Auto-Update: 2024-08-15T06:00:16.900542+00:00

This commit is contained in:
cad-safe-bot 2024-08-15 06:03:13 +00:00
parent f7a9c6b2f6
commit b14c55f410
5 changed files with 350 additions and 24 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-6534",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2024-08-15T04:15:07.937",
"lastModified": "2024-08-15T04:15:07.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets'\u00a0request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://directus.io/",
"source": "help@fluidattacks.com"
},
{
"url": "https://fluidattacks.com/advisories/capaldi",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2024-7814",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T04:15:08.590",
"lastModified": "2024-08-15T04:15:08.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in CodeAstro Online Railway Reservation System 1.0. Affected is an unknown function of the file /admin/admin-add-employee.php of the component Add Employee Page. The manipulation of the argument emp_fname /emp_lname /emp_nat_idno/emp_addr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Stored%20XSS.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274710",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274710",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-7815",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-15T04:15:09.510",
"lastModified": "2024-08-15T04:15:09.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in CodeAstro Online Railway Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin-update-employee.php of the component Update Employee Page. The manipulation of the argument emp_fname /emp_lname /emp_nat_idno/emp_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Stored%20XSS.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.274711",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.274711",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.391376",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-15T04:00:17.071048+00:00
2024-08-15T06:00:16.900542+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-15T03:15:06.140000+00:00
2024-08-15T04:15:09.510000+00:00
```
### Last Data Feed Release
@ -33,23 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
260082
260085
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `3`
- [CVE-2024-25024](CVE-2024/CVE-2024-250xx/CVE-2024-25024.json) (`2024-08-15T03:15:04.353`)
- [CVE-2024-6533](CVE-2024/CVE-2024-65xx/CVE-2024-6533.json) (`2024-08-15T03:15:04.567`)
- [CVE-2024-7420](CVE-2024/CVE-2024-74xx/CVE-2024-7420.json) (`2024-08-15T03:15:04.830`)
- [CVE-2024-7624](CVE-2024/CVE-2024-76xx/CVE-2024-7624.json) (`2024-08-15T03:15:05.070`)
- [CVE-2024-7628](CVE-2024/CVE-2024-76xx/CVE-2024-7628.json) (`2024-08-15T03:15:05.310`)
- [CVE-2024-7809](CVE-2024/CVE-2024-78xx/CVE-2024-7809.json) (`2024-08-15T02:15:03.763`)
- [CVE-2024-7810](CVE-2024/CVE-2024-78xx/CVE-2024-7810.json) (`2024-08-15T02:15:04.087`)
- [CVE-2024-7811](CVE-2024/CVE-2024-78xx/CVE-2024-7811.json) (`2024-08-15T03:15:05.540`)
- [CVE-2024-7812](CVE-2024/CVE-2024-78xx/CVE-2024-7812.json) (`2024-08-15T03:15:05.847`)
- [CVE-2024-7813](CVE-2024/CVE-2024-78xx/CVE-2024-7813.json) (`2024-08-15T03:15:06.140`)
- [CVE-2024-6534](CVE-2024/CVE-2024-65xx/CVE-2024-6534.json) (`2024-08-15T04:15:07.937`)
- [CVE-2024-7814](CVE-2024/CVE-2024-78xx/CVE-2024-7814.json) (`2024-08-15T04:15:08.590`)
- [CVE-2024-7815](CVE-2024/CVE-2024-78xx/CVE-2024-7815.json) (`2024-08-15T04:15:09.510`)
### CVEs modified in the last Commit

View File

@ -246064,7 +246064,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
CVE-2024-25024,1,1,7a38a967aaf7243f2096a6816bb956d8368fc922cb6f6665becf7c62e318bcea,2024-08-15T03:15:04.353000
CVE-2024-25024,0,0,7a38a967aaf7243f2096a6816bb956d8368fc922cb6f6665becf7c62e318bcea,2024-08-15T03:15:04.353000
CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000
CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000
CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000
@ -259360,7 +259360,8 @@ CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bed
CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
CVE-2024-6532,0,0,21d26a8f00408d7c0c1c4ea0dfdffc81ca804ea427b5b751972725c0e03a2bc3,2024-08-14T13:00:37.107000
CVE-2024-6533,1,1,870626826813ae89d38805ef90549afcf775ff28d463bc80c428941b966fd255,2024-08-15T03:15:04.567000
