Auto-Update: 2024-06-22T06:00:18.948003+00:00

This commit is contained in:
cad-safe-bot 2024-06-22 06:03:11 +00:00
parent 729f312ddf
commit 1e5fe61795
12 changed files with 529 additions and 16 deletions

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-21514",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:09.637",
"lastModified": "2024-06-22T05:15:09.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/opencart/opencart/blob/3.0.3.9/upload/catalog/model/extension/payment/divido.php%23L114",
"source": "report@snyk.io"
},
{
"url": "https://github.com/opencart/opencart/commit/46bd5f5a8056ff9aad0aa7d71729c4cf593d67e2",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266565",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-21515",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:10.730",
"lastModified": "2024-06-22T05:15:10.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the filename parameter of the admin tool/log route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality.\r\r**Notes:**\r\r1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is \"admin\" by default but there is a pop-up in the dashboard warning users to rename it.\r\r2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/opencart/opencart/commit/c546199e8f100c1f3797a7a9d3cf4db1887399a2",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266573",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-21516",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:10.967",
"lastModified": "2024-06-22T05:15:10.967",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the directory parameter of admin common/filemanager.list route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality.\r\r**Notes:**\r\r1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is \"admin\" by default but there is a pop-up in the dashboard warning users to rename it.\r\r2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/opencart/opencart/commit/c546199e8f100c1f3797a7a9d3cf4db1887399a2",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266576",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-21517",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:11.173",
"lastModified": "2024-06-22T05:15:11.173",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the redirect parameter of customer account/login route. An attacker can inject arbitrary HTML and Javascript into the page response. As this vulnerability is present in the account functionality it could be used to target and attack customers of the OpenCart shop.\r\r**Notes:**\r\r1) The fix for this vulnerability is incomplete"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/opencart/opencart/commit/0fd1ee4b6c94366bf3e5d3831a8336f3275d1860",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266577",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-21518",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:11.403",
"lastModified": "2024-06-22T05:15:11.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A Zip Slip issue was identified via the marketplace installer due to improper sanitization of the target path, allowing files within a malicious archive to traverse the filesystem and be extracted to arbitrary locations. An attacker can create arbitrary files in the web root of the application and overwrite other existing files by exploiting this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-29"
}
]
}
],
"references": [
{
"url": "https://github.com/opencart/opencart/blob/04c1724370ab02967d3b4f668c1b67771ecf1ff4/upload/admin/controller/marketplace/installer.php%23L383C1-L383C1",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266578",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-21519",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:11.620",
