Auto-Update: 2024-10-16T10:00:22.922838+00:00

This commit is contained in:
cad-safe-bot 2024-10-16 10:03:23 +00:00
parent 210ea4e49d
commit 6cf8d62180
27 changed files with 1665 additions and 86 deletions

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2016-15042",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:02.990",
"lastModified": "2024-10-16T08:15:02.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Frontend File Manager (versions < 4.0), N-Media Post Front-end Form (versions < 1.1) plugins for WordPress are vulnerable to arbitrary file uploads due to missing file type validation via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/nmedia-user-file-uploader/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://wpscan.com/vulnerability/052f7d9a-aaff-4fb1-92b7-aeb83cc705a7",
"source": "security@wordfence.com"
},
{
"url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-n-media-post-front-end-form-arbitrary-file-upload-1-0/",
"source": "security@wordfence.com"
},
{
"url": "https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-front-end-file-upload-and-manager-plugin/",
"source": "security@wordfence.com"
},
{
"url": "https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-n-media-post-front-end-form/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1e6298-f243-49a5-b1b7-52bd6a6c8858?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2017-20193",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:03.223",
"lastModified": "2024-10-16T08:15:03.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Product Vendors is vulnerable to Reflected Cross-Site Scripting via the 'vendor_description' parameter in versions up to, and including, 2.0.35 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://hackerone.com/reports/253313",
"source": "security@wordfence.com"
},
{
"url": "https://threatpost.com/reflected-xss-bug-patched-in-popular-woocommerce-wordpress-plugin/127744/",
"source": "security@wordfence.com"
},
{
"url": "https://woocommerce.com/products/product-vendors/",
"source": "security@wordfence.com"
},
{
"url": "https://www.majemedia.com/2017/09/xss-vulnerability-in-woocommerce-product-vendors-plugin/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a224e745-f9c7-4ca6-b656-e94862b1dc57?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2017-20194",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:03.453",
"lastModified": "2024-10-16T08:15:03.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Formidable Form Builder plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 2.05.03 via the frm_forms_preview AJAX action. This makes it possible for unauthenticated attackers to export all of the form entries for a given form."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://klikki.fi/formidable-forms-vulnerabilities/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7600fe1-94e4-4e3e-a9a6-ff3589813715?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2020-36840",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:03.710",
"lastModified": "2024-10-16T08:15:03.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Timetable and Event Schedule by MotoPress plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wp_ajax_route_url() function called via a nopriv AJAX action in versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to call that function and perform a wide variety of actions such as including random template, injecting malicious web scripts, and more."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2288592%40mp-timetable&new=2288592%40mp-timetable&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/988d7b33-f985-4d22-a2db-3922002fcecb?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2020-36842",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:03.923",
