Auto-Update: 2024-09-25T16:00:26.886560+00:00

This commit is contained in:
cad-safe-bot 2024-09-25 16:03:26 +00:00
parent 791558267f
commit 6501b02c7f
75 changed files with 3324 additions and 341 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-10012",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-01-13T11:59:21.053",
"lastModified": "2017-09-08T01:29:03.073",
"lastModified": "2024-09-25T14:33:47.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -63,8 +63,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awpcp:another_wordpress_classifieds_plugin:3.3.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "774A4115-6BFB-4E14-BAD2-0AAC15170496"
"criteria": "cpe:2.3:a:strategy11:awp_classifieds:3.3.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EBACDDEA-6CFF-4F7C-807C-D725AD97BD78"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-10013",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-01-13T11:59:21.990",
"lastModified": "2017-09-08T01:29:03.137",
"lastModified": "2024-09-25T14:33:47.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -63,8 +63,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awpcp:another_wordpress_classifieds_plugin:3.3.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "774A4115-6BFB-4E14-BAD2-0AAC15170496"
"criteria": "cpe:2.3:a:strategy11:awp_classifieds:3.3.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EBACDDEA-6CFF-4F7C-807C-D725AD97BD78"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-24089",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-20T00:15:09.847",
"lastModified": "2023-09-21T13:21:26.303",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T15:35:01.817",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21445",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:15.907",
"lastModified": "2024-09-20T19:15:12.973",
"vulnStatus": "Modified",
"lastModified": "2024-09-25T15:14:05.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
@ -75,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-502"
}
]
}
@ -89,13 +89,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "228DA523-4D6D-48C5-BDB0-DB1A60F23F8B"
"criteria": "cpe:2.3:a:oracle:application_development_framework:12.2.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA6E182-D9C6-4F97-A51F-CD6A19138BAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "335AB6A7-3B1F-4FA8-AF08-7D64C16C4B04"
"criteria": "cpe:2.3:a:oracle:application_development_framework:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A06B63-A3BD-4A7D-94A3-7DE069B3F296"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3254",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-10-31T16:15:11.060",
"lastModified": "2022-11-01T13:58:16.910",
"lastModified": "2024-09-25T14:33:47.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awpcp:another_wordpress_classifieds_plugin:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:strategy11:awp_classifieds:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.3",
"matchCriteriaId": "138FC59F-B6B1-4702-8D3A-FF383E6E4027"
"matchCriteriaId": "A5E60CF3-838E-4D55-845A-6224DEC2EEA9"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37263",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-15T19:15:08.637",
"lastModified": "2023-09-20T15:38:23.920",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T15:35:06.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -79,6 +79,16 @@
"value": "CWE-200"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38886",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-20T01:15:56.153",
"lastModified": "2023-09-22T01:30:11.830",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T15:35:07.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39045",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-20T20:15:11.567",
"lastModified": "2023-09-22T23:04:32.703",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T15:35:08.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39677",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-20T21:15:11.627",
"lastModified": "2023-09-22T18:48:49.313",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T15:35:09.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41179",
"sourceIdentifier": "security@trendmicro.com",
"published": "2023-09-19T14:15:21.343",
"lastModified": "2023-09-22T15:08:32.273",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T15:35:10.467",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2023-09-21",
"cisaActionDue": "2023-10-12",
@ -40,6 +40,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-41801",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-06T15:15:14.263",
"lastModified": "2023-10-10T20:53:59.430",
"lastModified": "2024-09-25T14:33:47.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awpcp:another_wordpress_classifieds_plugin:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:strategy11:awp_classifieds:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.3.1",
"matchCriteriaId": "B7CE82C8-C300-4471-9D8F-97D4D927784C"
"matchCriteriaId": "80810177-7005-4275-AEA7-8EE2A0421D4A"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43766",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T05:15:09.867",
"lastModified": "2023-09-26T14:51:56.633",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T14:35:03.310",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T05:15:09.937",
"lastModified": "2023-09-26T14:51:32.377",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T14:35:04.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0160",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-12T07:15:50.530",
"lastModified": "2024-06-13T18:36:09.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T14:25:53.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,435 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:xps_17_9700_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.30.0",
"matchCriteriaId": "872F0A38-BB2A-46A5-8F76-2289CF71F6F7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCAAEC8-7A39-403F-979F-AB8302E8385B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:xps_15_9500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.31.0",
"matchCriteriaId": "3A404032-ED6B-4EBC-9CE4-B371DA306D59"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:xps_15_9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3425631-E9E5-447E-AED9-1A3C46FD843C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:vostro_7500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.28.0",
"matchCriteriaId": "D63F80E9-956E-4F59-BA68-EB6DE8E4B2EE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63887A2-0A76-4CAD-A1D8-6896B1AC3768"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:precision_5750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.30.0",
"matchCriteriaId": "8AA16138-01C1-40EB-9F91-C861306B7FC6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00756063-B594-4683-AE87-56B79F91DB23"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:precision_5550_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.31.0",
"matchCriteriaId": "A6AF407B-AE6F-46FA-8740-8DA502F484C7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "953AC008-D651-4905-B07F-07CA83BD3932"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:latitude_3520_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.36.0",
"matchCriteriaId": "49AA01E2-1948-43D1-8483-88FE18A248D9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:latitude_3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F48635-F107-4399-91FE-CB7CA2B5E966"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:latitude_3510_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.29.0",
"matchCriteriaId": "A64182FA-E71B-4F56-97E2-A248FB846D0C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:latitude_3510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13CF7C33-6088-40DE-89D8-CB958C06F3D3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:latitude_3420_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.36.0",
"matchCriteriaId": "43F18C87-1CD6-4551-A91C-F2EFCFB7CE5F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:latitude_3410_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.29.0",
"matchCriteriaId": "35979633-13C9-4D7B-BF50-54FBD8980737"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:latitude_3410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCAC1D0B-6099-40E1-A8A4-493478569B5C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.28.0",
"matchCriteriaId": "27550A7C-DC53-4371-A31D-531FB459F1DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8877DD5-AE9A-452D-AF5F-9E59B9D6DF99"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.28.0",
"matchCriteriaId": "C3862880-0166-4972-B3AC-BAD0528CD252"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "549752BA-96AC-44AA-9475-BA407396D577"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:g7_7700_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.32.0",
"matchCriteriaId": "AFA565B6-C79B-4D67-920F-D51E779FC70A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20046D13-2EE4-438C-8C98-089D018ADD44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:g7_7500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.32.0",
"matchCriteriaId": "8503E891-4E04-467D-B4FA-421C467C4F3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:g5_5500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.30.0",
"matchCriteriaId": "6DE38ECE-412A-4545-97AF-1999E55C3C1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81A8617F-56B1-4998-98CC-FA8C1D3DE011"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:g3_3500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.30.0",
"matchCriteriaId": "E6DDB63B-BF11-4613-816E-6C097F986FAF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79C0E8D8-FE8F-4718-8837-8C8FCACDB095"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000224763/dsa-2024-122",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21751",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:47.603",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:44:47.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yoginetwork:rabbitloader:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.19.14",
"matchCriteriaId": "3C9BD0D6-FA34-47F8-9623-590306F45583"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rabbit-loader/wordpress-rabbitloader-plugin-2-19-13-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-22892",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T15:15:13.430",
"lastModified": "2024-09-25T15:15:13.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mdickopp/0cab0d7f91b1f4ea0d326dd976db70e5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-22893",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T15:15:13.520",
"lastModified": "2024-09-25T15:15:13.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenSlides 4.0.15 verifies passwords by comparing password hashes using a function with content-dependent runtime. This can allow attackers to obtain information about the password hash using a timing attack."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/mdickopp/10e4a4ba3d7ded8315a1613ee7f2541e",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23524",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.483",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:48:24.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ontraport:pilotpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.31",
"matchCriteriaId": "46711E17-5CCF-462D-BB6C-9C0E442344F6"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pilotpress/wordpress-pilotpress-plugin-2-0-29-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2698",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-12T08:15:50.250",
"lastModified": "2024-09-16T20:15:45.940",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T14:19:16.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,34 +81,118 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.11.0",
"versionEndExcluding": "4.11.2",
"matchCriteriaId": "83FB5CBD-9BCC-46AB-84F9-2848C185E23E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freeipa:freeipa:4.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F054F46-E717-43C4-BCA6-A0F12F81C670"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:3754",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3755",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3757",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3759",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-2698",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270353",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.freeipa.org/release-notes/4-12-1.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-30128",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-09-25T15:15:13.717",
"lastModified": "2024-09-25T15:15:13.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HCL Nomad server on Domino is affected by an open proxy vulnerability in which an unauthenticated attacker can mask their original source IP address. This may enable an attacker to trick the user into exposing sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0115504",
"source": "psirt@hcl.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31145",
"sourceIdentifier": "security@xen.org",
"published": "2024-09-25T11:15:12.133",
"lastModified": "2024-09-25T11:15:12.133",
