Auto-Update: 2024-07-24T08:00:17.346517+00:00

This commit is contained in:
cad-safe-bot 2024-07-24 08:03:12 +00:00
parent bbbc2efb68
commit ad10a9ee5e
8 changed files with 356 additions and 17 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-32466",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-07-24T07:15:01.953",
"lastModified": "2024-07-24T07:15:01.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some UEFI code, leading to arbitrary code execution or escalation of privilege."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.5,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000214917/dsa-2023-225-security-update-for-dell-bios-edge-gateway-5200-and-edge-gateway-3200",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-6094",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-24T06:15:01.903",
"lastModified": "2024-07-24T06:15:01.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/019b3f34-7b85-4728-8dd7-ca472d6b2d06/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-6553",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-24T07:15:02.350",
"lastModified": "2024-07-24T07:15:02.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.3.This is due to the plugin utilizing wpdesk and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3117899%40wp-meteor&new=3117899%40wp-meteor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6197c194-5a17-41da-be79-58a6f5c68a0b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-6571",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-24T07:15:02.600",
"lastModified": "2024-07-24T07:15:02.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Optimize Images ALT Text (alt tag) & names for SEO using AI plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.1. This is due the plugin utilizing cocur and not preventing direct access to the generate-default.php file. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3122915%40imageseo&new=3122915%40imageseo&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a11083dd-7a5f-483b-a854-2697ddc54262?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-6629",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-24T07:15:02.820",
"lastModified": "2024-07-24T07:15:02.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The All-in-One Video Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video shortcode in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/all-in-one-video-gallery/trunk/public/video.php#L74",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3123171/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3123171/all-in-one-video-gallery/trunk/public/video.php",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/all-in-one-video-gallery/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6e6fda8-e998-4087-8a21-9edb2a0249c8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-6836",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-24T06:15:02.087",
"lastModified": "2024-07-24T06:15:02.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Funnel Builder for WordPress by FunnelKit \u2013 Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps & One Click Upsells plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to update multiple settings, including templates, designs, checkouts, and other plugin settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/funnel-builder/trunk/modules/checkouts/includes/class-wfacp-ajax-controller.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3123202/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9022afe-0c79-413b-ac0a-a1d32ec09619?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-24T06:00:17.603345+00:00
