Auto-Update: 2024-07-12T10:00:18.938941+00:00

This commit is contained in:
cad-safe-bot 2024-07-12 10:03:11 +00:00
parent 376c9d8072
commit adfcaf033c
17 changed files with 224 additions and 70 deletions

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-31365",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-09T08:15:07.827",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-07-12T08:15:10.953",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Post Type Builder (PTB) allows Reflected XSS.This issue affects Post Type Builder (PTB): from n/a through 2.0.8.\n\n"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Post Type Builder (PTB) allows Reflected XSS.This issue affects Post Type Builder (PTB): from n/a before 2.1.1."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Themify Post Type Builder (PTB) permite el XSS reflejado. Este problema afecta al Post Type Builder (PTB): desde n/a antes de 2.1.1."
}
],
"metrics": {

View File

@ -2,12 +2,13 @@
"id": "CVE-2024-32085",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-15T09:15:08.660",
"lastModified": "2024-04-15T13:15:31.997",
"lastModified": "2024-07-12T09:15:02.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in AitThemes Citadela Listing.This issue affects Citadela Listing: from n/a through 5.18.1.\n\n"
"value": "Cross-Site Request Forgery (CSRF) vulnerability in AitThemes Citadela Listing.This issue affects Citadela Listing: from n/a before 5.20.0."
},
{
"lang": "es",

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-5334",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-27T18:15:20.223",
"lastModified": "2024-06-27T19:25:12.067",
"lastModified": "2024-07-12T08:15:11.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "External Control of File Name or Path in GitHub repository stitionai/devika prior to -."
"value": "A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server."
},
{
"lang": "es",
"value": "Control externo del nombre o ruta del archivo en el repositorio de GitHub stitionai/devika antes de -."
}
],
"metrics": {

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-5547",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-27T18:15:20.493",
"lastModified": "2024-06-27T19:25:12.067",
"lastModified": "2024-07-12T08:15:11.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Relative Path Traversal in GitHub repository stitionai/devika prior to -."
"value": "A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory."
},
{
"lang": "es",
"value": "Path traversal relativo en el repositorio de GitHub stitionai/devika antes de -."
}
],
"metrics": {

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-5548",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-27T18:15:20.733",
"lastModified": "2024-06-27T19:25:12.067",
"lastModified": "2024-07-12T08:15:11.313",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal in GitHub repository stitionai/devika prior to -."
"value": "A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server."
},
{
"lang": "es",
"value": "Path Traversal en el repositorio de GitHub stitionai/devika antes de -."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-5549",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-09T00:15:02.050",
"lastModified": "2024-07-09T18:19:14.047",
"lastModified": "2024-07-12T08:15:11.390",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Origin Validation Error in GitHub repository stitionai/devika prior to -."
"value": "A CORS misconfiguration in the stitionai/devika repository allows attackers to steal sensitive information such as logs, browser sessions, and settings containing private API keys from other services. This vulnerability also enables attackers to perform actions on behalf of the user, such as deleting projects or sending messages. The issue arises from the lack of proper origin validation, allowing unauthorized cross-origin requests to be executed. The vulnerability is present in all versions of the repository, as no fixed version has been specified."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-5712",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-28T20:15:02.937",
"lastModified": "2024-07-01T12:37:24.220",
"lastModified": "2024-07-12T08:15:11.477",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in stitionai/devika"
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was identified in the stitionai/devika application, affecting the latest version. This vulnerability allows attackers to perform unauthorized actions in the context of a victim's browser, such as deleting projects or changing application settings, without any CSRF protection implemented. Successful exploitation disrupts the integrity and availability of the application and its data."
},
{
"lang": "es",

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-5820",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-27T19:15:16.640",
"lastModified": "2024-06-27T19:25:12.067",
"lastModified": "2024-07-12T08:15:11.560",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization in stitionai/devika"
"value": "An unprotected WebSocket connection in the latest version of stitionai/devika (commit ecee79f) allows a malicious website to connect to the backend and issue commands on behalf of the user. The backend serves all listeners on the given socket, enabling any such malicious website to intercept all communication between the user and the backend. This vulnerability can lead to unauthorized command execution and potential server-side request forgery."
