Auto-Update: 2024-08-22T12:00:18.848715+00:00

This commit is contained in:
cad-safe-bot 2024-08-22 12:03:17 +00:00
parent d6523e446d
commit a0a1647cfd
10 changed files with 467 additions and 15 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-22162",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-31T18:15:47.953",
"lastModified": "2024-02-06T14:46:24.473",
"vulnStatus": "Analyzed",
"lastModified": "2024-08-22T10:15:05.013",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM Shortcodes allows Reflected XSS.This issue affects WPZOOM Shortcodes: from n/a through 1.0.1.\n\n"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Shortcodes allows Reflected XSS.This issue affects WPZOOM Shortcodes: from n/a through 1.0.3."
},
{
"lang": "es",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-35151",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-22T11:15:13.250",
"lastModified": "2024-08-22T11:15:13.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0 could allow authenticated users access to sensitive information through improper authorization controls on APIs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/292638",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7165959",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39744",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-22T11:15:13.513",
"lastModified": "2024-08-22T11:15:13.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297236",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7166196",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39745",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-22T11:15:13.710",
"lastModified": "2024-08-22T11:15:13.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297312",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7166195",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39746",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-22T11:15:13.920",
"lastModified": "2024-08-22T11:15:13.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297313",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7166018",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-6870",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-22T10:15:05.620",
"lastModified": "2024-08-22T10:15:05.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via file uploads in all versions up to, and including, 2.4.7 due to insufficient input sanitization and output escaping affecting the rl_upload_image AJAX endpoint. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the 3gp2 file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/responsive-lightbox/tags/2.4.7/includes/class-remote-library.php#L261",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3137531%40responsive-lightbox&new=3137531%40responsive-lightbox&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/responsive-lightbox/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4d55309-d178-4b3d-9de6-2cf2769b76fe?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-7778",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-22T10:15:05.977",
"lastModified": "2024-08-22T10:15:05.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.10.36 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/themeisle-companion/tags/2.10.36/obfx_modules/custom-fonts/custom_fonts_admin.php#L376",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3139233/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3139233/#file71",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/themeisle-companion/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be83c6be-fb6c-462f-b54a-ca12d6d2581f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7848",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-22T11:15:14.117",
"lastModified": "2024-08-22T11:15:14.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The User Private Files \u2013 WordPress File Sharing Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.0 via the 'dpk_upvf_update_doc' due to missing validation on the 'docid' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to gain access to other user's private files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3136913%40user-private-files&new=3136913%40user-private-files&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0fb06de8-97d6-46c3-83ef-93a209540259?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-22T10:00:17.772356+00:00