"lastModified": "2024-06-22T05:15:11.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. An Arbitrary File Creation issue was identified via the database restoration functionality. By injecting PHP code into the database, an attacker with admin privileges can create a backup file with an arbitrary filename (including the extension), within /system/storage/backup.\r\r**Note:**\r\rIt is less likely for the created file to be available within the web root, as part of the security recommendations for the application suggest moving the storage path outside of the web root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/opencart/opencart/blob/master/upload/admin/controller/tool/upload.php%23L353",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266579",
"source": "report@snyk.io"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29973",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-06-04T02:15:48.290",
"lastModified": "2024-06-05T04:15:11.330",
"lastModified": "2024-06-22T04:15:10.843",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4874",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T05:15:11.837",
"lastModified": "2024-06-22T05:15:11.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Bricks Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.8 via the postId parameter due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify posts and pages created by other users including admins. As a requirement for this, an admin would have to enable access to the editor specifically for such a user or enable it for all users with a certain user account type."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-contributor",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96b6-1453352e0cae?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5965",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T04:15:12.460",
"lastModified": "2024-06-22T04:15:12.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Mosaic theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link\u2019 parameter within the theme's Button shortcode in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://themes.trac.wordpress.org/browser/mosaic/1.7.1/shortcodes.php#L165",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6921da1b-e63d-479a-9786-9b1bd8201d69?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5966",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T04:15:12.940",
"lastModified": "2024-06-22T04:15:12.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Grey Opaque theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter within the theme's Download-Button shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://themes.trac.wordpress.org/browser/grey-opaque/2.0.1/functions-shortcodes.php#L34",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f4888e1-98b3-48d9-a2d8-416eae447a32?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-22T04:00:18.099150+00:00
2024-06-22T06:00:18.948003+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-22T02:15:45.523000+00:00
2024-06-22T05:15:11.837000+00:00
```
### Last Data Feed Release
@ -33,24 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254935
254944
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `9`
- [CVE-2024-2484](CVE-2024/CVE-2024-24xx/CVE-2024-2484.json) (`2024-06-22T02:15:44.940`)
- [CVE-2024-4313](CVE-2024/CVE-2024-43xx/CVE-2024-4313.json) (`2024-06-22T02:15:45.143`)
- [CVE-2024-5346](CVE-2024/CVE-2024-53xx/CVE-2024-5346.json) (`2024-06-22T02:15:45.340`)
- [CVE-2024-5791](CVE-2024/CVE-2024-57xx/CVE-2024-5791.json) (`2024-06-22T02:15:45.523`)
- [CVE-2024-21514](CVE-2024/CVE-2024-215xx/CVE-2024-21514.json) (`2024-06-22T05:15:09.637`)
- [CVE-2024-21515](CVE-2024/CVE-2024-215xx/CVE-2024-21515.json) (`2024-06-22T05:15:10.730`)
- [CVE-2024-21516](CVE-2024/CVE-2024-215xx/CVE-2024-21516.json) (`2024-06-22T05:15:10.967`)
- [CVE-2024-21517](CVE-2024/CVE-2024-215xx/CVE-2024-21517.json) (`2024-06-22T05:15:11.173`)
- [CVE-2024-21518](CVE-2024/CVE-2024-215xx/CVE-2024-21518.json) (`2024-06-22T05:15:11.403`)
- [CVE-2024-21519](CVE-2024/CVE-2024-215xx/CVE-2024-21519.json) (`2024-06-22T05:15:11.620`)
- [CVE-2024-4874](CVE-2024/CVE-2024-48xx/CVE-2024-4874.json) (`2024-06-22T05:15:11.837`)
- [CVE-2024-5965](CVE-2024/CVE-2024-59xx/CVE-2024-5965.json) (`2024-06-22T04:15:12.460`)
