Auto-Update: 2024-10-09T06:00:16.746614+00:00

This commit is contained in:
cad-safe-bot 2024-10-09 06:03:17 +00:00
parent a6c2d39065
commit b32607593b
14 changed files with 345 additions and 93 deletions

View File

@ -2,89 +2,15 @@
"id": "CVE-2022-3857",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-06T23:15:11.087",
"lastModified": "2023-04-06T13:15:08.467",
"vulnStatus": "Modified",
"lastModified": "2024-10-09T04:15:06.567",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libpng 1.6.38. A crafted PNG image can lead to a segmentation fault and denial of service in png_setup_paeth_row() function."
"value": "Rejected reason: Maintainer contacted. This is a false-positive. The flaw does not actually exist and was erroneously tested."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libpng:libpng:1.6.38:*:*:*:*:*:*:*",
"matchCriteriaId": "45C37638-8FB7-43EF-9997-29F25A3D5453"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230406-0004/",
"source": "secalert@redhat.com"
},
{
"url": "https://sourceforge.net/p/libpng/bugs/300/",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-25282",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:07.287",
"lastModified": "2024-10-09T04:15:07.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "3DSecure 2.0 allows XSS in its 3DSMethod Authentication via a modified params parameter in a /rest/online request with a /redirect?action=challenge&txn= substring."
}
],
"metrics": {},
"references": [
{
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/27",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-25283",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:07.483",
"lastModified": "2024-10-09T04:15:07.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "3DSecure 2.0 allows reflected XSS in the 3DS Authorization Challenge via a modified params parameter in a /rest/online request with a /redirect?action=challenge&txn= substring."
}
],
"metrics": {},
"references": [
{
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/28",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-25284",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:07.597",
"lastModified": "2024-10-09T04:15:07.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "3DSecure 2.0 allows reflected XSS in the 3DS Authorization Method via the threeDsMethod.jsp threeDSMethodData parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/29",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-25285",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:07.700",
"lastModified": "2024-10-09T04:15:07.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "3DSecure 2.0 allows form action hijacking via threeDsMethod.jsp?threeDSMethodData= or the threeDSMethodNotificationURL parameter. The destination web site for a form submission can be modified."
}
],
"metrics": {},
"references": [
{
"url": "https://pagosonline.redsys.es/funcionalidades-autenticacion3DS.html",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/30",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-25286",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:07.880",
"lastModified": "2024-10-09T04:15:07.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "3DSecure 2.0 allows CSRF in the Authorization Method via modified Origin and Referer HTTP headers."
}
],
"metrics": {},
"references": [
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/31",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-32608",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T05:15:13.110",
"lastModified": "2024-10-09T05:15:13.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-35288",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:08.233",
"lastModified": "2024-10-09T04:15:08.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nitro PDF Pro before 13.70.8.82 and 14.x before 14.26.1.0 allows Local Privilege Escalation in the MSI Installer because custom actions occur unsafely in repair mode. CertUtil is run in a conhost.exe window, and there is a mechanism allowing CTRL+o to launch cmd.exe as NT AUTHORITY\\SYSTEM."
}
],
"metrics": {},
"references": [
{
"url": "https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-nitro-pdf-pro/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/59",
"source": "cve@mitre.org"
},
{
"url": "https://www.gonitro.com/support/downloads#securityUpdates",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-42934",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T05:15:13.270",
