Auto-Update: 2024-10-05T04:00:17.575723+00:00

This commit is contained in:
cad-safe-bot 2024-10-05 04:03:18 +00:00
parent 13997a6d6e
commit 3387227c46
11 changed files with 577 additions and 52 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23640",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T10:15:09.217",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-05T02:04:13.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mainwp:updraftplus_extension:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.7",
"matchCriteriaId": "83604129-35D6-478A-AEF6-2FE027298C4A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mainwp-updraftplus-extension/wordpress-mainwp-updraftplus-extension-plugin-4-0-6-subscriber-arbitrary-plugin-activation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31294",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:11.710",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-05T02:01:28.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:androidbubble:wp_sort_order:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.2",
"matchCriteriaId": "6A634EE0-83A5-4ED4-931B-DC3F1E960176"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-sort-order/wordpress-wp-sort-order-plugin-1-3-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41715",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:05.950",
"lastModified": "2024-09-30T12:46:20.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-05T02:16:15.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -85,8 +105,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +125,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gotenna:atak_plugin:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.7",
"matchCriteriaId": "0339DE99-2478-48B6-9664-CB8847C5EE47"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T18:15:08.583",
"lastModified": "2024-09-30T12:46:20.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-05T02:21:24.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Projectworld Online Voting System Version 1.0 es vulnerable a Cross Site Request Forgery (CSRF) a trav\u00e9s de voter.php. Esta vulnerabilidad permite a un atacante crear un v\u00ednculo malicioso que, cuando un usuario autenticado hace clic en \u00e9l, env\u00eda autom\u00e1ticamente un voto para un partido espec\u00edfico sin el consentimiento o conocimiento del usuario. El ataque aprovecha la sesi\u00f3n activa del usuario para realizar la acci\u00f3n no autorizada, lo que compromete la integridad del proceso de votaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:online_voting_system_project:online_voting_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC3B251-845F-4FE1-8A9E-FFF2DA5F88B9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-45987",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-47841",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2024-10-05T02:15:02.470",
"lastModified": "2024-10-05T02:15:02.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Wikimedia Foundation Mediawiki - CSS Extension allows Path Traversal.This issue affects Mediawiki - CSS Extension: from 1.42.X before 1.42.2, from 1.41.X before 1.41.3, from 1.39.X before 1.39.9."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gerrit.wikimedia.org/r/q/I46613d8d50fc978bdac58e2b312ee03324c1edc8",
