mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-10-05T04:00:17.575723+00:00
This commit is contained in:
parent
13997a6d6e
commit
3387227c46
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23640",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T10:15:09.217",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-05T02:04:13.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mainwp:updraftplus_extension:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.0.7",
|
||||
"matchCriteriaId": "83604129-35D6-478A-AEF6-2FE027298C4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mainwp-updraftplus-extension/wordpress-mainwp-updraftplus-extension-plugin-4-0-6-subscriber-arbitrary-plugin-activation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31294",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T09:15:11.710",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-05T02:01:28.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:androidbubble:wp_sort_order:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.2",
|
||||
"matchCriteriaId": "6A634EE0-83A5-4ED4-931B-DC3F1E960176"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-sort-order/wordpress-wp-sort-order-plugin-1-3-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41715",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-26T18:15:05.950",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-05T02:16:15.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -85,8 +105,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -95,10 +125,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gotenna:atak_plugin:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0.7",
|
||||
"matchCriteriaId": "0339DE99-2478-48B6-9664-CB8847C5EE47"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45987",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-26T18:15:08.583",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-05T02:21:24.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "Projectworld Online Voting System Version 1.0 es vulnerable a Cross Site Request Forgery (CSRF) a trav\u00e9s de voter.php. Esta vulnerabilidad permite a un atacante crear un v\u00ednculo malicioso que, cuando un usuario autenticado hace clic en \u00e9l, env\u00eda autom\u00e1ticamente un voto para un partido espec\u00edfico sin el consentimiento o conocimiento del usuario. El ataque aprovecha la sesi\u00f3n activa del usuario para realizar la acci\u00f3n no autorizada, lo que compromete la integridad del proceso de votaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:online_voting_system_project:online_voting_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECC3B251-845F-4FE1-8A9E-FFF2DA5F88B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-45987",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-478xx/CVE-2024-47841.json
Normal file
86
CVE-2024/CVE-2024-478xx/CVE-2024-47841.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-47841",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2024-10-05T02:15:02.470",
|
||||
"lastModified": "2024-10-05T02:15:02.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Wikimedia Foundation Mediawiki - CSS Extension allows Path Traversal.This issue affects Mediawiki - CSS Extension: from 1.42.X before 1.42.2, from 1.41.X before 1.41.3, from 1.39.X before 1.39.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gerrit.wikimedia.org/r/q/I46613d8d50fc978bdac58e2b312ee03324c1edc8",
