Auto-Update: 2024-10-23T10:00:47.542907+00:00

This commit is contained in:
cad-safe-bot 2024-10-23 10:03:48 +00:00
parent af224e3c32
commit 85929855b0
6 changed files with 203 additions and 47 deletions

View File

@ -2,40 +2,15 @@
"id": "CVE-2022-48993",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:11.163",
"lastModified": "2024-10-21T20:15:11.163",
"vulnStatus": "Received",
"lastModified": "2024-10-23T09:15:02.593",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Use kzalloc() in fbcon_prepare_logo()\n\nA kernel built with syzbot's config file reported that\n\n scr_memcpyw(q, save, array3_size(logo_lines, new_cols, 2))\n\ncauses uninitialized \"save\" to be copied.\n\n ----------\n [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0\n [drm] Initialized vkms 1.0.0 20180514 for vkms on minor 1\n Console: switching to colour frame buffer device 128x48\n =====================================================\n BUG: KMSAN: uninit-value in do_update_region+0x4b8/0xba0\n do_update_region+0x4b8/0xba0\n update_region+0x40d/0x840\n fbcon_switch+0x3364/0x35e0\n redraw_screen+0xae3/0x18a0\n do_bind_con_driver+0x1cb3/0x1df0\n do_take_over_console+0x11cb/0x13f0\n fbcon_fb_registered+0xacc/0xfd0\n register_framebuffer+0x1179/0x1320\n __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n drm_fbdev_client_hotplug+0xbea/0xda0\n drm_fbdev_generic_setup+0x65e/0x9d0\n vkms_init+0x9f3/0xc76\n (...snipped...)\n\n Uninit was stored to memory at:\n fbcon_prepare_logo+0x143b/0x1940\n fbcon_init+0x2c1b/0x31c0\n visual_init+0x3e7/0x820\n do_bind_con_driver+0x14a4/0x1df0\n do_take_over_console+0x11cb/0x13f0\n fbcon_fb_registered+0xacc/0xfd0\n register_framebuffer+0x1179/0x1320\n __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n drm_fbdev_client_hotplug+0xbea/0xda0\n drm_fbdev_generic_setup+0x65e/0x9d0\n vkms_init+0x9f3/0xc76\n (...snipped...)\n\n Uninit was created at:\n __kmem_cache_alloc_node+0xb69/0x1020\n __kmalloc+0x379/0x680\n fbcon_prepare_logo+0x704/0x1940\n fbcon_init+0x2c1b/0x31c0\n visual_init+0x3e7/0x820\n do_bind_con_driver+0x14a4/0x1df0\n do_take_over_console+0x11cb/0x13f0\n fbcon_fb_registered+0xacc/0xfd0\n register_framebuffer+0x1179/0x1320\n __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n drm_fbdev_client_hotplug+0xbea/0xda0\n drm_fbdev_generic_setup+0x65e/0x9d0\n vkms_init+0x9f3/0xc76\n (...snipped...)\n\n CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.0-rc4-00356-g8f2975c2bb4c #924\n Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006\n ----------"
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/20e78b7d1c1019789d9754ad9246192916f1a3b4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9bbebc6aba72ece39a200c8141f44e68ba883877",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9d5126b574c9177ed9ca925e36f85a1e6ce80bd2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a6a00d7e8ffd78d1cdb7a43f1278f081038c638f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d9b53caf0191cee24afd05ca6c83ed873199b52d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e70a5724400a841c9857ee3d08dae4d6c53ee40d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10045",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T08:15:02.380",
"lastModified": "2024-10-23T08:15:02.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Transients Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.6. This is due to missing or incorrect nonce validation on the process_actions function. This makes it possible for unauthenticated attackers to delete transients via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/transients-manager/trunk/src/TransientsManager.php#L993",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3171619/transients-manager/trunk/src/TransientsManager.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03b8b5a2-979d-42d0-86f5-48ee73162d22?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43924",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-23T08:15:03.453",
"lastModified": "2024-10-23T08:15:03.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in dFactory Responsive Lightbox allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Responsive Lightbox: from n/a through 2.4.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/responsive-lightbox/wordpress-responsive-lightbox-gallery-plugin-2-4-7-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9530",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T08:15:03.770",