"lastModified": "2024-09-25T14:35:05.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Certain PCI devices in a system might be assigned Reserved Memory\nRegions (specified via Reserved Memory Region Reporting, \"RMRR\") for\nIntel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used\nfor platform tasks such as legacy USB emulation.\n\nSince the precise purpose of these regions is unknown, once a device\nassociated with such a region is active, the mappings of these regions\nneed to remain continuouly accessible by the device. In the logic\nestablishing these mappings, error handling was flawed, resulting in\nsuch mappings to potentially remain in place when they should have been\nremoved again. Respective guests would then gain access to memory\nregions which they aren't supposed to have access to."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-460.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31146",
"sourceIdentifier": "security@xen.org",
"published": "2024-09-25T11:15:12.220",
"lastModified": "2024-09-25T11:15:12.220",
"lastModified": "2024-09-25T14:35:06.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "When multiple devices share resources and one of them is to be passed\nthrough to a guest, security of the entire system and of respective\nguests individually cannot really be guaranteed without knowing\ninternals of any of the involved guests. Therefore such a configuration\ncannot really be security-supported, yet making that explicit was so far\nmissing.\n\nResources the sharing of which is known to be problematic include, but\nare not limited to\n- - PCI Base Address Registers (BARs) of multiple devices mapping to the\n same page (4k on x86),\n- - INTx lines."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-461.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31350",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T18:15:09.943",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:36:25.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:strategy11:awp_classifieds:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.3.2",
"matchCriteriaId": "8DB22A7D-A1A0-4FB3-9DDF-3B3124F408AE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/another-wordpress-classifieds-plugin/wordpress-awp-classifieds-plugin-4-3-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31352",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T18:15:10.170",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:37:38.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:icegram:email_subscribers_\\&_newsletters:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.7.14",
"matchCriteriaId": "24292DB4-3777-4133-B50A-4E3878F8DAC2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/email-subscribers/wordpress-icegram-express-plugin-5-7-13-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T17:15:12.623",
"lastModified": "2024-09-23T18:35:13.297",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T14:57:47.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freeimage_project:freeimage:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.4.0",
"versionEndIncluding": "3.18.0",
"matchCriteriaId": "23447991-2FCC-45E6-A1F7-AED5E657797B"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/355/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/11/10",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32701",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T18:15:10.823",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:39:47.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "0.1.0.25",
"matchCriteriaId": "4AAB85C2-CEF0-4734-93C7-322DA155A978"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-24-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32703",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T18:15:11.047",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:42:02.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reputeinfosystems:arforms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.4.1",
"matchCriteriaId": "63984808-F5B6-4E68-941A-C9B105E67E90"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/arforms/wordpress-arforms-plugin-6-4-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32704",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T18:15:11.263",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:42:40.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reputeinfosystems:arforms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.4.1",
"matchCriteriaId": "63984808-F5B6-4E68-941A-C9B105E67E90"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/arforms/wordpress-arforms-plugin-6-4-subscriber-arbitrary-wordpress-options-removal-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33109",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T19:15:24.170",
"lastModified": "2024-09-20T13:35:02.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:47:54.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,78 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ergophone:tiptel_ip_286_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.61.13.10",
"matchCriteriaId": "0E560F08-9016-43D5-ABCF-872974FE4898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ergophone:tiptel_ip_286:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAAEEED-EAB9-480D-A2DC-CEB728B61AE3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:yealink:sip-t28p_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.61.13.10",
"matchCriteriaId": "6689ACF7-4894-4BC0-A092-CA9733A3FC94"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:yealink:sip-t28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF17B063-75F1-4E52-82E8-24449E287CFA"
}
]
}
]
}
],
"references": [
{
"url": "http://tiptel.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.bdosecurity.de/en-gb/advisories/cve-2024-33109",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3429",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-06T19:16:02.103",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T15:53:55.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +83,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lollms:lollms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.6",
"matchCriteriaId": "F9A3F92B-B7CA-494B-91A1-9B3A54A4583D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/parisneo/lollms/commit/f4424cfc3d6dfb3ad5ac17dd46801efe784933e9",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/fd8f50c8-17f0-40be-a2c6-bb8d80f7c409",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35717",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.723",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:46:17.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awplife:media_slider:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.0",
"matchCriteriaId": "E8C08C28-B557-48F9-A212-CC679F91DAF9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/media-slider/wordpress-media-slider-plugin-1-3-9-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35720",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.950",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:46:44.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awplife:album_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.8",
"matchCriteriaId": "D8255B98-6D23-43D8-A72F-5CFA1F08DFF8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/new-album-gallery/wordpress-album-gallery-wordpress-gallery-plugin-1-5-7-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40125",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T19:15:24.350",
"lastModified": "2024-09-20T13:35:05.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:46:52.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:closed-loop:cless_server:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4F042DED-85F0-45B1-9CEE-B4E1AF8AB6B7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/brendontkl/My-CVEs/tree/main/CVE-2024-40125",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://www.closed-loop.biz/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41721",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2024-09-20T08:15:11.323",
"lastModified": "2024-09-20T18:35:04.067",
"lastModified": "2024-09-25T14:35:06.917",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42114",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:03.797",
"lastModified": "2024-08-27T15:00:23.807",
"lastModified": "2024-09-25T14:44:11.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42123",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:04.500",
"lastModified": "2024-08-23T14:13:05.580",
"lastModified": "2024-09-25T14:45:25.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42131",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:05.130",
"lastModified": "2024-09-16T13:52:37.707",
"lastModified": "2024-09-25T14:45:11.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42161",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.447",
"lastModified": "2024-08-05T20:19:29.607",
"lastModified": "2024-09-25T15:54:47.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
"exploitabilityScore": 0.8,
"impactScore": 5.5
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42224",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:07.667",
"lastModified": "2024-08-02T14:24:16.187",
"lastModified": "2024-09-25T15:55:09.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
"impactScore": 4.2
}
]
},

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43237",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-25T15:15:14.000",
"lastModified": "2024-09-25T15:15:14.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in TaxoPress WordPress Tag Cloud Plugin \u2013 Tag Groups.This issue affects WordPress Tag Cloud Plugin \u2013 Tag Groups: from n/a through 2.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tag-groups/wordpress-tag-groups-plugin-2-0-3-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43959",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-25T15:15:14.187",
"lastModified": "2024-09-25T15:15:14.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themepoints Testimonials allows Reflected XSS.This issue affects Testimonials: from n/a through 3.0.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/super-testimonial/wordpress-super-testimonials-plugin-3-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43970",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:06.683",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:18:53.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:surecart:surecart:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.29.4",
"matchCriteriaId": "196FB214-C3FF-4D10-8C7E-71E9C892FE0D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/surecart/wordpress-surecart-plugin-2-29-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43971",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:06.937",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:18:13.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.6",
"matchCriteriaId": "6E3EFA59-6DCE-4E98-AD5F-3105E594C649"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-free-client-photo-galleries-for-photographers-plugin-3-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43972",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:07.157",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:16:18.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.8.8",
"matchCriteriaId": "2C5A8169-7E49-4C00-BB8C-DAA758103820"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pagelayer/wordpress-page-builder-pagelayer-drag-and-drop-website-builder-plugin-1-8-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43975",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:07.360",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:13:32.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:superstorefinder:super_store_finder:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.9.7",
"matchCriteriaId": "C07A9BF9-9A80-497D-82ED-0CAA805DD025"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/superstorefinder-wp/wordpress-super-store-finder-plugin-6-9-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43983",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:07.563",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:11:22.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.1.14",
"matchCriteriaId": "025CB9DC-29FD-4931-9A9F-0A4AFFE24881"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-1-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43987",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:07.760",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:08:22.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wayneconnor:sliding_door:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.6",
"matchCriteriaId": "E7ABF37C-DE76-45C7-B32D-27FCF8E23DCD"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sliding-door/wordpress-sliding-door-theme-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43990",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-25T15:15:14.370",
"lastModified": "2024-09-25T15:15:14.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in StylemixThemes Masterstudy LMS Starter.This issue affects Masterstudy LMS Starter: from n/a through 1.1.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ms-lms-starter-theme/wordpress-masterstudy-lms-starter-theme-1-1-8-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43999",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:09.110",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T15:15:43.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "A137290A-B5F9-4CCD-A806-1CDE277FE785"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-plugin-3-8-11-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44005",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:09.887",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T15:25:30.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.4",
