Auto-Update: 2024-10-09T14:00:52.103800+00:00

This commit is contained in:
cad-safe-bot 2024-10-09 14:03:51 +00:00
parent 9e2ff0b549
commit d00a058b64
16 changed files with 783 additions and 134 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-22590",
"sourceIdentifier": "product-security@apple.com",
"published": "2022-03-18T18:15:12.623",
"lastModified": "2022-09-09T20:43:04.573",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-09T13:40:58.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -83,6 +83,12 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "556E3C87-7083-4145-8D61-C8F9A1EBC440"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
@ -102,12 +108,6 @@
"versionEndExcluding": "12.2",
"matchCriteriaId": "5BD8A840-1C3E-4D4B-B497-250712283BCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "707C6063-5091-455F-8E41-5035CB4D8CC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
@ -123,6 +123,22 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.36.7",
"matchCriteriaId": "BA0CF181-BD0B-43B5-B5B6-9BB9B9D28BB9"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30050",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-16T17:15:09.537",
"lastModified": "2022-05-24T22:23:08.480",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-09T13:46:28.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,13 +85,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:5.55:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA1CB2A-84E3-484B-8513-DEFC64A4DD41"
"criteria": "cpe:2.3:a:sir:gnuboard:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D5F8C5-75C4-4586-AEAB-C1868E9E8463"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:5.56:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D25BEA-7619-4E7C-B5FC-9EB347765AE5"
"criteria": "cpe:2.3:a:sir:gnuboard:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47061CBC-7C39-4483-B940-B44516B5FDB6"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6294",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-12T16:15:08.167",
"lastModified": "2024-08-01T18:35:05.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:24:04.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,20 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +85,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.2.6",
"matchCriteriaId": "94B0DED4-72C8-4177-B7EF-CF8F9CD467E6"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/eaeb5706-b19c-4266-b7df-889558ee2614/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0248",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-12T16:15:08.443",
"lastModified": "2024-02-12T17:31:21.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:11:10.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "El complemento EazyDocs de WordPress anterior a 2.4.0 reintrodujo CVE-2023-6029 (https://wpscan.com/vulnerability/7a0aaf85-8130-4fd7-8f09-f8edc929597e/) en 2.3.8, lo que permite a cualquier usuario autenticado, como suscriptor para eliminar publicaciones arbitrarias, as\u00ed como agregar y eliminar documentos/secciones. El problema se solucion\u00f3 parcialmente en 2.3.9."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spider-themes:eazydocs:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.0",
"matchCriteriaId": "E24DCD0E-0D46-49D1-80FE-AEB553CE140F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0250",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-12T16:15:08.500",
"lastModified": "2024-02-12T17:31:21.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:19:36.667",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "El complemento Analytics Insights for Google Analytics 4 (AIWP) de WordPress anterior a 6.3 es vulnerable a Open Redirect debido a una validaci\u00f3n insuficiente en el archivo de redireccionamiento oauth2callback.php. Esto hace posible que atacantes no autenticados redirijan a los usuarios a sitios potencialmente maliciosos si logran enga\u00f1arlos para que realicen una acci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deconf:analytics_insights:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.3",
"matchCriteriaId": "87CD0207-50C9-47B0-8156-247A1B2C9C0B"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1159",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-13T10:15:08.603",
