Auto-Update: 2024-07-16T12:00:17.806834+00:00

This commit is contained in:
cad-safe-bot 2024-07-16 12:03:13 +00:00
parent 1983c29b4c
commit 7e9baab0b5
7 changed files with 286 additions and 25 deletions

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2023-52886",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-16T10:15:02.493",
"lastModified": "2024-07-16T10:15:02.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix race by not overwriting udev->descriptor in hub_port_init()\n\nSyzbot reported an out-of-bounds read in sysfs.c:read_descriptors():\n\nBUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883\nRead of size 8 at addr ffff88801e78b8c8 by task udevd/5011\n\nCPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-g40f71e7cd3c6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351\n print_report mm/kasan/report.c:462 [inline]\n kasan_report+0x11c/0x130 mm/kasan/report.c:572\n read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883\n...\nAllocated by task 758:\n...\n __do_kmalloc_node mm/slab_common.c:966 [inline]\n __kmalloc+0x5e/0x190 mm/slab_common.c:979\n kmalloc include/linux/slab.h:563 [inline]\n kzalloc include/linux/slab.h:680 [inline]\n usb_get_configuration+0x1f7/0x5170 drivers/usb/core/config.c:887\n usb_enumerate_device drivers/usb/core/hub.c:2407 [inline]\n usb_new_device+0x12b0/0x19d0 drivers/usb/core/hub.c:2545\n\nAs analyzed by Khazhy Kumykov, the cause of this bug is a race between\nread_descriptors() and hub_port_init(): The first routine uses a field\nin udev->descriptor, not expecting it to change, while the second\noverwrites it.\n\nPrior to commit 45bf39f8df7f (\"USB: core: Don't hold device lock while\nreading the \"descriptors\" sysfs file\") this race couldn't occur,\nbecause the routines were mutually exclusive thanks to the device\nlocking. Removing that locking from read_descriptors() exposed it to\nthe race.\n\nThe best way to fix the bug is to keep hub_port_init() from changing\nudev->descriptor once udev has been initialized and registered.\nDrivers expect the descriptors stored in the kernel to be immutable;\nwe should not undermine this expectation. In fact, this change should\nhave been made long ago.\n\nSo now hub_port_init() will take an additional argument, specifying a\nbuffer in which to store the device descriptor it reads. (If udev has\nnot yet been initialized, the buffer pointer will be NULL and then\nhub_port_init() will store the device descriptor in udev as before.)\nThis eliminates the data race responsible for the out-of-bounds read.\n\nThe changes to hub_port_init() appear more extensive than they really\nare, because of indentation changes resulting from an attempt to avoid\nwriting to other parts of the usb_device structure after it has been\ninitialized. Similar changes should be made to the code that reads\nthe BOS descriptor, but that can be handled in a separate patch later\non. This patch is sufficient to fix the bug found by syzbot."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/7fe9d87996062f5eb0ca476ad0257f79bf43aaf5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8186596a663506b1124bede9fde6f243ef9f37ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9d241c5d9a9b7ad95c90c6520272fe404d5ac88f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b4a074b1fb222164ed7d5c0b8c922dc4a0840848",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39887",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-16T10:15:03.380",
"lastModified": "2024-07-16T10:15:03.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLOWED_SQL_FUNCTIONS has been introduced. This key disallows the use of the following PostgreSQL functions: version, query_to_xml, inet_server_addr, and inet_client_addr. Additional functions can be added to this list for increased protection.\n\nThis issue affects Apache Superset: before 4.0.2.\n\nUsers are recommended to upgrade to version 4.0.2, which fixes the issue.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/j55vm41jg3l0x6w49zrmvbf3k0ts5fqz",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-6457",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-16T11:15:10.097",
