Auto-Update: 2024-08-06T08:00:17.745460+00:00

This commit is contained in:
cad-safe-bot 2024-08-06 08:03:13 +00:00
parent 2bc39b9fea
commit d9f1ad457a
18 changed files with 652 additions and 54 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-2877",
"sourceIdentifier": "cret@cert.org",
"published": "2017-03-03T11:59:00.147",
"lastModified": "2024-05-17T01:04:04.807",
"lastModified": "2024-08-06T06:15:20.940",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-5215",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-02-17T19:15:11.617",
"lastModified": "2024-05-17T01:05:03.100",
"lastModified": "2024-08-06T07:15:35.900",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-5377",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-06T20:29:00.390",
"lastModified": "2024-05-17T01:05:07.697",
"lastModified": "2024-08-06T07:15:38.600",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-41995",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-06T07:15:46.330",
"lastModified": "2024-08-06T07:15:46.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor."
}
],
"metrics": {},
"references": [
{
"url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN78728294/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000010",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-5708",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-06T06:15:34.460",
"lastModified": "2024-08-06T06:15:34.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPBakery Visual Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link\u2019 parameter in all versions up to, and including, 7.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, and with post permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpbakery.com/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23ff12f0-eb9d-4bb3-8db0-0e794c0f0594?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-5709",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-06T06:15:34.793",
"lastModified": "2024-08-06T06:15:34.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPBakery Visual Composer plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.7 via the 'layout_name' parameter. This makes it possible for authenticated attackers, with Author-level access and above, and with post permissions granted by an Administrator, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://wpbakery.com/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fad30c8-fd8a-4cf2-a3aa-16a374231b87?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-6080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T23:15:51.583",
"lastModified": "2024-06-20T20:15:20.583",
"lastModified": "2024-08-06T07:15:46.460",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks."
"value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code of the component incontrolWebcam Service. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks."
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6200",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.030",
"lastModified": "2024-08-06T06:15:35.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HaloITSM versions up to 2.146.1 are affected by a Stored Cross-Site Scripting (XSS) vulnerability. The injected JavaScript code can execute arbitrary action on behalf of the user accessing a ticket. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2152",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-6201",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.283",
"lastModified": "2024-08-06T06:15:35.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HaloITSM versions up to 2.146.1 are affected by a Template Injection vulnerability within the engine used to generate emails. This can lead to the leakage of potentially sensitive information. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2153",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6202",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.487",
