Auto-Update: 2024-10-14T20:00:18.001794+00:00

This commit is contained in:
cad-safe-bot 2024-10-14 20:03:18 +00:00
parent 59953b0434
commit 1a4c7dfbf1
18 changed files with 743 additions and 57 deletions

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2023-45817",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:03.630",
"lastModified": "2024-10-14T18:15:03.630",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-9823. Reason: This candidate is a reservation duplicate of CVE-2024-9823. Notes: All CVE users should reference CVE-2024-9823 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-48082",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T19:15:10.780",
"lastModified": "2024-10-14T19:15:10.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nagios XI before 5.11.3 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate."
}
],
"metrics": {},
"references": [
{
"url": "https://www.nagios.com/change-log/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:03.847",
"lastModified": "2024-10-14T18:15:03.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference (IDOR) vulnerability in KubeSphere v3.4.1 and v4.1.1 allows low-privileged authenticated attackers to access sensitive resources without proper authorization checks."
}
],
"metrics": {},
"references": [
{
"url": "http://kubesphere.com",
"source": "cve@mitre.org"
},
{
"url": "https://okankurtulus.com.tr/2024/09/09/idor-vulnerability-in-kubesphere/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-46980",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:03.947",
"lastModified": "2024-10-14T18:15:03.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=dd94a799982cd78ab06142008d745edf9e8fd494",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=39689",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-46988",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:04.173",
"lastModified": "2024-10-14T18:15:04.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=39686",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-47766",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:04.387",
"lastModified": "2024-10-14T18:15:04.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/commit/529d11b70796589767dd27a40ebadf3eaf8f5674",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-qfrh-fv84-93hx",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=529d11b70796589767dd27a40ebadf3eaf8f5674",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=39736",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,84 @@
{
"id": "CVE-2024-47767",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:04.593",
"lastModified": "2024-10-14T18:15:04.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/commit/16d9efccb2fad8e10343be2604e94c9058ef2c89",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Enalean/tuleap/commit/e5ce81279766115dc0f126a11d6b5065b5db7eec",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Enalean/tuleap/commit/f89d7093d2c576ad5e2b35a6a096fcdaf563d1df",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=16d9efccb2fad8e10343be2604e94c9058ef2c89",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=e5ce81279766115dc0f126a11d6b5065b5db7eec",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=f89d7093d2c576ad5e2b35a6a096fcdaf563d1df",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=39728",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47826",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:04.800",
"lastModified": "2024-10-14T18:15:04.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "eLabFTW is an open source electronic lab notebook for research labs. A vulnerability in versions prior to 5.1.5 allows an attacker to inject arbitrary HTML tags in the pages: \"experiments.php\" (show mode), \"database.php\" (show mode) or \"search.php\". It works by providing HTML code in the extended search string, which will then be displayed back to the user in the error message. This means that injected HTML will appear in a red \"alert/danger\" box, and be part of an error message. Due to some other security measures, it is not possible to execute arbitrary javascript from this attack. As such, this attack is deemed low impact. Users should upgrade to at least version 5.1.5 to receive a patch. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/elabftw/elabftw/security/advisories/GHSA-cjww-pr9f-4c4w",
"source": "security-advisories@github.com"
},
{
"url": "https://www.acunetix.com/vulnerabilities/web/html-injection",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47831",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T18:15:05.013",
"lastModified": "2024-10-14T18:15:05.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"references": [
{
"url": "https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47885",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-14T19:15:10.903",
