Auto-Update: 2024-10-10T02:00:17.130034+00:00

This commit is contained in:
cad-safe-bot 2024-10-10 02:03:16 +00:00
parent 6387a9fac3
commit dcd3a0fe15
9 changed files with 133 additions and 33 deletions

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-23113",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-02-15T14:15:46.503",
"lastModified": "2024-02-22T15:33:00.970",
"lastModified": "2024-10-10T01:00:01.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-10-09",
"cisaActionDue": "2024-10-30",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Fortinet Multiple Products Format String Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47823",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-08T18:15:31.370",
"lastModified": "2024-10-08T18:15:31.370",
"lastModified": "2024-10-10T00:15:02.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire `< v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a \u201c.php\u201d file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute \u201c.php\u201d files. This issue has been addressed in release version 3.5.2. All users are advised to upgrade. There are no known workarounds for this vulnerability."
"value": "Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a \u201c.php\u201d file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute \u201c.php\u201d files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Livewire es un framework full-stack para Laravel que permite componentes de UI din\u00e1micos sin salir de PHP. En livewire/livewire `&lt; v3.5.2`, la extensi\u00f3n de archivo de un archivo cargado se adivina en funci\u00f3n del tipo MIME. Como resultado, la extensi\u00f3n de archivo real del nombre de archivo no se valida. Por lo tanto, un atacante puede eludir la validaci\u00f3n cargando un archivo con un tipo MIME v\u00e1lido (por ejemplo, `image/png`) y una extensi\u00f3n de archivo \u201c.php\u201d. Si se cumplen los siguientes criterios, el atacante puede llevar a cabo un ataque RCE: 1. El nombre de archivo est\u00e1 compuesto por el nombre de archivo original utilizando `$file-&gt;getClientOriginalName()`. 2. Archivos almacenados directamente en su servidor en un disco de almacenamiento p\u00fablico. 3. El servidor web est\u00e1 configurado para ejecutar archivos \u201c.php\u201d. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 3.5.2. Se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad."
}
],
"metrics": {
@ -74,6 +78,14 @@
"url": "https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/livewire/livewire/pull/8624",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp",
"source": "security-advisories@github.com"

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48941",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T00:15:02.673",
"lastModified": "2024-10-10T00:15:02.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to bypass 2FA by interacting with the /rest endpoint of Jira, Confluence, or Bitbucket. In the default configuration, /rest is allowlisted."
}
],
"metrics": {},
"references": [
{
"url": "https://syracom-bee.atlassian.net/wiki/spaces/SL/pages/3236560898/2024-09-16+-+Secure+Login+security+advisory+-+Insecure+default+configuration",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48942",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T00:15:02.737",
"lastModified": "2024-10-10T00:15:02.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to easily brute-force the 2FA PIN via the plugins/servlet/twofactor/public/pinvalidation endpoint. The last 30 and the next 30 tokens are valid."
}
],
"metrics": {},
"references": [
{
"url": "https://syracom-bee.atlassian.net/wiki/spaces/SL/pages/3236560898/2024-09-16+-+Secure+Login+security+advisory+-+Insecure+default+configuration",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48949",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T01:15:11.127",
"lastModified": "2024-10-10T01:15:11.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/indutny/elliptic/commit/7ac5360118f74eb02da73bdf9f24fd0c72ff5281",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/indutny/elliptic/compare/v6.5.5...v6.5.6",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,21 @@
"id": "CVE-2024-9379",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:56.727",
"lastModified": "2024-10-08T17:15:56.727",
"lastModified": "2024-10-10T01:00:01.433",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-10-09",
"cisaActionDue": "2024-10-30",
"cisaRequiredAction": "As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.",
"cisaVulnerabilityName": "Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements."
},
{
"lang": "es",
"value": "La inyecci\u00f3n SQL en la consola web de administraci\u00f3n de Ivanti CSA anterior a la versi\u00f3n 5.0.2 permite que un atacante remoto autenticado con privilegios de administrador ejecute sentencias SQL arbitrarias."