"matchCriteriaId": "25384C7C-0D7F-4CF5-8DA2-11EBD17B30BA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/greenshift-animation-and-page-builder-blocks/wordpress-greenshift-animation-and-page-builder-blocks-plugin-9-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44124",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.890",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T15:14:13.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,74 @@
"value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Un dispositivo de entrada Bluetooth malintencionado puede omitir el emparejamiento."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44623",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T16:15:13.703",
"lastModified": "2024-09-17T02:35:54.787",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T14:53:20.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spx:spx_graphics_controller:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "56115773-74DA-4426-91C3-717732B8013E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TuomoKu/SPX-GC",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/TuomoKu/SPX-GC/blob/v.1.3.0/routes/routes-api.js#L39",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/merbinr/CVE-2024-44623",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45452",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-17T23:15:21.183",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T14:19:17.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cryoutcreations:septera:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.5.1",
"matchCriteriaId": "A5BB0BD0-531F-48C0-8049-8207B0AFDF47"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/septera/wordpress-septera-theme-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45613",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-25T14:15:05.303",
"lastModified": "2024-09-25T14:15:05.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CKEditor 5 is a JavaScript rich-text editor. Starting in version 40.0.0 and prior to version 43.1.1, a Cross-Site Scripting (XSS) vulnerability is present in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability only affects installations where the Block Toolbar plugin is enabled and either the General HTML Support (with a configuration that permits unsafe markup) or the HTML Embed plugin is also enabled. A fix for the problem is available in version 43.1.1. As a workaround, one may disable the block toolbar plugin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/ckeditor/ckeditor5/releases/tag/v43.1.1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-rgg8-g5x8-wr9v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46461",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T15:15:14.567",
"lastModified": "2024-09-25T15:15:14.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.videolan.org/security/sb-vlc3021.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47220",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-22T01:15:11.950",
"lastModified": "2024-09-25T06:15:03.453",
"lastModified": "2024-09-25T15:15:14.653",
"vulnStatus": "Received",
"cveTags": [
{
@ -67,6 +67,10 @@
"url": "https://github.com/ruby/webrick/issues/145#issuecomment-2369994610",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ruby/webrick/issues/145#issuecomment-2372838285",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ruby/webrick/pull/146/commits/d88321da45dcd230ac2b4585cad4833d6d5e8841",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5301",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-06T18:15:20.307",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T15:18:18.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tungstenautomation:kofax_power_pdf:5.0.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C77E58-779D-4226-9F52-918063C16E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-546/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5302",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-06T18:15:20.530",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T15:22:17.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tungstenautomation:kofax_power_pdf:5.0.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C77E58-779D-4226-9F52-918063C16E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-547/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5303",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-06T18:15:20.750",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T15:24:18.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tungstenautomation:kofax_power_pdf:5.0.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C77E58-779D-4226-9F52-918063C16E5B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-548/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:51.727",
"lastModified": "2024-06-20T12:44:22.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T15:08:46.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,30 +140,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/gpac/gpac/issues/2874",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/user-attachments/files/15801189/poc.zip",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.268792",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268792",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.356316",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6147",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-20T20:15:20.707",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T15:29:33.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:poly_plantronics_hub:3.24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA6BE6E-41A3-42E8-B80F-4519FE5955E4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-802/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6153",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-20T20:15:20.980",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T14:44:14.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.1.0",
"matchCriteriaId": "BDBCA339-CCA6-46F0-809C-F22AF745B6D5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-803/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6154",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-06-20T20:15:21.190",
"lastModified": "2024-06-21T11:22:01.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T14:40:26.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,10 +83,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.1.0",
"matchCriteriaId": "BDBCA339-CCA6-46F0-809C-F22AF745B6D5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-804/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-6512",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-09-25T14:15:05.560",
"lastModified": "2024-09-25T14:15:05.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authorization bypass in the\u00a0PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@devolutions.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0013",
"source": "security@devolutions.net"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-6845",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-25T06:15:05.557",
"lastModified": "2024-09-25T06:15:05.557",
"lastModified": "2024-09-25T14:35:07.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Chatbot with ChatGPT WordPress plugin before 2.4.6 does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key"
},
{
"lang": "es",
"value": "El complemento The Chatbot with ChatGPT de WordPress anterior a la versi\u00f3n 2.4.6 no tiene la autorizaci\u00f3n adecuada en uno de sus endpoints REST, lo que permite que usuarios no autenticados recuperen la clave codificada y luego la decodifiquen, filtrando as\u00ed la clave API de OpenAI."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/cfaaa843-d89e-42d4-90d9-988293499d26/",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7575",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-25T14:15:05.750",
"lastModified": "2024-09-25T14:15:05.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress Telerik UI for WPF versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/wpf/knowledge-base/command-injection-cve-2024-7575",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7576",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-25T14:15:05.970",
"lastModified": "2024-09-25T14:15:05.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress Telerik UI for WPF versions prior to 2024 Q3 (2024.3.924), a code execution attack is possible through an insecure deserialization vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/wpf/knowledge-base/unsafe-deserialization-cve-2024-7576",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-7679",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-25T14:15:06.180",
"lastModified": "2024-09-25T14:15:06.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/winforms/knowledge-base/command-injection-cve-2024-7679",
"source": "security@progress.com"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-7878",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-25T06:15:05.650",
"lastModified": "2024-09-25T06:15:05.650",
"lastModified": "2024-09-25T14:35:08.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP ULike WordPress plugin before 4.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento WP ULike para WordPress anterior a la versi\u00f3n 4.7.4 no desinfecta ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados como el administrador realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/9166cf91-69e5-4786-a6a9-816db7d47b07/",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-7892",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-25T06:15:05.720",
"lastModified": "2024-09-25T06:15:05.720",
"lastModified": "2024-09-25T14:35:08.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The adstxt Plugin WordPress plugin through 1.0.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
},
{
"lang": "es",
"value": "El complemento adstxt de WordPress hasta la versi\u00f3n 1.0.0 no tiene la comprobaci\u00f3n CSRF activada al actualizar sus configuraciones, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n las cambie mediante un ataque CSRF."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/c07a4992-c9a1-46a4-9a52-9e38b6d15440/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8175",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-09-25T08:15:04.727",
"lastModified": "2024-09-25T08:15:04.727",
"lastModified": "2024-09-25T14:15:06.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://cert.vde.com/en/advisories/VDE-2024-057",
"source": "info@cert.vde.com"
},
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=18604&token=d5e1e2820ee63077b875b3bb41014b1f102e88a3&download=",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8316",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-25T14:15:06.550",
"lastModified": "2024-09-25T14:15:06.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Progress Telerik UI for WPF versions prior to 2024 Q3 (2024.3.924), a code execution attack is possible through an insecure deserialization vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/wpf/knowledge-base/unsafe-deserialization-cve-2024-8316",
"source": "security@progress.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8364",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-19T04:15:06.270",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T15:08:08.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webhammer:wp_custom_fields_search:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.35",
"matchCriteriaId": "AD1CD32C-567A-4901-B244-DEA513E7B844"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-custom-fields-search/trunk/plugin.php#L53",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wordpress.org/plugins/wp-custom-fields-search/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef36a2a1-b3be-4270-8890-76705817b4b5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-25T14:00:17.899529+00:00
2024-09-25T16:00:26.886560+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-25T13:55:55.460000+00:00
2024-09-25T15:55:09.027000+00:00
```
### Last Data Feed Release
@ -33,49 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263737
263750
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `13`
- [CVE-2024-4657](CVE-2024/CVE-2024-46xx/CVE-2024-4657.json) (`2024-09-25T13:15:04.110`)
- [CVE-2024-6592](CVE-2024/CVE-2024-65xx/CVE-2024-6592.json) (`2024-09-25T12:15:05.027`)
- [CVE-2024-6593](CVE-2024/CVE-2024-65xx/CVE-2024-6593.json) (`2024-09-25T12:15:05.217`)
- [CVE-2024-6594](CVE-2024/CVE-2024-65xx/CVE-2024-6594.json) (`2024-09-25T12:15:05.397`)
- [CVE-2024-8546](CVE-2024/CVE-2024-85xx/CVE-2024-8546.json) (`2024-09-25T13:15:04.313`)
- [CVE-2024-22892](CVE-2024/CVE-2024-228xx/CVE-2024-22892.json) (`2024-09-25T15:15:13.430`)
- [CVE-2024-22893](CVE-2024/CVE-2024-228xx/CVE-2024-22893.json) (`2024-09-25T15:15:13.520`)
- [CVE-2024-30128](CVE-2024/CVE-2024-301xx/CVE-2024-30128.json) (`2024-09-25T15:15:13.717`)
- [CVE-2024-43237](CVE-2024/CVE-2024-432xx/CVE-2024-43237.json) (`2024-09-25T15:15:14.000`)
- [CVE-2024-43959](CVE-2024/CVE-2024-439xx/CVE-2024-43959.json) (`2024-09-25T15:15:14.187`)
- [CVE-2024-43990](CVE-2024/CVE-2024-439xx/CVE-2024-43990.json) (`2024-09-25T15:15:14.370`)