"lastModified": "2024-10-14T19:15:10.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Astro web framework has a DOM Clobbering gadget in the client-side router starting in version 3.0.0 and prior to version 4.16.1. It can lead to cross-site scripting (XSS) in websites enables Astro's client-side routing and has *stored* attacker-controlled scriptless HTML elements (i.e., `iframe` tags with unsanitized `name` attributes) on the destination pages. This vulnerability can result in cross-site scripting (XSS) attacks on websites that built with Astro that enable the client-side routing with `ViewTransitions` and store the user-inserted scriptless HTML tags without properly sanitizing the `name` attributes on the page. Version 4.16.1 contains a patch for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/withastro/astro/blob/7814a6cad15f06931f963580176d9b38aa7819f2/packages/astro/src/transitions/router.ts#L135-L156",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/withastro/astro/commit/a4ffbfaa5cb460c12bd486fd75e36147f51d3e5e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/withastro/astro/security/advisories/GHSA-m85w-3h95-hcf9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48789",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.230",
"lastModified": "2024-10-14T18:15:05.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in INATRONIC com.inatronic.drivedeck.home 2.6.23 allows a remote attacker to obtain sensitve information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://drivedeck.de/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.inatronic.drivedeck.home/com.inatronic.drivedeck.home.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48790",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.323",
"lastModified": "2024-10-14T18:15:05.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in ILIFE com.ilife.home.global 1.8.7 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ilife.home.global/com.ilife.home.global.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.iliferobot.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48791",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.420",
"lastModified": "2024-10-14T18:15:05.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Plug n Play Camera com.starvedia.mCamView.zwave 5.5.1 allows a remote attacker to obtain sensitive information via the firmware update process"
}
],
"metrics": {},
"references": [
{
"url": "http://www.starvedia.com/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.starvedia.mCamView.zwave/com.starvedia.mCamView.zwave.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48792",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.520",
"lastModified": "2024-10-14T18:15:05.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Hideez com.hideez 2.7.8.3 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.hideez/com.hideez.md",
"source": "cve@mitre.org"
},
{
"url": "https://hideez.com/en-int",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48793",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.620",
"lastModified": "2024-10-14T18:15:05.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in INATRONIC com.inatronic.bmw 2.7.1 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://drivedeck.de/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.inatronic.bmw/com.inatronic.bmw.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48795",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.717",
"lastModified": "2024-10-14T18:15:05.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Creative Labs Pte Ltd com.creative.apps.xficonnect 2.00.02 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.creative.apps.xficonnect/com.creative.apps.xficonnect.md",
"source": "cve@mitre.org"
},
{
"url": "https://hk.creative.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-14T18:00:18.159658+00:00
2024-10-14T20:00:18.001794+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-14T17:15:13.857000+00:00
2024-10-14T19:15:10.903000+00:00
```
### Last Data Feed Release
@ -33,45 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265509
265525
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `16`
- [CVE-2023-50780](CVE-2023/CVE-2023-507xx/CVE-2023-50780.json) (`2024-10-14T16:15:03.477`)
- [CVE-2024-41997](CVE-2024/CVE-2024-419xx/CVE-2024-41997.json) (`2024-10-14T16:15:03.640`)
- [CVE-2024-45731](CVE-2024/CVE-2024-457xx/CVE-2024-45731.json) (`2024-10-14T17:15:11.177`)
- [CVE-2024-45732](CVE-2024/CVE-2024-457xx/CVE-2024-45732.json) (`2024-10-14T17:15:11.410`)
- [CVE-2024-45733](CVE-2024/CVE-2024-457xx/CVE-2024-45733.json) (`2024-10-14T17:15:11.657`)
- [CVE-2024-45734](CVE-2024/CVE-2024-457xx/CVE-2024-45734.json) (`2024-10-14T17:15:11.850`)
- [CVE-2024-45735](CVE-2024/CVE-2024-457xx/CVE-2024-45735.json) (`2024-10-14T17:15:12.053`)
- [CVE-2024-45736](CVE-2024/CVE-2024-457xx/CVE-2024-45736.json) (`2024-10-14T17:15:12.253`)
