Auto-Update: 2024-11-12T00:55:19.271121+00:00

This commit is contained in:
cad-safe-bot 2024-11-12 00:58:21 +00:00
parent cfd2081ec1
commit ca64c00da2
18 changed files with 391 additions and 53 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-34543",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-07T21:15:08.177",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-11T23:15:04.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status."
"value": "The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status. Fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-34544",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-07T21:15:08.217",
"lastModified": "2021-12-09T17:15:35.563",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-11T23:15:04.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device."
"value": "An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device. Fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2022-47767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-26T21:18:05.573",
"lastModified": "2023-02-06T17:05:03.630",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-11T23:15:04.887",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects all Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included)."
"value": "A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included). This does not exist in SL 200, 500, 1000 / fixed in 4.2.8 for SL 250, 300, 1200, 2000, SL 50 Gateway / fixed in 5.1.2 / 6.0.0 for SL Base."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-46344",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.537",
"lastModified": "2024-09-18T19:15:38.530",
"lastModified": "2024-11-11T23:15:05.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. NOTE: The vendor states that this vulnerability has been fixed in version 6.2.0-170."
"value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. NOTE: The vendor states that this vulnerability has been fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
},
{
"lang": "es",
@ -95,6 +95,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.solar-log.com/en/support/firmware-database-1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11079",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-12T00:15:15.543",
"lastModified": "2024-11-12T00:15:15.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-11079",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325171",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-23983",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-11-11T23:15:05.217",
"lastModified": "2024-11-11T23:15:05.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:X/V:X/RE:M/U:Amber",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "PRESENT",
"automatable": "YES",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "AMBER",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-177"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://docs.pingidentity.com/pingaccess/latest/release_notes/pa_811_rn.html",
"source": "responsible-disclosure@pingidentity.com"
},
{
"url": "https://www.pingidentity.com/en/resources/downloads/pingaccess.html",
"source": "responsible-disclosure@pingidentity.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-25253",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.393",
"lastModified": "2024-11-11T23:15:05.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Driver Booster v10.6 was discovered to contain a buffer overflow via the Host parameter under the Customize proxy module."
}
],
"metrics": {},
"references": [
{
"url": "https://exploitart.ist/exploit/2023/09/10/driver-booster-buffer-overflow.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-25254",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.460",
"lastModified": "2024-11-11T23:15:05.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-25255",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.523",
"lastModified": "2024-11-11T23:15:05.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sublime Text 4 was discovered to contain a command injection vulnerability via the New Build System module."
}
],
"metrics": {},
"references": [
{
"url": "https://exploitart.ist/exploit/2023/09/17/sublime-text-os-command-injection.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-40116",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-26T20:15:04.980",
"lastModified": "2024-08-01T13:56:51.153",
"lastModified": "2024-11-11T23:15:05.593",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Solar-Log 1000 before v2.8.2 and build 52-23.04.2013 was discovered to store plaintext passwords in the export.html, email.html, and sms.html files."
"value": "An issue in Solar-Log 1000 before v2.8.2 and build 52-23.04.2013 was discovered to store plaintext passwords in the export.html, email.html, and sms.html files -- fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
},
{
"lang": "es",
@ -32,6 +32,10 @@
{
"url": "https://github.com/nepenthe0320/cve_poc/blob/master/Solar-Log%201000%20-%20Unprotected%20Storage%20of%20Credentials",
"source": "cve@mitre.org"
},
{
"url": "https://www.solar-log.com/en/support/firmware-database-1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-40117",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-26T20:15:05.033",
"lastModified": "2024-08-01T13:56:51.860",
"lastModified": "2024-11-11T23:15:05.687",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Solar-Log 1000 before v2.8.2 and build 52- 23.04.2013 allows attackers to obtain Administrative privileges via connecting to the web administration server."
"value": "Incorrect access control in Solar-Log 1000 before v2.8.2 and build 52- 23.04.2013 allows attackers to obtain Administrative privileges via connecting to the web administration server. Not existing for SL 200, 500, 1000 / fixed in 4.2.8 for SL 250, 300, 1200, 2000, SL 50 Gateway / fixed in 5.1.2 / 6.0.0 for SL Base."
