Auto-Update: 2024-06-15T10:00:18.829063+00:00

This commit is contained in:
cad-safe-bot 2024-06-15 10:03:12 +00:00
parent 36ecc3638f
commit ba2006f786
9 changed files with 335 additions and 9 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51765",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-24T06:15:07.527",
"lastModified": "2024-01-18T03:15:58.803",
"lastModified": "2024-06-15T09:15:11.253",
"vulnStatus": "Modified",
"descriptions": [
{
@ -191,6 +191,10 @@
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html",
"source": "cve@mitre.org"
},
{
"url": "https://lwn.net/Articles/956533/",
"source": "cve@mitre.org"

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2695",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T09:15:11.647",
"lastModified": "2024-06-15T09:15:11.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Shariff Wrapper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shariff' shortcode in all versions up to, and including, 4.6.13 due to insufficient input sanitization and output escaping on user supplied attributes such as 'borderradius' and 'timestamp'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3069111%40shariff%2Ftrunk&old=3061040%40shariff%2Ftrunk&sfp_email=&sfph_mail=#file1",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9baa8bbf-a318-4bc5-8bfd-2bd64536965e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-3105",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T09:15:11.947",
"lastModified": "2024-06-15T09:15:11.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Woody code snippets \u2013 Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the 'insert_php' shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/insert-php/trunk/includes/class.plugin.php#L166",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/insert-php/trunk/includes/shortcodes/shortcode-insert-php.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3102522%40insert-php&new=3102522%40insert-php&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/134ad095-b0a0-4f0f-832d-3e558d4a250a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-4095",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T09:15:12.157",
"lastModified": "2024-06-15T09:15:12.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Collapse-O-Matic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'expand' and 'expandsub' shortcode in all versions up to, and including, 1.8.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://github.com/baden03/collapse-o-matic/blob/561d8ab53a03e44c12234ba9687226fdbb5054cc/collapse-o-matic.php#L343",
"source": "security@wordfence.com"
},
{
"url": "https://pluginoven.com/plugins/collapse-o-matic/documentation/shortcode/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3094116%40jquery-collapse-o-matic&new=3094116%40jquery-collapse-o-matic&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/jquery-collapse-o-matic/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c56931-c2af-4940-95e4-3f3dae51c31c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4258",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T09:15:12.370",
"lastModified": "2024-06-15T09:15:12.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Video Gallery \u2013 YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the settings parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/yotuwp-easy-youtube-embed/trunk/yotuwp.php#L731",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6feae1c4-3735-4a33-85a5-867d458d2e8a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4551",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T09:15:12.587",
"lastModified": "2024-06-15T09:15:12.587",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Video Gallery \u2013 YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the display function. This makes it possible for authenticated attackers, with contributor access and higher, to include and execute arbitrary php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/yotuwp-easy-youtube-embed/trunk/inc/views.php#L828",
"source": "security@wordfence.com"
