diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23113.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23113.json index 5272c080ba6..da6d144f39b 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23113.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23113.json @@ -2,9 +2,13 @@ "id": "CVE-2024-23113", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-02-15T14:15:46.503", - "lastModified": "2024-02-22T15:33:00.970", + "lastModified": "2024-10-10T01:00:01.433", "vulnStatus": "Analyzed", "cveTags": [], + "cisaExploitAdd": "2024-10-09", + "cisaActionDue": "2024-10-30", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Fortinet Multiple Products Format String Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json index 42271cd8c97..50dacb01b76 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47823", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:31.370", - "lastModified": "2024-10-08T18:15:31.370", + "lastModified": "2024-10-10T00:15:02.553", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire `< v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a \u201c.php\u201d file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute \u201c.php\u201d files. This issue has been addressed in release version 3.5.2. All users are advised to upgrade. There are no known workarounds for this vulnerability." + "value": "Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a \u201c.php\u201d file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute \u201c.php\u201d files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Livewire es un framework full-stack para Laravel que permite componentes de UI din\u00e1micos sin salir de PHP. En livewire/livewire `< v3.5.2`, la extensi\u00f3n de archivo de un archivo cargado se adivina en funci\u00f3n del tipo MIME. Como resultado, la extensi\u00f3n de archivo real del nombre de archivo no se valida. Por lo tanto, un atacante puede eludir la validaci\u00f3n cargando un archivo con un tipo MIME v\u00e1lido (por ejemplo, `image/png`) y una extensi\u00f3n de archivo \u201c.php\u201d. Si se cumplen los siguientes criterios, el atacante puede llevar a cabo un ataque RCE: 1. El nombre de archivo est\u00e1 compuesto por el nombre de archivo original utilizando `$file->getClientOriginalName()`. 2. Archivos almacenados directamente en su servidor en un disco de almacenamiento p\u00fablico. 3. El servidor web est\u00e1 configurado para ejecutar archivos \u201c.php\u201d. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 3.5.2. Se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { @@ -74,6 +78,14 @@ "url": "https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5", "source": "security-advisories@github.com" }, + { + "url": "https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/livewire/livewire/pull/8624", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp", "source": "security-advisories@github.com" diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json new file mode 100644 index 00000000000..9b45346e75f --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48941", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-10T00:15:02.673", + "lastModified": "2024-10-10T00:15:02.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to bypass 2FA by interacting with the /rest endpoint of Jira, Confluence, or Bitbucket. In the default configuration, /rest is allowlisted." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://syracom-bee.atlassian.net/wiki/spaces/SL/pages/3236560898/2024-09-16+-+Secure+Login+security+advisory+-+Insecure+default+configuration", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json new file mode 100644 index 00000000000..aab066cbfc6 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48942", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-10T00:15:02.737", + "lastModified": "2024-10-10T00:15:02.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to easily brute-force the 2FA PIN via the plugins/servlet/twofactor/public/pinvalidation endpoint. The last 30 and the next 30 tokens are valid." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://syracom-bee.atlassian.net/wiki/spaces/SL/pages/3236560898/2024-09-16+-+Secure+Login+security+advisory+-+Insecure+default+configuration", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json new file mode 100644 index 00000000000..77f5d05e438 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48949", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-10T01:15:11.127", + "lastModified": "2024-10-10T01:15:11.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/indutny/elliptic/commit/7ac5360118f74eb02da73bdf9f24fd0c72ff5281", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/indutny/elliptic/compare/v6.5.5...v6.5.6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json index b8cc2ae0f98..8599485b7df 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json @@ -2,13 +2,21 @@ "id": "CVE-2024-9379", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:56.727", - "lastModified": "2024-10-08T17:15:56.727", + "lastModified": "2024-10-10T01:00:01.433", "vulnStatus": "Received", "cveTags": [], + "cisaExploitAdd": "2024-10-09", + "cisaActionDue": "2024-10-30", + "cisaRequiredAction": "As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.", + "cisaVulnerabilityName": "Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability", "descriptions": [ { "lang": "en", "value": "SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n SQL en la consola web de administraci\u00f3n de Ivanti CSA anterior a la versi\u00f3n 5.0.2 permite que un atacante remoto autenticado con privilegios de administrador ejecute sentencias SQL arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json index 66655ad5f40..d7eb5210712 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json @@ -2,13 +2,21 @@ "id": "CVE-2024-9380", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:56.970", - "lastModified": "2024-10-08T17:15:56.970", + "lastModified": "2024-10-10T01:00:01.433", "vulnStatus": "Received", "cveTags": [], + "cisaExploitAdd": "2024-10-09", + "cisaActionDue": "2024-10-30", + "cisaRequiredAction": "As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.", + "cisaVulnerabilityName": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability", "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la consola web de administraci\u00f3n de Ivanti CSA anterior a la versi\u00f3n 5.0.2 permite que un atacante remoto autenticado con privilegios de administrador obtenga la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/README.md b/README.md index 821623d5aa3..b2e51f7cbcf 