Auto-Update: 2024-10-21T04:00:17.602746+00:00

This commit is contained in:
cad-safe-bot 2024-10-21 04:03:17 +00:00
parent fe619a9b3f
commit f4283c30aa
5 changed files with 336 additions and 18 deletions

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10198",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-21T02:15:02.133",
"lastModified": "2024-10-21T02:15:02.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /manage_customer.php of the component Manage Customer Page. The manipulation of the argument suppliers_name/address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting files to be affected. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/higordiego/93343006341d3799de0cb8912cc328ec",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.281023",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.281023",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.426885",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-21T02:15:02.403",
"lastModified": "2024-10-21T02:15:02.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /manage_medicine.php of the component Manage Medicines Page. The manipulation of the argument name/address/doctor_address/suppliers_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting files to be affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/higordiego/0dae6dd4a36acd12bcc408caf1c787d9",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.281024",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.281024",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.426916",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-43689",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-10-21T02:15:02.680",
"lastModified": "2024-10-21T02:15:02.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow vulnerability exists in WAB-I1750-PS and WAB-S1167-PS. By processing a specially crafted HTTP request, arbitrary code may be executed."
}
],
"metrics": {},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN24885537/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.elecom.co.jp/news/security/20240827-01/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-21T02:00:18.712852+00:00
2024-10-21T04:00:17.602746+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-21T01:15:02.943000+00:00
2024-10-21T02:15:02.680000+00:00
```
### Last Data Feed Release
@ -33,26 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266242
266245
```
### CVEs added in the last Commit
Recently added CVEs: `3`
- [CVE-2024-10196](CVE-2024/CVE-2024-101xx/CVE-2024-10196.json) (`2024-10-21T01:15:02.230`)
- [CVE-2024-10197](CVE-2024/CVE-2024-101xx/CVE-2024-10197.json) (`2024-10-21T01:15:02.687`)
- [CVE-2024-49215](CVE-2024/CVE-2024-492xx/CVE-2024-49215.json) (`2024-10-21T01:15:02.943`)
- [CVE-2024-10198](CVE-2024/CVE-2024-101xx/CVE-2024-10198.json) (`2024-10-21T02:15:02.133`)
- [CVE-2024-10199](CVE-2024/CVE-2024-101xx/CVE-2024-10199.json) (`2024-10-21T02:15:02.403`)
- [CVE-2024-43689](CVE-2024/CVE-2024-436xx/CVE-2024-43689.json) (`2024-10-21T02:15:02.680`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `0`
- [CVE-2023-26785](CVE-2023/CVE-2023-267xx/CVE-2023-26785.json) (`2024-10-21T00:15:11.947`)
- [CVE-2023-39593](CVE-2023/CVE-2023-395xx/CVE-2023-39593.json) (`2024-10-21T00:15:12.103`)
- [CVE-2024-27766](CVE-2024/CVE-2024-277xx/CVE-2024-27766.json) (`2024-10-21T00:15:12.173`)
- [CVE-2024-46292](CVE-2024/CVE-2024-462xx/CVE-2024-46292.json) (`2024-10-21T00:15:12.240`)
## Download and Usage

