Auto-Update: 2024-10-28T07:00:19.420329+00:00

This commit is contained in:
cad-safe-bot 2024-10-28 07:03:19 +00:00
parent 13c31ed6a5
commit 8688904c75
12 changed files with 188 additions and 52 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-33237", "id": "CVE-2023-33237",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-17T02:15:41.177", "published": "2023-08-17T02:15:41.177",
"lastModified": "2023-08-22T19:10:04.453", "lastModified": "2024-10-28T06:15:02.730",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "TN-5900 Series firmware version v3.3 and prior is vulnerable to improper-authentication vulnerability. This vulnerability arises from inadequate authentication measures implemented in the web API handler, allowing low-privileged APIs to execute restricted actions that only high-privileged APIs are allowed This presents a potential risk of unauthorized exploitation by malicious actors.\u00a0\n" "value": "TN-5900 Series firmware version v3.3 and prior is vulnerable to improper-authentication vulnerability. This vulnerability arises from inadequate authentication measures implemented in the web API handler, allowing low-privileged APIs to execute restricted actions that only high-privileged APIs are allowed This presents a potential risk of unauthorized exploitation by malicious actors."
} }
], ],
"metrics": { "metrics": {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-287" "value": "CWE-863"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-33238", "id": "CVE-2023-33238",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-17T03:15:09.377", "published": "2023-08-17T03:15:09.377",
"lastModified": "2023-08-22T19:10:24.183", "lastModified": "2024-10-28T06:15:03.147",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices.\n\n" "value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices."
} }
], ],
"metrics": { "metrics": {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-77" "value": "CWE-78"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-33239", "id": "CVE-2023-33239",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-17T03:15:09.580", "published": "2023-08-17T03:15:09.580",
"lastModified": "2023-08-22T18:51:19.917", "lastModified": "2024-10-28T06:15:03.393",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from insufficient input validation in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices.\n\n" "value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from insufficient input validation in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices."
} }
], ],
"metrics": { "metrics": {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-77" "value": "CWE-78"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-34213", "id": "CVE-2023-34213",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-17T03:15:09.663", "published": "2023-08-17T03:15:09.663",
"lastModified": "2023-08-22T18:51:41.683", "lastModified": "2024-10-28T06:15:03.600",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices.\u00a0\n" "value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices."
} }
], ],
"metrics": { "metrics": {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-77" "value": "CWE-78"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34214", "id": "CVE-2023-34214",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-17T03:15:09.747", "published": "2023-08-17T03:15:09.747",
"lastModified": "2023-08-22T19:05:01.607", "lastModified": "2024-10-28T06:15:03.760",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-77" "value": "CWE-78"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-34215", "id": "CVE-2023-34215",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-17T07:15:42.333", "published": "2023-08-17T07:15:42.333",
"lastModified": "2023-08-23T15:11:31.647", "lastModified": "2024-10-28T06:15:03.950",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices.\u00a0\n" "value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices."
} }
], ],
"metrics": { "metrics": {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-77" "value": "CWE-78"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-39981", "id": "CVE-2023-39981",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-09-02T13:15:45.257", "published": "2023-09-02T13:15:45.257",
"lastModified": "2023-09-07T20:38:42.433", "lastModified": "2024-10-28T06:15:04.167",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.\n\n" "value": "A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker."
}, },
{ {
"lang": "es", "lang": "es",
@ -76,7 +76,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-287" "value": "CWE-306"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4227", "id": "CVE-2023-4227",
"sourceIdentifier": "psirt@moxa.com", "sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-24T06:15:44.177", "published": "2023-08-24T06:15:44.177",
"lastModified": "2023-08-29T23:39:20.507", "lastModified": "2024-10-28T06:15:04.370",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.\n\n" "value": "A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device."