- [CVE-2024-45613](CVE-2024/CVE-2024-456xx/CVE-2024-45613.json) (`2024-09-25T14:15:05.303`)
- [CVE-2024-46461](CVE-2024/CVE-2024-464xx/CVE-2024-46461.json) (`2024-09-25T15:15:14.567`)
- [CVE-2024-6512](CVE-2024/CVE-2024-65xx/CVE-2024-6512.json) (`2024-09-25T14:15:05.560`)
- [CVE-2024-7575](CVE-2024/CVE-2024-75xx/CVE-2024-7575.json) (`2024-09-25T14:15:05.750`)
- [CVE-2024-7576](CVE-2024/CVE-2024-75xx/CVE-2024-7576.json) (`2024-09-25T14:15:05.970`)
- [CVE-2024-7679](CVE-2024/CVE-2024-76xx/CVE-2024-7679.json) (`2024-09-25T14:15:06.180`)
- [CVE-2024-8316](CVE-2024/CVE-2024-83xx/CVE-2024-8316.json) (`2024-09-25T14:15:06.550`)
### CVEs modified in the last Commit
Recently modified CVEs: `34`
Recently modified CVEs: `60`
- [CVE-2023-27257](CVE-2023/CVE-2023-272xx/CVE-2023-27257.json) (`2024-09-25T12:15:04.267`)
- [CVE-2023-27258](CVE-2023/CVE-2023-272xx/CVE-2023-27258.json) (`2024-09-25T12:15:04.347`)
- [CVE-2023-27259](CVE-2023/CVE-2023-272xx/CVE-2023-27259.json) (`2024-09-25T12:15:04.440`)
- [CVE-2023-27261](CVE-2023/CVE-2023-272xx/CVE-2023-27261.json) (`2024-09-25T12:15:04.520`)
- [CVE-2023-27375](CVE-2023/CVE-2023-273xx/CVE-2023-27375.json) (`2024-09-25T12:15:04.620`)
- [CVE-2023-27376](CVE-2023/CVE-2023-273xx/CVE-2023-27376.json) (`2024-09-25T12:15:04.703`)
- [CVE-2023-27377](CVE-2023/CVE-2023-273xx/CVE-2023-27377.json) (`2024-09-25T12:15:04.797`)
- [CVE-2023-28324](CVE-2023/CVE-2023-283xx/CVE-2023-28324.json) (`2024-09-25T13:35:00.443`)
- [CVE-2023-41311](CVE-2023/CVE-2023-413xx/CVE-2023-41311.json) (`2024-09-25T13:35:01.407`)
- [CVE-2023-4393](CVE-2023/CVE-2023-43xx/CVE-2023-4393.json) (`2024-09-25T12:15:04.887`)
- [CVE-2024-40856](CVE-2024/CVE-2024-408xx/CVE-2024-40856.json) (`2024-09-25T13:43:40.657`)
- [CVE-2024-40857](CVE-2024/CVE-2024-408xx/CVE-2024-40857.json) (`2024-09-25T13:41:41.843`)
- [CVE-2024-40860](CVE-2024/CVE-2024-408xx/CVE-2024-40860.json) (`2024-09-25T13:41:05.177`)
- [CVE-2024-40863](CVE-2024/CVE-2024-408xx/CVE-2024-40863.json) (`2024-09-25T13:40:28.967`)
- [CVE-2024-43988](CVE-2024/CVE-2024-439xx/CVE-2024-43988.json) (`2024-09-25T13:55:55.460`)
- [CVE-2024-43991](CVE-2024/CVE-2024-439xx/CVE-2024-43991.json) (`2024-09-25T13:53:50.107`)
- [CVE-2024-43992](CVE-2024/CVE-2024-439xx/CVE-2024-43992.json) (`2024-09-25T13:47:17.277`)
- [CVE-2024-43993](CVE-2024/CVE-2024-439xx/CVE-2024-43993.json) (`2024-09-25T13:44:39.917`)
- [CVE-2024-44125](CVE-2024/CVE-2024-441xx/CVE-2024-44125.json) (`2024-09-25T13:30:11.570`)
- [CVE-2024-44128](CVE-2024/CVE-2024-441xx/CVE-2024-44128.json) (`2024-09-25T13:29:42.343`)
- [CVE-2024-44129](CVE-2024/CVE-2024-441xx/CVE-2024-44129.json) (`2024-09-25T13:28:21.447`)
- [CVE-2024-44135](CVE-2024/CVE-2024-441xx/CVE-2024-44135.json) (`2024-09-25T13:28:09.067`)
- [CVE-2024-44176](CVE-2024/CVE-2024-441xx/CVE-2024-44176.json) (`2024-09-25T13:27:13.333`)
- [CVE-2024-44187](CVE-2024/CVE-2024-441xx/CVE-2024-44187.json) (`2024-09-25T13:25:52.043`)
- [CVE-2024-44191](CVE-2024/CVE-2024-441xx/CVE-2024-44191.json) (`2024-09-25T13:24:42.380`)
- [CVE-2024-42224](CVE-2024/CVE-2024-422xx/CVE-2024-42224.json) (`2024-09-25T15:55:09.027`)
- [CVE-2024-43970](CVE-2024/CVE-2024-439xx/CVE-2024-43970.json) (`2024-09-25T14:18:53.297`)
- [CVE-2024-43971](CVE-2024/CVE-2024-439xx/CVE-2024-43971.json) (`2024-09-25T14:18:13.137`)
- [CVE-2024-43972](CVE-2024/CVE-2024-439xx/CVE-2024-43972.json) (`2024-09-25T14:16:18.150`)
- [CVE-2024-43975](CVE-2024/CVE-2024-439xx/CVE-2024-43975.json) (`2024-09-25T14:13:32.910`)
- [CVE-2024-43983](CVE-2024/CVE-2024-439xx/CVE-2024-43983.json) (`2024-09-25T14:11:22.450`)
- [CVE-2024-43987](CVE-2024/CVE-2024-439xx/CVE-2024-43987.json) (`2024-09-25T14:08:22.987`)
- [CVE-2024-43999](CVE-2024/CVE-2024-439xx/CVE-2024-43999.json) (`2024-09-25T15:15:43.683`)
- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2024-09-25T15:25:30.083`)
- [CVE-2024-44124](CVE-2024/CVE-2024-441xx/CVE-2024-44124.json) (`2024-09-25T15:14:13.593`)
- [CVE-2024-44623](CVE-2024/CVE-2024-446xx/CVE-2024-44623.json) (`2024-09-25T14:53:20.253`)
- [CVE-2024-45452](CVE-2024/CVE-2024-454xx/CVE-2024-45452.json) (`2024-09-25T14:19:17.113`)
- [CVE-2024-47220](CVE-2024/CVE-2024-472xx/CVE-2024-47220.json) (`2024-09-25T15:15:14.653`)
- [CVE-2024-5301](CVE-2024/CVE-2024-53xx/CVE-2024-5301.json) (`2024-09-25T15:18:18.097`)
- [CVE-2024-5302](CVE-2024/CVE-2024-53xx/CVE-2024-5302.json) (`2024-09-25T15:22:17.627`)
- [CVE-2024-5303](CVE-2024/CVE-2024-53xx/CVE-2024-5303.json) (`2024-09-25T15:24:18.680`)
- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-09-25T15:08:46.537`)
- [CVE-2024-6147](CVE-2024/CVE-2024-61xx/CVE-2024-6147.json) (`2024-09-25T15:29:33.477`)
- [CVE-2024-6153](CVE-2024/CVE-2024-61xx/CVE-2024-6153.json) (`2024-09-25T14:44:14.567`)
- [CVE-2024-6154](CVE-2024/CVE-2024-61xx/CVE-2024-6154.json) (`2024-09-25T14:40:26.970`)
- [CVE-2024-6845](CVE-2024/CVE-2024-68xx/CVE-2024-6845.json) (`2024-09-25T14:35:07.500`)
- [CVE-2024-7878](CVE-2024/CVE-2024-78xx/CVE-2024-7878.json) (`2024-09-25T14:35:08.010`)
- [CVE-2024-7892](CVE-2024/CVE-2024-78xx/CVE-2024-7892.json) (`2024-09-25T14:35:08.167`)
- [CVE-2024-8175](CVE-2024/CVE-2024-81xx/CVE-2024-8175.json) (`2024-09-25T14:15:06.400`)
- [CVE-2024-8364](CVE-2024/CVE-2024-83xx/CVE-2024-8364.json) (`2024-09-25T15:08:08.503`)
## Download and Usage

View File

@ -65478,8 +65478,8 @@ CVE-2014-10008,0,0,c9839b42466df6beb62d1b1e45c36224bda5f6d1ad22c43d836c3d23656d4
CVE-2014-10009,0,0,df296901c13fe6baff7d5ac20357c2eef6ecf7f3d71325bb64d51a88d8548002,2017-09-08T01:29:02.917000
CVE-2014-10010,0,0,6d9a81d47c969b3ea791d6753382dd65d7c2a93676798dda7f32f07b0c98d2a8,2017-09-08T01:29:02.963000
CVE-2014-10011,0,0,092ee8c8c8a45c1155c1b71aed77e090fe2cea3f82188e10cd61e6d7d7895e81,2017-09-08T01:29:03.010000
CVE-2014-10012,0,0,ad8175e0b712dd0242c9d106a54d49b97bc7882460938228699d2852369ec93a,2017-09-08T01:29:03.073000
CVE-2014-10013,0,0,93fbd8dd0831040905cb9042c96d903d9e0a5a7a5e2252bd8844866b39c9198c,2017-09-08T01:29:03.137000
CVE-2014-10012,0,1,daaf8c969b9f4ebaf47fca9d506670973bd23dbf2e51d7a2b0942b97123277ec,2024-09-25T14:33:47.597000
CVE-2014-10013,0,1,baf4579213fbe6c83dffa430a45ecb4104282f326ed9edc70c88f069430960bb,2024-09-25T14:33:47.597000
CVE-2014-10014,0,0,305132c6d7e4206ba7c86202f4d8962c03eede73f05aae003b37d8624f37ec52,2017-09-08T01:29:03.217000
CVE-2014-10015,0,0,8bdaa58d6e6d04c6a3a852aeb6795ecd8f6bedd5de4ec2648b0a7afed602d848,2015-01-14T00:20:07.893000
CVE-2014-10016,0,0,7482aabf75f9d7ccfa9665d6dc9ff1ecb0553351c5f6ecc3fd28bb637df16ff3,2017-09-08T01:29:03.277000
@ -74913,7 +74913,7 @@ CVE-2015-1379,0,0,1b953d1ae89c6c481112b181f3d965974511a137bacd640c146d9fed522857
CVE-2015-1380,0,0,4ad7fb032dd720555eacdff92c0a6152162ca1d6e2b045abafde727628cce99e,2018-10-30T16:27:35.843000
CVE-2015-1381,0,0,1f367f9ad0221485a6817f831fe7ef1290ec7919efe893bbd9e7ab7ccaf4f3d5,2018-10-30T16:27:35.843000
CVE-2015-1382,0,0,d447253463e0b96c2ea9e8b317321c2892edbb738fc2b47a788a17b4de0da8a1,2018-10-30T16:27:35.843000
CVE-2015-1383,0,1,162301886a671c085e33ad34a0954037e4a0941474dca7ba6f588369e3c3134c,2024-09-25T13:10:58.457000
CVE-2015-1383,0,0,162301886a671c085e33ad34a0954037e4a0941474dca7ba6f588369e3c3134c,2024-09-25T13:10:58.457000
CVE-2015-1384,0,0,cd9b8dd636cee83624f561a5fcdefe401c750b28230944273a94bed8894e1871,2018-10-09T19:55:49.513000
CVE-2015-1385,0,0,1cb965c5ee98441680d3c1f1c7768517246a8cfe484410abdeba1ebdb7eb0ca5,2023-06-15T19:57:37.947000
CVE-2015-1386,0,0,16974db8920b7aaf9a998c51b8b141893d1526a6715c870f1289136b2fabe30a,2017-08-31T19:01:00.123000
@ -114897,7 +114897,7 @@ CVE-2018-14067,0,0,2a2d411621e57c68cb32bec00024c7d96a5b3e8780cc1a4378ff2a9dca9a0
CVE-2018-14068,0,0,73ca0c3535752c9ab01d98ea5d8042c8ed5153e006781c7c2386d3be071dd417,2018-09-10T15:00:32.600000
CVE-2018-14069,0,0,a5a916c2fd1682ab6edefb82af335e5d17cebb1dbdff86d04abe83a98816b676,2018-09-10T15:19:36.250000
CVE-2018-1407,0,0,26764cf337365d0810fd3a33ec5dd61fdeb20cc3c6e1c809e1e5d1c5f21a76a8,2019-10-09T23:38:24.913000
CVE-2018-14071,0,1,0decc732c0d07636ab40a37a15200c60f96a8548d379962919db82a7d51049e3,2024-09-25T13:10:58.457000
CVE-2018-14071,0,0,0decc732c0d07636ab40a37a15200c60f96a8548d379962919db82a7d51049e3,2024-09-25T13:10:58.457000
CVE-2018-14072,0,0,e08434ec000b275e2e1da7580a4753d3ba8f85ca7ffd332d413a5e348218f61d,2019-10-03T00:03:26.223000
CVE-2018-14073,0,0,f7dbef298e90943523b352eb0f45996d8ba189895a2fcaf16bd65a139e9d0022,2019-10-03T00:03:26.223000
CVE-2018-14077,0,0,be39c7b2d1c2f42d10df91767af8cfb8294ae86fd410aca9d7e0d334de66bfe5,2020-08-24T17:37:01.140000
@ -153831,7 +153831,7 @@ CVE-2020-24074,0,0,59fdc34b4f7dd03fb4891733b958226ee9c62d0393073e6dadd8229420004
CVE-2020-24075,0,0,a4e1c0929a794592036d4f4f55f2018c473c4420020ce6d38d3ff859bb8f2b54,2023-08-16T15:38:26.680000
CVE-2020-24085,0,0,36dc9ecfad21733adba79f670b8a0c7f72d1bc23a9ed5c08a1249114aa915aee,2021-01-30T01:52:56.210000
CVE-2020-24088,0,0,5daaaa8199391d28694f1b5e660719fee34f66a68451cf84904db2a0d6ae742c,2023-09-13T15:03:46.090000
CVE-2020-24089,0,0,7427b5dec3e8323e3589b26611c1fbfcb9d33a565a9c245ef2e62d02a728a986,2023-09-21T13:21:26.303000
CVE-2020-24089,0,1,282b4d81fac57266234ac87556408f747c8f5763ce7f614722ab28a41c09cd0a,2024-09-25T15:35:01.817000
CVE-2020-24102,0,0,d3877bead379765bc8bffb763a2d8dd99333c47ae5cb0b72e7c15b6d60e1c603,2024-08-01T13:42:06.163000
CVE-2020-24104,0,0,fbb4efcf58d1f727ffff0ae67b74aa346d7d8b26414283515bb2ec728cd84fb4,2020-08-31T16:29:12.210000
CVE-2020-24113,0,0,a33d0a4b1ae816dfcdb9871437627d7bc94b10a4e745b33597c039104d4ac8f1,2023-08-28T20:09:43.660000
@ -190734,7 +190734,7 @@ CVE-2022-21441,0,0,bc2ca46e6b7937a154c140b4a5ab92f0fe51eb40dd60d8e39ccd8ee9b50cd
CVE-2022-21442,0,0,257f19bcc8308bc457fa0199ecf1803ecbe3efe979daa70e98bbbd82ecfc0db4,2022-04-28T13:28:05.600000
CVE-2022-21443,0,0,0a55afeb6e47955f04f9d4642999e8ade129ce15078f095634d2e8d92fadc82e,2024-06-21T19:15:22.373000
CVE-2022-21444,0,0,5186be85aad1c4d733889f4a1f5150301ec25d3c487f0e278a98712336303143,2022-05-10T17:46:03.480000
CVE-2022-21445,0,0,bd4ec7ad584c5737683146373f525d1f165653894ca909387515c63854236d05,2024-09-20T19:15:12.973000
CVE-2022-21445,0,1,1d4294dbd66c8e237cc0614165de3c6698917adb7a62a99d78c027fed19f825a,2024-09-25T15:14:05.637000
CVE-2022-21446,0,0,6df2d5472ab8a30f78a13d35e05951c925360ed3964b8391492edcb6d5f83424,2022-04-28T13:42:16.247000
CVE-2022-21447,0,0,f80ea28619779d9bdde592cde6cc89b379fc127f0863353efe45deee94a406c5,2022-05-02T12:43:42.497000
CVE-2022-21448,0,0,93c9b9807154fbdebfb139861e1ac56e4abb764f7d6b8097c300b3d4c3ddacdd,2022-05-02T12:53:57.220000
@ -200169,7 +200169,7 @@ CVE-2022-32534,0,0,49082fcd77bc9ed33ce1ca5189b1d0fff5c5b4fc85b523f95d21dad8c0624
CVE-2022-32535,0,0,c23527abbc835749505ee2ce59cc5365f156b2932be4767c37f320c75fe6f7ea,2022-07-01T13:57:39.323000
CVE-2022-32536,0,0,7cf13b78624f79eae1ae83be4b8da553ca755efbcb608aac7283ac023a1cef99,2022-07-01T13:56:45.913000
CVE-2022-32537,0,0,bc4d027c93a618d2581c415009b913d71d9a1e29481c76d490ed8c1944dcac0a,2023-11-07T03:47:51.340000
CVE-2022-3254,0,0,90c41dbf6b051be4a1f54cf3557c0ae6fee95bc243482cf028e8c89b00131f60,2022-11-01T13:58:16.910000
CVE-2022-3254,0,1,9dff466e43c2e9ed9ef88d50e2ab6441513af00d720a4c72cb80cf541b81175a,2024-09-25T14:33:47.597000
CVE-2022-32540,0,0,fd7100497f3d3aa8a4681d2cd3bf4b490bda3e818a2bf43c35f604d14b207914,2022-10-04T14:38:17.087000
CVE-2022-32543,0,0,afe29426622bdb7e68cda90003e7668fad2ff96f469836d522dfffd3aa158d9f,2023-06-29T14:55:58.867000
CVE-2022-32544,0,0,4d9e4c16a6d076dc02fc77f9d1610ed7b6413cdf8bc1bd1e43ca35c4bb81c866,2023-08-08T14:22:24.967000
@ -220002,13 +220002,13 @@ CVE-2023-26567,0,0,2fdafb05923d5e9dda63087161b051ed776db5e87ba1f7f5bfb489fc31847
CVE-2023-26568,0,0,6977224c632433016d8ff2d2cb19348688d720856f15a54184e408bd244d7fb6,2023-10-28T03:20:16.467000
CVE-2023-26569,0,0,b1c8a19955ca28ef62fa087fa8ee5e319de6bb8443600fd874df9551a81f0caf,2023-10-28T03:20:20.530000
CVE-2023-2657,0,0,6bb86c6b8f97221a5a3adfae4b8836a1c6086c7469330d39586eadc2437a6979,2024-05-17T02:23:07.787000
CVE-2023-26570,0,1,e062e418dd4e60d0b4cf3c642e7cac18b0e244ddcc351bdd312b7f2a949babe6,2024-09-25T12:15:03.550000
CVE-2023-26571,0,1,145d3254e3704347d146630b5cbea35d3f024d32b548b4a25088f6b90a9989d2,2024-09-25T12:15:03.693000
CVE-2023-26570,0,0,e062e418dd4e60d0b4cf3c642e7cac18b0e244ddcc351bdd312b7f2a949babe6,2024-09-25T12:15:03.550000
CVE-2023-26571,0,0,145d3254e3704347d146630b5cbea35d3f024d32b548b4a25088f6b90a9989d2,2024-09-25T12:15:03.693000
CVE-2023-26572,0,0,c838711d5ca1fe934b2a4e03300483cc4194eae1ad2a456ebcf41b09d402922d,2023-10-28T03:22:43.037000
CVE-2023-26573,0,1,620e021ab2e2304942e3aa88633c0deb0898c915ed47fe74b5310c0f4bf465b7,2024-09-25T12:15:03.787000
CVE-2023-26574,0,1,99add887cfb1560d349baef59823dab84742049e28265b7ba9e9ffe7302cb766,2024-09-25T12:15:03.890000
CVE-2023-26575,0,1,773bffa73411451a82a68c7b90f228333cb4a2be04850f5e157b73b19a20294a,2024-09-25T12:15:03.983000
CVE-2023-26576,0,1,b6e4356178fb45cc8e4d0c09980afc7b5bfc85c28cf8478dc60cbc9b6512c719,2024-09-25T12:15:04.070000
CVE-2023-26573,0,0,620e021ab2e2304942e3aa88633c0deb0898c915ed47fe74b5310c0f4bf465b7,2024-09-25T12:15:03.787000
CVE-2023-26574,0,0,99add887cfb1560d349baef59823dab84742049e28265b7ba9e9ffe7302cb766,2024-09-25T12:15:03.890000
CVE-2023-26575,0,0,773bffa73411451a82a68c7b90f228333cb4a2be04850f5e157b73b19a20294a,2024-09-25T12:15:03.983000
CVE-2023-26576,0,0,b6e4356178fb45cc8e4d0c09980afc7b5bfc85c28cf8478dc60cbc9b6512c719,2024-09-25T12:15:04.070000
CVE-2023-26577,0,0,e387b43db07597111e29d303d9128e385187422549d09a38938ea31e04f41f85,2023-10-28T03:22:14.633000
CVE-2023-26578,0,0,ba6419d6cd9adc08f3d9d2b1b07f4e78f6960abb31d0e4463f52347de7929d39,2023-10-28T03:22:06.693000