},
{
"lang": "es",
@ -59,6 +59,10 @@
{
"url": "https://github.com/nepenthe0320/cve_poc/blob/master/Solar-Log%201000%20-%20Incorrect%20Access%20Control",
"source": "cve@mitre.org"
},
{
"url": "https://www.solar-log.com/en/support/firmware-database-1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44765",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-08T19:15:05.590",
"lastModified": "2024-11-08T19:15:05.590",
"lastModified": "2024-11-12T00:15:15.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Authorization (Access Control Misconfiguration) vulnerability in MGT-COMMERCE GmbH v2.0.0 to v2.4.2 allows attackers to escalate privileges and access sensitive information via manipulation of the Nginx configuration file."
"value": "An Improper Authorization (Access Control Misconfiguration) vulnerability in MGT-COMMERCE GmbH CloudPanel v2.0.0 to v2.4.2 allows low-privilege users to bypass access controls and gain unauthorized access to sensitive configuration files and administrative functionality."
},
{
"lang": "es",
"value": "Una vulnerabilidad de autorizaci\u00f3n incorrecta (configuraci\u00f3n incorrecta del control de acceso) en MGT-COMMERCE GmbH v2.0.0 a v2.4.2 permite a los atacantes escalar privilegios y acceder a informaci\u00f3n confidencial mediante la manipulaci\u00f3n del archivo de configuraci\u00f3n de Nginx."
}
],
"metrics": {},

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-50601",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.763",
"lastModified": "2024-11-11T23:15:05.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Persistent and reflected XSS vulnerabilities in the themeMode cookie and _h URL parameter of Axigen Mail Server up to version 10.5.28 allow attackers to execute arbitrary Javascript. Exploitation could lead to session hijacking, data leakage, and further exploitation via a multi-stage attack. Fixed in versions 10.3.3.67, 10.4.42, and 10.5.29."
}
],
"metrics": {},
"references": [
{
"url": "https://www.axigen.com/knowledgebase/Axigen-WebMail-Persistent-and-Reflected-XSS-Vulnerabilities-CVE-2024-50601-_403.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-50636",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.833",
"lastModified": "2024-11-11T23:15:05.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PyMOL 2.5.0 contains a vulnerability in its \"Run Script\" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/schrodinger/pymol-open-source/issues/405",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-50636/Description.md",
"source": "cve@mitre.org"
},
{
"url": "https://youtu.be/SWnN_a1tUNc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51213",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.900",
"lastModified": "2024-11-11T23:15:05.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Online Shop Store v.1.0 allows a remote attacker to execute arbitrary code via the login.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Prabhatsk7/CVE/blob/main/CVE-2024-51213",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-52533",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T23:15:05.967",