} }
], ],
"metrics": { "metrics": {
@ -72,7 +72,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-284" "value": "CWE-489"
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-50307",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-10-28T05:15:03.203",
"lastModified": "2024-10-28T05:15:03.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of potentially dangerous function issue exists in Chatwork Desktop Application (Windows) versions prior to 2.9.2. If a user clicks a specially crafted link in the application, an arbitrary file may be downloaded from an external website and executed. As a result, arbitrary code may be executed on the device that runs Chatwork Desktop Application (Windows)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-676"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN78335885/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-9162",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-28T06:15:04.593",
"lastModified": "2024-10-28T06:15:04.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/d0n601/CVE-2024-9162",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-migration/trunk/lib/controller/class-ai1wm-backups-controller.php#L60",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-migration/trunk/lib/controller/class-ai1wm-export-controller.php#L36",
"source": "security@wordfence.com"
},
{
"url": "https://ryankozak.com/posts/CVE-2024-9162",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d97c3379-56c9-4261-9a70-3119ec121a40?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-10-28T05:00:18.206785+00:00 2024-10-28T07:00:19.420329+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-10-28T04:15:02.900000+00:00 2024-10-28T06:15:04.593000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,23 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
267215 267217
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `2`
- [CVE-2024-10438](CVE-2024/CVE-2024-104xx/CVE-2024-10438.json) (`2024-10-28T03:15:02.423`) - [CVE-2024-50307](CVE-2024/CVE-2024-503xx/CVE-2024-50307.json) (`2024-10-28T05:15:03.203`)
- [CVE-2024-10439](CVE-2024/CVE-2024-104xx/CVE-2024-10439.json) (`2024-10-28T03:15:02.700`) - [CVE-2024-9162](CVE-2024/CVE-2024-91xx/CVE-2024-9162.json) (`2024-10-28T06:15:04.593`)
- [CVE-2024-10440](CVE-2024/CVE-2024-104xx/CVE-2024-10440.json) (`2024-10-28T03:15:02.920`)
- [CVE-2024-48936](CVE-2024/CVE-2024-489xx/CVE-2024-48936.json) (`2024-10-28T04:15:02.900`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `8`
- [CVE-2023-33237](CVE-2023/CVE-2023-332xx/CVE-2023-33237.json) (`2024-10-28T06:15:02.730`)
- [CVE-2023-33238](CVE-2023/CVE-2023-332xx/CVE-2023-33238.json) (`2024-10-28T06:15:03.147`)
- [CVE-2023-33239](CVE-2023/CVE-2023-332xx/CVE-2023-33239.json) (`2024-10-28T06:15:03.393`)
- [CVE-2023-34213](CVE-2023/CVE-2023-342xx/CVE-2023-34213.json) (`2024-10-28T06:15:03.600`)
- [CVE-2023-34214](CVE-2023/CVE-2023-342xx/CVE-2023-34214.json) (`2024-10-28T06:15:03.760`)
- [CVE-2023-34215](CVE-2023/CVE-2023-342xx/CVE-2023-34215.json) (`2024-10-28T06:15:03.950`)