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
},
{
"url": "https://phabricator.wikimedia.org/T368628",
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
},
{
"url": "https://phabricator.wikimedia.org/T369486",
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8318",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-04T08:15:03.167",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-05T02:10:34.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,26 +71,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:websevendev:attributes_for_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.7",
"matchCriteriaId": "F6A023E6-7A6C-4282-A04A-DD1353D78A52"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/attributes-for-blocks/trunk/attributes-for-blocks.php#L246",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/attributes-for-blocks/trunk/attributes-for-blocks.php#L96",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fattributes-for-blocks&old=3066420&new_path=%2Fattributes-for-blocks&new=3144730&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/attributes-for-blocks/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a0101dd1-a9cb-4b9c-8299-9b808d7e1912?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9385",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-05T02:15:02.600",
"lastModified": "2024-10-05T02:15:02.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Themify Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/themify-builder/tags/7.6.2/classes/class-themify-builder-model.php#L1121",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3162399/themify-builder/trunk/classes/class-themify-builder-model.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a83e68e0-1b5b-4fd5-be00-37b8f11144c4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9455",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-05T02:15:02.827",
"lastModified": "2024-10-05T02:15:02.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Cleanup and Basic Functions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/wp-cleanup-and-basic-functions/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/28bdaf44-6f2c-440a-a96f-bdcd71fb7bea?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-9528",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-05T03:15:02.447",
"lastModified": "2024-10-05T03:15:02.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms (administrator by default), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/fluentform/tags/5.1.17/app/Services/FormBuilder/Components/BaseComponent.php#L191",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/fluentform/tags/5.1.17/boot/globals.php#L342",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3125227/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ed4dfee-5f14-47ce-abed-cd226c110665?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-05T02:00:16.739737+00:00
2024-10-05T04:00:17.575723+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-05T01:59:34.870000+00:00
2024-10-05T03:15:02.447000+00:00
```