- [CVE-2024-45737](CVE-2024/CVE-2024-457xx/CVE-2024-45737.json) (`2024-10-14T17:15:12.453`)
- [CVE-2024-45738](CVE-2024/CVE-2024-457xx/CVE-2024-45738.json) (`2024-10-14T17:15:12.660`)
- [CVE-2024-45739](CVE-2024/CVE-2024-457xx/CVE-2024-45739.json) (`2024-10-14T17:15:12.860`)
- [CVE-2024-45740](CVE-2024/CVE-2024-457xx/CVE-2024-45740.json) (`2024-10-14T17:15:13.047`)
- [CVE-2024-45741](CVE-2024/CVE-2024-457xx/CVE-2024-45741.json) (`2024-10-14T17:15:13.250`)
- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-14T17:15:13.440`)
- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-14T16:15:03.750`)
- [CVE-2024-48153](CVE-2024/CVE-2024-481xx/CVE-2024-48153.json) (`2024-10-14T16:15:03.840`)
- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-14T17:15:13.520`)
- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-14T17:15:13.610`)
- [CVE-2024-48797](CVE-2024/CVE-2024-487xx/CVE-2024-48797.json) (`2024-10-14T17:15:13.690`)
- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-14T17:15:13.770`)
- [CVE-2024-48799](CVE-2024/CVE-2024-487xx/CVE-2024-48799.json) (`2024-10-14T17:15:13.857`)
- [CVE-2024-6762](CVE-2024/CVE-2024-67xx/CVE-2024-6762.json) (`2024-10-14T16:15:03.930`)
- [CVE-2024-6763](CVE-2024/CVE-2024-67xx/CVE-2024-6763.json) (`2024-10-14T16:15:04.163`)
- [CVE-2024-8184](CVE-2024/CVE-2024-81xx/CVE-2024-8184.json) (`2024-10-14T16:15:04.380`)
- [CVE-2023-45817](CVE-2023/CVE-2023-458xx/CVE-2023-45817.json) (`2024-10-14T18:15:03.630`)
- [CVE-2023-48082](CVE-2023/CVE-2023-480xx/CVE-2023-48082.json) (`2024-10-14T19:15:10.780`)
- [CVE-2024-46528](CVE-2024/CVE-2024-465xx/CVE-2024-46528.json) (`2024-10-14T18:15:03.847`)
- [CVE-2024-46980](CVE-2024/CVE-2024-469xx/CVE-2024-46980.json) (`2024-10-14T18:15:03.947`)
- [CVE-2024-46988](CVE-2024/CVE-2024-469xx/CVE-2024-46988.json) (`2024-10-14T18:15:04.173`)
- [CVE-2024-47766](CVE-2024/CVE-2024-477xx/CVE-2024-47766.json) (`2024-10-14T18:15:04.387`)
- [CVE-2024-47767](CVE-2024/CVE-2024-477xx/CVE-2024-47767.json) (`2024-10-14T18:15:04.593`)
- [CVE-2024-47826](CVE-2024/CVE-2024-478xx/CVE-2024-47826.json) (`2024-10-14T18:15:04.800`)
- [CVE-2024-47831](CVE-2024/CVE-2024-478xx/CVE-2024-47831.json) (`2024-10-14T18:15:05.013`)
- [CVE-2024-47885](CVE-2024/CVE-2024-478xx/CVE-2024-47885.json) (`2024-10-14T19:15:10.903`)
- [CVE-2024-48789](CVE-2024/CVE-2024-487xx/CVE-2024-48789.json) (`2024-10-14T18:15:05.230`)
- [CVE-2024-48790](CVE-2024/CVE-2024-487xx/CVE-2024-48790.json) (`2024-10-14T18:15:05.323`)
- [CVE-2024-48791](CVE-2024/CVE-2024-487xx/CVE-2024-48791.json) (`2024-10-14T18:15:05.420`)
- [CVE-2024-48792](CVE-2024/CVE-2024-487xx/CVE-2024-48792.json) (`2024-10-14T18:15:05.520`)
- [CVE-2024-48793](CVE-2024/CVE-2024-487xx/CVE-2024-48793.json) (`2024-10-14T18:15:05.620`)
- [CVE-2024-48795](CVE-2024/CVE-2024-487xx/CVE-2024-48795.json) (`2024-10-14T18:15:05.717`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `0`
- [CVE-2024-9142](CVE-2024/CVE-2024-91xx/CVE-2024-9142.json) (`2024-10-14T16:35:01.033`)
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T16:15:04.653`)
## Download and Usage

View File

@ -234322,6 +234322,7 @@ CVE-2023-45813,0,0,bef63104b125ee7d94335edc7a351bfa093e8066b493aec55c81f14224285
CVE-2023-45814,0,0,153e88d335fae0dd2da779a7cda4259b69d1854e63e63750b77aae7567b56669,2023-10-30T17:16:15.390000
CVE-2023-45815,0,0,381db8ec2d60cf9d70138a9d8575df9d816b1ef03a4ceb545fa7fdc065d01b8e,2023-10-30T15:31:17.737000
CVE-2023-45816,0,0,fc7c9d52628d81aa06d2095118a7e61badcb7b879ac6aa1f5817abfdccbe4815,2023-11-16T19:38:00.193000
CVE-2023-45817,1,1,3afb39f08c3ae4757fce309c2cfaaa2be5844e1b60228357103bdb71a16516db,2024-10-14T18:15:03.630000
CVE-2023-45818,0,0,5599bbff76f9abbfbc1d07cce206fcc712b2111034120fc45e2caf24476be2d8,2023-10-26T16:32:24.767000
CVE-2023-45819,0,0,ea1566a0fb1a952b25413ab14d6f21b6c3f9ffe167f5ea428676eeb376e29ff5,2023-10-26T16:30:27.223000
CVE-2023-4582,0,0,7b3abe25df0e96f6cccb8e076f11761c931c1642548ef52dd59cdff69dd28186,2024-09-19T20:35:19.947000
@ -235903,6 +235904,7 @@ CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09
CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
CVE-2023-48082,1,1,96034bbad322c5ad209cad6de9d973e6bc853cef3ec2bc988c9623b055860d55,2024-10-14T19:15:10.780000
CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
CVE-2023-48085,0,0,ad24d46a2c7d3c2e30b77344324b90919c3f0291c86071ef906b236a00e55787,2023-12-19T18:41:59.183000
CVE-2023-48087,0,0,9729ddec6f348b3a3c6a59a1ffe393a6cd2fd40ee60944b2ab3b3e235f9546cb,2023-11-21T02:42:52.163000
@ -237793,7 +237795,7 @@ CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044c
CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
CVE-2023-50780,1,1,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000
CVE-2023-50780,0,0,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
@ -258495,7 +258497,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
CVE-2024-41997,1,1,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000