- [CVE-2023-39981](CVE-2023/CVE-2023-399xx/CVE-2023-39981.json) (`2024-10-28T06:15:04.167`)
- [CVE-2023-4227](CVE-2023/CVE-2023-42xx/CVE-2023-4227.json) (`2024-10-28T06:15:04.370`)
## Download and Usage ## Download and Usage

View File

@ -225387,9 +225387,9 @@ CVE-2023-33231,0,0,09f86d8066d74c7874dbea9cc2ad06aac59a2df7122675bfda30672a291d4
CVE-2023-33234,0,0,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000 CVE-2023-33234,0,0,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000
CVE-2023-33235,0,0,98d0a7eb19704063a78a382792254db430678a754513fb8bc0821026290e2114,2023-05-30T19:43:02.460000 CVE-2023-33235,0,0,98d0a7eb19704063a78a382792254db430678a754513fb8bc0821026290e2114,2023-05-30T19:43:02.460000
CVE-2023-33236,0,0,4f9a68681c8de805fc0155196f19f195d6dec29aeda4ac774c34b5b3dd85bcb0,2023-05-30T19:29:08.573000 CVE-2023-33236,0,0,4f9a68681c8de805fc0155196f19f195d6dec29aeda4ac774c34b5b3dd85bcb0,2023-05-30T19:29:08.573000
CVE-2023-33237,0,0,fc0463edc62e3d49a47d812193c4e183bc8b4a3e3b302f50593f49aa3aecc82b,2023-08-22T19:10:04.453000 CVE-2023-33237,0,1,d786704a126da7c25ba580deb1701358e3b2e2a97b7eacf43df307f3c8d43a24,2024-10-28T06:15:02.730000
CVE-2023-33238,0,0,3d52dbc556d53d65b13580609783fc6ae1cb64d0acbfbfc1f7dc9b82743be068,2023-08-22T19:10:24.183000 CVE-2023-33238,0,1,e23f1bd98d7f7e5ed0fb1e667344afe549002ede49ee7114f14bd22ddf6369e5,2024-10-28T06:15:03.147000
CVE-2023-33239,0,0,14d699a4735331a3e280eeabb333d20c8f269997c63d9a9959364d5b9b81c90a,2023-08-22T18:51:19.917000 CVE-2023-33239,0,1,509f9663663694c30e325890088cd2291bc09ad0eb3bc26b11c60837fab56fea,2024-10-28T06:15:03.393000
CVE-2023-3324,0,0,6b73b02d2dac3432e473dc11300a3534848b4c72ba438443dab98ee4d47ef851,2023-08-01T21:12:32.530000 CVE-2023-3324,0,0,6b73b02d2dac3432e473dc11300a3534848b4c72ba438443dab98ee4d47ef851,2023-08-01T21:12:32.530000
CVE-2023-33240,0,0,045a1b0a2646c41b9b86cb06420a7554d3e32e7c478fbfc3c818013263afca28,2023-05-26T03:32:54.867000 CVE-2023-33240,0,0,045a1b0a2646c41b9b86cb06420a7554d3e32e7c478fbfc3c818013263afca28,2023-05-26T03:32:54.867000
CVE-2023-33241,0,0,36b269910f3c9c1e26ec0bc965386c08195bb4a131ae6a62cb3423dec09a53fd,2023-08-25T16:14:33.433000 CVE-2023-33241,0,0,36b269910f3c9c1e26ec0bc965386c08195bb4a131ae6a62cb3423dec09a53fd,2023-08-25T16:14:33.433000
@ -226111,9 +226111,9 @@ CVE-2023-3421,0,0,417c7c373f8932aa81f54dff446323d7be5801a93d8782975947f7650e841a
CVE-2023-34210,0,0,eeee0fa065c1a4e8cbe56d44018dbc5b0a10e616aa699f86019997c86a0ee8e1,2023-10-20T18:10:16.097000 CVE-2023-34210,0,0,eeee0fa065c1a4e8cbe56d44018dbc5b0a10e616aa699f86019997c86a0ee8e1,2023-10-20T18:10:16.097000
CVE-2023-34211,0,0,2a2a5ee7504f70b72e2cd36df650acbffcc887587d63620323b0a832ed326a6c,2023-11-07T04:15:32.030000 CVE-2023-34211,0,0,2a2a5ee7504f70b72e2cd36df650acbffcc887587d63620323b0a832ed326a6c,2023-11-07T04:15:32.030000
CVE-2023-34212,0,0,715c0da3e46bba861d1484d269db8395d9649d4eb955ec87d30054559a16f619,2023-06-21T15:18:21.630000 CVE-2023-34212,0,0,715c0da3e46bba861d1484d269db8395d9649d4eb955ec87d30054559a16f619,2023-06-21T15:18:21.630000
