mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-27T22:00:17.509719+00:00
This commit is contained in:
parent
06d0f4f5c5
commit
326efc1ab3
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46751",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-21T07:15:33.740",
|
||||
"lastModified": "2023-09-06T15:15:15.913",
|
||||
"lastModified": "2024-09-27T21:35:01.657",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31188",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-06T10:15:13.183",
|
||||
"lastModified": "2023-09-11T13:33:19.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T21:35:01.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34637",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-05T22:15:08.577",
|
||||
"lastModified": "2023-09-11T16:54:19.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:35:06.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39213",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T22:15:10.657",
|
||||
"lastModified": "2023-08-15T15:30:15.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:15:04.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nImproper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access.\n\n"
|
||||
"value": "Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
"value": "CWE-176"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39214",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T22:15:10.737",
|
||||
"lastModified": "2023-12-14T16:48:23.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:15:04.847",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nExposure of sensitive information in Zoom Client SDK's before 5.15.5 may allow an authenticated user to enable a denial of service via network access.\n\n"
|
||||
"value": "Exposure of sensitive information in Zoom Client SDK's before 5.15.5 may allow an authenticated user to enable a denial of service via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39215",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-09-12T20:15:09.203",
|
||||
"lastModified": "2023-09-15T19:11:10.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:15:04.970",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-449"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39216",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T18:15:23.657",
|
||||
"lastModified": "2023-08-11T16:20:34.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:15:05.103",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39217",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T18:15:23.843",
|
||||
"lastModified": "2023-08-11T16:24:49.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:15:05.223",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40273",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-23T16:15:09.803",
|
||||
"lastModified": "2023-08-29T16:14:08.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T21:35:03.083",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40357",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-06T10:15:14.820",
|
||||
"lastModified": "2023-09-11T13:42:13.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:35:08.133",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43585",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-12-13T23:15:07.463",
|
||||
"lastModified": "2023-12-19T02:32:59.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T20:15:05.407",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-449"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-43591",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-11-15T00:15:09.237",
|
||||
"lastModified": "2024-08-29T20:35:23.297",
|
||||
"lastModified": "2024-09-27T20:15:05.543",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access.\n"
|
||||
"value": "Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-280"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-24698",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-02-14T00:15:47.967",
|
||||
"lastModified": "2024-02-14T13:59:35.580",
|
||||
"lastModified": "2024-09-27T20:15:05.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.\n"
|
||||
"value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-449"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25411",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:04.000",
|
||||
"lastModified": "2024-09-27T18:15:04.000",
|
||||
"lastModified": "2024-09-27T20:35:09.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1GBL-iY5ZRaxRqLVqpBe1w6dVgEfywAG7/view?usp=sharing",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38809",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-09-27T17:15:12.393",
|
||||
"lastModified": "2024-09-27T17:15:12.393",
|
||||
"lastModified": "2024-09-27T20:35:10.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://spring.io/security/cve-2024-38809",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-40508",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-26T22:15:03.963",
|
||||
"lastModified": "2024-09-26T22:15:03.963",
|
||||
"lastModified": "2024-09-27T20:35:11.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMConference.asmx function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Cross-Site Scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMConference.asmx."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-40508",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46097",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:05.687",
|
||||
"lastModified": "2024-09-27T18:15:05.687",
|
||||
"lastModified": "2024-09-27T20:35:12.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-46097.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46366",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T17:15:13.400",
|
||||
"lastModified": "2024-09-27T17:15:13.400",
|
||||
"lastModified": "2024-09-27T20:35:12.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Tommywarren/89cef7f876ee897a4ff40a8b71b6208e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46367",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T17:15:13.487",
|
||||
"lastModified": "2024-09-27T17:15:13.487",
|
||||
"lastModified": "2024-09-27T20:35:13.517",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to inject arbitrary JavaScript code by submitting a malicious payload within the username field. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Tommywarren/4ac0c8f6e5d8584accd31b8277e55749",
|
||||
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46453.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46453.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46453",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T21:15:03.350",
|
||||
"lastModified": "2024-09-27T21:15:03.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the component /test/ of iq3xcite v2.31 to v3.05 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nosmo-gla/iq3xcite-XSS-2.31-3.05/tree/main",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-471xx/CVE-2024-47186.json
Normal file
64
CVE-2024/CVE-2024-471xx/CVE-2024-47186.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47186",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-27T21:15:03.443",
|
||||
"lastModified": "2024-09-27T21:15:03.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Filament is a collection of full-stack components for Laravel development. Versions of Filament from v3.0.0 through v3.2.114 are affected by a cross-site scripting (XSS) vulnerability. If values passed to a `ColorColumn` or `ColumnEntry` are not valid and contain a specific set of characters, applications are vulnerable to XSS attack against a user who opens a page on which a color column or entry is rendered. Filament v3.2.115 fixes this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/filamentphp/filament/commit/df7989352464d08eda5837ef50f9997fad902316",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/filamentphp/filament/releases/tag/v3.2.115",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/filamentphp/filament/security/advisories/GHSA-9h9q-qhxg-89xr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-64xx/CVE-2024-6436.json
Normal file
78
CVE-2024/CVE-2024-64xx/CVE-2024-6436.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-6436",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-09-27T20:15:06.043",
|
||||
"lastModified": "2024-09-27T20:15:06.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An input validation vulnerability exists in the Rockwell Automation Sequence Manager\u2122 which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1679.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6493",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.200",
|
||||
"lastModified": "2024-09-13T16:35:18.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:28:49.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "2602A188-0596-4FC0-95E5-8F03F2BE9B13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0e3128ef-901a-42aa-9d74-c69d3241dc07/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6617",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.290",