},
{
"lang": "es",
"value": "Autorizaci\u00f3n faltante en stitionai/devika"
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-5821",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-03T18:15:05.857",
"lastModified": "2024-07-05T12:55:51.367",
"lastModified": "2024-07-12T08:15:11.640",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in stitionai/devika"
"value": "The vulnerability allows an attacker to access sensitive files on the server by confusing the agent with incorrect file names. When a user requests the content of a file with a misspelled name, the agent attempts to correct the command and inadvertently reveals the content of the intended file, such as /etc/passwd. This can lead to unauthorized access to sensitive information and potential server compromise."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-5887",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-03T18:15:06.113",
"lastModified": "2024-07-05T12:55:51.367",
"lastModified": "2024-07-12T08:15:11.723",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in stitionai/devika"
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in stitionai/devika due to a loosely set CORS policy. This vulnerability allows an attacker to exploit any API endpoint if the user hosting the server visits an attacker-controlled website. The impact includes the ability to read and write files on the system, create or delete projects, and change settings. However, it does not allow sending messages or commands to the model via WebSocket."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-5926",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-30T01:15:09.707",
"lastModified": "2024-07-01T12:37:24.220",
"lastModified": "2024-07-12T08:15:11.797",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal: '\\..\\filename' in GitHub repository stitionai/devika prior to -."
"value": "A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition."
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6353",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-12T09:15:02.683",
"lastModified": "2024-07-12T09:15:02.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Wallet for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'search[value]' parameter in all versions up to, and including, 1.5.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/woo-wallet/trunk/includes/class-woo-wallet-ajax.php#L393",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3116025/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/woo-wallet/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7d5a077-8836-4c28-8884-5047585a99e5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6396",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-12T00:15:01.647",
"lastModified": "2024-07-12T00:15:01.647",
"lastModified": "2024-07-12T08:15:11.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path Traversal: '\\..\\filename' in aimhubio/aim"
"value": "A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution. "
},
{
"lang": "es",
"value": "Una vulnerabilidad en la funci\u00f3n `_backup_run` en aimhubio/aim versi\u00f3n 3.19.3 permite a atacantes remotos sobrescribir cualquier archivo en el servidor host y filtrar datos arbitrarios. La vulnerabilidad surge debido al manejo inadecuado de los par\u00e1metros `run_hash` y `repo.path`, que pueden manipularse para crear y escribir en rutas de archivos arbitrarias. Esto puede provocar una denegaci\u00f3n de servicio al sobrescribir archivos cr\u00edticos del sistema, p\u00e9rdida de datos privados y posible ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-6433",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-10T01:15:10.370",
"lastModified": "2024-07-11T13:05:54.930",
"lastModified": "2024-07-12T08:15:11.963",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Relative Path Traversal in GitHub repository stitionai/devika prior to -."