"lastModified": "2024-10-09T05:15:13.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator, resulting in denial of service or (with very low probability) authentication bypass or code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308375",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/openipmi/code/ci/4c129d0540f3578ecc078d8612bbf84b6cd24c87",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/openipmi/code/ci/b52e8e2538b2b48ef6b63bff12b5cc9e2d52eff1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-45160",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T05:15:13.343",
"lastModified": "2024-10-09T05:15:13.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret)."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/06d771cbc2d5c752354c50f83e4912e5879f9aa2",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/236cdfe42c1dc04a15a4a40c5e6a8c2e858d71d7",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/696f49a0855faeb271096dccb8381e2129687c3d",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3223",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45179",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:09.487",
"lastModified": "2024-10-09T04:15:09.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 and 6.00PL01. Due to insufficient input validation, the C-MOR web interface is vulnerable to OS command injection attacks. It was found out that different functionality is vulnerable to OS command injection attacks, for example for generating new X.509 certificates, or setting the time zone. These OS command injection vulnerabilities in the script generatesslreq.pml can be exploited as a low-privileged authenticated user to execute commands in the context of the Linux user www-data via shell metacharacters in HTTP POST data (e.g., the city parameter). The OS command injection vulnerability in the script settimezone.pml or setdatetime.pml (e.g., via the year parameter) requires an administrative user for the C-MOR web interface. By also exploiting a privilege-escalation vulnerability, it is possible to execute commands on the C-MOR system with root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-030.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2024-47191",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T05:15:13.420",
"lastModified": "2024-10-09T05:15:13.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3235a52f6b87cd1c5da6508f421ac261f5e33a70",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/3271139989fde35ab0163b558fc29e80c3a280e5",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/60d9902b5c20f27e70f8e9c816bfdc0467567e1a",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/commit/95ef255e6a401949ce3f67609bf8aac2029db418",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/oath-toolkit/oath-toolkit/-/issues/43",
"source": "cve@mitre.org"
},
{
"url": "https://security.opensuse.org/2024/10/04/oath-toolkit-vulnerability.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.nongnu.org/oath-toolkit/security/CVE-2024-47191",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/10/04/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-09T04:00:16.948659+00:00
2024-10-09T06:00:16.746614+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-09T02:15:33.870000+00:00
2024-10-09T05:15:13.420000+00:00
```
### Last Data Feed Release
@ -33,23 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265035
265046
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `11`
- [CVE-2024-7963](CVE-2024/CVE-2024-79xx/CVE-2024-7963.json) (`2024-10-09T02:15:33.870`)
- [CVE-2024-25282](CVE-2024/CVE-2024-252xx/CVE-2024-25282.json) (`2024-10-09T04:15:07.287`)
- [CVE-2024-25283](CVE-2024/CVE-2024-252xx/CVE-2024-25283.json) (`2024-10-09T04:15:07.483`)
- [CVE-2024-25284](CVE-2024/CVE-2024-252xx/CVE-2024-25284.json) (`2024-10-09T04:15:07.597`)
- [CVE-2024-25285](CVE-2024/CVE-2024-252xx/CVE-2024-25285.json) (`2024-10-09T04:15:07.700`)
- [CVE-2024-25286](CVE-2024/CVE-2024-252xx/CVE-2024-25286.json) (`2024-10-09T04:15:07.880`)
- [CVE-2024-32608](CVE-2024/CVE-2024-326xx/CVE-2024-32608.json) (`2024-10-09T05:15:13.110`)
- [CVE-2024-35288](CVE-2024/CVE-2024-352xx/CVE-2024-35288.json) (`2024-10-09T04:15:08.233`)
- [CVE-2024-42934](CVE-2024/CVE-2024-429xx/CVE-2024-42934.json) (`2024-10-09T05:15:13.270`)
- [CVE-2024-45160](CVE-2024/CVE-2024-451xx/CVE-2024-45160.json) (`2024-10-09T05:15:13.343`)
- [CVE-2024-45179](CVE-2024/CVE-2024-451xx/CVE-2024-45179.json) (`2024-10-09T04:15:09.487`)
- [CVE-2024-47191](CVE-2024/CVE-2024-471xx/CVE-2024-47191.json) (`2024-10-09T05:15:13.420`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `1`