"lastModified": "2024-07-16T11:15:10.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HUSKY \u2013 Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018woof_author\u2019 parameter in all versions up to, and including, 1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_author/index.php#L102",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3116888/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfdf7b1-9bb8-4c1d-a00a-ca1e44440cab?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6579",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-16T10:15:03.797",
"lastModified": "2024-07-16T10:15:03.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Web and WooCommerce Addons for WPBakery Builder plugin for WordPress is vulnerable to unauthorized plugin settings modification due to a missing capability check on several plugin functions in all versions up to, and including, 1.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change some of the plugin settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L102",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L114",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L125",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/746b77c9-64f8-43e8-9c2a-ce6bc35fd24c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6621",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-16T11:15:10.357",
"lastModified": "2024-07-16T11:15:10.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The RSS Aggregator \u2013 RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wprss_activate_feed_source' and 'wprss_pause_feed_source' functions in all versions up to, and including, 4.23.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate or pause existing RSS feeds."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php#L12",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php#L28",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php?rev=3118231",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e37331b-0b75-41ee-b390-532efd674cc1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-16T10:00:18.244546+00:00
2024-07-16T12:00:17.806834+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-16T09:15:03.460000+00:00
2024-07-16T11:15:10.357000+00:00
```
### Last Data Feed Release
@ -33,29 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257088
257093
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `5`
- [CVE-2023-52290](CVE-2023/CVE-2023-522xx/CVE-2023-52290.json) (`2024-07-16T08:15:02.050`)
- [CVE-2024-1937](CVE-2024/CVE-2024-19xx/CVE-2024-1937.json) (`2024-07-16T09:15:02.257`)
- [CVE-2024-2691](CVE-2024/CVE-2024-26xx/CVE-2024-2691.json) (`2024-07-16T09:15:02.497`)
- [CVE-2024-3587](CVE-2024/CVE-2024-35xx/CVE-2024-3587.json) (`2024-07-16T09:15:02.693`)
- [CVE-2024-3779](CVE-2024/CVE-2024-37xx/CVE-2024-3779.json) (`2024-07-16T09:15:02.877`)
- [CVE-2024-41008](CVE-2024/CVE-2024-410xx/CVE-2024-41008.json) (`2024-07-16T08:15:02.240`)
- [CVE-2024-5852](CVE-2024/CVE-2024-58xx/CVE-2024-5852.json) (`2024-07-16T09:15:03.093`)
- [CVE-2024-6565](CVE-2024/CVE-2024-65xx/CVE-2024-6565.json) (`2024-07-16T09:15:03.280`)
- [CVE-2024-6570](CVE-2024/CVE-2024-65xx/CVE-2024-6570.json) (`2024-07-16T09:15:03.460`)
- [CVE-2023-52886](CVE-2023/CVE-2023-528xx/CVE-2023-52886.json) (`2024-07-16T10:15:02.493`)
- [CVE-2024-39887](CVE-2024/CVE-2024-398xx/CVE-2024-39887.json) (`2024-07-16T10:15:03.380`)
- [CVE-2024-6457](CVE-2024/CVE-2024-64xx/CVE-2024-6457.json) (`2024-07-16T11:15:10.097`)
- [CVE-2024-6579](CVE-2024/CVE-2024-65xx/CVE-2024-6579.json) (`2024-07-16T10:15:03.797`)
- [CVE-2024-6621](CVE-2024/CVE-2024-66xx/CVE-2024-6621.json) (`2024-07-16T11:15:10.357`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2024-6559](CVE-2024/CVE-2024-65xx/CVE-2024-6559.json) (`2024-07-16T07:15:02.373`)
## Download and Usage

View File

@ -238344,7 +238344,7 @@ CVE-2023-52286,0,0,d57c75df7d4ddd4390fb4bc0cb787c8d5ccb33cbef5a941d5aa3217832550
CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9cdc0,2024-01-24T18:40:15.637000
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
CVE-2023-52290,1,1,399464231e49f20d23c72354bf5bf48a11eea79c84ca0e19d03bd235db0575a9,2024-07-16T08:15:02.050000
