mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 02:00:53 +00:00
Auto-Update: 2024-11-13T05:00:21.193253+00:00
This commit is contained in:
parent
65e6c46f74
commit
48ac196a3e
64
CVE-2024/CVE-2024-101xx/CVE-2024-10174.json
Normal file
64
CVE-2024/CVE-2024-101xx/CVE-2024-10174.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10174",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T04:15:03.553",
|
||||
"lastModified": "2024-11-13T04:15:03.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.6.13 via the 'Abstract_Permission' class due to missing validation on the 'user_id' user controlled key. This makes it possible for unauthenticated attackers to spoof their identity to that of an administrator and access all of the plugins REST routes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wedevs-project-manager/trunk/core/Permissions/Abstract_Permission.php#L32",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3185807/wedevs-project-manager/trunk/core/Permissions/Abstract_Permission.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dea2d045-d3b4-4b55-8b4f-5baa82a18834?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-105xx/CVE-2024-10529.json
Normal file
64
CVE-2024/CVE-2024-105xx/CVE-2024-10529.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10529",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:03.700",
|
||||
"lastModified": "2024-11-13T03:15:03.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_assistant() function in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete GTP assistants."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php#L575",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3183413/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6b302c9-a6b9-4a91-acb5-2ad270817606?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-105xx/CVE-2024-10530.json
Normal file
64
CVE-2024/CVE-2024-105xx/CVE-2024-10530.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10530",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:03.923",
|
||||
"lastModified": "2024-11-13T03:15:03.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the add_new_assistant() function in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to create new GTP assistants."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php#L596",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3183413/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4fd7e76-4d8b-4e4d-9ae9-c7f9933f8324?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-105xx/CVE-2024-10531.json
Normal file
64
CVE-2024/CVE-2024-105xx/CVE-2024-10531.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10531",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:04.153",
|
||||
"lastModified": "2024-11-13T03:15:04.153",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_assistant() function in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to update GTP assistants."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php#L524",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3183413/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc083470-3b43-42f3-8979-7fa6cce6ee75?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-105xx/CVE-2024-10593.json
Normal file
64
CVE-2024/CVE-2024-105xx/CVE-2024-10593.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10593",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:04.370",
|
||||
"lastModified": "2024-11-13T03:15:04.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WPForms \u2013 Easy Form Builder for WordPress \u2013 Contact Forms, Payment Forms, Surveys, & More plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.1.6. This is due to missing or incorrect nonce validation on the process_admin_ui function. This makes it possible for unauthenticated attackers to delete WPForm logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wpforms-lite/tags/1.9.1.6/src/Admin/Tools/Views/Logs.php#L269",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wpforms-lite/tags/1.9.1.6/src/Logger/ListTable.php#L394",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d1ea80a-a1ce-4964-8dde-f3ed2df5537c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-106xx/CVE-2024-10684.json
Normal file
60
CVE-2024/CVE-2024-106xx/CVE-2024-10684.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10684",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:04.600",
|
||||
"lastModified": "2024-11-13T03:15:04.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dir' parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3183413/chatbot-chatgpt/trunk/includes/settings/chatbot-settings-support.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6fcd334-4d9a-4c11-ab11-b96cdda698c4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-107xx/CVE-2024-10794.json
Normal file
60
CVE-2024/CVE-2024-107xx/CVE-2024-10794.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10794",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T04:15:03.850",
|
||||
"lastModified": "2024-11-13T04:15:03.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.6 via the 'bhf' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3185478/boostify-header-footer-builder/trunk/inc/class-boostify-header-footer-builder.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e9f6d07-5ba5-48ad-bfcc-084913436b39?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-108xx/CVE-2024-10802.json
Normal file
60
CVE-2024/CVE-2024-108xx/CVE-2024-10802.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10802",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T04:15:04.087",
|
||||
"lastModified": "2024-11-13T04:15:04.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Hash Elements plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the hash_elements_get_posts_title_by_id() function in all versions up to, and including, 1.4.7. This makes it possible for unauthenticated attackers to retrieve draft post titles that should not be accessible to unauthenticated users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3186151%40hash-elements&new=3186151%40hash-elements&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/010590bc-98fb-4afe-9c5e-80ad4c50a34e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-108xx/CVE-2024-10816.json
Normal file
60
CVE-2024/CVE-2024-108xx/CVE-2024-10816.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10816",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T04:15:04.300",
|
||||
"lastModified": "2024-11-13T04:15:04.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LUNA RADIO PLAYER plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.24.01.24 via the js/fallback.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://radioplayer.luna-universe.com/update",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/544f71f5-1798-40fd-9f55-c25dae4f557a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-108xx/CVE-2024-10820.json
Normal file
60
CVE-2024/CVE-2024-108xx/CVE-2024-10820.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10820",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T04:15:04.510",
|
||||
"lastModified": "2024-11-13T04:15:04.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 84.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/woocommerce-upload-files/11442983",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9371b37-53c5-4a4f-a500-c6d58d4d3c5a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-108xx/CVE-2024-10828.json
Normal file
64
CVE-2024/CVE-2024-108xx/CVE-2024-10828.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10828",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T04:15:04.727",
|
||||
"lastModified": "2024-11-13T04:15:04.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order export when the \"Try to convert serialized values\" option is enabled. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woo-order-export-lite/trunk/classes/PHPExcel/Shared/XMLWriter.php#L83",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woo-order-export-lite/trunk/classes/core/trait-woe-core-extractor.php#L996",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a1c6eed6-7b3f-4b37-85f8-6613527daa54?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-108xx/CVE-2024-10882.json
Normal file
64
CVE-2024/CVE-2024-108xx/CVE-2024-10882.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10882",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:04.833",
|
||||
"lastModified": "2024-11-13T03:15:04.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Product Delivery Date for WooCommerce \u2013 Lite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.8.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/product-delivery-date-for-woocommerce-lite/tags/2.7.5/includes/admin/class-prdd-lite-view-deliveries-table.php#L129",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3185534%40product-delivery-date-for-woocommerce-lite&new=3185534%40product-delivery-date-for-woocommerce-lite&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e47daed-42cc-4d96-82a1-a3e65af9fa88?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-111xx/CVE-2024-11143.json