|
||||
"lastModified": "2024-09-13T16:35:18.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:28:35.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "2602A188-0596-4FC0-95E5-8F03F2BE9B13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9c5efe3c-95a8-4647-86c0-20aa7dd92b66/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7133",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.580",
|
||||
"lastModified": "2024-09-13T16:35:19.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:27:50.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.3",
|
||||
"matchCriteriaId": "B3BA279A-E35B-4C35-8B2C-DE4089E05D66"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/c81c1622-33d1-41f2-ba63-f06bd4c125ab/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7860",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.853",
|
||||
"lastModified": "2024-09-12T14:35:19.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T20:56:24.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:outtolunchproductions:simple_headline_rotator:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "D1C887B1-C997-4C43-A3AF-E95CFB62FFAF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/584156d7-928e-48c9-8b81-539ccb06f3f5/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7861",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.933",
|
||||
"lastModified": "2024-09-12T14:35:20.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T20:52:11.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:michalaugustyniak:misiek_paypal:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.20090324",
|
||||
"matchCriteriaId": "FFEDB0F2-EF6D-4EFF-8E95-621BFC8BC2ED"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/df9aa795-ba16-4806-b01a-311f80aa52c0/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7863",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.650",
|
||||
"lastModified": "2024-09-13T15:35:12.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:27:07.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1",
|
||||
"matchCriteriaId": "AD25634F-DF77-4192-AFC0-70242B138177"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/5e814b02-3870-4742-905d-ec03b0d31add/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7864",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.720",
|
||||
"lastModified": "2024-09-13T15:35:12.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:26:50.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1",
|
||||
"matchCriteriaId": "AD25634F-DF77-4192-AFC0-70242B138177"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6ce62e78-04a4-46b2-b97f-c4ef8f3258c3/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8047",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.617",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:25:08.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gowildchild:visual_sound:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.06",
|
||||
"matchCriteriaId": "7B79C3C5-6130-487E-9993-2D8E4AE2D537"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0ae1474c-9193-48ee-8cf6-d19900ad95f4/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8054",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:25.077",
|
||||
"lastModified": "2024-09-12T14:35:22.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:29:57.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.7.9",
|
||||
"matchCriteriaId": "C4392D67-C78E-47DD-9197-A928543DF88F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/f27deffc-9555-44bf-8dee-1891c210ecfd/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8056",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:25.140",
|
||||
"lastModified": "2024-09-12T13:35:23.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T21:29:42.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.7.9",
|
||||
"matchCriteriaId": "C4392D67-C78E-47DD-9197-A928543DF88F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/203b8122-f1e5-4e9e-ba83-f5cd59d8a289/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-92xx/CVE-2024-9291.json
Normal file
141
CVE-2024/CVE-2024-92xx/CVE-2024-9291.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-9291",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-27T21:15:03.667",
|
||||
"lastModified": "2024-09-27T21:15:03.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Affected is an unknown function of the file /ueditor/upload?configPath=ueditor/config.json&action=uploadfile of the component XML File Handler. The manipulation of the argument upfile leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The GitHub repository of the project did not receive an update for more than two years."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/daxiangya/kvf-admin/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/17058501/kvf-admin_xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.411202",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-92xx/CVE-2024-9293.json
Normal file
137
CVE-2024/CVE-2024-92xx/CVE-2024-9293.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-9293",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-27T21:15:03.937",
|
||||
"lastModified": "2024-09-27T21:15:03.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in skyselang yylAdmin up to 3.0. Affected by this vulnerability is the function list of the file /app/admin/controller/file/File.php of the component Backend. The manipulation of the argument is_disable leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/A0kooo/cve_article/blob/master/yyladmin/yyladmin%20file%20list%20have%20SQL%20injection.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278785",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278785",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.411499",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-27T20:00:17.700902+00:00
|
||||
2024-09-27T22:00:17.509719+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-27T19:39:43.350000+00:00
|
||||
2024-09-27T21:35:03.083000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,59 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264063
|
||||
264068
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-25411](CVE-2024/CVE-2024-254xx/CVE-2024-25411.json) (`2024-09-27T18:15:04.000`)
|
||||
- [CVE-2024-25412](CVE-2024/CVE-2024-254xx/CVE-2024-25412.json) (`2024-09-27T18:15:04.100`)
|
||||
- [CVE-2024-28948](CVE-2024/CVE-2024-289xx/CVE-2024-28948.json) (`2024-09-27T18:15:04.197`)
|
||||
- [CVE-2024-33368](CVE-2024/CVE-2024-333xx/CVE-2024-33368.json) (`2024-09-27T19:15:09.830`)
|
||||
- [CVE-2024-33369](CVE-2024/CVE-2024-333xx/CVE-2024-33369.json) (`2024-09-27T19:15:10.040`)
|
||||
- [CVE-2024-34542](CVE-2024/CVE-2024-345xx/CVE-2024-34542.json) (`2024-09-27T18:15:04.453`)
|
||||
- [CVE-2024-37187](CVE-2024/CVE-2024-371xx/CVE-2024-37187.json) (`2024-09-27T18:15:04.690`)
|
||||
- [CVE-2024-38308](CVE-2024/CVE-2024-383xx/CVE-2024-38308.json) (`2024-09-27T18:15:04.933`)
|
||||
- [CVE-2024-39275](CVE-2024/CVE-2024-392xx/CVE-2024-39275.json) (`2024-09-27T18:15:05.173`)
|
||||
- [CVE-2024-39364](CVE-2024/CVE-2024-393xx/CVE-2024-39364.json) (`2024-09-27T18:15:05.417`)
|
||||
- [CVE-2024-46097](CVE-2024/CVE-2024-460xx/CVE-2024-46097.json) (`2024-09-27T18:15:05.687`)
|
||||
- [CVE-2024-46256](CVE-2024/CVE-2024-462xx/CVE-2024-46256.json) (`2024-09-27T18:15:05.787`)
|
||||
- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2024-09-27T18:15:05.870`)
|
||||
- [CVE-2024-9160](CVE-2024/CVE-2024-91xx/CVE-2024-9160.json) (`2024-09-27T19:15:10.733`)
|
||||
- [CVE-2024-9301](CVE-2024/CVE-2024-93xx/CVE-2024-9301.json) (`2024-09-27T18:15:06.163`)
|
||||
- [CVE-2024-46453](CVE-2024/CVE-2024-464xx/CVE-2024-46453.json) (`2024-09-27T21:15:03.350`)
|
||||
- [CVE-2024-47186](CVE-2024/CVE-2024-471xx/CVE-2024-47186.json) (`2024-09-27T21:15:03.443`)
|
||||
- [CVE-2024-6436](CVE-2024/CVE-2024-64xx/CVE-2024-6436.json) (`2024-09-27T20:15:06.043`)
|
||||
- [CVE-2024-9291](CVE-2024/CVE-2024-92xx/CVE-2024-9291.json) (`2024-09-27T21:15:03.667`)
|
||||
- [CVE-2024-9293](CVE-2024/CVE-2024-92xx/CVE-2024-9293.json) (`2024-09-27T21:15:03.937`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `29`
|
||||
|
||||
- [CVE-2024-43391](CVE-2024/CVE-2024-433xx/CVE-2024-43391.json) (`2024-09-27T19:38:10.193`)
|
||||
- [CVE-2024-43392](CVE-2024/CVE-2024-433xx/CVE-2024-43392.json) (`2024-09-27T19:04:26.060`)
|
||||
- [CVE-2024-43393](CVE-2024/CVE-2024-433xx/CVE-2024-43393.json) (`2024-09-27T19:36:03.473`)
|
||||
- [CVE-2024-45682](CVE-2024/CVE-2024-456xx/CVE-2024-45682.json) (`2024-09-27T18:54:51.820`)
|
||||
- [CVE-2024-5170](CVE-2024/CVE-2024-51xx/CVE-2024-5170.json) (`2024-09-27T18:23:43.833`)
|
||||
- [CVE-2024-6723](CVE-2024/CVE-2024-67xx/CVE-2024-6723.json) (`2024-09-27T18:50:00.913`)
|
||||
- [CVE-2024-6785](CVE-2024/CVE-2024-67xx/CVE-2024-6785.json) (`2024-09-27T18:59:25.253`)
|
||||
- [CVE-2024-6850](CVE-2024/CVE-2024-68xx/CVE-2024-6850.json) (`2024-09-27T18:30:30.930`)
|
||||