}
],
"metrics": {

View File

@ -2,13 +2,21 @@
"id": "CVE-2024-9380",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:56.970",
"lastModified": "2024-10-08T17:15:56.970",
"lastModified": "2024-10-10T01:00:01.433",
"vulnStatus": "Received",
"cveTags": [],
"cisaExploitAdd": "2024-10-09",
"cisaActionDue": "2024-10-30",
"cisaRequiredAction": "As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.",
"cisaVulnerabilityName": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la consola web de administraci\u00f3n de Ivanti CSA anterior a la versi\u00f3n 5.0.2 permite que un atacante remoto autenticado con privilegios de administrador obtenga la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-09T23:55:17.184860+00:00
2024-10-10T02:00:17.130034+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-09T23:15:11.783000+00:00
2024-10-10T01:15:11.127000+00:00
```
### Last Data Feed Release
@ -27,34 +27,32 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-10-09T00:00:08.656111+00:00
2024-10-10T00:00:08.668665+00:00
```
### Total Number of included CVEs
```plain
265164
265167
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `3`
- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-09T23:15:11.017`)
- [CVE-2024-8264](CVE-2024/CVE-2024-82xx/CVE-2024-8264.json) (`2024-10-09T23:15:11.093`)
- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-10T00:15:02.673`)
- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-10T00:15:02.737`)
- [CVE-2024-48949](CVE-2024/CVE-2024-489xx/CVE-2024-48949.json) (`2024-10-10T01:15:11.127`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `4`
- [CVE-2023-37154](CVE-2023/CVE-2023-371xx/CVE-2023-37154.json) (`2024-10-09T22:35:00.577`)
- [CVE-2023-45359](CVE-2023/CVE-2023-453xx/CVE-2023-45359.json) (`2024-10-09T22:35:01.493`)
- [CVE-2024-9463](CVE-2024/CVE-2024-94xx/CVE-2024-9463.json) (`2024-10-09T23:15:11.290`)
- [CVE-2024-9464](CVE-2024/CVE-2024-94xx/CVE-2024-9464.json) (`2024-10-09T23:15:11.457`)
- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-10-09T23:15:11.577`)
- [CVE-2024-9466](CVE-2024/CVE-2024-94xx/CVE-2024-9466.json) (`2024-10-09T23:15:11.677`)
- [CVE-2024-9467](CVE-2024/CVE-2024-94xx/CVE-2024-9467.json) (`2024-10-09T23:15:11.783`)
- [CVE-2024-23113](CVE-2024/CVE-2024-231xx/CVE-2024-23113.json) (`2024-10-10T01:00:01.433`)
- [CVE-2024-47823](CVE-2024/CVE-2024-478xx/CVE-2024-47823.json) (`2024-10-10T00:15:02.553`)
- [CVE-2024-9379](CVE-2024/CVE-2024-93xx/CVE-2024-9379.json) (`2024-10-10T01:00:01.433`)
- [CVE-2024-9380](CVE-2024/CVE-2024-93xx/CVE-2024-9380.json) (`2024-10-10T01:00:01.433`)
## Download and Usage

View File

@ -227916,7 +227916,7 @@ CVE-2023-37150,0,0,d05a1b0d875f1cfb8b8d9baa69f7e4346989eabceeace7d843178ad656fb1
CVE-2023-37151,0,0,bf6cf332b567d32eaeddc623f5bf07af51d14964109f0e2dfbc5db2d182aa204,2023-11-07T04:16:52.113000
CVE-2023-37152,0,0,ca65ebed26c8101f159b0151dd7fe9e9ce43a5c3219a1e852d7fdfcb325ca20e,2024-08-02T17:16:30.650000
CVE-2023-37153,0,0,e122d0bcc21e8639e43c4bbd1c9b0bf614aae545f65b9ad3f17a6efcd01c6868,2023-08-02T15:15:10.610000
CVE-2023-37154,0,1,f7388c9c1b0a13dd9a4162a07b0de01d36de30f3455addbd0ab05525cbf3e76f,2024-10-09T22:35:00.577000
CVE-2023-37154,0,0,f7388c9c1b0a13dd9a4162a07b0de01d36de30f3455addbd0ab05525cbf3e76f,2024-10-09T22:35:00.577000
CVE-2023-3716,0,0,d0f060c388db946191575a3899e743906999df63f1f15865bc69aad089789ee5,2023-08-10T03:51:39.830000
CVE-2023-37164,0,0,d248be9d35f9c17bada918addf9d6a2fca4a0b9702928afff3b86ead659d9f15,2023-07-31T17:00:03.897000
CVE-2023-37165,0,0,3e398869f80e6f16e25a43e3872dd9d5deaede02c385be5baa88b538c80bdf72,2023-07-31T18:22:59.597000