"lastModified": "2024-02-13T14:01:00.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:22:23.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.8.1",
"matchCriteriaId": "122FB828-4F7B-4059-B9C1-B6CDC7DA54A6"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e71386ea-0546-4aa7-b77a-e1824e80accc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1160",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-13T10:15:08.783",
"lastModified": "2024-02-13T14:01:00.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:30:12.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.8.1",
"matchCriteriaId": "122FB828-4F7B-4059-B9C1-B6CDC7DA54A6"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/818d3418-8e14-49b9-a112-8eab9eb3c283?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-28168",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-09T12:15:02.850",
"lastModified": "2024-10-09T12:15:02.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of XML External Entity Reference ('XXE') vulnerability in Apache XML Graphics FOP.\n\nThis issue affects Apache XML Graphics FOP: 2.9.\n\nUsers are recommended to upgrade to version 2.10, which fixes the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://xmlgraphics.apache.org/security.html",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44949",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:30.040",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:53:32.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,93 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: parisc: se corrige una posible corrupci\u00f3n de DMA ARCH_DMA_MINALIGN se defini\u00f3 como 16 - esto es demasiado peque\u00f1o - puede ser posible que dos asignaciones de 16 bytes no relacionadas compartan una l\u00ednea de cach\u00e9. Si una de estas asignaciones se escribe usando DMA y la otra se escribe usando escritura en cach\u00e9, el valor que se escribi\u00f3 con DMA puede estar da\u00f1ado. Esta confirmaci\u00f3n cambia ARCH_DMA_MINALIGN a 128 en PA20 y 32 en PA1.1 - ese es el tama\u00f1o de l\u00ednea de cach\u00e9 m\u00e1s grande posible. Como las diferentes microarquitecturas de parisc tienen diferentes tama\u00f1os de l\u00ednea de cach\u00e9, definimos arch_slab_minalign(), cache_line_size() y dma_get_cache_alignment() para que el kernel pueda ajustar los par\u00e1metros de cach\u00e9 de losa din\u00e1micamente, seg\u00fan el tama\u00f1o de l\u00ednea de cach\u00e9 detectado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.46",
"matchCriteriaId": "84C35A98-08C9-4674-8AC8-9CC0757B7699"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/533de2f470baac40d3bf622fe631f15231a03c9f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/642a0b7453daff0295310774016fcb56d1f5bc7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ae04ba36b381bffe2471eff3a93edced843240f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45720",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-09T13:15:11.337",
"lastModified": "2024-10-09T13:15:11.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\n\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\n\nSubversion is not affected on UNIX-like platforms."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://subversion.apache.org/security/CVE-2024-45720-advisory.txt",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5127",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-06T18:15:19.000",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:38:49.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +83,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.2",
"versionEndExcluding": "1.2.25",
"matchCriteriaId": "9169F5D4-79D9-4037-A925-AACE05CCE9C5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/b7bd3a830a0f47ba07d0fd57bf78c4dd8a216297",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/719a5db3-f943-4100-a660-011cadf1bb32",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9568",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-07T15:15:09.177",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:04:42.653",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formAdvNetwork of the file /goform/formAdvNetwork. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "En D-Link DIR-619L B1 2.06 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. La funci\u00f3n formAdvNetwork del archivo /goform/formAdvNetwork est\u00e1 afectada. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -64,6 +68,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -123,26 +147,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*",
"matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F99992A1-E442-4D83-84F4-44F44C25219C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formAdvNetwork.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.279462",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.279462",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.414545",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9569",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-07T15:15:09.437",
"lastModified": "2024-10-07T17:47:48.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-09T13:04:55.907",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability has been found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this vulnerability is the function formEasySetPassword of the file /goform/formEasySetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en D-Link DIR-619L B1 2.06 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formEasySetPassword del archivo /goform/formEasySetPassword. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -64,6 +68,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -123,26 +147,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*",
"matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F99992A1-E442-4D83-84F4-44F44C25219C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formEasySetPassword.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.279463",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.279463",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.414547",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-9680",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-10-09T13:15:12.090",
"lastModified": "2024-10-09T13:15:12.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923344",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-51/",
"source": "security@mozilla.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-09T12:00:19.235794+00:00
2024-10-09T14:00:52.103800+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-09T11:56:42.770000+00:00
2024-10-09T13:53:32.513000+00:00
```
### Last Data Feed Release
@ -33,49 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265078
265081
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `3`
- [CVE-2024-45145](CVE-2024/CVE-2024-451xx/CVE-2024-45145.json) (`2024-10-09T10:15:03.283`)
- [CVE-2024-47334](CVE-2024/CVE-2024-473xx/CVE-2024-47334.json) (`2024-10-09T11:15:13.157`)
- [CVE-2024-47410](CVE-2024/CVE-2024-474xx/CVE-2024-47410.json) (`2024-10-09T10:15:04.540`)
- [CVE-2024-47411](CVE-2024/CVE-2024-474xx/CVE-2024-47411.json) (`2024-10-09T10:15:04.793`)
- [CVE-2024-47412](CVE-2024/CVE-2024-474xx/CVE-2024-47412.json) (`2024-10-09T10:15:05.017`)
- [CVE-2024-47413](CVE-2024/CVE-2024-474xx/CVE-2024-47413.json) (`2024-10-09T10:15:05.210`)
- [CVE-2024-47414](CVE-2024/CVE-2024-474xx/CVE-2024-47414.json) (`2024-10-09T10:15:05.417`)
- [CVE-2024-47415](CVE-2024/CVE-2024-474xx/CVE-2024-47415.json) (`2024-10-09T10:15:05.627`)
- [CVE-2024-47416](CVE-2024/CVE-2024-474xx/CVE-2024-47416.json) (`2024-10-09T10:15:05.830`)
- [CVE-2024-47417](CVE-2024/CVE-2024-474xx/CVE-2024-47417.json) (`2024-10-09T10:15:06.060`)
- [CVE-2024-47418](CVE-2024/CVE-2024-474xx/CVE-2024-47418.json) (`2024-10-09T10:15:06.277`)
- [CVE-2024-47419](CVE-2024/CVE-2024-474xx/CVE-2024-47419.json) (`2024-10-09T10:15:06.480`)
- [CVE-2024-47420](CVE-2024/CVE-2024-474xx/CVE-2024-47420.json) (`2024-10-09T10:15:06.660`)
- [CVE-2024-9575](CVE-2024/CVE-2024-95xx/CVE-2024-9575.json) (`2024-10-09T10:15:06.853`)
- [CVE-2024-28168](CVE-2024/CVE-2024-281xx/CVE-2024-28168.json) (`2024-10-09T12:15:02.850`)
- [CVE-2024-45720](CVE-2024/CVE-2024-457xx/CVE-2024-45720.json) (`2024-10-09T13:15:11.337`)
- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-09T13:15:12.090`)
### CVEs modified in the last Commit
Recently modified CVEs: `16`
Recently modified CVEs: `11`
- [CVE-2021-4118](CVE-2021/CVE-2021-41xx/CVE-2021-4118.json) (`2024-10-09T11:56:42.770`)
