Auto-Update: 2024-11-15T03:00:20.217619+00:00

This commit is contained in:
cad-safe-bot 2024-11-15 03:03:23 +00:00
parent b3d84cd2b5
commit 570bac3979
6 changed files with 103 additions and 35 deletions

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-11120",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-15T02:15:17.757",
"lastModified": "2024-11-15T02:15:17.757",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-52308",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-14T23:15:05.727",
"lastModified": "2024-11-14T23:15:05.727",
"lastModified": "2024-11-15T01:15:03.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image](https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration). GitHub CLI [retrieves SSH connection details](https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244), such as remote username, which is used in [executing `ssh` commands](https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used."
"value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image]( https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-... https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration) . GitHub CLI [retrieves SSH connection details]( https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/inv... https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244 ), such as remote username, which is used in [executing `ssh` commands]( https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L2... https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263 ) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used."
}
],
"metrics": {

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-9463",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-10-09T17:15:19.973",
"lastModified": "2024-10-15T15:05:25.997",
"lastModified": "2024-11-15T02:00:01.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-11-14",
"cisaActionDue": "2024-12-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Palo Alto Networks Expedition OS Command Injection Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-9465",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-10-09T17:15:20.287",
"lastModified": "2024-10-17T06:15:04.510",
"lastModified": "2024-11-15T02:00:01.687",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-11-14",
"cisaActionDue": "2024-12-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Palo Alto Networks Expedition SQL Injection Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-15T00:55:42.101322+00:00
2024-11-15T03:00:20.217619+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-14T23:23:52.997000+00:00
2024-11-15T02:15:17.757000+00:00
```
### Last Data Feed Release
@ -27,37 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-11-14T01:00:10.090725+00:00
2024-11-15T01:00:10.103322+00:00
```
### Total Number of included CVEs
```plain
269788
269789
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `1`
- [CVE-2017-13227](CVE-2017/CVE-2017-132xx/CVE-2017-13227.json) (`2024-11-14T23:15:05.013`)
- [CVE-2024-41206](CVE-2024/CVE-2024-412xx/CVE-2024-41206.json) (`2024-11-14T23:15:05.197`)
- [CVE-2024-41209](CVE-2024/CVE-2024-412xx/CVE-2024-41209.json) (`2024-11-14T23:15:05.277`)
- [CVE-2024-41217](CVE-2024/CVE-2024-412xx/CVE-2024-41217.json) (`2024-11-14T23:15:05.370`)
- [CVE-2024-49776](CVE-2024/CVE-2024-497xx/CVE-2024-49776.json) (`2024-11-14T23:15:05.457`)
- [CVE-2024-49777](CVE-2024/CVE-2024-497xx/CVE-2024-49777.json) (`2024-11-14T23:15:05.547`)
- [CVE-2024-49778](CVE-2024/CVE-2024-497xx/CVE-2024-49778.json) (`2024-11-14T23:15:05.643`)
- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-14T23:15:05.727`)
- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-14T23:15:05.967`)
- [CVE-2024-11120](CVE-2024/CVE-2024-111xx/CVE-2024-11120.json) (`2024-11-15T02:15:17.757`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
- [CVE-2024-48428](CVE-2024/CVE-2024-484xx/CVE-2024-48428.json) (`2024-11-14T23:15:02.760`)
- [CVE-2024-49381](CVE-2024/CVE-2024-493xx/CVE-2024-49381.json) (`2024-11-14T23:04:21.637`)
- [CVE-2024-51377](CVE-2024/CVE-2024-513xx/CVE-2024-51377.json) (`2024-11-14T23:23:52.997`)
- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-15T01:15:03.740`)
- [CVE-2024-9463](CVE-2024/CVE-2024-94xx/CVE-2024-9463.json) (`2024-11-15T02:00:01.687`)
- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-11-15T02:00:01.687`)
## Download and Usage

View File

@ -96969,7 +96969,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
CVE-2017-13227,1,1,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000
CVE-2017-13227,0,0,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
@ -243095,6 +243095,7 @@ CVE-2024-11115,0,0,6752a3f15fe7742272035ac5069774108f37f03dae8259d5e310243c06e07
CVE-2024-11116,0,0,50b6a7b0baae7d93d967770820ad4acb1265e0c8d7e355f7414e720fb7141658,2024-11-13T17:01:16.850000
CVE-2024-11117,0,0,44ab0c5f984ce9aed4e52f00adac2e7b146a348c1dbadd3cdaa1ba5594ee10da,2024-11-13T17:01:16.850000
CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000
CVE-2024-11120,1,1,419abe138b2f7cd49e5a7bf2988b4cdc20f78889f5b3881f13b8849759bcb762,2024-11-15T02:15:17.757000
CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000
CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000
CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000