CVE-2023-52290,0,0,399464231e49f20d23c72354bf5bf48a11eea79c84ca0e19d03bd235db0575a9,2024-07-16T08:15:02.050000
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
@ -238944,6 +238944,7 @@ CVE-2023-52882,0,0,e51efc18668383cabb6a1a97b2fa54b9809b5bd71d28b08d72a7fdf9caf29
CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000
CVE-2023-52884,0,0,bbf325b5c1ed57a9d1f4ab6303e0df9c8a8b60b96f00c7266f34fe596a2f1382,2024-06-21T11:22:01.687000
CVE-2023-52885,0,0,e5c658cfc56d45f1e026b5e9d3b2354382c669c4a8a58f5c853288778028aada,2024-07-15T13:00:34.853000
CVE-2023-52886,1,1,95f860132fb440ef5db5a693cde04172b145869bb82e837d027d0e58b83d8654,2024-07-16T10:15:02.493000
CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000
CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000
CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000
@ -242424,7 +242425,7 @@ CVE-2024-1933,0,0,7fbc0f24622f50a410caa37f8d4d0022d31f3ba694aaa208855480ee88f0fa
CVE-2024-1934,0,0,df6bc0820efaa227ff0593f2f377a2941dbe3870867c525b59689743a10c0b3a,2024-04-10T13:23:38.787000
CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da56b,2024-03-13T18:15:58.530000
CVE-2024-1936,0,0,b663fea20770354eab8754ae6925549962e39174687f5155b204d5fec65f6ae3,2024-03-23T12:15:08.453000
CVE-2024-1937,1,1,e4267aecc6d36cf0089bfd3a7de2bf38a789e042581a5e82e29812af34d12152,2024-07-16T09:15:02.257000
CVE-2024-1937,0,0,e4267aecc6d36cf0089bfd3a7de2bf38a789e042581a5e82e29812af34d12152,2024-07-16T09:15:02.257000
CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000
CVE-2024-1939,0,0,bb8e8d14c3c98da37e63f3c0963deaed3de9feadfccc15528efb01aca2c53754,2024-03-07T23:15:07.250000
CVE-2024-1940,0,0,4f9f4862eb1e6b7652f757b60ccb034b4f77619e6171d9f3805603ac6e0c779f,2024-06-06T13:59:09.023000
@ -246984,7 +246985,7 @@ CVE-2024-26906,0,0,42532862975f8bdf6c218bb08e8c76f0bdeb5f292a8c20c2de1b8755512c9
CVE-2024-26907,0,0,00d718a412070a4297719ea0fb3f7b55969fac373e166e4b352e4dbc743daf28,2024-06-25T22:15:25.960000
CVE-2024-26908,0,0,5ecc683879bcc08f4a65e6b0675afebd2da7cfed4f9fada740f88a540c7f8b1e,2024-04-30T08:15:17.140000
CVE-2024-26909,0,0,e3d7941f07403bc0745f4894278d17e22a07c87692715dac5395fbc71a84fef3,2024-04-29T19:45:21.680000
CVE-2024-2691,1,1,c8155cf95104d3314cc19d2c5bb788d687f54a9effa3d22a2941545abbd34823,2024-07-16T09:15:02.497000
CVE-2024-2691,0,0,c8155cf95104d3314cc19d2c5bb788d687f54a9effa3d22a2941545abbd34823,2024-07-16T09:15:02.497000
CVE-2024-26910,0,0,954b55e4bd1d42e5ff1449b1b11f06a07bc8c27711bedf28e87052fdaee0aafd,2024-06-25T22:15:26.080000
CVE-2024-26911,0,0,8ea2c917a6f00806416f32a6fbb36b2b35e7e18ca96874650f1bec8c514fcc80,2024-04-29T19:17:11.627000
CVE-2024-26912,0,0,7c8d0e30edc101bfc2f9acae1bf1398abcf215c4aec3726d727c7375cc839a46,2024-04-29T19:20:57.410000
@ -252865,7 +252866,7 @@ CVE-2024-35866,0,0,d0cc46812d56583865578aa7a7be2bec064126c2ec11cb3bbce2698115126
CVE-2024-35867,0,0,68386f3591f3f188a7476fa5855f8ac1dc116de9bd02ee457a082f6580699d33,2024-06-10T18:15:35.320000
CVE-2024-35868,0,0,631a0c47c7e0f65d439b8d71d6b3955aaa25bc09ab742cc924c15db6f46c8b06,2024-05-20T13:00:04.957000
CVE-2024-35869,0,0,630ed395e8d0f836b200232a6be2974e06759cee7a4d75dd11d6f714bebe5b1a,2024-07-03T02:02:21.027000
CVE-2024-3587,1,1,88b9b543afe49e9f934075704f8082a980511b2f85cc799b5dd54b8dae7b2bb8,2024-07-16T09:15:02.693000
CVE-2024-3587,0,0,88b9b543afe49e9f934075704f8082a980511b2f85cc799b5dd54b8dae7b2bb8,2024-07-16T09:15:02.693000
CVE-2024-35870,0,0,5a4167864efc3408c5c38cf8552b084d6c8e10c92910519cd2e6cedd908441ad,2024-05-20T13:00:04.957000
CVE-2024-35871,0,0,56b9e1c7cf8cc227a53238857c6c657b9eb9a1a650e2c064780cac494ab192c4,2024-06-25T22:15:31.897000
CVE-2024-35872,0,0,a0f59ba2a5d815fbc998062ea3a953e4acbf876ea21309bca7a7ecb80bc6c92e,2024-05-20T13:00:04.957000
@ -253997,7 +253998,7 @@ CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f
CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000
CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000
CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000
CVE-2024-3779,1,1,91cee144c8c80dcf7bc1667f9cc8611fac537eb0e56447cc423f1b595ce894d9,2024-07-16T09:15:02.877000
