Auto-Update: 2024-11-01T07:00:32.139590+00:00

This commit is contained in:
cad-safe-bot 2024-11-01 07:03:35 +00:00
parent d1489d2582
commit 1dfef46495
8 changed files with 472 additions and 18 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0105",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-11-01T06:15:12.397",
"lastModified": "2024-11-01T06:15:12.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA ConnectX Firmware contains a vulnerability where an attacker may cause an improper handling of insufficient privileges issue. A successful exploit of this vulnerability may lead to denial of service, data tampering, and limited information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-274"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5562",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0106",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-11-01T06:15:12.883",
"lastModified": "2024-11-01T06:15:12.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit (DPU) contains a vulnerability where an attacker may cause an improper handling of insufficient privileges issue. A successful exploit of this vulnerability may lead to denial of service, data tampering, and limited information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-274"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5562",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10620",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-01T05:15:05.167",
"lastModified": "2024-11-01T05:15:05.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in knightliao Disconf 2.6.36. It has been classified as critical. This affects an unknown part of the file /api/config/list of the component Configuration Center. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/knightliao/disconf/issues/431",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/knightliao/disconf/issues/431#issue-2607011340",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282633",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282633",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.429927",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-21510",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-01T05:15:05.640",
"lastModified": "2024-11-01T05:15:05.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-807"
}
]
}
],
"references": [
{
"url": "https://github.com/sinatra/sinatra/blob/b626e2d82c23b4fde0b51782fd32ca27ccde1d1a/lib/sinatra/base.rb%23L319",
"source": "report@snyk.io"
},
{
"url": "https://github.com/sinatra/sinatra/blob/b626e2d82c23b4fde0b51782fd32ca27ccde1d1a/lib/sinatra/base.rb%23L323C1-L343C17",
"source": "report@snyk.io"
},
{
"url": "https://github.com/sinatra/sinatra/pull/2010",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-RUBY-SINATRA-6483832",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47939",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-01T05:15:05.950",
"lastModified": "2024-11-01T05:15:05.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow vulnerability exists in multiple Ricoh laser printers and MFPs which implement Web Image Monitor. If this vulnerability is exploited, receiving a specially crafted request created and sent by an attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition. As for the details of affected product names and versions, refer to the information provided by the vendor under [References]."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000011",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN87770340/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000011",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-49501",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-01T05:15:06.280",
"lastModified": "2024-11-01T05:15:06.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If this vulnerability is exploited, an attacker may access the program which is protected by Data Protection function."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU95685374",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-006_en.pdf",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/ja/OMSR-2024-006_ja.pdf",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-01T05:00:19.607308+00:00
2024-11-01T07:00:32.139590+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-01T04:15:10.897000+00:00
2024-11-01T06:15:12.883000+00:00
```
### Last Data Feed Release
@ -33,20 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267785
267791
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `6`
- [CVE-2024-10612](CVE-2024/CVE-2024-106xx/CVE-2024-10612.json) (`2024-11-01T03:15:02.617`)
- [CVE-2024-10613](CVE-2024/CVE-2024-106xx/CVE-2024-10613.json) (`2024-11-01T03:15:02.903`)
- [CVE-2024-10615](CVE-2024/CVE-2024-106xx/CVE-2024-10615.json) (`2024-11-01T03:15:03.180`)
- [CVE-2024-10616](CVE-2024/CVE-2024-106xx/CVE-2024-10616.json) (`2024-11-01T04:15:08.643`)
- [CVE-2024-10617](CVE-2024/CVE-2024-106xx/CVE-2024-10617.json) (`2024-11-01T04:15:09.100`)
- [CVE-2024-10618](CVE-2024/CVE-2024-106xx/CVE-2024-10618.json) (`2024-11-01T04:15:09.513`)