Normal file
60
CVE-2024/CVE-2024-111xx/CVE-2024-11143.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11143",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-13T03:15:05.110",
|
||||
"lastModified": "2024-11-13T03:15:05.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.8. This is due to missing or incorrect nonce validation on the update_assistant, add_new_assistant, and delete_assistant functions. This makes it possible for unauthenticated attackers to modify assistants via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3185255/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f16b11b0-11df-4fb7-a6af-123f6c09d791?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-89xx/CVE-2024-8933.json
Normal file
100
CVE-2024/CVE-2024-89xx/CVE-2024-8933.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-8933",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-11-13T04:15:05.037",
|
||||
"lastModified": "2024-11-13T04:15:05.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel\nvulnerability exists that could cause retrieval of password hash that could lead to denial of service and loss of\nconfidentiality and integrity of controllers. To be successful, the attacker needs to inject themself inside the\nlogical network while a valid user uploads or downloads a project file into the controller."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-924"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-02/SEVD-2024-317-02.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-13T03:00:19.818925+00:00
|
||||
2024-11-13T05:00:21.193253+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-13T02:15:20.547000+00:00
|
||||
2024-11-13T04:15:05.037000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
269447
|
||||
269461
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `38`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-32839](CVE-2024/CVE-2024-328xx/CVE-2024-32839.json) (`2024-11-13T02:15:16.380`)
|
||||
- [CVE-2024-32841](CVE-2024/CVE-2024-328xx/CVE-2024-32841.json) (`2024-11-13T02:15:16.567`)
|
||||
- [CVE-2024-32844](CVE-2024/CVE-2024-328xx/CVE-2024-32844.json) (`2024-11-13T02:15:16.733`)
|
||||
- [CVE-2024-32847](CVE-2024/CVE-2024-328xx/CVE-2024-32847.json) (`2024-11-13T02:15:16.890`)
|
||||
- [CVE-2024-34780](CVE-2024/CVE-2024-347xx/CVE-2024-34780.json) (`2024-11-13T02:15:17.047`)
|
||||
- [CVE-2024-34781](CVE-2024/CVE-2024-347xx/CVE-2024-34781.json) (`2024-11-13T02:15:17.210`)
|
||||
- [CVE-2024-34782](CVE-2024/CVE-2024-347xx/CVE-2024-34782.json) (`2024-11-13T02:15:17.367`)
|
||||
- [CVE-2024-34784](CVE-2024/CVE-2024-347xx/CVE-2024-34784.json) (`2024-11-13T02:15:17.527`)
|
||||
- [CVE-2024-34787](CVE-2024/CVE-2024-347xx/CVE-2024-34787.json) (`2024-11-13T02:15:17.687`)
|
||||
- [CVE-2024-37376](CVE-2024/CVE-2024-373xx/CVE-2024-37376.json) (`2024-11-13T02:15:17.850`)
|
||||
- [CVE-2024-37398](CVE-2024/CVE-2024-373xx/CVE-2024-37398.json) (`2024-11-13T02:15:18.003`)
|
||||
- [CVE-2024-37400](CVE-2024/CVE-2024-374xx/CVE-2024-37400.json) (`2024-11-13T02:15:18.163`)
|
||||
- [CVE-2024-38649](CVE-2024/CVE-2024-386xx/CVE-2024-38649.json) (`2024-11-13T02:15:18.337`)
|
||||
- [CVE-2024-38654](CVE-2024/CVE-2024-386xx/CVE-2024-38654.json) (`2024-11-13T02:15:18.490`)
|
||||
- [CVE-2024-38655](CVE-2024/CVE-2024-386xx/CVE-2024-38655.json) (`2024-11-13T02:15:18.650`)
|
||||
- [CVE-2024-38656](CVE-2024/CVE-2024-386xx/CVE-2024-38656.json) (`2024-11-13T02:15:18.830`)
|
||||
- [CVE-2024-39709](CVE-2024/CVE-2024-397xx/CVE-2024-39709.json) (`2024-11-13T02:15:18.993`)
|
||||
- [CVE-2024-39710](CVE-2024/CVE-2024-397xx/CVE-2024-39710.json) (`2024-11-13T02:15:19.150`)
|
||||
- [CVE-2024-39711](CVE-2024/CVE-2024-397xx/CVE-2024-39711.json) (`2024-11-13T02:15:19.317`)
|
||||
- [CVE-2024-39712](CVE-2024/CVE-2024-397xx/CVE-2024-39712.json) (`2024-11-13T02:15:19.480`)
|
||||
- [CVE-2024-8874](CVE-2024/CVE-2024-88xx/CVE-2024-8874.json) (`2024-11-13T02:15:19.647`)
|
||||
- [CVE-2024-8985](CVE-2024/CVE-2024-89xx/CVE-2024-8985.json) (`2024-11-13T02:15:19.890`)
|
||||
- [CVE-2024-9426](CVE-2024/CVE-2024-94xx/CVE-2024-9426.json) (`2024-11-13T02:15:20.120`)
|
||||
- [CVE-2024-9578](CVE-2024/CVE-2024-95xx/CVE-2024-9578.json) (`2024-11-13T02:15:20.340`)
|
||||
- [CVE-2024-9614](CVE-2024/CVE-2024-96xx/CVE-2024-9614.json) (`2024-11-13T02:15:20.547`)
|
||||
- [CVE-2024-10174](CVE-2024/CVE-2024-101xx/CVE-2024-10174.json) (`2024-11-13T04:15:03.553`)
|
||||
- [CVE-2024-10529](CVE-2024/CVE-2024-105xx/CVE-2024-10529.json) (`2024-11-13T03:15:03.700`)
|
||||
- [CVE-2024-10530](CVE-2024/CVE-2024-105xx/CVE-2024-10530.json) (`2024-11-13T03:15:03.923`)
|
||||
- [CVE-2024-10531](CVE-2024/CVE-2024-105xx/CVE-2024-10531.json) (`2024-11-13T03:15:04.153`)
|
||||
- [CVE-2024-10593](CVE-2024/CVE-2024-105xx/CVE-2024-10593.json) (`2024-11-13T03:15:04.370`)
|
||||
- [CVE-2024-10684](CVE-2024/CVE-2024-106xx/CVE-2024-10684.json) (`2024-11-13T03:15:04.600`)
|
||||
- [CVE-2024-10794](CVE-2024/CVE-2024-107xx/CVE-2024-10794.json) (`2024-11-13T04:15:03.850`)
|
||||
- [CVE-2024-10802](CVE-2024/CVE-2024-108xx/CVE-2024-10802.json) (`2024-11-13T04:15:04.087`)
|
||||
- [CVE-2024-10816](CVE-2024/CVE-2024-108xx/CVE-2024-10816.json) (`2024-11-13T04:15:04.300`)
|
||||
- [CVE-2024-10820](CVE-2024/CVE-2024-108xx/CVE-2024-10820.json) (`2024-11-13T04:15:04.510`)
|
||||
- [CVE-2024-10828](CVE-2024/CVE-2024-108xx/CVE-2024-10828.json) (`2024-11-13T04:15:04.727`)
|
||||
- [CVE-2024-10882](CVE-2024/CVE-2024-108xx/CVE-2024-10882.json) (`2024-11-13T03:15:04.833`)
|
||||
- [CVE-2024-11143](CVE-2024/CVE-2024-111xx/CVE-2024-11143.json) (`2024-11-13T03:15:05.110`)
|
||||
- [CVE-2024-8933](CVE-2024/CVE-2024-89xx/CVE-2024-8933.json) (`2024-11-13T04:15:05.037`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `39`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-34682](CVE-2024/CVE-2024-346xx/CVE-2024-34682.json) (`2024-11-13T00:56:23.533`)
|
||||
- [CVE-2024-43293](CVE-2024/CVE-2024-432xx/CVE-2024-43293.json) (`2024-11-13T01:19:49.207`)
|
||||
- [CVE-2024-43296](CVE-2024/CVE-2024-432xx/CVE-2024-43296.json) (`2024-11-13T01:19:33.737`)
|
||||
- [CVE-2024-43297](CVE-2024/CVE-2024-432xx/CVE-2024-43297.json) (`2024-11-13T01:19:15.837`)
|
||||
- [CVE-2024-43298](CVE-2024/CVE-2024-432xx/CVE-2024-43298.json) (`2024-11-13T01:19:00.477`)
|
||||
- [CVE-2024-43302](CVE-2024/CVE-2024-433xx/CVE-2024-43302.json) (`2024-11-13T01:18:45.093`)
|
||||
- [CVE-2024-43310](CVE-2024/CVE-2024-433xx/CVE-2024-43310.json) (`2024-11-13T01:15:24.813`)
|
||||
- [CVE-2024-43312](CVE-2024/CVE-2024-433xx/CVE-2024-43312.json) (`2024-11-13T01:13:26.633`)
|
||||
- [CVE-2024-43314](CVE-2024/CVE-2024-433xx/CVE-2024-43314.json) (`2024-11-13T01:25:37.903`)
|
||||
- [CVE-2024-43323](CVE-2024/CVE-2024-433xx/CVE-2024-43323.json) (`2024-11-13T01:25:20.223`)
|
||||
- [CVE-2024-43332](CVE-2024/CVE-2024-433xx/CVE-2024-43332.json) (`2024-11-13T01:25:08.657`)
|
||||
- [CVE-2024-43341](CVE-2024/CVE-2024-433xx/CVE-2024-43341.json) (`2024-11-13T01:24:56.943`)
|
||||
- [CVE-2024-43343](CVE-2024/CVE-2024-433xx/CVE-2024-43343.json) (`2024-11-13T01:24:44.467`)
|
||||
- [CVE-2024-43355](CVE-2024/CVE-2024-433xx/CVE-2024-43355.json) (`2024-11-13T01:24:34.157`)
|
||||
- [CVE-2024-43451](CVE-2024/CVE-2024-434xx/CVE-2024-43451.json) (`2024-11-13T02:00:01.323`)
|
||||
- [CVE-2024-43923](CVE-2024/CVE-2024-439xx/CVE-2024-43923.json) (`2024-11-13T01:24:18.850`)
|
||||
- [CVE-2024-43925](CVE-2024/CVE-2024-439xx/CVE-2024-43925.json) (`2024-11-13T01:23:41.317`)
|
||||
- [CVE-2024-43932](CVE-2024/CVE-2024-439xx/CVE-2024-43932.json) (`2024-11-13T01:23:26.613`)
|
||||
- [CVE-2024-48039](CVE-2024/CVE-2024-480xx/CVE-2024-48039.json) (`2024-11-13T01:20:55.087`)
|
||||
- [CVE-2024-48044](CVE-2024/CVE-2024-480xx/CVE-2024-48044.json) (`2024-11-13T01:20:35.917`)
|
||||
- [CVE-2024-48045](CVE-2024/CVE-2024-480xx/CVE-2024-48045.json) (`2024-11-13T01:20:11.327`)
|
||||
- [CVE-2024-49039](CVE-2024/CVE-2024-490xx/CVE-2024-49039.json) (`2024-11-13T02:00:01.323`)
|
||||
- [CVE-2024-49403](CVE-2024/CVE-2024-494xx/CVE-2024-49403.json) (`2024-11-13T00:55:55.913`)
|
||||
- [CVE-2024-49404](CVE-2024/CVE-2024-494xx/CVE-2024-49404.json) (`2024-11-13T00:55:09.857`)
|
||||
- [CVE-2024-50122](CVE-2024/CVE-2024-501xx/CVE-2024-50122.json) (`2024-11-13T01:06:36.360`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
168
_state.csv
168
_state.csv
@ -66488,7 +66488,7 @@ CVE-2014-2116,0,0,7f4c0a5a9ba818702fecf4ad94d6b79c56fa970de259bad7e52d57e6601d8d
|
||||
CVE-2014-2117,0,0,744be558787fc734743db5fb08a2f104e326248eca1df2541936e657776f0211,2015-09-16T19:14:51.373000
|
||||
CVE-2014-2118,0,0,d9c523cd8458c23ad4f67136e8abd038df8311fabdee2ee882e82595957c6524,2015-09-16T19:15:13.013000
|
||||
CVE-2014-2119,0,0,dc59e4b20e1cb6a86521df22d9afd3d7bf9a254360551160345301637ac028ed,2018-10-30T16:27:22.513000
|
||||
CVE-2014-2120,0,1,1fca1f0e822c5ca1caaba4ff4ed7c399fc91dd4626e8ff3a777ff058ec4cc5f7,2024-11-13T02:00:01.313000
|
||||
CVE-2014-2120,0,0,1fca1f0e822c5ca1caaba4ff4ed7c399fc91dd4626e8ff3a777ff058ec4cc5f7,2024-11-13T02:00:01.313000