2024-07-24T08:00:17.346517+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-24T05:15:12.907000+00:00
2024-07-24T07:15:02.820000+00:00
```
### Last Data Feed Release
@ -33,25 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257866
257872
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `6`
- [CVE-2024-3246](CVE-2024/CVE-2024-32xx/CVE-2024-3246.json) (`2024-07-24T04:15:04.280`)
- [CVE-2024-40767](CVE-2024/CVE-2024-407xx/CVE-2024-40767.json) (`2024-07-24T05:15:12.907`)
- [CVE-2024-5861](CVE-2024/CVE-2024-58xx/CVE-2024-5861.json) (`2024-07-24T04:15:04.517`)
- [CVE-2023-32466](CVE-2023/CVE-2023-324xx/CVE-2023-32466.json) (`2024-07-24T07:15:01.953`)
- [CVE-2024-6094](CVE-2024/CVE-2024-60xx/CVE-2024-6094.json) (`2024-07-24T06:15:01.903`)
- [CVE-2024-6553](CVE-2024/CVE-2024-65xx/CVE-2024-6553.json) (`2024-07-24T07:15:02.350`)
- [CVE-2024-6571](CVE-2024/CVE-2024-65xx/CVE-2024-6571.json) (`2024-07-24T07:15:02.600`)
- [CVE-2024-6629](CVE-2024/CVE-2024-66xx/CVE-2024-6629.json) (`2024-07-24T07:15:02.820`)
- [CVE-2024-6836](CVE-2024/CVE-2024-68xx/CVE-2024-6836.json) (`2024-07-24T06:15:02.087`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
- [CVE-2023-4522](CVE-2023/CVE-2023-45xx/CVE-2023-4522.json) (`2024-07-24T05:15:11.877`)
- [CVE-2023-7028](CVE-2023/CVE-2023-70xx/CVE-2023-7028.json) (`2024-07-24T05:15:12.537`)
- [CVE-2024-39702](CVE-2024/CVE-2024-397xx/CVE-2024-39702.json) (`2024-07-24T05:15:12.813`)
## Download and Usage

View File

@ -224253,6 +224253,7 @@ CVE-2023-32462,0,0,e07a0b8cf235c91f117aab5542e8a1e08692a6b7bc816a6d84fdff7939ebf
CVE-2023-32463,0,0,9c0648bf3a62c21ad36b1e856d010660c2e367e55959b2f6ee06517e731afabd,2023-07-05T18:33:55.533000
CVE-2023-32464,0,0,5002bc22d174d03b224c414e085222536ab31791807238bbf4cd033cfd86a1ab,2023-07-05T18:31:27.907000
CVE-2023-32465,0,0,3b910cb507c14d4c201ed99e11b2f097c6e541241b586413c4b2c4c1c1c5ebcd,2023-06-27T18:39:23.987000
CVE-2023-32466,1,1,2390536344af0252ea883e678ac94b8ab2c71aa723dc425d7c107ee620d31531,2024-07-24T07:15:01.953000
CVE-2023-32467,0,0,92dc670a37cbc195f9aee3f2f699c2fc979d516f1a92fbab736ae2a84445b2ab,2024-07-11T13:05:54.930000
CVE-2023-32468,0,0,3aaf8d963cbce4f5d5319dd617a26b2fa711b5f2996fe21d5e604c3f9b4c55f8,2023-08-03T18:23:50.197000
CVE-2023-32469,0,0,6b66634362347d05c43893f73f84b043ba50f94ace2183d7db139e18e104e674,2023-11-29T19:49:42.947000
@ -233585,7 +233586,7 @@ CVE-2023-45213,0,0,1721419b8db18f8be3186b3858cde3dfbb01c1eeecb65158a2bc3db0fb6d5
CVE-2023-45215,0,0,4da1a67a44ac0cc0f37889eaa1552cfeb2b5db2b1917ec902eb1e3e4497f451a,2024-07-11T16:02:41.077000
CVE-2023-45217,0,0,b242cd4a28367d0d17ee46fefcd9fd963383a0b11fdff04c8576d650db6a0d85,2024-07-03T01:41:49.660000
CVE-2023-45219,0,0,6eb7ee5c3751e2688fdd4cbf3e5f8787b8e0c1a0882c53fc638bdf2db7ee922e,2023-10-18T01:32:45.897000
CVE-2023-4522,0,1,c080993fbd5d60db7d2584cdb4b72bd7b0c7489de94a388242066bc843e55dc7,2024-07-24T05:15:11.877000
CVE-2023-4522,0,0,c080993fbd5d60db7d2584cdb4b72bd7b0c7489de94a388242066bc843e55dc7,2024-07-24T05:15:11.877000
CVE-2023-45220,0,0,882878928063cfcee352e722aada106f07ebaf73f0f283e1dd411149e4583a78,2023-11-06T14:42:32.330000