"lastModified": "2024-10-16T08:15:03.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX actions that allows low-level authenticated attackers to upload zip files that can be subsequently extracted. This affects versions up to, and including 0.9.35."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2261665%40wpvivid-backuprestore%2Ftrunk&old=2252870%40wpvivid-backuprestore%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.webarxsecurity.com/vulnerability-in-wpvivid-backup-plugin-can-lead-to-database-leak/?fbclid=IwAR3Ve74ZIvmx-aC0OssIWYwcWEjGq6yU16DcyVGHD1XUT3uYaZ3QyVu_Eos&utm_content=buffer4435b&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de1da248-2e03-40fa-8997-7176dc06abc9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2021-4452",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:04.160",
"lastModified": "2024-10-16T08:15:04.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Google Language Translator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in versions up to, and including, 6.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Specifically affects users with older browsers that lack proper URL encoding support."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2567703",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/2567706",
"source": "security@wordfence.com"
},
{
"url": "https://wpscan.com/vulnerability/1bd8bc19-5a6f-410b-897e-4887c05378ea",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa2bd74a-563a-4a2d-b1d7-b3678db82b00?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2023-22649",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T08:15:04.390",
"lastModified": "2024-10-16T08:15:04.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22649",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2023-22650",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T09:15:02.957",
"lastModified": "2024-10-16T09:15:02.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user\u2019s tokens still usable."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2023-32188",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T09:15:03.260",
"lastModified": "2024-10-16T09:15:03.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1270"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32188",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/neuvector/neuvector/security/advisories/GHSA-622h-h2p8-743x",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-7295",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:04.767",
"lastModified": "2024-10-16T08:15:04.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Video Grid plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2824307%40video-grid%2Ftags%2F1.21&new=2900422%40video-grid%2Ftags%2F1.22",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db5247ad-dbbf-4d8e-92f5-3a673b97d080?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-7296",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:04.977",
"lastModified": "2024-10-16T08:15:04.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The BigBlueButton plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the moderator code and viewer code fields in versions up to, and including, 3.0.0-beta.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author privileges or higher to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bigbluebutton/trunk/public/partials/bigbluebutton-join-display.php#L26",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f829d21-5347-46ec-9218-2b3cbe7d7b95?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21534",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-11T13:15:15.667",
"lastModified": "2024-10-15T12:58:51.050",
"lastModified": "2024-10-16T09:15:03.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -66,6 +66,10 @@
"url": "https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8185019",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884",
"source": "report@snyk.io"

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-45216",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:05.233",