- [CVE-2024-10619](CVE-2024/CVE-2024-106xx/CVE-2024-10619.json) (`2024-11-01T04:15:10.897`)
- [CVE-2024-0105](CVE-2024/CVE-2024-01xx/CVE-2024-0105.json) (`2024-11-01T06:15:12.397`)
- [CVE-2024-0106](CVE-2024/CVE-2024-01xx/CVE-2024-0106.json) (`2024-11-01T06:15:12.883`)
- [CVE-2024-10620](CVE-2024/CVE-2024-106xx/CVE-2024-10620.json) (`2024-11-01T05:15:05.167`)
- [CVE-2024-21510](CVE-2024/CVE-2024-215xx/CVE-2024-21510.json) (`2024-11-01T05:15:05.640`)
- [CVE-2024-47939](CVE-2024/CVE-2024-479xx/CVE-2024-47939.json) (`2024-11-01T05:15:05.950`)
- [CVE-2024-49501](CVE-2024/CVE-2024-495xx/CVE-2024-49501.json) (`2024-11-01T05:15:06.280`)
### CVEs modified in the last Commit

View File

@ -241543,6 +241543,8 @@ CVE-2024-0101,0,0,6c543091c34f4a748deb2ce2cce2816a258ea3dcb0e0560ed0bed55e86ee09
CVE-2024-0102,0,0,aac583927adc7db5e6a95a28a1f19367ab609db53a34bc65219a25c1bce42b64,2024-09-16T19:37:37.487000
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000
CVE-2024-0105,1,1,60fd17b4603518f02d825b743a7f2e8102175b79226f47cc38be34ef2d2a380e,2024-11-01T06:15:12.397000
CVE-2024-0106,1,1,9729fc8649cbf920c9730e34e1ceb5586c73e24a7b31152ef501cc9836de7ac5,2024-11-01T06:15:12.883000
CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000
CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000
CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000
@ -242683,14 +242685,15 @@ CVE-2024-10609,0,0,4a253e2de772b41bcf57400e6453748537a73b07837de06981acbd92eeb5d
CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000
CVE-2024-10610,0,0,2b69dcf629a95a5c93096752e379fd396a70f9a4385e27ef639dd500f55ed8ce,2024-11-01T02:15:03.180000
CVE-2024-10611,0,0,0dc059b8fea51edc9a4a016e1565b56716d43af624a620398442be78de0e1439,2024-11-01T02:15:03.533000
CVE-2024-10612,1,1,473401f1413ed4c30a13b985357c004e3f0329f302fa2f793aa8c89d250fd04b,2024-11-01T03:15:02.617000
CVE-2024-10613,1,1,db600803fea4b3598e3f2ec59b8e8089b79df4696eb14867e497c02c0ffbfc80,2024-11-01T03:15:02.903000
CVE-2024-10615,1,1,5598bbbecea92579872d25f4594cc8e05b728268a97b59c4177392ba4af34dab,2024-11-01T03:15:03.180000
CVE-2024-10616,1,1,3801cead4085fec79891397ca179e71b9a36f8a71a931a7164184a6091ea6d4c,2024-11-01T04:15:08.643000
CVE-2024-10617,1,1,c115ebd9184b04fc7c1cf06aa9e26acdfffe6db202fbc33d47a11aa0aee63397,2024-11-01T04:15:09.100000
CVE-2024-10618,1,1,a0ee98e6f2a3bb5f39d4ca6b901dbbe1976515e97aa421510e0aab57a1e74106,2024-11-01T04:15:09.513000
CVE-2024-10619,1,1,5bf4086f57746e212e6ba5450810be6502ee6bcc7a030b63851d5cf33f5cbe7a,2024-11-01T04:15:10.897000
CVE-2024-10612,0,0,473401f1413ed4c30a13b985357c004e3f0329f302fa2f793aa8c89d250fd04b,2024-11-01T03:15:02.617000
CVE-2024-10613,0,0,db600803fea4b3598e3f2ec59b8e8089b79df4696eb14867e497c02c0ffbfc80,2024-11-01T03:15:02.903000
CVE-2024-10615,0,0,5598bbbecea92579872d25f4594cc8e05b728268a97b59c4177392ba4af34dab,2024-11-01T03:15:03.180000
CVE-2024-10616,0,0,3801cead4085fec79891397ca179e71b9a36f8a71a931a7164184a6091ea6d4c,2024-11-01T04:15:08.643000
CVE-2024-10617,0,0,c115ebd9184b04fc7c1cf06aa9e26acdfffe6db202fbc33d47a11aa0aee63397,2024-11-01T04:15:09.100000
CVE-2024-10618,0,0,a0ee98e6f2a3bb5f39d4ca6b901dbbe1976515e97aa421510e0aab57a1e74106,2024-11-01T04:15:09.513000
CVE-2024-10619,0,0,5bf4086f57746e212e6ba5450810be6502ee6bcc7a030b63851d5cf33f5cbe7a,2024-11-01T04:15:10.897000
CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000
CVE-2024-10620,1,1,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b77774f3,2024-11-01T05:15:05.167000
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
@ -244858,6 +244861,7 @@ CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15
CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000
CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000
CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000
CVE-2024-21510,1,1,9e00d286caa4b89f7c2914a724fdce91b68b92573be43bba3e8dc44b44508504,2024-11-01T05:15:05.640000
CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000
CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000
CVE-2024-21513,0,0,2cc4921b2e7cf735a4c6ffcd0f834de9cbd6a82ef6ed4bcebed2a92ed1ba3df5,2024-08-01T13:46:45.590000
@ -262867,6 +262871,7 @@ CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b3851
CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
CVE-2024-47939,1,1,7c5e0268339806dced4a5a853811407ac862fdbc263c3cb9e688a46627070a59,2024-11-01T05:15:05.950000
CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000
CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000
CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000
@ -263432,6 +263437,7 @@ CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c646
CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8ff8,2024-07-03T02:08:20.437000
CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000
CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000
CVE-2024-49501,1,1,9aa848e778f60fe9db1b1fa3af8d0466b3fa6c9448f942b1edef1bd152766d5d,2024-11-01T05:15:06.280000
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
CVE-2024-49579,0,0,85b8fb1168559e66181366d5ecd0a3cbf5d9385b3a23eb2296d97e9422fe6782,2024-10-18T12:52:33.507000

Can't render this file because it is too large.