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T368628",
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T369486",
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8318",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-04T08:15:03.167",
|
||||
"lastModified": "2024-09-04T13:05:36.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-05T02:10:34.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,26 +71,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:websevendev:attributes_for_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.7",
|
||||
"matchCriteriaId": "F6A023E6-7A6C-4282-A04A-DD1353D78A52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/attributes-for-blocks/trunk/attributes-for-blocks.php#L246",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/attributes-for-blocks/trunk/attributes-for-blocks.php#L96",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fattributes-for-blocks&old=3066420&new_path=%2Fattributes-for-blocks&new=3144730&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/attributes-for-blocks/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a0101dd1-a9cb-4b9c-8299-9b808d7e1912?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-93xx/CVE-2024-9385.json
Normal file
64
CVE-2024/CVE-2024-93xx/CVE-2024-9385.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-9385",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-05T02:15:02.600",
|
||||
"lastModified": "2024-10-05T02:15:02.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Themify Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/themify-builder/tags/7.6.2/classes/class-themify-builder-model.php#L1121",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3162399/themify-builder/trunk/classes/class-themify-builder-model.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a83e68e0-1b5b-4fd5-be00-37b8f11144c4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-94xx/CVE-2024-9455.json
Normal file
60
CVE-2024/CVE-2024-94xx/CVE-2024-9455.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-9455",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-05T02:15:02.827",
|
||||
"lastModified": "2024-10-05T02:15:02.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Cleanup and Basic Functions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-cleanup-and-basic-functions/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/28bdaf44-6f2c-440a-a96f-bdcd71fb7bea?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-95xx/CVE-2024-9528.json
Normal file
68
CVE-2024/CVE-2024-95xx/CVE-2024-9528.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-9528",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-05T03:15:02.447",
|
||||
"lastModified": "2024-10-05T03:15:02.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms (administrator by default), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/fluentform/tags/5.1.17/app/Services/FormBuilder/Components/BaseComponent.php#L191",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/fluentform/tags/5.1.17/boot/globals.php#L342",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3125227/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ed4dfee-5f14-47ce-abed-cd226c110665?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-05T02:00:16.739737+00:00
|
||||
2024-10-05T04:00:17.575723+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-05T01:59:34.870000+00:00
|
||||