"lastModified": "2024-10-16T08:15:05.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Apache Solr.\n\nSolr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass.\nA fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path.\nThis fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing.\n\n\nThis issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0.\n\nUsers are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://solr.apache.org/security.html#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-45217",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:05.353",
"lastModified": "2024-10-16T08:15:05.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Default Initialization of Resource vulnerability in Apache Solr.\n\nNew ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, are created without setting the \"trusted\" metadata.\nConfigSets that do not contain the flag are trusted implicitly if the metadata is missing, therefore this leads to \"trusted\" ConfigSets that may not have been created with an Authenticated request.\n\"trusted\" ConfigSets are able to load custom code into classloaders, therefore the flag is supposed to only be set when the request that uploads the ConfigSet is Authenticated & Authorized.\n\nThis issue affects Apache Solr: from 6.6.0 before 8.11.4, from 9.0.0 before 9.7.0. This issue does not affect Solr instances that are secured via Authentication/Authorization.\n\nUsers are primarily recommended to use Authentication and Authorization when running Solr. However, upgrading to version 9.7.0, or 8.11.4 will mitigate this issue otherwise."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"references": [
{
"url": "https://solr.apache.org/security.html#cve-2024-45217-apache-solr-configsets-created-during-a-backup-restore-command-are-trusted-implicitly",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45219",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:05.473",
"lastModified": "2024-10-16T08:15:05.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker that can upload or register templates and volumes, can use them to deploy malicious instances or attach uploaded volumes to their existing instances on KVM-based environments and exploit this to gain access to the host filesystems that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue. \n\nAdditionally, all user-uploaded or registered KVM-compatible templates and volumes can be scanned and checked that they are flat files that should not be using any additional or unnecessary features. For example, operators can run this on their secondary storage(s) and inspect output. An empty output for the disk being validated means it has no references to the host filesystems; on the other hand, if the output for the disk being validated is not empty, it might indicate a compromised disk.\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully.\"; qemu-img info -U $file | grep file: ; printf \"\\n\\n\"; done\nThe command can also be run for the file-based primary storages; however, bear in mind that (i) volumes created from templates will have references for the templates at first and (ii) volumes can be consolidated while migrating, losing their references to the templates. Therefore, the command execution for the primary storages can show both false positives and false negatives.\n\nFor checking the whole template/volume features of each disk, operators can run the following command:\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info.\"; qemu-img info -U $file; printf \"\\n\\n\"; done"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
"source": "security@apache.org"
},
{
"url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45461",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:05.717",
"lastModified": "2024-10-16T08:15:05.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45462",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:05.933",
"lastModified": "2024-10-16T08:15:05.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out user account. This issue affects Apache CloudStack from 4.15.1.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45693",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:06.160",
