Auto-Update: 2024-11-01T11:00:19.531042+00:00

This commit is contained in:
cad-safe-bot 2024-11-01 11:03:21 +00:00
parent 542f1198f5
commit 7ddefa6746
8 changed files with 273 additions and 25 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6942",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-01-30T09:15:47.757",
"lastModified": "2024-02-08T16:42:15.390",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-01T09:15:03.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, FR Configurator2 all versions, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 all versions, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6943",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-01-30T09:15:47.960",
"lastModified": "2024-02-08T16:41:51.857",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-01T09:15:03.837",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, FR Configurator2 all versions, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 all versions, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
},
{
"lang": "es",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10232",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-01T10:15:03.080",
"lastModified": "2024-11-01T10:15:03.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Group Chat & Video Chat by AtomChat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's atomchat shortcode in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3178522/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/atomchat/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c10993bd-b4f3-44b6-bb0f-cb783dbcf314?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10651",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-01T10:15:04.600",
"lastModified": "2024-11-01T10:15:04.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrator privileges to exploit this vulnerability to read arbitrary system files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8171-29297-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8170-48a4e-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10652",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-01T10:15:04.877",
"lastModified": "2024-11-01T10:15:04.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IDExpert from CHANGING Information Technology does not properly validate a parameter for a specific functionality, allowing unauthenticated remote attackers to inject JavsScript code and perform Reflected Cross-site scripting attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8173-f8bbc-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8172-a02cc-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10653",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-01T10:15:05.103",
"lastModified": "2024-11-01T10:15:05.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrative privileges to inject and execute OS commands on the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8175-57245-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8174-a17fd-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-01T09:00:19.760358+00:00
2024-11-01T11:00:19.531042+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-01T08:35:14.437000+00:00
2024-11-01T10:15:05.103000+00:00
```
### Last Data Feed Release
@ -33,25 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267793
267797
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `4`
- [CVE-2024-7424](CVE-2024/CVE-2024-74xx/CVE-2024-7424.json) (`2024-11-01T08:15:11.647`)
- [CVE-2024-9655](CVE-2024/CVE-2024-96xx/CVE-2024-9655.json) (`2024-11-01T08:15:12.047`)
- [CVE-2024-10232](CVE-2024/CVE-2024-102xx/CVE-2024-10232.json) (`2024-11-01T10:15:03.080`)
- [CVE-2024-10651](CVE-2024/CVE-2024-106xx/CVE-2024-10651.json) (`2024-11-01T10:15:04.600`)
