Auto-Update: 2024-07-28T16:00:17.458342+00:00

This commit is contained in:
cad-safe-bot 2024-07-28 16:03:13 +00:00
parent 359d68e15d
commit 138e23f6c5
11 changed files with 468 additions and 25 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-14335",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-24T13:29:00.603",
"lastModified": "2023-11-07T02:52:55.320",
"lastModified": "2024-07-28T14:15:10.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -110,6 +110,10 @@
"url": "https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e%40%3Cuser.ignite.apache.org%3E",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240726-0003/",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/45105/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40897",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-26T06:15:02.290",
"lastModified": "2024-07-26T12:38:41.683",
"lastModified": "2024-07-28T14:15:10.533",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/26/1",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://github.com/GStreamer/orc",
"source": "vultures@jpcert.or.jp"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4032",
"sourceIdentifier": "cna@python.org",
"published": "2024-06-17T15:15:52.517",
"lastModified": "2024-06-20T12:44:22.977",
"lastModified": "2024-07-28T14:15:10.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -57,6 +57,10 @@
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/",
"source": "cna@python.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240726-0004/",
"source": "cna@python.org"
},
{
"url": "https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml",
"source": "cna@python.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5458",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T19:15:52.397",
"lastModified": "2024-06-18T10:15:10.870",
"lastModified": "2024-07-28T14:15:10.873",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -171,6 +171,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
"source": "security@php.net"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240726-0001/",
"source": "security@php.net"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5585",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T19:15:52.597",
"lastModified": "2024-06-13T04:15:17.407",
"lastModified": "2024-07-28T14:15:11.033",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -160,6 +160,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
"source": "security@php.net"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240726-0002/",
"source": "security@php.net"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5642",
"sourceIdentifier": "cna@python.org",
"published": "2024-06-27T21:15:16.070",
"lastModified": "2024-07-01T14:15:05.807",
"lastModified": "2024-07-28T14:15:11.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -40,6 +40,10 @@
{
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/",
"source": "cna@python.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240726-0005/",
"source": "cna@python.org"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-28T14:15:11.303",
"lastModified": "2024-07-28T14:15:11.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK A3100R 4.1.2cu.5050_B20200504. It has been declared as critical. This vulnerability affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument telnet_enabled leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272572. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/setTelnetCfg.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.272572",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.272572",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.377543",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-28T15:15:09.897",
"lastModified": "2024-07-28T15:15:09.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been rated as critical. This issue affects some unknown processing of the file /web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier VDB-272573 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/product.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.272573",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.272573",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.377942",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-28T15:15:10.163",