- [CVE-2024-7129](CVE-2024/CVE-2024-71xx/CVE-2024-7129.json) (`2024-09-27T18:26:27.560`)
|
||||
- [CVE-2024-7698](CVE-2024/CVE-2024-76xx/CVE-2024-7698.json) (`2024-09-27T19:39:43.350`)
|
||||
- [CVE-2024-7699](CVE-2024/CVE-2024-76xx/CVE-2024-7699.json) (`2024-09-27T18:59:31.277`)
|
||||
- [CVE-2024-7711](CVE-2024/CVE-2024-77xx/CVE-2024-7711.json) (`2024-09-27T18:17:05.577`)
|
||||
- [CVE-2024-7817](CVE-2024/CVE-2024-78xx/CVE-2024-7817.json) (`2024-09-27T18:26:21.653`)
|
||||
- [CVE-2024-7818](CVE-2024/CVE-2024-78xx/CVE-2024-7818.json) (`2024-09-27T18:18:55.510`)
|
||||
- [CVE-2024-7820](CVE-2024/CVE-2024-78xx/CVE-2024-7820.json) (`2024-09-27T18:08:48.757`)
|
||||
- [CVE-2024-7822](CVE-2024/CVE-2024-78xx/CVE-2024-7822.json) (`2024-09-27T18:06:41.287`)
|
||||
- [CVE-2024-7859](CVE-2024/CVE-2024-78xx/CVE-2024-7859.json) (`2024-09-27T18:00:53.567`)
|
||||
- [CVE-2024-8043](CVE-2024/CVE-2024-80xx/CVE-2024-8043.json) (`2024-09-27T18:22:43.967`)
|
||||
- [CVE-2024-8051](CVE-2024/CVE-2024-80xx/CVE-2024-8051.json) (`2024-09-27T18:19:41.863`)
|
||||
- [CVE-2024-8091](CVE-2024/CVE-2024-80xx/CVE-2024-8091.json) (`2024-09-27T18:17:59.267`)
|
||||
- [CVE-2024-8092](CVE-2024/CVE-2024-80xx/CVE-2024-8092.json) (`2024-09-27T18:17:24.387`)
|
||||
- [CVE-2024-8093](CVE-2024/CVE-2024-80xx/CVE-2024-8093.json) (`2024-09-27T18:16:01.683`)
|
||||
- [CVE-2024-8258](CVE-2024/CVE-2024-82xx/CVE-2024-8258.json) (`2024-09-27T18:56:41.140`)
|
||||
- [CVE-2024-8490](CVE-2024/CVE-2024-84xx/CVE-2024-8490.json) (`2024-09-27T18:36:00.053`)
|
||||
- [CVE-2024-8761](CVE-2024/CVE-2024-87xx/CVE-2024-8761.json) (`2024-09-27T18:41:43.043`)
|
||||
- [CVE-2023-39214](CVE-2023/CVE-2023-392xx/CVE-2023-39214.json) (`2024-09-27T20:15:04.847`)
|
||||
- [CVE-2023-39215](CVE-2023/CVE-2023-392xx/CVE-2023-39215.json) (`2024-09-27T20:15:04.970`)
|
||||
- [CVE-2023-39216](CVE-2023/CVE-2023-392xx/CVE-2023-39216.json) (`2024-09-27T20:15:05.103`)
|
||||
- [CVE-2023-39217](CVE-2023/CVE-2023-392xx/CVE-2023-39217.json) (`2024-09-27T20:15:05.223`)
|
||||
- [CVE-2023-40273](CVE-2023/CVE-2023-402xx/CVE-2023-40273.json) (`2024-09-27T21:35:03.083`)
|
||||
- [CVE-2023-40357](CVE-2023/CVE-2023-403xx/CVE-2023-40357.json) (`2024-09-27T20:35:08.133`)
|
||||
- [CVE-2023-43585](CVE-2023/CVE-2023-435xx/CVE-2023-43585.json) (`2024-09-27T20:15:05.407`)
|
||||
- [CVE-2023-43591](CVE-2023/CVE-2023-435xx/CVE-2023-43591.json) (`2024-09-27T20:15:05.543`)
|
||||
- [CVE-2024-24698](CVE-2024/CVE-2024-246xx/CVE-2024-24698.json) (`2024-09-27T20:15:05.683`)
|
||||
- [CVE-2024-25411](CVE-2024/CVE-2024-254xx/CVE-2024-25411.json) (`2024-09-27T20:35:09.620`)
|
||||
- [CVE-2024-38809](CVE-2024/CVE-2024-388xx/CVE-2024-38809.json) (`2024-09-27T20:35:10.383`)
|
||||
- [CVE-2024-40508](CVE-2024/CVE-2024-405xx/CVE-2024-40508.json) (`2024-09-27T20:35:11.070`)
|
||||
- [CVE-2024-46097](CVE-2024/CVE-2024-460xx/CVE-2024-46097.json) (`2024-09-27T20:35:12.027`)
|
||||
- [CVE-2024-46366](CVE-2024/CVE-2024-463xx/CVE-2024-46366.json) (`2024-09-27T20:35:12.770`)
|
||||
- [CVE-2024-46367](CVE-2024/CVE-2024-463xx/CVE-2024-46367.json) (`2024-09-27T20:35:13.517`)
|
||||
- [CVE-2024-6493](CVE-2024/CVE-2024-64xx/CVE-2024-6493.json) (`2024-09-27T21:28:49.020`)
|
||||
- [CVE-2024-6617](CVE-2024/CVE-2024-66xx/CVE-2024-6617.json) (`2024-09-27T21:28:35.543`)
|
||||
- [CVE-2024-7133](CVE-2024/CVE-2024-71xx/CVE-2024-7133.json) (`2024-09-27T21:27:50.053`)
|
||||
- [CVE-2024-7860](CVE-2024/CVE-2024-78xx/CVE-2024-7860.json) (`2024-09-27T20:56:24.493`)
|
||||
- [CVE-2024-7861](CVE-2024/CVE-2024-78xx/CVE-2024-7861.json) (`2024-09-27T20:52:11.350`)
|
||||
- [CVE-2024-7863](CVE-2024/CVE-2024-78xx/CVE-2024-7863.json) (`2024-09-27T21:27:07.640`)
|
||||
- [CVE-2024-7864](CVE-2024/CVE-2024-78xx/CVE-2024-7864.json) (`2024-09-27T21:26:50.067`)
|
||||
- [CVE-2024-8047](CVE-2024/CVE-2024-80xx/CVE-2024-8047.json) (`2024-09-27T21:25:08.523`)
|
||||
- [CVE-2024-8054](CVE-2024/CVE-2024-80xx/CVE-2024-8054.json) (`2024-09-27T21:29:57.607`)
|
||||
- [CVE-2024-8056](CVE-2024/CVE-2024-80xx/CVE-2024-8056.json) (`2024-09-27T21:29:42.600`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
175
_state.csv
175
_state.csv
@ -210952,7 +210952,7 @@ CVE-2022-46748,0,0,4c2e21a14ba33566a7be61e31263ee4cc8b7653c68ffd46b295e8fdd2f246
|
||||
CVE-2022-46749,0,0,8eced24a204d2dfd35c8f14f41e67be84c653f97ec21524ff9aaa314a954adbd,2023-11-07T03:55:55.760000
|
||||
CVE-2022-4675,0,0,0a4f7b627bc6434760c0883534a109dc15ee876572a1b6d5017d6966ec63aa0f,2023-11-07T03:58:34.037000
|
||||
CVE-2022-46750,0,0,8b412e791e00e7afcf83308b57dfe5dcbe9dbaa4de1d1f05732d28e3ad84ae29,2023-11-07T03:55:56.127000
|
||||
CVE-2022-46751,0,0,96465bb37f13318995d6fb0af9ccaabfb81654da3d480f3e9a2e0352d5f49218,2023-09-06T15:15:15.913000
|
||||
CVE-2022-46751,0,1,22d33a4a3ce20a007b15161b561a705161ea3560e579cc68e869e0ce766c2268,2024-09-27T21:35:01.657000
|
||||
CVE-2022-46752,0,0,0348ad9f59a3d8669abb8de5f5566687ccb3ebe89505a2ac5158e0a2b55f8247,2023-11-07T03:55:56.533000
|
||||
CVE-2022-46753,0,0,073de35915d8b1b4ec67415794f25133a55745e1a42b8bfaca43b6128f8f9d7e,2023-11-07T03:55:56.790000
|
||||
CVE-2022-46754,0,0,47baa30b391b95c99e42a5c33dcc6a389766b7f35895b262b549d6e18f0470e7,2023-11-07T03:55:57.300000
|
||||
@ -220714,7 +220714,7 @@ CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83
|
||||
CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000
|
||||
CVE-2023-27602,0,0,a80eb5b45c9f4866e932d81fc2716a823c094986ad855f7d67ed615e5137a95d,2023-04-19T12:15:08.170000
|
||||
CVE-2023-27603,0,0,377363bd944721b07ea3da5dcb27d355b62defd8ba2523bcd4d0bea48c169f2a,2023-04-14T19:45:47.010000
|
||||
CVE-2023-27604,0,1,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000
|
||||
CVE-2023-27604,0,0,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000
|
||||
CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000
|
||||
CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000
|
||||
CVE-2023-27607,0,0,e059482f5e66445b3b6dfa901c43f1665d8e6eb57a74d73e31d4f554c8f501e3,2024-04-11T12:47:44.137000
|
||||
@ -223585,7 +223585,7 @@ CVE-2023-31184,0,0,bf7fd49253cf418bc6c217e04862a6a172a183347a2b7b0f3ae63131d8bcd
|
||||
CVE-2023-31185,0,0,15bcbaf0a4b18c3b8f965430971fb710b6d279a3a966243be5c05c092c0128db,2023-06-06T16:24:33.907000
|
||||
CVE-2023-31186,0,0,bfc1be04dfc45537d743ea4fbfc37fec3c45fc3d75262d0675ff60480f45c2be,2023-06-02T18:46:36.920000
|
||||
CVE-2023-31187,0,0,9120964a617800df40a561d28aef4421ea58f12b7831765de520291a758484b1,2023-06-02T18:46:06.023000
|
||||
CVE-2023-31188,0,0,935fbfcb38ea4105c85585dc72c1beff5ef631edf0ffeb00c1b10995c37e587c,2023-09-11T13:33:19.063000
|
||||
CVE-2023-31188,0,1,ab08094190ebd5e06eae2728b47847bbf9237182044faa7cd3983124759b56a3,2024-09-27T21:35:01.930000
|
||||
CVE-2023-31189,0,0,1dea22b62ceaee823e009b380c145b1c71852130112dc3e45787ad81bcc99fd7,2024-02-14T15:01:51.137000
|
||||
CVE-2023-3119,0,0,4d4d466efa1cc13b8b7f79afe2286017dd41d562bed4f2f063b6d1fcb19e87e7,2024-05-17T02:27:17.113000
|
||||
CVE-2023-31190,0,0,0f90a65456251ed0a3a75458f8129eacc58e91918274a53c4b9a042b2a4bc8ba,2023-07-20T02:04:56.910000
|
||||
@ -226270,7 +226270,7 @@ CVE-2023-34626,0,0,dc51177eea4c955212be8d3498fe2058ca8a8a271833f24b2b3aef59847aa
|
||||
CVE-2023-3463,0,0,6d57f2f4d3e4c521e21e8c3d461319aaee3827d3447ab1d36c16e62be8bf2074,2023-07-28T13:47:16.150000
|
||||
CVE-2023-34634,0,0,829bb2e8ee0195e8d7efabb5a58e991c8d419f23c2454371473ef41a5977c329,2023-08-17T19:15:12.443000
|
||||
CVE-2023-34635,0,0,d044079a80c669b935d63f0b410d32ae6ce9ecfb53739138072f49285022a188,2023-08-04T18:52:54.603000
|
||||
CVE-2023-34637,0,0,c0f43c1aa3f32fc76cae8ddc1847ea5c4d3d8a9408e98421baf0b92d0a82ed8b,2023-09-11T16:54:19.023000
|
||||
CVE-2023-34637,0,1,b2de970242ba118dfb1ca3171fe3e58895d82f60c4f91e5afefddba7bbe56be9,2024-09-27T20:35:06.733000
|
||||
CVE-2023-3464,0,0,b18bc52934d86656df7813d5dc75486f736c9bc906a5c18236e0a6f6e4481151,2024-05-17T02:27:30.660000
|
||||
CVE-2023-34641,0,0,d9b46481d84c107bbe26dac016a94f590b03854fbe28a514e8d95a902c395d62,2023-06-30T01:15:08.693000
|
||||
CVE-2023-34642,0,0,c3d99543f35a986165524c26beaafd81482a4293de5b476ba1dc5f611d418f78,2023-06-30T14:15:09.480000
|
||||
@ -227452,7 +227452,7 @@ CVE-2023-36530,0,0,39b6e7f1f65c17d756a12a67ff7ab49bb930555b16f3c7f0c3a9a9b08631f
|
||||
CVE-2023-36532,0,0,346de183093708445d572201d1b91beba125a9edfa821a742e9c84556edc5810,2023-08-11T13:51:15.367000
|
||||
CVE-2023-36533,0,0,7a3aa9a0281f92da6ec858b130bc8c49aff9e43e106a9e5252f45615815adb18,2024-09-19T20:15:05.733000
|
||||
CVE-2023-36534,0,0,6cbc71eb840a2042045eac9a1bed117b4c7c1b6f49d16fba7e1aef9691ba09df,2023-08-11T13:55:20.393000
|
||||
CVE-2023-36535,0,1,cd09745af0e826e75dff130b90aa767c8b56c74aa677bae7dfe79bb50dc3089b,2024-09-27T19:15:08.747000
|
||||
CVE-2023-36535,0,0,cd09745af0e826e75dff130b90aa767c8b56c74aa677bae7dfe79bb50dc3089b,2024-09-27T19:15:08.747000
|
||||
CVE-2023-36536,0,0,0ee1547dcb523dc14ed9ebc847b60fd04a4995159e536e4c1d07969953d80c80,2023-07-19T00:27:45.237000
|
||||
CVE-2023-36537,0,0,394843175e0ad188622ad56ec5745a099e29bc47411e8a302f9292eb043883c1,2024-09-19T20:15:05.913000