- [CVE-2022-0845](CVE-2022/CVE-2022-08xx/CVE-2022-0845.json) (`2024-10-09T11:56:42.770`)
- [CVE-2024-9514](CVE-2024/CVE-2024-95xx/CVE-2024-9514.json) (`2024-10-09T11:19:25.577`)
- [CVE-2024-9515](CVE-2024/CVE-2024-95xx/CVE-2024-9515.json) (`2024-10-09T11:19:00.897`)
- [CVE-2024-9532](CVE-2024/CVE-2024-95xx/CVE-2024-9532.json) (`2024-10-09T11:18:49.027`)
- [CVE-2024-9533](CVE-2024/CVE-2024-95xx/CVE-2024-9533.json) (`2024-10-09T11:18:34.560`)
- [CVE-2024-9534](CVE-2024/CVE-2024-95xx/CVE-2024-9534.json) (`2024-10-09T11:18:23.607`)
- [CVE-2024-9535](CVE-2024/CVE-2024-95xx/CVE-2024-9535.json) (`2024-10-09T11:16:35.487`)
- [CVE-2024-9549](CVE-2024/CVE-2024-95xx/CVE-2024-9549.json) (`2024-10-09T11:16:03.970`)
- [CVE-2024-9550](CVE-2024/CVE-2024-95xx/CVE-2024-9550.json) (`2024-10-09T11:15:52.520`)
- [CVE-2024-9551](CVE-2024/CVE-2024-95xx/CVE-2024-9551.json) (`2024-10-09T11:15:42.060`)
- [CVE-2024-9552](CVE-2024/CVE-2024-95xx/CVE-2024-9552.json) (`2024-10-09T11:15:32.333`)
- [CVE-2024-9553](CVE-2024/CVE-2024-95xx/CVE-2024-9553.json) (`2024-10-09T11:15:21.203`)
- [CVE-2024-9566](CVE-2024/CVE-2024-95xx/CVE-2024-9566.json) (`2024-10-09T11:15:10.977`)
- [CVE-2024-9567](CVE-2024/CVE-2024-95xx/CVE-2024-9567.json) (`2024-10-09T11:15:00.563`)
- [CVE-2024-9570](CVE-2024/CVE-2024-95xx/CVE-2024-9570.json) (`2024-10-09T11:13:11.067`)
- [CVE-2022-22590](CVE-2022/CVE-2022-225xx/CVE-2022-22590.json) (`2024-10-09T13:40:58.817`)
- [CVE-2022-30050](CVE-2022/CVE-2022-300xx/CVE-2022-30050.json) (`2024-10-09T13:46:28.867`)
- [CVE-2023-6294](CVE-2023/CVE-2023-62xx/CVE-2023-6294.json) (`2024-10-09T13:24:04.700`)
- [CVE-2024-0248](CVE-2024/CVE-2024-02xx/CVE-2024-0248.json) (`2024-10-09T13:11:10.553`)
- [CVE-2024-0250](CVE-2024/CVE-2024-02xx/CVE-2024-0250.json) (`2024-10-09T13:19:36.667`)
- [CVE-2024-1159](CVE-2024/CVE-2024-11xx/CVE-2024-1159.json) (`2024-10-09T13:22:23.253`)
- [CVE-2024-1160](CVE-2024/CVE-2024-11xx/CVE-2024-1160.json) (`2024-10-09T13:30:12.563`)
- [CVE-2024-44949](CVE-2024/CVE-2024-449xx/CVE-2024-44949.json) (`2024-10-09T13:53:32.513`)
- [CVE-2024-5127](CVE-2024/CVE-2024-51xx/CVE-2024-5127.json) (`2024-10-09T13:38:49.307`)
- [CVE-2024-9568](CVE-2024/CVE-2024-95xx/CVE-2024-9568.json) (`2024-10-09T13:04:42.653`)
- [CVE-2024-9569](CVE-2024/CVE-2024-95xx/CVE-2024-9569.json) (`2024-10-09T13:04:55.907`)
## Download and Usage

View File

@ -182826,7 +182826,7 @@ CVE-2021-41176,0,0,fc0656a953a29b676c89c29557933b4ef51b53b2c3e402bffc56bb552b086
CVE-2021-41177,0,0,8e4e8ea9261594bad6baaa43c9c16c540bf301cac813171ea47cbb850806f97e,2022-10-26T15:26:31.550000
CVE-2021-41178,0,0,912176ac67df56fcc102c32234c66be7720685ea13bbd2bdd15daf8e245c3733,2022-10-25T20:53:24.923000
CVE-2021-41179,0,0,7721d04199dd4695e488fdc7c0ae474834a4900f139533473494482edac39bf1,2021-10-29T15:06:22.720000
CVE-2021-4118,0,1,b3228221350b9519c95f5f03bf3b1c384adb615235f9446916854f0f304ea3ae,2024-10-09T11:56:42.770000
CVE-2021-4118,0,0,b3228221350b9519c95f5f03bf3b1c384adb615235f9446916854f0f304ea3ae,2024-10-09T11:56:42.770000
CVE-2021-41180,0,0,c370d2d5717d1a4befcad9cc399b5fdae242477559a0d312d220fac55efdb5fe,2022-03-15T16:18:40.120000
CVE-2021-41181,0,0,69eff2c3e10be4d00a7b9b120da4848fd3c558c7bf7dd56e7dcbf7ba93d92d65,2022-10-24T16:42:07.740000
CVE-2021-41182,0,0,7962fc3aad643a6a1db058f153abb4e359e1fc080ea0164a168d0c06130038f4,2023-08-31T03:15:12.807000
@ -188258,7 +188258,7 @@ CVE-2022-0841,0,0,0c08b8da972eb0774c91026f996e6e87409d7df436e5ff3d82c2c350a7f205
CVE-2022-0842,0,0,83063b91b0c1e05161ae7eeb6e3a41608879a46ba334ce3ba7dd591c66028351,2023-11-15T20:24:37.953000
CVE-2022-0843,0,0,c9eeae3774f04d557c08dcfb82fe824146ecc015b6def2301e1244cf3ccac297,2022-12-29T18:50:49.197000
CVE-2022-0844,0,0,20aad9a2dd83607c889e0f35501e7d064ffb666561227c6630a593e65cdaf797,2023-11-07T03:41:35.647000
CVE-2022-0845,0,1,386c041824ba45ae3879fff0352d673fa82b9f6e2ac0d380e51845c5a73548d4,2024-10-09T11:56:42.770000
CVE-2022-0845,0,0,386c041824ba45ae3879fff0352d673fa82b9f6e2ac0d380e51845c5a73548d4,2024-10-09T11:56:42.770000
CVE-2022-0846,0,0,a58344c755acea67ff92dc954724b70511eed59fc9456964fa0912ecbd24896b,2022-04-04T17:52:40.903000
CVE-2022-0847,0,0,5b7e10d23a381c8accc649416b99f8eb9945da1fbcaae03f2894c9991ca201fb,2024-07-02T17:05:01.307000