"value": "The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter."
},
{
"lang": "es",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-6625",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-12T08:15:12.047",
"lastModified": "2024-07-12T08:15:12.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Total Branding \u2013 Complete branding solution for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
},
{
"lang": "es",
"value": "El complemento WP Total Branding \u2013 Complete branding solution para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 1.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-total-branding/trunk/includes/modules/login.php#L87",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3115880/wp-total-branding/trunk/includes/modules/login.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3115880/wp-total-branding/trunk/includes/options/login.php",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/wp-total-branding/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3b6ac92f-2ad1-4528-b157-5e49d6f224a5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-12T08:00:17.869465+00:00
2024-07-12T10:00:18.938941+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-12T07:15:02.387000+00:00
2024-07-12T09:15:02.683000+00:00
```
### Last Data Feed Release
@ -33,32 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
256740
256742
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `2`
- [CVE-2024-0974](CVE-2024/CVE-2024-09xx/CVE-2024-0974.json) (`2024-07-12T06:15:01.977`)
- [CVE-2024-2430](CVE-2024/CVE-2024-24xx/CVE-2024-2430.json) (`2024-07-12T06:15:03.173`)
- [CVE-2024-2640](CVE-2024/CVE-2024-26xx/CVE-2024-2640.json) (`2024-07-12T06:15:03.433`)
- [CVE-2024-2696](CVE-2024/CVE-2024-26xx/CVE-2024-2696.json) (`2024-07-12T06:15:03.680`)
- [CVE-2024-3112](CVE-2024/CVE-2024-31xx/CVE-2024-3112.json) (`2024-07-12T06:15:03.937`)
- [CVE-2024-4753](CVE-2024/CVE-2024-47xx/CVE-2024-4753.json) (`2024-07-12T06:15:04.190`)
- [CVE-2024-5626](CVE-2024/CVE-2024-56xx/CVE-2024-5626.json) (`2024-07-12T06:15:04.420`)
- [CVE-2024-5811](CVE-2024/CVE-2024-58xx/CVE-2024-5811.json) (`2024-07-12T06:15:04.670`)
- [CVE-2024-6022](CVE-2024/CVE-2024-60xx/CVE-2024-6022.json) (`2024-07-12T06:15:04.893`)
- [CVE-2024-6023](CVE-2024/CVE-2024-60xx/CVE-2024-6023.json) (`2024-07-12T06:15:05.130`)
- [CVE-2024-6024](CVE-2024/CVE-2024-60xx/CVE-2024-6024.json) (`2024-07-12T06:15:05.340`)
- [CVE-2024-6555](CVE-2024/CVE-2024-65xx/CVE-2024-6555.json) (`2024-07-12T06:15:05.560`)
- [CVE-2024-6588](CVE-2024/CVE-2024-65xx/CVE-2024-6588.json) (`2024-07-12T07:15:02.387`)
- [CVE-2024-6353](CVE-2024/CVE-2024-63xx/CVE-2024-6353.json) (`2024-07-12T09:15:02.683`)
- [CVE-2024-6625](CVE-2024/CVE-2024-66xx/CVE-2024-6625.json) (`2024-07-12T08:15:12.047`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `13`
- [CVE-2024-31365](CVE-2024/CVE-2024-313xx/CVE-2024-31365.json) (`2024-07-12T08:15:10.953`)
- [CVE-2024-32085](CVE-2024/CVE-2024-320xx/CVE-2024-32085.json) (`2024-07-12T09:15:02.230`)
- [CVE-2024-5334](CVE-2024/CVE-2024-53xx/CVE-2024-5334.json) (`2024-07-12T08:15:11.130`)
- [CVE-2024-5547](CVE-2024/CVE-2024-55xx/CVE-2024-5547.json) (`2024-07-12T08:15:11.230`)
- [CVE-2024-5548](CVE-2024/CVE-2024-55xx/CVE-2024-5548.json) (`2024-07-12T08:15:11.313`)
- [CVE-2024-5549](CVE-2024/CVE-2024-55xx/CVE-2024-5549.json) (`2024-07-12T08:15:11.390`)
- [CVE-2024-5712](CVE-2024/CVE-2024-57xx/CVE-2024-5712.json) (`2024-07-12T08:15:11.477`)
- [CVE-2024-5820](CVE-2024/CVE-2024-58xx/CVE-2024-5820.json) (`2024-07-12T08:15:11.560`)
- [CVE-2024-5821](CVE-2024/CVE-2024-58xx/CVE-2024-5821.json) (`2024-07-12T08:15:11.640`)
- [CVE-2024-5887](CVE-2024/CVE-2024-58xx/CVE-2024-5887.json) (`2024-07-12T08:15:11.723`)
- [CVE-2024-5926](CVE-2024/CVE-2024-59xx/CVE-2024-5926.json) (`2024-07-12T08:15:11.797`)