@ -259573,10 +259574,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000
CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000
CVE-2024-41206,1,1,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000
CVE-2024-41209,1,1,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000
CVE-2024-41206,0,0,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000
CVE-2024-41209,0,0,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
CVE-2024-41217,1,1,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000
CVE-2024-41217,0,0,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000
CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000
@ -264142,7 +264143,7 @@ CVE-2024-48424,0,0,40269a486047942b0c54d704b8b037cd3035d9ce415f6a7c6672231218b45
CVE-2024-48425,0,0,b7eeb0390e7509460e2ea67ebb1efb7a20815aad1587b963750ef8a2fc35ee7d,2024-10-28T19:35:28.823000
CVE-2024-48426,0,0,22eae115788dfb6a3644903c8f26a6434c39a09ebbab312f7ce1d4567eeebedc,2024-10-29T20:35:31.967000
CVE-2024-48427,0,0,7d45011eb8c4b754b119852367badea7e81893db34682583fff9c26b665752d1,2024-10-31T00:07:25.997000
CVE-2024-48428,0,1,aa3d04fa35bedb24aa57faf7fb824ad94ab29d91873983596e253a94900b8c80,2024-11-14T23:15:02.760000
CVE-2024-48428,0,0,aa3d04fa35bedb24aa57faf7fb824ad94ab29d91873983596e253a94900b8c80,2024-11-14T23:15:02.760000
CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000
CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000
CVE-2024-48440,0,0,3e5da93f3d98711cf31668d28b9aca8f0ae7e630b3695e355db661d67a615b49,2024-10-25T20:35:11.890000
@ -264580,7 +264581,7 @@ CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea
CVE-2024-49378,0,0,09a13f2bc12578e659c5acb1c73f93e5796dca0b69672708f3a85d0256e97128,2024-10-28T13:58:09.230000
CVE-2024-49379,0,0,3d849c956546825875132535f54762320e63df7b50f3a78cf46a30babea614e8,2024-11-14T16:35:15.103000
CVE-2024-49380,0,0,f56d412280c28c68a65e58c4bcb66239a0fd300a5ecc1079da487338d842284a,2024-10-28T13:58:09.230000
CVE-2024-49381,0,1,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000
CVE-2024-49381,0,0,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
@ -264775,9 +264776,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0
CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000
CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000
CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000
CVE-2024-49776,1,1,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000
CVE-2024-49777,1,1,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000
CVE-2024-49778,1,1,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000
CVE-2024-49776,0,0,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000
CVE-2024-49777,0,0,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000
CVE-2024-49778,0,0,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000
CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000
CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
@ -265660,7 +265661,7 @@ CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,1,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
CVE-2024-51379,0,0,2ac9e22a4ada4c046a62bb7cfce4898a690b6639726f7e96ec64275e3571bb6f,2024-11-06T18:17:17.287000
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
@ -266037,7 +266038,7 @@ CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc331191
CVE-2024-52302,0,0,bec456bb6d847ca2f982f444c73f49a605fb31e8a54bf47ab023a23471898db3,2024-11-14T16:15:20.087000
CVE-2024-52305,0,0,dc609877fc9dfb62c6c6bc68486e8898c1a92ac08e89f322ce436991076d7cdb,2024-11-13T19:15:08.853000
CVE-2024-52306,0,0,59f18663771ceab92cba47c3e31ee5dd3eed1ee3c6f7144187a60ded4a98f970,2024-11-13T17:01:16.850000
CVE-2024-52308,1,1,ce2fe749d6574c45534f7ff28c650824fb22a37edc3670a723e9f9b4e7f78f2f,2024-11-14T23:15:05.727000
CVE-2024-52308,0,1,5f2903faaa6af73bb516cae7a392d6b05fcfeb189ded112b08497d75479336bb,2024-11-15T01:15:03.740000
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000
@ -266112,7 +266113,7 @@ CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
CVE-2024-52613,1,1,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000
CVE-2024-52613,0,0,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b29768e,2024-06-21T17:18:00.973000
@ -269464,9 +269465,9 @@ CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8e
CVE-2024-9459,0,0,f79fcf5e24399662f2c8fe8a61d79ad22521a784ff705bf6fa7dcce2b4df0ff8,2024-11-06T15:29:04.917000
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000
CVE-2024-9463,0,0,833fbe5400df3e16652b73757d66400db6c2e58ea10075ce0e9e52ee535a69f7,2024-10-15T15:05:25.997000
CVE-2024-9463,0,1,4113bfcc0359b86f4600f4bd332ad0fb25180b65c5beb0ba03a5a18a0d79965c,2024-11-15T02:00:01.687000
CVE-2024-9464,0,0,2a950a39fbd8d03d9c46c09cf06c881d311182236743fa872a3d09d866901a80,2024-10-17T06:15:04.190000
CVE-2024-9465,0,0,b0530209090d1bed821bb19c0251bb2e431fffeec23de7704111ce15419a57a6,2024-10-17T06:15:04.510000
CVE-2024-9465,0,1,4ecfaf32a41dbb8eba12ed8cfc02218dbd1e623e37487ebd8f09d7020eb91be6,2024-11-15T02:00:01.687000
CVE-2024-9466,0,0,fd9458b730d3a9a669f2d9d658488af28ef360506c84b0ff287be2e6f400846d,2024-10-17T06:15:04.720000
CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000
CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000

Can't render this file because it is too large.