### Last Data Feed Release
@ -33,29 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264530
264534
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `4`
- [CVE-2024-47840](CVE-2024/CVE-2024-478xx/CVE-2024-47840.json) (`2024-10-05T01:15:12.107`)
- [CVE-2024-47845](CVE-2024/CVE-2024-478xx/CVE-2024-47845.json) (`2024-10-05T01:15:12.237`)
- [CVE-2024-47846](CVE-2024/CVE-2024-478xx/CVE-2024-47846.json) (`2024-10-05T01:15:12.360`)
- [CVE-2024-47847](CVE-2024/CVE-2024-478xx/CVE-2024-47847.json) (`2024-10-05T01:15:12.493`)
- [CVE-2024-47848](CVE-2024/CVE-2024-478xx/CVE-2024-47848.json) (`2024-10-05T00:15:02.800`)
- [CVE-2024-47849](CVE-2024/CVE-2024-478xx/CVE-2024-47849.json) (`2024-10-05T01:15:12.610`)
- [CVE-2024-47841](CVE-2024/CVE-2024-478xx/CVE-2024-47841.json) (`2024-10-05T02:15:02.470`)
- [CVE-2024-9385](CVE-2024/CVE-2024-93xx/CVE-2024-9385.json) (`2024-10-05T02:15:02.600`)
- [CVE-2024-9455](CVE-2024/CVE-2024-94xx/CVE-2024-9455.json) (`2024-10-05T02:15:02.827`)
- [CVE-2024-9528](CVE-2024/CVE-2024-95xx/CVE-2024-9528.json) (`2024-10-05T03:15:02.447`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `5`
- [CVE-2023-23639](CVE-2023/CVE-2023-236xx/CVE-2023-23639.json) (`2024-10-05T01:37:41.107`)
- [CVE-2024-24142](CVE-2024/CVE-2024-241xx/CVE-2024-24142.json) (`2024-10-05T01:43:51.650`)
- [CVE-2024-31098](CVE-2024/CVE-2024-310xx/CVE-2024-31098.json) (`2024-10-05T01:54:33.020`)
- [CVE-2024-31246](CVE-2024/CVE-2024-312xx/CVE-2024-31246.json) (`2024-10-05T01:59:34.870`)
- [CVE-2023-23640](CVE-2023/CVE-2023-236xx/CVE-2023-23640.json) (`2024-10-05T02:04:13.263`)
- [CVE-2024-31294](CVE-2024/CVE-2024-312xx/CVE-2024-31294.json) (`2024-10-05T02:01:28.300`)
- [CVE-2024-41715](CVE-2024/CVE-2024-417xx/CVE-2024-41715.json) (`2024-10-05T02:16:15.997`)
- [CVE-2024-45987](CVE-2024/CVE-2024-459xx/CVE-2024-45987.json) (`2024-10-05T02:21:24.450`)
- [CVE-2024-8318](CVE-2024/CVE-2024-83xx/CVE-2024-8318.json) (`2024-10-05T02:10:34.703`)
## Download and Usage

View File

@ -217551,9 +217551,9 @@ CVE-2023-23635,0,0,235e2f9aaa4d81653a473f7bee2f02441220d52847a6b1d7757be3aabdf4b
CVE-2023-23636,0,0,410bb48460364d685aab91b77723cbce62a06bf15d69ddb482938ccb37001a9c,2023-02-09T18:17:10.097000
CVE-2023-23637,0,0,8303c2e888f4a7f7be3861e3dd96442a11d683fc03173c478fa0af6f4291768d,2023-01-25T02:29:20.367000
CVE-2023-23638,0,0,c798c27985bf183b36d281532d811c42a95db85432ae20ee49e04ec4e03cbf8b,2023-11-07T04:07:50.990000
CVE-2023-23639,0,1,609b39ace6a6dec0659c782fcf6da5dd20dad42cd06a4def317a7a1aa722e692,2024-10-05T01:37:41.107000
CVE-2023-23639,0,0,609b39ace6a6dec0659c782fcf6da5dd20dad42cd06a4def317a7a1aa722e692,2024-10-05T01:37:41.107000
CVE-2023-2364,0,0,ef2fa89d6009c2c0b9501247c770157813a8ca3461f78ce280790e9fc931b9dc,2024-05-17T02:22:53.063000
CVE-2023-23640,0,0,52c029f8da519e17b4c063c6e818381f23891c0a5b5ebbafae7f51f9a64695d0,2024-06-10T02:52:08.267000
CVE-2023-23640,0,1,3cbb88c0f5af99ec512e3dba8b675700fb698479049cd57ca836ed757a4e1fd6,2024-10-05T02:04:13.263000
CVE-2023-23641,0,0,9e0bf1ea6e96cfa227eb36bfb2991b91b3191e168b28cc245f74934ce61a383b,2023-05-22T20:02:44.160000
CVE-2023-23645,0,0,909a4faff18d07c3f737541bddbf0bd492484422035c2726de49e50d80365a67,2024-05-17T18:36:05.263000