CVE-2023-26579,0,0,0d11d6d0470d7c1fea00625466cfa4bdfd047a078ae6785854c8528b0760a70e,2023-10-28T03:21:34.177000
@ -220375,13 +220375,13 @@ CVE-2023-27250,0,0,9a38b5d3d9104ffd11b543000f80c6f407e3c0edaf3802060491a056f2089
CVE-2023-27253,0,0,9208d75df1005d2bd5e7abb6ff00cd1294d8c7da73f06e3279890d8e23280f2b,2023-07-13T23:15:10.157000
CVE-2023-27254,0,0,41059f30436b4f8a4c052c41ad0605125a704f6391cfee8ca7e05b9c82853509,2023-10-28T03:20:53.253000
CVE-2023-27255,0,0,ac8c553e15a265f318ec023b2438a45227b1a06a8912b67f24cc5919737c478f,2023-10-28T03:22:55.287000
CVE-2023-27256,0,1,65aa31ff10449c505609fa6dc86cd0ce71b9464d92443f742e70e56db5b8cc6f,2024-09-25T12:15:04.160000
CVE-2023-27257,0,1,dd21dff6561509ce5912a1e54a8494f7ac6d838d3edd51a6844968ba9d55300a,2024-09-25T12:15:04.267000
CVE-2023-27258,0,1,3d2cc14947fb15410b195fd019558a596fe6f41cf3fe89c69df802dc54ff70dc,2024-09-25T12:15:04.347000
CVE-2023-27259,0,1,62c6250b4c4d2c26b196bdaf9fe19261fea853d5cc27169219feee671bb62433,2024-09-25T12:15:04.440000
CVE-2023-27256,0,0,65aa31ff10449c505609fa6dc86cd0ce71b9464d92443f742e70e56db5b8cc6f,2024-09-25T12:15:04.160000
CVE-2023-27257,0,0,dd21dff6561509ce5912a1e54a8494f7ac6d838d3edd51a6844968ba9d55300a,2024-09-25T12:15:04.267000
CVE-2023-27258,0,0,3d2cc14947fb15410b195fd019558a596fe6f41cf3fe89c69df802dc54ff70dc,2024-09-25T12:15:04.347000
CVE-2023-27259,0,0,62c6250b4c4d2c26b196bdaf9fe19261fea853d5cc27169219feee671bb62433,2024-09-25T12:15:04.440000
CVE-2023-2726,0,0,a676b363020363c4c1f0ad8a6a07b45ba0a1aa75ce1af10a307a407938214927,2023-11-25T11:15:15.500000
CVE-2023-27260,0,0,5e6bdc7d9b83cbf41fe216801b3bb189101a053484437d15f2f76068f948fce4,2023-10-28T03:20:11.070000
CVE-2023-27261,0,1,b7c595a3152e75ec79d1f521d5381ab1d36c6c1db00e2729792677404f9ed106,2024-09-25T12:15:04.520000
CVE-2023-27261,0,0,b7c595a3152e75ec79d1f521d5381ab1d36c6c1db00e2729792677404f9ed106,2024-09-25T12:15:04.520000
CVE-2023-27262,0,0,caac8ec50512eb671360f25fa34045881c38191f203fca0faa1ae5fbb8afcbf6,2023-10-28T03:23:20.260000
CVE-2023-27263,0,0,7321fe736df422d5ab6748f2b41cffe795165e7103b6523cef8ecc079ad10836,2023-11-07T04:09:53.167000
CVE-2023-27264,0,0,5012d9666f52e1d64d2e30de42d2c1ad57116ad5fa028f3ae006f653e3465e0c,2023-11-07T04:09:53.240000
@ -220489,9 +220489,9 @@ CVE-2023-27370,0,0,8a51074535677b5a5ddfb77e2d5ed90aa22f20fb837425866fcd0b638d93a
CVE-2023-27371,0,0,bc1427797625faaaa1b1c13746235a3a4dee21b87bb2c971edcaf9ba15a6b470,2023-03-31T00:15:06.447000
CVE-2023-27372,0,0,140377125b71fa708eece5718b16a779b6bc4519b4b6307b0e12f0baa25e9109,2023-06-21T18:15:12.797000
CVE-2023-27373,0,0,0c5a6e2505edc294683fadbae329757286d6d5e9667ace25401a379f6857078f,2023-08-15T14:29:28.147000
CVE-2023-27375,0,1,5d4b5b038016121cc6c3c56d10c4fe48caf0a990b127afa54730ed1590ae0c1a,2024-09-25T12:15:04.620000
CVE-2023-27376,0,1,fe181908091c98d121d69936eff1bbfb60a8170aba03ae0a6afd90c1c8ae0366,2024-09-25T12:15:04.703000
CVE-2023-27377,0,1,b89077a4f13f1b1a2d61bc944066e1bbbaaa3e23fda0850aebd072bee6454136,2024-09-25T12:15:04.797000
CVE-2023-27375,0,0,5d4b5b038016121cc6c3c56d10c4fe48caf0a990b127afa54730ed1590ae0c1a,2024-09-25T12:15:04.620000
CVE-2023-27376,0,0,fe181908091c98d121d69936eff1bbfb60a8170aba03ae0a6afd90c1c8ae0366,2024-09-25T12:15:04.703000
CVE-2023-27377,0,0,b89077a4f13f1b1a2d61bc944066e1bbbaaa3e23fda0850aebd072bee6454136,2024-09-25T12:15:04.797000
CVE-2023-27378,0,0,31482c383e817f9d20b7bd76da956e9bad2eb654b8fe59b6a3bd6c47ff64305d,2023-05-10T18:42:24.563000
CVE-2023-27379,0,0,10d7b013cf0d14a894592dd7963a20baf17263cd521b117e31cd210f91544e11,2023-07-26T21:01:27.943000
CVE-2023-2738,0,0,255759be26e7795447f0c9a8ed26b9b32d3fb8b8611259cfdd49e891c8f110cf,2024-05-17T02:23:13.270000
@ -221328,7 +221328,7 @@ CVE-2023-28320,0,0,5227e72069a84089f10fac1339bbb3457663967a9fe65f4cfcdbbe543fe69
CVE-2023-28321,0,0,7ab7e472a08cbfbcee1cffe766366f8afabb5fa1fb871361581640f837006d09,2023-11-07T04:10:28.670000
CVE-2023-28322,0,0,e6f8a76dbfdaa1843cff4928586c0e102202ae87109018408c12011fd0e73a40,2023-12-22T16:15:07.493000
CVE-2023-28323,0,0,45a7580f5caaf370f52fa79201231573e457be28510d4650ecf80ae2fe96b361,2023-07-10T15:55:23.607000
CVE-2023-28324,0,1,9aea6ad31e5715b0a7ecba6b2b0f7468ba0870be2dca0f7bc052bb6544030f3e,2024-09-25T13:35:00.443000
CVE-2023-28324,0,0,9aea6ad31e5715b0a7ecba6b2b0f7468ba0870be2dca0f7bc052bb6544030f3e,2024-09-25T13:35:00.443000
CVE-2023-28325,0,0,4fd6e0b0b7c505c2fd43504d4b63a966dc708437fb5467ce1e281a243ba9f9bf,2023-05-22T14:29:00.840000
CVE-2023-28326,0,0,0c7b7956b8940c0928a48d68076b8f428679c68ea4c7d44789f578c2e29f73c0,2023-11-07T04:10:28.880000
CVE-2023-28327,0,0,b6f0484e5b7bfca56361e43c7bf8608f46ecfd24e3583be1082bf3cc2207865b,2023-04-29T03:12:41.973000
@ -227993,7 +227993,7 @@ CVE-2023-3726,0,0,ac750baaeff2ed8dad84b40df631d00ba8ce0ef4cbd1cbbd2025aab71f295e
CVE-2023-37260,0,0,9591f29f2336c88423330f41871bd7bd98ea2f435e69f4e8a0163bb034d3ac2f,2023-07-13T19:25:56.337000
CVE-2023-37261,0,0,c15061219f2054586e998e8e4191db1232262de421297ca29f05c987298cc1ac,2023-07-18T18:12:11.467000
CVE-2023-37262,0,0,d0455064d20e123f0efdfc579aca1bed0d88c3dfbf5f4865e75fc0095d4745d9,2023-07-18T18:12:57.687000
CVE-2023-37263,0,0,fe3631e704e3a39f448092d43808caaba870ea92a1cbae42d3e67660ccc76d0d,2023-09-20T15:38:23.920000
CVE-2023-37263,0,1,23af5506fb46073bfd90bf07738035dd86dce7d0db119ec5eff286db7e24445c,2024-09-25T15:35:06.763000
CVE-2023-37264,0,0,2d98c554455d093e3319d84a2315bcc53035940b0f3139573004068fd205692a,2023-07-18T17:55:49.017000
CVE-2023-37265,0,0,95fd52ebc6ae133f92282bc8388d2b5ded8f235541e60455426da249c877067e,2023-07-31T13:05:33.253000
CVE-2023-37266,0,0,5be0af2b81f1d9b932768440d1721bcb9eff8cc22db486b542279ff33d6e17e9,2023-07-31T13:05:29.030000
@ -229377,7 +229377,7 @@ CVE-2023-38882,0,0,ec5ea47603a3086e4c462ba386dc895b14ddd5086093287271e85209edeb5
CVE-2023-38883,0,0,cd3140914d8c0ffbddee1828a1208821a650be5b41e85c41ea10c0430b03dc40,2023-11-30T14:21:33.187000
CVE-2023-38884,0,0,b5da0fb4dc777fd8639d5172b4dd9aea4eb0ed10d64ef9ac2f442f4a7ce780e9,2023-11-30T14:22:37.007000
CVE-2023-38885,0,0,67e051d301210858c0625bde39e7896fe7b2dbfbfe47cef5c5337fab13eb282e,2023-11-30T14:23:35.557000
CVE-2023-38886,0,0,710085474ff932533480e36a76d39d19c664ef85905e4448643dc07bccfc6255,2023-09-22T01:30:11.830000
CVE-2023-38886,0,1,94472bd9e9147d61ca51246df24167cb9efca241b8d0378ba7368418ce654f8d,2024-09-25T15:35:07.707000
CVE-2023-38887,0,0,ef6a800e913218682570d1543412894773e7fd59652e5edddda59874ebf59aa3,2024-09-25T01:35:53.460000
CVE-2023-38888,0,0,58087cc61e3ca9f72ca37b211c6f2b3cf8a5b8d6853a9a2b39aabbeb170b1082,2023-09-22T01:37:33.650000
CVE-2023-38889,0,0,a0fef916a432e79e5bd8ea399af336a0c2bb6f7f29a61b363335de74959388c0,2023-08-25T12:58:20.617000
@ -229494,7 +229494,7 @@ CVE-2023-39041,0,0,4d2d80ed29ee24b6cf6a78aa3d12d1c146d9a3291971e1efcab61cd8aac90
CVE-2023-39042,0,0,a7a48f880646aadc134f0732e1d990e50286c7395769d5435f8dbb80591cc8d2,2024-09-05T16:35:08.263000
CVE-2023-39043,0,0,ba87098ff2bd45dc807c6b3c45c4d66fca97b5b793c3dc3373facd890703338e,2023-09-22T13:22:19.643000
CVE-2023-39044,0,0,50243e0bac844c04b7b4f63fd226a1af22956f7d9c562fd19fa07b15eb962106,2023-09-25T16:36:04.260000
CVE-2023-39045,0,0,57f8d443ae49abb4059d194043c2165dc9e6feffc529b819537bbcd4bb4e7744,2023-09-22T23:04:32.703000
CVE-2023-39045,0,1,6d884e440d5100507ad947ab48028b0d01e64df7c86eeb963e462356814b2c26,2024-09-25T15:35:08.613000
CVE-2023-39046,0,0,143f854cafec6743bb41bfbb8e25ead3a2d45ac15cdc3b4a97748ef03fb13246,2023-09-20T20:49:29.943000
CVE-2023-39047,0,0,330bee41b764040dd805e09cfff457ad69307d4794890a3decee0e8a8207a24f,2024-09-05T16:35:09.043000
CVE-2023-39048,0,0,e78542bc4874a647db5adf59501a708f98fb1b693a6bb7216920949ea0533622,2024-09-05T16:35:09.877000
@ -230009,7 +230009,7 @@ CVE-2023-39673,0,0,1383a722f73fa45ec1f409f9bced11a36c7bbb97d093acfe8f3c7683f293c
CVE-2023-39674,0,0,3960c98ff7a06cfa573d9f681ebf121310862d3c5cae123e3ff9f469bbeca873,2023-08-25T14:51:47.643000
CVE-2023-39675,0,0,a2fd8b9d51e0e1e0080a91cc68dd1c3065ba8ba51b711ea573cc7f02e58c64f0,2023-09-22T18:43:26.797000
CVE-2023-39676,0,0,c58b61d951aa8285e7616075d06acc199f6ffa44476dc59aacf6aefafb0e14ef,2023-09-12T12:59:31.113000
CVE-2023-39677,0,0,0afa3f086ee3e1a5c26f237c362abc67c8dad9aa323420a1927fb40926741db3,2023-09-22T18:48:49.313000
CVE-2023-39677,0,1,7689b7378372a2a1e5764de709118ccf2d4a6367a98fb1ed33264ffc1139f47b,2024-09-25T15:35:09.437000
CVE-2023-39678,0,0,5768a64945dc98c32f9397bc6565496b6289700b44c9156333712cee617624c9,2023-09-01T14:56:42.557000
CVE-2023-39680,0,0,0f1d0edcc59b98882ba5ae1194c193c2446d562066de2b63c33cb78785d6f847,2023-10-26T17:36:04
CVE-2023-39681,0,0,d99ea53c9c5dbc568c58a90c53b41291d128837a76f3340d451cf74637118d0e,2023-09-08T14:16:00.450000
@ -231178,7 +231178,7 @@ CVE-2023-41175,0,0,fbe29740e79a6f110bab7b90278d9d39985394d1613cf8901fe1335b4b651
CVE-2023-41176,0,0,735a0bc0e4dcb12596e8399bf2bb3db1e454d6b0ecbf729493e45efd006cfa90,2024-01-29T17:36:19.543000
CVE-2023-41177,0,0,85d92f4605d3211cf1bde63a5199a5251834ff7f9b179a06c1231042c732c91a,2024-01-29T17:36:01.880000
CVE-2023-41178,0,0,ae4285b4cb6a4ba4be6bd1f532eeda2be8bd03382dfa154527e14597a8ca5649,2024-01-29T17:35:46.797000
CVE-2023-41179,0,0,ef441bc591df051a9a12adf361f9b1800286b8b810e0e8535c0748958aab38a0,2023-09-22T15:08:32.273000
CVE-2023-41179,0,1,2bef674c7e750daed2add4f21cbbc303c4db1104b2ba7ed60f9172dacf37b456,2024-09-25T15:35:10.467000
CVE-2023-4118,0,0,49c8fd5dcf6c9d8b3d7fdb70da024ff5326d11c7e410f78e141b30dbfc95b82d,2024-05-17T02:31:20.433000
CVE-2023-41180,0,0,1b43d9ebf796521501b25c4d1df423a5fa172bc47aa4e768647fe9d6437306b7,2023-09-08T17:15:34.357000
CVE-2023-41181,0,0,ce8d7f4f3537484fb37642fb235ff955f751e8845ab8f79a0432507c247ddc49,2024-05-03T12:49:24.027000
@ -231314,7 +231314,7 @@ CVE-2023-41307,0,0,b40206db3f664c3741f7b63048e1db296007a1580fe2faf85cefb526ef104
CVE-2023-41308,0,0,6835c8dc26ef7b1d8628f4b4565cdf08b38c79279b9714ee93f6f62ea090cff6,2024-09-25T01:36:05.800000
CVE-2023-41309,0,0,154e293d9c3d937fb04656c30c71ffaf7386d4b8e6863bd96a3d8a11bae1f2cc,2023-09-28T16:07:39.257000
CVE-2023-41310,0,0,baed8ce68083b6dbb90f516f90b0902dd047c6d89511f25ca69a36ee0c1ce871,2023-09-28T16:03:40.263000
CVE-2023-41311,0,1,f9c60ca46138b44e528cc98d7a1515cebcbabbf569867d9c50588e1fe283bb03,2024-09-25T13:35:01.407000
CVE-2023-41311,0,0,f9c60ca46138b44e528cc98d7a1515cebcbabbf569867d9c50588e1fe283bb03,2024-09-25T13:35:01.407000
CVE-2023-41312,0,0,58f8c57ed7582d0a806011fae75a0fa65cb09fde370ec1d14463d9b06219a7e6,2023-09-28T15:55:47.057000
CVE-2023-41313,0,0,30321f3e06cb0e59bba66fb59410219af7cd6bc368d72f5cfa5a6534ea657ffb,2024-08-05T18:35:02.890000
CVE-2023-41314,0,0,231103ce18fbd562745e97d45033e3484f45e746fb68dafcef5ec6dd9e6c6ec7,2023-12-22T17:19:15.287000
@ -231622,7 +231622,7 @@ CVE-2023-41797,0,0,d7e4633821167d99054cbec7b694b6e4999a2302a809bdbebc652ab0389a3
CVE-2023-41798,0,0,83e9fcdf95a46f239202f5d75ee32f7f07fe571137e40d0e2853e0e947c05e6b,2023-11-14T20:08:51.377000
CVE-2023-4180,0,0,5d3c1912575569ebb9e0756b8786704fe9ca7f2bb609446e2b417d106a3cb85d,2024-05-17T02:31:24.523000
CVE-2023-41800,0,0,178a3a78ea773c20c95721fa0242d9947f201fe84ac849334bbbe1d425cebb3a,2023-10-04T13:24:01.053000
CVE-2023-41801,0,0,13e02f096e5eec5a8549548c74e772c095781ae493882648c9442c3a1c8490c3,2023-10-10T20:53:59.430000
CVE-2023-41801,0,1,7c42397651beba286442212d368a2bacaf0e8b1a7c1fc3db375979c2f1067bfa,2024-09-25T14:33:47.597000
CVE-2023-41804,0,0,8149d0401ab2252928bb8a0da4030ea53ead1f11056c77b9bb3565608fa9dd10,2023-12-12T16:59:18.847000
CVE-2023-41805,0,0,82c89112cdbc1fcd641e2f0533d0143ae2c950801f8544c0f29b9536a5df601d,2024-09-20T19:07:21.190000
CVE-2023-41806,0,0,4ddc5fa3c904efe0db4807d8335e589d7a5cb0b3231a4c5a9500fe7c2ee2a163,2023-11-29T20:57:54.670000
@ -232996,8 +232996,8 @@ CVE-2023-43762,0,0,85fe4a7be19e4df6ad7574a946086d487a7cebdd042e25cebf6b877e02ed4
CVE-2023-43763,0,0,ad3b6d3f3e0da3b7452322da5a003e6c3c066cc43784fd16ddb4173105c087b0,2023-09-26T15:17:46.050000
CVE-2023-43764,0,0,8889491e93115695f3fc431c4c0f9d76300cca9f46772a36c586711caeafa3d3,2023-11-07T04:21:29.433000
CVE-2023-43765,0,0,5c4872389b318f4c7530f1c578fdad56afadf196ae8e0f4ba8c447bd204a6995,2023-09-26T14:52:04.797000
CVE-2023-43766,0,0,b9de1d1bf9b228e1240a1e9ea71fc72cd181ea847edd17452c777fbd24ad1df4,2023-09-26T14:51:56.633000
CVE-2023-43767,0,0,b62d7e632d2327cd67c556a7d958107e7db644dc97b7011080987bcce505ed68,2023-09-26T14:51:32.377000
CVE-2023-43766,0,1,c6a88587a2a8ee8cde523a53dcacc6d0ba77e01352696079cdce368cede349b6,2024-09-25T14:35:03.310000
CVE-2023-43767,0,1,b347065f41a38bb3b988ca8b34fc42840783a6b7af72cc203506ace26949c90e,2024-09-25T14:35:04.100000
CVE-2023-43768,0,0,8c20823b844f3a9e03681ad3a89abbeac68d3ffbdb0715685e9ab48bbbd54ca4,2024-08-05T15:35:06.983000
CVE-2023-43769,0,0,c9ac3b45a6e5a8e8f9bade6fa502768ac8c514f0d2ca4cf91d7c69f448e9810a,2024-02-29T13:49:47.277000
CVE-2023-43770,0,0,f29dc8bdb9d7b048af488c931e5105cc1ca7a11e56981fca4cbc06661f550bcc,2024-08-14T15:27:53.727000
@ -233114,7 +233114,7 @@ CVE-2023-43906,0,0,ff14d8a22a132aecd242d338700d98c93de3c23cabb88a79d907b46e4d330
CVE-2023-43907,0,0,96d826a1afbfe78d28e5fc62e2d4cba36335d098a0b61b1aa2fe33b1754fdddf,2024-09-23T17:35:08.737000
CVE-2023-43909,0,0,2a52e5f92b53304c7bc4e54ac24676fe4e46f8d985d61293ac477491967852dc,2023-10-02T19:40:04.803000
CVE-2023-4392,0,0,1d3f2d738afdf027eae4b211f2e571cffa584d21a99ee02b4525f798db1c03e9,2024-05-17T02:31:31.610000
CVE-2023-4393,0,1,c5af9a9c16a1e9bbc22080d93f65c06d20e60bb1e00e4221a8aa5681e06de445,2024-09-25T12:15:04.887000
CVE-2023-4393,0,0,c5af9a9c16a1e9bbc22080d93f65c06d20e60bb1e00e4221a8aa5681e06de445,2024-09-25T12:15:04.887000
CVE-2023-4394,0,0,1f57bf1c0cd94fb3a96400a16dd6f87e9c0313e4ee9e7f85cc8cb9e838e908d9,2023-11-07T04:22:31.487000