- [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-10-09T02:15:15.920`)
- [CVE-2024-21413](CVE-2024/CVE-2024-214xx/CVE-2024-21413.json) (`2024-10-09T02:15:22.417`)
- [CVE-2024-26256](CVE-2024/CVE-2024-262xx/CVE-2024-26256.json) (`2024-10-09T02:15:27.847`)
- [CVE-2022-3857](CVE-2022/CVE-2022-38xx/CVE-2022-3857.json) (`2024-10-09T04:15:06.567`)
## Download and Usage

View File

@ -204941,7 +204941,7 @@ CVE-2022-38566,0,0,14467589f235771bd764d591ab2e9c5095dbfaf92cb92ebeb054bb38a3c7a
CVE-2022-38567,0,0,7271a699cfb016e5e3cbb46d04caa8a117b36c9d179fb78444cf2322f8de12f7,2022-09-01T14:29:56.363000
CVE-2022-38568,0,0,e229a9ed87183134622b2f01827196776d32acfed3f472d36c294d23ce0787d0,2022-09-01T14:30:15.377000
CVE-2022-38569,0,0,14769d59bafef3515add0bc88039d6067ed421e05ca1a7fa180e5a8b2dcaaa83,2022-09-01T14:20:06.227000
CVE-2022-3857,0,0,e7b5241bcbaf4a6de046bfa9bc4f99ba763b22b4a71d3a8d172d21434014f22c,2023-04-06T13:15:08.467000
CVE-2022-3857,0,1,6ab9271d39c393f96f6990c7f09a1c165dfbe60d5443ce4aef141d7be7771dbd,2024-10-09T04:15:06.567000
CVE-2022-38570,0,0,2e28318466274291937aec6f8b39a5109aa026041abda9c04cdb5a59effb71f6,2022-09-01T14:21:21.287000
CVE-2022-38571,0,0,a578b47e6cfa84664dad5ce4e2ffe6777951f1dd88b927778bf66de0080be3b1,2022-09-01T14:22:51.440000
CVE-2022-38573,0,0,96ed6762c2ca261e542c39bb76ef24453b222d63f22bae93539549e1a72d49c1,2022-09-24T02:05:24.637000
@ -244028,7 +244028,7 @@ CVE-2024-21334,0,0,bb98735e0397eef282b3bf0c8a7f17fd1a894c0580516f67c50b6ae552edb
CVE-2024-21335,0,0,d3be0da75c93e40dc74ef43532ac464e7457c464e235cbe682e70d325b6a979e,2024-07-09T18:18:38.713000
CVE-2024-21336,0,0,4632192569ed60af4d57d1dd58a5b140d682aa1d82fc677d5ec51bcb39be3541,2024-06-11T15:15:59.553000
CVE-2024-21337,0,0,1ed4e9ec6936be258d1de771e0acb5830541ca48fb0a246032f3c3930147d134,2024-05-29T00:15:20.793000
CVE-2024-21338,0,1,d38e773ba98c42ebacc4689be186920dfbc7e8b70e880497eafe3190365889c0,2024-10-09T02:15:15.920000
CVE-2024-21338,0,0,d38e773ba98c42ebacc4689be186920dfbc7e8b70e880497eafe3190365889c0,2024-10-09T02:15:15.920000
CVE-2024-21339,0,0,3b2246ef5e1d88b753a2538b4b172fb8ad25db9ef5e4dae729823984d67c0483,2024-05-29T00:15:21.830000
CVE-2024-2134,0,0,32f7b6769a3de1e870eb862cfbcf578418aa858e7cc01f11b7b77f4ab31882e5,2024-05-17T02:38:03.667000
CVE-2024-21340,0,0,54f8fce81fb3f01b0990ebeb93fb4090923de6185bd8f6ef3135f577fe07fabe,2024-05-29T00:15:22.083000
@ -244111,7 +244111,7 @@ CVE-2024-2141,0,0,7c4bf37cd4081c2cd46a042815f9ce375b39a3545b48e0b5b91eba9a22eb0f
CVE-2024-21410,0,0,c8e90612f8b38e6b1f13375d68516f4b4a5a3386c3f385305f0005a7f45de49a,2024-06-10T16:05:10.343000
CVE-2024-21411,0,0,e4762a6b8c68f949f9dbcca9e77f1e8e5511c352d40e6306cffb620bae6ab489,2024-06-11T16:15:17.890000
CVE-2024-21412,0,0,19f94d89a29568d47135b4b672838e496edc30a72400f126ad5b6bf639eb739b,2024-08-14T19:47:44.623000
CVE-2024-21413,0,1,9ff3f40aef94a5855a3aa31dca1b2a383efeb4c413a3d395684e572375312500,2024-10-09T02:15:22.417000
CVE-2024-21413,0,0,9ff3f40aef94a5855a3aa31dca1b2a383efeb4c413a3d395684e572375312500,2024-10-09T02:15:22.417000
CVE-2024-21414,0,0,cb5be5a0298e388117cb17fb4e38b11bac4cf16d9158b5abf408d82cf361dfc1,2024-07-09T18:18:38.713000
CVE-2024-21415,0,0,42bcd1202ef0ba594d559bd9441152ac5ae9644c270ba50531381a1aa41e9e3f,2024-07-09T18:18:38.713000
CVE-2024-21416,0,0,7cc6fd4c84942ce1dc818417cef771869802afebc6e3c7d7b19ed19e00198c83,2024-09-20T18:55:14.573000
@ -246748,6 +246748,11 @@ CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f
CVE-2024-25270,0,0,5f30998f0581b52564ffa879dfe70f343d5031848a9545cbe5dd55b89d561500,2024-09-13T16:01:01.810000
CVE-2024-25274,0,0,6d61d530dc49a931412656c8f607fd75a29229348fb483cac927de396452465f,2024-08-29T20:36:19.120000
CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000
CVE-2024-25282,1,1,a74bcf88e32e168fcbe9f6279e9919c2ce832f13b6148dbf9529253fe699553b,2024-10-09T04:15:07.287000
CVE-2024-25283,1,1,01898390a81051e8f443c91fe35aeb2e4428e9f5440ae6a4b2ff84a7dad2fc32,2024-10-09T04:15:07.483000
CVE-2024-25284,1,1,2d6ba5f1816a5ff32c73bc2aecdbdfeb190fa787cb288f6f9a8a099392c79665,2024-10-09T04:15:07.597000
CVE-2024-25285,1,1,f59e41792d6726a49ae8f7914401e25d4579ec8fde9d9953f6dda24c4ca3f7d5,2024-10-09T04:15:07.700000
CVE-2024-25286,1,1,7ec6d382426a687f99df1a3b36198f7abe4bedafd52090e0bc2739050c7a2f3b,2024-10-09T04:15:07.880000
CVE-2024-25288,0,0,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000
CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000
CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000
@ -247486,7 +247491,7 @@ CVE-2024-26252,0,0,a16ea7a04b440699076d4a90d57b94e69adc561ff365215a47bfe0edfb85f