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-09T23:55:17.184860+00:00 +2024-10-10T02:00:17.130034+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-09T23:15:11.783000+00:00 +2024-10-10T01:15:11.127000+00:00 ``` ### Last Data Feed Release @@ -27,34 +27,32 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-10-09T00:00:08.656111+00:00 +2024-10-10T00:00:08.668665+00:00 ``` ### Total Number of included CVEs ```plain -265164 +265167 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `3` -- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-09T23:15:11.017`) -- [CVE-2024-8264](CVE-2024/CVE-2024-82xx/CVE-2024-8264.json) (`2024-10-09T23:15:11.093`) +- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-10T00:15:02.673`) +- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-10T00:15:02.737`) +- [CVE-2024-48949](CVE-2024/CVE-2024-489xx/CVE-2024-48949.json) (`2024-10-10T01:15:11.127`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `4` -- [CVE-2023-37154](CVE-2023/CVE-2023-371xx/CVE-2023-37154.json) (`2024-10-09T22:35:00.577`) -- [CVE-2023-45359](CVE-2023/CVE-2023-453xx/CVE-2023-45359.json) (`2024-10-09T22:35:01.493`) -- [CVE-2024-9463](CVE-2024/CVE-2024-94xx/CVE-2024-9463.json) (`2024-10-09T23:15:11.290`) -- [CVE-2024-9464](CVE-2024/CVE-2024-94xx/CVE-2024-9464.json) (`2024-10-09T23:15:11.457`) -- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-10-09T23:15:11.577`) -- [CVE-2024-9466](CVE-2024/CVE-2024-94xx/CVE-2024-9466.json) (`2024-10-09T23:15:11.677`) -- [CVE-2024-9467](CVE-2024/CVE-2024-94xx/CVE-2024-9467.json) (`2024-10-09T23:15:11.783`) +- [CVE-2024-23113](CVE-2024/CVE-2024-231xx/CVE-2024-23113.json) (`2024-10-10T01:00:01.433`) +- [CVE-2024-47823](CVE-2024/CVE-2024-478xx/CVE-2024-47823.json) (`2024-10-10T00:15:02.553`) +- [CVE-2024-9379](CVE-2024/CVE-2024-93xx/CVE-2024-9379.json) (`2024-10-10T01:00:01.433`) +- [CVE-2024-9380](CVE-2024/CVE-2024-93xx/CVE-2024-9380.json) (`2024-10-10T01:00:01.433`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d40a7a700a3..eb86fe23772 100644 --- a/_state.csv +++ b/_state.csv @@ -227916,7 +227916,7 @@ CVE-2023-37150,0,0,d05a1b0d875f1cfb8b8d9baa69f7e4346989eabceeace7d843178ad656fb1 CVE-2023-37151,0,0,bf6cf332b567d32eaeddc623f5bf07af51d14964109f0e2dfbc5db2d182aa204,2023-11-07T04:16:52.113000 CVE-2023-37152,0,0,ca65ebed26c8101f159b0151dd7fe9e9ce43a5c3219a1e852d7fdfcb325ca20e,2024-08-02T17:16:30.650000 CVE-2023-37153,0,0,e122d0bcc21e8639e43c4bbd1c9b0bf614aae545f65b9ad3f17a6efcd01c6868,2023-08-02T15:15:10.610000 -CVE-2023-37154,0,1,f7388c9c1b0a13dd9a4162a07b0de01d36de30f3455addbd0ab05525cbf3e76f,2024-10-09T22:35:00.577000 +CVE-2023-37154,0,0,f7388c9c1b0a13dd9a4162a07b0de01d36de30f3455addbd0ab05525cbf3e76f,2024-10-09T22:35:00.577000 CVE-2023-3716,0,0,d0f060c388db946191575a3899e743906999df63f1f15865bc69aad089789ee5,2023-08-10T03:51:39.830000 CVE-2023-37164,0,0,d248be9d35f9c17bada918addf9d6a2fca4a0b9702928afff3b86ead659d9f15,2023-07-31T17:00:03.897000 CVE-2023-37165,0,0,3e398869f80e6f16e25a43e3872dd9d5deaede02c385be5baa88b538c80bdf72,2023-07-31T18:22:59.597000 @@ -234022,7 +234022,7 @@ CVE-2023-45355,0,0,b59e8a5c262fc336755665d3f82901992de366c3cd37580ce157b1da22017 CVE-2023-45356,0,0,a62df74c374cf7bacfa1e71cb2f8f490477edf6944efd6c2b790f8110ba45b0d,2023-10-12T18:35:22.260000 CVE-2023-45357,0,0,b61bb0f6d334abf3f7461d24dfe821b0ca5f9b0dea69f41511f89389f2f4b422,2023-10-24T19:56:37.377000 