Auto-Update: 2024-09-06T06:00:16.853706+00:00

This commit is contained in:
cad-safe-bot 2024-09-06 06:03:15 +00:00
parent a8a8d0c002
commit 7b80734ce2
11 changed files with 364 additions and 18 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28214",
"sourceIdentifier": "cve@navercorp.com",
"published": "2024-03-07T05:15:54.803",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-09-06T05:15:13.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,7 +23,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-405"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28215",
"sourceIdentifier": "cve@navercorp.com",
"published": "2024-03-07T05:15:54.940",
"lastModified": "2024-08-28T21:35:07.973",
"lastModified": "2024-09-06T05:15:13.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-862"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28216",
"sourceIdentifier": "cve@navercorp.com",
"published": "2024-03-07T05:15:55.063",
"lastModified": "2024-08-12T20:35:02.990",
"lastModified": "2024-09-06T05:15:13.293",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-862"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38486",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-09-06T05:15:13.370",
"lastModified": "2024-09-06T05:15:13.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x , contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000228355/dsa-2024-376-security-update-for-dell-networking-os10-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39585",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-09-06T05:15:13.590",
"lastModified": "2024-09-06T05:15:13.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x, contain(s) an Use of Hard-coded Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Client-side request forgery and Information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000228357/dsa-2024-377-security-update-for-dell-networking-os10-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-45751",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T05:15:13.840",
"lastModified": "2024-09-06T05:15:13.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fujita/tgt/compare/v1.0.92...v1.0.93",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/fujita/tgt/pull/67",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-7415",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T04:15:05.137",
"lastModified": "2024-09-06T04:15:05.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Remember Me Controls plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0.1. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/remember-me-controls/tags/2.0.1/tests/phpunit/bootstrap.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3146603%40remember-me-controls&new=3146603%40remember-me-controls&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/01707346-86c2-45c8-a2c9-81a147506fa4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8247",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T04:15:05.573",
"lastModified": "2024-09-06T04:15:05.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Newsletters plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 4.9.9.2. This is due to the plugin not restricting what user meta can be updated as screen options. This makes it possible for authenticated attackers, with subscriber-level access and above, to escalate their privileges to that of an administrator. Please note that this only affects users with access to edit/update screen options, which means an administrator would need to grant lower privilege users with access to the Sent & Draft Emails page of the plugin in order for this to be exploited."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/newsletters-lite/tags/4.9.9.1/wp-mailinglist.php#L3279",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3146287%40newsletters-lite&new=3146287%40newsletters-lite&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2577102f-6355-4483-bd3d-1948497cb843?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-8480",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T04:15:05.847",
