Auto-Update: 2024-08-24T14:00:17.337053+00:00

This commit is contained in:
cad-safe-bot 2024-08-24 14:03:15 +00:00
parent b784901a65
commit e7ef3a4ccf
5 changed files with 295 additions and 21 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2022-43915",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-24T12:15:04.080",
"lastModified": "2024-08-24T12:15:04.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM App Connect Enterprise Certified Container 5.0, 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, and 12.1 does not limit calls to unshare in running Pods. This can allow a user with access to execute commands in a running Pod to elevate their user privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/241037",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7166463",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-7656",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-24T12:15:04.330",
"lastModified": "2024-08-24T12:15:04.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Image Hotspot by DevVN plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.5 via deserialization of untrusted input in the 'devvn_ihotspot_shortcode_func' function. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/devvn-image-hotspot/trunk/admin/inc/add_shortcode_devvn_ihotspot.php#L16",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3139899/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/624bdb9e-6c50-4a00-9a04-1a32c938d48b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,152 @@
{
"id": "CVE-2024-8128",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-24T12:15:04.557",
"lastModified": "2024-08-24T12:15:04.557",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This issue affects the function cgi_add_zip of the file /cgi-bin/webfile_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument path leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_add_zip.md",
"source": "cna@vuldb.com"
},
{
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.275699",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.275699",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.396237",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-24T12:00:17.576552+00:00
2024-08-24T14:00:17.337053+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-24T11:15:05.670000+00:00
2024-08-24T12:15:04.557000+00:00
```
### Last Data Feed Release
@ -33,27 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
261080
261083
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `3`
- [CVE-2024-8127](CVE-2024/CVE-2024-81xx/CVE-2024-8127.json) (`2024-08-24T10:15:04.370`)
- [CVE-2022-43915](CVE-2022/CVE-2022-439xx/CVE-2022-43915.json) (`2024-08-24T12:15:04.080`)
- [CVE-2024-7656](CVE-2024/CVE-2024-76xx/CVE-2024-7656.json) (`2024-08-24T12:15:04.330`)
- [CVE-2024-8128](CVE-2024/CVE-2024-81xx/CVE-2024-8128.json) (`2024-08-24T12:15:04.557`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `0`
- [CVE-2023-30430](CVE-2023/CVE-2023-304xx/CVE-2023-30430.json) (`2024-08-24T11:15:04.317`)
- [CVE-2023-30997](CVE-2023/CVE-2023-309xx/CVE-2023-30997.json) (`2024-08-24T11:15:04.673`)
- [CVE-2023-30998](CVE-2023/CVE-2023-309xx/CVE-2023-30998.json) (`2024-08-24T11:15:04.873`)
- [CVE-2023-35022](CVE-2023/CVE-2023-350xx/CVE-2023-35022.json) (`2024-08-24T11:15:05.047`)
- [CVE-2023-38368](CVE-2023/CVE-2023-383xx/CVE-2023-38368.json) (`2024-08-24T11:15:05.273`)
- [CVE-2024-22333](CVE-2024/CVE-2024-223xx/CVE-2024-22333.json) (`2024-08-24T11:15:05.467`)
- [CVE-2024-41774](CVE-2024/CVE-2024-417xx/CVE-2024-41774.json) (`2024-08-24T11:15:05.670`)
## Download and Usage

View File

@ -209015,6 +209015,7 @@ CVE-2022-43909,0,0,fb5ee18fcc4a7c8f963a93a6115537cf0182728f4dba8a3bd049fa37f66ac