- [CVE-2024-6396](CVE-2024/CVE-2024-63xx/CVE-2024-6396.json) (`2024-07-12T08:15:11.883`)
- [CVE-2024-6433](CVE-2024/CVE-2024-64xx/CVE-2024-6433.json) (`2024-07-12T08:15:11.963`)
## Download and Usage

View File

@ -241531,7 +241531,7 @@ CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c39355
CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000
CVE-2024-0972,0,0,2a8d3a85f6223a6c38540c13150a8805bcc289466ff43a37dc35cbb6bde1ee58,2024-06-06T14:17:35.017000
CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000
CVE-2024-0974,1,1,35743e316fbd5bd2047d79c5dd66d90f0f92d67f3c6b8a448670c8ab72da0761,2024-07-12T06:15:01.977000
CVE-2024-0974,0,0,35743e316fbd5bd2047d79c5dd66d90f0f92d67f3c6b8a448670c8ab72da0761,2024-07-12T06:15:01.977000
CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000
CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
@ -245159,7 +245159,7 @@ CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f84
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000
CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000
CVE-2024-2430,1,1,fc140285546718ea235d58e87be2326789dd8854d5c2f3b2bf18d7536424e887,2024-07-12T06:15:03.173000
CVE-2024-2430,0,0,fc140285546718ea235d58e87be2326789dd8854d5c2f3b2bf18d7536424e887,2024-07-12T06:15:03.173000
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
@ -246551,7 +246551,7 @@ CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ec
CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000
CVE-2024-2639,0,0,0a379ca73fbb79fdbd8f18fc8cd7d5818278eb25b07ecfab9db46031f52aaa19,2024-05-17T02:38:22.540000
CVE-2024-2640,1,1,2622fb8ff167d44ed8ee16f4e8f1e686049bb2e924ac61ba7bfed6799057625c,2024-07-12T06:15:03.433000
CVE-2024-2640,0,0,2622fb8ff167d44ed8ee16f4e8f1e686049bb2e924ac61ba7bfed6799057625c,2024-07-12T06:15:03.433000
CVE-2024-2641,0,0,f8817d39db046b0703540421bdc7defa8773388c970d95d9af56a10acaf6505b,2024-05-17T02:38:22.647000
CVE-2024-2642,0,0,8e9139118e526637636dbb75ee7b325451ccf936f521c86702bbdd8ba223ba4d,2024-05-17T02:38:22.743000
CVE-2024-2644,0,0,10576652d4b00db27dae15790aec2d4421a3f554442aef5d73285e025d9ff0d8,2024-06-05T20:15:12.680000
@ -247026,7 +247026,7 @@ CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2
CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000
CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000
CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000
CVE-2024-2696,1,1,7b7f0b87184f2d4d17f2ef9027db945f0b670024e9fd284f14c6faff181b461f,2024-07-12T06:15:03.680000
CVE-2024-2696,0,0,7b7f0b87184f2d4d17f2ef9027db945f0b670024e9fd284f14c6faff181b461f,2024-07-12T06:15:03.680000
CVE-2024-26960,0,0,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000
CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000
CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000
@ -249855,7 +249855,7 @@ CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97
CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000
CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000
CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000
CVE-2024-3112,1,1,c5dd46570e82e042ad28a609d645b3bd6689c18b631599ab974c1831a690774a,2024-07-12T06:15:03.937000
CVE-2024-3112,0,0,c5dd46570e82e042ad28a609d645b3bd6689c18b631599ab974c1831a690774a,2024-07-12T06:15:03.937000
CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000
CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d849,2024-04-01T01:12:59.077000
CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000
@ -250044,7 +250044,7 @@ CVE-2024-31361,0,0,54b7a8e25813717c94d5927287f93d481a46dd500982f29ec2be0642b1f9b
CVE-2024-31362,0,0,07dbc6b7d174a62013a95c6495d145f304872e44cb127cd0a441c5aaa770bb42,2024-04-15T13:15:51.577000
CVE-2024-31363,0,0,84f67f9d25afff088706430a57f4c1645b6f378ea1b4650ec35620c6a3badb06,2024-04-15T13:15:51.577000