|
||||
CVE-2014-2121,0,0,4afd2d28e42c18f0900f208743e465831fa3c8ab3ebc9ca414773139091c6201,2016-09-07T18:12:06.607000
|
||||
CVE-2014-2122,0,0,dbb6dbf5774baace51218f4cf4f2a00e09f23a90b7e8640df5ad1439a89ab10a,2017-08-29T01:34:29.327000
|
||||
CVE-2014-2124,0,0,3586bbe7c97b507b4cf47d1d50fb4baf8f4a4def2f13cc87faaf14b676b4a63c,2017-08-29T01:34:29.390000
|
||||
@ -171701,7 +171701,7 @@ CVE-2021-26082,0,0,0dc3d9ccd828c4a8758df38110e688698200af9c0035a3012ace93ee51ae6
|
||||
CVE-2021-26083,0,0,d3a7d29a3a38b4dc9eddd6c5555b9b2f95a558a4ab11a36abea202d9eea7c32e,2022-03-30T13:29:50.080000
|
||||
CVE-2021-26084,0,0,a1656afe81933b1c8c3923e4e66d77b668a59c557cdd4f7efcbaa6552d4b0288,2023-08-08T14:21:49.707000
|
||||
CVE-2021-26085,0,0,11f3b4177eb8408d0910a3035774b54a0a29f0e5252269407ccd5f909211d083,2023-08-08T14:22:24.967000
|
||||
CVE-2021-26086,0,1,1762110afd458527e4ccf2d6e2afe380da038748fc8ead355e6b0951490e19ab,2024-11-13T02:00:01.323000
|
||||
CVE-2021-26086,0,0,1762110afd458527e4ccf2d6e2afe380da038748fc8ead355e6b0951490e19ab,2024-11-13T02:00:01.323000
|
||||
CVE-2021-26088,0,0,18b02b5f3440df38db64fa8dfdb7678844c837abccb395a9e4d54f83924742c9,2021-08-02T17:48:37.477000
|
||||
CVE-2021-26089,0,0,8b742860ae453e0ed338e655cc73a13e4754396bfee05f9d1b2f874fc3120824,2022-03-30T15:35:48.173000
|
||||
CVE-2021-26090,0,0,914f3b63c4c051b830b9c7ec11628d2c8542a82ededc67fd3e52331171fbfe56,2021-07-13T19:26:47.023000
|
||||
@ -182992,7 +182992,7 @@ CVE-2021-41273,0,0,22e981aee79a348369e6e5b3f2497890c0a09379e3ccaa557c238e411f479
|
||||
CVE-2021-41274,0,0,4801618226ef6fbd844f77722a17f1e42970ce0c91d00a645240ebe68d63b64c,2021-11-24T04:48:51.327000
|
||||
CVE-2021-41275,0,0,72eb6df0fbcd7b4b48e3b6b2df9cb79483c7c6eff6a80d8a317843eef2fb750e,2023-11-07T03:38:54.657000
|
||||
CVE-2021-41276,0,0,43f81f5c7bb44a3c557f7a7bb580e9098875eaf18fdc9e9065580d13a87b3821,2022-08-09T13:23:00.167000
|
||||
CVE-2021-41277,0,1,c903edff6a2dfa148b7d6a581e1a45324874f1b66cf91cff6405459f4556bf40,2024-11-13T02:00:01.323000
|
||||
CVE-2021-41277,0,0,c903edff6a2dfa148b7d6a581e1a45324874f1b66cf91cff6405459f4556bf40,2024-11-13T02:00:01.323000
|
||||
CVE-2021-41278,0,0,289b80fe51b1c67efe7b1583a091c1f915296c53ddca752bce8dbe149f38e5f0,2021-11-23T01:47:31.917000
|
||||
CVE-2021-41279,0,0,1f37e7cb41cf65453652600ba5a1a3695ff0082e2d6673cbad05397db69478b0,2021-11-30T17:05:29.827000
|
||||
CVE-2021-4128,0,0,f5d2c0e7f9c9c0649cd1484b0b14d626395ccd5d19597f1376cbec60506c7e74,2023-01-03T20:07:34.583000
|
||||
@ -242430,7 +242430,7 @@ CVE-2024-10028,0,0,f9a508d4d31fc5aa6bf47732ecd8ef48088e5477a69151059c3d12ba29536
|
||||
CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000
|
||||
CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625cc1e,2024-10-30T18:50:04.137000
|
||||
CVE-2024-10035,0,0,149fd437256c7326392dd9f0a4c81622d030f2559876097c7b7b88c5cf49cb8e,2024-11-08T15:11:25.837000
|
||||
CVE-2024-10038,1,1,fa40f78ff8b5d0128c01f5a264fddff0e89752e01de551497b3dfca1ee239fa3,2024-11-13T02:15:13.570000
|
||||
CVE-2024-10038,0,0,fa40f78ff8b5d0128c01f5a264fddff0e89752e01de551497b3dfca1ee239fa3,2024-11-13T02:15:13.570000
|
||||
CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000
|
||||
CVE-2024-10040,0,0,7b56aeaf06debaabcdf1e140476d580d2600dab38558a586b77601e247b0f5d1,2024-11-01T18:26:23.450000
|
||||
CVE-2024-10041,0,0,84d8ce30154162363e09c3091fde15f6211b29d9d4fc2c8eacdac19cc287d124,2024-11-12T21:15:10.467000
|
||||
@ -242520,6 +242520,7 @@ CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc0581197
|
||||
CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000
|
||||
CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000
|
||||
CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
|
||||
CVE-2024-10174,1,1,9807bb358c26b24a2ff04acb66625a11807e577d18aaa0a98bbb882bd92a103e,2024-11-13T04:15:03.553000
|
||||
CVE-2024-10176,0,0,142987a8f419783b163ba6354525e6bb8e3054620537017112986773c0d037e4,2024-10-25T12:56:07.750000
|
||||
CVE-2024-10179,0,0,b6f906bf2251f6ec1278434f5e59f81c6d3b24bc371546ed64bbf189a1c8b783,2024-11-12T13:55:21.227000
|
||||
CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000
|
||||
@ -242751,7 +242752,10 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
|
||||
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
||||
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10529,1,1,84ecb254a24b568669a894e1b78ecb90b47df7a444eae376718ed3efe4d3e42b,2024-11-13T03:15:03.700000
|
||||
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
|
||||
CVE-2024-10530,1,1,eb3d6b187200587035bd6161353ae958de61da35350030d7e509e8724dc73140,2024-11-13T03:15:03.923000
|
||||
CVE-2024-10531,1,1,f769cc79ad6c534282d1821bd61ffa225c3443ea27b258168645c884602bd164,2024-11-13T03:15:04.153000
|
||||
CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000
|
||||
CVE-2024-10538,0,0,4ab251483fb21027e3e4f8d5203aec3b7b19274377f176e91d194b41d48f7f4e,2024-11-12T13:55:21.227000
|
||||
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
|
||||
@ -242768,12 +242772,13 @@ CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca532512
|
||||
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
|
||||
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
|
||||
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10577,1,1,666be720c41d5a9b892f1e5087fcf53fa7b2599f140df5e0e9540e263492fb77,2024-11-13T02:15:13.807000
|
||||
CVE-2024-10577,0,0,666be720c41d5a9b892f1e5087fcf53fa7b2599f140df5e0e9540e263492fb77,2024-11-13T02:15:13.807000
|
||||
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10586,0,0,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000
|
||||
CVE-2024-10588,0,0,c2bcaed6fe7b435f43e9c22f77453914df70e3466f4c66fa7dbe7829c2fb6e04,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10589,0,0,a6d8f39b47e9cb3150ad138c8d50791b37f1119d54a24371f819b9a1d868ac19,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
|
||||
CVE-2024-10593,1,1,8c8ca3f93fd2e22a86706eef81490a21474414bc7113101b63c11678b8b8e881,2024-11-13T03:15:04.370000
|
||||
CVE-2024-10594,0,0,015abb205f2a621c92b02e8c535085d082f03901ef52c99004ce024df21aac90,2024-11-05T17:05:10.533000
|
||||
CVE-2024-10595,0,0,d179e6b790ca43e523540de6b39a763d6d0e5ba29d81ee639fa2f43517880b37,2024-11-01T20:57:26.027000
|
||||
CVE-2024-10596,0,0,e577a1bc49113e32decc51f28cd54bd130c95b97448380193826560332b3fbe2,2024-11-05T16:20:13.623000
|
||||
@ -242804,7 +242809,7 @@ CVE-2024-10621,0,0,be1e03a4177ce290a2933b649deef1a5a206c547833b9b659dec2fc68dba2
|
||||
CVE-2024-10625,0,0,a861353b7c6a629a6c9ef44266f89dd01b131fe5b27428b83cc2cb051db74b0e,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10626,0,0,0fd3170b789cad36b0ee942eee22dc1080f7cc47b829e7b9eea0fcdf0e0c0c4a,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10627,0,0,dd31dbe632ffa95c00548e45679996b70b15cd01d1f2c43a8b8a598b1f25f37f,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10629,1,1,ef8d1f9c743474b0f2ced6729c9e5f7d8d38bae37478f1ba7dccd69f4de99ae6,2024-11-13T02:15:14.027000
|
||||
CVE-2024-10629,0,0,ef8d1f9c743474b0f2ced6729c9e5f7d8d38bae37478f1ba7dccd69f4de99ae6,2024-11-13T02:15:14.027000
|
||||
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
|
||||
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
|
||||
CVE-2024-10640,0,0,ac7ef83b735eb08b750b4180f25c0a9a90933cf1f06dab6672ff07257389aab2,2024-11-12T13:56:24.513000
|
||||
@ -242833,8 +242838,9 @@ CVE-2024-10674,0,0,d16f584849190e67ddd9b044fe809cc53716f0604b4d903c0b675313c791d
|
||||
CVE-2024-10676,0,0,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a5b0,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
|
||||
CVE-2024-10683,0,0,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10684,1,1,9a15fe26470cb3594a779cc7fc949e34c96068bf04ab8f50698274923381c597,2024-11-13T03:15:04.600000
|
||||
CVE-2024-10685,0,0,735dc2f0f480642d8ccf07f78f6e1a8d59da145d42e7702cb885b90e2b756411,2024-11-12T13:55:21.227000
|
||||
CVE-2024-10686,1,1,f502f5abde4193c2fae938b3c4e276a47bbba1bd951c43d6c4cd1095cda79281,2024-11-13T02:15:14.243000
|
||||
CVE-2024-10686,0,0,f502f5abde4193c2fae938b3c4e276a47bbba1bd951c43d6c4cd1095cda79281,2024-11-13T02:15:14.243000
|
||||
CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000
|
||||
CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
|
||||
@ -242851,7 +242857,7 @@ CVE-2024-10702,0,0,1494650cf24141bf55e997b208eb307166b880baeab6c7ba81f17c35396d7
|
||||
CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10711,0,0,667b67eedaf55d76b13f0d67159b73016c214e768164f9d0df569a4659871c82,2024-11-07T17:04:37.663000
|
||||
CVE-2024-10715,0,0,a0586864202123c788b39c9152d7bb58a990061badde7177b34380925db28d59,2024-11-08T20:25:37.380000
|
||||
CVE-2024-10717,1,1,990b941134f7539f2cfde85d2bf393c2a39e1032519db8948e9c67c458483cb3,2024-11-13T02:15:14.450000
|
||||
CVE-2024-10717,0,0,990b941134f7539f2cfde85d2bf393c2a39e1032519db8948e9c67c458483cb3,2024-11-13T02:15:14.450000
|
||||
CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000
|
||||
CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000
|
||||