CVE-2023-45358,0,0,7f96189ec3a479246b13a2926c14e3d2144a7c985302246d9c9c0ec1db4dda0d,2023-10-24T19:19:29.867000 -CVE-2023-45359,0,1,20af715e0cd0fe912da0d73640c5551a126a76573b17e54f71c2a2dfd7d2c35d,2024-10-09T22:35:01.493000 +CVE-2023-45359,0,0,20af715e0cd0fe912da0d73640c5551a126a76573b17e54f71c2a2dfd7d2c35d,2024-10-09T22:35:01.493000 CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5b0,2024-01-23T19:38:31.160000 CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 CVE-2023-45361,0,0,10253df39112f65e66d43e0903fa429df40e36757d111a4a45028ed4d1d94cf5,2024-10-09T14:35:07.353000 @@ -245236,7 +245236,7 @@ CVE-2024-2311,0,0,4aac7ca25d4746b431ed7ccd5e7d3d99df50290a301a85fe7466f2339700b1 CVE-2024-23110,0,0,1ac4a7144e9209f9a89949f05fe1e7cc8c377744b32bfb607f177f1a970f34e1,2024-08-23T02:45:28.487000 CVE-2024-23111,0,0,752974f238ed1f3e5e428baa91d031d0aceea7be33f8a58b9a2a43bae855557c,2024-08-23T02:47:13.560000 CVE-2024-23112,0,0,95e5175d7388e29c67df9af8c672941dd9e221ee4e0a1ee87f756c639ee8dad2,2024-03-15T14:51:58.497000 -CVE-2024-23113,0,0,a86bcac9b7145820c2db580ab2ab4b188eadec5244c508e4a8d29ba1588a2fac,2024-02-22T15:33:00.970000 +CVE-2024-23113,0,1,e4a22a572f804e3f962d65a633155804365118f9caaa4bc464f5658928aefd90,2024-10-10T01:00:01.433000 CVE-2024-23114,0,0,7252a5a302093b43221ea76f9a6a29eda61311bf101ae44cd86a63862ce26956,2024-08-28T20:35:06.210000 CVE-2024-23115,0,0,7b60c057c6ecb2992362930744ce2990e40a5ef55d9da25b0609baa5f284fa28,2024-04-02T12:50:42.233000 CVE-2024-23116,0,0,b697b868738862e20bfb62cd043729402a6443f2a45a0bdae976d2a021726d27,2024-04-02T12:50:42.233000 @@ -261582,7 +261582,7 @@ CVE-2024-47817,0,0,a8978e2cff17b63ee249f998983f4eff08d98ca0b11639ba8434d107030ba CVE-2024-47818,0,0,598d35845d5c9531ef399cca4570ef2326935f542cd6df2c80239a96fe7c21e2,2024-10-07T22:15:04.037000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-47822,0,0,1bb3c8fcad68cf5925eb2c4b3afc1ce650c6df3f807783d5dffddd106c4ce49b,2024-10-08T18:15:31.170000 -CVE-2024-47823,0,0,c10215cad624267b17781080d6e6e6f8941897c8eacd6a139a06208046d58c6c,2024-10-08T18:15:31.370000 +CVE-2024-47823,0,1,8320742a660378f6a01ad741722ead2a09f9e6be07616ac2e9eda6ddd367cc9a,2024-10-10T00:15:02.553000 CVE-2024-47828,0,0,2ab43236050d709c1d1b37224db30aa1be8862c0e60a6ee5d60152971174cbfd,2024-10-09T19:15:14.423000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-47832,0,0,b7e56eeac131fe4fefd7e3116d02da42a2ff171d36975cc192ba07793c3dca42,2024-10-09T19:15:14.647000 @@ -261707,8 +261707,11 @@ CVE-2024-4890,0,0,53ca3d470669469343718a89aecd8ceb01b5d306faed13dac96d630215f97f CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 -CVE-2024-48933,1,1,7de0f4bfffca5deb1c74453cbef6b33cc0a48f7c75ec32bb2f0f5296d55482aa,2024-10-09T23:15:11.017000 +CVE-2024-48933,0,0,7de0f4bfffca5deb1c74453cbef6b33cc0a48f7c75ec32bb2f0f5296d55482aa,2024-10-09T23:15:11.017000 CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000 +CVE-2024-48941,1,1,a478a010fad052d976d7fee743b5553216cec10ffc9e36f57c76bed30d76a955,2024-10-10T00:15:02.673000 +CVE-2024-48942,1,1,afe00b24b361f1a17ca816956fa863245c8abdb1171f93cd4cfff531d632fd84,2024-10-10T00:15:02.737000 +CVE-2024-48949,1,1,a1844289d41db918a877296bf4ef92d8aa4561ffb6581c981df85622e133061c,2024-10-10T01:15:11.127000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 @@ -264459,7 +264462,7 @@ CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000 CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000 CVE-2024-8263,0,0,624497db0422cb1a205809ab52a2afed4f8032000058c309c8e30c3994bdbb10,2024-09-30T15:57:26.213000 -CVE-2024-8264,1,1,dae145d63df2475847f7054e6c3c247c216d09809d4eb2c06c74b36b60bd0aed,2024-10-09T23:15:11.093000 +CVE-2024-8264,0,0,dae145d63df2475847f7054e6c3c247c216d09809d4eb2c06c74b36b60bd0aed,2024-10-09T23:15:11.093000 CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000 CVE-2024-8268,0,0,5be7ed43bc13c42d107f9505f0e50c5c3da78418e570e46eb634a6a34dba57c1,2024-09-26T16:15:31.053000 CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000 @@ -265069,8 +265072,8 @@ CVE-2024-9368,0,0,e7a9c605e0cbf9cdb1d319aa8ea22e93a6f5e80855432922ca5e53112d3a4b CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044af6,2024-10-04T13:50:43.727000 CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 -CVE-2024-9379,0,0,55c78e30dfa386c2414282e28f1741a9d6a5ac18382903f5fadf93ad729709f0,2024-10-08T17:15:56.727000 -CVE-2024-9380,0,0,73c2dad6dd4808f2199fea19ecffc8a058cc84ea931e4b639a11fea08563ac3e,2024-10-08T17:15:56.970000 +CVE-2024-9379,0,1,703ba59f46c27b4c9a81634b7ffa6a16d24f7bdc67c63aab96b4a5148055591a,2024-10-10T01:00:01.433000 +CVE-2024-9380,0,1,2037d2a4a238cf512644b0219683af760fbe6f206c09635b8a946c319ea8a207,2024-10-10T01:00:01.433000 CVE-2024-9381,0,0,cc48b0c94354735826bd90917d8a4f1bd25f02a01e3be77523bffb72c1d63efa,2024-10-08T17:15:57.183000 CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000 CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000 @@ -265104,11 +265107,11 @@ CVE-2024-9449,0,0,a97c6d10c8b04c0b2ba9306e37a8440eda5112028d07f60f30bea1d9431c3f CVE-2024-9451,0,0,61aa4f71fe0ab792c97d101a7739a4f3bc5141915892cc9a79adc1735531429e,2024-10-09T08:15:05.160000 CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 -CVE-2024-9463,0,1,f13497b8f0b60e6e27c9901c2789e15050e4fdbc20807f021c8855b382953be1,2024-10-09T23:15:11.290000 -CVE-2024-9464,0,1,99a593d9b1195cd84d5c7e8c5dc3bbb5dc83cf53b5dd3defc462e16b4dd2a56e,2024-10-09T23:15:11.457000 -CVE-2024-9465,0,1,f4eeb8126b57a6a32266941e46984287d34afe79d4741d66fe56bdaf6a6cc7dc,2024-10-09T23:15:11.577000 -CVE-2024-9466,0,1,7c6ffb5c2daddefc09fa136fe3d0aa6b08ad91692d2ef7ce366c90d7334a52c7,2024-10-09T23:15:11.677000 -CVE-2024-9467,0,1,7092abacb621c6f56f774275f7135aa3234c3d257afa62d63975dd7e63387ab3,2024-10-09T23:15:11.783000 +CVE-2024-9463,0,0,f13497b8f0b60e6e27c9901c2789e15050e4fdbc20807f021c8855b382953be1,2024-10-09T23:15:11.290000 +CVE-2024-9464,0,0,99a593d9b1195cd84d5c7e8c5dc3bbb5dc83cf53b5dd3defc462e16b4dd2a56e,2024-10-09T23:15:11.457000 +CVE-2024-9465,0,0,f4eeb8126b57a6a32266941e46984287d34afe79d4741d66fe56bdaf6a6cc7dc,2024-10-09T23:15:11.577000 +CVE-2024-9466,0,0,7c6ffb5c2daddefc09fa136fe3d0aa6b08ad91692d2ef7ce366c90d7334a52c7,2024-10-09T23:15:11.677000 +CVE-2024-9467,0,0,7092abacb621c6f56f774275f7135aa3234c3d257afa62d63975dd7e63387ab3,2024-10-09T23:15:11.783000 CVE-2024-9468,0,0,8e6702e737f362c6fdcd36eca73fc028c9f11c62bfa56f22d75f735e050539c8,2024-10-09T17:15:20.637000 CVE-2024-9469,0,0,d9b6f661b9e1322b3b093a5ae970d853aa8691c848e351552d3696e45e6311d1,2024-10-09T17:15:20.770000 CVE-2024-9470,0,0,0797df17ec09d3f69674ab049b6f850a5388d56caf69a4c5de1caee228001ca0,2024-10-09T17:15:20.907000