|
||||
CVE-2023-36538,0,0,b1971037704c1983129273d695aaa947b2c9ac7e5959308db7e26dd28cd25646,2024-09-20T14:15:11.530000
|
||||
@ -229606,20 +229606,20 @@ CVE-2023-39199,0,0,3e8a082b2dd162b2ac05fe4edce56092a0758dead6f488c6360a451ae93da
|
||||
CVE-2023-3920,0,0,1f9f72a3bd9c37be24e0dea36a1658cf630b3ff4aab5704130fc3282b0cd5e1f,2023-10-03T15:30:56.607000
|
||||
CVE-2023-39201,0,0,995881803a821ad39954737de99fb7ca3c826593aae69f660739b193ed06fb75,2023-09-16T03:30:00.390000
|
||||
CVE-2023-39202,0,0,d4a579f8db9ad04cff2e4ef93d9f1e8720c97b926a12d5500bdafe35323a16f2,2023-11-21T00:56:45.663000
|
||||
CVE-2023-39203,0,1,a06dab058cba203b24011e3aa872b96a152a5e6567e21a5b4486d6dcd28a9e51,2024-09-27T19:15:08.977000
|
||||
CVE-2023-39203,0,0,a06dab058cba203b24011e3aa872b96a152a5e6567e21a5b4486d6dcd28a9e51,2024-09-27T19:15:08.977000
|
||||
CVE-2023-39204,0,0,c8d09ec7350a3f76af462b805e5a6565ed8832c18c7e06d46c30284639ad5db3,2023-11-21T00:47:04.810000
|
||||
CVE-2023-39205,0,0,fc8a247514204b686ea06b6e69f09b4837631de9ab06c362c325fc076faa9298,2023-11-21T00:46:21.403000
|
||||
CVE-2023-39206,0,0,cdf8d53f81a764d6980bc2226a8f1e25b0050b8318c9020e0d15d156f379d2ac,2023-11-21T00:46:02.800000
|
||||
CVE-2023-39208,0,1,5b1e8be08469cf8d154214f7b569e47ded95901e036a16258bfdbcfc0bd23d01,2024-09-27T19:15:09.143000
|
||||
CVE-2023-39209,0,1,864d3cb1d84e301b176edde462a70357090fb8fd191e46d02fa5b6d87863dc40,2024-09-27T19:15:09.267000
|
||||
CVE-2023-39208,0,0,5b1e8be08469cf8d154214f7b569e47ded95901e036a16258bfdbcfc0bd23d01,2024-09-27T19:15:09.143000
|
||||
CVE-2023-39209,0,0,864d3cb1d84e301b176edde462a70357090fb8fd191e46d02fa5b6d87863dc40,2024-09-27T19:15:09.267000
|
||||
CVE-2023-39210,0,0,c6ab589e9d628bc1a2fe813bf005cf32e4719139f61279ea1902fa8f6ab1d647,2023-08-15T13:51:04.393000
|
||||
CVE-2023-39211,0,1,24b18e10c6ff2beac445a15948d6c81adfa8546a2d6217a39abaefb59ed450b7,2024-09-27T19:15:09.387000
|
||||
CVE-2023-39211,0,0,24b18e10c6ff2beac445a15948d6c81adfa8546a2d6217a39abaefb59ed450b7,2024-09-27T19:15:09.387000
|
||||
CVE-2023-39212,0,0,d6550b94a6602f89228a733e0a67b15cc207049f2c634a000f3ede01c5ff1907,2023-08-15T15:24:10.840000
|
||||
CVE-2023-39213,0,0,540b0d5a1d6a82e33f18cb8e49a5af4ac8938b983c4e6b3a9d5f085f5c23a939,2023-08-15T15:30:15.040000
|
||||
CVE-2023-39214,0,0,a7ededc2e23b13e6373dda97aa0084d008ece1af9a7db43614f3e747766a0ef3,2023-12-14T16:48:23.877000
|
||||
CVE-2023-39215,0,0,bc4537fef4eca4da847b0e894f1c8b809a406d59b0e1a5677499b41e34be5265,2023-09-15T19:11:10.497000
|
||||
CVE-2023-39216,0,0,e827986d3d53deef9859667c05622b1e36160967a5686f9ff67935863f60ae20,2023-08-11T16:20:34.047000
|
||||
CVE-2023-39217,0,0,695e1ad1be50e10c101099a04426472bd5c3cb97aeabcda22813e0109872b898,2023-08-11T16:24:49.660000
|
||||
CVE-2023-39213,0,1,96d6941252b3a0856695eccdad22644bb8d05bcaf8204e70602cd225c9b6764c,2024-09-27T20:15:04.733000
|
||||
CVE-2023-39214,0,1,13118ab4856688337fdaf7ae2e298bb4fdb9c1b147d64d538ffccc31f8c44158,2024-09-27T20:15:04.847000
|
||||
CVE-2023-39215,0,1,edc0745713a3f4d56515c5562b6321248dd18e6c30fbfa3348eb76e0cfb7216d,2024-09-27T20:15:04.970000
|
||||
CVE-2023-39216,0,1,b398cd221b460ee1bf609d4964918d9fec6c07e4d3da07d2842556bf09e0c9ce,2024-09-27T20:15:05.103000
|
||||
CVE-2023-39217,0,1,18a8e8aeb31bfc166b0e1c7f235acc8262ab9c1383c9c78cb2066d42a3851e21,2024-09-27T20:15:05.223000
|
||||
CVE-2023-39218,0,0,63f3e5343538510230ae31b13b2ef6a6f656ed6b46b767782d1b5a5856ee2cee,2023-08-11T17:03:39.237000
|
||||
CVE-2023-39219,0,0,9abfaea4b4a306247b8bd9d803ced9e012fd03b255d184c952ba3829b31a5f8f,2024-02-01T13:57:07.213000
|
||||
CVE-2023-3922,0,0,433c16059a7500521ca4939da249b1052bd05c8ace82b48a01432349fb9e26bf,2023-10-03T19:46:15.090000
|
||||
@ -230441,7 +230441,7 @@ CVE-2023-4027,0,0,48dd689c0965b18792f4cfccdc2c7158758924f1ef3e29f58ca27c4d96ee89
|
||||
CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000
|
||||
CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000
|
||||
CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000
|
||||
CVE-2023-40273,0,0,d1efd309979d86acc3f5a21eda89b107ca70fabd17da2ac82c7c1040e68168d3,2023-08-29T16:14:08.630000
|
||||
CVE-2023-40273,0,1,1aeff0c64e332d86a913527db0cb88631ccab3f1706bf0fb35ec4fc41927c1a7,2024-09-27T21:35:03.083000
|
||||
CVE-2023-40274,0,0,f20f5b1641662d852a3d92ec12b3069f4904a342ddf85c169c1d25358b0bc60a,2023-08-22T17:47:49.207000
|
||||
CVE-2023-40275,0,0,bb235e4d61f5beda262b4c42a88b68d3e4b0c5cc4d47ebabd44e56511d114a27,2024-08-01T13:44:29.067000
|
||||
CVE-2023-40276,0,0,75a4522257e3f9b2d6a29ea60151721a382394a8c50845341716865c940c6904,2024-08-29T20:35:19.433000
|
||||
@ -230515,7 +230515,7 @@ CVE-2023-40353,0,0,f3e665e0a72d639bd49b7a9689cc8f6d7396ab71b80058a79a68ea90fd78c
|
||||
CVE-2023-40354,0,0,bcfe69e008c2d56754863f558681c7486978a8d0d8ff8cc91aafa125c9dadd0d,2023-08-22T15:55:45.223000
|
||||
CVE-2023-40355,0,0,38724529170120486f5b149ea5c981ceb87856b95d52c945a731efcbe40b373f,2024-02-14T18:49:39.177000
|
||||
CVE-2023-40356,0,0,c5e14bb829e8aebf4146da797104b4b185c1ff2fa3e426de1e530b5575f33bb8,2024-07-09T18:18:38.713000
|
||||
CVE-2023-40357,0,0,79bae1e27122a5867b9805303ffcb539f0b366066b3143c06260287d73f79c71,2023-09-11T13:42:13.197000
|
||||
CVE-2023-40357,0,1,9acf5b531ac59d0dc20aae5dc6d1c706e658dbbe9565e63dadd22636d0fad699,2024-09-27T20:35:08.133000
|
||||
CVE-2023-40359,0,0,d06ab7434461067c4f1c88e3861e4d545e70ee0a582001ff2eb58c5709472e08,2023-09-07T06:15:07.990000
|
||||
CVE-2023-4036,0,0,b91162d9e771dd89607b3f993f9d1180ebc04c4f7b49ea076b74d15d3b6c5528,2023-11-07T04:22:04.067000
|
||||
CVE-2023-40360,0,0,7f5df9e5030b3d85b7622463f61fe481a94cdd5c2b01e1d5b5450fc57c6c0e76,2023-12-11T18:34:42.457000
|
||||
@ -232858,12 +232858,12 @@ CVE-2023-43580,0,0,627871f80cc02cb5ba29aa3c7dcbeda971b999b6354f75421a953b9b00b06
|
||||
CVE-2023-43581,0,0,0a604635387ceec17951a64f04890be91fdeea00efaf3b027e3873ca11e361a1,2023-11-16T01:42:25.067000
|
||||
CVE-2023-43582,0,0,8eff66c831d13989dce4a5aa2d01c2f025b247a8155916a1ba3f32d98f9d55f9,2024-09-19T14:15:16.343000
|
||||
CVE-2023-43583,0,0,bef83c817f9ae62400588efdf069f3dcdf21b56698a108302d617636adb6a50a,2024-09-19T14:15:16.473000
|
||||
CVE-2023-43585,0,0,3963f80a517ae03ff03b6112682400f95fe13e42cc714d57c4a95a4f651363b9,2023-12-19T02:32:59.880000
|
||||
CVE-2023-43585,0,1,42891b39cd797185a9f1ffe9f647da7aeff2445de09d6686d54e0f5f78e9a18f,2024-09-27T20:15:05.407000
|
||||
CVE-2023-43586,0,0,1f7ea621f4780c850857b066e0aebeeb1fa03445a414a126c0f7a88ffa2cdef8,2023-12-18T19:20:25.700000
|
||||
CVE-2023-43588,0,0,115b6a0624bbeb68df9cbce87f466a9f2cc27b3bf211d3519be89b7456b2129e,2024-09-20T15:15:12.650000
|
||||
CVE-2023-4359,0,0,36b4cc4177461cc02d1acf6c9accb223cc54ff971af05fb697fbedec37f8d496,2024-01-31T17:15:15.147000
|
||||
CVE-2023-43590,0,0,75afe884f9ad684824e2fd0561a5e8b7278d71725fd5336f3600d666de0291db,2023-11-21T13:58:05.920000
|
||||
CVE-2023-43591,0,0,6cc97a05628e61acd7d07ace7b7c07de944672b455383c9ff824b73fab624c08,2024-08-29T20:35:23.297000
|
||||
CVE-2023-43591,0,1,799102ec0fd5f433131c9c4e36e0b20d427e9f739fd400fbc872c6cf8e59ad42,2024-09-27T20:15:05.543000
|
||||
CVE-2023-4360,0,0,8c6f4fdbe3dd47f783c5a0774b8d480e951b02213bba5e33d72042c17a5efc75,2024-01-31T17:15:15.233000
|
||||
CVE-2023-43608,0,0,4e109a5c969bf158627fa4659bd8c1c96fe15b5846f7aff8c9ac759edf09e59f,2023-12-11T15:25:39.170000
|
||||
CVE-2023-43609,0,0,46ee18a48e11a39a2e4de0d6e69db55423afae7105671e190621a437b21fb673,2024-02-15T14:45:17.063000
|
||||
@ -233643,7 +233643,7 @@ CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982f
|
||||
CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000
|
||||
CVE-2023-44808,0,0,c21fe1fd44aeea6fd1f5d97f8e40c85ef4c9aad99cada000af1d2e25b8ea1a26,2023-10-19T11:11:35.753000
|
||||
CVE-2023-44809,0,0,106ef081b5af79dc53d4bc479d0aa2e275e4760b3cc08b2cab3264d7a797d158,2024-09-17T02:35:28.503000
|
||||
CVE-2023-4481,0,1,fd9cff3497a9fececf4bdfc2570c042517e46a8526db5fbaafef06ca9455d872,2024-09-27T18:15:03.837000
|
||||
CVE-2023-4481,0,0,fd9cff3497a9fececf4bdfc2570c042517e46a8526db5fbaafef06ca9455d872,2024-09-27T18:15:03.837000
|
||||
CVE-2023-44811,0,0,0fdedc6bc111ea9a02c62f8daaeff83c589b5ca14424d7f2de79dccf9ac38af2,2023-10-11T20:06:27.410000
|
||||
CVE-2023-44812,0,0,54d24d8a8649398546bc69de6f53c9b08c93a76ddc19c43fa225b2d394f3bb24,2023-10-11T20:00:04.033000
|
||||
CVE-2023-44813,0,0,e4aa38d88de0406751f5d82932d7709b2c42f855dfd3b491016e37100dc99415,2023-10-11T19:58:17.857000
|
||||
@ -237780,7 +237780,7 @@ CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edb
|
||||
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
|
||||
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
|
||||
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
|
||||
CVE-2023-50782,0,1,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
|
||||
CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
|
||||
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
|
||||
CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000
|
||||
CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000
|
||||