},
{
"url": "https://swisskyrepo.github.io/PayloadsAllTheThings/File%20Inclusion/#lfi-to-rce-via-php-pearcmd",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4c7c932-5955-4fce-a64d-3b5c5de95356?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5858",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T09:15:12.800",
"lastModified": "2024-06-15T09:15:12.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The AI Infographic Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the qcld_openai_title_generate_desc AJAX action in all versions up to, and including, 4.7.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary post titles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/infographic-and-list-builder-ilist/trunk/qc-project-ilist-ajax.php?rev=3102295#L447",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3102754/infographic-and-list-builder-ilist/trunk/qc-project-ilist-ajax.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c8f1c29-b99d-4af0-9cc4-5d6179529ab4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-15T08:00:18.882015+00:00
2024-06-15T10:00:18.829063+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-15T06:15:50.250000+00:00
2024-06-15T09:15:12.800000+00:00
```
### Last Data Feed Release
@ -33,20 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254201
254207
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-1399](CVE-2024/CVE-2024-13xx/CVE-2024-1399.json) (`2024-06-15T06:15:50.250`)
- [CVE-2024-2695](CVE-2024/CVE-2024-26xx/CVE-2024-2695.json) (`2024-06-15T09:15:11.647`)
- [CVE-2024-3105](CVE-2024/CVE-2024-31xx/CVE-2024-3105.json) (`2024-06-15T09:15:11.947`)
- [CVE-2024-4095](CVE-2024/CVE-2024-40xx/CVE-2024-4095.json) (`2024-06-15T09:15:12.157`)
- [CVE-2024-4258](CVE-2024/CVE-2024-42xx/CVE-2024-4258.json) (`2024-06-15T09:15:12.370`)
- [CVE-2024-4551](CVE-2024/CVE-2024-45xx/CVE-2024-4551.json) (`2024-06-15T09:15:12.587`)
- [CVE-2024-5858](CVE-2024/CVE-2024-58xx/CVE-2024-5858.json) (`2024-06-15T09:15:12.800`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2023-51765](CVE-2023/CVE-2023-517xx/CVE-2023-51765.json) (`2024-06-15T09:15:11.253`)
## Download and Usage

View File

@ -237702,7 +237702,7 @@ CVE-2023-5176,0,0,41a10616e2d1e38a4714ebb906b08bfb8038674e3e8b87653892c112373d91
CVE-2023-51761,0,0,2aa92ae104f7700c66c2085ff95a120e2d25164c6898365ae94d52787688e3ed,2024-02-15T07:24:09.660000
CVE-2023-51763,0,0,411059c24ccc428e8e316ad552a703fb8d4809a15433a2a396c980a4c070121a,2024-01-03T20:54:40.243000
CVE-2023-51764,0,0,ccfd0fe548304dc1bdd4334a1be475fff97c1444d5983c946459f00569868322,2024-06-10T18:15:23.843000
CVE-2023-51765,0,0,0ad507226a94680c4a4102b809de1ff857b7f5cbeca7eff453cc8ef3afb65f82,2024-01-18T03:15:58.803000
CVE-2023-51765,0,1,6cfe07e92c59a4aa0fece7d0d6948d97a4c1e72a594f59f200af9ff375c8023d,2024-06-15T09:15:11.253000
CVE-2023-51766,0,0,16469d5f48d99ebac02fdaad6581c14147d144cff0c3003d6309f5ca8aedce75,2024-02-02T02:22:45.693000
CVE-2023-51767,0,0,f2245b1f8f091b95600466858b5ac599818ac7697f749d28ee2403dac3b1d230,2024-02-27T15:51:55.813000
CVE-2023-5177,0,0,5de452c1d750ac7b461d44afff355a27633306a56022b0025ba73557f63026fa,2023-11-07T04:23:35.013000
@ -241588,7 +241588,7 @@ CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da9
CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
CVE-2024-1398,0,0,2b28153468f4d42956e25c3f4649f2a8573b6a6d707501b23def6a1cde88644b,2024-03-04T13:58:23.447000
CVE-2024-1399,1,1,4f22f8fbdf6bd2ee9ac50225afd324c2f5cc4f8ba0377a15f0f74710e6d70d94,2024-06-15T06:15:50.250000
CVE-2024-1399,0,0,4f22f8fbdf6bd2ee9ac50225afd324c2f5cc4f8ba0377a15f0f74710e6d70d94,2024-06-15T06:15:50.250000
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
CVE-2024-1401,0,0,e64fccc3b34820f20d6e2d11354067ac2e7b2a8c6994cb9d811033354d258916,2024-03-19T16:33:58.680000
CVE-2024-1402,0,0,cd29a338f0790d41ac5c4acb03e9968df65943eeb751c1867df07c9625b41a9a,2024-05-30T12:15:10.573000
@ -246471,6 +246471,7 @@ CVE-2024-26946,0,0,03955d0f2bc318bb8984ca0ab6d4535e3edab8a455147eb89f589c2cd541c
CVE-2024-26947,0,0,9675f42687fbcf2f6cc20529b1558a892788f21cf57028b5f39f7df35aa2717e,2024-05-13T08:15:10.313000