CVE-2024-26253,0,0,d32f97c711762e973fb1b01c37de60abd45cff8ea3bfc2e555e3e6824fc4b9b7,2024-04-10T13:24:00.070000
CVE-2024-26254,0,0,024245ede1fede2394fca1e326cc18c265676be3657652d8066482f274ba6b72,2024-04-10T13:24:00.070000
CVE-2024-26255,0,0,def0d1975fa503fc52bece1a738d7a3d0ac65fd2582e7e57928a6ef65a03e34e,2024-04-10T13:24:00.070000
CVE-2024-26256,0,1,3807901f6ac90b4732561ba3ffb11bfe90ae3ad76f283571e61bd6293795a413,2024-10-09T02:15:27.847000
CVE-2024-26256,0,0,3807901f6ac90b4732561ba3ffb11bfe90ae3ad76f283571e61bd6293795a413,2024-10-09T02:15:27.847000
CVE-2024-26257,0,0,066b4f8e21f6da31e18bfde8bcbd77b29d1c931685dc4eb216f9777000563c57,2024-04-10T13:24:00.070000
CVE-2024-26258,0,0,2a9672d6ed0fd06f71f147874c9f6533f22085e94e3e959706ad13fe0557526a,2024-09-09T07:15:16.343000
CVE-2024-2626,0,0,5a6c338629bbaaf7065165299ae412c08d9197fb3cad2770c12e07d226bcbe56,2024-04-01T15:22:37.883000
@ -252114,6 +252119,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e
CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000
CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000
CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000
CVE-2024-32608,1,1,f61b1ecd9e349ea4d9f810177cd2158930661d343cfa90a4aafaf3ba7c5237f0,2024-10-09T05:15:13.110000
CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000
CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000
CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000
@ -254022,6 +254028,7 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
CVE-2024-35288,1,1,75dab3ace5d9f9d35c01f8260f8e28e0bc43dedf35083b7e8752ff313e844084,2024-10-09T04:15:08.233000
CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000
CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000
CVE-2024-35292,0,0,e3b3d736ef0c9425797f6a5a9790b2cb56e0a53578005725786d8a247ceee1f2,2024-06-11T13:54:12.057000
@ -259068,6 +259075,7 @@ CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4
CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198ad98,2024-09-06T17:35:15.190000
CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000
CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000
CVE-2024-42934,1,1,6257c4dbf9db4adbffe7af024926ac3c73ee92d2d85502feb0fc8781baee2e23,2024-10-09T05:15:13.270000
CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000
CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000
CVE-2024-42940,0,0,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000
@ -260293,6 +260301,7 @@ CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61
CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000
CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
CVE-2024-45160,1,1,227deca0a6209108dd6dc75e6c906ce56cdaa2189ac0a0b6803593e9821b18e7,2024-10-09T05:15:13.343000
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
@ -260309,6 +260318,7 @@ CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f
CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000
CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000
CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000
CVE-2024-45179,1,1,4fd9b079f55849947191987b781453e5e45e33888a0e8c9ad237e9bad85b60da,2024-10-09T04:15:09.487000
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
@ -261242,6 +261252,7 @@ CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276d
CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000
CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
CVE-2024-47191,1,1,70dd928787c224404880c352d0538d3741ac66c213bb7cc1fdbcb007dcb46343,2024-10-09T05:15:13.420000
CVE-2024-47194,0,0,316103eb084ec6217054a1fc514821ac3bc94a538674f22dc5653132cf19654c,2024-10-08T09:15:17.047000
CVE-2024-47195,0,0,d795e93240c6c6fd0784c6074f3fd46e6fef6bc125756d49adbae58c747d0b95,2024-10-08T09:15:17.300000
CVE-2024-47196,0,0,c92c48de2b3433b7a77f962c96686b397eabda030bf3e0714ea8f48a71e5e773,2024-10-08T09:15:17.563000
@ -264154,7 +264165,7 @@ CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
CVE-2024-7960,0,0,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000
CVE-2024-7961,0,0,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000
CVE-2024-7963,1,1,286f726c648a627f7d68c90d704ebb470a6961491de7e9aa929f36bfd75962b5,2024-10-09T02:15:33.870000
CVE-2024-7963,0,0,286f726c648a627f7d68c90d704ebb470a6961491de7e9aa929f36bfd75962b5,2024-10-09T02:15:33.870000
CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000
CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000
CVE-2024-7966,0,0,f366846d49db9477cb2ea061c491dcdaebf29f4e555fa7612b32a771fd61b7a0,2024-08-27T13:35:02.630000

Can't render this file because it is too large.