"lastModified": "2024-07-28T15:15:10.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWanCfg.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.272574",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.272574",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.377080",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-28T12:00:16.877688+00:00
2024-07-28T16:00:17.458342+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-28T11:15:12.107000+00:00
2024-07-28T15:15:10.163000+00:00
```
### Last Data Feed Release
@ -33,23 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
258098
258101
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `3`
- [CVE-2024-7154](CVE-2024/CVE-2024-71xx/CVE-2024-7154.json) (`2024-07-28T10:15:01.897`)
- [CVE-2024-7155](CVE-2024/CVE-2024-71xx/CVE-2024-7155.json) (`2024-07-28T10:15:03.053`)
- [CVE-2024-7156](CVE-2024/CVE-2024-71xx/CVE-2024-7156.json) (`2024-07-28T11:15:11.820`)
- [CVE-2024-7157](CVE-2024/CVE-2024-71xx/CVE-2024-7157.json) (`2024-07-28T11:15:12.107`)
- [CVE-2024-7158](CVE-2024/CVE-2024-71xx/CVE-2024-7158.json) (`2024-07-28T14:15:11.303`)
- [CVE-2024-7159](CVE-2024/CVE-2024-71xx/CVE-2024-7159.json) (`2024-07-28T15:15:09.897`)
- [CVE-2024-7160](CVE-2024/CVE-2024-71xx/CVE-2024-7160.json) (`2024-07-28T15:15:10.163`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `6`
- [CVE-2018-14335](CVE-2018/CVE-2018-143xx/CVE-2018-14335.json) (`2024-07-28T14:15:10.147`)
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-07-28T14:15:10.783`)
- [CVE-2024-40897](CVE-2024/CVE-2024-408xx/CVE-2024-40897.json) (`2024-07-28T14:15:10.533`)
- [CVE-2024-5458](CVE-2024/CVE-2024-54xx/CVE-2024-5458.json) (`2024-07-28T14:15:10.873`)
- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-07-28T14:15:11.033`)
- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-07-28T14:15:11.220`)
## Download and Usage

View File

@ -115023,7 +115023,7 @@ CVE-2018-14331,0,0,1733e7b3c78eb173f6e76f921a4b1f5947023f3b6403afccde2b928f50210
CVE-2018-14332,0,0,bb15d876c7c697bea436f2865b795a9464bdc96c3e27a980a0cfbfc5eaefa1ff,2019-07-21T12:15:13.647000
CVE-2018-14333,0,0,fca5b144141c8927646c58c7bf28b597b8cc11ea66f929f8037c82fecde2aef0,2018-09-17T19:51:15.093000
CVE-2018-14334,0,0,2ed445cefbd8dc02dae3c6c9bb32557a08ace5b6278ac6d3207390bbfcf2221e,2018-09-17T17:02:03.977000
CVE-2018-14335,0,0,5d499148b9cc758861927231b02255c4892e1fadd5e68d55bbd846c132264ce7,2023-11-07T02:52:55.320000
CVE-2018-14335,0,1,361d3b12f9d2d87aaa191fed7231ae88731002f76b4b62dfcffe8773ab51919a,2024-07-28T14:15:10.147000
CVE-2018-14336,0,0,537b076def27ceed63df540357c12c791443f0b9f11d7b54320de106daf70d90,2018-09-18T12:14:00.220000
CVE-2018-14337,0,0,275d721464bb61f28b281bbc31f5f1039135b556716ccbc6030085efcabb1a71,2022-05-12T20:12:40.610000
CVE-2018-14338,0,0,094ebee330e8d8e57b8626935c8559ca2b75ef5f03880febde375b1a53fb3eae,2018-09-17T14:25:43.537000
@ -255555,7 +255555,7 @@ CVE-2024-4029,0,0,07f4a3557bfc1c26259e7db528f531861deb0f132a9070099c7eec2168b5c6
CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000
CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac95b,2024-04-23T12:52:09.397000
CVE-2024-40318,0,0,76064a0f8effb6d4b5e055e7ecef1c72c0b9ff1e125f96aea44f1996f0e67824,2024-07-26T12:38:41.683000
CVE-2024-4032,0,0,3888c98c0dc9113e1403e75c67bd485cc9805e1b1c4cbd087358208523feaf6e,2024-06-20T12:44:22.977000
CVE-2024-4032,0,1,3096efec5a4aac10abf7764e78ac4ae4cb7cabc4d2a57ccc635113d230119926,2024-07-28T14:15:10.783000
CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000
CVE-2024-40324,0,0,42ba2e9c480b101fd6baf201acbd20948dbfb546f5560ac981356a7b4da905aa,2024-07-26T12:38:41.683000
CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000
@ -255724,7 +255724,7 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