"lastModified": "2024-11-11T23:15:05.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\0' character."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3461",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-11T23:00:19.408819+00:00
2024-11-12T00:55:19.271121+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-11T22:15:13.860000+00:00
2024-11-12T00:15:15.777000+00:00
```
### Last Data Feed Release
@ -33,31 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269067
269076
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `9`
- [CVE-2024-10694](CVE-2024/CVE-2024-106xx/CVE-2024-10694.json) (`2024-11-11T21:15:06.030`)
- [CVE-2024-44546](CVE-2024/CVE-2024-445xx/CVE-2024-44546.json) (`2024-11-11T21:15:06.360`)
- [CVE-2024-46962](CVE-2024/CVE-2024-469xx/CVE-2024-46962.json) (`2024-11-11T21:15:06.437`)
- [CVE-2024-46963](CVE-2024/CVE-2024-469xx/CVE-2024-46963.json) (`2024-11-11T21:15:06.493`)
- [CVE-2024-46964](CVE-2024/CVE-2024-469xx/CVE-2024-46964.json) (`2024-11-11T21:15:06.560`)
- [CVE-2024-46966](CVE-2024/CVE-2024-469xx/CVE-2024-46966.json) (`2024-11-11T21:15:06.620`)
- [CVE-2024-51026](CVE-2024/CVE-2024-510xx/CVE-2024-51026.json) (`2024-11-11T21:15:06.683`)
- [CVE-2024-11079](CVE-2024/CVE-2024-110xx/CVE-2024-11079.json) (`2024-11-12T00:15:15.543`)
- [CVE-2024-23983](CVE-2024/CVE-2024-239xx/CVE-2024-23983.json) (`2024-11-11T23:15:05.217`)
- [CVE-2024-25253](CVE-2024/CVE-2024-252xx/CVE-2024-25253.json) (`2024-11-11T23:15:05.393`)
- [CVE-2024-25254](CVE-2024/CVE-2024-252xx/CVE-2024-25254.json) (`2024-11-11T23:15:05.460`)
- [CVE-2024-25255](CVE-2024/CVE-2024-252xx/CVE-2024-25255.json) (`2024-11-11T23:15:05.523`)
- [CVE-2024-50601](CVE-2024/CVE-2024-506xx/CVE-2024-50601.json) (`2024-11-11T23:15:05.763`)
- [CVE-2024-50636](CVE-2024/CVE-2024-506xx/CVE-2024-50636.json) (`2024-11-11T23:15:05.833`)
- [CVE-2024-51213](CVE-2024/CVE-2024-512xx/CVE-2024-51213.json) (`2024-11-11T23:15:05.900`)
- [CVE-2024-52533](CVE-2024/CVE-2024-525xx/CVE-2024-52533.json) (`2024-11-11T23:15:05.967`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `7`
- [CVE-2024-34014](CVE-2024/CVE-2024-340xx/CVE-2024-34014.json) (`2024-11-11T22:15:13.773`)
- [CVE-2024-34015](CVE-2024/CVE-2024-340xx/CVE-2024-34015.json) (`2024-11-11T22:15:13.860`)
- [CVE-2024-39924](CVE-2024/CVE-2024-399xx/CVE-2024-39924.json) (`2024-11-11T21:15:06.150`)
- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2024-11-11T21:15:06.237`)
- [CVE-2024-39926](CVE-2024/CVE-2024-399xx/CVE-2024-39926.json) (`2024-11-11T21:15:06.297`)
- [CVE-2021-34543](CVE-2021/CVE-2021-345xx/CVE-2021-34543.json) (`2024-11-11T23:15:04.597`)
- [CVE-2021-34544](CVE-2021/CVE-2021-345xx/CVE-2021-34544.json) (`2024-11-11T23:15:04.767`)
- [CVE-2022-47767](CVE-2022/CVE-2022-477xx/CVE-2022-47767.json) (`2024-11-11T23:15:04.887`)
- [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-11-11T23:15:05.053`)
- [CVE-2024-40116](CVE-2024/CVE-2024-401xx/CVE-2024-40116.json) (`2024-11-11T23:15:05.593`)