"lastModified": "2024-10-23T08:15:03.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.0 via private templates. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the contents of templates that are private."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3170536%40qi-addons-for-elementor%2Ftrunk&old=3159768%40qi-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dd93514-657c-4b04-931a-23f3d405fb88?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-23T08:01:03.514896+00:00
2024-10-23T10:00:47.542907+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-23T07:15:04.560000+00:00
2024-10-23T09:15:02.593000+00:00
```
### Last Data Feed Release
@ -33,25 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266772
266775
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `3`
- [CVE-2024-50066](CVE-2024/CVE-2024-500xx/CVE-2024-50066.json) (`2024-10-23T06:15:10.467`)
- [CVE-2024-9583](CVE-2024/CVE-2024-95xx/CVE-2024-9583.json) (`2024-10-23T07:15:03.283`)
- [CVE-2024-9829](CVE-2024/CVE-2024-98xx/CVE-2024-9829.json) (`2024-10-23T06:15:11.007`)
- [CVE-2024-9947](CVE-2024/CVE-2024-99xx/CVE-2024-9947.json) (`2024-10-23T07:15:04.560`)
- [CVE-2024-10045](CVE-2024/CVE-2024-100xx/CVE-2024-10045.json) (`2024-10-23T08:15:02.380`)
- [CVE-2024-43924](CVE-2024/CVE-2024-439xx/CVE-2024-43924.json) (`2024-10-23T08:15:03.453`)
- [CVE-2024-9530](CVE-2024/CVE-2024-95xx/CVE-2024-9530.json) (`2024-10-23T08:15:03.770`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `1`
- [CVE-2024-47725](CVE-2024/CVE-2024-477xx/CVE-2024-47725.json) (`2024-10-23T06:15:05.200`)
- [CVE-2024-47755](CVE-2024/CVE-2024-477xx/CVE-2024-47755.json) (`2024-10-23T06:15:09.873`)
- [CVE-2022-48993](CVE-2022/CVE-2022-489xx/CVE-2022-48993.json) (`2024-10-23T09:15:02.593`)
## Download and Usage

View File

@ -212608,7 +212608,7 @@ CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f
CVE-2022-48990,0,0,3a2954ab94b1ae268f2103031717e5cd66b63293be0497957927430422796f1a,2024-10-21T20:15:10.910000
CVE-2022-48991,0,0,4cac372f908915eff4a2f14085333fee8ccfc60c272553bbad63194353ac6319,2024-10-21T20:15:11
CVE-2022-48992,0,0,a185c5433dadef8240cfcea6cc8a4a4a82a0c0cf2662f7641eaa26136556ce4b,2024-10-21T20:15:11.067000
CVE-2022-48993,0,0,5aa3af78bd065f0af013cd1fb4d94533edc564b9a60328f12d905e342fdd3924,2024-10-21T20:15:11.163000
CVE-2022-48993,0,1,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000
CVE-2022-48994,0,0,ae9a0e662c2d06e42ad756bcc38ff1250f2e0fc04a2d3c1041611666ac57de19,2024-10-21T20:15:11.257000
CVE-2022-48995,0,0,9a7f2caabe7819fcd012ff7905ee1d1a731ebbb61bf233df1fb3ad06dedf80c2,2024-10-21T20:15:11.343000
CVE-2022-48996,0,0,e6ea1226a77c17a54021df252583a23884023a5a65c35af89fbcb61150e1c604,2024-10-21T20:15:11.423000
@ -242333,6 +242333,7 @@ CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3f
CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524766,2024-10-18T12:53:04.627000
CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000
CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000
CVE-2024-10045,1,1,684b23ba1478ca354d4193c989ef53c8da732b9eb767fc1b0f39a76acfbbd2ce,2024-10-23T08:15:02.380000
CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
CVE-2024-10055,0,0,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000
@ -260232,6 +260233,7 @@ CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c
CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000
CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000
CVE-2024-43922,0,0,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973fb9f,2024-09-19T21:44:49.453000
CVE-2024-43924,1,1,dfda955203fd41d6177bff7ef52e1a59af68f70d45c806a235ca1a775c73b4df,2024-10-23T08:15:03.453000
CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000
@ -262248,7 +262250,7 @@ CVE-2024-47721,0,0,04edd5df09b5c82f2a2feeea71eab7461d88f3c2fa180c2013bad25f1ea8d
CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000
CVE-2024-47723,0,0,e78b215d0cbedf337fc4d670e1844dbbd29b556e5053e7d66b95322a621daa0b,2024-10-21T17:09:45.417000
CVE-2024-47724,0,0,9c1d4dd363597ace78d1c7ebbef0e1f2e96a212b96b6a09618a577838f46fe1f,2024-10-21T17:09:45.417000
CVE-2024-47725,0,1,8d79cfc5f420589203ee56c1d45c4e18a5d4c2e87a501b10347996e89a7f75b1,2024-10-23T06:15:05.200000