2024-10-05T03:15:02.447000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264530
|
||||
264534
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-47840](CVE-2024/CVE-2024-478xx/CVE-2024-47840.json) (`2024-10-05T01:15:12.107`)
|
||||
- [CVE-2024-47845](CVE-2024/CVE-2024-478xx/CVE-2024-47845.json) (`2024-10-05T01:15:12.237`)
|
||||
- [CVE-2024-47846](CVE-2024/CVE-2024-478xx/CVE-2024-47846.json) (`2024-10-05T01:15:12.360`)
|
||||
- [CVE-2024-47847](CVE-2024/CVE-2024-478xx/CVE-2024-47847.json) (`2024-10-05T01:15:12.493`)
|
||||
- [CVE-2024-47848](CVE-2024/CVE-2024-478xx/CVE-2024-47848.json) (`2024-10-05T00:15:02.800`)
|
||||
- [CVE-2024-47849](CVE-2024/CVE-2024-478xx/CVE-2024-47849.json) (`2024-10-05T01:15:12.610`)
|
||||
- [CVE-2024-47841](CVE-2024/CVE-2024-478xx/CVE-2024-47841.json) (`2024-10-05T02:15:02.470`)
|
||||
- [CVE-2024-9385](CVE-2024/CVE-2024-93xx/CVE-2024-9385.json) (`2024-10-05T02:15:02.600`)
|
||||
- [CVE-2024-9455](CVE-2024/CVE-2024-94xx/CVE-2024-9455.json) (`2024-10-05T02:15:02.827`)
|
||||
- [CVE-2024-9528](CVE-2024/CVE-2024-95xx/CVE-2024-9528.json) (`2024-10-05T03:15:02.447`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
- [CVE-2023-23639](CVE-2023/CVE-2023-236xx/CVE-2023-23639.json) (`2024-10-05T01:37:41.107`)
|
||||
- [CVE-2024-24142](CVE-2024/CVE-2024-241xx/CVE-2024-24142.json) (`2024-10-05T01:43:51.650`)
|
||||
- [CVE-2024-31098](CVE-2024/CVE-2024-310xx/CVE-2024-31098.json) (`2024-10-05T01:54:33.020`)
|
||||
- [CVE-2024-31246](CVE-2024/CVE-2024-312xx/CVE-2024-31246.json) (`2024-10-05T01:59:34.870`)
|
||||
- [CVE-2023-23640](CVE-2023/CVE-2023-236xx/CVE-2023-23640.json) (`2024-10-05T02:04:13.263`)
|
||||
- [CVE-2024-31294](CVE-2024/CVE-2024-312xx/CVE-2024-31294.json) (`2024-10-05T02:01:28.300`)
|
||||
- [CVE-2024-41715](CVE-2024/CVE-2024-417xx/CVE-2024-41715.json) (`2024-10-05T02:16:15.997`)
|
||||
- [CVE-2024-45987](CVE-2024/CVE-2024-459xx/CVE-2024-45987.json) (`2024-10-05T02:21:24.450`)
|
||||
- [CVE-2024-8318](CVE-2024/CVE-2024-83xx/CVE-2024-8318.json) (`2024-10-05T02:10:34.703`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
34
_state.csv
34
_state.csv
@ -217551,9 +217551,9 @@ CVE-2023-23635,0,0,235e2f9aaa4d81653a473f7bee2f02441220d52847a6b1d7757be3aabdf4b
|
||||
CVE-2023-23636,0,0,410bb48460364d685aab91b77723cbce62a06bf15d69ddb482938ccb37001a9c,2023-02-09T18:17:10.097000
|
||||
CVE-2023-23637,0,0,8303c2e888f4a7f7be3861e3dd96442a11d683fc03173c478fa0af6f4291768d,2023-01-25T02:29:20.367000
|
||||
CVE-2023-23638,0,0,c798c27985bf183b36d281532d811c42a95db85432ae20ee49e04ec4e03cbf8b,2023-11-07T04:07:50.990000
|
||||
CVE-2023-23639,0,1,609b39ace6a6dec0659c782fcf6da5dd20dad42cd06a4def317a7a1aa722e692,2024-10-05T01:37:41.107000
|
||||
CVE-2023-23639,0,0,609b39ace6a6dec0659c782fcf6da5dd20dad42cd06a4def317a7a1aa722e692,2024-10-05T01:37:41.107000
|
||||
CVE-2023-2364,0,0,ef2fa89d6009c2c0b9501247c770157813a8ca3461f78ce280790e9fc931b9dc,2024-05-17T02:22:53.063000
|
||||
CVE-2023-23640,0,0,52c029f8da519e17b4c063c6e818381f23891c0a5b5ebbafae7f51f9a64695d0,2024-06-10T02:52:08.267000
|
||||
CVE-2023-23640,0,1,3cbb88c0f5af99ec512e3dba8b675700fb698479049cd57ca836ed757a4e1fd6,2024-10-05T02:04:13.263000
|
||||
CVE-2023-23641,0,0,9e0bf1ea6e96cfa227eb36bfb2991b91b3191e168b28cc245f74934ce61a383b,2023-05-22T20:02:44.160000
|
||||
CVE-2023-23645,0,0,909a4faff18d07c3f737541bddbf0bd492484422035c2726de49e50d80365a67,2024-05-17T18:36:05.263000
|
||||
CVE-2023-23646,0,0,698f6d9b297a7cdc5bc16f33439d1b1197291570102d6e92f6330ae41b0473dc,2023-07-26T01:11:44.107000