CVE-2023-23646,0,0,698f6d9b297a7cdc5bc16f33439d1b1197291570102d6e92f6330ae41b0473dc,2023-07-26T01:11:44.107000
@ -246024,7 +246024,7 @@ CVE-2024-24139,0,0,4dd6b552efc790d6e4fc5177fe502190cd77df204ff2674bf30758cea1343
CVE-2024-2414,0,0,e559d69a2c3dd3a2e6bd8562c1937f259ac43fd68bf13a707df585780b465d70,2024-03-13T12:33:51.697000
CVE-2024-24140,0,0,06b50a594cff842dbd90e39c1e22c08e1e093a981c73581fa665af8c1720c930,2024-02-02T23:36:15.563000
CVE-2024-24141,0,0,d6f255186a2c01675b2020cecfbb11bf6576700e3a945d662b6d729e92dd7874,2024-08-23T20:35:07.950000
CVE-2024-24142,0,1,123cf5f306d81afaa7a24b2888c09abe6abd0db37489dca6e3fe8a7055464279,2024-10-05T01:43:51.650000
CVE-2024-24142,0,0,123cf5f306d81afaa7a24b2888c09abe6abd0db37489dca6e3fe8a7055464279,2024-10-05T01:43:51.650000
CVE-2024-24146,0,0,9c2cf9272dc1c4cc753aeade919e09d1e623750808db8a2821060c90e942ffb8,2024-03-12T14:56:47.377000
CVE-2024-24147,0,0,d7d3765ffc4bc6e492757c8676003b1fe530fd571b11041d382ca5eb228cfa6f,2024-08-29T20:36:09.463000
CVE-2024-24148,0,0,bfd1569540166fc45b2fdd456d7db70573b5d670340909d4ee530837b395527c,2024-08-29T20:36:10.247000
@ -250987,7 +250987,7 @@ CVE-2024-31094,0,0,96018b384dee14c4167dc62fa0fce59c729622c883102393ed22db19b370a
CVE-2024-31095,0,0,31ed0388a12281d5a7978ac66f06a17c76e0891ba943bbf86daf64b5ed1eba59,2024-08-01T13:50:47.373000
CVE-2024-31096,0,0,4270e5e66128cdab91811a0ce591a6eb33a08f957387696602f581ae0ed51dae,2024-04-01T01:12:59.077000
CVE-2024-31097,0,0,af09d47b9da9890511e00b9cb33e81e18545423fcf604be15b4f56a0320067e6,2024-04-01T01:12:59.077000
CVE-2024-31098,0,1,575269b926b2ab5203734875858ede91a25503d1903e96c2dfe82bc588e9c081,2024-10-05T01:54:33.020000
CVE-2024-31098,0,0,575269b926b2ab5203734875858ede91a25503d1903e96c2dfe82bc588e9c081,2024-10-05T01:54:33.020000
CVE-2024-31099,0,0,528ba98d88fb34d8f61e8485a4326c059785e996c72869ec228c224daf695f3d,2024-06-05T14:15:13.310000
CVE-2024-3110,0,0,635900212764359abe4ce85d386db98d21740945c63dc9266eccccde33b65fe3,2024-06-07T14:56:05.647000
CVE-2024-31100,0,0,304afdd26a02a950739edd8b75999107f4a6aad6e328c60a5193227610b72d07,2024-04-01T01:12:59.077000
@ -251122,7 +251122,7 @@ CVE-2024-31242,0,0,49ba26a59af8bb409e1c950e0e8a73428d316a8783fd9c4ee1094d2fcb13b
CVE-2024-31243,0,0,a4770b09224b27878d600ef478159922afaf0a3de1b14e00591285cf5dc6a658,2024-06-10T02:52:08.267000
CVE-2024-31244,0,0,2a410b2d2c4d07b14eaa7d1888986f3a25d1884ed48a2e19354efa2b399cb171,2024-06-10T02:52:08.267000
CVE-2024-31245,0,0,e736cfe43bcd49ca5935c9d24ad7bd155165a06905550503e09b0ab4d8406da2,2024-04-10T19:49:51.183000
CVE-2024-31246,0,1,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000
CVE-2024-31246,0,0,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000
CVE-2024-31247,0,0,8bbc99c43f8e3737633a522b3db9397b4348dbfc851d17e37569d7dfdbe18a5a,2024-04-10T19:49:51.183000
CVE-2024-31248,0,0,366b0e0ab5cc0e63b32a3ade56db4e5e4ebc4a5173ee310ed0de32257133820f,2024-06-10T02:52:08.267000
CVE-2024-31249,0,0,876c0987fa04efa87abc6f1e45d9e5e9801b02115d1bc7adc99a1b16136af95c,2024-04-10T19:49:51.183000
@ -251175,7 +251175,7 @@ CVE-2024-31290,0,0,0f179f60c298c3b186585b91ce98871100ea32c9c7a621a2993d35ca67bdb