- [CVE-2024-40117](CVE-2024/CVE-2024-401xx/CVE-2024-40117.json) (`2024-11-11T23:15:05.687`)
- [CVE-2024-44765](CVE-2024/CVE-2024-447xx/CVE-2024-44765.json) (`2024-11-12T00:15:15.777`)
## Download and Usage

View File

@ -177783,8 +177783,8 @@ CVE-2021-34538,0,0,e27df40d84951f93435b6a387c3bab3ce21e57a055c23fd24407c99056ee4
CVE-2021-34539,0,0,8d75c3a8861a979f669fbd0d5e23b33350b72e3a7602381a8efa5e2888db6e35,2022-07-12T17:42:04.277000
CVE-2021-3454,0,0,5935c4b036630127bf57bd7a2e2c8299bf41947fc0b23edb841cedc01bb1d9ae,2023-07-07T19:13:27.937000
CVE-2021-34540,0,0,f7b193796ff4ce785f64332f6008e67cbf1c3c999c3da28dffe5e5e46831fb3e,2021-06-21T17:37:42.973000
CVE-2021-34543,0,0,9cb97c9f503da04c086a2dfe4e601ece621be7b2b306d3e3bb482df135373d11,2022-07-12T17:42:04.277000
CVE-2021-34544,0,0,1a476d7212b98ad0467c11446fa5e1ac13ba9a3b0f25825995a1d002964e065d,2021-12-09T17:15:35.563000
CVE-2021-34543,0,1,b0b880923a73728cc0633c12ac29b349e35d6affb7e1f212be1d702fd220403f,2024-11-11T23:15:04.597000
CVE-2021-34544,0,1,e379357b77107a0c4b34e75cb0a57bff0e7b7c1125092d92d4dbba95a663f3d4,2024-11-11T23:15:04.767000
CVE-2021-34546,0,0,4cb879dd240399282d65e4766ee0a8283ad80c211eaeacc86e74c55f39639810,2021-06-22T00:52:11.587000
CVE-2021-34547,0,0,0a891a024ed191aa712617e3b47599567264cce95b0efdcebf41ba71649974cb,2021-06-21T19:38:50.833000
CVE-2021-34548,0,0,663c80b650287f3a4b4e7db673b01738c7b78572486f64b52bf99f17f0c4870d,2023-08-08T14:21:49.707000
@ -211705,7 +211705,7 @@ CVE-2022-47758,0,0,980885e7f8c8c123926524f8b49c058ed03a60d8cfd91c79fdae78ab4583d
CVE-2022-4776,0,0,89ad70ba78bd0c4574f0d0dd266a0f9b1b0a423fde805c5c865d150d9b5834e8,2023-11-07T03:58:53.807000
CVE-2022-47762,0,0,c5ddf8f5613afe98918beceaaea4613fe5c3851eb4d4dd89c26e616d07d69782,2023-02-10T17:31:13.647000
CVE-2022-47766,0,0,07f5e9ee0169e3e4e09a1b6a78eb0992a245c4d30a6cbf2c96ea0f82d81ba098,2023-01-25T19:41:20.700000
CVE-2022-47767,0,0,ba15ff9395c6d841b2f98f0ae4c6c8e9afd5ee3e809279c1f5071b46af53aec8,2023-02-06T17:05:03.630000
CVE-2022-47767,0,1,5cc4efd6c377be6f108249fa5ffac4d26f8b2993d6cdf4f31e4321a93a9ac681,2024-11-11T23:15:04.887000
CVE-2022-47768,0,0,a4485e03538fc61442f062c166f3fdb30977c3b0c9cbb6a2158affadb7aa8784,2023-02-08T01:35:48.320000
CVE-2022-47769,0,0,17da4d5e9b45f54f2ffa9c0649aee394b1ec469949d1ad2687f0f94a244c942b,2023-02-08T01:37:42.350000
CVE-2022-4777,0,0,bbc07d3bef25cf6a58dec60c8107a3051f1e382a7fcc92cfbce9fa0907495a18,2023-11-07T03:58:54.080000
@ -234933,7 +234933,7 @@ CVE-2023-46331,0,0,04cd61dfd10963dca9fbcf837dea9f8020c410bf57e5d2798677244025b8b
CVE-2023-46332,0,0,6c9559cbc141af18bf835d306eccb7709cce74f80bbd9e0fbef45908546c332c,2023-10-30T19:49:15.050000
CVE-2023-4634,0,0,bf7d08858f3a3f582f40dbe02868443761c24fab9208b3b2fbb736c9abe1e825,2023-11-07T04:22:48.157000
CVE-2023-46343,0,0,ef8e988e646ba4c0215f7ee2afd0886d674afe5087c355e7ed7e301ff8dcfb19,2024-01-29T22:51:18.303000
CVE-2023-46344,0,0,5736d8cfde20b73327fbebdc77ca1b8d417cdd5df4a924540b1648e975c6f2d5,2024-09-18T19:15:38.530000
CVE-2023-46344,0,1,2d05682baa4bc5e65a42a42e4b53aec899bc61b3ace8c5368368e32354d4a239,2024-11-11T23:15:05.053000