|
||||
@ -246024,7 +246024,7 @@ CVE-2024-24139,0,0,4dd6b552efc790d6e4fc5177fe502190cd77df204ff2674bf30758cea1343
|
||||
CVE-2024-2414,0,0,e559d69a2c3dd3a2e6bd8562c1937f259ac43fd68bf13a707df585780b465d70,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24140,0,0,06b50a594cff842dbd90e39c1e22c08e1e093a981c73581fa665af8c1720c930,2024-02-02T23:36:15.563000
|
||||
CVE-2024-24141,0,0,d6f255186a2c01675b2020cecfbb11bf6576700e3a945d662b6d729e92dd7874,2024-08-23T20:35:07.950000
|
||||
CVE-2024-24142,0,1,123cf5f306d81afaa7a24b2888c09abe6abd0db37489dca6e3fe8a7055464279,2024-10-05T01:43:51.650000
|
||||
CVE-2024-24142,0,0,123cf5f306d81afaa7a24b2888c09abe6abd0db37489dca6e3fe8a7055464279,2024-10-05T01:43:51.650000
|
||||
CVE-2024-24146,0,0,9c2cf9272dc1c4cc753aeade919e09d1e623750808db8a2821060c90e942ffb8,2024-03-12T14:56:47.377000
|
||||
CVE-2024-24147,0,0,d7d3765ffc4bc6e492757c8676003b1fe530fd571b11041d382ca5eb228cfa6f,2024-08-29T20:36:09.463000
|
||||
CVE-2024-24148,0,0,bfd1569540166fc45b2fdd456d7db70573b5d670340909d4ee530837b395527c,2024-08-29T20:36:10.247000
|
||||
@ -250987,7 +250987,7 @@ CVE-2024-31094,0,0,96018b384dee14c4167dc62fa0fce59c729622c883102393ed22db19b370a
|
||||
CVE-2024-31095,0,0,31ed0388a12281d5a7978ac66f06a17c76e0891ba943bbf86daf64b5ed1eba59,2024-08-01T13:50:47.373000
|
||||
CVE-2024-31096,0,0,4270e5e66128cdab91811a0ce591a6eb33a08f957387696602f581ae0ed51dae,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31097,0,0,af09d47b9da9890511e00b9cb33e81e18545423fcf604be15b4f56a0320067e6,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31098,0,1,575269b926b2ab5203734875858ede91a25503d1903e96c2dfe82bc588e9c081,2024-10-05T01:54:33.020000
|
||||
CVE-2024-31098,0,0,575269b926b2ab5203734875858ede91a25503d1903e96c2dfe82bc588e9c081,2024-10-05T01:54:33.020000
|
||||
CVE-2024-31099,0,0,528ba98d88fb34d8f61e8485a4326c059785e996c72869ec228c224daf695f3d,2024-06-05T14:15:13.310000
|
||||
CVE-2024-3110,0,0,635900212764359abe4ce85d386db98d21740945c63dc9266eccccde33b65fe3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-31100,0,0,304afdd26a02a950739edd8b75999107f4a6aad6e328c60a5193227610b72d07,2024-04-01T01:12:59.077000
|
||||
@ -251122,7 +251122,7 @@ CVE-2024-31242,0,0,49ba26a59af8bb409e1c950e0e8a73428d316a8783fd9c4ee1094d2fcb13b
|
||||
CVE-2024-31243,0,0,a4770b09224b27878d600ef478159922afaf0a3de1b14e00591285cf5dc6a658,2024-06-10T02:52:08.267000
|
||||
CVE-2024-31244,0,0,2a410b2d2c4d07b14eaa7d1888986f3a25d1884ed48a2e19354efa2b399cb171,2024-06-10T02:52:08.267000
|
||||
CVE-2024-31245,0,0,e736cfe43bcd49ca5935c9d24ad7bd155165a06905550503e09b0ab4d8406da2,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31246,0,1,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000
|
||||
CVE-2024-31246,0,0,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000
|
||||
CVE-2024-31247,0,0,8bbc99c43f8e3737633a522b3db9397b4348dbfc851d17e37569d7dfdbe18a5a,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31248,0,0,366b0e0ab5cc0e63b32a3ade56db4e5e4ebc4a5173ee310ed0de32257133820f,2024-06-10T02:52:08.267000
|
||||
CVE-2024-31249,0,0,876c0987fa04efa87abc6f1e45d9e5e9801b02115d1bc7adc99a1b16136af95c,2024-04-10T19:49:51.183000
|
||||
@ -251175,7 +251175,7 @@ CVE-2024-31290,0,0,0f179f60c298c3b186585b91ce98871100ea32c9c7a621a2993d35ca67bdb
|
||||