CVE-2024-31364,0,0,bf928c6c40c2bd1cc4f1c5de0db847b3c5ba04166008fbe2ac06499669595b46,2024-04-15T13:15:51.577000
CVE-2024-31365,0,0,c940557b1d8090d7c4b40b91442276e3021286d8a5d5418b8ff9252921cde6e4,2024-04-09T12:48:04.090000
CVE-2024-31365,0,1,fac5d7858ae00c4198bda4d0db7d42b586225a93755fdca53b6e65ea3f2d2851,2024-07-12T08:15:10.953000
CVE-2024-31366,0,0,75b2b689edca4c4fe2cdb7df1b8ed82e64c11b89b9b73cbce127601f1ecfacae,2024-04-09T12:48:04.090000
CVE-2024-31367,0,0,81120db09e405ceec023426aa5eb20efd22769d9230dda89ff3bacac48f33f54,2024-04-09T12:48:04.090000
CVE-2024-31368,0,0,2075bbe380281b0997c3990fa2ac90c9c87c399d3ddf4c8c8d5afff7621d8b06,2024-04-09T12:48:04.090000
@ -250480,7 +250480,7 @@ CVE-2024-32081,0,0,5c1d2b416607e839837a003b1073b14df77cdee76eb662d1e3aec29aeff65
CVE-2024-32082,0,0,d6793a42d63a5b66bd996e80396a9a30335e882106f6c04be804aa2a3936f3a5,2024-04-15T13:15:31.997000
CVE-2024-32083,0,0,e66e40e26022a1e0763bc878bbdc8feaffe474b54f57196f3136bd80c107b035,2024-04-11T13:30:38
CVE-2024-32084,0,0,471e7516d00607c85169133c360fc6ced518260327467ed3a794c748685f3d51,2024-04-15T13:15:31.997000
CVE-2024-32085,0,0,9b4c9e2fb6bc96927eeec1394a8719561dbdd50c9f33542ee0c236e3cd61ec82,2024-04-15T13:15:31.997000
CVE-2024-32085,0,1,73c6be311b91a482f29881ac0f952d204dc1a0d26fc4830e619cfbaf0fe226ac,2024-07-12T09:15:02.230000
CVE-2024-32086,0,0,8916745d7b15967ced55d4927ce29b30f197f97b3a39836b39c4ceffcdf58e4d,2024-04-17T12:48:31.863000
CVE-2024-32087,0,0,5b82ea46214428d965f4505ef14a371ca536fde7796b874f715623ff0a1f16c9,2024-04-15T13:15:31.997000
CVE-2024-32088,0,0,d54b0f9aa73f1da84983b35b9f2f514565a119c386370ddf079df19f0dad4167,2024-04-15T13:15:31.997000
@ -255498,7 +255498,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
CVE-2024-4753,1,1,b3ef2309929abf5d543ed5b4df009173219fa7d0e9c13da237f0413ef81c648e,2024-07-12T06:15:04.190000
CVE-2024-4753,0,0,b3ef2309929abf5d543ed5b4df009173219fa7d0e9c13da237f0413ef81c648e,2024-07-12T06:15:04.190000
CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
@ -255954,7 +255954,7 @@ CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c689876
CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000
CVE-2024-5329,0,0,d0611aba519e3b4dd99e1f039e6e2f0eb2cd7ab02594b1f6812432d5e7c027f4,2024-06-11T17:42:26.677000
CVE-2024-5332,0,0,38119dd9a5428b9df2c1e792798f9c7c98836decd72ef41908a87c0a23701c2a,2024-06-26T12:44:29.693000
CVE-2024-5334,0,0,72943680f9bf237867afcd67b3106198c40d9560ff77959e19319ef9068be817,2024-06-27T19:25:12.067000
CVE-2024-5334,0,1,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000
CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000
CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000
@ -256125,9 +256125,9 @@ CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e6190
CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000
CVE-2024-5544,0,0,dc180b504fcb3a2003d6a08111fbd0a7a95f9d21df8e253c1af1716f464343f6,2024-07-05T14:46:56.023000
CVE-2024-5545,0,0,9270f54f7803e859f3c51cd9a03c613d31e2403f79820ead3f02bc3b56a4bf36,2024-07-05T15:12:08.467000
CVE-2024-5547,0,0,10fc933ab96f74e48222460cfee3e0b1d295bbaa26e68f34704c5127d22daf4a,2024-06-27T19:25:12.067000
CVE-2024-5548,0,0,0dab8d0a6f7f4b5d3115df8861f1ab0c0c70d1308be14527ce7ee2ffa61fade4,2024-06-27T19:25:12.067000
CVE-2024-5549,0,0,8a417ee66a71abc76bfae5acb49d7feca85c7d8e54f3f159a82d5e97cedb3814,2024-07-09T18:19:14.047000
CVE-2024-5547,0,1,30803f020db51b7398a94ab478cc6cb1ea70aecfbbe13ac1b895b9f9fa592338,2024-07-12T08:15:11.230000
CVE-2024-5548,0,1,6a07d64078300a9d20971a8757a67f3f4682659414ef6d1de11cb6b5c54c02e2,2024-07-12T08:15:11.313000
CVE-2024-5549,0,1,2db2267d047672e6871a7836da6ae7aa97f316bb2880c93f204c63f2960062f6,2024-07-12T08:15:11.390000
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
CVE-2024-5551,0,0,fe2ff56c261c11c34cfc92fd4dff768d263978728e8caa50b89ded66a68c1f4c,2024-06-17T12:42:04.623000
CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000
@ -256165,7 +256165,7 @@ CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d367
CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144fd,2024-06-10T02:52:08.267000
CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
CVE-2024-5626,1,1,7e133737f43d053f813abe59bccc601d2b37ed3a35e15bd1e9dc8033caf1b17c,2024-07-12T06:15:04.420000
CVE-2024-5626,0,0,7e133737f43d053f813abe59bccc601d2b37ed3a35e15bd1e9dc8033caf1b17c,2024-07-12T06:15:04.420000
CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000
CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000
CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000
@ -256232,7 +256232,7 @@ CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000
CVE-2024-5712,0,1,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000
CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000
CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000
CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000
@ -256291,12 +256291,12 @@ CVE-2024-5802,0,0,d43f6c3699f8442d9285759c2e90cb7a4ef138460339054d721f73295a23e6
CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000
CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000
CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000
CVE-2024-5811,1,1,6841d5b00cca51dfa8f2f54b5ce765a92098964f97404baa5af0c21cdaef38e0,2024-07-12T06:15:04.670000
CVE-2024-5811,0,0,6841d5b00cca51dfa8f2f54b5ce765a92098964f97404baa5af0c21cdaef38e0,2024-07-12T06:15:04.670000
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
CVE-2024-5820,0,0,40e5523c17b003adbda0efbab055fe88c8ffe6387f321010b47ba3ba7dc113ac,2024-06-27T19:25:12.067000
CVE-2024-5821,0,0,ac8597dfd124c68baa20d2ec3fba9ddeb4b2feac6ed4b72f128b801d51b635ec,2024-07-05T12:55:51.367000
CVE-2024-5820,0,1,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000
CVE-2024-5821,0,1,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000
CVE-2024-5822,0,0,56a6bfde1d559870c5646a0b76a29e939be7faac2a950947fe32abc1f4907e47,2024-06-27T19:25:12.067000
CVE-2024-5824,0,0,71b3b99a3563d3bd6941378b1fc516ea3658f7355f6e899285275a2e97c693cb,2024-06-27T19:25:12.067000
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
@ -256339,7 +256339,7 @@ CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b
CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000
CVE-2024-5885,0,0,3a664b64c018213b23c270dac1c0f4e2c55b9d60dc4c41c7b81af3f039474644,2024-06-27T19:25:12.067000
CVE-2024-5886,0,0,0c13c4ee009af0d9946120b2238809bd0a7459b4e90701a2a72b91121b1d711b,2024-06-20T11:15:56.580000
CVE-2024-5887,0,0,d25778d63809ce83c5015ef22b9910bd8e243f7933286be4466b9eb7c41e1b1a,2024-07-05T12:55:51.367000
CVE-2024-5887,0,1,b04b5c7b4b15d64c5cf22488efaad36a00c28f1156ac18ebf5f7780ec4f915ae,2024-07-12T08:15:11.723000
CVE-2024-5889,0,0,ebd4b75d771d00f2396bbc91f1ca197e49e2f67600230e37c6f00ba36324b089,2024-07-01T12:37:24.220000
CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000
CVE-2024-5892,0,0,890747e3858b777381fac245c58cda030faeadae1530ec4012d9670fde261a4e,2024-06-13T18:36:09.013000
@ -256362,7 +256362,7 @@ CVE-2024-5913,0,0,e09fa300f42c3066d0a6d6e758e3f3cfea839eecb0d836963ee331dd9715d6
CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000
CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000
CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000
CVE-2024-5926,0,0,5989118d1e74694dc8d29d11155e46063f80693ec0514642081f5dd4d07f562d,2024-07-01T12:37:24.220000
CVE-2024-5926,0,1,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000
CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000
CVE-2024-5933,0,0,43c62c8c7b78a3986e6c8a8e384c2c83973a07919e7ff71c58e74be82b63ae22,2024-06-27T19:25:12.067000
CVE-2024-5934,0,0,688a30e1a6237b69634d3ab7eb078a5b0fdbb09f93730eb6244fa568165f0ccc,2024-06-14T16:15:14.647000
@ -256417,9 +256417,9 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000