CVE-2023-34213,0,0,f6fd1f3eb1929943c683e01842644dd1d346f9200ab8f8bff53aa6736361dc08,2023-08-22T18:51:41.683000 CVE-2023-34213,0,1,20f7f931529ef727e7d5ed1d42e7e2515a23e174f9b2aef22b1c248451a87681,2024-10-28T06:15:03.600000
CVE-2023-34214,0,0,3fa1ee0012d55a14442bcc7ae0e1d6cd5aa3ba099d9c2deb40d4b3990eca712d,2023-08-22T19:05:01.607000 CVE-2023-34214,0,1,33bd3d106bb4347c4cfd2deb7619243b31842c80f6dc7c994608d09a95fc1ad8,2024-10-28T06:15:03.760000
CVE-2023-34215,0,0,04366b7653206890dde45fa9d3d65b4f1ca5e443b36107a5fd685aaf3facba3a,2023-08-23T15:11:31.647000 CVE-2023-34215,0,1,9b3ef8552f1949951f63537780f8a1032e1f05b11b8850d7f888124885babcac,2024-10-28T06:15:03.950000
CVE-2023-34216,0,0,04143175a518bdc966e71697d423aa3c36a68752a5ed7f27337e8bf2e7b2de15,2023-08-23T15:08:57.020000 CVE-2023-34216,0,0,04143175a518bdc966e71697d423aa3c36a68752a5ed7f27337e8bf2e7b2de15,2023-08-23T15:08:57.020000
CVE-2023-34217,0,0,6540d2b8e3c6c22014690c6f01d3e5e3f1c60d4a6482d20e1adf6ce4450b54d7,2023-08-23T16:41:43.143000 CVE-2023-34217,0,0,6540d2b8e3c6c22014690c6f01d3e5e3f1c60d4a6482d20e1adf6ce4450b54d7,2023-08-23T16:41:43.143000
CVE-2023-34218,0,0,a9d7a0cfbb6bf18280940bed045aba8fda347fa1ce99ee0bff3d76c33785b9d9,2023-06-06T20:02:39.667000 CVE-2023-34218,0,0,a9d7a0cfbb6bf18280940bed045aba8fda347fa1ce99ee0bff3d76c33785b9d9,2023-06-06T20:02:39.667000
@ -230355,7 +230355,7 @@ CVE-2023-39978,0,0,6a57c413fca429aa0b904c11231329cb75471b6bdf3919c3fb4662ce94920
CVE-2023-39979,0,0,28ba0e888954da30fd1114720a4d4ec97a7abc002585512616eb63d2f2e943b4,2023-09-07T20:16:28.350000 CVE-2023-39979,0,0,28ba0e888954da30fd1114720a4d4ec97a7abc002585512616eb63d2f2e943b4,2023-09-07T20:16:28.350000
CVE-2023-3998,0,0,1f43d7ee043779eb60cd321b7ac366db37948e4caeb09b7d4bfe80c2001f4f53,2023-11-07T04:20:06.317000 CVE-2023-3998,0,0,1f43d7ee043779eb60cd321b7ac366db37948e4caeb09b7d4bfe80c2001f4f53,2023-11-07T04:20:06.317000
CVE-2023-39980,0,0,dc0997ef40d03680f823152a64bb0472a38a140bfa52cf5b05dff64b94503ab7,2023-09-07T20:29:10.830000 CVE-2023-39980,0,0,dc0997ef40d03680f823152a64bb0472a38a140bfa52cf5b05dff64b94503ab7,2023-09-07T20:29:10.830000
CVE-2023-39981,0,0,b331b82f2aae162d4e8c1b519e4fb59d32b65febd5175fe03d9a23374418cdd8,2023-09-07T20:38:42.433000 CVE-2023-39981,0,1,42ff74f872e17f113d20bc5fb66bb21db4a56462c34eee11fb347b4d4c23b12d,2024-10-28T06:15:04.167000
CVE-2023-39982,0,0,a75711da5dea31a3f2bb1f5e3f7ad3190c7297abb86acc601851b03379c4c260,2023-09-08T13:23:36.153000 CVE-2023-39982,0,0,a75711da5dea31a3f2bb1f5e3f7ad3190c7297abb86acc601851b03379c4c260,2023-09-08T13:23:36.153000
CVE-2023-39983,0,0,e03990be69dfc1acd00d2500a11f172019b4a412cee0b915d28071580822e25d,2023-09-08T14:22:27.980000 CVE-2023-39983,0,0,e03990be69dfc1acd00d2500a11f172019b4a412cee0b915d28071580822e25d,2023-09-08T14:22:27.980000
CVE-2023-39984,0,0,9d662b11d581fc3abb1f1d8a77fed29b0424ab98a622e0ca8931efb2871fb556,2024-09-27T02:15:09.777000 CVE-2023-39984,0,0,9d662b11d581fc3abb1f1d8a77fed29b0424ab98a622e0ca8931efb2871fb556,2024-09-27T02:15:09.777000
@ -232151,7 +232151,7 @@ CVE-2023-42253,0,0,ddc0ec667c1a768417786714deb5cbd25861a4a1519c75ff38636e887b869
