Auto-Update: 2024-09-20T12:00:19.201621+00:00

This commit is contained in:
cad-safe-bot 2024-09-20 12:03:18 +00:00
parent 57bd7c2160
commit 5e62f52399
8 changed files with 121 additions and 57 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0550",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2022-03-24T15:15:07.853",
"lastModified": "2024-05-28T11:15:09.800",
"lastModified": "2024-09-20T11:15:12.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -22,15 +22,15 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
@ -55,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"baseScore": 8.6,
"baseSeverity": "HIGH"
}
}
],
@ -86,20 +86,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0551",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2022-03-24T15:15:07.917",
"lastModified": "2024-05-28T11:15:09.963",
"lastModified": "2024-09-20T11:15:12.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -22,15 +22,15 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
@ -55,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"baseScore": 8.6,
"baseSeverity": "HIGH"
}
}
],
@ -86,20 +86,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-29245",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2023-09-19T11:16:18.100",
"lastModified": "2024-05-28T13:15:09.717",
"lastModified": "2024-09-20T11:15:12.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.\n\nMalicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data."
"value": "A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.\n\nMalicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32649",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2023-09-19T11:16:20.297",
"lastModified": "2024-05-28T13:15:09.970",
"lastModified": "2024-09-20T11:15:13.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -120,7 +120,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-1286"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-3044",
"sourceIdentifier": "security@documentfoundation.org",
"published": "2024-05-14T21:15:12.627",
"lastModified": "2024-06-10T17:16:32.823",
"lastModified": "2024-09-20T10:15:02.620",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.\n"
"value": "Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted."
},
{
"lang": "es",
@ -23,7 +23,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-356"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9043",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-20T11:15:13.280",
"lastModified": "2024-09-20T11:15:13.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8103-b0568-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8102-b94a9-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-20T10:00:25.352138+00:00
2024-09-20T12:00:19.201621+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-20T09:15:02.363000+00:00
2024-09-20T11:15:13.280000+00:00
```
### Last Data Feed Release
@ -33,22 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263484
263485
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
- [CVE-2024-41721](CVE-2024/CVE-2024-417xx/CVE-2024-41721.json) (`2024-09-20T08:15:11.323`)
- [CVE-2024-8853](CVE-2024/CVE-2024-88xx/CVE-2024-8853.json) (`2024-09-20T08:15:11.493`)
- [CVE-2024-9043](CVE-2024/CVE-2024-90xx/CVE-2024-9043.json) (`2024-09-20T11:15:13.280`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `5`
- [CVE-2023-36268](CVE-2023/CVE-2023-362xx/CVE-2023-36268.json) (`2024-09-20T09:15:02.363`)
- [CVE-2022-0550](CVE-2022/CVE-2022-05xx/CVE-2022-0550.json) (`2024-09-20T11:15:12.240`)
- [CVE-2022-0551](CVE-2022/CVE-2022-05xx/CVE-2022-0551.json) (`2024-09-20T11:15:12.710`)
