Auto-Update: 2024-11-18T09:00:34.595517+00:00

This commit is contained in:
cad-safe-bot 2024-11-18 09:03:36 +00:00
parent 8a2b62e4b7
commit b7227f8049
9 changed files with 451 additions and 30 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11311",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-18T07:15:13.063",
"lastModified": "2024-11-18T07:15:13.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8247-83457-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8246-d462a-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11312",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-18T07:15:14.903",
"lastModified": "2024-11-18T07:15:14.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8249-65252-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8248-8dac9-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11313",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-18T07:15:15.420",
"lastModified": "2024-11-18T07:15:15.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8251-3455e-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8250-1837b-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11314",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-18T07:15:15.993",
"lastModified": "2024-11-18T07:15:15.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8253-bc363-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8252-91d6a-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11315",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-18T07:15:16.673",
"lastModified": "2024-11-18T07:15:16.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8255-0bb1a-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8254-8daa2-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-22067",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2024-11-18T07:15:17.370",
"lastModified": "2024-11-18T07:15:17.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ZTE NH8091 product has an improper permission control vulnerability. Due to improper permission control of the Web module interface, an authenticated attacker may exploit the vulnerability to execute arbitrary commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@zte.com.cn",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6179526095692935173",
"source": "psirt@zte.com.cn"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49574",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-11-18T08:15:03.550",
"lastModified": "2024-11-18T08:15:03.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine ADAudit Plus versions below 8123 are vulnerable to SQL Injection in\u00a0the reports module."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/products/active-directory-audit/cve-2024-49574.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-18T07:00:20.243446+00:00
2024-11-18T09:00:34.595517+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-18T06:15:06.593000+00:00
2024-11-18T08:15:03.550000+00:00
```
### Last Data Feed Release
@ -33,26 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
270105
270112
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `7`
- [CVE-2024-11308](CVE-2024/CVE-2024-113xx/CVE-2024-11308.json) (`2024-11-18T06:15:04.263`)
- [CVE-2024-11309](CVE-2024/CVE-2024-113xx/CVE-2024-11309.json) (`2024-11-18T06:15:04.673`)
- [CVE-2024-11310](CVE-2024/CVE-2024-113xx/CVE-2024-11310.json) (`2024-11-18T06:15:04.987`)
- [CVE-2024-43704](CVE-2024/CVE-2024-437xx/CVE-2024-43704.json) (`2024-11-18T05:15:04.687`)
- [CVE-2024-5030](CVE-2024/CVE-2024-50xx/CVE-2024-5030.json) (`2024-11-18T06:15:06.593`)
- [CVE-2024-52940](CVE-2024/CVE-2024-529xx/CVE-2024-52940.json) (`2024-11-18T05:15:05.200`)
- [CVE-2024-52941](CVE-2024/CVE-2024-529xx/CVE-2024-52941.json) (`2024-11-18T06:15:05.283`)
- [CVE-2024-52942](CVE-2024/CVE-2024-529xx/CVE-2024-52942.json) (`2024-11-18T06:15:05.543`)