CVE-2024-31291,0,0,c952666de994b16b43c7a33e04dca2ff218752cddd6e30ff48fef4e55e8982cf,2024-04-08T18:48:40.217000
CVE-2024-31292,0,0,3504dd44cc43ee78a8cd50949942b1dbb9d71a35bec54315a7d8b7561798c985,2024-04-08T18:48:40.217000
CVE-2024-31293,0,0,d20d156a0f8c87d673a5cdec66f54fecd5aa8889f6ab87bd7bd7bf0942a8285b,2024-04-15T13:15:51.577000
CVE-2024-31294,0,0,6924f8ec1a3da630d07fbd0673962ea0a063f941c88d46bd0cc630d997cbcb77,2024-06-10T02:52:08.267000
CVE-2024-31294,0,1,d0a7d4843372e24e4cc04ee14520ab11080aa2c28445f84ac289e01a70efb681,2024-10-05T02:01:28.300000
CVE-2024-31295,0,0,37dba956c7cb8ce01666b5ea152d0441b7649235a44c66cce9a88302fababc75,2024-05-17T18:36:05.263000
CVE-2024-31296,0,0,dd2f2950324e5c8dc05ecfdeaf16703477baaedac80f2e8ee5c00844b0d341be,2024-04-08T18:48:40.217000
CVE-2024-31297,0,0,f6e46aa48a8ed8a8a82c7ddf5442e06c8e41c73375e1b3244f5db8687886d057,2024-04-10T19:49:51.183000
@ -258162,7 +258162,7 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
CVE-2024-41715,0,0,e39209f97fb107cb854f69c69d3465a7c8c1fe7039e1d43f377c1c5c61ce5810,2024-09-30T12:46:20.237000
CVE-2024-41715,0,1,1e19e0d2e95094d001e574e5ec8e07025bc6520ada6d3a3d444b19001a84d7c8,2024-10-05T02:16:15.997000
CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000
CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
@ -260414,7 +260414,7 @@ CVE-2024-45983,0,0,47a651db6002a6bfd3e82bafffaac1886e81f4692dc67d6e4d2483e3dc577
CVE-2024-45984,0,0,829531605b75a351fb56301753b24a33b57031b7baaa6c10937b46d15b07e739,2024-09-30T12:46:20.237000
CVE-2024-45985,0,0,91f6b11d4a0e69e50043609710335a2e6ecb9c0b2023813e0b5e8a7a41eb0525,2024-09-30T12:46:20.237000
CVE-2024-45986,0,0,a85d3ec3755f724362fff27a6a522f83d6b30d560b1ead4324df3dd3027d06bf,2024-09-30T12:46:20.237000
CVE-2024-45987,0,0,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe849a3,2024-09-30T12:46:20.237000
CVE-2024-45987,0,1,f32b18c92e6963d060ce6ae4c06d24935f9488838fb2d7a9da7659071011b899,2024-10-05T02:21:24.450000
CVE-2024-45989,0,0,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
CVE-2024-45993,0,0,350b08a6cc2d250cbd03f88d3d0b93865e2ed8a596686ac9cdf0d0569cd66a5b,2024-10-04T13:51:25.567000
@ -261075,12 +261075,13 @@ CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cf
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000
CVE-2024-47840,1,1,2af3bee25b1702c6dc0adb76f7b5b59a4851969bef12b213034c47b48b258b47,2024-10-05T01:15:12.107000
CVE-2024-47845,1,1,635ba9bccad8551fc613f2e237296c21ce817ceedb4be2a9be383ddcc98a411f,2024-10-05T01:15:12.237000
CVE-2024-47846,1,1,0adcd7063b2395a255cabd8e399537ae86a6a3562396b07a91b6e9c6e645b7d7,2024-10-05T01:15:12.360000
CVE-2024-47847,1,1,8bb581ee5c6b46cd381ad9ae39d7ff2309c88adf7df1ab8b12d4cb89a0115fa3,2024-10-05T01:15:12.493000
CVE-2024-47848,1,1,a8d9e5826f088dd7367761196783fbe30c91acacdacc8b98fb63040872d425b0,2024-10-05T00:15:02.800000
CVE-2024-47849,1,1,e612f88d1833059215a939c83e368b34dfa5fc835db277bbd2bbf0c7eac17b1a,2024-10-05T01:15:12.610000
CVE-2024-47840,0,0,2af3bee25b1702c6dc0adb76f7b5b59a4851969bef12b213034c47b48b258b47,2024-10-05T01:15:12.107000
CVE-2024-47841,1,1,e32c6a2687c1cf875cccdae8a34e0555fe82273a17ace5908bee3b8a19718fea,2024-10-05T02:15:02.470000
CVE-2024-47845,0,0,635ba9bccad8551fc613f2e237296c21ce817ceedb4be2a9be383ddcc98a411f,2024-10-05T01:15:12.237000