CVE-2022-0848,0,0,c0a60c007590a2060cad3166c317c1ba0f91356426b687445d61d6415370d9ea,2022-04-08T13:59:36.750000
@ -191867,7 +191867,7 @@ CVE-2022-22587,0,0,8c673637c5daeb113adde9e9725e46083380d4a5693c2d5287e846df9c0be
CVE-2022-22588,0,0,5fb0f2147ad9d3a4fec38e78064011b76a85d6a790fec6675f90ef74fd12c7de,2023-08-08T14:22:24.967000
CVE-2022-22589,0,0,a97ba0e5c607eb7a49b4cebcbfc6bf13d09bcc98b14a96398f05ac7be79ba30a,2023-08-08T14:22:24.967000
CVE-2022-2259,0,0,3b75f1b92e08b9bb0d0953bd8feee8ff80ab3f43b99be91843f613059a667158,2023-08-08T14:22:24.967000
CVE-2022-22590,0,0,472ed50bceefcc7b12b8bd0fbcb4c0062ca157d2cc6b2c6ae6af16a68e7b11c8,2022-09-09T20:43:04.573000
CVE-2022-22590,0,1,b43c161e8c211c8396c37c83526e68f3548110f0da6397ea538858401dce4026,2024-10-09T13:40:58.817000
CVE-2022-22591,0,0,aee161a5ee3165e654088d593241356a0a8172c1436df794364b0e2aa62e430e,2022-03-26T03:58:32.277000
CVE-2022-22592,0,0,8a82b82811349975945552f56c6791941c89cb272c65ef5e3fa340eab45b8bba,2022-09-09T20:43:07.863000
CVE-2022-22593,0,0,1bd16cb4234c86447a1e320470dc0df82ce8772167491f2eddf4aa4dc5d287f3,2022-03-26T03:59:50.220000
@ -198132,7 +198132,7 @@ CVE-2022-30047,0,0,c69a0bb075ce6c76be667b676fecd67ee90a4d8eb917fe505a9656bfe34d2
CVE-2022-30048,0,0,1a7adfbaf421915189caa25656394ce747e300738552e7610f39d9489b63b213,2022-05-20T14:45:22.727000
CVE-2022-30049,0,0,8074b7f48c314fd805e13351120e6dee61dc70414555dfa8d0ef0d8f0225b857,2022-10-29T02:57:30.160000
CVE-2022-3005,0,0,c8d91e0f1399a635a982522898babbad67fe30a0d4e27a2ec6dc921289a3c57c,2022-09-21T16:34:01.010000
CVE-2022-30050,0,0,a2c9f25dd142f8a2720f1bd98b8a802dc35bf4a9376fa4e1aba0409073fd426d,2022-05-24T22:23:08.480000
CVE-2022-30050,0,1,3982f93fdddf2530e90321435befd0786202d7c9a85a3e055548866fcaa24af4,2024-10-09T13:46:28.867000
CVE-2022-30052,0,0,f0290b8ecc1c11e62569c73aedb2ade39859a2bc40300166c26500801dba1479,2022-05-25T18:22:17.540000
CVE-2022-30053,0,0,2ab48f3b3cce1a5dfd3474cafb3f263b141d3d26b2a683d8444e8f726b82ba5c,2022-05-25T18:22:54.607000
CVE-2022-30054,0,0,5f829e251fe91a7ef31bb84423be35f6ad992af696f36e192e88b75de8a7f4c0,2022-05-25T18:23:46.100000
@ -240392,7 +240392,7 @@ CVE-2023-6290,0,0,1e11a2f9028436f27adcdf532e57392ccb16d1b2e91d96ddf9925e24654d44
CVE-2023-6291,0,0,3ea0b73d77ef96c75c225ca0866954d9bea91f804b2ef73a4f0554f6f0204274,2024-02-14T03:15:14.320000
CVE-2023-6292,0,0,9816898f3675569a84220255281f946e21928fba49e4223d1bc3d37273ee48aa,2024-01-23T14:47:58.340000
CVE-2023-6293,0,0,dfe97deb660541d4b661bea6f3a6ba395dd53a51e8ae9be322693d850c6d8bba,2023-11-30T19:55:33.327000
CVE-2023-6294,0,0,ec6a6172c66a78d3939093b3a26353b1ca5a3a83184f95d8f73052115b844cbe,2024-08-01T18:35:05.917000
CVE-2023-6294,0,1,6b64458c7e00e91defcfab56c57d789bd9f13ce0c2b6406636a2edc2279b03e7,2024-10-09T13:24:04.700000
CVE-2023-6295,0,0,8ab7296cc0a845d4c6986e960293e952796151051af247272a4a09dc3a86878c,2023-12-21T20:58:23.043000
CVE-2023-6296,0,0,837e0880d7df7f786c30c0aff14cfd1fc904d42744d663bafb5a26dc7bf102cd,2024-05-17T02:33:37.480000
CVE-2023-6297,0,0,0cd875b167eb884176392e5d7dd5f5df9550f76aab834c3e153724cbcf89fb67,2024-05-17T02:33:37.590000
@ -241438,8 +241438,8 @@ CVE-2024-0243,0,0,68610412076a7e370f30938c644e93518171abb2434f307575d1a2f3a6537f
CVE-2024-0244,0,0,67a74aa7fc0d8babe9a5214a60b9a63992d699b01b8a1839df8cfd195ae1b59b,2024-02-13T19:51:41.997000
CVE-2024-0246,0,0,73d0c81a519e396564e77ce5522d589edcaeb72a548241fc7d657fa294fab8de,2024-05-17T02:34:25.567000
CVE-2024-0247,0,0,b27cd6616368531dbb41fd79a6edb76763d21c3245f50b598ab8eb5848e89348,2024-05-17T02:34:25.680000
CVE-2024-0248,0,0,d5a42163c67136c12b7742210a0dd6ebbc01dc3db40b9a759209b4bb7f3c05ac,2024-02-12T17:31:21.670000
CVE-2024-0250,0,0,b14f7695a66de1867a9b7d5239e84d0010907def9a5b4d0994ed0776131964d8,2024-02-12T17:31:21.670000
CVE-2024-0248,0,1,1bb9ae16fd230261db7325554cfa62df226885e581f3674aca64ff22e5465b95,2024-10-09T13:11:10.553000
CVE-2024-0250,0,1,08a743faea52614cd254679d538973f3a731361c6661082236e7fb92dd7565f1,2024-10-09T13:19:36.667000
CVE-2024-0251,0,0,c035b2edc46ecf620984bc7db273928bce9f42c8e6e6f7ddc9a6058df32dc1f0,2024-01-19T19:55:23.980000
CVE-2024-0252,0,0,b8ec41c6a1be7c5e882b3b52ee367c8c9dfacd93c3dd64e82dabc7c379a7c983,2024-06-07T09:15:09.347000
CVE-2024-0253,0,0,ddeee69b21b0084e2ba924b18ea5e397f396de8ad90474cf8bfd96614dee6053,2024-07-03T01:44:39.010000