"lastModified": "2024-10-16T08:15:06.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead\u00a0to account takeover,\u00a0disruption, exposure of sensitive data and compromise integrity of the resources owned by the user account that are managed by the platform.\n\nThis issue affects Apache CloudStack from 4.15.1.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45710",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-10-16T08:15:06.387",
"lastModified": "2024-10-16T08:15:06.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45710",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45711",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-10-16T08:15:06.690",
"lastModified": "2024-10-16T08:15:06.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45711",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45714",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-10-16T08:15:06.897",
"lastModified": "2024-10-16T08:15:06.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users\u2019 permissions can modify a variable with a payload."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45714",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45715",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-10-16T08:15:07.110",
"lastModified": "2024-10-16T08:15:07.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SolarWinds Platform was susceptible to a Cross-Site Scripting vulnerability when performing an edit function to existing elements."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45715",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9061",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:07.323",
"lastModified": "2024-10-16T08:15:07.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The WP Popup Builder \u2013 Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3166506/wp-popup-builder",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cac1dc0-87dc-43eb-9db1-638a91200b43?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9540",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T08:15:07.547",
"lastModified": "2024-10-16T08:15:07.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sina Extension for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.7 via the render function in widgets/advanced/sina-modal-box.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft Elementor template data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3167197/sina-extension-for-elementor",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8659e1-5880-4738-99ed-e671449c6878?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-9858",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-10-16T09:15:03.550",
"lastModified": "2024-10-16T09:15:03.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists an insecure default user permission in Google Cloud Migrate to containers from version 1.1.0 to 1.2.2 Windows installs. A local \"m2cuser\" was greated with\u00a0administrator privileges. This posed a security risk if the \"analyze\" or \"generate\" commands were interrupted or skipping the action to delete the local user \u201cm2cuser\u201d. We recommend upgrading to\u00a01.2.3 or beyond"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:A/V:D/RE:L/U:Green",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "PRESENT",
"automatable": "YES",
"recovery": "AUTOMATIC",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "GREEN",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://cloud.google.com/migrate/containers/docs/m2c-cli-relnotes#october_8_2024",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-16T08:00:21.081387+00:00
2024-10-16T10:00:22.922838+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-16T07:15:17.033000+00:00
2024-10-16T09:15:03.550000+00:00
```
### Last Data Feed Release
@ -33,47 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265787
265811
```
### CVEs added in the last Commit
Recently added CVEs: `48`
Recently added CVEs: `24`