- [CVE-2024-5966](CVE-2024/CVE-2024-59xx/CVE-2024-5966.json) (`2024-06-22T04:15:12.940`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2024-27834](CVE-2024/CVE-2024-278xx/CVE-2024-27834.json) (`2024-06-22T02:15:44.787`)
- [CVE-2024-29973](CVE-2024/CVE-2024-299xx/CVE-2024-29973.json) (`2024-06-22T04:15:10.843`)
## Download and Usage

View File

@ -243224,6 +243224,12 @@ CVE-2024-21509,0,0,b1840eaff4c2213087c96721aaf87fdc6158bea90de6f63bdc95977af5681
CVE-2024-2151,0,0,43d1a22352e1e830bef22f2b8bd5a33b83725db15329384a70a3ee26b8a5da55,2024-05-17T02:38:04.663000
CVE-2024-21511,0,0,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e036,2024-04-23T12:52:09.397000
CVE-2024-21512,0,0,aa76b050e4c93f61d8197b2abb831a8245fb81d83da1143493979b801398852e,2024-06-06T13:15:31.390000
CVE-2024-21514,1,1,eda90a60621e0f44ed39680a983efe1636a533ac39f703d4f7e15e9ea899ac40,2024-06-22T05:15:09.637000
CVE-2024-21515,1,1,c231f80a1974a2ba4009fda65f5305b6ce586d7c49acc6406d93a1fb57f8010c,2024-06-22T05:15:10.730000
CVE-2024-21516,1,1,1e219491fe86c0c0389748c76658c75362774fb08c98a9e6e10035a8b3295b61,2024-06-22T05:15:10.967000
CVE-2024-21517,1,1,44addbee25eeb628a89b45abcf056e500672454316f2fba920ffb665f4eac087,2024-06-22T05:15:11.173000
CVE-2024-21518,1,1,d176c05aeea1917b37c37a96a5403bad5a3dd404e893ec8849f30190746e0ac6,2024-06-22T05:15:11.403000
CVE-2024-21519,1,1,2065325e10215ac437a91a40fa4cfdeec3b134efe7e89432621676cb2c28c3f1,2024-06-22T05:15:11.620000
CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000
CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000
CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000
@ -245150,7 +245156,7 @@ CVE-2024-24836,0,0,ee629b5aec26f66dc40add401b90f57bfb13b9931b4b44678b51676d92007
CVE-2024-24837,0,0,16c85efff4010603171913a3ff6143d350f674b996ff4a5acabe204694e7ae97,2024-02-22T19:07:27.197000
CVE-2024-24838,0,0,4afcde48d14164adfc15cf4d7f939a164717f3393f5f9be45549860895bc5511,2024-02-07T23:29:33.553000
CVE-2024-24839,0,0,37b5c6617fe0fcff7aec5339a27f9a6c16c22aca80044b82a4026771c3eca093,2024-02-07T23:29:44.520000
CVE-2024-2484,1,1,5476945073e3724e7f50390e1ba18e36c819b641ba69ba6a75131843c9b50279,2024-06-22T02:15:44.940000
CVE-2024-2484,0,0,5476945073e3724e7f50390e1ba18e36c819b641ba69ba6a75131843c9b50279,2024-06-22T02:15:44.940000
CVE-2024-24840,0,0,69e7ab6281eb75008c5d108e09c9d4558fced2c9ad6a26ec80f0787514d3f4ef,2024-03-25T01:51:01.223000
CVE-2024-24841,0,0,8d08a6d1ed3e8a8d7ebad26c8c83a1c96f0b8da3465bfb5372729a0bb8fb45ab,2024-02-07T23:30:01.510000
CVE-2024-24842,0,0,8b1c2c4a8d0fd58f7f91ef2ff0475d75e7e2be5243ca5626fa0a7bf8e3b4fcc7,2024-03-27T12:29:30.307000
@ -247328,7 +247334,7 @@ CVE-2024-27830,0,0,717b3ee72b31f02e41119efea5f35822a1efa548278881e1425afb0d78eb2
CVE-2024-27831,0,0,ca216bc5721077968a6d2a1f89ea202c751376303f2ab60e3e9660283fa6f023,2024-06-12T04:15:11.857000
CVE-2024-27832,0,0,2334e6a1d5eaa1494e8cbbaecc65a9a00dab1b896df110deba8ca97ab4050020,2024-06-12T04:15:11.957000
CVE-2024-27833,0,0,6bff5968eec0bf8ae50bd7fca5c52c266596a452b7b2728012915f3b8f981972,2024-06-12T04:15:12.053000
CVE-2024-27834,0,1,e2167083bfd89b6181316b7a7da6384936e2657f954430f9692723151f42b5c8,2024-06-22T02:15:44.787000
CVE-2024-27834,0,0,e2167083bfd89b6181316b7a7da6384936e2657f954430f9692723151f42b5c8,2024-06-22T02:15:44.787000
CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000
CVE-2024-27836,0,0,94804c3b4c63dbfc22e6899865a39975a715f2a285ca1ed8d65dfe50b63b25bb,2024-06-12T04:15:12.133000
CVE-2024-27837,0,0,901f3c3a397896b090baa01f5e16b0462e9f3677320c7d083f0561d63284135d,2024-06-10T18:15:29.550000
@ -248592,7 +248598,7 @@ CVE-2024-29968,0,0,76c6a6d6e702eab18ed6ce28244f46395278fc23ed27747337db2cb902c35
CVE-2024-29969,0,0,f16f6487ea10360dec838824d2148298e2039f6602688dd9caf524b4969c6186,2024-04-19T13:10:25.637000
CVE-2024-2997,0,0,3a578291c3b241bab600655a4ba011b593bae43f4bacaa35e28ecb654fca1f55,2024-05-17T02:38:41.790000
CVE-2024-29972,0,0,6eb07d32580185ea51f927f67f2978b808addad4d830734cf44d0e61f642dd0c,2024-06-05T06:15:10.307000
CVE-2024-29973,0,0,fed305ac9bbfd8a3bcb05f4012099f51e000b0123ac4db28d9d3e1a93ebbff3b,2024-06-05T04:15:11.330000