CVE-2024-26948,0,0,504fd54b8014ad5c80880b8f7264990235361232cb4d396abc33d35f86643df1,2024-05-01T13:02:20.750000
CVE-2024-26949,0,0,98298e6aa8285a2887507ae75a22585976bb1c7094fc806d2d56455f999b3f8c,2024-05-23T19:13:56.890000
CVE-2024-2695,1,1,3d40266534e854325d11ea9477ecb1ecdaa911aba2114c56117b8a7fd31473cd,2024-06-15T09:15:11.647000
CVE-2024-26950,0,0,8a29b231f495865acff77b1b51be2dd640990aa84617667fdf843369759a9352,2024-05-01T13:02:20.750000
CVE-2024-26951,0,0,66c5bd7c9276a41301f8c77e377af720392726a767d5d35afa945139b0225875,2024-05-01T13:02:20.750000
CVE-2024-26952,0,0,0c7c82bf8d86d0ae89c3b2237d651698f1432d7566849359fbaaee4955185c25,2024-05-25T15:15:08.950000
@ -249152,6 +249153,7 @@ CVE-2024-3104,0,0,927f515490606efe20907a2973fd062d79840e7c07fa0e36064aa10b549f02
CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000
CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000
CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
CVE-2024-3105,1,1,b5b1d29ae31f1b32c55b2a17aac30810c7fa0cd589d92ac85e4faef7c4a1f89a,2024-06-15T09:15:11.947000
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000
CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000
@ -253027,6 +253029,7 @@ CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2
CVE-2024-4088,0,0,c8ca3e8553223ece7fd626b7957017d2d8aae2ed445db80654c73542bf17135f,2024-06-11T17:11:30.193000
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
CVE-2024-4095,1,1,ce7c95c8fee926f643ff25d5d4ccb7afd500046b04ab8c3ee9a3c48d692a091a,2024-06-15T09:15:12.157000
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000
CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000
@ -253151,6 +253154,7 @@ CVE-2024-4254,0,0,df99a7c83db73816046cbfd399e65ee0bc8081472e8e18e418b8378e8e3e70
CVE-2024-4255,0,0,882b6221070b0a87fb0756a8ed6ee3f57e5a5a6b1ff325686bf9e9d9211a03e2,2024-06-04T19:20:34.420000
CVE-2024-4256,0,0,ec3207c3d1182aae8f4db146840d13fb2f5a57f80c40368ce8bbf75a867782d1,2024-06-04T19:20:34.517000
CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000
CVE-2024-4258,1,1,c4bac87f8a147c4f846520c232bac34248d594d1d288c8956619b434a29b8c6e,2024-06-15T09:15:12.370000
CVE-2024-4261,0,0,a2fc5879e63bca2878492a071054b67c3d335f2a629e8b127c409b1fb046c8c2,2024-05-22T14:30:41.953000
CVE-2024-4262,0,0,5dd4ebbaf190f9915875ef48f9c729e5248c1328b2e326ae4c2d79cba9dffd24,2024-05-22T12:46:53.887000
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
@ -253382,6 +253386,7 @@ CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32
CVE-2024-4547,0,0,6b600f363e41b63ee43a4b2365298fb38de96fd61b910d0724ca38ee29a8a8df,2024-05-06T16:00:59.253000
CVE-2024-4548,0,0,255fb62729cbf70b5d240d036752cc7d31677deac2357745733c1172bc76cfe7,2024-05-06T16:00:59.253000
CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ace3,2024-05-06T21:15:48.783000
CVE-2024-4551,1,1,0d85a5a237ee76e44542d2eaaf1ea11ec1af199640b09984456ba4636667d9f7,2024-06-15T09:15:12.587000
CVE-2024-4552,0,0,e23892055f41d68c57f1d172e5ea3d0a2ee46019e9d286872c115b7aad205614,2024-06-04T16:57:41.053000
CVE-2024-4553,0,0,8b88b932112e5db46be28f06635e2ec7d2585d5bcb10d64401d792f4b888b1c3,2024-05-21T12:37:59.687000
CVE-2024-4558,0,0,fcb727202a9f43a9bf70ed6e025c63a0fd8208e4c1e99d83d4aee5cebbd5fae2,2024-06-10T18:15:36.760000
@ -254164,6 +254169,7 @@ CVE-2024-5845,0,0,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e145
CVE-2024-5846,0,0,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000
CVE-2024-5847,0,0,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000
CVE-2024-5851,0,0,1ff86bf427427298fe5dc39bbfedb897b9870fd2315cf065507e70165fb41d41,2024-06-13T18:36:09.013000
CVE-2024-5858,1,1,26d11b648547d12d80fdcd8b96e67df5230a377e0b703e0dad0e15183b31e8a4,2024-06-15T09:15:12.800000
CVE-2024-5868,0,0,6d356b935ad03f0aa043c8eb32fb37ec0c1335aafc54b4d7c42c1bf12208ae21,2024-06-15T04:15:13.373000
CVE-2024-5871,0,0,017dd106963a452a793863ea96c2a11162e709ce38935078eb44fe3dd29b4249,2024-06-15T04:15:13.693000
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000

Can't render this file because it is too large.