Auto-Update: 2024-10-02T10:00:17.344678+00:00

This commit is contained in:
cad-safe-bot 2024-10-02 10:03:17 +00:00
parent 4c6f1e27b3
commit 22d3d6c446
12 changed files with 650 additions and 33 deletions

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.7.34. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
},
{
"lang": "es",
"value": "El complemento Email Subscribers de Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce para WordPress es vulnerable a la ejecuci\u00f3n de shortcodes arbitrarios en todas las versiones hasta la 5.7.34 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, ejecuten shortcodes arbitrarios."
}
],
"metrics": {

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-8800",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:02.510",
"lastModified": "2024-10-02T08:15:02.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The RabbitLoader \u2013 Website Speed Optimization for improving Core Web Vital metrics with Cache, Image Optimization, and more plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.21.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento RabbitLoader \u2013 Website Speed Optimization for improving Core Web Vital metrics with Cache, Image Optimization, and more para WordPress es vulnerable a Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.21.0 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/rabbit-loader/tags/2.21.0/inc/tab_init.php#L86",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3160267/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba435b26-a6f1-41cf-acb8-fffd8a18fea7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-8967",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:02.740",
"lastModified": "2024-10-02T08:15:02.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PWA \u2014 easy way to Progressive Web App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
},
{
"lang": "es",
"value": "El complemento PWA (Easy Way to Progressive Web App) para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.6.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/iworks-pwa/trunk/includes/iworks/class-iworks-svg.php#L16",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3161056/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/iworks-pwa/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/000bf956-1781-4596-ac12-81691fdd789c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-9172",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:02.960",
"lastModified": "2024-10-02T08:15:02.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Demo Importer Plus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
},
{
"lang": "es",
"value": "El complemento Demo Importer Plus para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 2.0.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/demo-importer-plus/trunk/inc/importers/wxr-importer/class-demo-importer-plus-wxr-importer.php#L331",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3160715/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/demo-importer-plus/#description",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/476c4eb3-db28-4f6a-9502-969e7f1c5ec1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-9210",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:03.180",