"lastModified": "2024-08-06T06:15:35.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2154",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6203",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-08-06T06:15:35.727",
"lastModified": "2024-08-06T06:15:35.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://haloitsm.com/guides/article/?kbid=2155",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-6651",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:35.973",
"lastModified": "2024-08-06T06:15:35.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-6766",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:36.047",
"lastModified": "2024-08-06T06:15:36.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The shortcodes-ultimate-pro WordPress plugin before 7.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-7055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-06T06:15:36.107",
"lastModified": "2024-08-06T06:15:36.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://ffmpeg.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://ffmpeg.org/download.html",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.273651",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.273651",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.376532",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-7082",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:36.420",
"lastModified": "2024-08-06T06:15:36.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy Table of Contents WordPress plugin before 2.0.68 does not sanitise and escape some parameters, which could allow users with a role as low as Editor to perform Cross-Site Scripting attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/8f30e685-00fa-4dbb-b516-2d14e4b13697/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-7084",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-06T06:15:36.480",
"lastModified": "2024-08-06T06:15:36.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ajax Search Lite WordPress plugin before 4.12.1 does not sanitise and escape some parameters, which could allow users with a role as low as Admin+ to perform Cross-Site Scripting attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-06T06:00:18.204283+00:00
2024-08-06T08:00:17.745460+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-06T05:15:41.413000+00:00
2024-08-06T07:15:46.460000+00:00
```
### Last Data Feed Release
@ -33,39 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
259047
259059
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `12`
- [CVE-2024-28962](CVE-2024/CVE-2024-289xx/CVE-2024-28962.json) (`2024-08-06T04:16:45.810`)
- [CVE-2024-39817](CVE-2024/CVE-2024-398xx/CVE-2024-39817.json) (`2024-08-06T05:15:41.087`)
- [CVE-2024-6781](CVE-2024/CVE-2024-67xx/CVE-2024-6781.json) (`2024-08-06T04:16:46.233`)
- [CVE-2024-6782](CVE-2024/CVE-2024-67xx/CVE-2024-6782.json) (`2024-08-06T04:16:46.450`)
- [CVE-2024-6886](CVE-2024/CVE-2024-68xx/CVE-2024-6886.json) (`2024-08-06T04:16:46.653`)
- [CVE-2024-7008](CVE-2024/CVE-2024-70xx/CVE-2024-7008.json) (`2024-08-06T04:16:46.807`)
- [CVE-2024-7009](CVE-2024/CVE-2024-70xx/CVE-2024-7009.json) (`2024-08-06T04:16:47.040`)
- [CVE-2024-7500](CVE-2024/CVE-2024-75xx/CVE-2024-7500.json) (`2024-08-06T04:16:47.290`)
- [CVE-2024-7505](CVE-2024/CVE-2024-75xx/CVE-2024-7505.json) (`2024-08-06T04:16:47.857`)
- [CVE-2024-7506](CVE-2024/CVE-2024-75xx/CVE-2024-7506.json) (`2024-08-06T05:15:41.413`)
- [CVE-2024-41995](CVE-2024/CVE-2024-419xx/CVE-2024-41995.json) (`2024-08-06T07:15:46.330`)