CVE-2022-4391,0,0,55ba1ee53ba287fa9a331eec36653bf0e64371d30780a415458f598732c5d396,2023-11-07T03:57:43.970000
CVE-2022-43910,0,0,7268ce6dc82f1278149e45c0b95732486f595712c6fa46116abdc68639690719,2023-07-27T23:43:13.553000
CVE-2022-43914,0,0,6c5d00c75cae4288b9b3f94ea7847750a80fcdaddd67481674372df2bd89e663,2023-11-07T03:54:07.493000
CVE-2022-43915,1,1,2d1c28ce172236b063d6a1fb5ffdb0f74219a8ce71539ccfcc96f8c151ed9ed5,2024-08-24T12:15:04.080000
CVE-2022-43917,0,0,38b0633885bd70099b602418a9f6cf51c4440b53dd83d61edf447fd9b1fdb596,2023-11-07T03:54:07.590000
CVE-2022-43919,0,0,3aa92fee108b80de2c2a30af75bd50fa8417c3cffedb4ff0feec49c8f960e3aa,2023-05-11T14:37:10.943000
CVE-2022-4392,0,0,8486468fc2864376f0d7d2d2c7f6ecbf29ceed955d0af959f0ef5ea5913b1984,2023-11-07T03:57:44.170000
@ -222814,7 +222815,7 @@ CVE-2023-3042,0,0,4ffb0a798b27135693d0203330a9c50fc11d9ba5989f0e1c349afc0ccae600
CVE-2023-30428,0,0,1efeec4521c1a839ffce9db519aae5f3b59a6d29b3b62d170ba0843e2efdc83d,2023-07-20T16:41:45.247000
CVE-2023-30429,0,0,27d09dd85c230885df071c5f8e27796ba6483afc1e418cf2b610af918d289e0d,2023-07-20T16:47:49.747000
CVE-2023-3043,0,0,09e537fa053cef06eef2088a7b3b0ae592cdbc3886ebc90ce64b70ac5590af26,2024-01-12T19:18:06.067000
CVE-2023-30430,0,1,e8ab45b47e6a0b34bcc30671dafa5794d9dd6e2a2b6b519a00d17d8fbed9fdf6,2024-08-24T11:15:04.317000
CVE-2023-30430,0,0,e8ab45b47e6a0b34bcc30671dafa5794d9dd6e2a2b6b519a00d17d8fbed9fdf6,2024-08-24T11:15:04.317000
CVE-2023-30431,0,0,a4d0b8dc929e2eb23d72b6911cdb8d0e6ab0113367ce1f180fc64f7f2bb0fab2,2023-07-31T19:15:16.290000
CVE-2023-30433,0,0,dd339006b05be3847f7b076d76cf2c872ebc87a1eb3b28ef6127051233c66faf,2023-07-28T13:57:03.003000
CVE-2023-30434,0,0,cf827b2e6de85ce12f0be7e7ddfd04813e409d564e19f0808eca74c91d46bd5a,2023-05-11T18:45:43.990000
@ -223314,8 +223315,8 @@ CVE-2023-30993,0,0,c8cd99973390ba8216648c74aeabc9afdbec9b32fb2819c0273b8b55de5ec
CVE-2023-30994,0,0,f5d053ad0a566020d5caa8e4b1adf3b03208313ac50e66696bd27a25eef200ec,2023-10-18T20:48:41.863000
CVE-2023-30995,0,0,4b8cbf9cea1a21fe53b1ee1e6d462e33c7bb2d3a82b0dc4ef85827986b70778a,2023-10-10T20:15:09.650000
CVE-2023-30996,0,0,8a64f6cd4760b6458797be086be47526b41dc80f495a0bd14bff963833976ec9,2024-06-21T19:15:26.747000
CVE-2023-30997,0,1,2fc8e2a47e27d09547df2f3c68989753702659f76b615f548939567e823f051d,2024-08-24T11:15:04.673000
CVE-2023-30998,0,1,a8807b6e531f44d381a6e524fe3973a0ab896e7efd09caa37ed4aa827a59d08e,2024-08-24T11:15:04.873000
CVE-2023-30997,0,0,2fc8e2a47e27d09547df2f3c68989753702659f76b615f548939567e823f051d,2024-08-24T11:15:04.673000
CVE-2023-30998,0,0,a8807b6e531f44d381a6e524fe3973a0ab896e7efd09caa37ed4aa827a59d08e,2024-08-24T11:15:04.873000
CVE-2023-30999,0,0,7f6289ceb3528d8673f13505a6c257a4badec85212c9af4c7b19079f175ab653,2024-02-06T21:31:55.033000
CVE-2023-3100,0,0,f51861655831ae5f2d04423d44b734069523877f0cb4ce519e250d3b1385d110,2024-05-17T02:27:16.360000
CVE-2023-31001,0,0,af829d450fc27f31f74cdd0accc391af3395d5bb550a9aae70fcfb4ae8b18ee4,2024-01-18T17:06:28.277000
@ -226356,7 +226357,7 @@ CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066
CVE-2023-35019,0,0,1291349f3b1d1d4adf1c92cac15e5df37965c90cdb3e3c741c73d93303d641a0,2023-08-04T17:23:56.413000
CVE-2023-3502,0,0,74be66f33660d5a960e431317df48fb842e4013315111e826f94f24e7bf2f927,2024-05-17T02:27:32.370000
CVE-2023-35020,0,0,ad9d714b38fc8dfafebf526e5bcd88bda4558e15578975a719df5c9198c79c30,2024-01-24T21:38:11.280000
CVE-2023-35022,0,1,29fecfd53ddaeeaab29e0dca4e8d95115a62ab32989d7e86eaa68c4ef8133e7b,2024-08-24T11:15:05.047000
CVE-2023-35022,0,0,29fecfd53ddaeeaab29e0dca4e8d95115a62ab32989d7e86eaa68c4ef8133e7b,2024-08-24T11:15:05.047000
CVE-2023-35024,0,0,b99623d62fd61cec8b42feb7692d36a2dddfce4725f8455d7ba260278fc27d1c,2023-10-18T21:04:02.917000