CVE-2024-3779,0,0,91cee144c8c80dcf7bc1667f9cc8611fac537eb0e56447cc423f1b595ce894d9,2024-07-16T09:15:02.877000
CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000
CVE-2024-37791,0,0,5b4a77640e01b5f5901f77da4cf3e217016c11878e7475119bb550241e2deb0e,2024-06-20T12:44:01.637000
CVE-2024-37794,0,0,0173114c4850547998c4a3719d0197d2f797f34c9e250dbc5cfe23ea2cc8953b,2024-07-03T02:04:43.130000
@ -254897,6 +254898,7 @@ CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bc
CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000
CVE-2024-39884,0,0,820d6f61ede8e42a2beabc4b322a42eecc24064bf6142891f1909848431996b5,2024-07-12T14:15:16.640000
CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000
CVE-2024-39887,1,1,fa7d2a734a057d0930b288c8c3ecef13f855e852c225bf49ff576829c5d9a630,2024-07-16T10:15:03.380000
CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000
CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
@ -255201,7 +255203,7 @@ CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054
CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
CVE-2024-41007,0,0,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000
CVE-2024-41008,1,1,661ecdbcb3ca98cbdd2da931d1a244c9e6ccdaf7950933bf8c08cc771f962839,2024-07-16T08:15:02.240000
CVE-2024-41008,0,0,661ecdbcb3ca98cbdd2da931d1a244c9e6ccdaf7950933bf8c08cc771f962839,2024-07-16T08:15:02.240000
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
@ -256625,7 +256627,7 @@ CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f
CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000
CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000
CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000
CVE-2024-5852,1,1,86ceec61c837be95a959741a38099dee81d338c029d4fc32b9bec0e93f1eb706,2024-07-16T09:15:03.093000
CVE-2024-5852,0,0,86ceec61c837be95a959741a38099dee81d338c029d4fc32b9bec0e93f1eb706,2024-07-16T09:15:03.093000
CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000
CVE-2024-5855,0,0,470fd388735694b7759ccf5036e6a18639fe074b164bc2d2da9695a799e80c03,2024-07-09T18:19:14.047000
CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc72,2024-07-09T18:19:14.047000
@ -256986,6 +256988,7 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21
CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
CVE-2024-6457,1,1,7987e557c2c95095adc4ad17acf4ed1e2acc7eba81f89223deeca3346bc09dcb,2024-07-16T11:15:10.097000
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
@ -257018,12 +257021,13 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
CVE-2024-6557,0,0,e9ee209561e99679c20203ca6d94da1a0bb55042ea3baa698cb80a889557bbdd,2024-07-16T05:15:15.073000
CVE-2024-6559,0,1,16d00b9dee0dd009d20e82307398dc314aff9f5ca223c39785f9792cbd3709f1,2024-07-16T07:15:02.373000
CVE-2024-6559,0,0,16d00b9dee0dd009d20e82307398dc314aff9f5ca223c39785f9792cbd3709f1,2024-07-16T07:15:02.373000
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
CVE-2024-6565,1,1,e7bb9ab08c108dc5070f2ca7ce46012474968cec63ff45f286f24d7239498860,2024-07-16T09:15:03.280000
CVE-2024-6570,1,1,ccdbc86ad4745a63c6205119102457147a7c895153aa9ebe1080a60ef714da42,2024-07-16T09:15:03.460000
CVE-2024-6565,0,0,e7bb9ab08c108dc5070f2ca7ce46012474968cec63ff45f286f24d7239498860,2024-07-16T09:15:03.280000
CVE-2024-6570,0,0,ccdbc86ad4745a63c6205119102457147a7c895153aa9ebe1080a60ef714da42,2024-07-16T09:15:03.460000
CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000
CVE-2024-6579,1,1,a0d916f5ee4dd254726798359f0bc3afc6dffb6f97426f2dcd8f47cc4f912602,2024-07-16T10:15:03.797000
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
@ -257043,6 +257047,7 @@ CVE-2024-6612,0,0,ec773de601f2439d4a30794cb33ecbe4d766cb102d1b031aeb7c612ae57eb7
CVE-2024-6613,0,0,972e81253130c3ea1fca72705a438fd241a2b5ffe08560847fb64da88d1289db,2024-07-09T18:18:38.713000
CVE-2024-6614,0,0,1be1fa04167dbe1739c8748fecedef47a7bd73d4360fbc6878e091dbbe1de7b2,2024-07-09T18:18:38.713000
CVE-2024-6615,0,0,7bf7f5fde3708291832ebfaaca065d46b502caca4507586f81d1026c39461379,2024-07-09T18:18:38.713000
CVE-2024-6621,1,1,0120997ff260c74340cb1d016c95dd3114a00638d7a855e82645f855d0462929,2024-07-16T11:15:10.357000
CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000

Can't render this file because it is too large.