CVE-2024-41997,0,0,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
@ -260700,18 +260702,18 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
CVE-2024-45731,1,1,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000
CVE-2024-45732,1,1,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000
CVE-2024-45733,1,1,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000
CVE-2024-45734,1,1,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000
CVE-2024-45735,1,1,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000
CVE-2024-45736,1,1,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000
CVE-2024-45737,1,1,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000
CVE-2024-45738,1,1,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000
CVE-2024-45739,1,1,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000
CVE-2024-45731,0,0,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000
CVE-2024-45732,0,0,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000
CVE-2024-45733,0,0,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000
CVE-2024-45734,0,0,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000
CVE-2024-45735,0,0,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000
CVE-2024-45736,0,0,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000
CVE-2024-45737,0,0,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000
CVE-2024-45738,0,0,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000
CVE-2024-45739,0,0,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-45740,1,1,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000
CVE-2024-45741,1,1,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000
CVE-2024-45740,0,0,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000
CVE-2024-45741,0,0,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
@ -260961,9 +260963,10 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0
CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
CVE-2024-46528,1,1,473262510e24cb9558455fa1fe479cce4ec5b58505162ffb48d8cf9e8eef11a5,2024-10-14T18:15:03.847000
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
CVE-2024-46535,1,1,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000
CVE-2024-46535,0,0,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
@ -261286,12 +261289,14 @@ CVE-2024-46977,0,0,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f4
CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000
CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
CVE-2024-46980,1,1,4358f5ee462e64b5eb817d966373f64a4f1673d26f80265233783ad704c84fb6,2024-10-14T18:15:03.947000
CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286073,2024-09-20T12:30:51.220000
CVE-2024-46983,0,0,ec8817c062e2bbc441fd890e19bc6c98486be5ca90653148f7abcab9b4d72f76,2024-09-25T17:46:48.927000
CVE-2024-46984,0,0,8ed08a9f75ebb534fe57273695d27a9994db3769e0e07c54bfc9165453c74828,2024-09-25T17:49:17.007000
CVE-2024-46985,0,0,f289d0c2db76b1e0a673c959417469497f1df2bc55eed06198e333b29817e22e,2024-09-27T16:35:25.473000
CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000
CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000
CVE-2024-46988,1,1,2f93d243a7a11386b1f2ea8d381c5e14aa755bbb7c5aa2eeb1f6c8d7965581ed,2024-10-14T18:15:04.173000
CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000
@ -261677,6 +261682,8 @@ CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1
CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000
CVE-2024-47764,0,0,b7aba4870e1203663c4fa6abc120a30e41523fde8e72997d929896b167fbbd57,2024-10-07T17:48:28.117000
CVE-2024-47765,0,0,a65b089ee1fbe8158413dce3d4bb6a7a005d6b3f8045c2a8b0cf8a91ea4da578,2024-10-07T17:48:28.117000
CVE-2024-47766,1,1,57911a4df8a8f028164d131f0c029fd91ac3b0145f90492c1fa63dd87585d098,2024-10-14T18:15:04.387000
CVE-2024-47767,1,1,f79a911452d49bd371c9f3a339c89ed6f90934ea80af345395502aaf28c03395,2024-10-14T18:15:04.593000
CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000
CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000
CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000
@ -261706,9 +261713,11 @@ CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
CVE-2024-47826,1,1,83afdde2058bfb9fc96f1a52c30a662ccb9fb41bc80740663697467d19d9d5be,2024-10-14T18:15:04.800000
CVE-2024-47828,0,0,20037a2831594572185910fec3fa22739c3e04d0ddf5a1652087e64bcac4c0e3,2024-10-10T12:51:56.987000
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
CVE-2024-47830,0,0,078fd3f57c1e124fe25812fa092e081898b54bb5455f5ac15a9ac7b0028bfea1,2024-10-11T15:15:05.613000
CVE-2024-47831,1,1,dc0d5b8907a903b7c42dba23600b340d59f3c682425d0c124126175bff3792ec,2024-10-14T18:15:05.013000
CVE-2024-47832,0,0,2db718b13b3751bc3ef92e2930bbfe31f27f0a24beb6f2f6f579c1ed94f36d1a,2024-10-10T12:51:56.987000
CVE-2024-47833,0,0,c198216a715effb211db9429fe892ad76ab094f250667361ca1b8e1df62c0332,2024-10-10T12:51:56.987000
CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000
@ -261735,6 +261744,7 @@ CVE-2024-47875,0,0,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0