View File

@ -220149,7 +220149,7 @@ CVE-2023-26780,0,0,0a2bfcd02f53c6ac093d58cc180c519d2a43ad99184c7df9862b088ff00e7
CVE-2023-26781,0,0,3d02952edb170d494b0504990360825f38e92e8848f6f4f4ff91401983c48890,2023-05-08T17:11:51.063000
CVE-2023-26782,0,0,6ca5eec4beaebf1734dc236d1b0623f906fb3ba71dfe85419b666b3dea09a594,2023-10-06T17:20:59.803000
CVE-2023-26784,0,0,071c60b6740633a44aaf2a0e60f7735e8a7dfcdee0c5b5c97016b37b97b20983,2023-03-22T16:06:24.767000
CVE-2023-26785,0,1,e01827a328f466db922ba8562f17cce15ac2247d68ab38d799a621157859f6a7,2024-10-21T00:15:11.947000
CVE-2023-26785,0,0,e01827a328f466db922ba8562f17cce15ac2247d68ab38d799a621157859f6a7,2024-10-21T00:15:11.947000
CVE-2023-26788,0,0,7fa325a41419317b85b7654551d6158f8e6dd92063a11f6ab58476d4fa9c0e85,2023-04-14T03:53:02.843000
CVE-2023-26789,0,0,693ac4c06e973f2dddf5d5b7c84f39948ad2e205bbc59cc3058702f8b55394cb,2023-04-11T14:46:38.527000
CVE-2023-2679,0,0,d6c7eed4f9e9442e83b78abe9cd8db657b80acb7e841ef6db23187abd84f1550,2023-05-25T19:38:25.710000
@ -230027,7 +230027,7 @@ CVE-2023-39582,0,0,4e3c94d04c3d71f1e7474e48a5e9e5802cb614cc5caaae178c9bf4c6db83a
CVE-2023-39583,0,0,682c5456d8be8d30f587ea2f337fa4ba505b49c39d80ddcb554520ba90068870,2023-11-07T04:17:33.040000
CVE-2023-39584,0,0,2c91b4e9916e8396a565550f0b2e78bd69e8dd806951ec541bdabb6ac33bc11e,2024-09-26T18:35:04.523000
CVE-2023-3959,0,0,1c8cb0b9580f83318b0c36d8bc8f73fb342f7d0f0a71af399cdaffe0ab2960a8,2024-08-02T07:16:07.870000
CVE-2023-39593,0,1,0669f9e3530262a87a6ce00403249b070f5e70ebdca5c3feb3d329b8bdd0afd5,2024-10-21T00:15:12.103000
CVE-2023-39593,0,0,0669f9e3530262a87a6ce00403249b070f5e70ebdca5c3feb3d329b8bdd0afd5,2024-10-21T00:15:12.103000
CVE-2023-39598,0,0,472be8949d4750c193fc0e79e3373ee8040069ae06201b9dbce78c66cf7f4d8a,2023-11-07T04:17:33.097000
CVE-2023-39599,0,0,d846bb2751315746765d628aac10470828469ee3fe731d77fb8a34e1cea0bd8c,2023-08-28T19:08:09.323000
CVE-2023-39600,0,0,7f58febe003b75ab66793e4055525f6c3c139aad235a05622e6f81527de7c5e2,2023-11-07T04:17:34.073000
@ -242313,8 +242313,10 @@ CVE-2024-10192,0,0,9f3a26656d3a0aa5ee219d066ee638d49fb09c17860b4f18ed9a6f860568e
CVE-2024-10193,0,0,b93daf4f357fcb75b4b37e60362b781cc35ddbaaea37fe390b0a2133c2aa00aa,2024-10-20T08:15:02.300000
CVE-2024-10194,0,0,01d2cafbf34c62e6f1147d9592057704a8ba426a02b5123a102e0bc34f4d9f79,2024-10-20T08:15:02.710000
CVE-2024-10195,0,0,ed593f10b27233229e70d7006e552e63b4bf846b117fb3ae7173871eb91ce5c3,2024-10-20T09:15:02.393000
CVE-2024-10196,1,1,ee1cf86004a08bc66a40ce7fab7cd92b4df29cd21692f664a994fb9ea341a0bc,2024-10-21T01:15:02.230000
CVE-2024-10197,1,1,0f4c7b0f1324f1028f59c6eea75b7680e53d8c2cba987b1b9d71fb6f14bbecae,2024-10-21T01:15:02.687000
CVE-2024-10196,0,0,ee1cf86004a08bc66a40ce7fab7cd92b4df29cd21692f664a994fb9ea341a0bc,2024-10-21T01:15:02.230000
CVE-2024-10197,0,0,0f4c7b0f1324f1028f59c6eea75b7680e53d8c2cba987b1b9d71fb6f14bbecae,2024-10-21T01:15:02.687000
CVE-2024-10198,1,1,e50ec102560503824c1906a6ce9e160e44334b56699bcb1ddd7e7a8fc8253c03,2024-10-21T02:15:02.133000
CVE-2024-10199,1,1,e0c59945948bc46b98115fe8189e2d8c5ee7ae03f6b32f5e7c36095a253b5217,2024-10-21T02:15:02.403000
CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
@ -248955,7 +248957,7 @@ CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7
CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000
CVE-2024-27764,0,0,16ee34fde6f52e835f6174856b223e8f8048a1141bc56e5919f75be066bd1b81,2024-08-29T20:36:33.003000
CVE-2024-27765,0,0,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000
CVE-2024-27766,0,1,f24b56b44cb2d737c1daa5a7d4c1417b2824b6e6c4bdc70a98d9fb6e2a3e7e16,2024-10-21T00:15:12.173000
CVE-2024-27766,0,0,f24b56b44cb2d737c1daa5a7d4c1417b2824b6e6c4bdc70a98d9fb6e2a3e7e16,2024-10-21T00:15:12.173000
CVE-2024-27767,0,0,588021191ffc186f7dafcc065bb8b722083fff47f2715dec13cceb116744ce43,2024-03-18T19:40:00.173000
CVE-2024-27768,0,0,2a172611cfb3cb531839add9d871259e9ae7004ba84244aa574347493f81c01e,2024-03-18T19:40:00.173000
CVE-2024-27769,0,0,40c08942e7bc0a364e2e9393c4316622b03ce4f4c87f0140fc357e25906e47fa,2024-03-18T19:40:00.173000
@ -259903,6 +259905,7 @@ CVE-2024-43685,0,0,a89a9c99e0124da64988793c53f10ebfe259e8367a37913b86ec873ac50d0
CVE-2024-43686,0,0,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000
CVE-2024-43687,0,0,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000
CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000
CVE-2024-43689,1,1,314ab1e8c87cc3233d04bfb1f55a1185312f7fc476617d6b92cd42393922b9c8,2024-10-21T02:15:02.680000
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000
CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000
@ -261219,7 +261222,7 @@ CVE-2024-46276,0,0,ba6c9d483af82dd2734a19e636bd58036683474d4934fc8937a305e4d99f4
CVE-2024-46278,0,0,26e686335c244c5bd5f81ade12d0d629e0ff04f9013adaceccad091ba17407a5,2024-10-07T20:35:10.653000
CVE-2024-46280,0,0,5a66b7ecdcd76d807c972a7ebea94a8133453c4877426c1300bbe2a7c6b81c87,2024-10-04T13:51:25.567000
CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000
CVE-2024-46292,0,1,802380573409710ecf3cd55e40df3f54ea6c4762134ab6ac6591b61d058d6ece,2024-10-21T00:15:12.240000
CVE-2024-46292,0,0,802380573409710ecf3cd55e40df3f54ea6c4762134ab6ac6591b61d058d6ece,2024-10-21T00:15:12.240000
CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-46300,0,0,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000
@ -262373,7 +262376,7 @@ CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714
CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000
CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000
CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000
CVE-2024-49215,1,1,16362fb91a1d9dad7e966a5bcf8d8d308433afd9441cf18c9e1483b80a6ae007,2024-10-21T01:15:02.943000
CVE-2024-49215,0,0,16362fb91a1d9dad7e966a5bcf8d8d308433afd9441cf18c9e1483b80a6ae007,2024-10-21T01:15:02.943000
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
CVE-2024-49217,0,0,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000
CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000

Can't render this file because it is too large.