CVE-2023-45221,0,0,ef055771997451117c3e1785f1652eaf0872f8d42c4cef745618e895063014a1,2024-05-17T18:36:05.263000
CVE-2023-45222,0,0,a0f522dd73c772152750fda54a264d02d0a26badcfe8035128ea3ef1d881a858,2024-02-12T16:45:27.167000
@ -240622,7 +240623,7 @@ CVE-2023-7024,0,0,0b0d6e2cd8a55b4494cdd2b77e9f647f33c47f79573c34c6c5e8c28805a72b
CVE-2023-7025,0,0,e7834d97731a235cf0f177f71735e5ca7d5fcff5ac726923c8b5198da81ec286,2024-05-17T02:34:03.957000
CVE-2023-7026,0,0,1cc936e616463b5ff1b033dcc860db201e66a8dd5c5dbaeca22f086a6f79ffd6,2024-05-17T02:34:04.063000
CVE-2023-7027,0,0,fc1293543654e15b720c38a66bb6f2ec15c9fc5eb3fe91f4129c0466a44102c9,2024-02-02T16:30:28.857000
CVE-2023-7028,0,1,8e9a70ab0fe9f91f293d4d61c4d2d114b0abba8096bccbeb83cc96fdcdf05747,2024-07-24T05:15:12.537000
CVE-2023-7028,0,0,8e9a70ab0fe9f91f293d4d61c4d2d114b0abba8096bccbeb83cc96fdcdf05747,2024-07-24T05:15:12.537000
CVE-2023-7029,0,0,0b2077503389563a2cf8a194211de95f4cbe22ad4680ab3928b7bbbf465fb95d,2024-02-13T18:49:46.303000
CVE-2023-7030,0,0,f49772cf48990c4178ee421660106a6fa59de551116b4fc6d8b00fd41a2d7e54,2024-05-02T18:00:37.360000
CVE-2023-7031,0,0,fd21885ac32f4e4ebf79a0a01265d00a38f09b08812eedc920f03ba00e1c3538,2024-01-25T16:32:53.153000
@ -250975,7 +250976,7 @@ CVE-2024-32456,0,0,d14077b9c0d3fd624bb090c8902408112668af5dcd1ec1392b17398cab655
CVE-2024-32457,0,0,e19d3294c5bd0f5932cb781ff1a6aaf0ad9675f665e5d230b25da52c6eb0ab24,2024-04-17T12:48:07.510000
CVE-2024-32458,0,0,61e534ffc05a2fd1f0c764d7b2f3b2dc812bdfe09bd360efea2bba78b4568568,2024-06-10T18:15:32.790000
CVE-2024-32459,0,0,565c2820f9f40b3ae7ac4380cb45711f29b0c6684b22418bec49fb00db4f3c9e,2024-06-10T18:15:32.940000
CVE-2024-3246,1,1,ee037dd96ee988a9a5377ef2ebf710eceec3f069a687fae5fc3a3773fe1f463f,2024-07-24T04:15:04.280000
CVE-2024-3246,0,0,ee037dd96ee988a9a5377ef2ebf710eceec3f069a687fae5fc3a3773fe1f463f,2024-07-24T04:15:04.280000
CVE-2024-32460,0,0,791d6f5eece9c40a7a8e9bf5719f0d21a50aef5a23765ed0735f0298c727e1a8,2024-06-10T18:15:33.033000
CVE-2024-32461,0,0,7a7784b51f232219ca425c17e34b523d7eced76a74e448dd98d2af59b52810da,2024-04-23T12:52:26.253000
CVE-2024-32462,0,0,3d3d05bcc9e36c0ca38630e8f66ae4fc7d4ac5c6b704d1bc0d85811d4a35b050,2024-05-01T18:15:24.140000
@ -255330,7 +255331,7 @@ CVE-2024-39699,0,0,711bdc17f9c229479a79abf16418d6f303c1d2fb494a38a72ece58a870304
CVE-2024-3970,0,0,91552b239fa9d8e00e56c74ece4dae5720fa4dc9c44897dc0454091791cfe152,2024-05-15T18:35:11.453000
CVE-2024-39700,0,0,c0797f3628df13d0523a3968cdcee9fc6d1644740c750ed207d822c73c9030ad,2024-07-17T13:34:20.520000
CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8189,2024-07-09T18:19:14.047000
CVE-2024-39702,0,1,a3d50dd76a272488cbc13e076a00823087fdf99cf9f35c7be99bbf35973db115,2024-07-24T05:15:12.813000
CVE-2024-39702,0,0,a3d50dd76a272488cbc13e076a00823087fdf99cf9f35c7be99bbf35973db115,2024-07-24T05:15:12.813000
CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000
CVE-2024-39708,0,0,000cfabacce752db3861ff9f8f3b1c505cd90f739471d05927bcaf43cab3bb6e,2024-06-28T10:27:00.920000
@ -255629,7 +255630,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
CVE-2024-4076,0,0,c3f4da0ebbad513f4d6376f9fec9325c5fc08f473d80236741b20cd14dc865c8,2024-07-23T16:15:06.287000
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
CVE-2024-40767,1,1,afbfd77332db3ec3c1abc7441d91fd2657e3fdf3870e63732fcac7ece324cc3e,2024-07-24T05:15:12.907000