@ -246198,7 +246198,7 @@ CVE-2024-24694,0,0,53c1cb705c824edd778104ee7d12ae923f740ce699c776d76636bfef61ed1
|
||||
CVE-2024-24695,0,0,b7e05a6a84aba9149947b93f9b71e9eeb5652ac56c791966c9585e6bf1a2b28e,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24696,0,0,493abf9e7c1236756720555c7f43f1301a6f5875560eeaaa62abf347ceddcc72,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24697,0,0,fc8cb016f36fd910eeaf64b66dc231cb060ec899e3e50c99d656beb01db44200,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24698,0,0,0e286a7a5a83ea89cff35f9869a2b0fc402da5c5818990f977c776b111b97e86,2024-02-14T13:59:35.580000
|
||||
CVE-2024-24698,0,1,626c69bc0b2523cde310c368375ebb83033317866de58b9f699f8c2520b849b6,2024-09-27T20:15:05.683000
|
||||
CVE-2024-24699,0,0,12f8a16e50a0b56367152cd6544ebddc14566fc60e183e9e17bfada0aea759e6,2024-02-14T13:59:35.580000
|
||||
CVE-2024-2470,0,0,18e1880afe1444954891abe795fc3a0d849c951a72a80f6d9a727adff6033cb3,2024-08-01T13:49:46.933000
|
||||
CVE-2024-24700,0,0,6c812a85c120df76a0c27beeca26ed6599a5d3758b067997d6a02be8b6ae6a34,2024-03-27T12:29:30.307000
|
||||
@ -246728,8 +246728,8 @@ CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234
|
||||
CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000
|
||||
CVE-2024-2541,0,0,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000
|
||||
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
|
||||
CVE-2024-25411,1,1,7de5576fd307c585f61060f5768eb881de1d39b9f982cce92760f7dc361da668,2024-09-27T18:15:04
|
||||
CVE-2024-25412,1,1,874abf180c098ce0160e736f3fd25db3ae69414d9e1283db4e9277a2dad487d5,2024-09-27T18:15:04.100000
|
||||
CVE-2024-25411,0,1,fb79fd0dc75adec0fdf905cbdc51a15c574fac13456bf915fe30bbf9a6ce6707,2024-09-27T20:35:09.620000
|
||||
CVE-2024-25412,0,0,874abf180c098ce0160e736f3fd25db3ae69414d9e1283db4e9277a2dad487d5,2024-09-27T18:15:04.100000
|
||||
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
|
||||
CVE-2024-25414,0,0,adf1d11bdd5b149561578133c2144fc86b074e6ead373a55ead3bdaa0f1ac127,2024-08-29T20:36:20.677000
|
||||
CVE-2024-25415,0,0,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000
|
||||
@ -249383,7 +249383,7 @@ CVE-2024-28943,0,0,0d7428b497ed4dc685ee859cada5a22616e64d89dbcd3a147111832c09c51
|
||||
CVE-2024-28944,0,0,f3888aca11035410ad0fed8d85bb5091b862626240ff24765e70f6000a58dc46,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28945,0,0,04d2a9af526ca30e4ffc0ffa8edb0df1250eaa963fca5ac37255b03b4c8723e7,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28947,0,0,9d3506b7ac0d8414d56f005d3db3860beb6359f3ca23ee696b9b26b32dc4d488,2024-09-12T18:52:38.433000
|
||||
CVE-2024-28948,1,1,3c3e854e1a117f04755f1fc2737376d472ac7ee2a45da7e9cc509c72ae582dda,2024-09-27T18:15:04.197000
|
||||
CVE-2024-28948,0,0,3c3e854e1a117f04755f1fc2737376d472ac7ee2a45da7e9cc509c72ae582dda,2024-09-27T18:15:04.197000
|
||||
CVE-2024-28949,0,0,d5e48bc4aa20c39f513a0582c3f637deca3b5b6936a689a13ce9af3ad1e7d8d0,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2895,0,0,b446221d46d418d396cd9d883702efdf5b2797ce3a0ab257ce4f7a9b35ffa891,2024-06-05T20:15:13.023000
|
||||
CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000
|
||||
@ -252535,8 +252535,8 @@ CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e
|
||||
CVE-2024-33345,0,0,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000
|
||||
CVE-2024-33350,0,0,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000
|
||||
CVE-2024-33365,0,0,753a357764251688c2c58169a412ba47dbb205dad7d51ffa0d9b46ec5f577645,2024-08-01T13:51:53.400000
|
||||
CVE-2024-33368,1,1,ced3fbed5b37a6fa351703c9cf22fcdd82c5bc9ab2bbebf55feac1ee46b043de,2024-09-27T19:35:38.347000
|
||||
CVE-2024-33369,1,1,e125b4b53bf8f30eab800b99fb1930c4542a7a8a1d8d9782e28c6e80dc67c7e0,2024-09-27T19:35:39.847000
|
||||
CVE-2024-33368,0,0,ced3fbed5b37a6fa351703c9cf22fcdd82c5bc9ab2bbebf55feac1ee46b043de,2024-09-27T19:35:38.347000
|
||||
CVE-2024-33369,0,0,e125b4b53bf8f30eab800b99fb1930c4542a7a8a1d8d9782e28c6e80dc67c7e0,2024-09-27T19:35:39.847000
|
||||
CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48f8,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000
|
||||
CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000
|
||||
@ -253386,7 +253386,7 @@ CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87
|
||||
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
|
||||
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
|
||||
CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000
|
||||
CVE-2024-34542,1,1,448bec67e5a9de69972bffb223f111a5ccd69a8038bd7509dd3b254bb012cc6b,2024-09-27T18:15:04.453000
|
||||
CVE-2024-34542,0,0,448bec67e5a9de69972bffb223f111a5ccd69a8038bd7509dd3b254bb012cc6b,2024-09-27T18:15:04.453000
|
||||
CVE-2024-34543,0,0,d1d082cf58fb09716352a1b771df34e1a1085cf8f4fe64f8d879c516dd412fbe,2024-09-23T14:17:42.957000
|
||||
CVE-2024-34545,0,0,30a1d58a5a9c49dffb8cec6e8682b29a77cba507757112fa783e98111c20a31c,2024-09-23T14:13:07.883000
|
||||
CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000
|
||||
@ -255243,7 +255243,7 @@ CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862
|
||||
CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000
|
||||
CVE-2024-37183,0,0,40759211984c4bbc303ff8d56740c06e4761a951d68b4235158aaff8607d5316,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37185,0,0,7506242f1ce72376b2b30a412cd4235ec1046d86e8f141e3c3ab3099b75bd0d2,2024-09-09T12:21:53.383000
|
||||
CVE-2024-37187,1,1,0c334888e3fcf27416a1e2144d76380d91baba943b26ddcbdbab63bc187e8f6f,2024-09-27T18:15:04.690000
|
||||
CVE-2024-37187,0,0,0c334888e3fcf27416a1e2144d76380d91baba943b26ddcbdbab63bc187e8f6f,2024-09-27T18:15:04.690000
|
||||
CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca670145,2024-06-04T19:20:23.553000
|
||||
CVE-2024-37198,0,0,bf34a330875867b427d853b7c401fbf1da6acf891d942b32d41eff0d38e81318,2024-06-24T18:55:25.417000
|
||||
CVE-2024-37199,0,0,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000
|
||||
@ -256038,7 +256038,7 @@ CVE-2024-38303,0,0,028afe1755065337ff24d15854e1a09f4321a858b56f8ecffef2fc2440540
|
||||
CVE-2024-38304,0,0,c9c5e31995efec3c1031188bcbced9384b5bd23fcd1002d4307a7715d8d36271,2024-08-29T13:25:27.537000
|
||||
CVE-2024-38305,0,0,ee5caad84873fbd92352a0446fe4dbaa8294a3e8c08e38b564114b506da289eb,2024-08-21T12:30:33.697000
|
||||
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
|
||||
CVE-2024-38308,1,1,ede660bbdd3acded62256ac010e414c1e3400250af21c3fc60205062b6b984eb,2024-09-27T18:15:04.933000
|
||||
CVE-2024-38308,0,0,ede660bbdd3acded62256ac010e414c1e3400250af21c3fc60205062b6b984eb,2024-09-27T18:15:04.933000
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000
|
||||
CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
|
||||
@ -256432,7 +256432,7 @@ CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd3443
|
||||
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
|
||||
CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000
|
||||
CVE-2024-38809,0,0,fe0cdff1ac730d03b0835f4c4f18622f42435076867de5e5d8e37db3df24a93d,2024-09-27T17:15:12.393000
|
||||
CVE-2024-38809,0,1,2d6123022f4801f9e015259807c633edfa4d06b025c196110fe84161d9cf6ae8,2024-09-27T20:35:10.383000
|
||||
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
|
||||
CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000
|
||||
CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000
|
||||
@ -256627,7 +256627,7 @@ CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb
|
||||
CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000
|
||||
CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000
|
||||
CVE-2024-39275,1,1,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000
|
||||
CVE-2024-39275,0,0,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000
|
||||
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000
|
||||
CVE-2024-39278,0,0,58069499df62456724a7513c2a4610cfda6b008bc65dc970841f8e87808cbcaf,2024-09-06T12:08:04.550000
|
||||
@ -256693,7 +256693,7 @@ CVE-2024-39353,0,0,2167a4e696755ebb97fec80f167f71100aa107b125d2865a5fb1a76c1e17f
|
||||
CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882ba5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000
|
||||
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
||||
CVE-2024-39364,1,1,cddbdbf9385162913cdd829bcfd022489ed3440be471312e0e9ca4e079cfd82d,2024-09-27T18:15:05.417000
|
||||
CVE-2024-39364,0,0,cddbdbf9385162913cdd829bcfd022489ed3440be471312e0e9ca4e079cfd82d,2024-09-27T18:15:05.417000
|
||||
CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000
|
||||
CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000
|
||||
CVE-2024-39373,0,0,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000
|
||||
@ -257282,9 +257282,9 @@ CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d
|
||||
CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000
|
||||
CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000
|
||||
CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000
|
||||
CVE-2024-40506,0,1,56d318dec543a258e8379a1056b94aea1892fa3bff6a76d94a32df617adb6a0a,2024-09-27T19:35:41.900000
|
||||