@ -234022,7 +234022,7 @@ CVE-2023-45355,0,0,b59e8a5c262fc336755665d3f82901992de366c3cd37580ce157b1da22017
CVE-2023-45356,0,0,a62df74c374cf7bacfa1e71cb2f8f490477edf6944efd6c2b790f8110ba45b0d,2023-10-12T18:35:22.260000
CVE-2023-45357,0,0,b61bb0f6d334abf3f7461d24dfe821b0ca5f9b0dea69f41511f89389f2f4b422,2023-10-24T19:56:37.377000
CVE-2023-45358,0,0,7f96189ec3a479246b13a2926c14e3d2144a7c985302246d9c9c0ec1db4dda0d,2023-10-24T19:19:29.867000
CVE-2023-45359,0,1,20af715e0cd0fe912da0d73640c5551a126a76573b17e54f71c2a2dfd7d2c35d,2024-10-09T22:35:01.493000
CVE-2023-45359,0,0,20af715e0cd0fe912da0d73640c5551a126a76573b17e54f71c2a2dfd7d2c35d,2024-10-09T22:35:01.493000
CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5b0,2024-01-23T19:38:31.160000
CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000
CVE-2023-45361,0,0,10253df39112f65e66d43e0903fa429df40e36757d111a4a45028ed4d1d94cf5,2024-10-09T14:35:07.353000
@ -245236,7 +245236,7 @@ CVE-2024-2311,0,0,4aac7ca25d4746b431ed7ccd5e7d3d99df50290a301a85fe7466f2339700b1
CVE-2024-23110,0,0,1ac4a7144e9209f9a89949f05fe1e7cc8c377744b32bfb607f177f1a970f34e1,2024-08-23T02:45:28.487000
CVE-2024-23111,0,0,752974f238ed1f3e5e428baa91d031d0aceea7be33f8a58b9a2a43bae855557c,2024-08-23T02:47:13.560000
CVE-2024-23112,0,0,95e5175d7388e29c67df9af8c672941dd9e221ee4e0a1ee87f756c639ee8dad2,2024-03-15T14:51:58.497000
CVE-2024-23113,0,0,a86bcac9b7145820c2db580ab2ab4b188eadec5244c508e4a8d29ba1588a2fac,2024-02-22T15:33:00.970000
CVE-2024-23113,0,1,e4a22a572f804e3f962d65a633155804365118f9caaa4bc464f5658928aefd90,2024-10-10T01:00:01.433000
CVE-2024-23114,0,0,7252a5a302093b43221ea76f9a6a29eda61311bf101ae44cd86a63862ce26956,2024-08-28T20:35:06.210000
CVE-2024-23115,0,0,7b60c057c6ecb2992362930744ce2990e40a5ef55d9da25b0609baa5f284fa28,2024-04-02T12:50:42.233000
CVE-2024-23116,0,0,b697b868738862e20bfb62cd043729402a6443f2a45a0bdae976d2a021726d27,2024-04-02T12:50:42.233000
@ -261582,7 +261582,7 @@ CVE-2024-47817,0,0,a8978e2cff17b63ee249f998983f4eff08d98ca0b11639ba8434d107030ba
CVE-2024-47818,0,0,598d35845d5c9531ef399cca4570ef2326935f542cd6df2c80239a96fe7c21e2,2024-10-07T22:15:04.037000
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
CVE-2024-47822,0,0,1bb3c8fcad68cf5925eb2c4b3afc1ce650c6df3f807783d5dffddd106c4ce49b,2024-10-08T18:15:31.170000
CVE-2024-47823,0,0,c10215cad624267b17781080d6e6e6f8941897c8eacd6a139a06208046d58c6c,2024-10-08T18:15:31.370000
CVE-2024-47823,0,1,8320742a660378f6a01ad741722ead2a09f9e6be07616ac2e9eda6ddd367cc9a,2024-10-10T00:15:02.553000
CVE-2024-47828,0,0,2ab43236050d709c1d1b37224db30aa1be8862c0e60a6ee5d60152971174cbfd,2024-10-09T19:15:14.423000
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
CVE-2024-47832,0,0,b7e56eeac131fe4fefd7e3116d02da42a2ff171d36975cc192ba07793c3dca42,2024-10-09T19:15:14.647000
@ -261707,8 +261707,11 @@ CVE-2024-4890,0,0,53ca3d470669469343718a89aecd8ceb01b5d306faed13dac96d630215f97f
CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
CVE-2024-48933,1,1,7de0f4bfffca5deb1c74453cbef6b33cc0a48f7c75ec32bb2f0f5296d55482aa,2024-10-09T23:15:11.017000
CVE-2024-48933,0,0,7de0f4bfffca5deb1c74453cbef6b33cc0a48f7c75ec32bb2f0f5296d55482aa,2024-10-09T23:15:11.017000
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
CVE-2024-48941,1,1,a478a010fad052d976d7fee743b5553216cec10ffc9e36f57c76bed30d76a955,2024-10-10T00:15:02.673000
CVE-2024-48942,1,1,afe00b24b361f1a17ca816956fa863245c8abdb1171f93cd4cfff531d632fd84,2024-10-10T00:15:02.737000
CVE-2024-48949,1,1,a1844289d41db918a877296bf4ef92d8aa4561ffb6581c981df85622e133061c,2024-10-10T01:15:11.127000