CVE-2023-43944,0,0,444cb16bb521303bb044c64676fbd90beb0aac62b40598010588900ff85bf29b,2023-10-02T19:37:07.767000
CVE-2023-4395,0,0,78dc7c95316407c5e68a1106c7fbdadf01339b63c6724f1e4f6fa4838b57b003,2023-08-22T00:55:09.250000
@ -241327,7 +241327,7 @@ CVE-2024-0156,0,0,8cd5e770d8e5e59c7d65e04a0fa431766acdcdc3da422c86f8e66acb026110
CVE-2024-0157,0,0,b052323977852302a8b3dcef1c5407bc4b130da554cec8becf021fa4a53f3bd5,2024-04-15T13:15:51.577000
CVE-2024-0158,0,0,493e720f8594a13096c6819cd0491d46fb8daaf76a807516ccfa3d60519923af,2024-07-31T20:37:32.247000
CVE-2024-0159,0,0,0c6ed74ef93fe0f2339dad38605d4189f768646821accb8389e98e7b0a8e8104,2024-04-10T13:23:38.787000
CVE-2024-0160,0,0,77215eb4a3ba03e14a3778a99a10e2e6b84ee347e3b72afaca08e7c4452c5400,2024-06-13T18:36:09.013000
CVE-2024-0160,0,1,c92710127c3c68cbfcf31693a730fa150e45b62f8c20846b8836a7583cfb4e6e,2024-09-25T14:25:53.447000
CVE-2024-0161,0,0,dd7d9dd18beebfb5eb1c0fb111a222d1a21f2e0da1cca5f6b086372a8f3ea8a6,2024-03-13T18:16:18.563000
CVE-2024-0162,0,0,cbdcbc03600ba58dbcdc575cc7249a44d017ce4f0eee1c18c3e62afa66eb3ddd,2024-03-13T18:15:58.530000
CVE-2024-0163,0,0,326c77330b2d430b11602559de70e87e5e5cae16e2045c400e82b135f0a941b6,2024-03-13T18:15:58.530000
@ -244285,7 +244285,7 @@ CVE-2024-21748,0,0,2a197de0adbf993ed118e27e797a4f0c8754f47a7d945195f996e25827117
CVE-2024-21749,0,0,5487855d4429da4fac08226224f1538028a7a5ac2df658cc224a0e240622cf41,2024-02-29T13:49:47.277000
CVE-2024-2175,0,0,e25106a44fdb025eeacb5d45a3528175fd9b5c4474d6e05002e4ccb474d65bca,2024-08-19T13:00:23.117000
CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000
CVE-2024-21751,0,0,55d06ade7b40f70a88f44c4672adccf43ead813dee575220c2752c77b1d36f34,2024-06-10T12:40:41.360000
CVE-2024-21751,0,1,b7ed8c4fa6a86b73f6c8da24c7b3692a53b0d8972ec8abb4dfce264018a5c531,2024-09-25T14:44:47.350000
CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000
CVE-2024-21753,0,0,a306f3d58f3ec335b13488f5fd07d845590af6725b02e29d9bbf081cb21b4d53,2024-09-10T15:50:47.237000
CVE-2024-21754,0,0,8eef9cb01c9e62c140e9e4b8ce590b49e1091c67b7edd25a8a35093e89b8087c,2024-06-13T18:36:45.417000
@ -245043,6 +245043,8 @@ CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88
CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000
CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000
CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000
CVE-2024-22892,1,1,80254893987b632f368888a0fdc9b53a21be3a1356524ad4827824dce5b9c5aa,2024-09-25T15:15:13.430000
CVE-2024-22893,1,1,fbd2f221fbdd703871bbcde8ae8b8446994d44da7421d06d3bdb792f69ec66a0,2024-09-25T15:15:13.520000
CVE-2024-22894,0,0,ecc90d1f90435a146d50bcd73db1df9adeb9ffb1597740cac1fbe4451cd93336,2024-08-29T20:36:06.063000
CVE-2024-22895,0,0,ed8706063f1e23de8c688f7d1c47a27a8939e76d7f567287b7abe53b8af0f9ba,2024-01-26T19:34:53.417000
CVE-2024-22899,0,0,ad9a2b4d52cbb00f23c5860d056ec6bdcc5b6635f7aa86a4f629c4d09c9c8f73,2024-02-07T17:33:34.347000
@ -245479,7 +245481,7 @@ CVE-2024-23520,0,0,8ff478c5c4b5d739c301da902e3e561a7792ffa17404a3200b51330a193d7
CVE-2024-23521,0,0,588f9fef9e0931685bae8548cadda61591045c56809e69e9531787a263c78369,2024-08-07T14:53:07.043000
CVE-2024-23522,0,0,a52846eb42ad17ad8127f05143918d462e102a0513c46b5ed2f59dacea5e3889,2024-05-17T18:36:05.263000
CVE-2024-23523,0,0,09948d73039e543f65f5a12001864aed427ffc0f0117c9e9dfa8de2b2366d9fc,2024-03-17T22:38:29.433000
CVE-2024-23524,0,0,6f32e04588b1bc3d3e95dedb7043a7c175d73d130ef5a51afe14b8dc993fc663,2024-06-10T12:40:41.360000
CVE-2024-23524,0,1,0803489cedc8d3b84696d90e26589e2f1dfdd06a1522beccf3119dd2645f2c57,2024-09-25T14:48:24.990000
CVE-2024-23525,0,0,2fe4da7c61ec52781689ef5f10eb4fabb25623b93d66d848e3ba906b64f196ad,2024-05-05T15:15:49.067000
CVE-2024-23526,0,0,807e029925542dd0305ba76d2ef112e9c9d0141646231e69bc0a89a5683f9dc3,2024-07-03T01:47:48.580000
CVE-2024-23527,0,0,fbaf08c918532fa4419949f5ba9061caea7372e46fcf19a02a62eb7a204d2683,2024-04-25T13:18:20.370000
@ -247930,7 +247932,7 @@ CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4bae
CVE-2024-26977,0,0,1ebc6c5c595b695887aee884e1b3633cb0833cb65f13c96d7b2e671b86068f61,2024-05-01T13:02:20.750000
CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000
CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000
CVE-2024-2698,0,0,ba63bf2e199fd546e45fefa9014e76e4bd759c91f806298e0f2c90d9d174dc31,2024-09-16T20:15:45.940000
CVE-2024-2698,0,1,afa7c6d99994d30301dfc895821f75402b97e3dee976fb2af7dea84b7fe08a7e,2024-09-25T14:19:16.097000
CVE-2024-26980,0,0,66004865e97bac01ca2fcc8b2212adb69ec738c42c9473f52383ac2219c51794,2024-05-17T11:15:08.357000
CVE-2024-26981,0,0,d2097042ff43763161fba07eb2edb36cfb373acac608a1af8d5b7b1aed54db35,2024-06-27T12:15:23.460000
CVE-2024-26982,0,0,1a2169fa3b40190b3ed39d1072c0508ff86c68871ae50c9090fd9edb12452c09,2024-05-03T06:15:10.953000
@ -250170,6 +250172,7 @@ CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe201
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
CVE-2024-30128,1,1,820869ef61e83fbf81c3f8092c37a6f29489d0c1ee72c33c90c66bd0edb64c12,2024-09-25T15:15:13.717000
CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000
CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000
@ -250907,8 +250910,8 @@ CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2a
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
CVE-2024-31145,0,0,14bfd56957753a972b7293ba7d385ff3b3ae21a7f1330a21b84b6023b5b6fe39,2024-09-25T11:15:12.133000
CVE-2024-31146,0,0,5a631a88a6c48f9d5e2ebbcb599a1dfab46a04f08bc06cfe015b638853ef34e5,2024-09-25T11:15:12.220000
CVE-2024-31145,0,1,3c68d6c42a82be69732bb07ae1510acb165a3f045f1d558a63e873d817b2f394,2024-09-25T14:35:05.397000
CVE-2024-31146,0,1,6fec4a23cf47e3198ae7c71002553dfd83f463d212841c68a9f9e0964d16adf0,2024-09-25T14:35:06.133000
CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
@ -251112,9 +251115,9 @@ CVE-2024-31347,0,0,acf8f05b8434aab28c056143d3c5bbf346bc17b2a72c670eeeca8cf6f2e47
CVE-2024-31348,0,0,21fb9d543e6e3e7eca659bafa6b30c57732d01c43a441e87c8a8bc6f61ff0e61,2024-04-08T18:48:40.217000
CVE-2024-31349,0,0,6958dc31882ac788c6aead8b8caf022481ebc40e925e57f6fdba5545c64b5bac,2024-04-08T18:48:40.217000
CVE-2024-3135,0,0,14787e54c44a14e19f931debd6e7b0362645939106d66f074d2eb61a2e05c4fb,2024-04-16T12:15:10.367000
CVE-2024-31350,0,0,d6d58deb78b7c6de7be0643c53878deb7b14a5af248540a4ca133383733a570a,2024-06-10T02:52:08.267000
CVE-2024-31350,0,1,632f223e6b1eb6174b5b006d92158547f477320a7ac1ccf51cf9535b4edc5d68,2024-09-25T14:36:25.450000
CVE-2024-31351,0,0,bcbac2112f543a47a582400e16158e61b20d74c688ac093896e1aaf7d515575a,2024-05-17T18:36:05.263000
CVE-2024-31352,0,0,43155b369dc3edcac5ab2a3397c5dbb5a1d21f1ad94614e9a9045b330ef749ca,2024-06-10T02:52:08.267000
CVE-2024-31352,0,1,1efeab1b8ac23352d588e7c493517298cb74ce4d73067ae81649c047f0e64e13,2024-09-25T14:37:38.550000
CVE-2024-31353,0,0,e50827540a58fe3cd0fcdfc9ae9a072f34f1953d48a4cc1bcabca911b7d42b59,2024-04-19T19:25:34.677000
CVE-2024-31354,0,0,2021071244b49d04bfdae8f1fde1b120ffd4deb5b549bedcae3ab4e58eda06ff,2024-04-15T13:15:51.577000
CVE-2024-31355,0,0,44ccad3b09c334b6cae7bae0ef859237dbf5b126bcbd1960091f3a7b56f3bd0e,2024-04-10T19:49:51.183000
@ -251281,7 +251284,7 @@ CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db
CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000
CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000
CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000
CVE-2024-31570,0,0,4d903532fc7f1422100c17596c626c33a0fefb6d938530e0173d61af77ca358b,2024-09-23T18:35:13.297000
CVE-2024-31570,0,1,13eadb758f3d135a35bcbdc0da22b0a2db0abd3a7461107672829d5315a1eac1,2024-09-25T14:57:47.337000
CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000
CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000
CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000
@ -252045,10 +252048,10 @@ CVE-2024-32698,0,0,fdb6803b5dd86012a335aabef408290e444c359a1e305da67d57de34152c3
CVE-2024-32699,0,0,be768bbce852bcdad18724ac2d72cb1952dc4973a9b2ba3cfb91f099369fe620,2024-04-24T17:16:50.397000
CVE-2024-3270,0,0,cd1dc223e1bb7ba9458930fbe30425847724139a42bec6d9a460ed9757120c1d,2024-05-17T02:39:49.333000
CVE-2024-32700,0,0,9f71f6d70ceff87b6bcc7fb8a5e6f43f08fca897ae80882ba16d02dfaad35456,2024-05-17T09:15:39.783000
CVE-2024-32701,0,0,ad07ff3308bde1e623ee646e484ef5dca815748ce9a61ea39968b9888eee0ace,2024-06-10T02:52:08.267000
CVE-2024-32701,0,1,590776d7a2a9337926f886bf7bdc0c7b75e90c5d9330a73a9643e2a2609d703b,2024-09-25T14:39:47.870000
CVE-2024-32702,0,0,59e8f4da0f6fd5e6589c67ea6062707b9cd4e42b90abd493d5af3e3a271b28d7,2024-04-24T13:39:42.883000
CVE-2024-32703,0,0,a1a947a4d380bedfe75c3613d463d840a8e4a3c368bf092bace7e5ec3cc72bc8,2024-06-10T02:52:08.267000
CVE-2024-32704,0,0,ab80b58323f873d88308a8add3fb185b7f41fa0cc89ac87e6bb38b46553d9f20,2024-06-10T02:52:08.267000
CVE-2024-32703,0,1,3114859e77dee092d03e8185c52cd885fc9542e50effa91b7dba4589c6f9db5d,2024-09-25T14:42:02.487000
CVE-2024-32704,0,1,ee9e85f773127b03e0a4d9ccdba4918852ffb014508b669852b9114d4a79bc9c,2024-09-25T14:42:40.943000
CVE-2024-32705,0,0,bd5c1fceeebf3216d7a43299331ad75dd0f53c84521f7a39c88a1d85c984cfb0,2024-06-12T13:35:06.540000
CVE-2024-32706,0,0,37bc04f61db61a090e2ed6154ea739be1bc72b4942ea5b612055456d2c307efa,2024-04-24T13:39:42.883000
CVE-2024-32707,0,0,4c3ded36a06b33a6c90c1fb58c42a7f9398ce197f42ee1d348c6d8c1f58dc26d,2024-04-24T13:39:42.883000
@ -252390,7 +252393,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
CVE-2024-33109,0,0,9dc2db966fba43ebdbe87975b9f487800fa917451d9874ff1eb20b4521b9eed8,2024-09-20T13:35:02.703000
CVE-2024-33109,0,1,b893019ba7a5d5385ca87135f20f011d1b195977e7dba6b9ad5ac8b3abcf4e5c,2024-09-25T14:47:54.217000
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
@ -253151,7 +253154,7 @@ CVE-2024-3427,0,0,04d120d0d57c1b307c564812a2a90dbdd8ac5486efff94685b4ef467060605
CVE-2024-34273,0,0,4c0c9834fc4b51c4a9b9199849839d68fcd657ddede4c1f2ac2a03c81dfcc2ae,2024-08-01T13:52:18.903000
CVE-2024-34274,0,0,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000
CVE-2024-3428,0,0,14a86e039ac8cb265b9d604c5dfa68dc90fd322057a6dfd51fe11334090fcad8,2024-05-17T02:39:55.420000
CVE-2024-3429,0,0,fa81917b1ca9f56b2153736c9df2d56f1c691d3e9c7a13a6b884f4266ecb1896,2024-06-07T14:56:05.647000
CVE-2024-3429,0,1,1b21bacd9290b4a4c3f7f58bf8aa254378b9b7384a99cfeb925ecfff9ab6baed,2024-09-25T15:53:55.867000
CVE-2024-3430,0,0,a941a2bdaed6734132b4bed8d998008948b76c9a3932a595684037246d003245,2024-05-17T02:39:55.503000
CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000
CVE-2024-3431,0,0,5fc2c93ae5310a51e046f84945a2a838f604d6025e1cecd0f4843d0687905336,2024-05-17T02:39:55.597000
@ -254077,11 +254080,11 @@ CVE-2024-35713,0,0,ca8ba5d4caa775840c63bd81e19b8b2c3127ce17c1b54bccd5ab2a83c900f
CVE-2024-35714,0,0,8ad26a0c069cd7496b482871d778b1a0bc1b05193b8516e83b54f6455b846405,2024-08-29T21:10:17.630000
CVE-2024-35715,0,0,c5e9be613e22e2fc44f89d54f3164d7d8990eeb3c59fcb4a70e49f768e380c3e,2024-09-18T00:15:03.447000
CVE-2024-35716,0,0,31701854ea5aabdd20ee7c3d1f2ecac85ca8e50bcb2d7b44a201fe7038b52764,2024-07-23T18:21:24.257000
CVE-2024-35717,0,0,df3c144eac2c7185763c3f87901dcf8160094e45df6e50236e7e523b5cb2e856,2024-06-10T12:40:41.360000
CVE-2024-35717,0,1,37f0ecbb97c46d8d21aec034d8ca92096dd3f999480fccf5e128fd3c6dd61528,2024-09-25T14:46:17.400000
CVE-2024-35718,0,0,223668ad06091da54030dcd99f3617788339139ce57d8c19397b9e702415dc22,2024-08-29T21:15:11.230000
CVE-2024-35719,0,0,654572645a72aed91b6397ff11bb2909c265f1c87e8f07aca797c61ec4fe801d,2024-08-29T21:16:30.363000
CVE-2024-3572,0,0,358c8cea0f66b609b18250018a3e0beb2b858435bcda9c64899afe87e118fccd,2024-04-16T13:24:07.103000
CVE-2024-35720,0,0,749f759d07d80b8289494556f3201c4d30ffb3b7ab2498a7cd6ca701a029616e,2024-06-10T12:40:41.360000
CVE-2024-35720,0,1,15b66e7747e75989b47c7d0180f243d57d689a2f71aa742f4825b2215ee23e5a,2024-09-25T14:46:44.140000
CVE-2024-35721,0,0,403808b7ed18588cd66dee94bf769203fe91a72280712700be1c25ea8cb639f1,2024-06-12T16:29:34.530000
CVE-2024-35722,0,0,900f52c63024bc31ebeec814424e23a50e10f9bab2e81b43138d101b966398d7,2024-06-12T16:29:22.497000
CVE-2024-35723,0,0,4b4f1b40c0f9bfef4b6800e9ab37bdf9cecea3df8bc822ae05c354686639054b,2024-06-12T16:28:51.920000
@ -257134,7 +257137,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
CVE-2024-40125,0,0,a476dbd3f3f206651d575570cacc18ab6c935953de90db456d4691dc8d2c83c8,2024-09-20T13:35:05.043000
CVE-2024-40125,0,1,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
@ -257451,14 +257454,14 @@ CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000
CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000
CVE-2024-40856,0,1,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000
CVE-2024-40857,0,1,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000
CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000
CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000
CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
CVE-2024-40860,0,1,e5ead227110aa19c4042e26e364c8228b4489bfdf6f0431771df4e3ccb8a59ef,2024-09-25T13:41:05.177000
CVE-2024-40860,0,0,e5ead227110aa19c4042e26e364c8228b4489bfdf6f0431771df4e3ccb8a59ef,2024-09-25T13:41:05.177000
CVE-2024-40861,0,0,7204d4c395d904aba2687d268d077938e2cf1cd101497574171fb4f0b590be98,2024-09-20T12:31:20.110000
CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe834e,2024-09-20T12:31:20.110000
CVE-2024-40863,0,1,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000
CVE-2024-40863,0,0,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000
CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
@ -257976,7 +257979,7 @@ CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000