@ -242291,8 +242291,8 @@ CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138
CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000
CVE-2024-1157,0,0,de378635d0c6de28e0b0565a3de8ba7aaf66f061988c58201005cc7ac895cf44,2024-02-13T14:01:00.987000
CVE-2024-1158,0,0,3f0844fda5c657ec14fc878f4ca458f05346302835336ebfa8e7bba85b29f7d9,2024-03-13T18:16:18.563000
CVE-2024-1159,0,0,7afd7cc203649d4a5c5ff8f7755954b8453329cb9a9266827322a4070126abb5,2024-02-13T14:01:00.987000
CVE-2024-1160,0,0,e41caae7c393acaa9f8cdac421c222658c66f112345f9720b18d4b8ff8227d77,2024-02-13T14:01:00.987000
CVE-2024-1159,0,1,6093cf6c5c8fc4abf001ccc0f4d05ab0de1f6859d26926dcd40937cbf24b911d,2024-10-09T13:22:23.253000
CVE-2024-1160,0,1,895b8a1484864a7446dc0dad2cc1b1d7457042a73872ab53e023b0e471ba9cb5,2024-10-09T13:30:12.563000
CVE-2024-1161,0,0,17300377fb9940d2e98cf1b56279a3b48a0607eeac56262a31a73cab7a59f6ad,2024-06-06T13:57:52.483000
CVE-2024-1162,0,0,6517ec14e6db831ee5a33abab5e0e4729a77c306548683589462e3183aa8cdb4,2024-02-08T14:22:37.180000
CVE-2024-1163,0,0,d0a6d153d36541940bea220e9031817bbcaed2e39b0e0502d4dc42ede6371f01,2024-02-29T15:15:07.473000
@ -249060,6 +249060,7 @@ CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000
CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000
CVE-2024-28168,1,1,353d512e6d0658e8393fc36cdb185053aa6de34206ad4f5c370dd49d0a29d39b,2024-10-09T12:15:02.850000
CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000
CVE-2024-28170,0,0,b651a495621059669c19c3fdc9d2ee84d87fc5f846a93fbe1c30394bd5ddd768,2024-09-23T14:49:17.057000
CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000
@ -260161,7 +260162,7 @@ CVE-2024-44945,0,0,6df059f581f073064a2495782591f5696f5e78b88875e61106eab64ca2b50
CVE-2024-44946,0,0,baba486800f48daca091ce86b0b3099b94d8fc83c17e121f4572ead5091851fa,2024-09-04T12:15:05.150000
CVE-2024-44947,0,0,80aee974cb8f526f49372964ac6e0ce27b8502cba5192c8bdb08e313a4596942,2024-09-16T17:52:37.563000
CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000
CVE-2024-44949,0,0,6aaa0682857021304830f46058e76a9629475e0612eeb15cc3936e646938a3bc,2024-09-05T12:53:21.110000
CVE-2024-44949,0,1,b7b7622b983a3734466cfe3f2958346ada4afa05901a8b3e8d3a4caaf654fb3c,2024-10-09T13:53:32.513000
CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000
CVE-2024-44950,0,0,d3089902efd7e9aab9d892a62faf29027951968ca15a849fa454a848592a1ba2,2024-09-05T12:53:21.110000
CVE-2024-44951,0,0,91785c90cadc8356660ba7fdec9917fa45a207e0be2c7481dad5e2297fb51b52,2024-09-05T12:53:21.110000
@ -260308,7 +260309,7 @@ CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186
CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000
CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000
CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000
CVE-2024-45145,1,1,b36d6bb4b4247eb059c115ad97c447cca0f70b08025fc2179ef91ba7e7a7f114,2024-10-09T10:15:03.283000
CVE-2024-45145,0,0,b36d6bb4b4247eb059c115ad97c447cca0f70b08025fc2179ef91ba7e7a7f114,2024-10-09T10:15:03.283000
CVE-2024-45146,0,0,2a5b5a0d648806ca5e54b8bd1a0a8e9a0eaa835e972130f7015e02de53d4b2a8,2024-10-09T09:15:05.693000
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
CVE-2024-45150,0,0,bd12df0ca2dd5e008526d6f546a4cd15e1f7b87d2c471afa5048e25665848888,2024-10-09T09:15:06.210000
@ -260603,6 +260604,7 @@ CVE-2024-45698,0,0,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce
CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-45720,1,1,d41141572be612cef3d4dabfd94bebc08df7abc05793ddafb0664d5a1ebcc907,2024-10-09T13:15:11.337000
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
@ -261327,7 +261329,7 @@ CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf24
CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000
CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000
CVE-2024-47334,1,1,a461c0ff54441d9bc6ff24149dcc4c8001aeba025fc4345aeb144597045138d5,2024-10-09T11:15:13.157000
CVE-2024-47334,0,0,a461c0ff54441d9bc6ff24149dcc4c8001aeba025fc4345aeb144597045138d5,2024-10-09T11:15:13.157000
CVE-2024-47335,0,0,c59a2e5c398e4128a0999d908dfef31fc9740c09dff0fef290df7418059d3627,2024-10-07T17:47:48.410000
CVE-2024-47336,0,0,3b8a76de4b681d196e3baf6dcff1f288c7d757b771ce878db43b26bfb593064a,2024-10-07T17:47:48.410000
CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000