- [CVE-2024-5708](CVE-2024/CVE-2024-57xx/CVE-2024-5708.json) (`2024-08-06T06:15:34.460`)
- [CVE-2024-5709](CVE-2024/CVE-2024-57xx/CVE-2024-5709.json) (`2024-08-06T06:15:34.793`)
- [CVE-2024-6200](CVE-2024/CVE-2024-62xx/CVE-2024-6200.json) (`2024-08-06T06:15:35.030`)
- [CVE-2024-6201](CVE-2024/CVE-2024-62xx/CVE-2024-6201.json) (`2024-08-06T06:15:35.283`)
- [CVE-2024-6202](CVE-2024/CVE-2024-62xx/CVE-2024-6202.json) (`2024-08-06T06:15:35.487`)
- [CVE-2024-6203](CVE-2024/CVE-2024-62xx/CVE-2024-6203.json) (`2024-08-06T06:15:35.727`)
- [CVE-2024-6651](CVE-2024/CVE-2024-66xx/CVE-2024-6651.json) (`2024-08-06T06:15:35.973`)
- [CVE-2024-6766](CVE-2024/CVE-2024-67xx/CVE-2024-6766.json) (`2024-08-06T06:15:36.047`)
- [CVE-2024-7055](CVE-2024/CVE-2024-70xx/CVE-2024-7055.json) (`2024-08-06T06:15:36.107`)
- [CVE-2024-7082](CVE-2024/CVE-2024-70xx/CVE-2024-7082.json) (`2024-08-06T06:15:36.420`)
- [CVE-2024-7084](CVE-2024/CVE-2024-70xx/CVE-2024-7084.json) (`2024-08-06T06:15:36.480`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `4`
- [CVE-2015-1571](CVE-2015/CVE-2015-15xx/CVE-2015-1571.json) (`2024-08-06T05:15:34.607`)
- [CVE-2016-10723](CVE-2016/CVE-2016-107xx/CVE-2016-10723.json) (`2024-08-06T04:16:08.187`)
- [CVE-2016-15010](CVE-2016/CVE-2016-150xx/CVE-2016-15010.json) (`2024-08-06T04:16:36.300`)
- [CVE-2016-15012](CVE-2016/CVE-2016-150xx/CVE-2016-15012.json) (`2024-08-06T04:16:36.597`)
- [CVE-2016-15032](CVE-2016/CVE-2016-150xx/CVE-2016-15032.json) (`2024-08-06T04:16:42.217`)
- [CVE-2016-15036](CVE-2016/CVE-2016-150xx/CVE-2016-15036.json) (`2024-08-06T04:16:42.603`)
- [CVE-2016-20009](CVE-2016/CVE-2016-200xx/CVE-2016-20009.json) (`2024-08-06T04:16:42.910`)
- [CVE-2016-20012](CVE-2016/CVE-2016-200xx/CVE-2016-20012.json) (`2024-08-06T04:16:44.247`)
- [CVE-2016-20022](CVE-2016/CVE-2016-200xx/CVE-2016-20022.json) (`2024-08-06T04:16:45.573`)
- [CVE-2024-5913](CVE-2024/CVE-2024-59xx/CVE-2024-5913.json) (`2024-08-06T05:15:41.160`)
- [CVE-2015-2877](CVE-2015/CVE-2015-28xx/CVE-2015-2877.json) (`2024-08-06T06:15:20.940`)
- [CVE-2015-5215](CVE-2015/CVE-2015-52xx/CVE-2015-5215.json) (`2024-08-06T07:15:35.900`)
- [CVE-2015-5377](CVE-2015/CVE-2015-53xx/CVE-2015-5377.json) (`2024-08-06T07:15:38.600`)
- [CVE-2024-6080](CVE-2024/CVE-2024-60xx/CVE-2024-6080.json) (`2024-08-06T07:15:46.460`)
## Download and Usage

View File

@ -75059,7 +75059,7 @@ CVE-2015-1567,0,0,3812bc0008e55f82d642c3335eff5281d997c44ba471397e3a6b596d9d25e7
CVE-2015-1568,0,0,8641bba09c3453ce906e1dbfc6e7324b84b229456ae9c68ec0ecc41b0511e912,2017-09-08T01:29:49.967000
CVE-2015-1569,0,0,830e1ec3d441f165a51e3e0ebbb01dc764d1e053f4f4de22706450f51bed4204,2015-02-11T19:44:15.410000
CVE-2015-1570,0,0,b41ad3f65de40d3a32ac3bf79b3c7448f06e02013e5a4326bd0244ba86c64f29,2015-02-11T19:35:06.533000
CVE-2015-1571,0,1,ba2bba8f637d23e11e5ca2d50b4afa95f3e934da85c7436aa4835a3867561616,2024-08-06T05:15:34.607000
CVE-2015-1571,0,0,ba2bba8f637d23e11e5ca2d50b4afa95f3e934da85c7436aa4835a3867561616,2024-08-06T05:15:34.607000
CVE-2015-1572,0,0,1f0839985237b84ec491126b2e4d437166caac53a36995be257e5aa6fcf47e92,2017-11-08T02:29:01.083000
CVE-2015-1573,0,0,a1000ed07e280d6df41ea321fc6bdf162357ee3aef3443063ac3b58863ef1395,2018-01-05T02:30:00.210000
CVE-2015-1574,0,0,b4960073e8d76b50950e4ce4c14fb5d916095585516e1debd82821105d8181ab,2018-10-09T19:55:57.700000
@ -76279,7 +76279,7 @@ CVE-2015-2873,0,0,1a94bdd0065b2813d44717b42274e08a456f3b5df0d6b2aaa952fadf5cbdbc
CVE-2015-2874,0,0,42354052f4fcf436dcf2eaf6f4efd1e9ca3ad6253981cce5cbfce05ef7e07095,2015-12-31T20:29:26.130000
CVE-2015-2875,0,0,23db3aeafe3a4b8066501597ba30cc7bbf48569daef71906c6d463d586714da4,2015-12-31T20:29:55.210000
CVE-2015-2876,0,0,69a7e8fd6d4fb246c4553ffbaec340d3f32dac667cdbbd760c98190d0566f08f,2015-12-31T15:46:12.273000