CVE-2023-46345,0,0,55ca20c0ef63e29c15c36f7e62c2585d7978da71058f53bfa1bdd49f3888824d,2023-11-03T18:08:37.197000
CVE-2023-46346,0,0,daecd27fc8f2fd4c198e7949e808230ee5fb479c940371b1e54b87fb00266a9c,2024-09-11T20:35:08.777000
CVE-2023-46347,0,0,95e0239e93985a03781fe39c8d15effed111f0245b336d3e67ccfa775cce5af5,2024-09-11T21:35:05.457000
@ -242817,7 +242817,7 @@ CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5
CVE-2024-10688,0,0,b87010fae9ede3dbc09789e0772582c4276000ac6cb27b14936b5c62cabc817d,2024-11-09T07:15:05.720000
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
CVE-2024-10693,0,0,0d972d4fb67fabef178798fca42d506d87be385cb4dc04f7a4ba35154ff77347,2024-11-09T04:15:04.943000
CVE-2024-10694,1,1,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000
CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000
CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000
@ -242990,6 +242990,7 @@ CVE-2024-11074,0,0,3292be654074303b8aa09792e3ecb0850cc4c26bc562e2e86add74b958a09
CVE-2024-11076,0,0,7df76c2fec7ddbe95ba6a8ae79e5c42ef3c68523dcd6027c51295ba7db67b000,2024-11-11T18:15:14.940000
CVE-2024-11077,0,0,181130d814c7f61538497c5e53f441fcc9247f27113c622321e134d349587ec8,2024-11-11T19:15:03.660000
CVE-2024-11078,0,0,8190043eda67017a5363e09bea355d4c2dfef250f70e1b21db23c961bbf97681,2024-11-11T20:15:17.400000
CVE-2024-11079,1,1,a13f7144a33d93e55e5f2f65a8534bfe507fba4c4162e528b7ea851542470459,2024-11-12T00:15:15.543000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
CVE-2024-1110,0,0,2a7a998b7b1ccd0c64d40f28b7bfefdfe0681031ac010f23e86b81b22a7f4df6,2024-02-10T04:13:13.260000
@ -246943,6 +246944,7 @@ CVE-2024-2398,0,0,1df50a613e2f34671ada45040fb8ddc3d4f8857a9d7670bf2946d253e5c247
CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000
CVE-2024-23981,0,0,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000
CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000
CVE-2024-23983,1,1,62337635b3787d95d0b4e8f3d77f6b56b4d73e99439109ebbfddd587166d5b41,2024-11-11T23:15:05.217000
CVE-2024-23984,0,0,d3e73193a48d5d3cf92db1c5b64a20f69007ddc7f878f4f1b9cdbda94c886b24,2024-09-16T18:03:16.707000
CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000
CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000
@ -247710,6 +247712,9 @@ CVE-2024-25249,0,0,c8f53501756495a734a74ff7add6ed7b337966c8ca29065859babe4290aee
CVE-2024-2525,0,0,0cd1ed7faad83b5a9e935ff66736a2f3ef52e3e5ca65ec7de6d2b90849c09724,2024-06-11T18:15:13.263000
CVE-2024-25250,0,0,30390a3108791fc3d353462d14426df849232b29aa14c37ad0af97fffe69a039,2024-08-27T20:35:13.350000
CVE-2024-25251,0,0,4d70de3df6118fbe7d3792c31913c0db5782c21a7d7e078c726229fd1ced9ad9,2024-08-16T18:35:06.257000
CVE-2024-25253,1,1,3822bbd656795c7ee7440d90842dc3f0e62ed2069bc0c4b747d07d8d8a98faa3,2024-11-11T23:15:05.393000
CVE-2024-25254,1,1,6779a43e66aa1e79b0cdc47b34794f8eddf45e963fa38d77bd9f354c253103c7,2024-11-11T23:15:05.460000
CVE-2024-25255,1,1,a959526960c18e6f88774d77d75cd2e62db30f997d7e5372ca3b9e307dff5988,2024-11-11T23:15:05.523000