CVE-2023-35029,0,0,e92935d889ee7a18e80a49707d3023b26a55365680006a3e5edfac7046aa802e,2023-06-22T16:51:23.137000
CVE-2023-3503,0,0,9899b3a06c9c6b85f8b5fdfd6303f5bfb45d62bdf6dce68bc15f1326d515bc23,2024-05-17T02:27:32.480000
@ -228840,7 +228841,7 @@ CVE-2023-38363,0,0,5d567ca36d68bada1966cb8013ba9388f62a1e3ac51af88afccfec2595295
CVE-2023-38364,0,0,e8781858dd63f12725556439972e1c19d07369b694f9023baae5e6e1abc7466f,2023-11-16T21:42:44.240000
CVE-2023-38366,0,0,d81a123c387aad52e89b1347347e26180ebfadfcf396c406bb043eedb5c46ccb,2024-03-01T14:04:26.010000
CVE-2023-38367,0,0,01ad222beec06a0c7fa29133d6ae3a5989e0abd419949bb8046f28c19603a86c,2024-02-29T13:49:29.390000
CVE-2023-38368,0,1,0d78951996fe1fb63ced5ee0fd793ec7e72e82422e16a94106816d6965de3969,2024-08-24T11:15:05.273000
CVE-2023-38368,0,0,0d78951996fe1fb63ced5ee0fd793ec7e72e82422e16a94106816d6965de3969,2024-08-24T11:15:05.273000
CVE-2023-38369,0,0,c91dd280a08bf7f58190c17458ca2d7cc53f18627ab7d5c893cf27ff88663ff6,2024-02-10T04:01:12.283000
CVE-2023-3837,0,0,a4825f48e706c9ac328948168eff6e41b7a5ddef4ce4d0b60fd3d0eb94799eb8,2024-05-17T02:27:52.140000
CVE-2023-38370,0,0,2f608b49fa78e28ed7d54597307441f89eca69687954b9c4cb03d84feb5857b4,2024-07-31T20:23:36.970000
@ -244543,7 +244544,7 @@ CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e289
CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000
CVE-2024-22331,0,0,d490fba89e7f88683c136dfcfc87c9cff8ad31b547c7cdf5425991357b2dcb7b,2024-02-13T20:26:23.780000
CVE-2024-22332,0,0,638d06450f89d191258df8fe36d1620abd0564acdb0d8f1f383caf127d6d43b9,2024-04-03T02:15:07.973000
CVE-2024-22333,0,1,2aea130a34348f78dfbf003fc187c19aae24d1eb68c0b3938ae198b41308d45b,2024-08-24T11:15:05.467000
CVE-2024-22333,0,0,2aea130a34348f78dfbf003fc187c19aae24d1eb68c0b3938ae198b41308d45b,2024-08-24T11:15:05.467000
CVE-2024-22334,0,0,1951698d7ab1d55a1824ae76507a3577dbbe6facddaaf9272bcefe471309fc13,2024-04-15T13:15:51.577000
CVE-2024-22335,0,0,a452659277dfc0c00bbebf3f7fdbdbc10eb5e3a4586e5ce33a7b718b3f3008c7,2024-02-20T19:50:53.960000
CVE-2024-22336,0,0,34ed66b8b7f583d44759ce52a251db14fa1a95596195a1c1fd9558e86e073ccc,2024-02-20T19:50:53.960000
@ -257291,7 +257292,7 @@ CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-41773,0,0,e915a596fb7e1ca4e452145ef4744da8e1b8ffba9e32d109e0437370be6438d6,2024-08-21T12:30:33.697000
CVE-2024-41774,0,1,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000
CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000
@ -260874,6 +260875,7 @@ CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1
CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000
CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000
CVE-2024-7651,0,0,5a46da6be71e23b2a70e27947f885b8fb16b12b8154bc4dda4808e71839c3b2b,2024-08-21T12:30:33.697000
CVE-2024-7656,1,1,36ca719cfd1b469ef1a4c7dec2c47c2577ad2dab738b22cacff0ed1612a27bdf,2024-08-24T12:15:04.330000
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000
CVE-2024-7659,0,0,3cb22096bf2f6ca2aa4f8495c729121ab87c6bf294191fb47bc11d37c76e5c86,2024-08-15T17:49:42.667000
@ -261078,4 +261080,5 @@ CVE-2024-8089,0,0,fe8d41ba149aaae8be5bcde261fbae8cee913e6a537c9c73424591ad94ea6f
CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000
CVE-2024-8113,0,0,663828d204cb9ecb17f530ae295b4541dee23e7a4b7b9d658530d5cb44ff87e3,2024-08-23T16:18:28.547000
CVE-2024-8120,0,0,b588d9e16e67a2e06fbd40a6289508e4549b2d995767d4ddf7a7de8f5dc1fd92,2024-08-24T03:15:04.543000
CVE-2024-8127,1,1,d1141915719639d4a45272a624f00fc8374c50578320b4ac97a3acb867c6e2c9,2024-08-24T10:15:04.370000
CVE-2024-8127,0,0,d1141915719639d4a45272a624f00fc8374c50578320b4ac97a3acb867c6e2c9,2024-08-24T10:15:04.370000
CVE-2024-8128,1,1,13eae5ac3df77f7df87f497775100615293e856e3153dd861775b97d8be6ad97,2024-08-24T12:15:04.557000

Can't render this file because it is too large.