CVE-2024-31291,0,0,c952666de994b16b43c7a33e04dca2ff218752cddd6e30ff48fef4e55e8982cf,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31292,0,0,3504dd44cc43ee78a8cd50949942b1dbb9d71a35bec54315a7d8b7561798c985,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31293,0,0,d20d156a0f8c87d673a5cdec66f54fecd5aa8889f6ab87bd7bd7bf0942a8285b,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31294,0,0,6924f8ec1a3da630d07fbd0673962ea0a063f941c88d46bd0cc630d997cbcb77,2024-06-10T02:52:08.267000
|
||||
CVE-2024-31294,0,1,d0a7d4843372e24e4cc04ee14520ab11080aa2c28445f84ac289e01a70efb681,2024-10-05T02:01:28.300000
|
||||
CVE-2024-31295,0,0,37dba956c7cb8ce01666b5ea152d0441b7649235a44c66cce9a88302fababc75,2024-05-17T18:36:05.263000
|
||||
CVE-2024-31296,0,0,dd2f2950324e5c8dc05ecfdeaf16703477baaedac80f2e8ee5c00844b0d341be,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31297,0,0,f6e46aa48a8ed8a8a82c7ddf5442e06c8e41c73375e1b3244f5db8687886d057,2024-04-10T19:49:51.183000
|
||||
@ -258162,7 +258162,7 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e
|
||||
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
|
||||
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
|
||||
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
|
||||
CVE-2024-41715,0,0,e39209f97fb107cb854f69c69d3465a7c8c1fe7039e1d43f377c1c5c61ce5810,2024-09-30T12:46:20.237000
|
||||
CVE-2024-41715,0,1,1e19e0d2e95094d001e574e5ec8e07025bc6520ada6d3a3d444b19001a84d7c8,2024-10-05T02:16:15.997000
|
||||
CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000
|
||||
CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000
|
||||
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
|
||||
@ -260414,7 +260414,7 @@ CVE-2024-45983,0,0,47a651db6002a6bfd3e82bafffaac1886e81f4692dc67d6e4d2483e3dc577
|
||||
CVE-2024-45984,0,0,829531605b75a351fb56301753b24a33b57031b7baaa6c10937b46d15b07e739,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45985,0,0,91f6b11d4a0e69e50043609710335a2e6ecb9c0b2023813e0b5e8a7a41eb0525,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45986,0,0,a85d3ec3755f724362fff27a6a522f83d6b30d560b1ead4324df3dd3027d06bf,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45987,0,0,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe849a3,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45987,0,1,f32b18c92e6963d060ce6ae4c06d24935f9488838fb2d7a9da7659071011b899,2024-10-05T02:21:24.450000
|
||||
CVE-2024-45989,0,0,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45993,0,0,350b08a6cc2d250cbd03f88d3d0b93865e2ed8a596686ac9cdf0d0569cd66a5b,2024-10-04T13:51:25.567000
|
||||
@ -261075,12 +261075,13 @@ CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cf
|
||||
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000
|
||||
CVE-2024-47840,1,1,2af3bee25b1702c6dc0adb76f7b5b59a4851969bef12b213034c47b48b258b47,2024-10-05T01:15:12.107000
|
||||
CVE-2024-47845,1,1,635ba9bccad8551fc613f2e237296c21ce817ceedb4be2a9be383ddcc98a411f,2024-10-05T01:15:12.237000
|
||||
CVE-2024-47846,1,1,0adcd7063b2395a255cabd8e399537ae86a6a3562396b07a91b6e9c6e645b7d7,2024-10-05T01:15:12.360000
|
||||
CVE-2024-47847,1,1,8bb581ee5c6b46cd381ad9ae39d7ff2309c88adf7df1ab8b12d4cb89a0115fa3,2024-10-05T01:15:12.493000
|
||||
CVE-2024-47848,1,1,a8d9e5826f088dd7367761196783fbe30c91acacdacc8b98fb63040872d425b0,2024-10-05T00:15:02.800000
|
||||
CVE-2024-47849,1,1,e612f88d1833059215a939c83e368b34dfa5fc835db277bbd2bbf0c7eac17b1a,2024-10-05T01:15:12.610000
|
||||
CVE-2024-47840,0,0,2af3bee25b1702c6dc0adb76f7b5b59a4851969bef12b213034c47b48b258b47,2024-10-05T01:15:12.107000