CVE-2024-2526,0,0,da44cbcd46359ce613873d7604fc44e9ca075cba9a523edc17aed5804a21af9d,2024-05-17T02:38:17.223000
CVE-2024-25260,0,0,6fa7a07676f89be99cdfd9160294fea45305c2bf656b7b3f6b3836cc1f08767b,2024-08-01T13:47:38.247000
CVE-2024-25262,0,0,8f24f4c38fd90e744be4f19671fa5e63b5c263766ec9e369e10b77ef5ec75569,2024-09-04T19:35:11.910000
@ -254183,8 +254188,8 @@ CVE-2024-34010,0,0,7772431fddbfa4456518c6f3c79bfb5e61dd9e04f9a0c45164641cb3c48c8
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
CVE-2024-34014,0,1,530943669013f82e8fb90843fc38790c89f82476cd985fa1ead56ab9891121c0,2024-11-11T22:15:13.773000
CVE-2024-34015,0,1,eeedaa29e55a398e61de4630fba8facd792ffc23d5d1ad1c7593ea40b1cfc01a,2024-11-11T22:15:13.860000
CVE-2024-34014,0,0,530943669013f82e8fb90843fc38790c89f82476cd985fa1ead56ab9891121c0,2024-11-11T22:15:13.773000
CVE-2024-34015,0,0,eeedaa29e55a398e61de4630fba8facd792ffc23d5d1ad1c7593ea40b1cfc01a,2024-11-11T22:15:13.860000
CVE-2024-34016,0,0,0c2a3147a84e04c06db0d6af075b8e16276b7cf9e5f22acd81f74dbeca1a1c49,2024-09-20T12:31:20.110000
CVE-2024-34017,0,0,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000
CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000
@ -258561,9 +258566,9 @@ CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe733
CVE-2024-39920,0,0,6bef49e28b0964791fd5773db4da2a4c4749e9b59fc7a5ce56343d0a0b5eb623,2024-08-05T19:35:13.550000
CVE-2024-39921,0,0,8750ad5c2c8d904b148b2fe5647ee9c07abb86c09ba269f3b4588119fa46be47,2024-09-19T14:59:49.977000
CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae3450561de,2024-08-13T12:58:25.437000
CVE-2024-39924,0,1,4d865982ddda3a94c215171a2e2b2da91bc7a7724a1e146a25b1bcdc760cdbcc,2024-11-11T21:15:06.150000
CVE-2024-39925,0,1,377300f4bbcd327b125f32c94f28e2d41ed3214101c0ec4e8b4d11cee8a27c17,2024-11-11T21:15:06.237000
CVE-2024-39926,0,1,ca7877795714bc57f19aa820dea0695017f6966c01033e063c526e11b36cbcaa,2024-11-11T21:15:06.297000
CVE-2024-39924,0,0,4d865982ddda3a94c215171a2e2b2da91bc7a7724a1e146a25b1bcdc760cdbcc,2024-11-11T21:15:06.150000
CVE-2024-39925,0,0,377300f4bbcd327b125f32c94f28e2d41ed3214101c0ec4e8b4d11cee8a27c17,2024-11-11T21:15:06.237000
CVE-2024-39926,0,0,ca7877795714bc57f19aa820dea0695017f6966c01033e063c526e11b36cbcaa,2024-11-11T21:15:06.297000
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
CVE-2024-39928,0,0,fc1a842efa03603045ff23fa5bcb65b8a6ef315564a7722d9ffda28553de47dd,2024-09-26T13:32:02.803000
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
@ -258624,8 +258629,8 @@ CVE-2024-40101,0,0,886521863c96c11be959a1cf217c3eefcb0791bdf3b877e4dc348f32f4062
CVE-2024-4011,0,0,1484f28c8125b702be19148770f89c8b6b993aafff3c3ded37de5b6fc9a35488,2024-08-30T14:15:16.590000
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca1da,2024-08-26T17:35:05.733000
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
CVE-2024-40116,0,1,9c8eb6ee76546a988d2cbc252ec3d3f5818ddeee35032042ba2387b02d68a7a4,2024-11-11T23:15:05.593000
CVE-2024-40117,0,1,0fa1bf41495c78c014d18e3c4ad810fdb2a27d5f1e591c54edae048e47983038,2024-11-11T23:15:05.687000