CVE-2024-10730,0,0,8808b0788cc1226811ed98f049f4208abdd990eebdc310df0fd93dc6dcaba5d0,2024-11-04T16:42:33.607000
|
||||
@ -242895,14 +242901,16 @@ CVE-2024-10766,0,0,e35f492b9f66f3ec904d31d42b260648e53321433ee2cae35a4e477e4ef29
|
||||
CVE-2024-10768,0,0,594fbdf596dfab7cfec85356d137af72f3f7c97c4f287c31f07abfe79e0c4dc2,2024-11-06T15:04:45.200000
|
||||
CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000
|
||||
CVE-2024-10770,0,0,0f5897dd9aba481faece95da66f5bd3d6a2ccff92cbfd04ce22fd4f1ffbf1962,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10778,1,1,be5ab6a5e87c1429abe9d9c5f66b1168fffe296a6cbc1af6fce71638c4bc569f,2024-11-13T02:15:14.663000
|
||||
CVE-2024-10778,0,0,be5ab6a5e87c1429abe9d9c5f66b1168fffe296a6cbc1af6fce71638c4bc569f,2024-11-13T02:15:14.663000
|
||||
CVE-2024-10779,0,0,03484221afac3766470b5ced8d3332eee24d28c027104d12405179c89d30afec,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
|
||||
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
|
||||
CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000
|
||||
CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000
|
||||
CVE-2024-10794,1,1,9aedb5d5a837b6a4aae4f6df6c1311122cf364773be589456106d1c965d21ec5,2024-11-13T04:15:03.850000
|
||||
CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10801,0,0,3a88e665dce12d6cd350c00c6be6179e940c16e7a45bcfb9cfdce8ce89fd3527,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10802,1,1,d2c57e0122763ae368273d9d2d5d1af019a62dab8642e4b104a20b3bdfb16c06,2024-11-13T04:15:04.087000
|
||||
CVE-2024-10805,0,0,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000
|
||||
CVE-2024-10806,0,0,e15ec6423ae1ad698fb4ad5b42c94e3a5d06fef4f5e8a29e70adae83dbef0510,2024-11-06T15:06:48.493000
|
||||
CVE-2024-10807,0,0,783f0ac6c475ea7fcbd6f31f293edee7b9729e4af159ee9eb5bd3f13eec67953,2024-11-06T15:07:09.930000
|
||||
@ -242911,10 +242919,13 @@ CVE-2024-10809,0,0,ea652f7f5676144619aa1801e4ca90f6a805fad57a8917b37e98b94898936
|
||||
CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000
|
||||
CVE-2024-10810,0,0,24dc4cb4af16bbf52a3428afcf948782067630e0ddcd0604e4c08419e6e83436,2024-11-06T15:16:12.497000
|
||||
CVE-2024-10814,0,0,895125174ba4aa7c23fdeb954976ebdf264a7eadd4d29cafe1df1a629d7d5976,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10816,1,1,1d00a9e29329198c03e88271ebcd4eebf2b82e4b3056436568377c0ab67311fa,2024-11-13T04:15:04.300000
|
||||
CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000
|
||||
CVE-2024-10820,1,1,4621fc270b141dfa183e03c33607634be82169c048d38ee5e65242109f9b1a90,2024-11-13T04:15:04.510000
|
||||
CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000
|
||||
CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000
|
||||
CVE-2024-10828,1,1,1f31b8aebed8f05536c63b9e9d005dbce820954812ca28c5de369c7110757b2b,2024-11-13T04:15:04.727000
|
||||
CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10837,0,0,c80ee8e64cd911e3ab2efc7873524bd8e71ebc0fc7365371148c92b52a8b267a,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10839,0,0,959999d7d9e7ad6c83b2a659b5f94ea06306dfe2c58a8ebc0b6485e885f4cafa,2024-11-08T19:01:03.880000
|
||||
@ -242925,17 +242936,18 @@ CVE-2024-10842,0,0,7aeafb02fa0f31956e4616acda70affdbdea4445fee41471b949ff3589528
|
||||
CVE-2024-10844,0,0,ab92f6f85407dca15cb1e5a84778b8d496e0601ae883a0bd7f3db6703a1b0447,2024-11-06T22:38:13.800000
|
||||
CVE-2024-10845,0,0,e23b6836533b6527e69274c9897179b623fe8ac43fca2950e064d79cbfdb6f9f,2024-11-06T22:38:03.347000
|
||||
CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000
|
||||
CVE-2024-10850,1,1,99c22b6a50785f6d40d2d3afb8aee892be0aa1ecd1812d771a9c84f4c2215b67,2024-11-13T02:15:14.873000
|
||||
CVE-2024-10851,1,1,42a3aad238ad62713639cf42eda8be5cc29f62e1b4836293f006441be6f7c5f5,2024-11-13T02:15:15.090000
|
||||
CVE-2024-10852,1,1,1e42a0c525a09be81ce6ada69af24f1c391e050aed4e47c2f7b00e72c6de92eb,2024-11-13T02:15:15.303000
|
||||
CVE-2024-10853,1,1,89aaf3421b71c7c806805b0d51610f9ff03f1f1e18381ebc44441b8829e134fa,2024-11-13T02:15:15.503000
|
||||
CVE-2024-10854,1,1,422a1c89185e19ac37fbcef86989ef019b70811533958d05f15e8d1c178406aa,2024-11-13T02:15:15.717000
|
||||
CVE-2024-10850,0,0,99c22b6a50785f6d40d2d3afb8aee892be0aa1ecd1812d771a9c84f4c2215b67,2024-11-13T02:15:14.873000
|
||||
CVE-2024-10851,0,0,42a3aad238ad62713639cf42eda8be5cc29f62e1b4836293f006441be6f7c5f5,2024-11-13T02:15:15.090000
|
||||
CVE-2024-10852,0,0,1e42a0c525a09be81ce6ada69af24f1c391e050aed4e47c2f7b00e72c6de92eb,2024-11-13T02:15:15.303000
|
||||
CVE-2024-10853,0,0,89aaf3421b71c7c806805b0d51610f9ff03f1f1e18381ebc44441b8829e134fa,2024-11-13T02:15:15.503000
|
||||
CVE-2024-10854,0,0,422a1c89185e19ac37fbcef86989ef019b70811533958d05f15e8d1c178406aa,2024-11-13T02:15:15.717000
|
||||
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
|
||||
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
|
||||
CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df78257a,2024-03-05T13:41:01.900000
|
||||
CVE-2024-10887,1,1,3d1b4b6378b89b428ecf12faa130eeb81dcca25e4463c5b93f30a098ddbdea5d,2024-11-13T02:15:15.930000
|
||||
CVE-2024-10882,1,1,7d4405eff6f9dac8cb9f1956b30643c2f7d54860fa2ec6300bbb5c9ec09af24b,2024-11-13T03:15:04.833000
|
||||
CVE-2024-10887,0,0,3d1b4b6378b89b428ecf12faa130eeb81dcca25e4463c5b93f30a098ddbdea5d,2024-11-13T02:15:15.930000
|
||||
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
|
||||
@ -242973,21 +242985,21 @@ CVE-2024-10969,0,0,34fb384baf8f9b6070297fa30997eac3a4fc91278070bd97f872695ea721a
|
||||
CVE-2024-10971,0,0,b4b82dfc872fef33ddffdd14312b6666aaa239c31cf44b5ba468870e23f38075,2024-11-12T17:15:06.870000
|
||||
CVE-2024-10975,0,0,f38693c9a402e208f0de21f91edcefa5c1f789073d3e380787ea5dd138f197fa,2024-11-08T19:01:03.880000
|
||||
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
|
||||
CVE-2024-10987,0,1,3d92aa33c7cd82b5da2d8627d31a00cc6f3627f00f3b6f252e968a08d3bf860d,2024-11-13T00:58:55.400000
|
||||
CVE-2024-10988,0,1,6d214b682ab0622d06c1c4f694c05924f3acdece53f5429fbbce41d026ca23b5,2024-11-13T00:59:17.867000
|
||||
CVE-2024-10989,0,1,1b4f905eda4958eac87015d8dbff6168d0e3098d937762941916947c71256edc,2024-11-13T00:59:42.403000
|
||||
CVE-2024-10987,0,0,3d92aa33c7cd82b5da2d8627d31a00cc6f3627f00f3b6f252e968a08d3bf860d,2024-11-13T00:58:55.400000
|
||||
CVE-2024-10988,0,0,6d214b682ab0622d06c1c4f694c05924f3acdece53f5429fbbce41d026ca23b5,2024-11-13T00:59:17.867000
|
||||
CVE-2024-10989,0,0,1b4f905eda4958eac87015d8dbff6168d0e3098d937762941916947c71256edc,2024-11-13T00:59:42.403000
|
||||
CVE-2024-1099,0,0,60fc16226818d332b7b359f2f2234cb026357af6ad05031d156ab3f490bb4021,2024-05-17T02:35:14.133000
|
||||
CVE-2024-10990,0,0,6a10ddd21afec926ace36545d1c9e984738b6ea30e52d2522fac31da403a3b05,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10991,0,0,e57295838ecd1670d4fe14d7945fe7c3da732066791e84b5b7389c6a195881d7,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10993,0,0,7206cf6142982e85355f271e8aa716072abf4161e0799aa2f6e97fb5c15d5fbc,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10994,0,0,bb671e509513a2c6397bcf7eedd3395cb15ec032b2149050a0421bf7ae205cbb,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10995,0,1,0039b708eaf356bdd3026a467dff8b15f99cb5620149fa8f01160fd1078f6ed3,2024-11-13T01:00:57.873000
|
||||
CVE-2024-10996,0,1,89248f706ed3af37a1fd9ad09eaccf188804bc8f3d25b2957099405fa0af3f03,2024-11-13T01:03:05.833000
|
||||
CVE-2024-10997,0,1,17bb04b8e503cf00e71c65154e5342a332a1b8eb7d8a3add7203d54e7972c55f,2024-11-13T01:03:14.830000
|
||||
CVE-2024-10998,0,1,c1d0d5576e5b5ac9af53ae18f32585f399df56f20f18f57ee7d18eb4fae4d147,2024-11-13T01:03:25.173000
|
||||
CVE-2024-10999,0,1,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2441,2024-11-13T01:05:34.293000
|
||||
CVE-2024-10995,0,0,0039b708eaf356bdd3026a467dff8b15f99cb5620149fa8f01160fd1078f6ed3,2024-11-13T01:00:57.873000
|
||||
CVE-2024-10996,0,0,89248f706ed3af37a1fd9ad09eaccf188804bc8f3d25b2957099405fa0af3f03,2024-11-13T01:03:05.833000
|
||||
CVE-2024-10997,0,0,17bb04b8e503cf00e71c65154e5342a332a1b8eb7d8a3add7203d54e7972c55f,2024-11-13T01:03:14.830000
|
||||
CVE-2024-10998,0,0,c1d0d5576e5b5ac9af53ae18f32585f399df56f20f18f57ee7d18eb4fae4d147,2024-11-13T01:03:25.173000
|
||||
CVE-2024-10999,0,0,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2441,2024-11-13T01:05:34.293000
|
||||
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
|
||||
CVE-2024-11000,0,1,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000
|
||||
CVE-2024-11000,0,0,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000
|
||||
CVE-2024-11004,0,0,bdd615d7fc4237dd1e34b18175b7a4bd23ea93fdaf86a550ff5db989d73c3b40,2024-11-12T17:15:06.943000
|
||||
CVE-2024-11005,0,0,6625a7034e44e3470d0593f642bc7d15f05d206a40a9f5a10fb4cb5474d25cf2,2024-11-12T17:15:07.130000
|
||||
CVE-2024-11006,0,0,68e6bf66f299a92baed5e7aaa3945d18465ada80a70b895680302f34e929ef13,2024-11-12T17:15:07.333000
|
||||
@ -243062,6 +243074,7 @@ CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f4
|
||||
CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11138,0,0,880c841f831a3231f2a2e94e0c11fd28807c2a95758488ce39dcd6a3792cc342,2024-11-12T18:15:17.543000