CVE-2024-40507,0,1,bac0094e397379a7a3429530e79371989beb903cb3ba3dcf6941846c376629fa,2024-09-27T19:35:42.957000
|
||||
CVE-2024-40508,0,0,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000
|
||||
CVE-2024-40506,0,0,56d318dec543a258e8379a1056b94aea1892fa3bff6a76d94a32df617adb6a0a,2024-09-27T19:35:41.900000
|
||||
CVE-2024-40507,0,0,bac0094e397379a7a3429530e79371989beb903cb3ba3dcf6941846c376629fa,2024-09-27T19:35:42.957000
|
||||
CVE-2024-40508,0,1,163caea35cee6de2b2bade7074186a4c5c69d6089b94566378ffeefdb0584ca2,2024-09-27T20:35:11.070000
|
||||
CVE-2024-40509,0,0,d1633f4b5cac1c7260d34a3e180cc3caa4c2c54ee32e532915a9d5bbdd1fd3f4,2024-09-27T17:35:02.243000
|
||||
CVE-2024-40510,0,0,1cd8bae3c191b5c9c2bfb7f84e21a91a9f6f5b24548f0743b8a50e4f9c574a44,2024-09-27T15:15:14.820000
|
||||
CVE-2024-40511,0,0,f8d973732f909d09045739fe483e49a99cd19af67b105075b44a6edfd4a75026,2024-09-27T17:35:05.557000
|
||||
@ -258621,7 +258621,7 @@ CVE-2024-42484,0,0,a1d071a36aea45bef6715a21ed0f1766066470b11470c144bede3c9c755cd
|
||||
CVE-2024-42485,0,0,9c52a237d351fcf0752a53847291432cd122014665f3d16b6c4975bcf35af6a7,2024-09-18T18:31:40.427000
|
||||
CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b3d2,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42488,0,1,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000
|
||||
CVE-2024-42488,0,0,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000
|
||||
CVE-2024-42489,0,0,181648e804e837cda5bb13bcded826140342ba5660b47fc9ce10fe5b939de398,2024-09-16T19:46:18.913000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000
|
||||
@ -259110,7 +259110,7 @@ CVE-2024-43358,0,0,f13bf774ce7b4c63763f4e38f0e32b38260bf7ed8ec364046e3e65c356bf2
|
||||
CVE-2024-43359,0,0,52133eb618029c9c6eb094064b83ba6c6a1a2658246d3d1db85edc0e06ef43d1,2024-09-04T21:43:09.613000
|
||||
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43360,0,0,7806cb26815467de093fc97bcea332d20fcda51f3ce248e59da2d3fe25d63fb1,2024-09-04T21:42:20.023000
|
||||
CVE-2024-43366,0,1,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000
|
||||
CVE-2024-43366,0,0,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000
|
||||
CVE-2024-43367,0,0,0f8409cf79e678cffdb4974928d567f1e40ad1650bdffb611ca3860d13e991c5,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83219,2024-08-15T13:01:10.150000
|
||||
CVE-2024-43369,0,0,3f715b9274c2b9674573124fd01c9f3a8a848640345dd0ef56c5a08f4595beba,2024-08-19T13:00:23.117000
|
||||
@ -259126,16 +259126,16 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202
|
||||
CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000
|
||||
CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000
|
||||
CVE-2024-43381,0,0,cadf370b69704b630cecfb0fbe8ba07b198197e9a1164f2a1cf1bce7367f0908,2024-09-11T13:02:26.053000
|
||||
CVE-2024-43385,0,1,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000
|
||||
CVE-2024-43386,0,1,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000
|
||||
CVE-2024-43387,0,1,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000
|
||||
CVE-2024-43388,0,1,3a919f125f0d033e58d76594811e5e9eda62fdacecf5b54a65461d36b7a50c81,2024-09-27T19:32:48.683000
|
||||
CVE-2024-43389,0,1,3f9f9cdc5886b7ecf33bb8f06aa9b373429577236913585bc5184f4c4e9d7283,2024-09-27T19:36:56.583000
|
||||
CVE-2024-43385,0,0,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000
|
||||
CVE-2024-43386,0,0,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000
|
||||
CVE-2024-43387,0,0,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000
|
||||
CVE-2024-43388,0,0,3a919f125f0d033e58d76594811e5e9eda62fdacecf5b54a65461d36b7a50c81,2024-09-27T19:32:48.683000
|
||||
CVE-2024-43389,0,0,3f9f9cdc5886b7ecf33bb8f06aa9b373429577236913585bc5184f4c4e9d7283,2024-09-27T19:36:56.583000
|
||||
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43390,0,1,23109d4525f6a9ca75d5d95186487af542b1184dea674403bc4a04a2882d389c,2024-09-27T19:37:28.887000
|
||||
CVE-2024-43391,0,1,e1b273922d974fb29084f2b4521133382c186185b99241fb223dbcc2186fc12f,2024-09-27T19:38:10.193000
|
||||
CVE-2024-43392,0,1,7a4ce8d1a077129e5a7ed7aa98f6ebb17ef4e5a287579f03daecd5e4e224d1cc,2024-09-27T19:04:26.060000
|
||||
CVE-2024-43393,0,1,9baf436015d55676fde0405cfe036d7154d0537886ad51cff547297f2e54588a,2024-09-27T19:36:03.473000
|
||||
CVE-2024-43390,0,0,23109d4525f6a9ca75d5d95186487af542b1184dea674403bc4a04a2882d389c,2024-09-27T19:37:28.887000
|
||||
CVE-2024-43391,0,0,e1b273922d974fb29084f2b4521133382c186185b99241fb223dbcc2186fc12f,2024-09-27T19:38:10.193000
|
||||
CVE-2024-43392,0,0,7a4ce8d1a077129e5a7ed7aa98f6ebb17ef4e5a287579f03daecd5e4e224d1cc,2024-09-27T19:04:26.060000
|
||||
CVE-2024-43393,0,0,9baf436015d55676fde0405cfe036d7154d0537886ad51cff547297f2e54588a,2024-09-27T19:36:03.473000
|
||||
CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43396,0,0,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000
|
||||
CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000
|
||||
@ -260145,7 +260145,7 @@ CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc1
|
||||
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
|
||||
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
|
||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45682,0,1,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||
@ -260269,7 +260269,7 @@ CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca963
|
||||
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-46097,1,1,a2aa4eb3f3510d099c585de53942ae579fa3e3e4e4659ef29bcc8e9d212699b3,2024-09-27T18:15:05.687000
|
||||
CVE-2024-46097,0,1,627e0402b1b50ebb8f11b3a815189def5c5f266d46c51926b2c740ac6fe4e699,2024-09-27T20:35:12.027000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
CVE-2024-46101,0,0,a18b9da5d1e727101239ea9a87c2c4486b3562ecdcf33f11510119792a28bbeb,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46103,0,0,b2f06763cf5ad1bb9c9824f579431b62a9daa95bd664b0f57e87a402f9838181,2024-09-26T13:32:55.343000
|
||||
@ -260287,8 +260287,8 @@ CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d
|
||||
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
|
||||
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46256,1,1,dba316197e905e3b34748116deb503c053e35ccafe66da2ac53cf681697b8db5,2024-09-27T18:15:05.787000
|
||||
CVE-2024-46257,1,1,d2db966c8ceff75ace32702d7ee24ee8dfca463e199814f65b0905374cef38a2,2024-09-27T18:15:05.870000
|
||||
CVE-2024-46256,0,0,dba316197e905e3b34748116deb503c053e35ccafe66da2ac53cf681697b8db5,2024-09-27T18:15:05.787000
|
||||
CVE-2024-46257,0,0,d2db966c8ceff75ace32702d7ee24ee8dfca463e199814f65b0905374cef38a2,2024-09-27T18:15:05.870000
|
||||
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
|
||||
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
|
||||
CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000
|
||||
@ -260305,8 +260305,8 @@ CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd
|
||||
CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000
|
||||
CVE-2024-46362,0,0,8cdb883bb64f25e58b7c696699971ee36778fa528121237250c7da4497ad58d6,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46366,0,0,32fee941e3477f38496426c9dfbd23043f6b9230cc739cb2341cf527b2eb24d1,2024-09-27T17:15:13.400000
|
||||
CVE-2024-46367,0,0,58f85c2ee5f0f9ac2c557834d0c3dd066e268662e4efaed2e72a41696b171252,2024-09-27T17:15:13.487000
|
||||
CVE-2024-46366,0,1,a15ad5c8e03195f0c0817bbf460e8b8c3bdb9facd8ec23d661b448c5e6e4edd8,2024-09-27T20:35:12.770000
|
||||
CVE-2024-46367,0,1,c21f1fb2d7acf1b4c5929a647f7c8baa785c92c3b650529e7205a0d9e25436de,2024-09-27T20:35:13.517000
|
||||
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46372,0,0,e3b69cc491c1ce73557c9fae2d89432e3f39b15e7ad51da831599618ee55991e,2024-09-24T15:40:12.980000
|
||||
CVE-2024-46373,0,0,364353f8eed746e65cf065bb51dddf6fa9b6298b578b96d8db4d43f0b16ff53a,2024-09-20T12:30:17.483000
|
||||
@ -260328,6 +260328,7 @@ CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f63
|
||||
CVE-2024-46441,0,0,2418b86253ca00f9dc7f73a4a3e896b30ddde24c4b20f0f372cbb6dbc59ef2a5,2024-09-27T15:35:03.803000
|
||||
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
|
||||
CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000
|
||||
CVE-2024-46453,1,1,b68bb15bb440f00a38a1c5270a76c20c1ee28b0799a4573dd099acd9176b420e,2024-09-27T21:15:03.350000
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
@ -260734,6 +260735,7 @@ CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915
|
||||
CVE-2024-47180,0,0,d098d674c2c5dd84a239cf91df06907f039b4828c306456dcad3f506e675b516,2024-09-26T20:15:07.310000
|
||||
CVE-2024-47182,0,0,69a16fc9154ea6d7ac97d74655916e8770997f865ecb98299d0d581a01a394b7,2024-09-27T14:15:04.620000
|
||||
CVE-2024-47184,0,0,af8ebb1816d7ba0a039271d512029a4f3a5177b9bc7103f3acf040e130a3146c,2024-09-27T14:15:04.833000
|
||||
CVE-2024-47186,1,1,e4f8ce43fafbf516bf28164ab1dec73a08a2eb15490bbcac5ce1bb957b6e3c72,2024-09-27T21:15:03.443000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
|
||||
@ -261148,7 +261150,7 @@ CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2
|
||||
CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000
|
||||
CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
|
||||
CVE-2024-5170,0,1,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
|
||||
CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
|
||||
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
|
||||
CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000
|
||||
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
|
||||
@ -262248,6 +262250,7 @@ CVE-2024-6431,0,0,fcbb0ceb19b6b17057a6532823d607ef530236adc570023f161f002351d029
|
||||
CVE-2024-6433,0,0,4cb445c95e15de0c345d2cc06e9508b276183ca5d50834d0b48eec3d0df1757b,2024-07-12T08:15:11.963000
|
||||
CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000
|
||||
CVE-2024-6435,0,0,537ce55d66a34e30f0cdc2fa5f4ebac2551f4222db736332f8b163433bf2dbed,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6436,1,1,64ddc4176d1222c2cbf78da7882b182362473f77dc357849500fda95706d0bbf,2024-09-27T20:15:06.043000
|
||||
CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f26636c,2024-07-02T17:54:02.370000
|
||||
CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000
|
||||
CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000
|
||||
@ -262289,7 +262292,7 @@ CVE-2024-6489,0,0,9e9ca0d507c7dd8804b1fd0a0aa043e3fe6638bfc4af4b9ea109d44e00b0a1
|
||||
CVE-2024-6490,0,0,899b982533855ad09e3dbb0e567c02d65e33383a1b395d2221626be09ed0f8ee,2024-08-01T14:00:24.333000
|
||||
CVE-2024-6491,0,0,777eb845cac0fc56ad6345347b6b7dff4d99542463073dd5b5752a23e8a26dec,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6492,0,0,82f79625038ad5debf137137104e45e1e353947b9c4b14df742baece7a047a71,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6493,0,0,0a834dea1c3cc746c6a827d048ba68f6ec225a3c2192f6f2cdc6cbf59e192ce5,2024-09-13T16:35:18.740000
|
||||
CVE-2024-6493,0,1,62fd8aea82524d9b2897c3d31566621c073b255968a2f6d1f1e5c8fb9113152c,2024-09-27T21:28:49.020000
|
||||
CVE-2024-6494,0,0,5d616b6f04502e7b8421d6bcde94ff1c84cc44e101748b87939c18b401c713e1,2024-08-07T15:17:46.717000
|
||||
CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000
|
||||
CVE-2024-6496,0,0,4f2145d6969061de095037c65c4c02c00a89d2331ecd0d31a6eacfc030927f42,2024-08-07T14:35:07.403000
|
||||
@ -262396,7 +262399,7 @@ CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520
|
||||
CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000
|
||||
CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000
|
||||
CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000
|
||||
CVE-2024-6617,0,0,b560d79c8ba42d6bf40fdf308b9239d576bc1e677a8ac51cdf4ad279b27d7573,2024-09-13T16:35:18.930000
|
||||
CVE-2024-6617,0,1,5909931dadcbc2469c78c33ae14eaaff085d3be701252e008f4f95589a185469,2024-09-27T21:28:35.543000
|
||||
CVE-2024-6618,0,0,e35778534e5c89186065378dfc4e3df4bed15c4f9d7950adea6d3cb891d47959,2024-08-14T02:07:05.410000
|
||||
CVE-2024-6619,0,0,f3a91e3a6a10b3f4f501b46572779a0f05e320927845dcf9e15b84cacb4a9100,2024-08-14T02:07:05.410000
|
||||
CVE-2024-6620,0,0,64e06f08829405566592b044b4a90e5d81b7212d27ff82e69e11d8e82efebda8,2024-07-30T13:33:30.653000
|
||||
@ -262476,7 +262479,7 @@ CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75b
|
||||
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6722,0,0,703a21dd5b88a7779498c521e3d50e4d788d54c0da4855e87bfa30931015fa08,2024-09-04T15:35:25.590000
|
||||
CVE-2024-6723,0,1,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000
|
||||
CVE-2024-6723,0,0,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000
|
||||
CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f22d,2024-08-13T15:35:30.033000
|
||||
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
@ -262530,7 +262533,7 @@ CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e84
|
||||
CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
|
||||
CVE-2024-6785,0,1,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000
|
||||
CVE-2024-6785,0,0,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000
|
||||
CVE-2024-6786,0,0,6597b7dd569386c901be03b7245eaafe138b67af6e27e8cdf77a3a0b8ca4cea0,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6787,0,0,e0b77d2378b8922074bb9dd2f1bdf4b4b3c5d5d4b21b5875d179c9f9f1a98777,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000
|
||||
@ -262570,7 +262573,7 @@ CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3b
|
||||
CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000
|
||||
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6849,0,0,07092c81deee0f13cbc863d08f18b6ad24a98e3f6832c77e93da65ee89b7a746,2024-09-26T16:36:13.207000
|
||||
CVE-2024-6850,0,1,b532166a73b931a8e6589cac5f39582da12c7cd2ba07fbd5ded704f1eec5891d,2024-09-27T18:30:30.930000
|
||||
CVE-2024-6850,0,0,b532166a73b931a8e6589cac5f39582da12c7cd2ba07fbd5ded704f1eec5891d,2024-09-27T18:30:30.930000
|
||||
CVE-2024-6852,0,0,cd867431022b85ee5515b69c46ab068b7525885927be7fa9cfc4c875a9f47878,2024-09-11T16:23:02.500000
|
||||
CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c118,2024-09-11T16:22:18.850000
|
||||
CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000
|
||||
@ -262776,9 +262779,9 @@ CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072a
|
||||
CVE-2024-7125,0,0,eeabb5486a5ad2f2094206d4f0142bb635fc7a57bcd2279354b026b1e44628c1,2024-08-27T13:01:37.913000
|
||||
CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000
|
||||
CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7129,0,1,7be2af5cd46444dfa860a3986fbc878686c2d44c992fb72236870ca711446d78,2024-09-27T18:26:27.560000
|
||||
CVE-2024-7129,0,0,7be2af5cd46444dfa860a3986fbc878686c2d44c992fb72236870ca711446d78,2024-09-27T18:26:27.560000
|
||||
CVE-2024-7132,0,0,3deac5f1e9f8ee84791f2e4d6b9257b8de66af7b06b212663d3e71b6260e8de4,2024-08-29T20:37:07.980000
|
||||
CVE-2024-7133,0,0,4e98e3b561cf958bf35a6721b4cbee642ee930a0b0430e16ecd022d881c6c890,2024-09-13T16:35:19.507000
|
||||
CVE-2024-7133,0,1,717bce18b1e84ac850eb1ced68f8178470529ff4827bef90b482d0644c3109d8,2024-09-27T21:27:50.053000
|
||||
CVE-2024-7134,0,0,c5170ada8be1ea583d3dc92d1c0c20ff0ddcfa0f860d82c947cda0aff2380786,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7136,0,0,8aada0541fe051e5634e6d0e6056d54d479250830cd49e1b32d308af5a5c28dc,2024-08-19T13:00:23.117000
|
||||
@ -263227,8 +263230,8 @@ CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b4
|
||||
CVE-2024-7693,0,0,8f49e917567dbf3d83b8fab0c0f87defce06a4391222113e25ab3be3d08b6e06,2024-09-06T16:51:35.647000
|
||||
CVE-2024-7694,0,0,915a620e49de11e538187b87ae1859b4dd8b81a9c117898d10d07c783b69fb2e,2024-09-06T17:24:42.573000
|
||||
CVE-2024-7697,0,0,56fc87c2b950fc0d4b7d08c76bcec1377c688ea98c921a8e581bb6c082412bb3,2024-09-06T18:04:28.030000
|
||||
CVE-2024-7698,0,1,8d09c845ea30b5a1b14332868681fb099784f66e3bda73378a3a159a0b6b09bd,2024-09-27T19:39:43.350000
|
||||
CVE-2024-7699,0,1,ed5dc56e694e06cefce7f4b6728302d59b16d08df75052ff1f1aef59a8ce1489,2024-09-27T18:59:31.277000
|
||||
CVE-2024-7698,0,0,8d09c845ea30b5a1b14332868681fb099784f66e3bda73378a3a159a0b6b09bd,2024-09-27T19:39:43.350000
|
||||
CVE-2024-7699,0,0,ed5dc56e694e06cefce7f4b6728302d59b16d08df75052ff1f1aef59a8ce1489,2024-09-27T18:59:31.277000
|
||||
CVE-2024-7700,0,0,35ccbcc6c9987f858b077e015d668845c4772768b7fa013291f6195b76e0abe5,2024-09-16T14:20:21.087000
|
||||
CVE-2024-7702,0,0,35104b2d835bcff771d3508b754ac4f00b960fb6fd0cdfa84ab47a794def21ca,2024-08-26T18:15:46.870000
|
||||
CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000
|
||||
@ -263237,7 +263240,7 @@ CVE-2024-7705,0,0,8729f8bc3ceb5c5f01c7dd391e96850b57511177f9d82b06cbc0e989f2466c
|
||||
CVE-2024-7706,0,0,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000
|
||||
CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000
|
||||
CVE-2024-7709,0,0,4ea4e71ad8cd2325399b6f32c817fafe76ecfe7c20ad1838061c8bb44a136e96,2024-08-17T10:15:10.957000
|
||||
CVE-2024-7711,0,1,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000
|
||||
CVE-2024-7711,0,0,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000
|
||||
CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000
|
||||
CVE-2024-7713,0,0,087ec51e88c8fe30f0c34d44b176229232ed6289fc8aa5ebb9431dfe92cfcd5e,2024-09-27T06:15:11.327000
|
||||
CVE-2024-7714,0,0,705d8fa26395ef610bad264ffef178490d23a61ef3ede9b9fe5bf2e0a9ab5182,2024-09-27T17:35:15.420000
|
||||
@ -263311,11 +263314,11 @@ CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f
|
||||
CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000
|
||||
CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000
|
||||
CVE-2024-7816,0,0,1b2db663d31365ee9da148e02f7fee6f7353ee5fdc15036a02dd578f17770d3c,2024-09-26T20:23:28.730000
|
||||
CVE-2024-7817,0,1,7f26ae977b6327d2a59614ba3ea301244dcc145b21edee3156a2c2d963536ef9,2024-09-27T18:26:21.653000
|
||||
CVE-2024-7818,0,1,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc29f,2024-09-27T18:18:55.510000
|
||||
CVE-2024-7820,0,1,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000
|
||||
CVE-2024-7817,0,0,7f26ae977b6327d2a59614ba3ea301244dcc145b21edee3156a2c2d963536ef9,2024-09-27T18:26:21.653000
|
||||
CVE-2024-7818,0,0,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc29f,2024-09-27T18:18:55.510000