"lastModified": "2024-09-06T04:15:05.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Image Optimizer, Resizer and CDN \u2013 Sirv plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'sirv_save_prevented_sizes' function in all versions up to, and including, 7.2.7. This makes it possible for authenticated attackers, with Contributor-level access and above, to exploit the 'sirv_upload_file_by_chunks_callback' function, which lacks proper file type validation, allowing attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/sirv/tags/7.2.7/sirv.php#L6331",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/sirv/trunk/sirv.php?rev=3103410#L4647",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3115018/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e3e628f-b5e7-40fd-9d34-4a3b23e1e0e7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-06T04:00:17.009198+00:00
2024-09-06T06:00:16.853706+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-06T03:15:02.370000+00:00
2024-09-06T05:15:13.840000+00:00
```
### Last Data Feed Release
@ -33,21 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262039
262045
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-40865](CVE-2024/CVE-2024-408xx/CVE-2024-40865.json) (`2024-09-06T02:15:02.297`)
- [CVE-2024-38486](CVE-2024/CVE-2024-384xx/CVE-2024-38486.json) (`2024-09-06T05:15:13.370`)
- [CVE-2024-39585](CVE-2024/CVE-2024-395xx/CVE-2024-39585.json) (`2024-09-06T05:15:13.590`)
- [CVE-2024-45751](CVE-2024/CVE-2024-457xx/CVE-2024-45751.json) (`2024-09-06T05:15:13.840`)
- [CVE-2024-7415](CVE-2024/CVE-2024-74xx/CVE-2024-7415.json) (`2024-09-06T04:15:05.137`)
- [CVE-2024-8247](CVE-2024/CVE-2024-82xx/CVE-2024-8247.json) (`2024-09-06T04:15:05.573`)
- [CVE-2024-8480](CVE-2024/CVE-2024-84xx/CVE-2024-8480.json) (`2024-09-06T04:15:05.847`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `3`
- [CVE-2023-25632](CVE-2023/CVE-2023-256xx/CVE-2023-25632.json) (`2024-09-06T03:15:02.370`)
- [CVE-2024-28214](CVE-2024/CVE-2024-282xx/CVE-2024-28214.json) (`2024-09-06T05:15:13.047`)
- [CVE-2024-28215](CVE-2024/CVE-2024-282xx/CVE-2024-28215.json) (`2024-09-06T05:15:13.207`)
- [CVE-2024-28216](CVE-2024/CVE-2024-282xx/CVE-2024-28216.json) (`2024-09-06T05:15:13.293`)
## Download and Usage

View File

@ -219115,7 +219115,7 @@ CVE-2023-2562,0,0,9eb6b73ef35aaaae8a6e65035bcd4cdebd54bad58a209378bcd85659bdf560
CVE-2023-25620,0,0,5869348b9ede777c30c86ab7dff7d9a5752537e0b2e31ea43da4ff5c42004dca,2023-05-12T05:15:16.990000
CVE-2023-25621,0,0,f2d785335c441cd437abb1ca9314a470a8687e8a0bfbcba2e6212142772ab0f7,2023-11-07T04:09:04.707000
CVE-2023-2563,0,0,d77604ceac381855a0b95fedead54c5a829f0eaf0e65d578ec4ab80cfea661af,2023-11-07T04:12:53.460000
CVE-2023-25632,0,1,ce10a8f90ae93da94615b580f7f06bc414173a38117cf7ff5e81dd89823fd9a2,2024-09-06T03:15:02.370000
CVE-2023-25632,0,0,ce10a8f90ae93da94615b580f7f06bc414173a38117cf7ff5e81dd89823fd9a2,2024-09-06T03:15:02.370000
CVE-2023-2564,0,0,dde567f2c329a5f2f16d8bd71a1783c38f5c47667d1ca12fbbefa9a67d3784d6,2023-10-25T20:27:01.213000
CVE-2023-25642,0,0,f02f48f7bf7276ab295f0f649acee321733049fe9b18e8a053c7704c02f341a7,2023-12-18T20:09:30.867000
CVE-2023-25643,0,0,53927c393f5ae72588d18c19cebad53c8bca0ea8fbcd4e12bc1b30218d8f204a,2023-12-18T20:09:13.630000
@ -248756,9 +248756,9 @@ CVE-2024-2821,0,0,9c0a2080d39205346106f0d0db46c6c5a65a4a414502ea7a03307d98d919bc
CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9650,2024-08-05T20:35:06.830000
CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000
CVE-2024-28213,0,0,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000
CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000
CVE-2024-28215,0,0,a538bdef30dbb031199c7dfaee20eca8adf76f8b58f82232828c1af7095801cd,2024-08-28T21:35:07.973000
CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000
CVE-2024-28214,0,1,c9d729ed4cab9c47731e47e54f8dc5d2781d4ee99812f3d7bca4aae1ab1799b8,2024-09-06T05:15:13.047000
CVE-2024-28215,0,1,1e6d084b55f41a63c3c5d091a2ed4fca6632bdaff0efc1e4a07987dfbab4033f,2024-09-06T05:15:13.207000