@ -261388,18 +261390,18 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01
CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000
CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000
CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000
CVE-2024-47410,1,1,03c4646e3684ab4ffe24093ab7893889e6845badbdfd13a2aef051391d180b69,2024-10-09T10:15:04.540000
CVE-2024-47411,1,1,0b009ea43721bf78dbe41692d21031f53829faf0731e26a2cf6a8049d24d992b,2024-10-09T10:15:04.793000
CVE-2024-47412,1,1,ae08eb76fd03261eb1b35f2c905d400353a1266d7201451421507f3d79750795,2024-10-09T10:15:05.017000
CVE-2024-47413,1,1,5065446cde4d05320ce1e145d50831bc32758c7feddba11467a1bf7007517702,2024-10-09T10:15:05.210000
CVE-2024-47414,1,1,1df3eba42d0851203050b86fa1792526dcd9d131eaf80d7391f5232f50b07925,2024-10-09T10:15:05.417000
CVE-2024-47415,1,1,66806e1b10c27fa75fb436771e6568cb5ffae54a04736652943cbbaf29b17d37,2024-10-09T10:15:05.627000
CVE-2024-47416,1,1,1181afa98c2dace03b5a8e934f907d824f978de25a5aa3d171706d1f3b9948f4,2024-10-09T10:15:05.830000
CVE-2024-47417,1,1,3d82a2124c0b4b2bd69e49cc3497e08dc48273a70597ef98e04a55edb8141df5,2024-10-09T10:15:06.060000
CVE-2024-47418,1,1,081d746b22ffbdd8b799f4808bc76cae4e08fb9d14d385d0abe1cc0263249db6,2024-10-09T10:15:06.277000
CVE-2024-47419,1,1,d0cdbf286fc8933dcd9ef23a66fbcd5cbbdaedc63b14e3dd36cddcd2ce86eaa5,2024-10-09T10:15:06.480000
CVE-2024-47410,0,0,03c4646e3684ab4ffe24093ab7893889e6845badbdfd13a2aef051391d180b69,2024-10-09T10:15:04.540000
CVE-2024-47411,0,0,0b009ea43721bf78dbe41692d21031f53829faf0731e26a2cf6a8049d24d992b,2024-10-09T10:15:04.793000
CVE-2024-47412,0,0,ae08eb76fd03261eb1b35f2c905d400353a1266d7201451421507f3d79750795,2024-10-09T10:15:05.017000
CVE-2024-47413,0,0,5065446cde4d05320ce1e145d50831bc32758c7feddba11467a1bf7007517702,2024-10-09T10:15:05.210000
CVE-2024-47414,0,0,1df3eba42d0851203050b86fa1792526dcd9d131eaf80d7391f5232f50b07925,2024-10-09T10:15:05.417000
CVE-2024-47415,0,0,66806e1b10c27fa75fb436771e6568cb5ffae54a04736652943cbbaf29b17d37,2024-10-09T10:15:05.627000
CVE-2024-47416,0,0,1181afa98c2dace03b5a8e934f907d824f978de25a5aa3d171706d1f3b9948f4,2024-10-09T10:15:05.830000
CVE-2024-47417,0,0,3d82a2124c0b4b2bd69e49cc3497e08dc48273a70597ef98e04a55edb8141df5,2024-10-09T10:15:06.060000
CVE-2024-47418,0,0,081d746b22ffbdd8b799f4808bc76cae4e08fb9d14d385d0abe1cc0263249db6,2024-10-09T10:15:06.277000
CVE-2024-47419,0,0,d0cdbf286fc8933dcd9ef23a66fbcd5cbbdaedc63b14e3dd36cddcd2ce86eaa5,2024-10-09T10:15:06.480000
CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
CVE-2024-47420,1,1,afe9fbe4da6181dcdd330642f5b24efa9bc0934e4a84c41f7c49815b4e444f73,2024-10-09T10:15:06.660000
CVE-2024-47420,0,0,afe9fbe4da6181dcdd330642f5b24efa9bc0934e4a84c41f7c49815b4e444f73,2024-10-09T10:15:06.660000
CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000
CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
@ -261848,7 +261850,7 @@ CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
CVE-2024-5124,0,0,5de159b8ed64f30a1dc7ca0397d4baf3e4e9f9a186275e9923a64ce440abb53a,2024-06-07T14:56:05.647000
CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000
CVE-2024-5127,0,0,d833a25c87b56e1b99f80afdf1c14f454ddfb1b689be079d5314807c7a156a6b,2024-06-07T14:56:05.647000
CVE-2024-5127,0,1,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000
CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000
CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000
CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000
@ -265036,19 +265038,19 @@ CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c
CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000
CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c91,2024-10-04T13:50:43.727000
CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000
CVE-2024-9514,0,1,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000
CVE-2024-9515,0,1,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000
CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000
CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000
CVE-2024-9528,0,0,d6fcaf4387a113a292c5be1e6315aa1024df0cc79a828aebf7bc2fe429a4bc75,2024-10-07T17:48:28.117000
CVE-2024-9532,0,1,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000
CVE-2024-9533,0,1,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000