- [CVE-2024-10652](CVE-2024/CVE-2024-106xx/CVE-2024-10652.json) (`2024-11-01T10:15:04.877`)
- [CVE-2024-10653](CVE-2024/CVE-2024-106xx/CVE-2024-10653.json) (`2024-11-01T10:15:05.103`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `2`
- [CVE-2021-47078](CVE-2021/CVE-2021-470xx/CVE-2021-47078.json) (`2024-11-01T08:35:01.573`)
- [CVE-2023-45896](CVE-2023/CVE-2023-458xx/CVE-2023-45896.json) (`2024-11-01T08:35:03.997`)
- [CVE-2024-26894](CVE-2024/CVE-2024-268xx/CVE-2024-26894.json) (`2024-11-01T08:35:09.973`)
- [CVE-2024-48237](CVE-2024/CVE-2024-482xx/CVE-2024-48237.json) (`2024-11-01T08:35:14.437`)
- [CVE-2023-6942](CVE-2023/CVE-2023-69xx/CVE-2023-6942.json) (`2024-11-01T09:15:03.067`)
- [CVE-2023-6943](CVE-2023/CVE-2023-69xx/CVE-2023-6943.json) (`2024-11-01T09:15:03.837`)
## Download and Usage

View File

@ -187000,7 +187000,7 @@ CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece78
CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
CVE-2021-47078,0,1,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
CVE-2021-47079,0,0,0fdf09d917088dbab8085d0fa49a84cd4b4756a3cecc44c63f7f393d13877289,2024-03-01T22:22:25.913000
CVE-2021-47080,0,0,37f5be84057b2b7143e8efca1bf959654367bf74dea826635ad8969b16f72a22,2024-03-01T22:22:25.913000
CVE-2021-47081,0,0,fa9e53fcea8371f1d81146e970b4908deb3f6d5f71952985438c27e9598afcd2,2024-03-01T22:22:25.913000
@ -234561,7 +234561,7 @@ CVE-2023-4589,0,0,5823a1bbdcd3fd3dad6a9d361ad6771c5169f34ce23ef9e39b305d1aaf66a9
CVE-2023-45892,0,0,31ea99a81b63e5dc5404654e4231556ec48f5c4f723835f37c58ea694f43c518,2024-01-08T19:31:03.043000
CVE-2023-45893,0,0,8d1a5a8422c61644ae8727f2e16c55cf2cebb8170e0670e9c625ddf903cfff6b,2024-09-06T18:35:05.837000
CVE-2023-45894,0,0,acbbd0369c677d90271e9d43ae921ffda1b227f19a0c24cf767e01f00c88765f,2023-12-20T16:44:29.960000
CVE-2023-45896,0,1,574edb4c4981d990f2925fa7a7bc3ce022e38048f9e267255e3b9d1b20597db1,2024-11-01T08:35:03.997000
CVE-2023-45896,0,0,574edb4c4981d990f2925fa7a7bc3ce022e38048f9e267255e3b9d1b20597db1,2024-11-01T08:35:03.997000
CVE-2023-45897,0,0,734daadcbcf83a77d0375bea2b59862190723c5d109c64b97c90f46f832ac6a4,2023-11-21T16:33:02.183000
CVE-2023-45898,0,0,f3261a8736c0c34cdaa65c9211bd18854b9e3c8fbb8c9c8e0fd98bdbf7fab3eb,2024-08-26T16:07:21.753000
CVE-2023-45899,0,0,8ea5b9ddd2874024b78e9d2dcda12439e81d1dbfe77d0f8413dab38e7cc66b6f,2023-11-08T16:54:12.307000
@ -241144,8 +241144,8 @@ CVE-2023-6938,0,0,11f80052b936c04b9e187c3b789917daa425ce7825b2d97a007c8789d5c880
CVE-2023-6939,0,0,2170380787311a69988ea99fc8c330e3c06fd6984ac65df2b46bcfe4a9228a04,2024-01-05T16:07:36.623000
CVE-2023-6940,0,0,493881701dcc8fc97ee3d5ebe7c0e0a9f858a0655fb1ba83e833896ba45009d6,2023-12-29T16:58:04.290000
CVE-2023-6941,0,0,c9be07ef3de50232aec1e099fa7bd8488a030b429a8a0b5beb0f3ee1763b1559,2024-01-19T19:34:11.820000
CVE-2023-6942,0,0,8e62f70d02dc4963dbf5d24506f89a94f3488239bc1bd3aea336e379510bb11c,2024-02-08T16:42:15.390000
CVE-2023-6943,0,0,de80e866da92cf22bf567aa2263f519c2f2ce46b3cf6efd9485b0072ebafaebf,2024-02-08T16:41:51.857000
CVE-2023-6942,0,1,f478deb6c2162412c06c372ac0b7e6b1c92c09fe3ab026b82f90eefa775c50ce,2024-11-01T09:15:03.067000
CVE-2023-6943,0,1,1a8a3b81e8d8731b7ee3a07f3dcf56fb695f520d19c115b4e798870b26d955d4,2024-11-01T09:15:03.837000
CVE-2023-6944,0,0,b5d2d87fcb2c2ce3c8396de2080c9963aeb1e9a189e97ae4f9bb82eab217349c,2024-02-04T20:15:46.650000
CVE-2023-6945,0,0,4d4e197e57ce0c0a12a32b3d201450bb49cb1ee7fc52a5178125c8abda73fdea,2024-05-17T02:34:01.610000
CVE-2023-6946,0,0,0fb93ff65377878fd63e0701dc37881508b51e13c75cd51aae76c0d1bace0216,2024-02-03T00:24:34.007000
@ -242489,6 +242489,7 @@ CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca5
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