"lastModified": "2024-10-02T08:15:03.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MC4WP: Mailchimp Top Bar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento MC4WP: Mailchimp Top Bar para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.6.0 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mailchimp-top-bar/tags/1.6.0/views/settings-page.php#L40",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/mailchimp-top-bar/tags/1.6.1/views/settings-page.php#L40",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b45ba98f-4cd1-406a-8661-e19d5b4c3ba8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9218",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T09:15:02.837",
"lastModified": "2024-10-02T09:15:02.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Magazine Blocks \u2013 Blog Designer, Magazine & Newspaper Website Builder, Page Builder with Posts Blocks, Post Grid plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.3.14. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/magazine-blocks/tags/1.3.14/includes/Blocks.php#L334",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3161000/#file13",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4c27225-f9db-4ae5-bb1f-ce8648c216eb?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-9222",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:03.380",
"lastModified": "2024-10-02T08:15:03.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Paid Membership Subscriptions \u2013 Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.12.8. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Paid Membership Subscriptions \u2013 Effortless Memberships, Recurring Payments & Content Restriction para WordPress es vulnerable a Cross-Site Scripting Reflejado debido al uso de add_query_arg sin el escape apropiado en la URL en todas las versiones hasta la 2.12.8 incluida. Esto hace posible que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/paid-member-subscriptions/tags/2.12.8/includes/admin/class-admin-payments-list-table.php#L155",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3160323/#file10",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d43235b-9c5e-4d7f-99f0-28dcab4b2a91?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-9225",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:03.580",
"lastModified": "2024-10-02T08:15:03.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 8.1.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento SEOPress \u2013 On-site SEO para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 8.1.1 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-seopress/tags/8.1.1/inc/admin/wizard/admin-wizard.php#L286",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3159928/wp-seopress/trunk/inc/admin/wizard/admin-wizard.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e648f65-3eeb-405d-b243-26354f3843c8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9344",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T09:15:03.570",