CVE-2024-6022,1,1,04717dc72e4f900d230391c94514f514539e2d6f03457c1e6e01c07b085e71d5,2024-07-12T06:15:04.893000
CVE-2024-6023,1,1,f5555e51bcd69fa72d32d9adab18d78136da09acba35a1ff3db6a47b83f92f36,2024-07-12T06:15:05.130000
CVE-2024-6024,1,1,2ffd72208cdfb4095e9eec145debe41add807f1416cbe1e1b74657cdf6309221,2024-07-12T06:15:05.340000
CVE-2024-6022,0,0,04717dc72e4f900d230391c94514f514539e2d6f03457c1e6e01c07b085e71d5,2024-07-12T06:15:04.893000
CVE-2024-6023,0,0,f5555e51bcd69fa72d32d9adab18d78136da09acba35a1ff3db6a47b83f92f36,2024-07-12T06:15:05.130000
CVE-2024-6024,0,0,2ffd72208cdfb4095e9eec145debe41add807f1416cbe1e1b74657cdf6309221,2024-07-12T06:15:05.340000
CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000
CVE-2024-6026,0,0,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33
CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000
@ -256617,6 +256617,7 @@ CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec1
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
CVE-2024-6353,1,1,60e79ca6935a5dd12c748c7b34b6e74fc753b07368fbd692e1846394a1a48906,2024-07-12T09:15:02.683000
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000
CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000
@ -256639,7 +256640,7 @@ CVE-2024-6387,0,0,395c005beff8f885469a6af0c5f20c1084f41c03d3787849b420e64606fd49
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000
CVE-2024-6392,0,0,ec793e6c9b92035de93057d702bc41bb77320cffcbb7442912aa4b55a0ccd130,2024-07-11T22:15:02.820000
CVE-2024-6396,0,0,674c607bebda9722a2774953690d6eda0ed7e5c526dfeff4113246dca8f86bf7,2024-07-12T00:15:01.647000
CVE-2024-6396,0,1,65f0bbdb6c33407d9f43c98786e1afc26272e7ff25488d98ea8db8c2bfb7091c,2024-07-12T08:15:11.883000
CVE-2024-6397,0,0,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
@ -256661,7 +256662,7 @@ CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc8
CVE-2024-6426,0,0,f8400a1dd26a0192767404ca5f7752c12cf287ce03e2990002fc305f7bc08efa,2024-07-05T17:10:26.683000
CVE-2024-6427,0,0,4e3c2a8d1e984293b7a508d6724a6a3f7998f367f7900ab80f87cf0d36ad12b5,2024-07-05T17:10:44.997000
CVE-2024-6428,0,0,8095b4dcd35f897b4650661c439e7e332797ada1bd3807e53dae0badb2379a85,2024-07-05T17:08:11.060000
CVE-2024-6433,0,0,d602ab3dc41aef42850f40bee564814e8e233db523dba7834f636c439b366593,2024-07-11T13:05:54.930000
CVE-2024-6433,0,1,4cb445c95e15de0c345d2cc06e9508b276183ca5d50834d0b48eec3d0df1757b,2024-07-12T08:15:11.963000
CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
@ -256696,12 +256697,12 @@ CVE-2024-6531,0,0,ab53755983129ee35c1ebf76acedd24cf0a7993ae85dcf721db49ee0a8f8cc
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000
CVE-2024-6555,1,1,34e77b0d71ab261578ec7e224b96bc260ce4cb3066ee4d5d28345bbbf1a1a387,2024-07-12T06:15:05.560000
CVE-2024-6555,0,0,34e77b0d71ab261578ec7e224b96bc260ce4cb3066ee4d5d28345bbbf1a1a387,2024-07-12T06:15:05.560000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
CVE-2024-6588,1,1,ca4afaea17787f5483b2819c0c113b78343a4ecedd1dcf411a61a2d3febe92bf,2024-07-12T07:15:02.387000
CVE-2024-6588,0,0,ca4afaea17787f5483b2819c0c113b78343a4ecedd1dcf411a61a2d3febe92bf,2024-07-12T07:15:02.387000
CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000
CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000
CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000
@ -256720,6 +256721,7 @@ CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c
CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000
CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000
CVE-2024-6624,0,0,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000
CVE-2024-6625,1,1,52a0a73f111a61d26ef30a94bc2c3ceb26f9452f1d383413724e2976a1ad908d,2024-07-12T08:15:12.047000
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000
CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000

Can't render this file because it is too large.