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
@ -264459,7 +264462,7 @@ CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d
CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000
CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
CVE-2024-8263,0,0,624497db0422cb1a205809ab52a2afed4f8032000058c309c8e30c3994bdbb10,2024-09-30T15:57:26.213000
CVE-2024-8264,1,1,dae145d63df2475847f7054e6c3c247c216d09809d4eb2c06c74b36b60bd0aed,2024-10-09T23:15:11.093000
CVE-2024-8264,0,0,dae145d63df2475847f7054e6c3c247c216d09809d4eb2c06c74b36b60bd0aed,2024-10-09T23:15:11.093000
CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000
CVE-2024-8268,0,0,5be7ed43bc13c42d107f9505f0e50c5c3da78418e570e46eb634a6a34dba57c1,2024-09-26T16:15:31.053000
CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
@ -265069,8 +265072,8 @@ CVE-2024-9368,0,0,e7a9c605e0cbf9cdb1d319aa8ea22e93a6f5e80855432922ca5e53112d3a4b
CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044af6,2024-10-04T13:50:43.727000
CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000
CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000
CVE-2024-9379,0,0,55c78e30dfa386c2414282e28f1741a9d6a5ac18382903f5fadf93ad729709f0,2024-10-08T17:15:56.727000
CVE-2024-9380,0,0,73c2dad6dd4808f2199fea19ecffc8a058cc84ea931e4b639a11fea08563ac3e,2024-10-08T17:15:56.970000
CVE-2024-9379,0,1,703ba59f46c27b4c9a81634b7ffa6a16d24f7bdc67c63aab96b4a5148055591a,2024-10-10T01:00:01.433000
CVE-2024-9380,0,1,2037d2a4a238cf512644b0219683af760fbe6f206c09635b8a946c319ea8a207,2024-10-10T01:00:01.433000
CVE-2024-9381,0,0,cc48b0c94354735826bd90917d8a4f1bd25f02a01e3be77523bffb72c1d63efa,2024-10-08T17:15:57.183000
CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000
CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000
@ -265104,11 +265107,11 @@ CVE-2024-9449,0,0,a97c6d10c8b04c0b2ba9306e37a8440eda5112028d07f60f30bea1d9431c3f
CVE-2024-9451,0,0,61aa4f71fe0ab792c97d101a7739a4f3bc5141915892cc9a79adc1735531429e,2024-10-09T08:15:05.160000
CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
CVE-2024-9463,0,1,f13497b8f0b60e6e27c9901c2789e15050e4fdbc20807f021c8855b382953be1,2024-10-09T23:15:11.290000
CVE-2024-9464,0,1,99a593d9b1195cd84d5c7e8c5dc3bbb5dc83cf53b5dd3defc462e16b4dd2a56e,2024-10-09T23:15:11.457000
CVE-2024-9465,0,1,f4eeb8126b57a6a32266941e46984287d34afe79d4741d66fe56bdaf6a6cc7dc,2024-10-09T23:15:11.577000
CVE-2024-9466,0,1,7c6ffb5c2daddefc09fa136fe3d0aa6b08ad91692d2ef7ce366c90d7334a52c7,2024-10-09T23:15:11.677000
CVE-2024-9467,0,1,7092abacb621c6f56f774275f7135aa3234c3d257afa62d63975dd7e63387ab3,2024-10-09T23:15:11.783000
CVE-2024-9463,0,0,f13497b8f0b60e6e27c9901c2789e15050e4fdbc20807f021c8855b382953be1,2024-10-09T23:15:11.290000
CVE-2024-9464,0,0,99a593d9b1195cd84d5c7e8c5dc3bbb5dc83cf53b5dd3defc462e16b4dd2a56e,2024-10-09T23:15:11.457000
CVE-2024-9465,0,0,f4eeb8126b57a6a32266941e46984287d34afe79d4741d66fe56bdaf6a6cc7dc,2024-10-09T23:15:11.577000
CVE-2024-9466,0,0,7c6ffb5c2daddefc09fa136fe3d0aa6b08ad91692d2ef7ce366c90d7334a52c7,2024-10-09T23:15:11.677000
CVE-2024-9467,0,0,7092abacb621c6f56f774275f7135aa3234c3d257afa62d63975dd7e63387ab3,2024-10-09T23:15:11.783000
CVE-2024-9468,0,0,8e6702e737f362c6fdcd36eca73fc028c9f11c62bfa56f22d75f735e050539c8,2024-10-09T17:15:20.637000
CVE-2024-9469,0,0,d9b6f661b9e1322b3b093a5ae970d853aa8691c848e351552d3696e45e6311d1,2024-10-09T17:15:20.770000
CVE-2024-9470,0,0,0797df17ec09d3f69674ab049b6f850a5388d56caf69a4c5de1caee228001ca0,2024-10-09T17:15:20.907000

Can't render this file because it is too large.