CVE-2015-2877,0,0,61c2f5c47f1cf0756022b4f38d9f734fe77e092c4c7801cd68f5893c3b8d009a,2024-05-17T01:04:04.807000
CVE-2015-2877,0,1,3dfccbedc121c6d6c9013f6dd58d8d2cd616aba8d359e26261b614602dd75f62,2024-08-06T06:15:20.940000
CVE-2015-2878,0,0,8b19e85cb36974868fb94fe73875d326f354ca2e0d206e7ed7f0dcde63ebe6be,2018-10-09T19:56:33.233000
CVE-2015-2880,0,0,1112bdb9471bfa16e3ab2d335c1aa7101d42aaed2ae8c33544cb6dfee239f399,2017-04-14T14:16:03.440000
CVE-2015-2881,0,0,cce58edf5352812cb4f04c432a716a23322ac3dba2ba10214e1531490830dbcb,2017-04-13T17:06:29.830000
@ -78182,7 +78182,7 @@ CVE-2015-5211,0,0,efa1c4747795898741c788bad9877029a1da448558714e12aca36beefeeaec
CVE-2015-5212,0,0,9f85f0ae84ab3f6167d7cb15ba0e4080aaa671b29713ce762ee9c537d1a3b058,2022-02-07T16:29:45.487000
CVE-2015-5213,0,0,081c37e5b8eb9fc8bd4b4e662d214bf9146c0f8603bb295bdaab2f7f02c9b449,2017-07-01T01:29:18.953000
CVE-2015-5214,0,0,2a89e3e6aa3f9a6edc20d558e40337f83bc73b5c299c98e300655a7175a04f52,2017-07-01T01:29:19
CVE-2015-5215,0,0,e9fa07d358be6b56a6c9abb877ee060cc6a7b236234434192d32668b7ee30f01,2024-05-17T01:05:03.100000
CVE-2015-5215,0,1,73d619c961a1dc2ba38557491adf07266982fb16e66300dd662182013b35e240,2024-08-06T07:15:35.900000
CVE-2015-5216,0,0,4a0a8e18219be8f671bbe44cd67ede07c8e242eea47f5f9d9d1fc0fd8b0910d9,2020-02-21T14:20:20.890000
CVE-2015-5217,0,0,62ad00b3b957e0019268e10ca6db85f0985a15a00b9a9f3da594fe8239978bce,2015-11-18T17:31:06.303000
CVE-2015-5218,0,0,d9beae0f3c1168718cef3dd7dd70f32c14fc1271491dba2b42a0f040277069e7,2018-10-30T16:27:37.467000
@ -78343,7 +78343,7 @@ CVE-2015-5372,0,0,6c66ea37c52ac9eb008b34ab547d1e637201a60dca51e99b11d2017bee307e
CVE-2015-5374,0,0,d2c7142916da610c33f6841ea7d4b2dd439a1325011c2240e7930f0f5560bc7d,2018-03-23T01:29:00.273000
CVE-2015-5375,0,0,7f3622c1db2fed50141b4fcca3607d38e93066808f77cab2160e424cad937442,2018-10-09T19:57:32.533000
CVE-2015-5376,0,0,731eb96b0d696aaaf8b9e4bcc4168626f543ddb70b4644f80823ee6d89fe6e5a,2017-11-06T18:26:58.213000
CVE-2015-5377,0,0,92abb9fbfa5b2af829d74388d4f83dc97f1020554f968f0210778f12770ce222,2024-05-17T01:05:07.697000
CVE-2015-5377,0,1,42c3ae0d6da3505240ac7b31556321f75bb89544d2f729e5ab97b07f3575005c,2024-08-06T07:15:38.600000
CVE-2015-5378,0,0,d37ede363faa4bcee882677731294746d8baf5a04b8bb489b08d9eafc2c4d58c,2019-06-17T15:48:25.623000
CVE-2015-5379,0,0,bb31d5bbd2bbe74c5e92335d523cea8bcadf32ad132f0b4c97ed3ef96bd63663,2018-10-09T19:57:33.440000
CVE-2015-5380,0,0,3a39cc5adecb255cdf999b8a986533148854574d22d334b7ca1f02da69cc9cda,2023-11-07T02:26:10.480000
@ -84082,7 +84082,7 @@ CVE-2016-10719,0,0,96cbc798bf3d74970371236c9766e10b1eec7566d1630f5b1b4dbc66b4fd9
CVE-2016-1072,0,0,2a77d6919272ce7d84ae7d01b455ee8a8ed18f75155f4c363f27ffd4369129e5,2016-12-01T03:04:22.483000
CVE-2016-10721,0,0,4d18c30fecc80547a0b0ed385047b3ab19f8de5fc19574c6876eacfa15c0b72b,2018-06-06T14:46:37.967000
CVE-2016-10722,0,0,a0f33765e0898b5ea17d1391dcb495029c7423f2234691d263c0e5dddfe68a96,2019-10-04T16:24:35.217000
CVE-2016-10723,0,1,56f85888775f3b073168883d269b467a736e09f43b6b5f8a91d629824a8d5e89,2024-08-06T04:16:08.187000
CVE-2016-10723,0,0,56f85888775f3b073168883d269b467a736e09f43b6b5f8a91d629824a8d5e89,2024-08-06T04:16:08.187000
CVE-2016-10724,0,0,c59fd9612eab48d18de186d280641edda6c70c98ef0290a3f8ea11aa8df857ee,2020-03-18T17:07:13.900000
CVE-2016-10725,0,0,7bbff4806baa022989daf5a26a36a21ccbb160f0236e10a7ed6aac513d75096e,2020-03-18T17:07:13.900000
CVE-2016-10726,0,0,e30892c41f0377f0a4eccbbbce18dca68e93db761c42630b4d6db6be3a23b233,2018-09-06T14:59:25.770000
@ -84871,9 +84871,9 @@ CVE-2016-15007,0,0,4c189a3e166b006ef1569b01012745a897cb0a75c0ca592e0da961071258e
CVE-2016-15008,0,0,80f9ada6d4d31a4d1b35f0d5337f5d21612798ce0c1c46530e194838ce5c90b4,2024-05-17T01:08:08.383000