CVE-2024-47725,0,0,8d79cfc5f420589203ee56c1d45c4e18a5d4c2e87a501b10347996e89a7f75b1,2024-10-23T06:15:05.200000
CVE-2024-47726,0,0,c446e3e2dffbcccbc0186f0322a85b4a05a0668ee60808d5804eca57a29d9a39,2024-10-21T17:09:45.417000
CVE-2024-47727,0,0,b4841d049fe7977d7ae76ed99e0c8291d4ff9401863cf2613bdea9ae7e9a1347,2024-10-21T17:09:45.417000
CVE-2024-47728,0,0,20d7130b4cb2af3704697b2735b8691238f821693df5a91fa37a4e7099218c8a,2024-10-21T17:09:45.417000
@ -262281,7 +262283,7 @@ CVE-2024-47751,0,0,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a
CVE-2024-47752,0,0,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000
CVE-2024-47753,0,0,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000
CVE-2024-47754,0,0,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000
CVE-2024-47755,0,1,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
CVE-2024-47756,0,0,eb155bc0ec662a964b2c66ddbb8cf663bac19d4776af4da61c75acb4f1c74b8d,2024-10-22T16:09:56.570000
CVE-2024-47757,0,0,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000
CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000
@ -263102,7 +263104,7 @@ CVE-2024-50062,0,0,6f5ca0ab24218bdc3a66845ef7a25d33f8fee4816aeb71f302bd0b77f4dbd
CVE-2024-50063,0,0,d759cd8b06ee26350df3838a67993a2f428080f68be3d878c568416e1030f14f,2024-10-21T20:15:18.360000
CVE-2024-50064,0,0,a9c0a9e4f0c519a4c22abec4357d9c45d0d914896a8ed6df430d438f3ba7542c,2024-10-21T20:15:18.440000
CVE-2024-50065,0,0,8b2909d6581c9e4861514583ddb674698f4fdfdf8c4f85ae747650769c9c2972,2024-10-21T20:15:18.520000
CVE-2024-50066,1,1,f285282ac4ec0f12fc9db20caf087bc402ef18a772b938e146fd347faa930bc5,2024-10-23T06:15:10.467000
CVE-2024-50066,0,0,f285282ac4ec0f12fc9db20caf087bc402ef18a772b938e146fd347faa930bc5,2024-10-23T06:15:10.467000
CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000
CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000
CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000
@ -266560,6 +266562,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296
CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000
CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000
CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000
CVE-2024-9530,1,1,a2d78cef2d630943931f7b4b12b5dbee1eb57e5382f2678c2e86faa781e217f7,2024-10-23T08:15:03.770000
CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000
CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
@ -266603,7 +266606,7 @@ CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5
CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000
CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000
CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000
CVE-2024-9583,1,1,4e2383151ac5b9c2acd8fcf3ac201e2935142bdaea8e4140c8c137167c2756dc,2024-10-23T07:15:03.283000
CVE-2024-9583,0,0,4e2383151ac5b9c2acd8fcf3ac201e2935142bdaea8e4140c8c137167c2756dc,2024-10-23T07:15:03.283000
CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000
CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000
CVE-2024-9588,0,0,6a3f9ab7e270d754b223fcdbf2cacc2d2bdde581661fe0dd749d86129cb2d158,2024-10-22T08:15:03.563000
@ -266687,7 +266690,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47
CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000
CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
CVE-2024-9829,1,1,d830908c21d8114fe90e9bd180eef5e6d1b9af8f4bd56c24f825c37f79c0df45,2024-10-23T06:15:11.007000
CVE-2024-9829,0,0,d830908c21d8114fe90e9bd180eef5e6d1b9af8f4bd56c24f825c37f79c0df45,2024-10-23T06:15:11.007000
CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000
CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
@ -266735,7 +266738,7 @@ CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425
CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000
CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000
CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000
CVE-2024-9947,1,1,740bc028aa20a59832eb7d25da2505972d1214d46e60732a3d1d1371d903a794,2024-10-23T07:15:04.560000
CVE-2024-9947,0,0,740bc028aa20a59832eb7d25da2505972d1214d46e60732a3d1d1371d903a794,2024-10-23T07:15:04.560000
CVE-2024-9951,0,0,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000
CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000
CVE-2024-9953,0,0,d45e8bc6b31e34e84fbff0a12af100dea5cf3de9adda836e3ebc3a7410262455,2024-10-17T20:59:01.940000

Can't render this file because it is too large.