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
CVE-2024-40125,0,0,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
@ -261509,7 +261514,7 @@ CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88f
CVE-2024-44540,0,0,4abad310f91dcba57b664a0055c040b07c16796e1c5dc9c0c69652281e33825a,2024-09-26T13:32:55.343000
CVE-2024-44541,0,0,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000
CVE-2024-44542,0,0,ae61c0f5fd9542e820a853b434527731c00f8fe17ea27a1b37dfc0ba3c44f2e0,2024-09-20T12:30:17.483000
CVE-2024-44546,1,1,0af2aa7b2120b505f3c140655b2db68460cbfa198862b06e0b34bf0b1819f8e2,2024-11-11T21:15:06.360000
CVE-2024-44546,0,0,0af2aa7b2120b505f3c140655b2db68460cbfa198862b06e0b34bf0b1819f8e2,2024-11-11T21:15:06.360000
CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000
CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000
CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000
@ -261578,7 +261583,7 @@ CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c0
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000
CVE-2024-44765,0,0,69ac2995f100d6b9946c4a74871be69484fc4ac8166ac0a0c28b31f7475bd18a,2024-11-08T19:15:05.590000
CVE-2024-44765,0,1,188183cc106f4fbc7f5f3314f8ea941fd49275ee7d9ef0cc80e225745686937a,2024-11-12T00:15:15.777000
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
CVE-2024-44775,0,0,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000
CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000
@ -262824,11 +262829,11 @@ CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c06
CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000
CVE-2024-46960,0,0,34c9db930ef4e9e6f8b9462edd0bebd8143074b581b4cd4eaf2ae451689fb83c,2024-11-08T19:01:03.880000
CVE-2024-46961,0,0,6281dfd23f05aedb5a57016518bf840f9c3236bd7244aca077f0eeaa5baad6cb,2024-11-08T19:01:03.880000
CVE-2024-46962,1,1,699e9832c4f5085d60fa615701babb34b6ee37f956ecaefe53f68aabf3821dba,2024-11-11T21:15:06.437000
CVE-2024-46963,1,1,8a455d84ba423d84ebd7ae416c6b3257c3c88e7ee88de9e2a033bbd8df54c61f,2024-11-11T21:15:06.493000
CVE-2024-46964,1,1,4562cd5cb3219c462d845507d071d544a1fc5398f514eef73947ac33162fd6ee,2024-11-11T21:15:06.560000
CVE-2024-46962,0,0,699e9832c4f5085d60fa615701babb34b6ee37f956ecaefe53f68aabf3821dba,2024-11-11T21:15:06.437000
CVE-2024-46963,0,0,8a455d84ba423d84ebd7ae416c6b3257c3c88e7ee88de9e2a033bbd8df54c61f,2024-11-11T21:15:06.493000
CVE-2024-46964,0,0,4562cd5cb3219c462d845507d071d544a1fc5398f514eef73947ac33162fd6ee,2024-11-11T21:15:06.560000
CVE-2024-46965,0,0,b1fed9b30e2da539a3588ca6bce27b0ada48b333b441ddada52258a3843ded7e,2024-11-11T20:15:17.740000
CVE-2024-46966,1,1,811ef517cb3c37bce19b3b92ed511f2be2f9a8eda5292ad25b25c5c6c3f261a9,2024-11-11T21:15:06.620000
CVE-2024-46966,0,0,811ef517cb3c37bce19b3b92ed511f2be2f9a8eda5292ad25b25c5c6c3f261a9,2024-11-11T21:15:06.620000
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000
CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000
@ -264870,6 +264875,7 @@ CVE-2024-50592,0,0,1ea6423960cc50e93195b2cf1d9f7905b125a77bfd5004aeb42759deb6410