CVE-2024-47846,0,0,0adcd7063b2395a255cabd8e399537ae86a6a3562396b07a91b6e9c6e645b7d7,2024-10-05T01:15:12.360000
CVE-2024-47847,0,0,8bb581ee5c6b46cd381ad9ae39d7ff2309c88adf7df1ab8b12d4cb89a0115fa3,2024-10-05T01:15:12.493000
CVE-2024-47848,0,0,a8d9e5826f088dd7367761196783fbe30c91acacdacc8b98fb63040872d425b0,2024-10-05T00:15:02.800000
CVE-2024-47849,0,0,e612f88d1833059215a939c83e368b34dfa5fc835db277bbd2bbf0c7eac17b1a,2024-10-05T01:15:12.610000
CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000
CVE-2024-47850,0,0,b94b4a035c672b5cc3cb108d7976af3088d3b8701a5b4002ee130c9907165d1d,2024-10-04T15:35:05.463000
CVE-2024-47854,0,0,49d2ff5f872bf97be36179db2ff9e4fbf51aef335df0b5e21b4774e5fd43bf87,2024-10-04T13:50:43.727000
@ -263951,7 +263952,7 @@ CVE-2024-8310,0,0,7c8549a7a64d3579b34aa56e199885805550ab7f5a2102b636629253bc8a75
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
CVE-2024-8316,0,0,3b475263f4e092896f126b94bae35b22c4bf5a5b5af6a3f22b6258e0c397de01,2024-10-03T01:01:37.380000
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
CVE-2024-8318,0,1,1b5c2a7dc9b75888f87897ddfaf12f7c73553720d33dcd65ceff4420ae5bb680,2024-10-05T02:10:34.703000
CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000
CVE-2024-8320,0,0,67cff6908a40f6de0a5d55f45cee63784fe7b54f56159b5877dcd792142b0c2f,2024-09-12T21:51:58.960000
CVE-2024-8321,0,0,595129502821252825346a9a34e636ff1fd5806e1274bb50a0e529e9f41ab2d6,2024-09-12T21:53:22.677000
@ -264497,6 +264498,7 @@ CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044a
CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000
CVE-2024-9378,0,0,7a8325e6b9b9ab5f87224c3f7949059cac46c7e9016e933e1570af8b9833e04e,2024-10-04T13:50:43.727000
CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000
CVE-2024-9385,1,1,25145b57342f5b34ee7029dc6487a689ca1bdddfcf7cbc091b96c1c491d1b304,2024-10-05T02:15:02.600000
CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000
CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000
CVE-2024-9393,0,0,96bdaf874ad6083dd8fd8845ba7fe8bf267c5ff001eb7dd6e7d50847bf69aa1b,2024-10-04T13:51:25.567000
@ -264521,6 +264523,7 @@ CVE-2024-9435,0,0,dd30383dc280040df042a11097fa6cc76ccaa80c55710936c096ba1dc41cad
CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000
CVE-2024-9455,1,1,e56132275ab5f83c0555e60cbf6c95a62b60c6ca9fa821a9c8c48f4cfb3933ca,2024-10-05T02:15:02.827000
CVE-2024-9460,0,0,b1e465c88eb90ead630b69c31ba7996284434b6d6cb7ca81e044245f760d2699,2024-10-04T13:50:43.727000
CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000
CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000
@ -264529,3 +264532,4 @@ CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c
CVE-2024-9513,0,0,10f22e26d94cea8688c054ad49deba44171c8b07bc6c0d1de3fa45dd9ff56e5a,2024-10-04T13:50:43.727000
CVE-2024-9514,0,0,a53f44accfe30910c541c9413b06e85ad70baafde1404ed3bbfe26f781762e2e,2024-10-04T14:15:05.910000
CVE-2024-9515,0,0,61876f9f404131a68b50426992d9bacb784e56537f2a34f2232f3fbcd09a799e,2024-10-04T14:15:06.210000
CVE-2024-9528,1,1,a67033828dc64ab8097f9cad1507ec37a96a1d18a16a5e9dfac7c1b08408a02f,2024-10-05T03:15:02.447000

Can't render this file because it is too large.