CVE-2024-40873,0,0,16fd81fc79820f32ad2e7940b90409fc2d2f9351443634159d6f5e89b93d7b04,2024-07-26T12:38:41.683000
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
CVE-2024-40897,0,0,cd22e86e936352ba2702c5589042c441592bbfece3d34cdd2d76ce958bfde819,2024-07-26T12:38:41.683000
CVE-2024-40897,0,1,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000
CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
@ -257133,7 +257133,7 @@ CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a3
CVE-2024-5455,0,0,504a2312040d893e95d789f867e1d4122509ea9da589bac420b384edcb7af3cf,2024-07-17T13:46:09.660000
CVE-2024-5456,0,0,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000
CVE-2024-5457,0,0,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000
CVE-2024-5458,0,0,ecce33b383e3250d0d6482d44440ec6cfd4fced73f96f924c4a6b853790d20fc,2024-06-18T10:15:10.870000
CVE-2024-5458,0,1,15d5d5122295bf487ddcc0439ec7e3e6917eb8c9580bdae9f46ee7c9f1777fae,2024-07-28T14:15:10.873000
CVE-2024-5459,0,0,c2af4e92b1764c27a294b8b9210b2518bf4b2703cdeb9e4502885231e13d99a3,2024-06-13T19:35:55.083000
CVE-2024-5460,0,0,4e099435e4545094901bd58b61fc926119ab5684f745a9d9aa540744798c104f,2024-06-26T12:44:29.693000
CVE-2024-5463,0,0,4d43b352cf9202f80c2f04ee56f4d6c5363c98e3eebea680338a85f124fca31c,2024-06-04T16:57:41.053000
@ -257225,7 +257225,7 @@ CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a30
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000
CVE-2024-5585,0,1,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
CVE-2024-5588,0,0,acef4f2a5b13b06d4d5ee520a9930094f7a31b3a0afbb85d203e32266b0c3daf,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,b953e771129cea5914eaea0b8a60776be2e7649c39db097d6b9bdb3cfd517741,2024-06-03T14:46:24.250000
@ -257267,7 +257267,7 @@ CVE-2024-5638,0,0,9dfdc1073077c73ad2f6423bd04e6b960706baa670ad3ef02a627876a0c1ff
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
CVE-2024-5640,0,0,9b7c1b85267a9cc2caf72f61af05d24f2e85f909270110c050e922f8e0836e8a,2024-06-07T14:56:05.647000
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
CVE-2024-5642,0,1,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000
CVE-2024-5644,0,0,bd94085a240294e1c5f68d1f90c69c4fad395903cecf449c34955bd87fe371a3,2024-07-15T13:00:34.853000
CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000
CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000
@ -258093,7 +258093,10 @@ CVE-2024-7128,0,0,47460bc57c903b3fabdb73433c3bfc4f54879d354fc8cdc474587e0d4d4fa6
CVE-2024-7151,0,0,06232e614d6867686f3c84d16156f95141f38a0335ce80e22280064659e83e56,2024-07-27T20:15:09.650000
CVE-2024-7152,0,0,aac814756563dfb6eac01900cd30616c2d9c9df404e1ca487beb8a14d5d8de14,2024-07-27T21:15:09.743000
CVE-2024-7153,0,0,32210d4464beb2119e16e6b44aee6361e3b850929f8029ca84d08fdbc2594529,2024-07-27T22:15:01.833000
CVE-2024-7154,1,1,722e1cbe890e398365f8f0cf4f116924e0c3343019d5ec36c94189f3fa92b41d,2024-07-28T10:15:01.897000
CVE-2024-7155,1,1,4216904d1fea5d4ec7e81cf57cd860ab32f7a4a7c445fe5cd8c2c9d3583d0fb7,2024-07-28T10:15:03.053000
CVE-2024-7156,1,1,a04911f2fb7c065ecb3a79e8f1ac4e166133c01ea464282e46a6dc652b3dd459,2024-07-28T11:15:11.820000
CVE-2024-7157,1,1,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd0871,2024-07-28T11:15:12.107000
CVE-2024-7154,0,0,722e1cbe890e398365f8f0cf4f116924e0c3343019d5ec36c94189f3fa92b41d,2024-07-28T10:15:01.897000
CVE-2024-7155,0,0,4216904d1fea5d4ec7e81cf57cd860ab32f7a4a7c445fe5cd8c2c9d3583d0fb7,2024-07-28T10:15:03.053000
CVE-2024-7156,0,0,a04911f2fb7c065ecb3a79e8f1ac4e166133c01ea464282e46a6dc652b3dd459,2024-07-28T11:15:11.820000
CVE-2024-7157,0,0,fc6f6b2cc34fd8697df19cbf17fcd4cd27eae2140fe5a399729db35436fd0871,2024-07-28T11:15:12.107000
CVE-2024-7158,1,1,8b4598ff93542df87dc175453c9bd95fdcaeec8b3f59030fa45c1c99578e1b2d,2024-07-28T14:15:11.303000
CVE-2024-7159,1,1,aa09cdc774bb904f7578dd0ed9d500a7cba38cf5f5fa8676610887cb373b3a30,2024-07-28T15:15:09.897000
CVE-2024-7160,1,1,bd957275ec2f0f7bf2b2b785f1d1add29975b97e07067566cb44747fa4fcc461,2024-07-28T15:15:10.163000

Can't render this file because it is too large.