CVE-2024-28216,0,1,2639eeeae2d1c84306c344ef08dd597628608e0b3d7b570a368ca0189717cab3,2024-09-06T05:15:13.293000
CVE-2024-28219,0,0,565e95e78290480ce059c2c945e1cbfe2222bb0e5f4c019f24f3af4bf523bbf1,2024-08-20T20:35:22.290000
CVE-2024-2822,0,0,5135e9aa23c4836200c76de0e1596e8aa68817f4e4641238aa9f03a498ac5941,2024-08-23T21:35:06.587000
CVE-2024-28222,0,0,21798b9a50521b296393b78142f000b75c0182bb5a6a6b62b191928d8eca5e16,2024-03-07T13:52:27.110000
@ -255731,6 +255731,7 @@ CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036
CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000
CVE-2024-38482,0,0,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000
CVE-2024-38483,0,0,d89f0c1af2745eaf3307200f5493e8a825a53b577d01487f0db0b0e51a7359ef,2024-08-14T13:00:37.107000
CVE-2024-38486,1,1,c2fde63bac38553b5acb1dec6a33dfa5d3b67270eced4472f6e67499b943a37d,2024-09-06T05:15:13.370000
CVE-2024-38489,0,0,93d5075288eb71dc5e05de45f3028a8abf40e549af9e7f74c8d90c91ab2994de,2024-08-02T13:54:55.697000
CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000
CVE-2024-38490,0,0,6064da0857e13bb34f5161ce76072357349aff2d15fba2fd034148c6aa00cdc4,2024-08-02T13:54:51.277000
@ -256432,6 +256433,7 @@ CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f086204
CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000
CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000
CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000
CVE-2024-39585,1,1,32b4b4f03c8f6412042cfe5ed4dafc4aa01bbcea042b73bf807af8f6924be9f1,2024-09-06T05:15:13.590000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000
CVE-2024-39592,0,0,541b14c1914f7693bac69344218050bd21bf7511f9226d6471041f73dd5bbff5,2024-08-29T19:25:41.740000
@ -256986,7 +256988,7 @@ CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe6
CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
CVE-2024-40865,1,1,018527b47ba7309b348847cdc1818c93d4422e2706f5ab1f41ac0f81c23f402f,2024-09-06T02:15:02.297000
CVE-2024-40865,0,0,018527b47ba7309b348847cdc1818c93d4422e2706f5ab1f41ac0f81c23f402f,2024-09-06T02:15:02.297000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
@ -259194,6 +259196,7 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
CVE-2024-45751,1,1,d79bc29ccaca5a88581270f758f28c17e523bb85774e4976815ed6e34b5e5cc2,2024-09-06T05:15:13.840000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
@ -261452,6 +261455,7 @@ CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e327
CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000
CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb61,2024-08-12T13:41:36.517000
CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000
CVE-2024-7415,1,1,07a92784ace9792a8c526456f6eafe7a20511bb193fbc07309c0274862f7ca02,2024-09-06T04:15:05.137000
CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000
CVE-2024-7418,0,0,5654c2ea5f680ee7442f7881c310f72c8023f64985fe11e829ea249b0084006d,2024-08-29T13:25:27.537000
CVE-2024-7420,0,0,212201dc70782f8f787a94c9803febdbce3768abc9739a3b9300a43932a4c1b3,2024-08-15T13:01:10.150000
@ -261947,6 +261951,7 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb
CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
CVE-2024-8235,0,0,d5aa509f85958c98e1ad9dcfec5d574bff6f5e3781d6d0bbdba4997de15951d1,2024-09-03T12:59:02.453000
CVE-2024-8247,1,1,a14ec38d2f41576d8317e3b68f3a4d17094c75a64da4e69abcfe0164cbd22ddb,2024-09-06T04:15:05.573000
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
@ -262038,3 +262043,4 @@ CVE-2024-8470,0,0,956507eff563dfb5dc2d763a7fe06da01a484a013fe76d06d998d5ee320dc8
CVE-2024-8471,0,0,f34bbd71761fef46adc756fc351feed22408fd26153f4113affb8a1936920967,2024-09-05T17:44:56.007000
CVE-2024-8472,0,0,885bea6a62a60a6033a0ab44c8323d53a4e9fd268816a1f761f34f0327640851,2024-09-05T17:44:56.007000
CVE-2024-8473,0,0,218b88700e46a6ed9b36b25211b02ba98a7bb737dcfbb815905fd6fc793977c1,2024-09-05T17:44:56.007000
CVE-2024-8480,1,1,54eda8e09226ce79ffa51b764f7162181e20663097bad0d63525541005115f42,2024-09-06T04:15:05.847000

Can't render this file because it is too large.