"lastModified": "2024-10-02T09:15:03.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The BerqWP \u2013 Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' parameter in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/searchpro/trunk/simplehtmldom/example/scraping/example_scraping_general.php?rev=3138385",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3160806%40searchpro&new=3160806%40searchpro&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/01d5e5b5-033c-4690-9857-3339e2831340?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9378",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T09:15:04.257",
"lastModified": "2024-10-02T09:15:04.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 4.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/yml-for-yandex-market/tags/4.7.2/classes/system/pages/settings-page/class-y4ym-settings-page-feeds-wp-list-table.php#L311",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3160483/yml-for-yandex-market/trunk/classes/system/pages/settings-page/class-y4ym-settings-page-feeds-wp-list-table.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a463c5be-13d9-45d8-b43e-54ab188c151a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-02T08:00:20.463940+00:00
2024-10-02T10:00:17.344678+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-02T07:15:03.033000+00:00
2024-10-02T09:15:04.257000+00:00
```
### Last Data Feed Release
@ -33,33 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264295
264304
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `9`
- [CVE-2024-7315](CVE-2024/CVE-2024-73xx/CVE-2024-7315.json) (`2024-10-02T06:15:09.963`)
- [CVE-2024-8254](CVE-2024/CVE-2024-82xx/CVE-2024-8254.json) (`2024-10-02T07:15:03.033`)
- [CVE-2024-9174](CVE-2024/CVE-2024-91xx/CVE-2024-9174.json) (`2024-10-02T06:15:10.387`)
- [CVE-2024-9333](CVE-2024/CVE-2024-93xx/CVE-2024-9333.json) (`2024-10-02T06:15:11.113`)
- [CVE-2024-8800](CVE-2024/CVE-2024-88xx/CVE-2024-8800.json) (`2024-10-02T08:15:02.510`)
- [CVE-2024-8967](CVE-2024/CVE-2024-89xx/CVE-2024-8967.json) (`2024-10-02T08:15:02.740`)
- [CVE-2024-9172](CVE-2024/CVE-2024-91xx/CVE-2024-9172.json) (`2024-10-02T08:15:02.960`)
- [CVE-2024-9210](CVE-2024/CVE-2024-92xx/CVE-2024-9210.json) (`2024-10-02T08:15:03.180`)
- [CVE-2024-9218](CVE-2024/CVE-2024-92xx/CVE-2024-9218.json) (`2024-10-02T09:15:02.837`)
- [CVE-2024-9222](CVE-2024/CVE-2024-92xx/CVE-2024-9222.json) (`2024-10-02T08:15:03.380`)
- [CVE-2024-9225](CVE-2024/CVE-2024-92xx/CVE-2024-9225.json) (`2024-10-02T08:15:03.580`)
- [CVE-2024-9344](CVE-2024/CVE-2024-93xx/CVE-2024-9344.json) (`2024-10-02T09:15:03.570`)
- [CVE-2024-9378](CVE-2024/CVE-2024-93xx/CVE-2024-9378.json) (`2024-10-02T09:15:04.257`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `1`
- [CVE-2023-1083](CVE-2023/CVE-2023-10xx/CVE-2023-1083.json) (`2024-10-02T06:15:03.470`)
- [CVE-2023-1150](CVE-2023/CVE-2023-11xx/CVE-2023-1150.json) (`2024-10-02T06:15:04.583`)
- [CVE-2023-1619](CVE-2023/CVE-2023-16xx/CVE-2023-1619.json) (`2024-10-02T06:15:05.420`)
- [CVE-2023-1620](CVE-2023/CVE-2023-16xx/CVE-2023-1620.json) (`2024-10-02T06:15:06.393`)
- [CVE-2023-1779](CVE-2023/CVE-2023-17xx/CVE-2023-1779.json) (`2024-10-02T06:15:07.000`)
- [CVE-2023-2673](CVE-2023/CVE-2023-26xx/CVE-2023-2673.json) (`2024-10-02T06:15:07.620`)