|
||||
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
|
||||
CVE-2024-11143,1,1,d9bd3e061a34fe222acf87765c7b6d97ccebfd919c962519007b92b102043708,2024-11-13T03:15:05.110000
|
||||
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
|
||||
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
||||
CVE-2024-11168,0,0,6bafd96897b3226ed611ffe9fe0aef0ffd1fe7c02cbdbf638c6784e11ae3129b,2024-11-12T22:15:14.920000
|
||||
@ -250831,7 +250844,7 @@ CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074
|
||||
CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000
|
||||
CVE-2024-2921,0,0,db69ed599921b3347a9e090088ac60a033292b080a263fe6dc6a7861e5eadd49,2024-11-07T16:35:16.250000
|
||||
CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000
|
||||
CVE-2024-29211,1,1,b33cbab79b2c1452e692b6fc982b5f51df7c45ebd89c89df476d71954f6fbeaf,2024-11-13T02:15:16.150000
|
||||
CVE-2024-29211,0,0,b33cbab79b2c1452e692b6fc982b5f51df7c45ebd89c89df476d71954f6fbeaf,2024-11-13T02:15:16.150000
|
||||
CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000
|
||||
CVE-2024-29213,0,0,923c285048ea8e8ada1ec8fc14c3379597d106a93dc5f7c0191835b40c0543ad,2024-10-21T18:35:11.263000
|
||||
CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000
|
||||
@ -253470,15 +253483,15 @@ CVE-2024-32833,0,0,b251b4f8fe4dba495c950e90dbb25a178e9b5789b8f999b1d382e6170a624
|
||||
CVE-2024-32834,0,0,97599c5c014b164caaac46faf02e3adeddddd6e841bed406870b8707da4aa493,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32835,0,0,fc292842100527900bf0d1c703a8349fdd7fc48d6ac327e0d92cfb86815d727a,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32836,0,0,c5fcecde1d31672603e6b98cee8f2b00770cad10996bf26cae90650302e2a97a,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32839,1,1,8b1ebd5c622d710f196b46dfc836aef986180a82ddf78de14edb950144ec239b,2024-11-13T02:15:16.380000
|
||||
CVE-2024-32839,0,0,8b1ebd5c622d710f196b46dfc836aef986180a82ddf78de14edb950144ec239b,2024-11-13T02:15:16.380000
|
||||
CVE-2024-32840,0,0,eb1cb5bdef91a06948a0079a32b9f011b54621eea9c3c109934852c6d6ab5100,2024-09-12T22:35:01.747000
|
||||
CVE-2024-32841,1,1,59a5f1fc85076472704a9dd70c092872a8946d76c4a36962f9871454f77a2ba0,2024-11-13T02:15:16.567000
|
||||
CVE-2024-32841,0,0,59a5f1fc85076472704a9dd70c092872a8946d76c4a36962f9871454f77a2ba0,2024-11-13T02:15:16.567000
|
||||
CVE-2024-32842,0,0,e2bf6f1d85652bf244fee9887cdca6c5cbf7305ac99f2a16758ec8aaefdd6ad9,2024-09-12T22:35:02.527000
|
||||
CVE-2024-32843,0,0,6f4ea6e06ccef21595e961665854f0ab53277f4d5d037839ce9d6a5a11f4a382,2024-09-12T22:35:03.333000
|
||||
CVE-2024-32844,1,1,1f73b00ddb06d58e070abc0b71232ed5e4dc911553bd3d668d12f221a92ab442,2024-11-13T02:15:16.733000
|
||||
CVE-2024-32844,0,0,1f73b00ddb06d58e070abc0b71232ed5e4dc911553bd3d668d12f221a92ab442,2024-11-13T02:15:16.733000
|
||||
CVE-2024-32845,0,0,76ca372c6bdaa2a56f8e052d99168f11baf61d9fbc3f0f778a3615e8dd8aae22,2024-09-12T22:35:04.037000
|
||||
CVE-2024-32846,0,0,9dec1a2ab8dd3bd3abe2879738f59e0fe2ad565f7847d781df8e65635f276d45,2024-09-12T22:35:04.737000
|
||||
CVE-2024-32847,1,1,60dfbc0047a10642d95aa05470d8eb8e81a0fb237dac29fe08f258d524a1c7b0,2024-11-13T02:15:16.890000
|
||||
CVE-2024-32847,0,0,60dfbc0047a10642d95aa05470d8eb8e81a0fb237dac29fe08f258d524a1c7b0,2024-11-13T02:15:16.890000
|
||||
CVE-2024-32848,0,0,9ef3b117d0043f546b1d5d06f5102b31e14873c57fb58430ccae17a9afbbba15,2024-09-12T22:35:05.437000
|
||||
CVE-2024-32849,0,0,2dff3f0f8458f9bc03b8b89ff3ed496d4d9a414f0ec65647eae66f330eefae8c,2024-07-03T01:57:09.160000
|
||||
CVE-2024-3285,0,0,1ef5c367ccecf316e1895071bcc508779dcf2b19a0822ab0b89afcd5bbef04ef,2024-04-11T12:47:44.137000
|
||||
@ -253503,7 +253516,7 @@ CVE-2024-32867,0,0,5753d2fa0aea693f0e3bd6a10cde5e73ef612564cad64279a88ae35cadec2
|
||||
CVE-2024-32868,0,0,2b261352b98ef068e4c3a1dc7bd9890450dc7582cc1875b68d4f6675a70c87c7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32869,0,0,69becb8131b51a67986aa1e24b4ccea1d69cd7e659280280f6d26b43d75dfd33,2024-04-24T13:39:42.883000
|
||||
CVE-2024-3287,0,0,81c3e92cb525adf74a229ae8f4dc096d97ad8021a63134e1a741f1327c99a33a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-32870,0,1,8be5db4ab4510436070c8275459f35229ae900586a0998a90a6c16eec2d4b903,2024-11-13T01:07:24.057000
|
||||
CVE-2024-32870,0,0,8be5db4ab4510436070c8275459f35229ae900586a0998a90a6c16eec2d4b903,2024-11-13T01:07:24.057000
|
||||
CVE-2024-32871,0,0,c0389a284947a3f025a08761a37fdb67fc665da6d219972d0c888cc5d32f0801,2024-06-10T21:07:12.030000
|
||||
CVE-2024-32872,0,0,dd2fffea9672a216dbcdde4c4a274554beaeb36e5143b921e2a822ba0dc44c31,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32873,0,0,0ff9ac0dc6e337547d76cd6798c23a9cd2a1d3d981e083768193a558e753694d,2024-10-15T19:22:33.647000
|
||||
@ -254818,7 +254831,7 @@ CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e4
|
||||
CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000
|
||||
CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000
|
||||
CVE-2024-34672,0,0,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000
|
||||
CVE-2024-34673,0,1,c3639eb3906afac3da3ef7196d07fc5e3abaeb4e8282f05a27193eb5277b55cf,2024-11-13T00:56:39.077000
|
||||
CVE-2024-34673,0,0,c3639eb3906afac3da3ef7196d07fc5e3abaeb4e8282f05a27193eb5277b55cf,2024-11-13T00:56:39.077000
|
||||
CVE-2024-34674,0,0,6db49eb94e9b436eebb5ac220cc4d275009cd7fd336993987f387575b81bd4b2,2024-11-12T16:08:56.463000
|
||||
CVE-2024-34675,0,0,892df28b69656f69365a7f8edc71187489e44c6810037789232a9b103c622a2c,2024-11-12T16:08:22.760000
|
||||
CVE-2024-34676,0,0,df9adda1a41a0cbaab93a9021708d73f1a05c18677018cfcb6bc6ec91d4684ea,2024-11-12T15:31:08.867000
|
||||
@ -254828,7 +254841,7 @@ CVE-2024-34679,0,0,563019ead4b642cddeb5252c9e4ae0dd09e3c21cb5939b7438c2a740788ef
|
||||
CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-34680,0,0,12a76f66aacec2683c917e4fae09c1bf140017e6e48295370847dc703f71717a,2024-11-12T16:04:08.997000
|
||||
CVE-2024-34681,0,0,74e83c108d86c9c111ba1513170d8663aad0047805851f01eef53e1e70cada33,2024-11-06T18:17:17.287000
|
||||
CVE-2024-34682,0,1,1cd2e4602f33865d83ead70e9e25da9f59f656a0622c0e0c937ce9243f2e724c,2024-11-13T00:56:23.533000
|
||||
CVE-2024-34682,0,0,1cd2e4602f33865d83ead70e9e25da9f59f656a0622c0e0c937ce9243f2e724c,2024-11-13T00:56:23.533000
|
||||
CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000
|
||||
CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000
|
||||
CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9a4c,2024-08-29T19:29:14.440000
|
||||
@ -254916,14 +254929,14 @@ CVE-2024-34773,0,0,100b1cb449b7ae251f86bd995ac4446f704b2d5bcbff0a59ab0bc97995491
|
||||
CVE-2024-34777,0,0,47369db5c522c34e9489779523e2c10406821ae54d821b2c269278d042fde193,2024-06-21T15:58:51.410000
|
||||
CVE-2024-34779,0,0,61552efe08011b21d4ca3c0787e9337089cecf0917e51cf3275efb7daf3d34a0,2024-09-12T22:35:06.133000
|
||||
CVE-2024-3478,0,0,d6058a0e6db67f9fedb470e62fc4a04776cf84b327b4bd61639e707b408d963f,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34780,1,1,d0edcf2e4c58e13a14453475ee16f1ec7db4d5e6a4298b280a3a8f2d4f28eca4,2024-11-13T02:15:17.047000
|
||||
CVE-2024-34781,1,1,aaf6e10ae48b7f693532834e858d166f3e7578c579c108a89da8b60f3d842e67,2024-11-13T02:15:17.210000
|
||||
CVE-2024-34782,1,1,036aa472d2fa62c78483641935ccaaa48d29ff4a0084e8c62ef35d3b829eeed5,2024-11-13T02:15:17.367000
|
||||
CVE-2024-34780,0,0,d0edcf2e4c58e13a14453475ee16f1ec7db4d5e6a4298b280a3a8f2d4f28eca4,2024-11-13T02:15:17.047000
|
||||
CVE-2024-34781,0,0,aaf6e10ae48b7f693532834e858d166f3e7578c579c108a89da8b60f3d842e67,2024-11-13T02:15:17.210000
|
||||
CVE-2024-34782,0,0,036aa472d2fa62c78483641935ccaaa48d29ff4a0084e8c62ef35d3b829eeed5,2024-11-13T02:15:17.367000
|
||||
CVE-2024-34783,0,0,8e797f6029d617a56e1c6f1f1918a1e4455d0290f25703ce46a4f7b85500efbb,2024-09-12T22:35:06.833000
|
||||
CVE-2024-34784,1,1,d3f160ae483fab7927ff4eea52b860a05632347f0bcd746db0bed872cea5e167,2024-11-13T02:15:17.527000
|
||||
CVE-2024-34784,0,0,d3f160ae483fab7927ff4eea52b860a05632347f0bcd746db0bed872cea5e167,2024-11-13T02:15:17.527000
|
||||
CVE-2024-34785,0,0,dcae8597d9f4b510b7061d4ca939a94b110916d8e3408a1a1d169ddc89ed2b96,2024-09-12T22:35:07.533000
|
||||
CVE-2024-34786,0,0,7e8cb80185704202113f9da64eeb79cd413e4b998d966b2b2f4137b8800de467,2024-07-09T18:19:14.047000
|
||||
CVE-2024-34787,1,1,862a19cf306fa8413246bc08b5820855828248b9f5c865c82cf998dffee59ae1,2024-11-13T02:15:17.687000
|
||||
CVE-2024-34787,0,0,862a19cf306fa8413246bc08b5820855828248b9f5c865c82cf998dffee59ae1,2024-11-13T02:15:17.687000
|
||||
CVE-2024-34788,0,0,d3400f02a32ab882f9673e171c113d7d87e605c008eb11cc936f5027941a3e18,2024-08-12T18:52:25.127000
|
||||
CVE-2024-34789,0,0,4f72636ebbc4b0b39015d14b70eb26533195de09d45d80202a2d9d74dbf95795,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3479,0,0,2087dca9a48cf75ca53b3d034f436013bdbf676fd8cbe9ff75bcea8a2c85c808,2024-05-03T15:32:19.637000
|
||||
@ -256789,7 +256802,7 @@ CVE-2024-3737,0,0,26f370727648bebdbdb4484feb8794c0f4f6f501db44738bd488af3fc5030b
|
||||
CVE-2024-37370,0,0,5ef18b52731aa6f5eafd2b79804cbfc14d163aeb3b01f2fe5bcb0ee8a51881e9,2024-08-27T17:48:12.297000