- [CVE-2021-4447](CVE-2021/CVE-2021-44xx/CVE-2021-4447.json) (`2024-10-16T07:15:10.687`)
- [CVE-2021-4448](CVE-2021/CVE-2021-44xx/CVE-2021-4448.json) (`2024-10-16T07:15:10.980`)
- [CVE-2021-4449](CVE-2021/CVE-2021-44xx/CVE-2021-4449.json) (`2024-10-16T07:15:11.243`)
- [CVE-2021-4450](CVE-2021/CVE-2021-44xx/CVE-2021-4450.json) (`2024-10-16T07:15:11.527`)
- [CVE-2021-4451](CVE-2021/CVE-2021-44xx/CVE-2021-4451.json) (`2024-10-16T07:15:11.770`)
- [CVE-2022-4971](CVE-2022/CVE-2022-49xx/CVE-2022-4971.json) (`2024-10-16T07:15:12.040`)
- [CVE-2022-4972](CVE-2022/CVE-2022-49xx/CVE-2022-4972.json) (`2024-10-16T07:15:12.257`)
- [CVE-2022-4973](CVE-2022/CVE-2022-49xx/CVE-2022-4973.json) (`2024-10-16T07:15:12.497`)
- [CVE-2022-4974](CVE-2022/CVE-2022-49xx/CVE-2022-4974.json) (`2024-10-16T07:15:12.760`)
- [CVE-2023-7286](CVE-2023/CVE-2023-72xx/CVE-2023-7286.json) (`2024-10-16T07:15:13.223`)
- [CVE-2023-7287](CVE-2023/CVE-2023-72xx/CVE-2023-7287.json) (`2024-10-16T07:15:13.507`)
- [CVE-2023-7288](CVE-2023/CVE-2023-72xx/CVE-2023-7288.json) (`2024-10-16T07:15:13.743`)
- [CVE-2023-7289](CVE-2023/CVE-2023-72xx/CVE-2023-7289.json) (`2024-10-16T07:15:14.000`)
- [CVE-2023-7290](CVE-2023/CVE-2023-72xx/CVE-2023-7290.json) (`2024-10-16T07:15:14.243`)
- [CVE-2023-7291](CVE-2023/CVE-2023-72xx/CVE-2023-7291.json) (`2024-10-16T07:15:14.503`)
- [CVE-2023-7292](CVE-2023/CVE-2023-72xx/CVE-2023-7292.json) (`2024-10-16T07:15:14.737`)
- [CVE-2023-7293](CVE-2023/CVE-2023-72xx/CVE-2023-7293.json) (`2024-10-16T07:15:14.970`)
- [CVE-2023-7294](CVE-2023/CVE-2023-72xx/CVE-2023-7294.json) (`2024-10-16T07:15:15.277`)
- [CVE-2024-8507](CVE-2024/CVE-2024-85xx/CVE-2024-8507.json) (`2024-10-16T07:15:16.277`)
- [CVE-2024-8746](CVE-2024/CVE-2024-87xx/CVE-2024-8746.json) (`2024-10-16T07:15:16.537`)
- [CVE-2024-8918](CVE-2024/CVE-2024-89xx/CVE-2024-8918.json) (`2024-10-16T07:15:16.777`)
- [CVE-2024-9582](CVE-2024/CVE-2024-95xx/CVE-2024-9582.json) (`2024-10-16T07:15:17.033`)
- [CVE-2024-9873](CVE-2024/CVE-2024-98xx/CVE-2024-9873.json) (`2024-10-16T06:15:02.527`)
- [CVE-2024-9888](CVE-2024/CVE-2024-98xx/CVE-2024-9888.json) (`2024-10-16T06:15:03.650`)
- [CVE-2024-9937](CVE-2024/CVE-2024-99xx/CVE-2024-9937.json) (`2024-10-16T06:15:04.177`)
- [CVE-2016-15042](CVE-2016/CVE-2016-150xx/CVE-2016-15042.json) (`2024-10-16T08:15:02.990`)
- [CVE-2017-20193](CVE-2017/CVE-2017-201xx/CVE-2017-20193.json) (`2024-10-16T08:15:03.223`)
- [CVE-2017-20194](CVE-2017/CVE-2017-201xx/CVE-2017-20194.json) (`2024-10-16T08:15:03.453`)
- [CVE-2020-36840](CVE-2020/CVE-2020-368xx/CVE-2020-36840.json) (`2024-10-16T08:15:03.710`)
- [CVE-2020-36842](CVE-2020/CVE-2020-368xx/CVE-2020-36842.json) (`2024-10-16T08:15:03.923`)
- [CVE-2021-4452](CVE-2021/CVE-2021-44xx/CVE-2021-4452.json) (`2024-10-16T08:15:04.160`)
- [CVE-2023-22649](CVE-2023/CVE-2023-226xx/CVE-2023-22649.json) (`2024-10-16T08:15:04.390`)
- [CVE-2023-22650](CVE-2023/CVE-2023-226xx/CVE-2023-22650.json) (`2024-10-16T09:15:02.957`)
- [CVE-2023-32188](CVE-2023/CVE-2023-321xx/CVE-2023-32188.json) (`2024-10-16T09:15:03.260`)
- [CVE-2023-7295](CVE-2023/CVE-2023-72xx/CVE-2023-7295.json) (`2024-10-16T08:15:04.767`)
- [CVE-2023-7296](CVE-2023/CVE-2023-72xx/CVE-2023-7296.json) (`2024-10-16T08:15:04.977`)
- [CVE-2024-45216](CVE-2024/CVE-2024-452xx/CVE-2024-45216.json) (`2024-10-16T08:15:05.233`)
- [CVE-2024-45217](CVE-2024/CVE-2024-452xx/CVE-2024-45217.json) (`2024-10-16T08:15:05.353`)
- [CVE-2024-45219](CVE-2024/CVE-2024-452xx/CVE-2024-45219.json) (`2024-10-16T08:15:05.473`)
- [CVE-2024-45461](CVE-2024/CVE-2024-454xx/CVE-2024-45461.json) (`2024-10-16T08:15:05.717`)
- [CVE-2024-45462](CVE-2024/CVE-2024-454xx/CVE-2024-45462.json) (`2024-10-16T08:15:05.933`)
- [CVE-2024-45693](CVE-2024/CVE-2024-456xx/CVE-2024-45693.json) (`2024-10-16T08:15:06.160`)
- [CVE-2024-45710](CVE-2024/CVE-2024-457xx/CVE-2024-45710.json) (`2024-10-16T08:15:06.387`)
- [CVE-2024-45711](CVE-2024/CVE-2024-457xx/CVE-2024-45711.json) (`2024-10-16T08:15:06.690`)
- [CVE-2024-45714](CVE-2024/CVE-2024-457xx/CVE-2024-45714.json) (`2024-10-16T08:15:06.897`)