- [CVE-2023-2759](CVE-2023/CVE-2023-27xx/CVE-2023-2759.json) (`2024-10-02T06:15:08.133`)
- [CVE-2023-3379](CVE-2023/CVE-2023-33xx/CVE-2023-3379.json) (`2024-10-02T06:15:08.453`)
- [CVE-2023-3663](CVE-2023/CVE-2023-36xx/CVE-2023-3663.json) (`2024-10-02T06:15:08.703`)
- [CVE-2024-44610](CVE-2024/CVE-2024-446xx/CVE-2024-44610.json) (`2024-10-02T06:15:09.210`)
- [CVE-2024-8254](CVE-2024/CVE-2024-82xx/CVE-2024-8254.json) (`2024-10-02T07:15:03.033`)
## Download and Usage

View File

@ -213629,7 +213629,7 @@ CVE-2023-1079,0,0,35d5b0fa56fa088ea40ff86f193102e8019c9b458a29a25be315b7c68f31fc
CVE-2023-1080,0,0,edc3e203b3554b02b410c564e010e419c78c00b3bd0ea386e31d67e412375091,2023-11-07T04:02:27.867000
CVE-2023-1081,0,0,1a66ef6bba6aeefbb573ef325b4f0781c618f72103a8a1fec657c993b6dba0ad,2023-03-04T02:06:16.360000
CVE-2023-1082,0,0,e5f26717cf7661ac36ae6d1001bf68b6f75e2a46297c905c72b698fb7186ce7c,2024-04-09T12:48:04.090000
CVE-2023-1083,0,1,f9bd295f8ad141f3b0566c4a077796c17d6fe37ff2b908a5c672e85fd207c192,2024-10-02T06:15:03.470000
CVE-2023-1083,0,0,f9bd295f8ad141f3b0566c4a077796c17d6fe37ff2b908a5c672e85fd207c192,2024-10-02T06:15:03.470000
CVE-2023-1084,0,0,5ab3a140a667c0e4f5c55fba2fdfb68fc34acae85c055654d26900a686e643c1,2023-03-15T14:27:48.850000
CVE-2023-1086,0,0,c7281028cb86518b7c41f8d8b2b705f8b4ccf1e4ba109ef7ea30d649d1263555,2023-11-07T04:02:28.057000
CVE-2023-1087,0,0,240da9e9925987a88bc3d7d2abc22d60c954a4ad03edccea0cee6ddfa6eb94c5,2023-11-07T04:02:28.193000
@ -213692,7 +213692,7 @@ CVE-2023-1146,0,0,70947ce73b581441f38546cc6de6c449e4b6fe6f062c4aedb8bc1a0ca70be6
CVE-2023-1147,0,0,83e0e3991a149430380ed67ac44f63947a541a5d40b113cc1f5b35dae0eec6f5,2023-03-03T18:57:03.790000
CVE-2023-1148,0,0,eaec08639d5d56c2dc64c2f46ed39455a99e091602259fe3cdab0cdc3052432f,2023-03-03T18:56:46.617000
CVE-2023-1149,0,0,0846ce04539f5fa2379014bee973dfe260c03b5d06bcd94a559e8b0acf579d37,2023-03-10T18:20:45.080000
CVE-2023-1150,0,1,0f1551e79929da56cbc5f417d4dfb4cc544fa5cce9b87a4b179b0bdb5485221b,2024-10-02T06:15:04.583000
CVE-2023-1150,0,0,0f1551e79929da56cbc5f417d4dfb4cc544fa5cce9b87a4b179b0bdb5485221b,2024-10-02T06:15:04.583000
CVE-2023-1151,0,0,bba6cc80a45b75fcc62773eae0e5e960d5874dfaa8466192d38abbc9b1691406,2024-05-17T02:17:50.957000
CVE-2023-1152,0,0,6729a25a6fe4ef26ffb2ee154eb5f611a955228fcee15ac5df7a209da6a79427,2023-11-07T04:02:39.170000
CVE-2023-1153,0,0,cd3f7e8edcf987be593b058b20fea8969ff28b97322655e212b5d3a83ee9485e,2023-11-07T04:02:39.383000
@ -214133,8 +214133,8 @@ CVE-2023-1615,0,0,a2d21336f537d172e82784fcc880cb301c9ecbd7fab6ed45b83b458f73ce0a
CVE-2023-1616,0,0,5db3d1a6b8c6bc3e4436023d3e63cc63acd9394ab42eb7b57ef11c641c6c9bd7,2024-05-17T02:18:17.100000
CVE-2023-1617,0,0,b780d545c3f94e6ca59de93e4557f8b45e6665b5368584201729571eaeae0616,2023-04-24T13:21:35.890000
CVE-2023-1618,0,0,e2ca67f41771f43cc6e9df1222d0768f3a2568901b94863f2176a2fdfd4f4d38,2023-08-23T01:15:09.957000
CVE-2023-1619,0,1,e6d41afec3016561a24d5870d4b2351dc00e843706f9f6980cf320b543827a50,2024-10-02T06:15:05.420000
CVE-2023-1620,0,1,8a1568da99b514f12b7268a0f9917091bd88f0de5ba41c53376f3c7ba270730a,2024-10-02T06:15:06.393000
CVE-2023-1619,0,0,e6d41afec3016561a24d5870d4b2351dc00e843706f9f6980cf320b543827a50,2024-10-02T06:15:05.420000