2024-08-22T12:00:18.848715+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-22T09:15:03.997000+00:00
2024-08-22T11:15:14.117000+00:00
```
### Last Data Feed Release
@ -33,22 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260926
260933
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `7`
- [CVE-2024-8072](CVE-2024/CVE-2024-80xx/CVE-2024-8072.json) (`2024-08-22T08:15:04.360`)
- [CVE-2024-35151](CVE-2024/CVE-2024-351xx/CVE-2024-35151.json) (`2024-08-22T11:15:13.250`)
- [CVE-2024-39744](CVE-2024/CVE-2024-397xx/CVE-2024-39744.json) (`2024-08-22T11:15:13.513`)
- [CVE-2024-39745](CVE-2024/CVE-2024-397xx/CVE-2024-39745.json) (`2024-08-22T11:15:13.710`)
- [CVE-2024-39746](CVE-2024/CVE-2024-397xx/CVE-2024-39746.json) (`2024-08-22T11:15:13.920`)
- [CVE-2024-6870](CVE-2024/CVE-2024-68xx/CVE-2024-6870.json) (`2024-08-22T10:15:05.620`)
- [CVE-2024-7778](CVE-2024/CVE-2024-77xx/CVE-2024-7778.json) (`2024-08-22T10:15:05.977`)
- [CVE-2024-7848](CVE-2024/CVE-2024-78xx/CVE-2024-7848.json) (`2024-08-22T11:15:14.117`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `1`
- [CVE-2022-48900](CVE-2022/CVE-2022-489xx/CVE-2022-48900.json) (`2024-08-22T08:15:04.233`)
- [CVE-2024-31256](CVE-2024/CVE-2024-312xx/CVE-2024-31256.json) (`2024-08-22T09:15:03.997`)
- [CVE-2024-22162](CVE-2024/CVE-2024-221xx/CVE-2024-22162.json) (`2024-08-22T10:15:05.013`)
## Download and Usage

View File

@ -212409,7 +212409,7 @@ CVE-2022-48897,0,0,a6f0e85400bd9699693ba1d35d5bdbfdbac3685639be1f6ee3d1f2d589983
CVE-2022-48898,0,0,db123fbf5ec577b4cc5c353572831875154cf4dfd348ca1511458d53d92f2971,2024-08-21T12:30:33.697000
CVE-2022-48899,0,0,307122423943779556534a3fc536d67a546d19e3083d1df8d83008bd134af184,2024-08-21T12:30:33.697000
CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000
CVE-2022-48900,0,1,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000
CVE-2022-48900,0,0,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000
CVE-2022-48901,0,0,e2c532ec8d8364154d356c89f845a54e3ffc1bb99771bb481c4028154d04f557,2024-08-22T02:15:04.733000
CVE-2022-48902,0,0,cc34ff8684f7e31ac439e4476b45567bda3d4193e8d558c57bb2f7b544a6ad74,2024-08-22T02:15:04.807000
CVE-2022-48903,0,0,15d38d743e15cb4a951d5a9f5806852b8e24e175e98118cfee0203c993b90524,2024-08-22T02:15:04.897000
@ -244380,7 +244380,7 @@ CVE-2024-22159,0,0,fff695e156ff10044e65861f34b893aeba622a494b1a5fe4dbedf75055c16
CVE-2024-2216,0,0,8c1cf8fe971bc071813ac5044b67b7814680818f7cb3d5044c7bf2ec90a20fe8,2024-05-01T18:15:19.170000
CVE-2024-22160,0,0,cdcb0cfe1d52061c460a57e632ad5aecdc498e0506ecca56b9f6ffa551d710e0,2024-02-05T22:22:14.233000
CVE-2024-22161,0,0,ff0e443927fec98039949a9e5e757585d4515aad6d0982b79120dfecc3014ba6,2024-02-05T22:25:31.533000
CVE-2024-22162,0,0,2f8b985c82ca325e0b3bbbb1392f8d851f106216d01ab5edda732293fdf66516,2024-02-06T14:46:24.473000
CVE-2024-22162,0,1,a49455b286b634f9fdd4f4fe91c2683590e48e65018ca6ecbeed902106fa98f2,2024-08-22T10:15:05.013000
CVE-2024-22163,0,0,bdd8ca5354588b40fa0d9fccfe779e1c3610bda48843c20cf7df6b82a18bf5e8,2024-02-06T14:57:33.760000
CVE-2024-22164,0,0,7ec100395a7791398c44c356f1747166abc145666e7473aaaccb26153fba7bde,2024-04-10T01:15:17.713000
CVE-2024-22165,0,0,7751ac618992ea7972744c7c978410ebc59b3bb71e7cf0a2a2da5523e0608190,2024-04-10T01:15:17.890000
@ -250683,7 +250683,7 @@ CVE-2024-31252,0,0,965b52dc8d01f956c4857ee50cf6b3b92f6737405b3407484989d7c892ea2
CVE-2024-31253,0,0,6b52348131a9e7ce2b8adb370f161aea89893dd5813b25e5b983c7817d6ac107,2024-04-10T19:49:51.183000
CVE-2024-31254,0,0,24e58592379c28c2b551c365b7fdafd63367ef14b8d6cb3c58c2da4489d2f728,2024-04-10T19:49:51.183000
CVE-2024-31255,0,0,3d2cddef3b8b1d7c7cedaa6144b1351d4eb43ef35c8288872fd1da87a081d72a,2024-04-08T18:48:40.217000
CVE-2024-31256,0,1,e1758c95ee995220aaa5f334cb79e4078a558a549efbe76d6b7a3b8e4344bc02,2024-08-22T09:15:03.997000