CVE-2024-29973,0,1,d0f90c3ab5e95ac1f139165bb8134f6568804d876006994671d32b6becba4e5f,2024-06-22T04:15:10.843000
CVE-2024-29974,0,0,0fabd0ed87d1a17e2d57c3925a4a991d1b1c401d215c10f3d80cab083de41ead,2024-06-05T06:15:10.657000
CVE-2024-29975,0,0,e1854e5ca81cfeff5d0c1bda31c43cb66e4ccc1d3b700107211d85fe54797d4b,2024-06-05T13:15:12.107000
CVE-2024-29976,0,0,aa9b7d1c56e80d0e0ffe7df226c1631d31c277f5ba64c8e4cfa240d17240b4c7,2024-06-06T16:15:11.617000
@ -253760,7 +253766,7 @@ CVE-2024-4308,0,0,c30b8d7bce14d8d06db9bf545139ec925cbf528f27e8b442e0e9c6b9a7a518
CVE-2024-4309,0,0,f1f14d3d80b8943142865ddb6cb7e0bda2252fff5ef38ed63d563490a010cefb,2024-04-30T13:11:16.690000
CVE-2024-4310,0,0,6a8887d86a728fc0163c37e4f3726fb9d19866f95653c15dd5d393e7592aa1b6,2024-04-30T13:11:16.690000
CVE-2024-4312,0,0,9e55bf62ae99c615e6428643ba23c177214afa107267a60fb24a14ad6d9006da,2024-05-14T16:11:39.510000
CVE-2024-4313,1,1,b0ea30d1a5738d43841449a96d3d716686d8b8648510d41195a7de577b9c3e44,2024-06-22T02:15:45.143000
CVE-2024-4313,0,0,b0ea30d1a5738d43841449a96d3d716686d8b8648510d41195a7de577b9c3e44,2024-06-22T02:15:45.143000
CVE-2024-4314,0,0,917e44d69c76fb7381314145ce5012ff94d63258309b3ec3d14bdf6a76c85d11,2024-05-14T16:11:39.510000
CVE-2024-4315,0,0,995d1a036dd5464d03708a1f15510f6b9a69355ad24bf6c219e8296e5f036307,2024-06-13T18:36:09.013000
CVE-2024-4316,0,0,5a945ac0a4e5139fc35505b0ad29ed6f4f78dc21cf82c5a713e2fc10353001af,2024-05-14T16:11:39.510000
@ -254203,6 +254209,7 @@ CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462a1,2024-06-20T12:44:01.637000
CVE-2024-4874,1,1,f686ddee13d10c7fac51bda340776b3cecedfe2e7331ba8f185a6ea4effabf78,2024-06-22T05:15:11.837000
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000
@ -254525,7 +254532,7 @@ CVE-2024-5342,0,0,2ad102e094253384b79cb972f14f27186ce8a4683bb8eb4d7004a3553600b1
CVE-2024-5343,0,0,9c4ca8593b34d766d7b52cb001faa9ca8155eefb491f359cde7885e1510a1702,2024-06-20T12:44:01.637000
CVE-2024-5344,0,0,9f0e8d346d03c74c2932b0f94a6c1dee35b2ecfc24111a70c08adbe0e5a86df9,2024-06-21T11:22:01.687000
CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c7f,2024-05-31T13:01:46.727000
CVE-2024-5346,1,1,09a6420991cc5b9677377ceef4be361006cdf527c205cd82512f4948f224cbc5,2024-06-22T02:15:45.340000
CVE-2024-5346,0,0,09a6420991cc5b9677377ceef4be361006cdf527c205cd82512f4948f224cbc5,2024-06-22T02:15:45.340000
CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
@ -254770,7 +254777,7 @@ CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec8
CVE-2024-5785,0,0,b8e4d96c063df13aad53416cef79463db3c390621a0b569b6ab0f4db2568beeb,2024-06-10T18:06:22.600000
CVE-2024-5786,0,0,ed5396800d42f59a8cc5d452fd1faa0265b1965bb10ec68fd437a404a4a909e1,2024-06-10T18:06:22.600000
CVE-2024-5787,0,0,a3d405a0f4e66faab3a863affeada58e47a227c5d73cf2b53ea525af4385d342,2024-06-13T18:36:09.010000
CVE-2024-5791,1,1,e92120fc7904729dc10045455e693e755df880bb8a63013227b7626607b2cc1d,2024-06-22T02:15:45.523000
CVE-2024-5791,0,0,e92120fc7904729dc10045455e693e755df880bb8a63013227b7626607b2cc1d,2024-06-22T02:15:45.523000
CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
@ -254829,6 +254836,8 @@ CVE-2024-5951,0,0,7ddd1cddf9a9fdc846148c5866e7aa3c8ed2def81486ca15d97d818d600ecb
CVE-2024-5952,0,0,a56b129ed0896e22b77ffae27056ae02e2ff1e28286e49f9b0ac6b9f084a57b2,2024-06-17T12:43:31.090000
CVE-2024-5953,0,0,5a82a23010422744b690f4b6e35b5f6ac9a7dbe5fabc2cd37af30b93c2bed444,2024-06-20T12:44:01.637000
CVE-2024-5961,0,0,5b2a3ec0406c808b5387d2b9b0077c5bc424b1c4427d5cb7165a954efcfd8c0c,2024-06-17T12:42:04.623000
CVE-2024-5965,1,1,ebeb204b95dcd79a479722fe7e94006c506f9a990da3afb7470f8fc3aa78b0d5,2024-06-22T04:15:12.460000
CVE-2024-5966,1,1,f47f07d4960c5a2b5c339649a9c11b10622c84049c0341a9572840ab934c1ed7,2024-06-22T04:15:12.940000
CVE-2024-5967,0,0,a8cf0971f84f68dc327704c7b15af8c68f3ca5a6cf4ca8aa54163d9ca95100d5,2024-06-20T12:44:01.637000
CVE-2024-5970,0,0,118b7b2e028a3447b60495fc36df0133e6c8ea6adad2a5f3d89bac8698786790,2024-06-20T12:44:01.637000
CVE-2024-5976,0,0,e855126a3e03657c0f9ccfb70e360e6531fe17aa442fb39ef6227c53616360fe,2024-06-17T12:43:31.090000

Can't render this file because it is too large.