CVE-2023-1620,0,0,8a1568da99b514f12b7268a0f9917091bd88f0de5ba41c53376f3c7ba270730a,2024-10-02T06:15:06.393000
CVE-2023-1621,0,0,5a85e2be03756e0e1cfaf94c5790c023de583dc164b4b46f47cc4f20ae49b61c,2023-06-13T19:36:25.590000
CVE-2023-1622,0,0,9cc6746ab278552b174b0b9dfb515e038e5d45526ba53ca98f3e8044c09591f0,2023-11-07T04:04:21.773000
CVE-2023-1623,0,0,82a406b24cf62c651285c9701c471a92be1ea31cc63213c22393b2d3247fb7a8,2023-11-07T04:04:22
@ -214287,7 +214287,7 @@ CVE-2023-1775,0,0,f34f2593d0902fb662441e4fa5f5ac80d16b926bed526ebf048330ccfe6823
CVE-2023-1776,0,0,950861070c60356796ce0c848513d2f02b58996e09094d81b4038656961df13b,2023-11-07T04:04:53.637000
CVE-2023-1777,0,0,2b460607cdf55efc2e7b7cef0ae666bb7afda934a4ae4bdd8c55ea98c5aae6b3,2023-11-07T04:04:53.807000
CVE-2023-1778,0,0,217bfee5862138837555b76c07ee35825b7cec0aca49c2d5ff74782d1625f55a,2023-05-08T18:34:04.320000
CVE-2023-1779,0,1,66d0bc932f0879c2f1e47d249c0fe64cedade32cdf27d5c3eb28a0790df18518,2024-10-02T06:15:07
CVE-2023-1779,0,0,66d0bc932f0879c2f1e47d249c0fe64cedade32cdf27d5c3eb28a0790df18518,2024-10-02T06:15:07
CVE-2023-1780,0,0,3946b01981b86cdc187d47752958c60bd62bc48c840a391a386042ef7c4f5728,2023-11-07T04:04:54.073000
CVE-2023-1782,0,0,584a59fb33a64dfb2a4a5f82b814cc4c1f27d558782d1b6286350680d4937f4b,2023-04-12T19:34:26.840000
CVE-2023-1783,0,0,e6b6b594519a0e16795cc5ed0bdc1b7eed1d6d0d08e1d2cf30e26ede926c5923,2023-07-06T17:53:33.903000
@ -220074,7 +220074,7 @@ CVE-2023-26692,0,0,545bb4c8ce274f7c60cd4ed5223892b23358f551e603bb026e462243c0dc4
CVE-2023-2670,0,0,cde7a163d050644d2c2d58d38a9f3ff0b16c52d630ab83b17431e97bfe82badd,2024-05-17T02:23:08.840000
CVE-2023-2671,0,0,fc4f7219005f0b035da4666f0a7bbf9ca629a3ad7d3128512dadedc9de3bb7e4,2024-05-17T02:23:08.947000
CVE-2023-2672,0,0,aabcae4ca9a9bd9a2e31149e98e48c1f5cd465ee0e6420ae77e80a401e4f9da0,2024-05-17T02:23:10.067000
CVE-2023-2673,0,1,246dafe5d8c99c4b137f4c4e273b75c09ffe86e61a50345ccfaa6a37e9335ce0,2024-10-02T06:15:07.620000
CVE-2023-2673,0,0,246dafe5d8c99c4b137f4c4e273b75c09ffe86e61a50345ccfaa6a37e9335ce0,2024-10-02T06:15:07.620000
CVE-2023-26733,0,0,8087db337ca67d33fde5e9f564e6beb430f8f0b55028117c5ab183b16ae085e1,2023-04-10T19:01:16.217000
CVE-2023-26735,0,0,f0b76f09ad441387f56bc459708505e9cc3b69ee91ccff83e1d93bf3ad3e2280,2024-08-02T12:16:09.757000
CVE-2023-2674,0,0,d2234fc1009355c5454b2805ad7f9c7de23117a9f5353b6bc1fe48925725aefd,2023-05-22T14:58:07.940000
@ -220699,7 +220699,7 @@ CVE-2023-27586,0,0,72de1619c31b9c2ff4ad09f40e3b9c53d6bc1c9f49761fe93846248e8881b
CVE-2023-27587,0,0,ff84401de0a75d958d75bc60aaf34fc3791f8b67e0e2909ed4ac19eca27c4613,2023-03-17T16:26:13.203000
CVE-2023-27588,0,0,874c3205a5388c94e1a71e728cad2c914a9e85ce1ebab6fb5c0be65b7a6acd1f,2023-03-21T13:43:20.797000
CVE-2023-27589,0,0,36b0c65f6baadb268fa6360b2ad6c5762938c568776531af92f8e5ce4ac857d4,2023-03-21T14:16:35.477000
CVE-2023-2759,0,1,89449da3007a0a87ec2969f8f0e527bb56ee934be722818085958fd5036261ee,2024-10-02T06:15:08.133000
CVE-2023-2759,0,0,89449da3007a0a87ec2969f8f0e527bb56ee934be722818085958fd5036261ee,2024-10-02T06:15:08.133000
CVE-2023-27590,0,0,fbcdacdeb11d1d96b95db1af17c251768df12d37260f207c37323cae54be7d35,2023-07-12T03:15:08.943000