CVE-2024-41721,0,0,12766b4c7f51eb7a1a0c43ad9874acc5fe8f1337f9498c5461e7d7b0fe5e86b8,2024-09-20T18:35:04.067000
CVE-2024-41721,0,1,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
CVE-2024-41725,0,0,21bbc62325c2482a0a8901148be83c11d24610782aed5e5a17dc78b6664e4bda,2024-09-25T01:15:41.833000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
@ -258253,7 +258256,7 @@ CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d07665
CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000
CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000
CVE-2024-42113,0,0,055bfc7352f8708916cb02878daf8b9abd49f09673041c2a3f1555d3e0438485,2024-07-30T13:32:45.943000
CVE-2024-42114,0,0,52fc6452df42e510345a38f3a6af930f895f826164e821b340b17896b69f27ad,2024-08-27T15:00:23.807000
CVE-2024-42114,0,1,9975c17cda36886fe3dd1c3e92dff536b06cf6f9784b3fb1441a9cd391ce6816,2024-09-25T14:44:11.110000
CVE-2024-42115,0,0,c1bf508190d9d011d99e9e0c6936167394e909cd6a7f0f4a4e381df1abddbea8,2024-07-30T13:32:45.943000
CVE-2024-42116,0,0,30a90b9468660b29848bbd64238d702f03ad6275f3a02231616e417bdbda5513,2024-07-30T13:32:45.943000
CVE-2024-42117,0,0,e86f5875f9840b49edb38024936f207409c0f434c81331cd923e6aaf28928c94,2024-07-30T13:32:45.943000
@ -258263,7 +258266,7 @@ CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8
CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000
CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000
CVE-2024-42122,0,0,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000
CVE-2024-42123,0,0,b9b512a4ac6ec22c9bc1d525d88b6db6a1f01966b278ee4c7ad03b69a5e85a9c,2024-08-23T14:13:05.580000
CVE-2024-42123,0,1,fcf3797a52cf94737c36d1a9dcc7dcdf4f1621793123c3aa297da1a863bdccb1,2024-09-25T14:45:25.770000
CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000
CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000
CVE-2024-42126,0,0,5ead821db32439b0032661ea186379c9f55f1afa1bc2284b38295084f9f2435e,2024-08-19T05:15:06.927000
@ -258272,7 +258275,7 @@ CVE-2024-42128,0,0,b8155b78412ff52ea13f2f9c045e69435a1427918f79cc2d9ffa4f93326cb
CVE-2024-42129,0,0,46d5c1746954fb4a02665ba978862f55732f5e2a31e0452c7452c5970d864bc8,2024-07-30T13:32:45.943000
CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cdf1,2024-05-14T16:11:39.510000
CVE-2024-42130,0,0,c0bf8d6705687d288b22cfe1365e7dce03a7394108689b183e481d0372b856b1,2024-07-30T13:32:45.943000
CVE-2024-42131,0,0,1fc726640575e0811e1b3c041d4cb29883ebb3d10c99e884209ec11d92467b7b,2024-09-16T13:52:37.707000
CVE-2024-42131,0,1,aff9a000aec3d408b4c99da176c5accb9bb8915c7fb722324b63293008e9a5e7,2024-09-25T14:45:11.617000
CVE-2024-42132,0,0,2f4d4ac80a7ca69cb3eacfe6d114a16e8e41ad14f4a3bea559c41eac32d31205,2024-07-30T13:32:45.943000
CVE-2024-42133,0,0,774a28cde62878f7ee006cd2f913f8ca89836e6fe0716586b68a30db7f392c96,2024-07-30T13:32:45.943000
CVE-2024-42134,0,0,b964a563fe31ebeed4bd473713e48eeb088a769f2eb83d9ee50ca797235dadc8,2024-07-30T13:32:45.943000
@ -258305,7 +258308,7 @@ CVE-2024-42158,0,0,f708fe0c9b8afdea7e816433ff8d7e695756b23c2951cd3e7d51dd4aa0ae2
CVE-2024-42159,0,0,ddb54cf3e23058b0cc94c2454029ec74eccf92e763ca85662f68c5080c1191bb,2024-08-02T14:29:46.240000
CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000
CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000
CVE-2024-42161,0,0,c37820156f6b32c3b0c8d53e62b0eb3e8a498c0455e3173c812581d5bb793102,2024-08-05T20:19:29.607000
CVE-2024-42161,0,1,97279a99e7775c2140b5fea2afa6ffe875092f1c8ad4660f6960f7eace3a4bd7,2024-09-25T15:54:47.837000
CVE-2024-42162,0,0,6afe87ab720ed2f9c2f080d1a44ac6b35a3f68a956a94f09bb5c649d3b32abfa,2024-08-05T20:19:56.047000
CVE-2024-42163,0,0,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000
CVE-2024-42164,0,0,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000
@ -258321,7 +258324,7 @@ CVE-2024-42219,0,0,6d72ad1f1e2233036625c33df60f051fc9699cbd96bd0caf5f28288f63cee
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
CVE-2024-42222,0,0,b89ef57d67246c59e7b320f402a614639a269bceaaa0c30be9cf5a9576c14c01,2024-08-29T16:43:59.923000
CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000
CVE-2024-42224,0,0,be03c0669f567c4c43069feb6297d1d0b39887abc231ab7cb6117aeb87386008,2024-08-02T14:24:16.187000
CVE-2024-42224,0,1,0865a03e98dd11ed105a5bc1eccb5a484aeb3ca4bb6400b3a913f08fe9d68aff,2024-09-25T15:55:09.027000
CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000
CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13993,2024-08-12T13:38:33.853000
CVE-2024-42227,0,0,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000
@ -258924,6 +258927,7 @@ CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b5803
CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
CVE-2024-43236,0,0,023011a32949e87f6bc318354cd0a34190696d548e7018a1624254d686b58e3b,2024-08-19T18:36:07.297000
CVE-2024-43237,1,1,cd4ab728831e6e0577a88455d0cda3b2e88386eeeb9db5eaa94711a551210f62,2024-09-25T15:15:14
CVE-2024-43238,0,0,55a9737df7d3a7bb29b80dc0b631f8b007fbdc439de2c352cd0a0288d492e84f,2024-09-17T19:27:03.220000
CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000
CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000
@ -259336,6 +259340,7 @@ CVE-2024-43954,0,0,76c216e4287ea3e21df8a5c42687b7643218c83658145d7a54c571f2f9829
CVE-2024-43955,0,0,4ede473467403747b1a04930906c4ff684161a593463954ac3ec5bae261e5e01,2024-08-30T16:23:35.187000
CVE-2024-43957,0,0,e37eee71e6d3d39b6eee1646ea93bd080fe2f853ce321f65d1106d4fc89b111e,2024-09-05T14:49:17.983000
CVE-2024-43958,0,0,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1b4b,2024-08-30T16:15:19.047000
CVE-2024-43959,1,1,32df0dc233040d83518e528926a0c9d41449588a10056a96e22cc88fed5664e8,2024-09-25T15:15:14.187000
CVE-2024-43960,0,0,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000
CVE-2024-43961,0,0,c6e06e0e8287f3f53bd61136fa1d8e035e3cae74e7a2040db5ee6246ae551f29,2024-09-05T14:39:38.957000
CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000
@ -259345,34 +259350,35 @@ CVE-2024-43966,0,0,2901acb1eb63b7a55cb46d133ca8742f966f34bb1db4feb1259a3cd63030f
CVE-2024-43967,0,0,efb5ab215f4087a53f8dcd252d52ef141005b5764a5e2b6c3ee9faa1675f0e1c,2024-09-18T17:00:57.497000
CVE-2024-43969,0,0,1a95b579d41eb8faee65f3858dc0c26a2595ef0cb4c3d2f4551a96318123fd7f,2024-09-20T12:30:51.220000
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
CVE-2024-43970,0,0,eb63732798152f8124074a55ee3aa3a4bd2bd176d6febbd091cb7ebc3fc9aa1b,2024-09-20T12:30:51.220000
CVE-2024-43971,0,0,34472b5ac709ce9a3f1abe23b8eaa963797fcce9e53b661d070b799ddc85f7ac,2024-09-20T12:30:51.220000
CVE-2024-43972,0,0,4fddac4919273fee7376e45e0057a4cc10abb7819b09ddabafb76ef0ea1017ac,2024-09-20T12:30:51.220000
CVE-2024-43975,0,0,977229ee6f21ff44b2f4c2cb7deb0207c9f2f611ad753dcecfedffb4a8442761,2024-09-20T12:30:51.220000
CVE-2024-43970,0,1,77a129e80056cfc70e3460dbd898d58f094794bf07956a918ea43df613f14f34,2024-09-25T14:18:53.297000
CVE-2024-43971,0,1,15271454200ca48e9894c5709f39b2a82fcb070edabcc7bed44b538ba98121f8,2024-09-25T14:18:13.137000
CVE-2024-43972,0,1,45d166e4dbb457cad4f9e6ecf80d8044e3ef67293a1719d9634316ae0fc28afb,2024-09-25T14:16:18.150000
CVE-2024-43975,0,1,277d0207a09080b919f3f219105b7c4323354cd0721ba6e67221ba9226888308,2024-09-25T14:13:32.910000
CVE-2024-43976,0,0,b5b36a728accce9a5c243e352c901188e8a688872f36e1c893cd85efac637a21,2024-09-24T16:32:37.747000
CVE-2024-43977,0,0,8548dd346f70e10bd02563139f9662536c4c908bc4be8bbe5ccbe1834db20d5d,2024-09-24T19:17:15.327000
CVE-2024-43978,0,0,b84c789c57b2300e5e696cc4e44909900a0446291c850df47c011342afd925c3,2024-09-24T16:44:01.557000
CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd54,2024-05-14T16:11:39.510000
CVE-2024-43983,0,0,1129654801fd3266f7fe50d30c14628ba8e34277b02cfc392393ce4aaa513f92,2024-09-20T12:30:51.220000
CVE-2024-43983,0,1,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000
CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000
CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000
CVE-2024-43987,0,0,5f2ad565a5d32bae37360bc37876e8a6cdef75055ca9a1d57a5047cb69a7250c,2024-09-20T12:30:51.220000
CVE-2024-43988,0,1,43ffe19e41988c419aca249be075847312c9c8cd41c433297d22c781cef44325,2024-09-25T13:55:55.460000
CVE-2024-43987,0,1,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000
CVE-2024-43988,0,0,43ffe19e41988c419aca249be075847312c9c8cd41c433297d22c781cef44325,2024-09-25T13:55:55.460000
CVE-2024-43989,0,0,9f19cbbd07eac2d4997a02808c8ed7b359c9c31bd68dd720d1ab97474c15e7dd,2024-09-23T00:15:10.800000
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
CVE-2024-43991,0,1,62375b0bd15282a5169a9db83c3c584ee6643c24a05676f00ee713a46015a5a5,2024-09-25T13:53:50.107000
CVE-2024-43992,0,1,e9a152f92c5b0e9db22adc26709ee0e8b5e307e1de9d16d60489758c638181ee,2024-09-25T13:47:17.277000
CVE-2024-43993,0,1,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f7fc,2024-09-25T13:44:39.917000
CVE-2024-43990,1,1,26605399405821a9babcc1c4c479025743910126069041bffd554c24a81ff9a3,2024-09-25T15:15:14.370000
CVE-2024-43991,0,0,62375b0bd15282a5169a9db83c3c584ee6643c24a05676f00ee713a46015a5a5,2024-09-25T13:53:50.107000
CVE-2024-43992,0,0,e9a152f92c5b0e9db22adc26709ee0e8b5e307e1de9d16d60489758c638181ee,2024-09-25T13:47:17.277000
CVE-2024-43993,0,0,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f7fc,2024-09-25T13:44:39.917000
CVE-2024-43994,0,0,92a57f752ce2faa73917c46fd03cd7058c3f4fe6668ac24e011d5cce000e100c,2024-09-20T12:30:51.220000
CVE-2024-43995,0,0,d2bc15228a0936c9d52925ee78d8f61fa4f243d84362a990cf6cd93f080ed156,2024-09-20T12:30:51.220000
CVE-2024-43996,0,0,d7156f428d1448ad8b6ccd44d882e30f14df1390e059d6ddfa9925733f3aeac4,2024-09-23T01:15:11.510000
CVE-2024-43999,0,0,dcffc3404e52a7bbf6440f499137f398cedd785c7ad8508e3c67849b85d16eca,2024-09-20T12:30:51.220000
CVE-2024-43999,0,1,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000
CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000
CVE-2024-44001,0,0,43db0f88c3e640d31c1ced26a25fee31b35f13afe37712fdf24ec0f8f0863bb5,2024-09-20T12:30:51.220000
CVE-2024-44002,0,0,78aabec616bf445add31137b546b3614b9511be8a441ab676da5dce9d6232c6b,2024-09-20T12:30:51.220000
CVE-2024-44003,0,0,2744e27ce4993c02a8ad8b34984a99e1a86eb64e2a65d6dacdbd3f08ce311e94,2024-09-20T12:30:51.220000
CVE-2024-44004,0,0,aa050c3ee15a31d1070dbd236f7b72cf53d90d76d0c2baff9d9ca9b4dc524727,2024-09-24T19:22:14.760000
CVE-2024-44005,0,0,74a6df6258e6dee55074c5cdcb40f2b7a2782c98a0852d6f9e6d353d86509cf5,2024-09-20T12:30:51.220000
CVE-2024-44005,0,1,68e5b326ea17b9b2aa08f2073b87c5fda6849dde25f3e2d16502638d6b5bba85,2024-09-25T15:25:30.083000
CVE-2024-44007,0,0,d7d1930aeec9d62758ccc2ddf09e21d07c0b586fa0d9735f7d5dee1a37d7874e,2024-09-24T22:08:52.857000
CVE-2024-44008,0,0,c6d2b6687f1293a95753882058aa8ed47455c99d54b3161e64050d330a139582,2024-09-24T22:08:01.060000
CVE-2024-44009,0,0,5b0cf6c82d301fa9d5358bb5d9e7b1a016eed523b7e9c7d9c1329e61fba4852b,2024-09-24T22:06:15.843000
@ -259427,18 +259433,18 @@ CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea
CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000
CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
CVE-2024-44124,0,0,44c7ca8146afbbf39c096f933ced467146f947fcf582f4483eb2ab72de8f0e4d,2024-09-20T12:31:20.110000
CVE-2024-44125,0,1,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000
CVE-2024-44124,0,1,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000
CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000
CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000
CVE-2024-44128,0,1,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000
CVE-2024-44129,0,1,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000
CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000
CVE-2024-44129,0,0,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000
CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000
CVE-2024-44130,0,0,f4e89b68598385cc10c7257ab5a15425ed9bf99a914c2f9da983ff94c809a0d7,2024-09-24T18:49:47.557000
CVE-2024-44131,0,0,e8738fd0c6ae001394ef8981882c811c82e7272ea012840137fc1618fe06c3bc,2024-09-24T19:01:55.470000
CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd908,2024-09-20T12:31:20.110000
CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000
CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000
CVE-2024-44135,0,1,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000
CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000
CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000
CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000
@ -259462,7 +259468,7 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
CVE-2024-44170,0,0,ad9c7ebf0677867158c66367ee67fb353ce44ea245452aff8d81c248a025d15c,2024-09-20T12:31:20.110000
CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
CVE-2024-44176,0,1,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000
CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000
CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000
CVE-2024-4418,0,0,b4bbbecff5b748c422c3d0ed121fdcb8cd9b2330acacbc04d39874726279d92b,2024-09-13T22:15:02.123000
@ -259472,12 +259478,12 @@ CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988
CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000
CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000
CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000
CVE-2024-44187,0,1,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000
CVE-2024-44187,0,0,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000
CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000
CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6842,2024-09-24T18:33:02.477000
CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000
CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000