|
||||
CVE-2024-7820,0,0,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000
|
||||
CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000
|
||||
CVE-2024-7822,0,1,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000
|
||||
CVE-2024-7822,0,0,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000
|
||||
CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000
|
||||
CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000
|
||||
@ -263344,12 +263347,12 @@ CVE-2024-7854,0,0,aba539cc6b053a0969fb9c545d61b200c22ae8ea4b03c24dce9c6e90a428e0
|
||||
CVE-2024-7856,0,0,0b05d57dab8dba6cdf2a128a5ea955132a0df5f7068b3f603d90db91d8053f54,2024-09-13T18:14:47.280000
|
||||
CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc067c,2024-09-03T14:34:09.017000
|
||||
CVE-2024-7859,0,1,226a85a1690e60d5c312a7296dfa4fc4fa943380666900b35d25ad4eaf87137f,2024-09-27T18:00:53.567000
|
||||
CVE-2024-7860,0,0,6478691d52b931fe14a87d864f1defb31ceb3c959fc542786a5c247463eccd66,2024-09-12T14:35:19.980000
|
||||
CVE-2024-7861,0,0,7dc841d67f7cbf14766a683bac9706b93075a04167273c804ada991b965813f0,2024-09-12T14:35:20.767000
|
||||
CVE-2024-7859,0,0,226a85a1690e60d5c312a7296dfa4fc4fa943380666900b35d25ad4eaf87137f,2024-09-27T18:00:53.567000
|
||||
CVE-2024-7860,0,1,c391ad7c4ef407489069e585cb95bbfbb22674e36a77cbf1c14427ff7d81452b,2024-09-27T20:56:24.493000
|
||||
CVE-2024-7861,0,1,0a909509d97ae1cc7403adef3feb39aabff91c1c695789c3f097cacdbb9f06a1,2024-09-27T20:52:11.350000
|
||||
CVE-2024-7862,0,0,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000
|
||||
CVE-2024-7863,0,0,70e912b75e64a9ad15fba5801d0c87cd1786e11898364009ea5424c34735176f,2024-09-13T15:35:12.780000
|
||||
CVE-2024-7864,0,0,1d6e49f55212be3f9d708df04449199a97515666347747f7c296214a9b1ccb9b,2024-09-13T15:35:12.997000
|
||||
CVE-2024-7863,0,1,11d320db6ad42df94b7ce126cd0ba1a84504b8818a402a12b56e92e066aa845a,2024-09-27T21:27:07.640000
|
||||
CVE-2024-7864,0,1,8cb55f9c6813f7ebb3e411de07404fd2812a548c1112fcc9ece6be38f8f1e98f,2024-09-27T21:26:50.067000
|
||||
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
|
||||
CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
|
||||
CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000
|
||||
@ -263466,15 +263469,15 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad
|
||||
CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
|
||||
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
|
||||
CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000
|
||||
CVE-2024-8043,0,1,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000
|
||||
CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000
|
||||
CVE-2024-8044,0,0,66a840b3b744914aeb912493a88172b219c2bc4688dd089a25891a08edff7e40,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8045,0,0,4f33bec2129e516f0590350db62def0ffeb2e64cb03de1e46d8b3d52953002f0,2024-09-25T19:22:03.157000
|
||||
CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000
|
||||
CVE-2024-8047,0,0,451c9202eb5241e7fe3b1625d48b44a3fdd0de8dfb43ec8dea1780c6029fedaf,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8051,0,1,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000
|
||||
CVE-2024-8047,0,1,b09ff33da28d13c746e9dd8622cb16da9ea9a8911cc13c3fef8877b81efca550,2024-09-27T21:25:08.523000
|
||||
CVE-2024-8051,0,0,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000
|
||||
CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000
|
||||
CVE-2024-8054,0,0,cd3f21fbab232193f2e1023cd4fdcf2e5fe80aa9a017de7b992adfbc243b258d,2024-09-12T14:35:22.300000
|
||||
CVE-2024-8056,0,0,5fb88a6ca250e6ff67f8a1ef0c841abbb4c8f2529c05613c2143403e703e96cb,2024-09-12T13:35:23.340000
|
||||
CVE-2024-8054,0,1,f7372d07d80e2782b99a1ec78381d10ed3eddb2361d69efd0f5544951feb686d,2024-09-27T21:29:57.607000
|
||||
CVE-2024-8056,0,1,7d94e922f5f6064358baece439e000bb5b536e03070693d567d210e7b17a441d,2024-09-27T21:29:42.600000
|
||||
CVE-2024-8059,0,0,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000
|
||||
CVE-2024-8067,0,0,21c0729ad9dc772677b9fbf75bb24db3bcf4512001a88b1eef9d39bf31f69153,2024-09-26T13:32:02.803000
|
||||
@ -263494,9 +263497,9 @@ CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800d
|
||||
CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000
|
||||
CVE-2024-8088,0,0,8ddda94d9e5d462484d35576871f82a931bed67f85a71db29ea75a996b1d19a4,2024-09-04T23:15:13.100000
|
||||
CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000
|
||||
CVE-2024-8091,0,1,06172e44aed678336443c20950f76caa42dd2c2e908885cff9a8110617689662,2024-09-27T18:17:59.267000
|
||||
CVE-2024-8092,0,1,065d7728a5c27093389a465996d8f4f342cb2cfe4c5f3383890730cf2cd938fc,2024-09-27T18:17:24.387000
|
||||
CVE-2024-8093,0,1,98e0c7040cf9105cb1c3055778b4c0e7f9f1a20fe40737d282c5bab0fdcb3801,2024-09-27T18:16:01.683000
|
||||
CVE-2024-8091,0,0,06172e44aed678336443c20950f76caa42dd2c2e908885cff9a8110617689662,2024-09-27T18:17:59.267000
|
||||
CVE-2024-8092,0,0,065d7728a5c27093389a465996d8f4f342cb2cfe4c5f3383890730cf2cd938fc,2024-09-27T18:17:24.387000
|
||||
CVE-2024-8093,0,0,98e0c7040cf9105cb1c3055778b4c0e7f9f1a20fe40737d282c5bab0fdcb3801,2024-09-27T18:16:01.683000
|
||||
CVE-2024-8096,0,0,33268897f7f8b2273839db6d4e75fbc8fdf5f760a220b507e80b08e690a9edf4,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8097,0,0,9eb75255abcd069d744af59bd7e8120e62794401b3e1be4e7c495de1066a7b41,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5f9,2024-09-05T13:28:54.747000
|
||||
@ -263606,7 +263609,7 @@ CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b
|
||||
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
|
||||
CVE-2024-8253,0,0,538885466f07c28468f1d184c3fb77b594dc3a7e7631ea6be509e963086ff9ce,2024-09-25T19:42:31.943000
|
||||
CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
|
||||
CVE-2024-8258,0,1,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000
|
||||
CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000
|
||||
CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
|
||||
CVE-2024-8263,0,0,ad65448f4ef9e6d39f00279a5a8db0ec57a6e502dd6ab5aa12fd95772e708ca5,2024-09-26T13:32:55.343000
|
||||
CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000
|
||||
@ -263747,7 +263750,7 @@ CVE-2024-8481,0,0,67325c0356d12406e49fab472e21b05bb6061508372f0502a0ce3d40d30f14
|
||||
CVE-2024-8483,0,0,32ab224ff359b84d82ed4ce77aef264a7f492427c24d93140e77029461e7169c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8484,0,0,d0fccdedacf4dc6329ba9866ef74b74fbb5f8d079ba99b2fc034c60f4afe6c85,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8485,0,0,2d19876b7de8e9f56ec7e63c79b17d47547448dd4997ef0bac6df72b646b7654,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8490,0,1,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000
|
||||
CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000
|
||||
CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
|
||||
@ -263889,7 +263892,7 @@ CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f99
|
||||
CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000
|
||||
CVE-2024-8758,0,0,634aeeda8f9e91934f78e3b64172027c163c387830078a2c36c39ec180a63900,2024-09-27T14:29:23.157000
|
||||
CVE-2024-8761,0,1,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000
|
||||
CVE-2024-8761,0,0,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000
|
||||
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
||||
CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588dfe2,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000
|
||||
@ -264039,7 +264042,7 @@ CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae5
|
||||
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9148,0,0,67e1a8965ac157a49477c7b911dc2eab586d6712cddbbb8bebbaaf2d7b8d1009,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9155,0,0,3667cd6d9c617f3b4fff82f34cbe0acc0c5672d976fdd89baf4e1efb8fe50604,2024-09-26T15:15:18.060000
|
||||
CVE-2024-9160,1,1,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000
|
||||
CVE-2024-9160,0,0,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000
|
||||
CVE-2024-9166,0,0,f959a40ffb6dedc25519b3fb4ef712dde7361eac9f511d5aa4ad9abbf925f6d2,2024-09-26T17:15:04.460000
|
||||
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
|
||||
@ -264061,4 +264064,6 @@ CVE-2024-9281,0,0,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d7209421769
|
||||
CVE-2024-9282,0,0,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000
|
||||
CVE-2024-9283,0,0,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f147e,2024-09-27T14:15:05.330000
|
||||
CVE-2024-9284,0,0,a3f6be1f322902c2dd706322ffd372bfbe9b47cbadedd7cc30aad50104d2b033,2024-09-27T17:15:14.600000
|
||||
CVE-2024-9301,1,1,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000
|
||||
CVE-2024-9291,1,1,cb57967e7b1c1e3b6bbd39bdcccb61b556906a24da36a7110dece4902c704d59,2024-09-27T21:15:03.667000
|
||||
CVE-2024-9293,1,1,58d1b3c8bf6371fb336102f333c7989d6dbbcc39b37756484826d43b383204c0,2024-09-27T21:15:03.937000
|
||||
CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user