CVE-2023-27591,0,0,4a43fd171d94712f0a7a600747860c8bc4b8abe33f62ab2291722213622f8063,2023-03-24T14:50:00.573000
CVE-2023-27592,0,0,10a78a6f5645e927bdea072df914877bfcf4d5776beb770245704abd3b9c951a,2023-11-07T04:10:01.260000
@ -225560,7 +225560,7 @@ CVE-2023-33786,0,0,9e0053cbcc3bc74a69aaab6df3264fc3822ff8e82ff701337e250fc0ab528
CVE-2023-33787,0,0,a5cef9d088fc92a18f769b41833c6411a90e93f579d03dcb29efe55dfbfbab47,2024-02-02T13:54:55.517000
CVE-2023-33788,0,0,29f4003849fbeb9e3edcda7044282c36f86864ae53b748e95c65416b3ba28d91,2024-02-02T13:54:55.517000
CVE-2023-33789,0,0,5cded3fc1b2071193e891685b0a4bf8c7ca4778e1d9270a3d07030ee29c5a25a,2024-02-02T13:54:55.517000
CVE-2023-3379,0,1,a3a2d587f14bbf62d77df42322d96140b9fb0122196facc88e69371cd89db914,2024-10-02T06:15:08.453000
CVE-2023-3379,0,0,a3a2d587f14bbf62d77df42322d96140b9fb0122196facc88e69371cd89db914,2024-10-02T06:15:08.453000
CVE-2023-33790,0,0,574f30aa621eb6bd6e69277494a82c5a6dbfb075017a72d958745c3fe64d9d52,2024-02-02T13:54:55.517000
CVE-2023-33791,0,0,d89ad384ec2bd02797748adc2e5ce6707e516b33f8639d89b97715bfd37b513d,2024-02-02T13:54:55.517000
CVE-2023-33792,0,0,57ea47b1ea472c27f98ad7acf24ee7a9354aae8cada024223cbb33fe4b3314d4,2024-02-02T13:54:55.517000
@ -227539,7 +227539,7 @@ CVE-2023-36624,0,0,ed102f304664f69909ab4a1ccc1e3356d06e80c9b65d103d99142f0f38a34
CVE-2023-36627,0,0,2a2bcbf5e969a1678717a39d50dd1198f813b67fa053ed1d8099b098c17e3441,2023-10-05T15:39:20.327000
CVE-2023-36628,0,0,5e0aab7401b16f4c2fe335ba59e75b163e29dd5e3dccbcdf44e86818ab6c474d,2024-09-23T14:35:02.833000
CVE-2023-36629,0,0,24be445cef433fcf828c5dc1ce1d9f8df15f6bbb991544126f3c95b17aad6b04,2024-01-16T19:13:33.347000
CVE-2023-3663,0,1,ddb92791766760b746e516f3c5844309359d9b8c46f9e7577df13157ba39c6d9,2024-10-02T06:15:08.703000
CVE-2023-3663,0,0,ddb92791766760b746e516f3c5844309359d9b8c46f9e7577df13157ba39c6d9,2024-10-02T06:15:08.703000
CVE-2023-36630,0,0,813af12d002300be9872f8f77de31f15678cc30a7b3af0fd6232bdd7e6fd45e1,2023-07-03T13:03:32.567000
CVE-2023-36631,0,0,9ad1650c694f5c2829f029fa300eb17f88d9916a189bcdc6f41f1c4f7f2ac588,2024-08-02T17:16:13.233000
CVE-2023-36632,0,0,da0a317ff8744cc8ec4757a0ac6f14e4980ff513671876b7213ca4cc4b0c7956,2024-08-02T17:16:13.363000
@ -259691,7 +259691,7 @@ CVE-2024-44589,0,0,67d52b979dbf84795ff1b1a6445da43c9d3cf1ac9141ab2287575f9704bf9
CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
CVE-2024-44610,0,1,d1a5ad8642b14d9c678d37711b95729790d0ce9ddce47b7569f0eb14e24ca8dc,2024-10-02T06:15:09.210000
CVE-2024-44610,0,0,d1a5ad8642b14d9c678d37711b95729790d0ce9ddce47b7569f0eb14e24ca8dc,2024-10-02T06:15:09.210000
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
@ -263031,7 +263031,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda
CVE-2024-7312,0,0,dc3f367e0f0a86ec8a8ee4af9b89c7ef895e4bddfa2b420824b06225d6049fc1,2024-09-13T16:27:50.577000
CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000
CVE-2024-7314,0,0,64aaecd133deeb35ae51feed7f4d71099832a2945a1861cec1e5be771eb8caf9,2024-09-17T15:45:01.970000
CVE-2024-7315,1,1,c76281c597cfe81f1f3116f1e5bb315d0944617079208c3562ff072b668f5bf4,2024-10-02T06:15:09.963000
CVE-2024-7315,0,0,c76281c597cfe81f1f3116f1e5bb315d0944617079208c3562ff072b668f5bf4,2024-10-02T06:15:09.963000