CVE-2024-31256,0,0,e1758c95ee995220aaa5f334cb79e4078a558a549efbe76d6b7a3b8e4344bc02,2024-08-22T09:15:03.997000
CVE-2024-31257,0,0,20f99d882001029b94e1842fc3bbe92fa8538a136cbc4a91cbbf537ebbc0576b,2024-04-08T18:48:40.217000
CVE-2024-31258,0,0,f3b3ccc050f0a5372a9d95262c9af956f11f22014fa072b8aeffe2091af63aaf,2024-04-08T18:48:40.217000
CVE-2024-31259,0,0,ea1e7b6cc0bccf92e4ec2cdc20023a4d23e9147355aa9d0576fa5c4e5578d805,2024-04-10T19:49:51.183000
@ -253288,6 +253288,7 @@ CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794
CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000
CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000
CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000
CVE-2024-35151,1,1,6c4a3e89952ba453a6f89e210df8da6db42931d509983737f8ae1a9937645fa1,2024-08-22T11:15:13.250000
CVE-2024-35152,0,0,b41d5d8fb05afbf50d1ef06fd658b7850273eedb06cda6e29568f6ff2e26d7a2,2024-08-15T13:01:10.150000
CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000
CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000
@ -256344,6 +256345,9 @@ CVE-2024-39740,0,0,03acc910317a10fe912464b7efeeb485740a2ca83e55d3c05a65c84915618
CVE-2024-39741,0,0,829c9dc10ec61ebda2ab0b49cc6a9c5e79410be7630ee14de90c81590961617f,2024-07-16T14:03:33.243000
CVE-2024-39742,0,0,d2c383b6f83715e80ad86c53a5952b482038888e11ae903f4721eb34788c653c,2024-08-07T16:08:52.997000
CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc129,2024-08-07T16:10:15.813000
CVE-2024-39744,1,1,a6482079ec0f2ce60949c09c924c4e1976339eead000ccc1acebdd71b4604dcf,2024-08-22T11:15:13.513000
CVE-2024-39745,1,1,440bcf20d6ef01343734c5916299a54c17629c3f65f0e9ceda66940f1fa5d7ca,2024-08-22T11:15:13.710000
CVE-2024-39746,1,1,8b5dd8fb77399b066e6efc60205e02881562c345a2a740bbbfc483f5c511abd1,2024-08-22T11:15:13.920000
CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000
CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000
CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000
@ -260243,6 +260247,7 @@ CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d
CVE-2024-6864,0,0,25a84b435d49ce11c1c73a942909d4d326ce5027935626546ef4f0b2e3fcaea1,2024-08-20T15:44:20.567000
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
CVE-2024-6870,1,1,b591dc69e1feea36f04552b514173aba4b2b0e750b41beaf2aade429c1e79a75,2024-08-22T10:15:05.620000
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
@ -260804,6 +260809,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
CVE-2024-7775,0,0,e3301a5d8f77ad443eb31f53865c4d76f2f8fe202d331dbc3155c9382724cc8e,2024-08-20T15:44:20.567000
CVE-2024-7777,0,0,71bd18c058a843cc648eaac1d1574a0ec472525bb01fac803805d8a41dba271b,2024-08-20T15:44:20.567000
CVE-2024-7778,1,1,c4204e71562aa3faf2d13aef68401ad4f226b047d9a10319e0968e99487b5071,2024-08-22T10:15:05.977000
CVE-2024-7780,0,0,d93ffb279aea8f39f6fd963d66033ac1d11eb19c0e769bfec592ca965c19db92,2024-08-20T15:44:20.567000
CVE-2024-7782,0,0,8f8c7ec0917c77b4eac4d0691ad6fd872581e8976dc54163f3db95fe52f021ae,2024-08-20T15:44:20.567000
CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000
@ -260838,6 +260844,7 @@ CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f954176
CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b0256f,2024-08-19T13:00:23.117000
CVE-2024-7848,1,1,e96a5c9bd1aa84c0784082f2180e6483305702d4b02a6a9f0657aeed398bf7e3,2024-08-22T11:15:14.117000
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000
@ -260924,4 +260931,4 @@ CVE-2024-8033,0,0,474ca8870cf9b670510d19eed5c14882ceb4bd6ad7995e7e63bce94de964db
CVE-2024-8034,0,0,c526cc05681ad2481b0574f11b49e00d365c3d4553e9a0575b545dc17a3804a9,2024-08-21T21:15:09.957000
CVE-2024-8035,0,0,38022f95d3472be828d03744ae35827b794523de6d3705a1f92311c7c8b00c33,2024-08-21T21:15:10.010000
CVE-2024-8071,0,0,db85250c5edf1584ada2f564aced8a76744ad03b249dcb59151ee2ae9e8cef32,2024-08-22T07:15:04.830000
CVE-2024-8072,1,1,13eb434a88b4b74789c84a111a885695a6c05631e8c05fb4f986357ab00fea35,2024-08-22T08:15:04.360000
CVE-2024-8072,0,0,13eb434a88b4b74789c84a111a885695a6c05631e8c05fb4f986357ab00fea35,2024-08-22T08:15:04.360000

Can't render this file because it is too large.