- [CVE-2023-29245](CVE-2023/CVE-2023-292xx/CVE-2023-29245.json) (`2024-09-20T11:15:12.980`)
- [CVE-2023-32649](CVE-2023/CVE-2023-326xx/CVE-2023-32649.json) (`2024-09-20T11:15:13.117`)
- [CVE-2024-3044](CVE-2024/CVE-2024-30xx/CVE-2024-3044.json) (`2024-09-20T10:15:02.620`)
## Download and Usage

View File

@ -187969,8 +187969,8 @@ CVE-2022-0545,0,0,5f8a902dafd6159ee1d3d3abd2a4f5b604bb9b4301573e6f3b22aad99ae5d3
CVE-2022-0546,0,0,110cebfdd6ff13b7140a9f3862078ce3df8bb49e7dcbf8ed64d7ab7bfd8aac29,2023-11-07T03:41:22.280000
CVE-2022-0547,0,0,b87b8392b3086ad91a3af0001d2269bbce828f61152c5d8341fb948ac5e5345a,2023-11-07T03:41:22.420000
CVE-2022-0549,0,0,c8f2d7aed0ece1e7b596fa13ddc848f0d71a04920cd68f4bdcce9ec0950f53e7,2022-04-04T19:20:43.360000
CVE-2022-0550,0,0,ce68a9292504973c8ee17153be1c78cd39a94db0e7ceac03da15169e07b92fab,2024-05-28T11:15:09.800000
CVE-2022-0551,0,0,9116424b79d96a144503720a4cf8aecec469a75f78ca1e2e13dee4d6b0821819,2024-05-28T11:15:09.963000
CVE-2022-0550,0,1,a0c8b7edb7cbce39e0d777c3bda74069fa0c147dacadcf789b1ee438f4cae601,2024-09-20T11:15:12.240000
CVE-2022-0551,0,1,4ff57a2b595221d06aa6dc5f20d03e0d7e4718d56501ec37e0d6929ec2e8b4ac,2024-09-20T11:15:12.710000
CVE-2022-0552,0,0,183966929729f1900aeaee14e729366e475542a470c3c6adf97292b1287b8219,2023-02-12T22:15:20.927000
CVE-2022-0553,0,0,eed26d5cca99613afef4048e1fbd59fc96d9663c11ef0875849b479a57848b49,2023-07-21T17:13:15.200000
CVE-2022-0554,0,0,0eb14a07a96409838a6e7dedeed6bfe6613c4cc8748340c9ac1a656a21845e81,2023-11-07T03:41:22.640000
@ -222157,7 +222157,7 @@ CVE-2023-29241,0,0,0332e7b930ff4304668a7a896000a21892f2828fad91c89c531554546ff13
CVE-2023-29242,0,0,b61b510d1f58b7f0d5a338add68b354218b1c2308336d527a49331a9e2d27196,2023-11-07T04:11:07.910000
CVE-2023-29243,0,0,8725de0b480e293af5f5e87a983092ba629b47c9b3a192ae1fceec5139111ba1,2023-11-07T04:11:08.053000
CVE-2023-29244,0,0,fd105b38b3d195c238b5968b40ac7f34e4f4dc15ba8cf11199615ee5ac2d2d49,2024-01-30T15:17:47.337000
CVE-2023-29245,0,0,0ca0b2361803a7ac20626199514a7eb2ecc0c0d0034bd735fb085330a1b87d2f,2024-05-28T13:15:09.717000
CVE-2023-29245,0,1,36663441326991b70a4a638f7835ab4b96bdc7534da1afdff5817a73607c1710,2024-09-20T11:15:12.980000
CVE-2023-29246,0,0,66dc05c67373539e60513d12bb8d5ea5cbab81162146e8ad3ad6542b8a2951e0,2023-05-22T14:55:15.440000
CVE-2023-29247,0,0,bb0e3571a900cf515f84f932527ebb6318ef77da20d3db85fc0074ca4d75811e,2023-05-11T23:24:54.837000
CVE-2023-2925,0,0,6dfd7b78d36e2a725703c314ea807457e2096a4bbbc04df212c7a1d27031a788,2024-05-17T02:23:22.303000
@ -224670,7 +224670,7 @@ CVE-2023-32644,0,0,a354953f4dc4989b7b46cb55cf08179c3a1e29618db34fa29ce42ae9c36e2
CVE-2023-32645,0,0,857d6cc902eefc1d9512ca3bece7549ec7eef38c002db86a230c5d650c8de20d,2023-10-12T22:27:09.257000
CVE-2023-32646,0,0,f6b1530f5a486f7b373de01025884669df82841c6297142c889d164b769a0a22,2024-02-14T15:01:51.137000
CVE-2023-32647,0,0,4e49ef2dce5500c3745634f186eda67b3ba6efb3ab14954d1408922ffebd0d1b,2024-02-14T15:01:51.137000
CVE-2023-32649,0,0,3eeda4649a3d8c9a74fdb6b317ca0a5456c1ef9a0ae897aa32281936f56efa65,2024-05-28T13:15:09.970000
CVE-2023-32649,0,1,22b9514becd10eb679dd28ac11c5883dd073215affaee5996a16965af56cdacc,2024-09-20T11:15:13.117000
CVE-2023-3265,0,0,471c4818cf3d140a8514e2ffc1948be656fcb1771a62c82080073ff1643bcfa6,2023-08-22T16:20:24.977000
CVE-2023-32650,0,0,bebe035dcd601dd36e4c165904cd4a21f7ee809614ac45add18da3be91ede908,2024-04-09T21:15:08.027000
CVE-2023-32651,0,0,e84751d5182835b1a5435aa440dd49d94cb9c7b164bddde42f31052d1248666d,2024-02-14T15:01:51.137000