CVE-2024-6533,0,0,870626826813ae89d38805ef90549afcf775ff28d463bc80c428941b966fd255,2024-08-15T03:15:04.567000
CVE-2024-6534,1,1,e745d258c9eb106b31fa6fc622bf5a86ce09e8bda7ded28f8d05adc5ea51c3a0,2024-08-15T04:15:07.937000
CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000
CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
@ -259882,7 +259883,7 @@ CVE-2024-7412,0,0,b2cec2bd274b261ef09607f2e770ed1c42b7cfc2487929d65308251b8ca5fb
CVE-2024-7413,0,0,1e2e6e629ae076e767a4ed710c2f32c76d2bd71396701e30749c7812afe7edb9,2024-08-12T13:41:36.517000
CVE-2024-7414,0,0,75779b8687375e2d55d3e2d954892bdff56935440cca361ae4c6a6a0a4f3bed5,2024-08-12T13:41:36.517000
CVE-2024-7416,0,0,9f5565f11e96fff207b91fc0825d45934365835075928991c71489e2cad44813,2024-08-12T13:41:36.517000
CVE-2024-7420,1,1,92ce24f5a1c9359fecdee27f7f4e7fc09e08d39f9811d469f9db415e34e786b2,2024-08-15T03:15:04.830000
CVE-2024-7420,0,0,92ce24f5a1c9359fecdee27f7f4e7fc09e08d39f9811d469f9db415e34e786b2,2024-08-15T03:15:04.830000
CVE-2024-7436,0,0,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000
CVE-2024-7437,0,0,6536d7f97d7ad58b67ec8c23497b1bab63383020d43415bc5b4c83af23e0fa6d,2024-08-12T13:38:43.060000
CVE-2024-7438,0,0,e0751aac5a1208089fd3136e155c05769dcef78130a2d9c6fdc04c87ca92fb9a,2024-08-12T13:38:43.203000
@ -259998,9 +259999,9 @@ CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7
CVE-2024-7615,0,0,6c5a3d2b322898b551bada40c532b08076a3798009e747124e833bfdffe0bb9a,2024-08-12T13:41:36.517000
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
CVE-2024-7621,0,0,1acf6d4c2a821fce1e3f9264509576725bd5b71a2c3ef943afe6ab5d29351820,2024-08-12T13:41:36.517000
CVE-2024-7624,1,1,51c49d9cca5de404dd6e528ec08e70693fd422859f98836ece6cc18378ed63b7,2024-08-15T03:15:05.070000
CVE-2024-7624,0,0,51c49d9cca5de404dd6e528ec08e70693fd422859f98836ece6cc18378ed63b7,2024-08-15T03:15:05.070000
CVE-2024-7625,0,0,bd4d78da44cbfcc05049bba5d1a45318d7550ad4c5b31005b54b7918b4ae2ea0,2024-08-15T00:15:13.127000
CVE-2024-7628,1,1,8516bb24e1f696eae87f8dbfd676fabbbf2400f0ea0795b2ee15b6dffe62a01b,2024-08-15T03:15:05.310000
CVE-2024-7628,0,0,8516bb24e1f696eae87f8dbfd676fabbbf2400f0ea0795b2ee15b6dffe62a01b,2024-08-15T03:15:05.310000
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
CVE-2024-7635,0,0,330e4c31af06e1fa39a084a042067cc2714cfc9a1302a27b2cb8b725b37ba5f4,2024-08-12T13:41:36.517000
CVE-2024-7636,0,0,c4f4b71cbb74b70101cbb74c711b9665ce07671c635fe9367b91f52e05f765d3,2024-08-12T13:41:36.517000
@ -260076,8 +260077,10 @@ CVE-2024-7798,0,0,d5ca38d812284eded3ed868a552ae7a7de802a9e0870389b06f2e9045c049a
CVE-2024-7799,0,0,16ec0a0e8fc3790beaf7dfbe8c4dd9cdeb7dbbbbc5e228a27b6ff59b37b3a9b3,2024-08-15T00:15:14.040000
CVE-2024-7800,0,0,e60fbb3a0c909e811778589c5e1de98b10d7b42ba987703ee8a680466eb487b0,2024-08-15T00:15:14.327000
CVE-2024-7808,0,0,8211b84ea3b6bd48644cc9dbab1114e0f5309f40ba883ccd9a4d5d3dea4b8770,2024-08-15T01:15:12.150000
CVE-2024-7809,1,1,b808e4d1ad2d71229ae04fe2a9e1c37e38d93e407443cca83fa1c448a7465d9a,2024-08-15T02:15:03.763000
CVE-2024-7810,1,1,86623ad54461697d4452c21f6fb6887b7a99eab8ce5bd548e6fbcfe1f522a413,2024-08-15T02:15:04.087000
CVE-2024-7811,1,1,3e5869b88d9c8689b9c0293adc97384a11b70be28fe01fa6879edff2417f73f3,2024-08-15T03:15:05.540000
CVE-2024-7812,1,1,6907e18e252f45b30d3e5ee7b8a32156017db5e36485f1aaf8713ed4bbcb715d,2024-08-15T03:15:05.847000
CVE-2024-7813,1,1,14e68100d29e8a14e338d7aa5afc34d11bf2edcc81e3fba724dd668fc31a2866,2024-08-15T03:15:06.140000
CVE-2024-7809,0,0,b808e4d1ad2d71229ae04fe2a9e1c37e38d93e407443cca83fa1c448a7465d9a,2024-08-15T02:15:03.763000
CVE-2024-7810,0,0,86623ad54461697d4452c21f6fb6887b7a99eab8ce5bd548e6fbcfe1f522a413,2024-08-15T02:15:04.087000
CVE-2024-7811,0,0,3e5869b88d9c8689b9c0293adc97384a11b70be28fe01fa6879edff2417f73f3,2024-08-15T03:15:05.540000
CVE-2024-7812,0,0,6907e18e252f45b30d3e5ee7b8a32156017db5e36485f1aaf8713ed4bbcb715d,2024-08-15T03:15:05.847000
CVE-2024-7813,0,0,14e68100d29e8a14e338d7aa5afc34d11bf2edcc81e3fba724dd668fc31a2866,2024-08-15T03:15:06.140000
CVE-2024-7814,1,1,947c074dd89dce7a2bb7f609c34bc66f07e406a3472c56d1d4256d57780d58a9,2024-08-15T04:15:08.590000
CVE-2024-7815,1,1,6e089a2caf495632c5c74a3ce6aa6899acaed7f6dc3c536ae1ee262c1bbd2d69,2024-08-15T04:15:09.510000

Can't render this file because it is too large.