- [CVE-2024-52943](CVE-2024/CVE-2024-529xx/CVE-2024-52943.json) (`2024-11-18T06:15:05.793`)
- [CVE-2024-52944](CVE-2024/CVE-2024-529xx/CVE-2024-52944.json) (`2024-11-18T06:15:06.017`)
- [CVE-2024-52945](CVE-2024/CVE-2024-529xx/CVE-2024-52945.json) (`2024-11-18T06:15:06.250`)
- [CVE-2024-52946](CVE-2024/CVE-2024-529xx/CVE-2024-52946.json) (`2024-11-18T06:15:06.460`)
- [CVE-2024-52947](CVE-2024/CVE-2024-529xx/CVE-2024-52947.json) (`2024-11-18T06:15:06.530`)
- [CVE-2024-11311](CVE-2024/CVE-2024-113xx/CVE-2024-11311.json) (`2024-11-18T07:15:13.063`)
- [CVE-2024-11312](CVE-2024/CVE-2024-113xx/CVE-2024-11312.json) (`2024-11-18T07:15:14.903`)
- [CVE-2024-11313](CVE-2024/CVE-2024-113xx/CVE-2024-11313.json) (`2024-11-18T07:15:15.420`)
- [CVE-2024-11314](CVE-2024/CVE-2024-113xx/CVE-2024-11314.json) (`2024-11-18T07:15:15.993`)
- [CVE-2024-11315](CVE-2024/CVE-2024-113xx/CVE-2024-11315.json) (`2024-11-18T07:15:16.673`)
- [CVE-2024-22067](CVE-2024/CVE-2024-220xx/CVE-2024-22067.json) (`2024-11-18T07:15:17.370`)
- [CVE-2024-49574](CVE-2024/CVE-2024-495xx/CVE-2024-49574.json) (`2024-11-18T08:15:03.550`)
### CVEs modified in the last Commit

View File

@ -243282,9 +243282,14 @@ CVE-2024-1129,0,0,bb6d36851ed2d72741a575302302ac57d511f2bf349c6ca7db7385fd53c352
CVE-2024-1130,0,0,19461582000c347e1c07ca83a1d00e23feee8e20532d52fc093ba50686691b5b,2024-02-29T13:49:29.390000
CVE-2024-11305,0,0,5328a95bbf7e662e12a857ef5dea77eab4ecc316fb4f536e8772e1db4fed63e6,2024-11-18T01:15:16.307000
CVE-2024-11306,0,0,f77aaaa67be9242d576d27dffde714b37bfb854f091ee9b96d0ca7ce4c9e08c4,2024-11-18T02:15:15.577000
CVE-2024-11308,1,1,7e0a566461a1a25058b504b1b076a10b434fc2fde4d7646a8b9f4bf31fc5a5d5,2024-11-18T06:15:04.263000
CVE-2024-11309,1,1,9411965c35ece716f8c90dd545a21d618e8ac858b01683f6ff41a9045699a6fe,2024-11-18T06:15:04.673000
CVE-2024-11310,1,1,2d4d611d5e61ee3d47de293865eca5b79be60453c907c37cedc531a8bacc72a0,2024-11-18T06:15:04.987000
CVE-2024-11308,0,0,7e0a566461a1a25058b504b1b076a10b434fc2fde4d7646a8b9f4bf31fc5a5d5,2024-11-18T06:15:04.263000
CVE-2024-11309,0,0,9411965c35ece716f8c90dd545a21d618e8ac858b01683f6ff41a9045699a6fe,2024-11-18T06:15:04.673000
CVE-2024-11310,0,0,2d4d611d5e61ee3d47de293865eca5b79be60453c907c37cedc531a8bacc72a0,2024-11-18T06:15:04.987000
CVE-2024-11311,1,1,47f486cfaf2f8e67141b65904d6812610644729332839ae7b425a509d1ee80a1,2024-11-18T07:15:13.063000
CVE-2024-11312,1,1,71db06e2a096f0449f94df279bc5cb863b993686028b0aa9e878b169c9d8d472,2024-11-18T07:15:14.903000
CVE-2024-11313,1,1,890f011cbf9b34450e7704907c25d098bdda5249e8660c02c0f3a68f1c57debc,2024-11-18T07:15:15.420000
CVE-2024-11314,1,1,77b62bdc6299b6d60a12b7a7152852e6fe05a08406e9a701a9a1af91def37fef,2024-11-18T07:15:15.993000
CVE-2024-11315,1,1,cc9ed50e7db63318901354c8ed077ff950a09534cf38b4d91deb60ae50f13e1d,2024-11-18T07:15:16.673000
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000
CVE-2024-1134,0,0,92ca7b611a6a52333e888fa3a581b5dbc5c29b22a5e7e62eb553cb40e2cb6d77,2024-05-24T13:03:05.093000
@ -245855,6 +245860,7 @@ CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11
CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000
CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000
CVE-2024-22066,0,0,04a1f5193e3d1cd4c2ff5e8b00e85bd78f3fa88fdda81531a689089e114ff7c4,2024-11-08T14:31:32.933000
CVE-2024-22067,1,1,0df063e4cfb4727625a4769f0e9465766089f4a68a4efbd16211cd7af62d0a5f,2024-11-18T07:15:17.370000
CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000
CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000
CVE-2024-2207,0,0,8ee5e243bdeb55079a285867c41b1d92102261a83307cfe5423cbfee70a33969,2024-11-13T17:01:16.850000
@ -261490,7 +261496,7 @@ CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c5
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