CVE-2024-9534,0,1,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
CVE-2024-9535,0,1,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000
CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
CVE-2024-9549,0,1,cb55acb0116148f78fe305f81d4a6eab492f380f42935c650b86596ed312ccf1,2024-10-09T11:16:03.970000
CVE-2024-9550,0,1,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000
CVE-2024-9551,0,1,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000
CVE-2024-9552,0,1,0089ba0b10cb8d31710138a22fd4a80a1adb8a11c547d7653c5c7c5a85ee8f50,2024-10-09T11:15:32.333000
CVE-2024-9553,0,1,e562e3629a4d3dcbb1c0f68c360778c8b40d2abdc00b7e696f224eb5e09a71e1,2024-10-09T11:15:21.203000
CVE-2024-9549,0,0,cb55acb0116148f78fe305f81d4a6eab492f380f42935c650b86596ed312ccf1,2024-10-09T11:16:03.970000
CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000
CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000
CVE-2024-9552,0,0,0089ba0b10cb8d31710138a22fd4a80a1adb8a11c547d7653c5c7c5a85ee8f50,2024-10-09T11:15:32.333000
CVE-2024-9553,0,0,e562e3629a4d3dcbb1c0f68c360778c8b40d2abdc00b7e696f224eb5e09a71e1,2024-10-09T11:15:21.203000
CVE-2024-9554,0,0,bd84f38adb3ba3dccafe55419a606b89f9861212884b57c128c50c590ca6a91d,2024-10-07T17:47:48.410000
CVE-2024-9555,0,0,820019e6568fa8e1fec5c7ee3b65cf6dcd66a9a7fbaab4fe3e5e127b82da3bd3,2024-10-08T18:36:39.123000
CVE-2024-9556,0,0,d7e7718ff1d3279981fe751528bd9fa57f0756509343c3e8c8e014bbccbaa988,2024-10-08T18:37:28.077000
@ -265061,19 +265063,20 @@ CVE-2024-9562,0,0,24b8ce3625b9c960baccc39b1342ba09026888a30a22e76df87872d25fdd99
CVE-2024-9563,0,0,d04a15ff94fd263e1592738601aa4f4dbd97de56e0c50134531c3a9014e4a0d6,2024-10-08T18:38:35.537000
CVE-2024-9564,0,0,75b063b0abacbd9110f351ff7ccd52746f7087ff8aee399dba6dd5e983ec8df5,2024-10-08T18:38:49.413000
CVE-2024-9565,0,0,cac279697da73fd9a247e6333ff32006e7530fa32b525043c22e9f3a1ee0040b,2024-10-08T18:39:06.297000
CVE-2024-9566,0,1,baae4e33fff7b34ffef086c107287cc20b54f178a1e90b003e3b2e13dc231596,2024-10-09T11:15:10.977000
CVE-2024-9567,0,1,1f19694ad4f0b8aa4802431976e798aebcc8ebb3316ac1f2d628ab03f1adf8fe,2024-10-09T11:15:00.563000
CVE-2024-9568,0,0,f4c1c36a636390a5fe29944b92550b079ffc949cd547082d09acb92ce133494d,2024-10-07T17:47:48.410000
CVE-2024-9569,0,0,9cdb8490b63a3351e279146fb0d8dec106ad015a9df5a77c537964e0d1558e51,2024-10-07T17:47:48.410000
CVE-2024-9570,0,1,a6d6aa86f9472e8a40c53560d31c32402eabf9607861955436706fad1b51f691,2024-10-09T11:13:11.067000
CVE-2024-9566,0,0,baae4e33fff7b34ffef086c107287cc20b54f178a1e90b003e3b2e13dc231596,2024-10-09T11:15:10.977000
CVE-2024-9567,0,0,1f19694ad4f0b8aa4802431976e798aebcc8ebb3316ac1f2d628ab03f1adf8fe,2024-10-09T11:15:00.563000
CVE-2024-9568,0,1,41e4daadf6bdf28aa1545629e9b88ce37b785d72de5233c42256f75518f40bd8,2024-10-09T13:04:42.653000
CVE-2024-9569,0,1,933d8e2b19b5933ae903804a8b8d091482f43a9d0c52397351d085515644d9c7,2024-10-09T13:04:55.907000
CVE-2024-9570,0,0,a6d6aa86f9472e8a40c53560d31c32402eabf9607861955436706fad1b51f691,2024-10-09T11:13:11.067000
CVE-2024-9571,0,0,875a4a44417fabed8eda23f7f9f70cde202fd7e807f9d44c2058c5256366a803,2024-10-08T18:45:01.220000
CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b96,2024-10-08T18:45:03.117000
CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000
CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000
CVE-2024-9575,1,1,8a9bc539c876523f779887506768b369fbfbf7a242a8116932ec7f29b24955ea,2024-10-09T10:15:06.853000
CVE-2024-9575,0,0,8a9bc539c876523f779887506768b369fbfbf7a242a8116932ec7f29b24955ea,2024-10-09T10:15:06.853000
CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000
CVE-2024-9602,0,0,be3311a6c7e910ed5bc47bf36f941c8a0fb9276c4744df87d5ef4ab5062ab1de,2024-10-08T23:15:12.947000
CVE-2024-9603,0,0,45ccb513db355ca029c1faba5c664e2ded2aa843837e1d077dad481e1915a6c8,2024-10-08T23:15:13.040000
CVE-2024-9620,0,0,0379fb1d0864218f96bae79eafc674616cceed6a1d6b1c374718286d73008692,2024-10-08T17:15:57.357000
CVE-2024-9621,0,0,93a648e082c2d430d057ddc9e3ada713aaa0a2bb50686998ccd1adc379bccdce,2024-10-08T17:15:57.573000
CVE-2024-9622,0,0,c63b888866eff50e6fa5697d58bf1e64edc668dfb35cefc907fc3210c84ae5d9,2024-10-08T17:15:57.790000
CVE-2024-9680,1,1,0412df6875e3ec499aafbc3c4e100d08d00fc8546341bd2201e9cd3ad3fabc11,2024-10-09T13:15:12.090000

Can't render this file because it is too large.