CVE-2016-15009,0,0,9e8cde43361dbf69cc2f6f31a56757c1ec2d9e9381ef4493fb99824448f15396,2024-05-17T01:08:08.490000
CVE-2016-1501,0,0,21850ce3794d7f546999625f5c122ce21d724e89452e966294b282ba2ade5568,2016-01-12T02:48:42.430000
CVE-2016-15010,0,1,28def0043f6524f4c17ad97dc9fce720354d46a8e72f7b834741d24b7aab0e19,2024-08-06T04:16:36.300000
CVE-2016-15010,0,0,28def0043f6524f4c17ad97dc9fce720354d46a8e72f7b834741d24b7aab0e19,2024-08-06T04:16:36.300000
CVE-2016-15011,0,0,f654bebb9d97dcc5588ba448ac17b3694b38790add2bc977e13adcdb37407b23,2024-05-17T01:08:08.707000
CVE-2016-15012,0,1,3b80eca28df73037f1f771755df06cdbc1035ddac59e8895ae64e952e7b70451,2024-08-06T04:16:36.597000
CVE-2016-15012,0,0,3b80eca28df73037f1f771755df06cdbc1035ddac59e8895ae64e952e7b70451,2024-08-06T04:16:36.597000
CVE-2016-15013,0,0,889b56edef187d74aa8f1cc8ebcb1872dfc4b803bcf5ef76673730c368a1407d,2024-05-17T01:08:08.947000
CVE-2016-15014,0,0,6c85097b1459c0b947fffc2f39ffc26627ca1d1769f2b187b2b38a7b3e376983,2024-05-17T01:08:09.060000
CVE-2016-15015,0,0,aef76c3aba9766474cbee5c8719d4e3209641299e5417bd6263a030396442578,2024-05-17T01:08:09.173000
@ -84895,11 +84895,11 @@ CVE-2016-15029,0,0,8066c98eb3904ffb71e819cde1a6b55c955363d52666b798b6283bdc56cfa
CVE-2016-1503,0,0,9d60dad2353a367162d8e5352ec76ab8f9b8d4d3de5f5972c6bbfde347827ba1,2017-09-10T01:29:11.637000
CVE-2016-15030,0,0,a4d03da27ba9509dc3b294b688cf2cd7069800f2f90fade8bd82c8d4edaff4ee,2024-05-17T01:08:10.883000
CVE-2016-15031,0,0,5400ab5257783e5a9c05b3d5373f4bd5a20d1115b18378b451ae210242c96821,2024-05-17T01:08:11
CVE-2016-15032,0,1,265f50c2d412062796cf589d64bab4247d0dd96cfc7933922bf35bfe7daf27a3,2024-08-06T04:16:42.217000
CVE-2016-15032,0,0,265f50c2d412062796cf589d64bab4247d0dd96cfc7933922bf35bfe7daf27a3,2024-08-06T04:16:42.217000
CVE-2016-15033,0,0,a995baa8d56966eb2caee6c22fcfd797c1734719761ca1397f25d8327d943b23,2023-11-07T02:29:49.960000
CVE-2016-15034,0,0,252c66f3cd880c2b187a10eea5f4c4b6de05603bdf33cc1997ff39fa5c438aee,2024-05-17T01:08:11.320000
CVE-2016-15035,0,0,7885f496b8dd617bc9d5d3b425e9772bef1da695215db7e49eb390dd5339f1a0,2024-05-17T01:08:11.430000
CVE-2016-15036,0,1,21b75d95bec07246139231456e1cca814dee6cb6d4a4e929b7a5bd6362d2ec90,2024-08-06T04:16:42.603000
CVE-2016-15036,0,0,21b75d95bec07246139231456e1cca814dee6cb6d4a4e929b7a5bd6362d2ec90,2024-08-06T04:16:42.603000
CVE-2016-15037,0,0,a24c928d873db9adb04c4c2c7f23b1fdee0c14c814adb63b3935f236dd62254a,2024-05-17T01:08:11.653000
CVE-2016-15038,0,0,ab9fe34bbf83cb3f6b12fd6674fbfd88d9bfe6f780bf258a0a29ef7f754a8620,2024-05-17T01:08:11.777000
CVE-2016-15039,0,0,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000
@ -85363,11 +85363,11 @@ CVE-2016-20005,0,0,b64a06b51d63884e1ad568b18ba1bb237a96be3c1a8589f5adff84c89916b
CVE-2016-20006,0,0,02c83742eb3fab57e2d5ab146f1b1cd840f05cf8f30eeaf78b0505c2a594874a,2021-01-07T16:21:39.823000
CVE-2016-20007,0,0,f48de787d876e267bc8d56363301308107ff3f611a9b23a244f320286ad1ef44,2021-01-07T14:41:28.037000
CVE-2016-20008,0,0,571cde26289a669d7e5db2ab9c17dfdcd4bc050582080407b1bd0ab57cea87cc,2021-01-07T14:50:32.877000
CVE-2016-20009,0,1,6736779b86fe0f5c4776b285f122e67fb9b218a14b07e7f61563cc36340c69bf,2024-08-06T04:16:42.910000
CVE-2016-20009,0,0,6736779b86fe0f5c4776b285f122e67fb9b218a14b07e7f61563cc36340c69bf,2024-08-06T04:16:42.910000
CVE-2016-2001,0,0,86a26f8d42da590fb56f6ce4ef4436b2512598d662de8307f45a9378b39a26f9,2016-12-03T03:24:15.297000
CVE-2016-20010,0,0,5875a1d81a459a15d8f8a768844705090d0d00c9cafd74ff4adfcc764b2b9868,2021-05-13T16:11:38.253000
CVE-2016-20011,0,0,3677084d404a7522732f923fdd4014dd7d6b77634feda8da46daf3b2969f8dd7,2021-06-09T15:03:47.777000
CVE-2016-20012,0,1,4f3e9be5aa966e0e904cd116300b777c6ff40e6debc6eeecdce7678df8645ed6,2024-08-06T04:16:44.247000