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
CVE-2024-7318,0,0,3b07c549e5fb2dfd376a8d14b85e9bdf6d56cc8a33e82cf1a53a16bb45702ca6,2024-09-20T16:02:06.977000
CVE-2024-7319,0,0,91324dd5cce8fc33151e2efd0732f449f761808f1b2abe94f46ca69302c16039,2024-09-24T17:00:00.917000
@ -263729,7 +263729,7 @@ CVE-2024-8247,0,0,fcbdec6a2008dfeaed8390f987d382af34f3ecfe1f1962e571c7da897df6ef
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
CVE-2024-8253,0,0,538885466f07c28468f1d184c3fb77b594dc3a7e7631ea6be509e963086ff9ce,2024-09-25T19:42:31.943000
CVE-2024-8254,1,1,e17b6a394845d896fa0f545553b5d14bc24382d74740c918f53581aac086c8b7,2024-10-02T07:15:03.033000
CVE-2024-8254,0,1,07cb27d1ee420722e61945f6e00bb92f2652b00dd2252e1a7d511aca31734d7e,2024-10-02T07:15:03.033000
CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000
CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
@ -264069,6 +264069,7 @@ CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b0407
CVE-2024-8796,0,0,3072a1878c469640ca1580f40189a95dca902784c81c016c261f3bdcec04f58c,2024-09-30T14:10:38.937000
CVE-2024-8797,0,0,bc71120ba9c562037001bef5ed49069a2fb96f9263b3c8e2a617e34946a91f4d,2024-09-27T14:02:23.700000
CVE-2024-8799,0,0,00121647efdfbda1953f2b1e9dcd564fbf00607f157bcfec6188d74e35b1233b,2024-10-01T09:15:05.220000
CVE-2024-8800,1,1,d956ac136643b04f0243a452c8ccfdf197118d0e853c27476b810517af98011a,2024-10-02T08:15:02.510000
CVE-2024-8801,0,0,b5bc4f982a594acb6aaf56b2e8a82653b32de0b2ae7bfdf440e37c28bdd34de7,2024-09-30T14:23:46.140000
CVE-2024-8803,0,0,1e21e2187793442a371c4b65c97d90253ace224e18e6d0a30f5421631b4c2a19,2024-09-26T13:32:02.803000
CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000
@ -264125,6 +264126,7 @@ CVE-2024-8956,0,0,67fe3d1874df790c4fe403e5b4da2c61ceb691a22ee76441757b9e4b9f428f
CVE-2024-8957,0,0,7754fe7edeaccf469b1d2d0d834f9e662d3691f603f526c2d85ee83a7186072b,2024-10-01T17:49:25.573000
CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000
CVE-2024-8965,0,0,4ba541e4606533e3a8bee7a33ff07d0a9f7a7b73c53d09de5034be2d80daa7c8,2024-09-30T12:46:20.237000
CVE-2024-8967,1,1,7776297609e38f6238ec0b6b16a03ab86d44709e6cfab5e185f21104640ed150,2024-10-02T08:15:02.740000
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
CVE-2024-8974,0,0,d4bcc9476e440aef15c3a18c780e18e6939f5911111a1f36c9f70c7d14bcd4bb,2024-09-30T12:46:20.237000
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
@ -264214,8 +264216,9 @@ CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b
CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
CVE-2024-9172,1,1,199bb1885edbaf3e5cf8cf5bf50588b7a1520bf934b902a33238e0075b79a13b,2024-10-02T08:15:02.960000
CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb506,2024-10-01T14:12:41.293000
CVE-2024-9174,1,1,b84c9c7a9f9cd2234390c1ae1f1de568c65321ae63b8ba2386d7dc05a067988e,2024-10-02T06:15:10.387000
CVE-2024-9174,0,0,b84c9c7a9f9cd2234390c1ae1f1de568c65321ae63b8ba2386d7dc05a067988e,2024-10-02T06:15:10.387000
CVE-2024-9177,0,0,538b136929b66f2da77b71c4f345460987a86315e3e44122bd269ab3a2a9e52e,2024-09-30T12:46:20.237000
CVE-2024-9189,0,0,6fc70667b6c052aedd9065fd849720c6949b418d7c844ad831e0ce3249ae6d1c,2024-09-30T12:45:57.823000