|
||||
CVE-2024-37371,0,0,4cdd749ff266141800fa6b979153fdf9a5acf4b51a71786349ea587f3d8acccd,2024-09-18T12:39:04.477000
|
||||
CVE-2024-37373,0,0,26dc5e4538b7cd09464c61fb65e8031c578a3247488f84f82c407880c1c7486b,2024-08-15T17:31:32.407000
|
||||
CVE-2024-37376,1,1,58cd14031a42936b75d9fc497d906c6a7a4bd6aefead9a497111e3a2682a1709,2024-11-13T02:15:17.850000
|
||||
CVE-2024-37376,0,0,58cd14031a42936b75d9fc497d906c6a7a4bd6aefead9a497111e3a2682a1709,2024-11-13T02:15:17.850000
|
||||
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
|
||||
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000
|
||||
@ -256806,10 +256819,10 @@ CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62a
|
||||
CVE-2024-37392,0,0,aacf1862268af2cdf1c4491d7b5ae4c041bcfa60748ed52139bf258567ef92c9,2024-10-27T14:35:09.803000
|
||||
CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000
|
||||
CVE-2024-37397,0,0,7fbcc51c6b175128d4a712387aaad70ff152c7c1c439f81c942699a1e4599add,2024-09-13T16:35:09.630000
|
||||
CVE-2024-37398,1,1,aecccff13e2f3bf9a768ff7b05d594a39c1c6993003ad0f78360315df1f995e1,2024-11-13T02:15:18.003000
|
||||
CVE-2024-37398,0,0,aecccff13e2f3bf9a768ff7b05d594a39c1c6993003ad0f78360315df1f995e1,2024-11-13T02:15:18.003000
|
||||
CVE-2024-37399,0,0,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf5e4,2024-08-15T17:31:49.067000
|
||||
CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000
|
||||
CVE-2024-37400,1,1,ee9301a0fc091ff3361584ec473d4685f6d54b5435f9c23e04191fef59bfdc7d,2024-11-13T02:15:18.163000
|
||||
CVE-2024-37400,0,0,ee9301a0fc091ff3361584ec473d4685f6d54b5435f9c23e04191fef59bfdc7d,2024-11-13T02:15:18.163000
|
||||
CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000
|
||||
CVE-2024-37404,0,0,a9ac90f11e155ac4d0d36b2a91e96a4497dd1cae869575802b2f49a891e5af01,2024-10-21T17:10:22.857000
|
||||
CVE-2024-37405,0,0,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000
|
||||
@ -257797,15 +257810,15 @@ CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c4
|
||||
CVE-2024-38640,0,0,f894436174ccc1cc2e08bbc67fcba0414dc6b13ebdf107dda01c02078b396724,2024-09-16T12:27:22.747000
|
||||
CVE-2024-38641,0,0,8a7b88c9ff752db6c85379c2610078ab5ea82aa0cd968ba97ac893cb265a7390,2024-09-16T12:35:23.713000
|
||||
CVE-2024-38642,0,0,f8d0ecee472de6a33388f4e82db0802ffe48c291af3b4f5b7db26d6f668db8b3,2024-09-16T12:33:13.277000
|
||||
CVE-2024-38649,1,1,dfb710e8154e6f7a1fbabc2e557a1b5d2e754490ccaca1995101b0b5d8e9064c,2024-11-13T02:15:18.337000
|
||||
CVE-2024-38649,0,0,dfb710e8154e6f7a1fbabc2e557a1b5d2e754490ccaca1995101b0b5d8e9064c,2024-11-13T02:15:18.337000
|
||||
CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
|
||||
CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000
|
||||
CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000
|
||||
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
|
||||
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
|
||||
CVE-2024-38654,1,1,d35cd6ede81f2eca26a257b51e16c69269752327f1258e41d2e25d32142b439b,2024-11-13T02:15:18.490000
|
||||
CVE-2024-38655,1,1,01074d7445cff7f6fb2c117de5b9ea259956e50c40d52617253fde2fc8eab47f,2024-11-13T02:15:18.650000
|
||||
CVE-2024-38656,1,1,0d5cc02f2270888719ace688aee0c469a2a987dd306d1f17056d07d57cb2a83c,2024-11-13T02:15:18.830000
|
||||
CVE-2024-38654,0,0,d35cd6ede81f2eca26a257b51e16c69269752327f1258e41d2e25d32142b439b,2024-11-13T02:15:18.490000
|
||||
CVE-2024-38655,0,0,01074d7445cff7f6fb2c117de5b9ea259956e50c40d52617253fde2fc8eab47f,2024-11-13T02:15:18.650000
|
||||
CVE-2024-38656,0,0,0d5cc02f2270888719ace688aee0c469a2a987dd306d1f17056d07d57cb2a83c,2024-11-13T02:15:18.830000
|
||||
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
|
||||
CVE-2024-3866,0,0,7a39485bd1345ca492dd2d645f7c31281d1cbae5daa389ff1a3811c5ea0b474f,2024-10-02T18:26:59.520000
|
||||
CVE-2024-38661,0,0,b3548dc9d015869558d5e6ce591bb61c7302091308e2952841787fdc0fd16368,2024-09-03T18:03:36.033000
|
||||
@ -258544,11 +258557,11 @@ CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e
|
||||
CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
|
||||
CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000
|
||||
CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000
|
||||
CVE-2024-39709,1,1,75a505fee8a5b25544041d34621267093e9bf690e3e83e5fde669be525889640,2024-11-13T02:15:18.993000
|
||||
CVE-2024-39709,0,0,75a505fee8a5b25544041d34621267093e9bf690e3e83e5fde669be525889640,2024-11-13T02:15:18.993000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
CVE-2024-39710,1,1,782aa75e505d6ce166dc40d71e99c4773f76a0579a901e152a2e1973dc9c5c3e,2024-11-13T02:15:19.150000
|
||||
CVE-2024-39711,1,1,673c0cea545e57f22d930dd1b2afd85ad609612085ca0553e213d464272a0a5d,2024-11-13T02:15:19.317000
|
||||
CVE-2024-39712,1,1,e8c0439a49b1051254bf5c1cb1721313c53c8e0af01bae14e3593cd0b637e078,2024-11-13T02:15:19.480000
|
||||
CVE-2024-39710,0,0,782aa75e505d6ce166dc40d71e99c4773f76a0579a901e152a2e1973dc9c5c3e,2024-11-13T02:15:19.150000
|
||||
CVE-2024-39711,0,0,673c0cea545e57f22d930dd1b2afd85ad609612085ca0553e213d464272a0a5d,2024-11-13T02:15:19.317000
|
||||
CVE-2024-39712,0,0,e8c0439a49b1051254bf5c1cb1721313c53c8e0af01bae14e3593cd0b637e078,2024-11-13T02:15:19.480000
|
||||
CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000
|
||||
CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000
|
||||
CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
|
||||
@ -260756,17 +260769,17 @@ CVE-2024-4329,0,0,915fdd462793e35dddcb6a188ef6774a9ebc56a526b1b0698bddaf3c23ba3b
|
||||
CVE-2024-43290,0,0,893e4306374e98783736e0e99f9ba013f142eb7accd94641c67d5be4dd981fb6,2024-11-01T20:24:53.730000
|
||||
CVE-2024-43291,0,0,fb50f3403a5239357eaa4233d35fbbdf0287b954bbd3c034bc45e3a17c6909ae,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43292,0,0,a73011f291a9642d1b2f2b537dc2970614132291a2af4b6cb40910bb0d866545,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43293,0,1,5e52216879f90060a8d855cc10a924c8896d7cc28bcee267c5b49484b4802007,2024-11-13T01:19:49.207000
|
||||
CVE-2024-43293,0,0,5e52216879f90060a8d855cc10a924c8896d7cc28bcee267c5b49484b4802007,2024-11-13T01:19:49.207000
|
||||
CVE-2024-43294,0,0,115da993f44036adfff3784c8efce939e5d53bb4f7ab07ebab66e86a98521dda,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43295,0,0,4c992084e199b514575e8ec2d873a4ef1cccca3f4f5df0b2e67e418aab98a634,2024-09-12T21:20:43.847000
|
||||
CVE-2024-43296,0,1,0b4089da78b1db23d98ab08f55b2ddee172e3888b2455f513cc376dca65cd661,2024-11-13T01:19:33.737000
|
||||
CVE-2024-43297,0,1,448ee090a5985298b915963dd05b1c3a8f71b03a8c3417b7bbf3e3257cc7ef2d,2024-11-13T01:19:15.837000
|
||||
CVE-2024-43298,0,1,7319ec3458972726af94fd49856c11cde812bcde82f7879051e00e58fba129a7,2024-11-13T01:19:00.477000
|
||||
CVE-2024-43296,0,0,0b4089da78b1db23d98ab08f55b2ddee172e3888b2455f513cc376dca65cd661,2024-11-13T01:19:33.737000
|
||||
CVE-2024-43297,0,0,448ee090a5985298b915963dd05b1c3a8f71b03a8c3417b7bbf3e3257cc7ef2d,2024-11-13T01:19:15.837000
|
||||
CVE-2024-43298,0,0,7319ec3458972726af94fd49856c11cde812bcde82f7879051e00e58fba129a7,2024-11-13T01:19:00.477000
|
||||
CVE-2024-43299,0,0,519d081700ab3294f398a4287727657f1b1d3ae45286cab56afe1bc9702f1fca,2024-09-12T21:23:30.647000
|
||||
CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000
|
||||
CVE-2024-43300,0,0,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000
|
||||
CVE-2024-43301,0,0,36517c64264e25162f6a8960592c6f8ac4f28ee2609d1e9f07cf9e006ea49e2a,2024-09-12T21:24:20.563000
|
||||
CVE-2024-43302,0,1,028d13ab941ffaa51130c9efeae32048c683fc3f9a97be1f9a9ec0818362db8e,2024-11-13T01:18:45.093000
|
||||
CVE-2024-43302,0,0,028d13ab941ffaa51130c9efeae32048c683fc3f9a97be1f9a9ec0818362db8e,2024-11-13T01:18:45.093000
|
||||
CVE-2024-43303,0,0,11d9501682f62a268ea8fd6f03971205e43f433af8e58b9f115735076a0f4308,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5338,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43305,0,0,6bccf6d377d1be8be62035a992eba5e29974b8b5e3f639507282b3c5fef7f322,2024-08-19T12:59:59.177000
|
||||
@ -260775,11 +260788,11 @@ CVE-2024-43307,0,0,756435dd685e6ec1730a305e988ba2e01786ffce6cef7ad1c53c4b8372b4d
|
||||
CVE-2024-43308,0,0,a877913f6f52f25f4de880fc802fae074159a8e8758942c49b34a7aeae2ea006,2024-09-12T16:30:02.100000
|
||||
CVE-2024-43309,0,0,b5ff7496a58101d5fd9edfa847ee5a94e2e6a966282e37cd22c76f6492329cd0,2024-09-12T16:39:09.187000
|
||||
CVE-2024-4331,0,0,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000
|
||||
CVE-2024-43310,0,1,cc584b34227595ab6c360368d8161e2cbd56641ef1f46d62b85ceef9460aca5c,2024-11-13T01:15:24.813000
|
||||
CVE-2024-43310,0,0,cc584b34227595ab6c360368d8161e2cbd56641ef1f46d62b85ceef9460aca5c,2024-11-13T01:15:24.813000
|
||||
CVE-2024-43311,0,0,a0f8b12007c335b7c931dc515cccbc7b0ce9a673d7ae4a860b8788ba11cdc88d,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43312,0,1,b80152b3df66e76636e41493455e7f10175fb29b512ff394f101b22cc4bb8902,2024-11-13T01:13:26.633000
|
||||
CVE-2024-43312,0,0,b80152b3df66e76636e41493455e7f10175fb29b512ff394f101b22cc4bb8902,2024-11-13T01:13:26.633000