CVE-2016-20012,0,0,4f3e9be5aa966e0e904cd116300b777c6ff40e6debc6eeecdce7678df8645ed6,2024-08-06T04:16:44.247000
CVE-2016-20013,0,0,0275566c9e37f071760b1af1d2142dafa63309c9ba7985af7f9d184560514a19,2022-03-03T16:43:19.667000
CVE-2016-20014,0,0,3d9ba391321a496549812db9a9b02f2d93e5a1d4fe7210dd77241fe8f6175c83,2022-05-02T18:16:02.077000
CVE-2016-20015,0,0,092857df3fe281f5ceed880567ed7e54a0ed822ac94b32e92babf91d27bf7e7a,2022-09-22T00:19:34.010000
@ -85376,7 +85376,7 @@ CVE-2016-20017,0,0,4df0ae2b835296cc1b90826d14dc0f8fd616e77582d0d146922716cb5ae98
CVE-2016-20018,0,0,8e304d71235746a4dff13ef585a7f314f527d92bfa216fc7ea8494416774f5e9,2023-11-23T00:15:07.650000
CVE-2016-2002,0,0,df891537939859925304fb7d393d6978e1cea1f355df3eb1ecf75c9d0fbc4bc7,2019-02-20T19:22:14.107000
CVE-2016-20021,0,0,0c93aff8012f95e3d947d50dc11ffebc22a889af21a3776d4b0fae8dba0eec49,2024-01-22T16:27:08.217000
CVE-2016-20022,0,1,5e764ea7bad2173d3d56d94982033d28014c1c9dcf863283eea4d7f644ce2808,2024-08-06T04:16:45.573000
CVE-2016-20022,0,0,5e764ea7bad2173d3d56d94982033d28014c1c9dcf863283eea4d7f644ce2808,2024-08-06T04:16:45.573000
CVE-2016-2003,0,0,9e1c08080960cd64af9fc247f4a2e3abe0bcc86de315471efa7d9fc48cea0637,2016-12-01T03:08:18.587000
CVE-2016-2004,0,0,1757ff86a49a2d1d6005c730b8c4588ede28a057e8c53f6273a81439e257866c,2019-07-12T15:15:23.573000
CVE-2016-2005,0,0,3fdfefcac30be26be6521e4cf5e31cc8c5931d834a99fb4574919716f4be4f62,2019-07-16T12:23:19.377000
@ -248753,7 +248753,7 @@ CVE-2024-28957,0,0,0b6f09541cc545197668690ffbf9310f75a4b5c2876755b3d8d95cbf05284
CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000
CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000
CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000
CVE-2024-28962,1,1,31dcea761113ed3d2d5287bcac0ccde59721eab53808f539db6c678a026732b0,2024-08-06T04:16:45.810000
CVE-2024-28962,0,0,31dcea761113ed3d2d5287bcac0ccde59721eab53808f539db6c678a026732b0,2024-08-06T04:16:45.810000
CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000
CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000
CVE-2024-28965,0,0,243304e77cbab7b4dbd33d38f2ed62543001dbffc348c59ebe507f143c414797,2024-06-13T18:35:19.777000
@ -255686,7 +255686,7 @@ CVE-2024-39777,0,0,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170da
CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39817,1,1,0a0af06160c955d81a7f3ce27b51c3d2d9db081127baf17354ab62003583a3b4,2024-08-06T05:15:41.087000
CVE-2024-39817,0,0,0a0af06160c955d81a7f3ce27b51c3d2d9db081127baf17354ab62003583a3b4,2024-08-06T05:15:41.087000
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
@ -256556,6 +256556,7 @@ CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
CVE-2024-41995,1,1,156b892398ee9eda29e3640460e8ccbfd7be9748436849e4e688199ff4695702,2024-08-06T07:15:46.330000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
CVE-2024-42008,0,0,7c36b5673366032826436a227180e4306bc4ec6ae9c95aa42e9426014727b43a,2024-08-05T19:15:38.153000
@ -257977,6 +257978,8 @@ CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b112
CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000
CVE-2024-5703,0,0,5ca9c34d8a3be3710e16eaa453823ef22cf36c499d35ca66a69839485dd178a3,2024-07-19T16:05:42.090000
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
CVE-2024-5708,1,1,d6bf0b5821040e12ca3c0179813c52faaed84420db0b83b1e5c91a66c63e17e5,2024-08-06T06:15:34.460000
CVE-2024-5709,1,1,2ceaa5103d6cd37b398eb08d909f8ae343bd0ca0ed1d288338dd2df6eb752884,2024-08-06T06:15:34.793000
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000
@ -258126,7 +258129,7 @@ CVE-2024-5909,0,0,be17c9091f18518453142635e2095bb0b422430c259d2d0689eac8e33dc2ea
CVE-2024-5910,0,0,90cc21d0847234b3526638233dffb575bd78298c2136f3076c84a2e819ba4a1f,2024-07-11T13:05:54.930000
CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000
CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000
CVE-2024-5913,0,1,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000
CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000
CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000
CVE-2024-5924,0,0,5e3ff1a9d9518c557ed5168c87e0fdab65bac252833de925901af21dfaeaa6cd,2024-06-17T12:43:31.090000
CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000
@ -258239,7 +258242,7 @@ CVE-2024-6073,0,0,e03ebd767ac590d74109e38897ba792c96f7f9dfee79b1fa5bd262c10ac25e
CVE-2024-6074,0,0,915dc1a478b1dc63b8eb0116a9c01d91f3bc138019e7c4a3ebc47481b04905bc,2024-08-01T14:00:10.323000
CVE-2024-6075,0,0,1cd7e5569456a26c7768214306daa7e1d9ce1093889f04b8131e5ae79338cd6f,2024-08-01T14:00:10.553000
CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f72e,2024-08-01T14:00:10.780000
CVE-2024-6080,0,0,9ad80ebfe8b856e46a0a6652807c607b3ca5adc92bd23988173663f4819ac96b,2024-06-20T20:15:20.583000
CVE-2024-6080,0,1,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000
CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000
CVE-2024-6084,0,0,06b281398f86ed81b091427e75b7100073dd1dfd003da38e7de1b912df60ef63,2024-06-20T12:44:01.637000
@ -258331,6 +258334,10 @@ CVE-2024-6194,0,0,f00a226f70ff49a057b84fcaca304b983b6bd1564bd5a99084e1dc1658dc9a
CVE-2024-6195,0,0,d35dc776097027653d4328476e596f9f167a82473590f04576da829da4609970,2024-08-01T13:51:26.273000
CVE-2024-6196,0,0,347e5d0fbb342c4d3dd5d440e2946d6924b36395364c1557d43d309fd11da3db,2024-08-01T13:49:15.767000
CVE-2024-6197,0,0,e67c038f7bda9a715325974d1357ae7cd3f8fe3c15c27331f56b2750bf76203e,2024-08-01T14:00:14.760000
CVE-2024-6200,1,1,c91a739506013d2656698dbed636dc5ca5ac2ba0cadb7ce3359c71e19f72c591,2024-08-06T06:15:35.030000
CVE-2024-6201,1,1,1dc12961042def62a318d459a3dad52cb166c4edfbe4f7dce09367fb70362ec3,2024-08-06T06:15:35.283000
CVE-2024-6202,1,1,e5ea7056cdc2f7525fae58f73f1bba6ff722639ad51026138aea3dbacea4b502,2024-08-06T06:15:35.487000
CVE-2024-6203,1,1,658afe651851c87c3176a6de2182b64a477b842dcb36f7f10734e9800bfcecb7,2024-08-06T06:15:35.727000
CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000
CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
@ -258625,6 +258632,7 @@ CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1
CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
CVE-2024-6651,1,1,73d21a9d6fa7c667faf1e0f966ada3c7bf41fc1bd868e7395e05923f19cc233e,2024-08-06T06:15:35.973000
CVE-2024-6652,0,0,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
@ -258687,6 +258695,7 @@ CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d484
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6766,1,1,4d09ca3b6a9b021ea2575dff9ce754df4830f23a5ddff67ef81a99f1b17fc908,2024-08-06T06:15:36.047000
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
CVE-2024-6772,0,0,912a2e88fadcae9536686fa2edbaf67f780e09433e7c7b1a77cd2e7a853d1cc4,2024-08-01T14:00:38.260000
CVE-2024-6773,0,0,1cc7ee73b86e05dc74bca684f8041d0b5ae20ee7d4c5d09a0a1f363d55d99edd,2024-08-01T14:00:38.483000
@ -258697,8 +258706,8 @@ CVE-2024-6777,0,0,ca29db0995c8af0d3bc27804bd1f135839d6af869a949f56fbd75929b6968b
CVE-2024-6778,0,0,84b088ec3020aa8ff5e55451d795a5507972d54955d86abc44832d806c764933,2024-08-01T14:00:42.093000
CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b9702520701b,2024-08-01T14:00:42.927000
CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000
CVE-2024-6781,1,1,a3cfe77d31498eb43760f01a99ed263e73f46dc783939c6cb0a1af9155173920,2024-08-06T04:16:46.233000
CVE-2024-6782,1,1,2ea4d50285ad17682148be599c7f1fcb1056e17f67164c1e995f60b769ade5dc,2024-08-06T04:16:46.450000
CVE-2024-6781,0,0,a3cfe77d31498eb43760f01a99ed263e73f46dc783939c6cb0a1af9155173920,2024-08-06T04:16:46.233000
