,0,0,60c2a737e28852ce1c0ae950a2bf3192eabf1787dfa51b4c5b646f34b52a9292,2024-08-13T05:15:13.587000
CVE-2024-41735,0,0,64465d3a78bd983d9984c0482f5581488c06987c94a936c9318947b31b86e104,2024-08-13T04:15:09.323000
CVE-2024-41736,0,0,d6fc4b89e5670a772dfb18d393fc0625c1347b587fb15bff596ab120a5a1a548,2024-08-13T04:15:09.607000
CVE-2024-41737,0,0,0bdfb2dd7deafee9a43dbb34847bceaee8248377819c5049ea82baf0bf49fb5e,2024-08-13T04:15:10.003000
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
@ -257031,11 +257031,11 @@ CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbe
CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
CVE-2024-42370,0,0,bc0a8d588f536f34911e68724023599a65528bc23b4d4f6cda3f1a23005982af,2024-08-12T13:41:36.517000
CVE-2024-42373,1,1,268e0cf5636ad1593dd2f3bc44571d6f21506a7ab18d4661356804bd79de6260,2024-08-13T05:15:13.800000
CVE-2024-42374,1,1,3c9c8180947ca8ac780222a47604e8f8872ffd6769aa2151e9d00dede7d623e1,2024-08-13T04:15:10.283000
CVE-2024-42375,1,1,6065461be6bc5e18d7c3a47d5705a7300766beef5cd778d5692a794a88ed9446,2024-08-13T04:15:10.567000
CVE-2024-42376,1,1,89b8fa3dfa8d7405706484d0c53242159303a3d7305c907084b14e4b217a89c2,2024-08-13T04:15:10.837000
CVE-2024-42377,1,1,6d5101c542ad0c42fa99c43c1ce885fa8c19ec270a032faca7aa5391949c8e41,2024-08-13T04:15:11.290000
CVE-2024-42373,0,0,268e0cf5636ad1593dd2f3bc44571d6f21506a7ab18d4661356804bd79de6260,2024-08-13T05:15:13.800000
CVE-2024-42374,0,0,3c9c8180947ca8ac780222a47604e8f8872ffd6769aa2151e9d00dede7d623e1,2024-08-13T04:15:10.283000
CVE-2024-42375,0,0,6065461be6bc5e18d7c3a47d5705a7300766beef5cd778d5692a794a88ed9446,2024-08-13T04:15:10.567000
CVE-2024-42376,0,0,89b8fa3dfa8d7405706484d0c53242159303a3d7305c907084b14e4b217a89c2,2024-08-13T04:15:10.837000
CVE-2024-42377,0,0,6d5101c542ad0c42fa99c43c1ce885fa8c19ec270a032faca7aa5391949c8e41,2024-08-13T04:15:11.290000
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
@ -259112,6 +259112,7 @@ CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c
CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
CVE-2024-6724,1,1,d6f0c65558e68f99aa98f137ee26bad13287cde07077fb7ac2146c2fd6833cbd,2024-08-13T06:15:04.083000
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
@ -259173,6 +259174,7 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
CVE-2024-6823,1,1,8c4a7dea1e2becf55798301bcb5fdc46f6ea3195981111648e71941f0f636703,2024-08-13T06:15:05.120000
CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
@ -259304,7 +259306,7 @@ CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb
CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000
CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
CVE-2024-7092,1,1,986c4c3c4a813ce8dd4153a922394c95340e640d4a6ba35a28e2272d3b23bcb1,2024-08-13T05:15:14.027000
CVE-2024-7092,0,0,986c4c3c4a813ce8dd4153a922394c95340e640d4a6ba35a28e2272d3b23bcb1,2024-08-13T05:15:14.027000
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
CVE-2024-7094,0,0,0a12253c503447778becc90c2babebb7883c1cb4f527863731d0138cb4fc555f,2024-08-13T03:15:04.400000
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
@ -259398,6 +259400,7 @@ CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e
CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000
CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000
CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000
CVE-2024-7247,1,1,10b6563bcca9299dadfcef2964f18720d9da0668c22a520ba8f836a0ac593e11,2024-08-13T06:15:05.777000
CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000
CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
@ -259662,3 +259665,4 @@ CVE-2024-7705,0,0,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c078
CVE-2024-7706,0,0,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000
CVE-2024-7707,0,0,21170f2707eddb1f88d3623b0eff5f0856514ae1fb599ac77f04f14c1cb19563,2024-08-13T01:24:09.723000
CVE-2024-7709,0,0,7f617395257f5decd3ca8318abe3ce517c53d7b8c4baa7edc2f2c2b481a048c8,2024-08-13T01:24:10.067000
CVE-2024-7715,1,1,674e3a8487a50dd01276fd949946f18896c90b358f8f5fb3b8739aee9ce4e714,2024-08-13T07:15:13.677000

Can't render this file because it is too large.