|
||||
CVE-2024-43313,0,0,28b2739b642f0c4b535269ec6c48c2b0871041982feec101264e49bbd04e2f69,2024-09-12T16:40:07.057000
|
||||
CVE-2024-43314,0,1,514e7914e7a5e8fe335f11b512258dd6728aa6d16c42af4615bb9d4075892844,2024-11-13T01:25:37.903000
|
||||
CVE-2024-43314,0,0,514e7914e7a5e8fe335f11b512258dd6728aa6d16c42af4615bb9d4075892844,2024-11-13T01:25:37.903000
|
||||
CVE-2024-43315,0,0,e6014d85dffd349f3b2ce7320cc3098b6f662e4bd5c45fdcd4617c84b6eaae10,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43316,0,0,ed52c19e4beb9313ac8dbea5b947eba79a590b5b5c5d674a4a07af1ca308d254,2024-09-12T21:26:12.670000
|
||||
CVE-2024-43317,0,0,deae729303ac5b60aa6b622a0415dd60fbdfaaee209a8500c7d589c2c68b55ac,2024-08-20T15:44:20.567000
|
||||
@ -260789,7 +260802,7 @@ CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9
|
||||
CVE-2024-43320,0,0,ccee38afc2a835bb009830c4531368282e9727bc0052e4d4c17d31bfd55ad002,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43321,0,0,bb703b2de13a267b8724635b0dde06893a82d0524de00aebee7a6b84161b8d61,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd2e3,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43323,0,1,36997506fc2302c78cc651e30e07bafbd480300aad9a6313bb9e6b55867565ad,2024-11-13T01:25:20.223000
|
||||
CVE-2024-43323,0,0,36997506fc2302c78cc651e30e07bafbd480300aad9a6313bb9e6b55867565ad,2024-11-13T01:25:20.223000
|
||||
CVE-2024-43324,0,0,3fca11ef3a0d0aca94e1720b1500c02c9dcd66fee91e5ec95a4010a171418c83,2024-09-17T20:04:28.360000
|
||||
CVE-2024-43325,0,0,c7e71f31efef4adfd7b652340fa8f95169ea702400525766f98d28f2dbed3aec,2024-09-12T21:28:20.137000
|
||||
CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000
|
||||
@ -260799,16 +260812,16 @@ CVE-2024-43329,0,0,2d889991c7054adfc3510a6f2a36341cd1187c790fca1d7653a4d88b7b618
|
||||
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
|
||||
CVE-2024-43330,0,0,292f3679d217f19b4d90b8fcf1aedfdc57b505addc17d70d5b69292c5274be95,2024-09-17T19:53:40.987000
|
||||
CVE-2024-43331,0,0,6d28b8bc0904e0c3dd60c41d48cef3313c73e3f7ea773d2fece6fad186c8439a,2024-08-22T12:48:02.790000
|
||||
CVE-2024-43332,0,1,73bcfbaf3478403044b75930d4a329f9f08def56fe8cafda78c1534c596c5cb6,2024-11-13T01:25:08.657000
|
||||
CVE-2024-43332,0,0,73bcfbaf3478403044b75930d4a329f9f08def56fe8cafda78c1534c596c5cb6,2024-11-13T01:25:08.657000
|
||||
CVE-2024-43335,0,0,3dff6fb5a934fb330e842040b60a43d630834d9fc8b273f121537efea122bdd4,2024-09-13T14:25:12.027000
|
||||
CVE-2024-43336,0,0,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000
|
||||
CVE-2024-43337,0,0,40b1547653629694d1f87683cec28c4d4ed17401d650c003966fbaf0b12fa6fa,2024-08-27T15:59:57.127000
|
||||
CVE-2024-43339,0,0,66db28fe32caa7fdc3de193b1cfb8a374b117ab7f2a1a8dfd67efebf0a0a78c8,2024-08-27T15:58:31.840000
|
||||
CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000
|
||||
CVE-2024-43340,0,0,3a709bf24dd21009275a410f31b11d212b86c9058772b39f8b8f29b2ecf58b5c,2024-08-27T15:56:00.043000
|
||||
CVE-2024-43341,0,1,f26794581f607d2331edf134e22cf70100ab6d39ab1dcea767d37110bbf7ee9e,2024-11-13T01:24:56.943000
|
||||
CVE-2024-43341,0,0,f26794581f607d2331edf134e22cf70100ab6d39ab1dcea767d37110bbf7ee9e,2024-11-13T01:24:56.943000
|
||||
CVE-2024-43342,0,0,118ec632b5b960b115e679c2e48ccfa8b9cf544f6f75353017c100801fb2817c,2024-09-13T14:11:31.850000
|
||||
CVE-2024-43343,0,1,3244bb51b8aa63884b08ec455020206a2a1311c0d65e1b5bd6b0028f603bb0de,2024-11-13T01:24:44.467000
|
||||
CVE-2024-43343,0,0,3244bb51b8aa63884b08ec455020206a2a1311c0d65e1b5bd6b0028f603bb0de,2024-11-13T01:24:44.467000
|
||||
CVE-2024-43344,0,0,379496d95a40a85d8ca980cbd671a249672d41d04bb66c9b9dcaac6246ede174,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43345,0,0,556fa7350890a25a21bcc01fdb9aa5e355db1c5d283d4a3a13c75236275d6c79,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43346,0,0,570d0cbe7918a4fb4c0a3bd9c07365439742f024e036e2f65c29c7f9160e1fea,2024-08-19T12:59:59.177000
|
||||
@ -260821,7 +260834,7 @@ CVE-2024-43351,0,0,4f1a44dd0b092b1cbc40294ea3c1e20ba66e414acc7c7ec139aec5d1c68e6
|
||||
CVE-2024-43352,0,0,07311db07e42253e292f873208eb8f7da45aad78c36050ff71f1c14b42155a03,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43353,0,0,63ba11fd8c07de3459ae027affa4265b156cbb90703f59d7d8cf9f7e3e549de4,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43354,0,0,7fe0d70c3381bc58752b4a1e37f29b9d4db102b7222c66e8c7dfaaf7ee6ee2c9,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43355,0,1,5b742c399ee8777482bd88d2953eeed1bbed850a6f822b40e781d05649eba15c,2024-11-13T01:24:34.157000
|
||||
CVE-2024-43355,0,0,5b742c399ee8777482bd88d2953eeed1bbed850a6f822b40e781d05649eba15c,2024-11-13T01:24:34.157000
|
||||
CVE-2024-43356,0,0,002a4b5d4af1e8f0e94c64130aea08271a5645ee7876954a410a13e10d80fd71,2024-08-27T15:54:45.650000
|
||||
CVE-2024-43357,0,0,843c188c76220c12bbff3ab3d1983437698ada4d60a6933ff05615bf550f6a01,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43358,0,0,f13bf774ce7b4c63763f4e38f0e32b38260bf7ed8ec364046e3e65c356bf22cf,2024-09-04T21:41:06.457000
|
||||
@ -260910,7 +260923,7 @@ CVE-2024-43447,0,0,fd5dc05f53671d6e56806be84ae616fa8c21743882389a6d301dbdf7371f9
|
||||
CVE-2024-43449,0,0,a9d39682e29a7558796782d77b36f45700e4a3a35fea1199a237b2086f7730d0,2024-11-12T18:15:21.977000
|
||||
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
||||
CVE-2024-43450,0,0,7df4e2c6bdc2de57eedf815ed01c76f77185d9316d9f5dd85ddb20c7f799fd74,2024-11-12T18:15:22.237000
|
||||
CVE-2024-43451,0,1,63c478cb8897b5673da6137c65c3329ac7195df1a8b253f61b4ccc1c67556058,2024-11-13T02:00:01.323000
|
||||
CVE-2024-43451,0,0,63c478cb8897b5673da6137c65c3329ac7195df1a8b253f61b4ccc1c67556058,2024-11-13T02:00:01.323000
|
||||
CVE-2024-43452,0,0,192c33eb1252a75f8c2aab86957281998f0d88198ec9948f6cd7dad5aee3b49b,2024-11-12T18:15:22.737000
|
||||
CVE-2024-43453,0,0,987e6c8ce7e8f2e1d3f9232b14d73438f55ce61f84bbe67fdf49d3284ca0d7f9,2024-10-22T19:29:44.997000
|
||||
CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000
|
||||
@ -261295,16 +261308,16 @@ CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c
|
||||
CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000
|
||||
CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000
|
||||
CVE-2024-43922,0,0,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973fb9f,2024-09-19T21:44:49.453000
|
||||
CVE-2024-43923,0,1,eac5eabcfa5728f8a0fa89b4b896535e184875fc667b5bc8549914abc235c829,2024-11-13T01:24:18.850000
|
||||
CVE-2024-43923,0,0,eac5eabcfa5728f8a0fa89b4b896535e184875fc667b5bc8549914abc235c829,2024-11-13T01:24:18.850000
|
||||
CVE-2024-43924,0,0,f4c232d5f7541d1030f4431c6fd8b2d52bd38910980d7fed5b8d5cc784463639,2024-11-06T17:03:52.480000
|
||||
CVE-2024-43925,0,1,b0821b72e1f0a9030b5f77b958bce77e9d99a0f7adbdf0e02bd0935744bc0892,2024-11-13T01:23:41.317000
|
||||
CVE-2024-43925,0,0,b0821b72e1f0a9030b5f77b958bce77e9d99a0f7adbdf0e02bd0935744bc0892,2024-11-13T01:23:41.317000
|
||||
CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000
|
||||
CVE-2024-43928,0,0,547dc66f0c4426c53cff05d73bcf22bcd2e507fa1cae9f24630cedd49b47e8ad,2024-11-12T20:49:01.817000
|
||||
CVE-2024-43929,0,0,4d0f760130a3601409855424474b55103de73fefcf2b48cf7ee09d2885a276bb,2024-11-12T20:49:57.193000
|
||||
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
|
||||
CVE-2024-43930,0,0,f483102c3decb002ca0bdadbf9f33ed6833d5e2a40470492f9988e5387a99518,2024-11-01T12:57:03.417000
|
||||
CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000
|
||||
CVE-2024-43932,0,1,438578708a1ab8068759538a7c28e45c22a310af7ee2b98f61c9e931789e46cf,2024-11-13T01:23:26.613000
|
||||
CVE-2024-43932,0,0,438578708a1ab8068759538a7c28e45c22a310af7ee2b98f61c9e931789e46cf,2024-11-13T01:23:26.613000
|
||||
CVE-2024-43933,0,0,2ccf4142889368fda000e8d9ad98e7c7d7b4cb225d8f5222cbb3534dc557358d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-43934,0,0,4e14707da9cba5c30b08d1fee5b95a63503f58541a5f170f7bdf2957916e0033,2024-09-03T15:17:36.507000
|
||||
CVE-2024-43935,0,0,507740bb6b2ff7008debdb7eb0a31d10ff2310284bc85a28c8516e97f01a540f,2024-09-03T15:19:13.313000
|
||||
@ -263790,14 +263803,14 @@ CVE-2024-48035,0,0,e68cff1c3b4467623505240b899441f36617f8650c6218b92feb405d25770
|
||||
CVE-2024-48036,0,0,0e5d36c7e8d79e7170bf0e902578cd40c5ea8bc74ec9d0bf50eff28cbc052a76,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48037,0,0,eefb86fc22b519932d0b4d73d4ca283fa1f4be728f6e8326447ce0f2bde0525d,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48038,0,0,c6e31c7f591821e9f6b478f515431fcf0cbc068549b1cf9f8fd564dc7ab1be57,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48039,0,1,6b3a3001aaa0618e07d50638b4168cb497f174f3a53cec135fc49753558c2625,2024-11-13T01:20:55.087000
|
||||
CVE-2024-48039,0,0,6b3a3001aaa0618e07d50638b4168cb497f174f3a53cec135fc49753558c2625,2024-11-13T01:20:55.087000
|
||||
CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000
|
||||
CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48042,0,0,16ddb03b6545634bd517237c4d290ddf5fe66d3a89fdb471199006c76048a6ac,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48043,0,0,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938ddb4,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48044,0,1,feb2e2db15488d1001f529c10bd3bdd8c809e4763fae11d322f5cc473c7f6a01,2024-11-13T01:20:35.917000