CVE-2024-43700,0,0,0a06b833e6fd1b1e874ef27bf2dcddebe6eeed2fb3b70101d743561cb29959e0,2024-10-15T14:35:01.987000
CVE-2024-43701,0,0,806d05bc9a9c57505164825be7dbf8680f4cf63f26e698ce90f59cb6324208a0,2024-10-15T15:35:16.050000
CVE-2024-43704,1,1,d894d800767f4d24d5db8cc651f3e2467718438c0e1b54995e70dd32d1bdb36d,2024-11-18T05:15:04.687000
CVE-2024-43704,0,0,d894d800767f4d24d5db8cc651f3e2467718438c0e1b54995e70dd32d1bdb36d,2024-11-18T05:15:04.687000
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
@ -264848,6 +264854,7 @@ CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
CVE-2024-49560,0,0,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
CVE-2024-49574,1,1,1be1ee4ae3282a118752790130cac8d3d756131f62b6f0d2bf633054b33d6aad,2024-11-18T08:15:03.550000
CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
@ -265429,7 +265436,7 @@ CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc
CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000
CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-5030,1,1,a8ed0b3101399e3382eaf8f46c697791821accee3744c8ef02673180c6c5138d,2024-11-18T06:15:06.593000
CVE-2024-5030,0,0,a8ed0b3101399e3382eaf8f46c697791821accee3744c8ef02673180c6c5138d,2024-11-18T06:15:06.593000
CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000
CVE-2024-50306,0,0,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa38c,2024-11-15T13:58:08.913000
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
@ -266434,14 +266441,14 @@ CVE-2024-52922,0,0,41064221b415d208b3430f5d1dea9756de777280fa574c29151d5624fd8d3
CVE-2024-52926,0,0,85aa8f8bcf430bff337ab36716ca6d5e43ae2b3bc9930c2ea3ecc1651d8bcbe9,2024-11-18T04:15:05.140000
CVE-2024-5293,0,0,a0cc00d9353625760ac0d77b1ffd0d6d05d987e18d154ce46567c1580d6373f0,2024-05-24T01:15:30.977000
CVE-2024-5294,0,0,717ff7ad64d7503e40c366bff13431a98da71a0fd2586ca956ddf2437b8cbb81,2024-05-24T01:15:30.977000
CVE-2024-52940,1,1,0c271ed0a167b4f1afbe1b4098784f97280b8973c797d78180215b56523d8f3d,2024-11-18T05:15:05.200000
CVE-2024-52941,1,1,51bd162e4da9767520d98371683fa483d51db8ae6c0a2ab66abeacc7ad6102a6,2024-11-18T06:15:05.283000
CVE-2024-52942,1,1,d5f0c1b9ccae7646bd21c522a86a46043c2ba2722459ffc9f37022ea81793ad5,2024-11-18T06:15:05.543000
CVE-2024-52943,1,1,817be99dbe39212ecb7762443fb6d8592291e04f1acdaf485485b5924fdeb77a,2024-11-18T06:15:05.793000
CVE-2024-52944,1,1,1d9415c3df1effaf2fdd768ecef7969eb9d7287485995e406bc8593dede48522,2024-11-18T06:15:06.017000
CVE-2024-52945,1,1,e54042d64c703df9e8ef816c66f3cff2051889def833fc918055f834dff7d703,2024-11-18T06:15:06.250000
CVE-2024-52946,1,1,92efe9cbd4f19ea913955a20e2df0ccae22f1fbb17a5e4b04f9c5102bfcb8f14,2024-11-18T06:15:06.460000
CVE-2024-52947,1,1,3bd8f19a79d240e4f25235fb45fb41049f946a153f7d95e5b110d65d1353d027,2024-11-18T06:15:06.530000
CVE-2024-52940,0,0,0c271ed0a167b4f1afbe1b4098784f97280b8973c797d78180215b56523d8f3d,2024-11-18T05:15:05.200000
CVE-2024-52941,0,0,51bd162e4da9767520d98371683fa483d51db8ae6c0a2ab66abeacc7ad6102a6,2024-11-18T06:15:05.283000
CVE-2024-52942,0,0,d5f0c1b9ccae7646bd21c522a86a46043c2ba2722459ffc9f37022ea81793ad5,2024-11-18T06:15:05.543000
CVE-2024-52943,0,0,817be99dbe39212ecb7762443fb6d8592291e04f1acdaf485485b5924fdeb77a,2024-11-18T06:15:05.793000
CVE-2024-52944,0,0,1d9415c3df1effaf2fdd768ecef7969eb9d7287485995e406bc8593dede48522,2024-11-18T06:15:06.017000
CVE-2024-52945,0,0,e54042d64c703df9e8ef816c66f3cff2051889def833fc918055f834dff7d703,2024-11-18T06:15:06.250000
CVE-2024-52946,0,0,92efe9cbd4f19ea913955a20e2df0ccae22f1fbb17a5e4b04f9c5102bfcb8f14,2024-11-18T06:15:06.460000
CVE-2024-52947,0,0,3bd8f19a79d240e4f25235fb45fb41049f946a153f7d95e5b110d65d1353d027,2024-11-18T06:15:06.530000
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc648,2024-05-24T01:15:30.977000
CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000

Can't render this file because it is too large.