|
||||
CVE-2024-47841,1,1,e32c6a2687c1cf875cccdae8a34e0555fe82273a17ace5908bee3b8a19718fea,2024-10-05T02:15:02.470000
|
||||
CVE-2024-47845,0,0,635ba9bccad8551fc613f2e237296c21ce817ceedb4be2a9be383ddcc98a411f,2024-10-05T01:15:12.237000
|
||||
CVE-2024-47846,0,0,0adcd7063b2395a255cabd8e399537ae86a6a3562396b07a91b6e9c6e645b7d7,2024-10-05T01:15:12.360000
|
||||
CVE-2024-47847,0,0,8bb581ee5c6b46cd381ad9ae39d7ff2309c88adf7df1ab8b12d4cb89a0115fa3,2024-10-05T01:15:12.493000
|
||||
CVE-2024-47848,0,0,a8d9e5826f088dd7367761196783fbe30c91acacdacc8b98fb63040872d425b0,2024-10-05T00:15:02.800000
|
||||
CVE-2024-47849,0,0,e612f88d1833059215a939c83e368b34dfa5fc835db277bbd2bbf0c7eac17b1a,2024-10-05T01:15:12.610000
|
||||
CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000
|
||||
CVE-2024-47850,0,0,b94b4a035c672b5cc3cb108d7976af3088d3b8701a5b4002ee130c9907165d1d,2024-10-04T15:35:05.463000
|
||||
CVE-2024-47854,0,0,49d2ff5f872bf97be36179db2ff9e4fbf51aef335df0b5e21b4774e5fd43bf87,2024-10-04T13:50:43.727000
|
||||
@ -263951,7 +263952,7 @@ CVE-2024-8310,0,0,7c8549a7a64d3579b34aa56e199885805550ab7f5a2102b636629253bc8a75
|
||||
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
|
||||
CVE-2024-8316,0,0,3b475263f4e092896f126b94bae35b22c4bf5a5b5af6a3f22b6258e0c397de01,2024-10-03T01:01:37.380000
|
||||
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
|
||||
CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
|
||||
CVE-2024-8318,0,1,1b5c2a7dc9b75888f87897ddfaf12f7c73553720d33dcd65ceff4420ae5bb680,2024-10-05T02:10:34.703000
|
||||
CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000
|
||||
CVE-2024-8320,0,0,67cff6908a40f6de0a5d55f45cee63784fe7b54f56159b5877dcd792142b0c2f,2024-09-12T21:51:58.960000
|
||||
CVE-2024-8321,0,0,595129502821252825346a9a34e636ff1fd5806e1274bb50a0e529e9f41ab2d6,2024-09-12T21:53:22.677000
|
||||
@ -264497,6 +264498,7 @@ CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044a
|
||||
CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9378,0,0,7a8325e6b9b9ab5f87224c3f7949059cac46c7e9016e933e1570af8b9833e04e,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9385,1,1,25145b57342f5b34ee7029dc6487a689ca1bdddfcf7cbc091b96c1c491d1b304,2024-10-05T02:15:02.600000
|
||||
CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9393,0,0,96bdaf874ad6083dd8fd8845ba7fe8bf267c5ff001eb7dd6e7d50847bf69aa1b,2024-10-04T13:51:25.567000
|
||||
@ -264521,6 +264523,7 @@ CVE-2024-9435,0,0,dd30383dc280040df042a11097fa6cc76ccaa80c55710936c096ba1dc41cad
|
||||
CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9455,1,1,e56132275ab5f83c0555e60cbf6c95a62b60c6ca9fa821a9c8c48f4cfb3933ca,2024-10-05T02:15:02.827000
|
||||
CVE-2024-9460,0,0,b1e465c88eb90ead630b69c31ba7996284434b6d6cb7ca81e044245f760d2699,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000
|
||||
@ -264529,3 +264532,4 @@ CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c
|
||||
CVE-2024-9513,0,0,10f22e26d94cea8688c054ad49deba44171c8b07bc6c0d1de3fa45dd9ff56e5a,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9514,0,0,a53f44accfe30910c541c9413b06e85ad70baafde1404ed3bbfe26f781762e2e,2024-10-04T14:15:05.910000
|
||||
CVE-2024-9515,0,0,61876f9f404131a68b50426992d9bacb784e56537f2a34f2232f3fbcd09a799e,2024-10-04T14:15:06.210000
|
||||
CVE-2024-9528,1,1,a67033828dc64ab8097f9cad1507ec37a96a1d18a16a5e9dfac7c1b08408a02f,2024-10-05T03:15:02.447000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user