CVE-2024-40767,0,0,afbfd77332db3ec3c1abc7441d91fd2657e3fdf3870e63732fcac7ece324cc3e,2024-07-24T05:15:12.907000
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000
CVE-2024-4079,0,0,99209b6b51eaa8a9d90cd12f677c7e30b866cd2c9ada6d13befa76362cf63168,2024-07-23T14:15:14.353000
@ -257268,7 +257269,7 @@ CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc
CVE-2024-5858,0,0,63cb7f6cd58686ca5ad3c57990888086a18b2814d4915e424991a00332eb64f9,2024-06-17T12:42:04.623000
CVE-2024-5859,0,0,72e4b113c686d9a3109f00890cd02d7c66daeaf956171b1cfade7c196becbe2c,2024-06-24T19:21:07.943000
CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000
CVE-2024-5861,1,1,cadfe78f0dca9909c50fcadef3482e7faefb4029e624c63cf7884888f0b60f1a,2024-07-24T04:15:04.517000
CVE-2024-5861,0,0,cadfe78f0dca9909c50fcadef3482e7faefb4029e624c63cf7884888f0b60f1a,2024-07-24T04:15:04.517000
CVE-2024-5862,0,0,441ab26bc80ed7c87de8e4be62f6bf1c86b995270dbb376cc8e089e80e683161,2024-06-24T19:26:47.037000
CVE-2024-5863,0,0,8eb388b46dfdca7ac79f7a3487053af7c103c168da16a20899b575731960eec2,2024-06-28T10:27:00.920000
CVE-2024-5864,0,0,539f12905317a790a13c7190e3394133674affd0cb1690d81cb0d56c8ad41bb1,2024-06-28T10:27:00.920000
@ -257417,6 +257418,7 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
CVE-2024-6094,1,1,3c90347939a1f190e70109a37076f0ce0dbdf744b626071cec340a61b12536be,2024-07-24T06:15:01.903000
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000
@ -257685,6 +257687,7 @@ CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d8
CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000
CVE-2024-6542,0,0,54f8a75473ca23470adff5375410f0163accbe3baf07cee08839e7a197565332,2024-07-22T13:00:31.330000
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
CVE-2024-6553,1,1,879877ef6ddc882555f2763bcffa21e66b10deb67f1bdd0f69793285dd29e02d,2024-07-24T07:15:02.350000
CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce662,2024-07-12T17:01:48.353000
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
@ -257695,6 +257698,7 @@ CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000
CVE-2024-6570,0,0,1c2083317d49d5094b93c672429fe80fa3944fba8c36de7f1f2403e55beb6b46,2024-07-16T13:43:58.773000
CVE-2024-6571,1,1,d44d33dd39e189562de2262ba15ca925ae1204c315b8c2cb8b9ed3cea9e44aba,2024-07-24T07:15:02.600000
CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000
CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
@ -257721,6 +257725,7 @@ CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9b
CVE-2024-6621,0,0,245e22cf8c695e01e46245f83baf1a8e74fd9ede2206edccd3aaa25f1c00ba0d,2024-07-16T13:43:58.773000
CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
CVE-2024-6629,1,1,722bbaee5eccd01b9e17fcb8cbbf5caf8be6e3fa1ebb26a778c24f118a28c2b1,2024-07-24T07:15:02.820000
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84fff,2024-07-22T13:00:31.330000
CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000
@ -257807,6 +257812,7 @@ CVE-2024-6828,0,0,e8e5364a43527004d310abc814718f6da23bb18bdc1eed3d86b65930ef5f36
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000
CVE-2024-6836,1,1,a7e643cb6230d5e98667acb22e4fe58264e905462db11f5ad0ed41334cc0c973,2024-07-24T06:15:02.087000
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
CVE-2024-6885,0,0,d90ac2819f3fbb5ad9a46d3bc60924206cfe9c6a245e942b59dba4be3dd37e51,2024-07-23T02:15:02.610000
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000

Can't render this file because it is too large.