CVE-2024-50593,0,0,2990c55af886ff8c2c12dbcca8abdce067826f7d03b201038626b94cf51f8774,2024-11-08T19:01:03.880000
CVE-2024-50599,0,0,3c6f0c29bfc51c064c63c37a765c151941367295dbdeff70ad17448c4c631795,2024-11-08T19:01:03.880000
CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000
CVE-2024-50601,1,1,25615c335aec72439bc642df0ba921a5f5fe397dc6c11b4dc75d7bb647cd9fd0,2024-11-11T23:15:05.763000
CVE-2024-50602,0,0,45e9269102f2b541d78d641e3b6d4f0d7b12a8e026b5814df3e38d2c0c706172,2024-10-30T18:35:16.237000
CVE-2024-5061,0,0,acb15fde0f7701ee7d55862ecbc276a299a2eba41aa60a0bce397763155cd902,2024-09-03T15:11:56.787000
CVE-2024-50610,0,0,2336f18018549d31226ad5c4df53b32342f6a9adf12b0e16f4241999fbebe853,2024-10-30T19:35:30.033000
@ -264884,6 +264890,7 @@ CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
CVE-2024-50634,0,0,1259534018b84fc966c6bbf71883176c6258839dafca0d12474268de67eb80a9,2024-11-08T19:01:03.880000
CVE-2024-50636,1,1,0ade0dea604da8447f47847dfb20b4ef4ecbce093e12be8e7df0e1bf680276fb,2024-11-11T23:15:05.833000
CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
@ -264963,7 +264970,7 @@ CVE-2024-51021,0,0,b06ad1dc7caa63f0b78f2a692ebfbc7dc3db4861942e25ad61d65ea6408ad
CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884419,2024-11-05T16:35:35
CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000
CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000
CVE-2024-51026,1,1,b4a18cb304cdcd98893c390c948e2bd74a14013e8cf53f27bf028896222d12d1,2024-11-11T21:15:06.683000
CVE-2024-51026,0,0,b4a18cb304cdcd98893c390c948e2bd74a14013e8cf53f27bf028896222d12d1,2024-11-11T21:15:06.683000
CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000
CVE-2024-51030,0,0,8864f5f848b4bd116cf6c117fc9413494345870c652480a21b492e7685b9b04b,2024-11-08T19:01:03.880000
CVE-2024-51031,0,0,1e5ab5cf9c7a25d9afff4cfa33f3918bc3dcf7d5460284d217623f0076ca881a,2024-11-08T19:01:03.880000
@ -265011,6 +265018,7 @@ CVE-2024-51190,0,0,98f0a187727d181cd04296c95bf7f523a0e5d0f2ebffd8b3dc00762fc2ed5
CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
CVE-2024-51211,0,0,9f7216f2f8d2a000da238cb20861cfda4ea040b75cc4ecdd6f811f2bee27be17,2024-11-08T19:15:06.347000
CVE-2024-51213,1,1,a2dd45dd78a543da33259713e72fe69b4f547b616ddaa87debf61b5669001042,2024-11-11T23:15:05.900000
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
@ -265440,6 +265448,7 @@ CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adab
CVE-2024-52530,0,0,3eaa32ccf56907047fdf4b4deac8010886f5cea3e0799d98db773dc18889ead4,2024-11-11T20:15:20.247000
CVE-2024-52531,0,0,e1da16d13ad377fa18c4d7acff83ec981e6fd45e16e236f3d3149c47740c9f9c,2024-11-11T20:15:20.313000
CVE-2024-52532,0,0,92541ad4eaa4a5badb32130e01157e806e2d95ba7daec0d82fbf422a69aebf7a,2024-11-11T20:15:20.370000
CVE-2024-52533,1,1,234a4746689dc23fe52ffcba81b202c439e7f5c45ade0a89e45d4f95cb4fed7b,2024-11-11T23:15:05.967000
CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000
CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000
CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000

Can't render this file because it is too large.