@ -227228,7 +227228,7 @@ CVE-2023-36260,0,0,d91b3f2df1f07bb3d30f5175114e7ff10cf2983876f42068fd4e8dd27cbdc
CVE-2023-36262,0,0,7c84450336c4990e953dce7f54829dc2d1c7e2f75088550f331d29067052f2ae,2023-11-07T04:16:25.310000
CVE-2023-36263,0,0,b1242ace1d95cf1012522f675dbb699d27209303b5ae9e0cf837454186858e60,2024-09-06T18:35:03.833000
CVE-2023-36266,0,0,aebe7aeee850e04c73221b72dc4edaeb825715c758ae43df23e46e458b69eb85,2024-08-02T17:16:00.130000
CVE-2023-36268,0,1,0d36957fbc7e5c71861a4d41ac1aa9c2b2b9fdb7a1080f5312f94994107e995a,2024-09-20T09:15:02.363000
CVE-2023-36268,0,0,0d36957fbc7e5c71861a4d41ac1aa9c2b2b9fdb7a1080f5312f94994107e995a,2024-09-20T09:15:02.363000
CVE-2023-3627,0,0,4ace1272386b5faa006e0f4e34aebe17762337fac3ef2a63c17791c405fa06d3,2023-07-18T19:58:32.613000
CVE-2023-36271,0,0,003efbeef2bd5a83160f4c75c748ebebf68aae3263994871e0ae346b564ea886,2023-06-27T12:18:30.333000
CVE-2023-36272,0,0,b40f5b0a455b9096df3ff383271d067f7a04c5792cad2e87f448c1960a80da86,2023-06-27T12:18:19.927000
@ -250423,7 +250423,7 @@ CVE-2024-30436,0,0,f0e2a7c55294659d9b68ad5c141c1d73e6db3e952470b7608d93d70ce69e7
CVE-2024-30437,0,0,d5da299b996b0ba716b2584fb41394a98fe95a89809181bf72c09bf7480a74ba,2024-04-01T01:12:59.077000
CVE-2024-30438,0,0,97ea6b8f8aa80291648f1edf6ecedc8ad2b8831adb55a9f2824704b938eeb386,2024-04-01T01:12:59.077000
CVE-2024-30439,0,0,bb9a23babf5241450e44866fbe0fadf27f92acd779b0e6450c3ad24b3dc56aa0,2024-04-01T01:12:59.077000
CVE-2024-3044,0,0,80cba9d327d80e1c11617bbe93ddf860e81ab6aff9aa8b0238cabec93cd3a10d,2024-06-10T17:16:32.823000
CVE-2024-3044,0,1,0af519ef5bb67073d6c106a5182120b4e7df2c752508af2031107535842b59b3,2024-09-20T10:15:02.620000
CVE-2024-30440,0,0,1faf88fa48a4f6cc8c516503e0314d6e98ae7ec825707099ef9873385afd611f,2024-04-01T01:12:59.077000
CVE-2024-30441,0,0,89b66b83bf93700c5885e6ba0fffb52aebbf8ef8fe82baeb737af3c7229b04d6,2024-04-01T01:12:59.077000
CVE-2024-30442,0,0,000be18b759c476ecf3dd48b77b6402af1ae7c1591716e0862d0f031f46eccb8,2024-04-01T01:12:59.077000
@ -257927,7 +257927,7 @@ CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000
CVE-2024-41721,1,1,fbe947beac5451084e31ee7ef479c810f14ce86ff43bb34bde8771ee906b776f,2024-09-20T08:15:11.323000
CVE-2024-41721,0,0,fbe947beac5451084e31ee7ef479c810f14ce86ff43bb34bde8771ee906b776f,2024-09-20T08:15:11.323000
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000
@ -263435,7 +263435,7 @@ CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c94343
CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
CVE-2024-8850,0,0,93c3effab202541418248ca686b83b93e9ac19fd90a1ab3c2b19a3b5c06db2e1,2024-09-19T04:15:06.557000
CVE-2024-8853,1,1,5aa5f44c2d0058c33afc2b050a9e181c9b858d177768260824607f55817a7dba,2024-09-20T08:15:11.493000
CVE-2024-8853,0,0,5aa5f44c2d0058c33afc2b050a9e181c9b858d177768260824607f55817a7dba,2024-09-20T08:15:11.493000
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000
CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000
CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000
@ -263483,3 +263483,4 @@ CVE-2024-9007,0,0,2ed00ba09d6346ca52405d737f1ea8260825916d8ba14647aaa2678f5fb0a6
CVE-2024-9008,0,0,77d826e7c271663667c77c9a7532359cf4fc0e1d0af525ca0cfcca90765539f1,2024-09-19T23:15:13.100000
CVE-2024-9009,0,0,1ac9519eafc6cbe08b36770826cf44fb97f8235af1e3cf50c2fc809ba50e6294,2024-09-20T00:15:03.997000
CVE-2024-9011,0,0,4c216b753b208d079d0b75681eff478970bf3c3611602e4dca6410c6d6e1d6d5,2024-09-20T01:15:10.550000
CVE-2024-9043,1,1,fb2d62a3b3fd8a916328179a28239b80c650861677979e64aa76c84487b42f8c,2024-09-20T11:15:13.280000

Can't render this file because it is too large.