CVE-2023-4226,0,0,505e49d9f96a99b76056cf6143d350619626a79924b032cb4fc6b5070876540d,2023-11-30T05:34:06.420000 CVE-2023-4226,0,0,505e49d9f96a99b76056cf6143d350619626a79924b032cb4fc6b5070876540d,2023-11-30T05:34:06.420000
CVE-2023-42261,0,0,ee0b962b4658d438acb083a2e057d2bd12f4a7a5c718ad7d73fe4169295bf0fd,2024-08-02T20:15:22.350000 CVE-2023-42261,0,0,ee0b962b4658d438acb083a2e057d2bd12f4a7a5c718ad7d73fe4169295bf0fd,2024-08-02T20:15:22.350000
CVE-2023-42268,0,0,10c990470b2c8e37165632758ea54865ff15431c80a09a197502127ff6a705ee,2023-09-12T19:24:30.050000 CVE-2023-42268,0,0,10c990470b2c8e37165632758ea54865ff15431c80a09a197502127ff6a705ee,2023-09-12T19:24:30.050000
CVE-2023-4227,0,0,99b56eb01b0335c7bef00d7258143b3d9d9000addcb35f453d761b09779e5739,2023-08-29T23:39:20.507000 CVE-2023-4227,0,1,89f0ffe537dad0662f1e6172b0b52367161bbc1f13b5d4fb284d1de2b91c8e49,2024-10-28T06:15:04.370000
CVE-2023-42270,0,0,6e55386a1608989e07c7a0163c6d3f0e92bb9c9576b1d8ab571f5b606ef526e1,2024-02-02T17:15:10.793000 CVE-2023-42270,0,0,6e55386a1608989e07c7a0163c6d3f0e92bb9c9576b1d8ab571f5b606ef526e1,2024-02-02T17:15:10.793000
CVE-2023-42276,0,0,c9c2e6d3b0979901fa51e9964c0d2dda78aedc2948212e936e72edafaed63e10,2023-09-13T00:35:56.567000 CVE-2023-42276,0,0,c9c2e6d3b0979901fa51e9964c0d2dda78aedc2948212e936e72edafaed63e10,2023-09-13T00:35:56.567000
CVE-2023-42277,0,0,23f6694014a4ba84370488d128c7e22c34f27bb61d711b5ff8e85b61b84137b9,2023-09-13T00:32:07.417000 CVE-2023-42277,0,0,23f6694014a4ba84370488d128c7e22c34f27bb61d711b5ff8e85b61b84137b9,2023-09-13T00:32:07.417000
@ -242574,10 +242574,10 @@ CVE-2024-10432,0,0,175e5006b422913967545e5fb31c49d6b3bf70970106383d10048f738998e
CVE-2024-10433,0,0,f2bd9dbac87bcd113979b3dad23e4d4f9d980c6d32a01dde9df6e2355cb5b3b4,2024-10-28T00:15:03.370000 CVE-2024-10433,0,0,f2bd9dbac87bcd113979b3dad23e4d4f9d980c6d32a01dde9df6e2355cb5b3b4,2024-10-28T00:15:03.370000
CVE-2024-10434,0,0,958e1d72985d6f66b2ae34339041d042396b48ce52ef4a5dcaf1aba9c695ab6a,2024-10-28T01:15:02.273000 CVE-2024-10434,0,0,958e1d72985d6f66b2ae34339041d042396b48ce52ef4a5dcaf1aba9c695ab6a,2024-10-28T01:15:02.273000
CVE-2024-10435,0,0,8eb82f7bfa77addf9e0a737a191fd51dc2cdc1254fe6d4bd0987aa88d36414e0,2024-10-28T01:15:02.600000 CVE-2024-10435,0,0,8eb82f7bfa77addf9e0a737a191fd51dc2cdc1254fe6d4bd0987aa88d36414e0,2024-10-28T01:15:02.600000
CVE-2024-10438,1,1,7af26de0910eb98f78176019dbded42c71821887a3625500952ca012332922c3,2024-10-28T03:15:02.423000 CVE-2024-10438,0,0,7af26de0910eb98f78176019dbded42c71821887a3625500952ca012332922c3,2024-10-28T03:15:02.423000
CVE-2024-10439,1,1,ec4c8c499c8c33926dd498529d66d83f7d3ded7463810a1230d76432dbfea1ef,2024-10-28T03:15:02.700000 CVE-2024-10439,0,0,ec4c8c499c8c33926dd498529d66d83f7d3ded7463810a1230d76432dbfea1ef,2024-10-28T03:15:02.700000
CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000 CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000
CVE-2024-10440,1,1,6ff183f0eda9074a78e6c3d9f92b0fc387c2a9c66a6a6d4b104e87261d49cc53,2024-10-28T03:15:02.920000 CVE-2024-10440,0,0,6ff183f0eda9074a78e6c3d9f92b0fc387c2a9c66a6a6d4b104e87261d49cc53,2024-10-28T03:15:02.920000
CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000
CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000 CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000
CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000
@ -262946,7 +262946,7 @@ CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9
CVE-2024-48931,0,0,cb76da7947433082044eb8eab7c26fb2f1f77c9a2e73af320a6686276ae68e56,2024-10-25T12:56:07.750000 CVE-2024-48931,0,0,cb76da7947433082044eb8eab7c26fb2f1f77c9a2e73af320a6686276ae68e56,2024-10-25T12:56:07.750000
CVE-2024-48932,0,0,f03344868acfc16b73af3784b9a6263628e84052cd2b89fcb271042dea382c8d,2024-10-25T12:56:07.750000 CVE-2024-48932,0,0,f03344868acfc16b73af3784b9a6263628e84052cd2b89fcb271042dea382c8d,2024-10-25T12:56:07.750000
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
CVE-2024-48936,1,1,2ae17fa08d3bb51f630d16f0842456757f9012ca78ae7fa3516e9986ec43e5cf,2024-10-28T04:15:02.900000 CVE-2024-48936,0,0,2ae17fa08d3bb51f630d16f0842456757f9012ca78ae7fa3516e9986ec43e5cf,2024-10-28T04:15:02.900000
CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000 CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000
CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000 CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000 CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
@ -263496,6 +263496,7 @@ CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d
CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76e5,2024-09-04T14:33:57.200000 CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76e5,2024-09-04T14:33:57.200000
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-50307,1,1,97c3c548388a7bdbb1e7fef32d811a287b7adf85e781a4eb64e2c5a6e3d3da49,2024-10-28T05:15:03.203000
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c644,2024-10-23T15:12:34.673000 CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c644,2024-10-23T15:12:34.673000
CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000 CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000
@ -266770,6 +266771,7 @@ CVE-2024-9156,0,0,a219412140ed669efa4745f4f28cc6c7900dfc19ec3ad1e09069c0d323d2ba
CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000 CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000
CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000
CVE-2024-9161,0,0,b475702d9da1cd18a82129e88647b71b0425c30925f01e0c024257c76be8d651,2024-10-07T17:48:28.117000 CVE-2024-9161,0,0,b475702d9da1cd18a82129e88647b71b0425c30925f01e0c024257c76be8d651,2024-10-07T17:48:28.117000
CVE-2024-9162,1,1,fb4d55a666ac6f68fb059c5d9e29459f2a7c9ce73430c76a9e244f0a8dbfc808,2024-10-28T06:15:04.593000
CVE-2024-9164,0,0,22a852044a02fa2bf2a1f004c8f4e0e1dbd359605b1a68593f6ac0ec4a57bdec,2024-10-15T12:58:51.050000 CVE-2024-9164,0,0,22a852044a02fa2bf2a1f004c8f4e0e1dbd359605b1a68593f6ac0ec4a57bdec,2024-10-15T12:58:51.050000
CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000 CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000

Can't render this file because it is too large.