CVE-2024-10230,0,0,5b2eed7a3522d994daba36d504e121d06d38d6b2f8f6bed6dcdcf2e92eeba1bb,2024-10-31T08:35:03.010000
CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000
CVE-2024-10232,1,1,436142ee172e51f4e3c620c7329dbf0e506996a8dbcdae4a86e8608acaa883f7,2024-11-01T10:15:03.080000
CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000
CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
@ -242697,6 +242698,9 @@ CVE-2024-10620,0,0,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b7777
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
CVE-2024-10651,1,1,da59d5c0421bc86f33ebd5415c6170d0dcce4244a867c98aea962de2781dd2e1,2024-11-01T10:15:04.600000
CVE-2024-10652,1,1,83a9abc440cfb9319a0221697c7f614d48eaa1c6fd3e7fe87154fc598f071bd6,2024-11-01T10:15:04.877000
CVE-2024-10653,1,1,c09a5bde6c37950c4429def90de453bac730c850cdba2914bb7e431b14d8a4a4,2024-11-01T10:15:05.103000
CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e27a,2024-10-08T19:52:24.017000
CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
@ -248647,7 +248651,7 @@ CVE-2024-26890,0,0,442ddef52e9c264bc395f1d392f8e749c4361ea4cfc6bd82e29e835d19500
CVE-2024-26891,0,0,e75c6313f07c138ae9c36d0ab38fdf2f3dec2472492fc6c7e58e9f5d631654b1,2024-06-25T22:15:25.327000
CVE-2024-26892,0,0,806d8c2f00888544d8f546c55fd045afd90c70f07a594d3bdbeb1d45feddd5ff,2024-04-17T12:48:07.510000
CVE-2024-26893,0,0,547eb928978e29d7450e4ec7a0bc4d561c68a6c3cc4baa1bf0cc2f44e81b2c80,2024-04-17T12:48:07.510000
CVE-2024-26894,0,1,e26952696ebbc603ce79e51fc62ca290fe74c2a9ed69fdd0de0954b1e9696e0f,2024-11-01T08:35:09.973000
CVE-2024-26894,0,0,e26952696ebbc603ce79e51fc62ca290fe74c2a9ed69fdd0de0954b1e9696e0f,2024-11-01T08:35:09.973000
CVE-2024-26895,0,0,b9dd891a5343b75d81278d18982d49da18e6241368343883e4b0512359c9b37f,2024-06-25T23:15:27.080000
CVE-2024-26896,0,0,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000
CVE-2024-26897,0,0,f7f0ae7a29508e7fbb0b3fdfe5757c59953f0ebfc186579cd1f494f6556c9f6d,2024-06-25T23:15:27.180000
@ -262999,7 +263003,7 @@ CVE-2024-48233,0,0,5079087488de765c44b2e5efadc3adcfed6b8eb841374ab16026cf622181f
CVE-2024-48234,0,0,1a8d3e559037bd1781a9cae98ca9ac055b21e9cc548e55db5056102c863a9c6e,2024-10-29T19:35:19.743000
CVE-2024-48235,0,0,34c8dce734cf6a79d3c05c66d81a06f8b97a702d18a590252918c2829053c503,2024-10-29T19:35:20.530000
CVE-2024-48236,0,0,40c021b9ab0ef0fe1121c89c55613819f1f21cd79a305756de1a8bc6502d5e11,2024-10-29T19:35:21.310000
CVE-2024-48237,0,1,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f848,2024-11-01T08:35:14.437000
CVE-2024-48237,0,0,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f848,2024-11-01T08:35:14.437000
CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000
CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
@ -266057,7 +266061,7 @@ CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc0
CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000
CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000
CVE-2024-7424,1,1,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000
CVE-2024-7424,0,0,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000
CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000
CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000
CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000
@ -267619,7 +267623,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615
CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000
CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000
CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000
CVE-2024-9655,1,1,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000
CVE-2024-9655,0,0,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000

Can't render this file because it is too large.