CVE-2024-6782,0,0,2ea4d50285ad17682148be599c7f1fcb1056e17f67164c1e995f60b769ade5dc,2024-08-06T04:16:46.450000
CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
@ -258723,7 +258732,7 @@ CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d21
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
CVE-2024-6886,1,1,3ec719ef0968a2330f885b85f1945a1bb353512e5a00dfa1301fff2298977065,2024-08-06T04:16:46.653000
CVE-2024-6886,0,0,3ec719ef0968a2330f885b85f1945a1bb353512e5a00dfa1301fff2298977065,2024-08-06T04:16:46.653000
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
@ -258794,14 +258803,15 @@ CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc76
CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000
CVE-2024-6990,0,0,af78978331551e601c74e65678c49159db8dbbe52afb220c54529e9bbfddee69,2024-08-03T18:35:02.320000
CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000
CVE-2024-7008,1,1,c31a3b24efe8a9546c13454e26ba25f735dbeb7a9f826d6dcaa0531537f81781,2024-08-06T04:16:46.807000
CVE-2024-7009,1,1,9110783bbe0d91beba88cc99800a2d427b7ac3ffbd65fa1c5ab81604e921f06b,2024-08-06T04:16:47.040000
CVE-2024-7008,0,0,c31a3b24efe8a9546c13454e26ba25f735dbeb7a9f826d6dcaa0531537f81781,2024-08-06T04:16:46.807000
CVE-2024-7009,0,0,9110783bbe0d91beba88cc99800a2d427b7ac3ffbd65fa1c5ab81604e921f06b,2024-08-06T04:16:47.040000
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
CVE-2024-7029,0,0,53babce0d84fa7daad6c41ce401ba13c07793a5bed019fcf23c3c88f7322f0b5,2024-08-05T12:41:45.957000
CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000
CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000
CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000
CVE-2024-7055,1,1,460fac5e061d7dc602c4e6c3312a2c17cbc07bca9bf605e1ef59acbd1ddce267,2024-08-06T06:15:36.107000
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
CVE-2024-7062,0,0,d6f409aeb13130ff6f4252d4a7aadcbcfc3eecb0d68f9e3338eff0add9df7d66,2024-07-26T12:38:41.683000
@ -258813,6 +258823,8 @@ CVE-2024-7069,0,0,739e886131312a7d1c8ccd6a4f98d25c3687954f1471fb4fef37a66c2cb889
CVE-2024-7079,0,0,432b6c38d04c17da8e2aeea6e5677915e33a84f70f04ebe0988a953bc8892b6d,2024-07-26T10:15:02.840000
CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04d2,2024-07-26T13:22:43.387000
CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000
CVE-2024-7082,1,1,17534fe6dfb714d477357b1d152483c2f7665f2096d01a4a8ebc87110f9a0e42,2024-08-06T06:15:36.420000
CVE-2024-7084,1,1,3aa9d0f90c3c96ae6ee9cfe6b3af45df3b49a921d13af5f0a36878b68c91c8b6,2024-08-06T06:15:36.480000
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
@ -259032,9 +259044,9 @@ CVE-2024-7496,0,0,b98ace8c0457170fec0ba60c1277cad979e65e1cd78c0880b288a39f848929
CVE-2024-7497,0,0,ada8b9ed12820a76b86d0d765e6d0469e42c9c911eddda8cf5ae635571333625,2024-08-06T02:15:36.233000
CVE-2024-7498,0,0,3463b736f90f9ad8ca544a9e5828eeddb483519278649bedfd95de1a1f59b607,2024-08-06T03:15:30.507000
CVE-2024-7499,0,0,fa466cc6c096c43b53afcea4eeed2aa00cfe03fa9d1fcaf27af1880791fed590,2024-08-06T03:15:30.760000
CVE-2024-7500,1,1,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
CVE-2024-7505,1,1,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
CVE-2024-7506,1,1,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
CVE-2024-7500,0,0,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
CVE-2024-7505,0,0,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
CVE-2024-7506,0,0,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
CVE-2024-7537,0,0,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
CVE-2024-7538,0,0,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
CVE-2024-7539,0,0,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000

Can't render this file because it is too large.