CVE-2024-47877,0,0,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
CVE-2024-47884,0,0,8ad0ffb865c1d8a187664122ed1b8bd87a0aaa3d88b8a0a88659a06bdd059aed,2024-10-11T20:15:04.993000
CVE-2024-47885,1,1,bdbb62e5df9db89022a0d9d9152e29bbacf763b43b550618bca00b5a48f9fc68,2024-10-14T19:15:10.903000
CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000
CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000
CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000
@ -261789,10 +261799,10 @@ CVE-2024-48120,0,0,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c8
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
CVE-2024-48150,1,1,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000
CVE-2024-48153,1,1,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000
CVE-2024-48150,0,0,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000
CVE-2024-48153,0,0,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000
CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000
CVE-2024-48168,1,1,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000
CVE-2024-48168,0,0,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000
CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000
CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
@ -261862,11 +261872,17 @@ CVE-2024-48784,0,0,413a91fa2c4a61a33f7467c2f5b8058034c18bbf6bb09d8c92a1fe8bc8383
CVE-2024-48786,0,0,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537b25,2024-10-11T20:15:06.277000
CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
CVE-2024-48789,1,1,f753d881cee613229d5c0d3513312e6c1c29bd865f11c631f5344baf63c91d31,2024-10-14T18:15:05.230000
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
CVE-2024-48796,1,1,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000
CVE-2024-48797,1,1,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000
CVE-2024-48798,1,1,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000
CVE-2024-48799,1,1,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000
CVE-2024-48790,1,1,f3b14bd2d7bf479628eda81581339ad913ebd0b311d16b7ddbbe1576a0ef3128,2024-10-14T18:15:05.323000
CVE-2024-48791,1,1,9ad30c1d188d7db43e25626cfed907eb29cd4a02dd903861370ef046be560a27,2024-10-14T18:15:05.420000
CVE-2024-48792,1,1,b0a9215b342225ce7704838f7f4c2596ad3588455e6f3d7e3207337c7025ccac,2024-10-14T18:15:05.520000
CVE-2024-48793,1,1,3470fd35bb5bb600bfdc8ad59a815c1314223a35d16eb72c69bb7a341d166458,2024-10-14T18:15:05.620000
CVE-2024-48795,1,1,f11405ce0a78a5199503fe7a48897f37ce37a249acf7cf38f391d3859ee7938c,2024-10-14T18:15:05.717000
CVE-2024-48796,0,0,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000
CVE-2024-48797,0,0,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000
CVE-2024-48798,0,0,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000
CVE-2024-48799,0,0,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000
CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000
CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
@ -263514,8 +263530,8 @@ CVE-2024-6758,0,0,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82f
CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
CVE-2024-6762,1,1,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000
CVE-2024-6763,1,1,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000
CVE-2024-6762,0,0,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000
CVE-2024-6763,0,0,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000
@ -264611,7 +264627,7 @@ CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8184,1,1,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000
CVE-2024-8184,0,0,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000
CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
@ -265205,7 +265221,7 @@ CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a
CVE-2024-9137,0,0,9065b9986e350cb1955cfbec462f81d3d3a9a0cca2dc3d030de4540532f9abca,2024-10-14T09:15:04.403000
CVE-2024-9139,0,0,09eb3f13c3e60192800512c2b76c94742b9d9d7d743e90f5437ddfac8bcedf34,2024-10-14T09:15:04.693000
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
CVE-2024-9142,0,1,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000
CVE-2024-9142,0,0,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000
CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000
CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
@ -265479,7 +265495,7 @@ CVE-2024-9817,0,0,aa4071cf5ce97bf162c1cca4a7f07d25d51157e1698481fe4534c2979d4a7e
CVE-2024-9818,0,0,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000
CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000
CVE-2024-9822,0,0,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000
CVE-2024-9823,0,1,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000
CVE-2024-9823,0,0,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000
CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000

Can't render this file because it is too large.