|
||||
CVE-2024-48045,0,1,b70072a2d908047ccc8518e40c862e8c98dc1bfb7cf736411097417ae587f342,2024-11-13T01:20:11.327000
|
||||
CVE-2024-48044,0,0,feb2e2db15488d1001f529c10bd3bdd8c809e4763fae11d322f5cc473c7f6a01,2024-11-13T01:20:35.917000
|
||||
CVE-2024-48045,0,0,b70072a2d908047ccc8518e40c862e8c98dc1bfb7cf736411097417ae587f342,2024-11-13T01:20:11.327000
|
||||
CVE-2024-48046,0,0,04aed5c78403da3f425e2296b8b94e2508d82466d3b66a34a6b1829f1e002f4a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48048,0,0,ecb6c25e58b0b57ec982d2ab7b52c52839cd1b0f9ac36bf0ba79fb6dbd6da779,2024-10-18T12:52:33.507000
|
||||
@ -264182,7 +264195,7 @@ CVE-2024-49030,0,0,a771b57b99a22d1a23bb3eb48aac03817808b18f2b135636ab2f6178056ba
|
||||
CVE-2024-49031,0,0,4d19c8a975caa24e6b9da7542a9780cbb167fa0186406d2762380989d57ff550,2024-11-12T18:15:43.483000
|
||||
CVE-2024-49032,0,0,bee7c4c9b814c413805fa15e83f6e73bf7788b208af3fa41e1d1d2dc00139626,2024-11-12T18:15:43.737000
|
||||
CVE-2024-49033,0,0,0ba4d0e17dce154819dd20cf81db8b1f1924b2e20b0e94b205f98469cd600002,2024-11-12T18:15:43.950000
|
||||
CVE-2024-49039,0,1,6d924ab31692649dc2fca4efbf5b863f399110cb17eb2565342cedd98b7e8807,2024-11-13T02:00:01.323000
|
||||
CVE-2024-49039,0,0,6d924ab31692649dc2fca4efbf5b863f399110cb17eb2565342cedd98b7e8807,2024-11-13T02:00:01.323000
|
||||
CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000
|
||||
CVE-2024-49040,0,0,dec61fae24fb566a69ad68ad2aaa7a5a6789b873a1b8bef8517c5dbdbb51d507,2024-11-12T18:15:44.410000
|
||||
CVE-2024-49042,0,0,766092d03f8cba2ef5721d29deebd9fea15d7d2b32427df25645d5df3f1c9f9b,2024-11-12T19:15:17.507000
|
||||
@ -264384,8 +264397,8 @@ CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6f
|
||||
CVE-2024-49400,0,0,4447b6d98624a8004ac0954b08a6ad26989e2084cf92d73c9f3d9262ea896967,2024-11-01T19:35:28.673000
|
||||
CVE-2024-49401,0,0,e4e7a53ed67bf34b96a2df01f2e624360397577809634daec0842bb0bcf4acfd,2024-11-12T16:10:18.870000
|
||||
CVE-2024-49402,0,0,9fc729ce71983a63730fac9cf49d2dcd330e50e027d114e2cf4a6d8a75db59e5,2024-11-12T15:09:10.890000
|
||||
CVE-2024-49403,0,1,e96fa644e1a316c34ef6abff3f0f0f20e01358f49bc7cfc13d3076c9a6e8f30a,2024-11-13T00:55:55.913000
|
||||
CVE-2024-49404,0,1,33804392da65d73847c5467c243192edda47cdab1e2cccdd489e74faee2edfc3,2024-11-13T00:55:09.857000
|
||||
CVE-2024-49403,0,0,e96fa644e1a316c34ef6abff3f0f0f20e01358f49bc7cfc13d3076c9a6e8f30a,2024-11-13T00:55:55.913000
|
||||
CVE-2024-49404,0,0,33804392da65d73847c5467c243192edda47cdab1e2cccdd489e74faee2edfc3,2024-11-13T00:55:09.857000
|
||||
CVE-2024-49405,0,0,dc8e2994a4c405e52d17d8a9d59f8e7cda3b75d8137419cc6bf7cc7737a5dc1a,2024-11-13T00:54:41.193000
|
||||
CVE-2024-49406,0,0,95786d6558eb18b1d37519419e67da3b25682719d49dcee9b91c69e2144aaa95,2024-11-13T00:54:15.937000
|
||||
CVE-2024-49407,0,0,185fb4d197a20a2fd5c00166c54cb21b6f23e70e47219be5351c4b74645df521,2024-11-13T00:53:16.383000
|
||||
@ -264846,7 +264859,7 @@ CVE-2024-50119,0,0,3992f94156457909776d9f78b1e74d5acc4ac20116cfe1d9f562db596b4ec
|
||||
CVE-2024-5012,0,0,5697b5fa6ba20e1501d7704fc1f19cf57893d5f71753b80662113f567a057a81,2024-08-21T13:34:41.107000
|
||||
CVE-2024-50120,0,0,a7535e2e4a67c5d1ea4cc0faacc9771d148428f249d6d1871dd7774a53ec7613,2024-11-08T18:04:08.080000
|
||||
CVE-2024-50121,0,0,f5d79ce4a5c66ed82e292027b7f627836da6acad873692ee370a889fbd82446a,2024-11-08T18:05:13.947000
|
||||
CVE-2024-50122,0,1,8fa5ecc8441fce39eacd047e1d8038dbb0133b8b5961545a6f40b34b693be712,2024-11-13T01:06:36.360000
|
||||
CVE-2024-50122,0,0,8fa5ecc8441fce39eacd047e1d8038dbb0133b8b5961545a6f40b34b693be712,2024-11-13T01:06:36.360000
|
||||
CVE-2024-50123,0,0,47c50f926b815dddbd61627f3fd9f8fef8c8286dd5ab3c1e24f64c53dbadadc8,2024-11-08T20:03:49.163000
|
||||
CVE-2024-50124,0,0,e0909d43069998015b15f2c2be1ecc325d5e7a282d97ea9e2301837a24362cf7,2024-11-08T20:04:05.847000
|
||||
CVE-2024-50125,0,0,bc2ac1b7c523093f36f85867236818ba62e375028e47aa90f5c1f2b06727a050,2024-11-08T20:04:33.913000
|
||||
@ -268744,7 +268757,7 @@ CVE-2024-8869,0,0,eaa7c70f03f38bcd808caaf5c9917ef912247cecdfb7f5fef4110fc2bf4de3
|
||||
CVE-2024-8870,0,0,a8ca41609dd570e7dbf6ada5503a957f6d86f9197ffc9ad53e763e24ea54852d,2024-10-28T13:58:09.230000
|
||||
CVE-2024-8871,0,0,9aa028ea04226a6cf84eebdd2f1bc09b571137b587a5afcc0e34e041e00067b3,2024-11-01T12:57:03.417000
|
||||
CVE-2024-8872,0,0,a59fbf98e5a02680c9463d07c5c7731b213fd42229816cc8689de00fdc1cc0eb,2024-10-01T13:42:57.860000
|
||||
CVE-2024-8874,1,1,5c3ff0703597c2c2ab09770e359db25d9151da9ecc960b2d508a5dde54ef53c5,2024-11-13T02:15:19.647000
|
||||
CVE-2024-8874,0,0,5c3ff0703597c2c2ab09770e359db25d9151da9ecc960b2d508a5dde54ef53c5,2024-11-13T02:15:19.647000
|
||||
CVE-2024-8875,0,0,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000
|
||||
CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97b8,2024-09-20T16:58:24.333000
|
||||
CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f1801,2024-09-30T15:31:14.690000
|
||||
@ -268791,6 +268804,7 @@ CVE-2024-8924,0,0,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d109646137225
|
||||
CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000
|
||||
CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000
|
||||
CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000
|
||||
CVE-2024-8933,1,1,0f3f5faaf1a1237572bf59af775799206ea1034eabf0a17380c7ea20dc120858,2024-11-13T04:15:05.037000
|
||||
CVE-2024-8934,0,0,d034263c2209110f29442857367b8a22ee1ee4bb6c46d99b0b6fa829300a19f1,2024-11-01T12:57:03.417000
|
||||
CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000
|
||||
@ -268820,7 +268834,7 @@ CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae1491493
|
||||
CVE-2024-8980,0,0,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000
|
||||
CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000
|
||||
CVE-2024-8985,1,1,2eb3c8632d9b8232ad157b6a03988b9384dde6885065501150c2d3754126bee5,2024-11-13T02:15:19.890000
|
||||
CVE-2024-8985,0,0,2eb3c8632d9b8232ad157b6a03988b9384dde6885065501150c2d3754126bee5,2024-11-13T02:15:19.890000
|
||||
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8987,0,0,d4b77e4f4c2044761be428fee6d519c8ab2f4f0a204428b1e0f3be72f25674a9,2024-10-15T13:45:29.510000
|
||||
CVE-2024-8989,0,0,caae46233d26ee2b67df93becf3adf518208e6bbacfb542b8b2dd6d9f605994c,2024-10-04T13:51:25.567000
|
||||
@ -269109,7 +269123,7 @@ CVE-2024-9420,0,0,16abe743c10c84ef66d4a9297b6d91aa254bf942da6fed8f6490dfaf0762e5
|
||||
CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000
|
||||
CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae327,2024-10-22T13:55:04.537000
|
||||
CVE-2024-9426,1,1,e6e144ec2c73748b66a8e9bdacac1e7bce0685e2f1352e3f0577e926400ddc48,2024-11-13T02:15:20.120000
|
||||
CVE-2024-9426,0,0,e6e144ec2c73748b66a8e9bdacac1e7bce0685e2f1352e3f0577e926400ddc48,2024-11-13T02:15:20.120000
|
||||
CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000
|
||||
CVE-2024-9430,0,0,4fa81a8d136df8ffb8922ab0d9024692836b1e78be97844ec16b810f0e03dd76,2024-11-01T12:57:03.417000
|
||||
CVE-2024-9434,0,0,79d9ee229ea07912fe660d5aecc73644854130ed033cb358b3e5a09b73a525ac,2024-11-01T12:57:03.417000
|
||||
@ -269207,7 +269221,7 @@ CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c33
|
||||
CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000
|
||||
CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5d7,2024-10-14T08:15:02.970000
|
||||
CVE-2024-9576,0,0,25aab792d43a0a086c5d940f3b1aaa375cf80fdc479a0c88e1a0265fb0e046cd,2024-11-12T19:34:37.910000
|
||||
CVE-2024-9578,1,1,28a19d3cc962afe7e5d04d63074510584621970d413b068b8027aa422a5e10dd,2024-11-13T02:15:20.340000
|
||||
CVE-2024-9578,0,0,28a19d3cc962afe7e5d04d63074510584621970d413b068b8027aa422a5e10dd,2024-11-13T02:15:20.340000
|
||||
CVE-2024-9579,0,0,e2993f144efd5aa9c48a1ec5bcd5f3b9005733d0240c41dfc1522a865c26a6aa,2024-11-08T18:08:02.683000
|
||||
CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000
|
||||
CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000
|
||||
@ -269232,7 +269246,7 @@ CVE-2024-9607,0,0,6559a4c9ecc679c1a526ad316820d8ef58b184c710c286477d0fc3422e598c
|
||||
CVE-2024-9610,0,0,c2ae8ad13a32a2ecc4cf7a3cb852077ce2d6eff8b7bb2625c3e46911eeeead24,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9611,0,0,f16a109b2beda9ef97e16997885b40d38db6eba42b8291e32288f7a269b19f0c,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9613,0,0,03f12b76d11ccd814de04879dc193f94fb86a0d3aade1fad8084c29f467aedb8,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9614,1,1,1c961942a69100c72a5a7e40e62008514147a7a1ea3a1fd68b659af94b311892,2024-11-13T02:15:20.547000
|
||||
CVE-2024-9614,0,0,1c961942a69100c72a5a7e40e62008514147a7a1ea3a1fd68b659af94b311892,2024-11-13T02:15:20.547000
|
||||
CVE-2024-9616,0,0,7955b22811f75fe98c8bca32dc5925d116cea5c2846865e9f0c5f52b96467c10,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf728,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user