CVE-2024-9194,0,0,24e26748ef3bff41d7a06efd6c027f138154eafd040f89b986b59a112235298b,2024-10-01T15:35:17.550000
@ -264224,8 +264227,12 @@ CVE-2024-9199,0,0,3ca7b00968012de33482b7967da315774f8cea9a5b3070fbe655db855473b7
CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000
CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000
CVE-2024-9209,0,0,7d3bad6781486e2f4da7df129717b8a491edccf73b369d5a2d34b95179369883,2024-10-01T09:15:06.110000
CVE-2024-9210,1,1,b5bf3ebd13fe0e23d57c1dda8f23c9e29d98e9d13d1a948e54726130578828c9,2024-10-02T08:15:03.180000
CVE-2024-9218,1,1,77125ca5d3f1f7f81f6120330b8e477b141483fa32387f60a5f81d7ec93a10fb,2024-10-02T09:15:02.837000
CVE-2024-9220,0,0,6f67adeba0c71de630c7e77880260d455139ec3e28b2bcf4d37b6c2e1b517adb,2024-10-01T09:15:06.613000
CVE-2024-9222,1,1,d4d7c4eff68d89a94204b86589393d1943f67be0939ef8964f73a1dbde0c2c63,2024-10-02T08:15:03.380000
CVE-2024-9224,0,0,daeac54c8a106a2cdf4131c378f84c7cfa1b831c70c575638327c37ab147ad9b,2024-10-01T09:15:07.190000
CVE-2024-9225,1,1,141d0d35e11a2cd106662fadee1419850af7b64bb767687c4551fb0ce39a77aa,2024-10-02T08:15:03.580000
CVE-2024-9228,0,0,9405c3cfc45dca66268ec52ff9d3afd2509e4b32bf0c50779cb731b661651911,2024-10-01T09:15:07.750000
CVE-2024-9241,0,0,c97fba2c7aa884bcdd52fc5811a712b361d655a1df561d8ca3d939dedb183a39,2024-10-01T09:15:08.287000
CVE-2024-9265,0,0,a960537dfc00aa7287cda3b344edaa9968d5f1c511cd23e19840dec685ffedab,2024-10-01T09:15:08.810000
@ -264272,12 +264279,14 @@ CVE-2024-9326,0,0,bc58a26c9b43fcdd4054d9300d5d0cde5547399aaa29865b7fca11d142895d
CVE-2024-9327,0,0,789b0175cdbfabd0a2b291c27ea4b21dfccf76f50782f3eac2c88bada4dfe956,2024-09-30T12:45:57.823000
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
CVE-2024-9329,0,0,98bed362b2a24e4db4311c4ce14eee7b5d7d3a2b87c87f5c94a31ac7bc8ac4f5,2024-09-30T12:45:57.823000
CVE-2024-9333,1,1,3a8b8751894004acbe0040a54680e8b99075c8756a62d62c518a0edb7a9ddf75,2024-10-02T06:15:11.113000
CVE-2024-9333,0,0,3a8b8751894004acbe0040a54680e8b99075c8756a62d62c518a0edb7a9ddf75,2024-10-02T06:15:11.113000
CVE-2024-9341,0,0,d5fd607e07f2946dcf80c0714f2f83eb8231c34e7bb32f10864cd8428533f0a9,2024-10-01T19:15:09.500000
CVE-2024-9344,1,1,32aab7c62363bb5e8b74c4e4a828c4e6e171f449ac6c37ef316871cdf05e101c,2024-10-02T09:15:03.570000
CVE-2024-9355,0,0,bc71c5b9ebfc4eac935290ed6c54b2a101846c60f03637d231f1d92ea2a8c69d,2024-10-01T19:15:09.793000
CVE-2024-9358,0,0,0152cc075779a766d901f87385961645ed224130afe67fa457b1ec2b8de41536,2024-10-01T02:15:10.340000
CVE-2024-9359,0,0,5e91a64536057dea096939e15114b5b156ad006dfcccaeb6e7ef261c97c1ddd2,2024-10-01T02:15:10.657000
CVE-2024-9360,0,0,bc1b1d81b39a5da5efaa713a48768241d5b68973f72008d946c08564d584aa3a,2024-10-01T03:15:02.690000
CVE-2024-9378,1,1,625bda20be6d01a82e3797535fa08f28bfd8bc3a2a03303024fa88544f391e86,2024-10-02T09:15:04.257000
CVE-2024-9391,0,0,4c41432718e7451dc470a85181cb09fb2bd64b781f5907911b14b935baeaf954,2024-10-01T16:15:10.510000
CVE-2024-9392,0,0,407207e9e6bd2b7ba92ed54ef3a4a35aab092bf9644ceeea6fbb3985d013ec81,2024-10-01T19:35:08.990000
CVE-2024-9393,0,0,7475863af582d7682a6cb667413720d8e8e419cf18be5c21c0a8d554e15e8e48,2024-10-01T16:15:10.623000

Can't render this file because it is too large.