CVE-2024-44191,0,1,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000
CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000
@ -259568,7 +259574,7 @@ CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
CVE-2024-44623,0,0,8c1d857fcb1f195da4ff0d2c22754783965af3e565b67f035432aa624174990f,2024-09-17T02:35:54.787000
CVE-2024-44623,0,1,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000
CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000
@ -259973,7 +259979,7 @@ CVE-2024-45449,0,0,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000
CVE-2024-45451,0,0,48b512aae28f050030a3079457d4f6895fe3bb1928b27b88000e380a07e6de13,2024-09-24T22:02:48.057000
CVE-2024-45452,0,0,2ea26ae6193cf50ec971738f633c24b782bc76d27deae32253c71dc02fedbfa3,2024-09-20T12:30:51.220000
CVE-2024-45452,0,1,4047a805b68a8ced2844a8ca7ba17139f576bc1b78cfe202a5caf646808b8ca7,2024-09-25T14:19:17.113000
CVE-2024-45453,0,0,bb3a8aaa7954777d3aa9635504c34c96f8cc4336ef5a6f0756ed7dd58888f5e4,2024-09-23T01:15:11.923000
CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000
CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
@ -260032,6 +260038,7 @@ CVE-2024-45606,0,0,3387cf6bafc97f34cf884f7ca0b4f85a8bd2d59f53c4b0d6b1c8b12f643f3
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-45612,0,0,3e30286b1d723ddfef1522eda155227a0e1e8c66d0b8dce0d9a777734913d222,2024-09-23T19:33:04.650000
CVE-2024-45613,1,1,8ae1f326ec208cdb879174826b69c78543fdb5244b75318a9385cf06c6383d99,2024-09-25T14:15:05.303000
CVE-2024-45614,0,0,a4bd2872c46f9cbb2c0f25769a726f94bca2a9c47d47af3e4cd0649a5803ebb7,2024-09-20T12:30:17.483000
CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000
CVE-2024-45616,0,0,ec4ff704ba2aae95f08442d1bfa2173f2a102c1c3b0570dfa4cb1518cb449547,2024-09-13T19:21:11.507000
@ -260206,6 +260213,7 @@ CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f63
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
CVE-2024-46461,1,1,f949e3c7d0307650b2b581379586a85548caee32fedd5af683baadd63f1ad7ee,2024-09-25T15:15:14.567000
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000
@ -260234,7 +260242,7 @@ CVE-2024-46565,0,0,66b2d0d6228a7c5a2d4ccc7ad93a78f84212bb6cc08e71806aef1bcd5a1e1
CVE-2024-46566,0,0,ef325864839d5d2a7c7484211bd16ddf5a2b8bc0be80252bca80b3d5f7f77da3,2024-09-24T16:41:58.953000
CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada268,2024-09-24T16:42:00.340000
CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000
CVE-2024-4657,1,1,eae89e8fcad590b7fe7133398ad07a355faf27158c77572d59c838a0e84149cb,2024-09-25T13:15:04.110000
CVE-2024-4657,0,0,eae89e8fcad590b7fe7133398ad07a355faf27158c77572d59c838a0e84149cb,2024-09-25T13:15:04.110000
CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000
CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000
CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000
@ -260507,7 +260515,7 @@ CVE-2024-47210,0,0,0912a487d5daeed626dcd74f4415cecd1eb468c441d638b636aa1a85523b3
CVE-2024-47218,0,0,282809bf9fbf4fe32ac58189d7505fcb23fd7fbf82337654d318e4cf55ce811d,2024-09-23T16:35:14.730000
CVE-2024-47219,0,0,f0a9ad83025607df7abe898ed6aca97a5bcbe21c309d715694757e39cfd2aaff,2024-09-23T16:35:15.607000
CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef1c,2024-06-04T19:20:47.553000
CVE-2024-47220,0,0,6fc174b50f589203240ab4d7a1fddd32e539254e0b9f1565ac32a4a58a027f27,2024-09-25T06:15:03.453000
CVE-2024-47220,0,1,daf529d73f7ddf35861135b59755de956602c48e032cbc5022c4f4e726ff7007,2024-09-25T15:15:14.653000
CVE-2024-47221,0,0,a39f783e0f1837714118df09b4ab8d238e18d056086adb1e01ef68294fa04896,2024-09-22T01:15:12.013000
CVE-2024-47222,0,0,91d32f3eb46664421f317c4ce1a08c39837b1d65e0376c618bfc415d4bbf17ec,2024-09-23T20:15:05.493000
CVE-2024-47226,0,0,1a012385db8ac429d656612487127291792ff2b1003cc416b62a404a726b12b7,2024-09-23T15:35:09.070000
@ -261028,9 +261036,9 @@ CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc6
CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000
CVE-2024-5298,0,0,751024870f0005efd62d8664aa885c619c01fff4fc9d9e46acd3d648d421b0e1,2024-05-24T01:15:30.977000
CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30dc,2024-05-24T01:15:30.977000
CVE-2024-5301,0,0,e1bbbc0461c53dd8f51a88a4f59e8fbbf482d5c2903941ade9b0d040019e56a6,2024-06-07T14:56:05.647000
CVE-2024-5302,0,0,e91afcb85423d52506968f5a14d207530bcb11e7654f7a83912cdcfd6890d91b,2024-06-07T14:56:05.647000
CVE-2024-5303,0,0,591775755859f327fbcbb6ac695a680807c68d9c0d60258c3c17f7d39dd7d5b4,2024-06-07T14:56:05.647000
CVE-2024-5301,0,1,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000
CVE-2024-5302,0,1,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000
CVE-2024-5303,0,1,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f886,2024-09-25T15:24:18.680000
CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000
CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000
CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000
@ -261683,7 +261691,7 @@ CVE-2024-6060,0,0,8504cbe6b891066e73ef95904dad6e7d3e41cca53b5727c2ba7b2242343c8b
CVE-2024-6061,0,0,7f7515a9103fe150db8d8da13e6a9c9caaab344d369b5c8dd58076cec7cacc3f,2024-06-20T12:44:22.977000
CVE-2024-6062,0,0,808f4f8498f1342bcb60477c52f8c9df70bfd9d854975b3c8c0875386f5a1f2d,2024-06-20T12:44:22.977000
CVE-2024-6063,0,0,981173af34d136f2acefe4974764928b03bc5b536dcdb29e6c8460ed6390b915,2024-06-20T12:44:22.977000
CVE-2024-6064,0,0,30b3570394deef764b3da3523bb88f72c6b0d1c46ded48ea0e40368756f81113,2024-06-20T12:44:22.977000
CVE-2024-6064,0,1,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d7e,2024-09-25T15:08:46.537000
CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
@ -261756,14 +261764,14 @@ CVE-2024-6143,0,0,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1
CVE-2024-6144,0,0,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000
CVE-2024-6145,0,0,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000
CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000
CVE-2024-6147,0,0,2d9a1014611d118f27efff7052050ed6f6b11c1b39720db4ab48899a60221b47,2024-06-21T11:22:01.687000
CVE-2024-6147,0,1,db2ce187f9efb973dad5a788ee3407e3ef389a31e13ca493ef84c0a33e1e2b14,2024-09-25T15:29:33.477000
CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000
CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000
CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000
CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d73f,2024-08-01T14:00:12.180000
CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000
CVE-2024-6153,0,0,740f41359000ee78dfd081ef9d2b3de2e1754dcfced9d3fa97c25c47b91fc4d2,2024-06-21T11:22:01.687000
CVE-2024-6154,0,0,440b9e0ba4ee20927a478fc253ffa209cbd940ec00130e645570ce13e63e9de9,2024-06-21T11:22:01.687000
CVE-2024-6153,0,1,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000
CVE-2024-6154,0,1,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000
CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
@ -262063,6 +262071,7 @@ CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08d
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
CVE-2024-6510,0,0,271701171f98244795ebd972ebc5048aac2cefcf02c3610beea189409c6fb6ff,2024-09-12T18:14:03.913000
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
CVE-2024-6512,1,1,a7f19bb418f3681251a83d8c7152609787c1d8d7aa73dc4d789c2213bedbc546,2024-09-25T14:15:05.560000
CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000
CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000
CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000
@ -262127,9 +262136,9 @@ CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5a
CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000
CVE-2024-6590,0,0,d599bcb4d0f25ca739f37db31b680f97bc141672263ff713109907df31ecad32,2024-09-25T03:15:02.830000
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
CVE-2024-6592,1,1,ea91eabcca4cd25be833adbe59cc5a3b48b1040680a1ad6ced0fe29bc04503af,2024-09-25T12:15:05.027000
CVE-2024-6593,1,1,9edeef2aea70d3eeaf2b3af59cc3d2a0656100b969bbb83ab66dd314d2313b25,2024-09-25T12:15:05.217000
CVE-2024-6594,1,1,ecaec2014a1041aad6bda6271b8cc0fb6dba7d6d7a643e1049fc3aadca6b34ae,2024-09-25T12:15:05.397000
CVE-2024-6592,0,0,ea91eabcca4cd25be833adbe59cc5a3b48b1040680a1ad6ced0fe29bc04503af,2024-09-25T12:15:05.027000
CVE-2024-6593,0,0,9edeef2aea70d3eeaf2b3af59cc3d2a0656100b969bbb83ab66dd314d2313b25,2024-09-25T12:15:05.217000
CVE-2024-6594,0,0,ecaec2014a1041aad6bda6271b8cc0fb6dba7d6d7a643e1049fc3aadca6b34ae,2024-09-25T12:15:05.397000
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
CVE-2024-6596,0,0,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
@ -262317,7 +262326,7 @@ CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de971307
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
CVE-2024-6840,0,0,32a3665f80239333fecee34a11f4d8a5f93588e98d39b1a4bfaa2fe487feef20,2024-09-12T18:14:03.913000
CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000
CVE-2024-6845,0,0,846f92acda41d803b1f6b4567e4673ad2394a9b2ea9c32baa08e6e5737206935,2024-09-25T06:15:05.557000
CVE-2024-6845,0,1,7827ce1657e31797f4aef8976c6c66910fefbb9b9f9e4945938f09c5cdf43568,2024-09-25T14:35:07.500000
CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000
CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
@ -262867,6 +262876,8 @@ CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f1
CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
CVE-2024-7575,1,1,d1edcc53851c456f5b5fe8a36908daf09816d1253eceb08ea52597b6a10ff659,2024-09-25T14:15:05.750000
CVE-2024-7576,1,1,12b7bb07dd235d7921447b5ad6e6cae0f86c3468ac4ac4f450135757402c9e38,2024-09-25T14:15:05.970000
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
@ -262949,6 +262960,7 @@ CVE-2024-7669,0,0,1ab8d834092c7284d64294dd9869665d57807a9389d554f2c75360b4021639
CVE-2024-7676,0,0,7817fdd5f2edbb492448eb9de4bc52ee9c1fd35a5b97e69f44935e966a3aaa34,2024-08-15T18:05:17.853000
CVE-2024-7677,0,0,619a29b11672f1d6182de3fe0ed62cac67fac40890fa3659f2ed393ccafc6a23,2024-08-15T18:06:06.680000
CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f03181a,2024-08-15T18:06:54.127000
CVE-2024-7679,1,1,a18a30cfdf41dc6c99217740980fde96799fadf655b1c8b3e8667399a6f35400,2024-09-25T14:15:06.180000
CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000
CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000
CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000
@ -263090,7 +263102,7 @@ CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d
CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000
CVE-2024-7878,0,0,20dc5fff183301067d7146a62fbc140f558a87d1b834b6318a0d259ed1e32c2a,2024-09-25T06:15:05.650000
CVE-2024-7878,0,1,12502179334adb04b735c4035e0e77a9e1b2c17baea755ae2cd695609e776c25,2024-09-25T14:35:08.010000
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
CVE-2024-7885,0,0,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
@ -263099,7 +263111,7 @@ CVE-2024-7888,0,0,2881b53b5410d8b7f634ff84d81ce7bcb024ba75858c366b9280d55d99841e
CVE-2024-7889,0,0,67539a9ea3afa10e1ef371a140e40e7f2e32fcedee02ec133e59e6ef2a347260,2024-09-13T18:35:18.777000
CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b20,2024-09-13T18:35:19.517000
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
CVE-2024-7892,0,0,4dd7ca127ebacf65859c008201269ab73d798aad9f2eb52643437fcf8e8a1015,2024-09-25T06:15:05.720000
CVE-2024-7892,0,1,40974c0cc57d40137303f2cc20edb34ed2ea852cc275daaa8e4e4a536c4f74f5,2024-09-25T14:35:08.167000
CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000
CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000
CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000
@ -263289,7 +263301,7 @@ CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ad
CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000
CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
CVE-2024-8175,0,0,c986260cebce641972845192f00cc354f8cdfa3d36943b2f027e6536d8655450,2024-09-25T08:15:04.727000
CVE-2024-8175,0,1,c9ce83d87880543b6b1f6b65781f57c06977fbfb0efcc17207428d279365fe63,2024-09-25T14:15:06.400000
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
@ -263370,6 +263382,7 @@ CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
CVE-2024-8316,1,1,3b42763453abe342c15e1dbc53e93aa928ecf8224136bb2240e47174bd766b15,2024-09-25T14:15:06.550000
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000
@ -263404,7 +263417,7 @@ CVE-2024-8350,0,0,dde82d4ddd4aa970a610f22c7e95d262bb72ed6249cce87c1a47dce023dc0c
CVE-2024-8354,0,0,c1d02a1fc95123a7759961217f307a83eec87733739438039b5b9ddbf5c0d461,2024-09-20T12:30:17.483000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
CVE-2024-8364,0,0,9f5476f9a6bec86fe4cba5d7f1cd84e4d4a8798e9cad5960d51454d0fb0d7481,2024-09-20T12:30:17.483000
CVE-2024-8364,0,1,7767c7c95e089c6b038abf689ec85904f48b602f94f00381bdc8869619571039,2024-09-25T15:08:08.503000
CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000
CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000
CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000
@ -263492,7 +263505,7 @@ CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a851
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
CVE-2024-8544,0,0,b92ed2b51bae3f52bc853d79bde121bda69091c5cde9cc12e546571a35641dfd,2024-09-24T02:15:03.687000
CVE-2024-8546,1,1,72dd0e8b3978c165f9beb60b55e8d42aa02c7869febf0ff1b80c593288834bb9,2024-09-25T13:15:04.313000
CVE-2024-8546,0,0,72dd0e8b3978c165f9beb60b55e8d42aa02c7869febf0ff1b80c593288834bb9,2024-09-25T13:15:04.313000
CVE-2024-8549,0,0,fcd242b6ea38a056c01db9880c2a52a409c7d0c95c3a6f9a54b5be14b01f3eaf,2024-09-25T03:15:05.393000
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000

Can't render this file because it is too large.