- [CVE-2024-45715](CVE-2024/CVE-2024-457xx/CVE-2024-45715.json) (`2024-10-16T08:15:07.110`)
- [CVE-2024-9061](CVE-2024/CVE-2024-90xx/CVE-2024-9061.json) (`2024-10-16T08:15:07.323`)
- [CVE-2024-9540](CVE-2024/CVE-2024-95xx/CVE-2024-9540.json) (`2024-10-16T08:15:07.547`)
- [CVE-2024-9858](CVE-2024/CVE-2024-98xx/CVE-2024-9858.json) (`2024-10-16T09:15:03.550`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `1`
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-16T07:15:15.583`)
- [CVE-2024-6508](CVE-2024/CVE-2024-65xx/CVE-2024-6508.json) (`2024-10-16T07:15:16.027`)
- [CVE-2024-7489](CVE-2024/CVE-2024-74xx/CVE-2024-7489.json) (`2024-10-16T07:15:16.160`)
- [CVE-2024-21534](CVE-2024/CVE-2024-215xx/CVE-2024-21534.json) (`2024-10-16T09:15:03.410`)
## Download and Usage

View File

@ -52765,7 +52765,7 @@ CVE-2012-10014,0,0,0bc69fb07d4c2883d1c737af748ae0ee649ea44bdeb6cd1d92e7f604cb18a
CVE-2012-10015,0,0,24891fb06d64dcdbe29bc3d68dc58660842ac01174efff223a8a3dc4d809d347,2024-05-17T00:51:46.743000
CVE-2012-10016,0,0,50b0be84a632fcfd63c5683132c72829cfbba19e76fa7d1e8b2308b8e62659b3,2024-05-17T00:51:46.860000
CVE-2012-10017,0,0,cd8d899c12955d758ae3dba50c52117997a0233c9fcc21f11c8e13713fa40567,2024-05-17T00:51:46.963000
CVE-2012-10018,1,1,8aee2edfba1d9679fb581c38f537675cf31a15e2b05654163060d58ff4081d62,2024-10-16T07:15:03.920000
CVE-2012-10018,0,0,8aee2edfba1d9679fb581c38f537675cf31a15e2b05654163060d58ff4081d62,2024-10-16T07:15:03.920000
CVE-2012-1002,0,0,510ae0fa015c89254219ee968a42064a352242d7e82a140cbbb23a59f8009f93,2017-12-07T02:29:10.350000
CVE-2012-1003,0,0,8b64c365043997636a4a30596e670f2397029fa9c3a8b88f62aea985930dc202,2017-08-29T01:31:08.943000
CVE-2012-1004,0,0,d8a090792d926eb721787b604fedfde9d2238b34407308a190cfed04a1fe6687,2012-02-08T05:00:00
@ -84905,8 +84905,9 @@ CVE-2016-15037,0,0,a24c928d873db9adb04c4c2c7f23b1fdee0c14c814adb63b3935f236dd622
CVE-2016-15038,0,0,ab9fe34bbf83cb3f6b12fd6674fbfd88d9bfe6f780bf258a0a29ef7f754a8620,2024-05-17T01:08:11.777000
CVE-2016-15039,0,0,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000
CVE-2016-1504,0,0,9db9ed3c963d84221d49c5bfc988ac2e31a3ff3b1eb26252d985e8597b526dda,2017-09-10T01:29:11.687000
CVE-2016-15040,1,1,c916a382cb9299e288a40f3ceeea939f3e8a02d3230790a73299a7a875d7463a,2024-10-16T07:15:04.447000
CVE-2016-15041,1,1,d1cfb96fd4f467118e4a31cab33ff9b459712b47abad854ec90bd7985ff03456,2024-10-16T07:15:04.747000
CVE-2016-15040,0,0,c916a382cb9299e288a40f3ceeea939f3e8a02d3230790a73299a7a875d7463a,2024-10-16T07:15:04.447000
CVE-2016-15041,0,0,d1cfb96fd4f467118e4a31cab33ff9b459712b47abad854ec90bd7985ff03456,2024-10-16T07:15:04.747000
CVE-2016-15042,1,1,a949a643db9253c538a89148491885b686d0cc9a14043c1836248c16346d6ea0,2024-10-16T08:15:02.990000
CVE-2016-1505,0,0,18ada53cb306192ec9e2ab168c2465cf1d7127037b49b7b97c57ba57c38e5938,2016-11-28T19:59:55.070000
CVE-2016-1513,0,0,93511c8c58249078a9702f9c8cf540abf2733d280d18db4cf47b7cbd079e24db,2017-09-01T01:29:04.507000
CVE-2016-1514,0,0,b7fef097b48e8e79c45cbf0778b00b6a0da537c685d5ef916a10faf8cfdae6e7,2023-11-07T02:29:56.923000
@ -102527,7 +102528,9 @@ CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4d
CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000
CVE-2017-20190,0,0,9dd2663b528e5bc8494bcc080744aaaef7094b4400daff7d3432981a0f57ec16,2024-08-12T13:38:08.423000
CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000
CVE-2017-20192,1,1,5f665d38e248db098cabad57aad78333c2b0e4b73af03bdd2b5bc507bd7f9d02,2024-10-16T07:15:05.147000
CVE-2017-20192,0,0,5f665d38e248db098cabad57aad78333c2b0e4b73af03bdd2b5bc507bd7f9d02,2024-10-16T07:15:05.147000
CVE-2017-20193,1,1,f6326d538e041b9c48ba92c31ee7e6a3613921b5619dc9f73c818ee3e95e8d23,2024-10-16T08:15:03.223000
CVE-2017-20194,1,1,b2460b42587481aa5a8f5ebd76232e22d691810c19445cefb61141385291d412,2024-10-16T08:15:03.453000
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000
@ -121393,7 +121396,7 @@ CVE-2018-25099,0,0,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb
CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000
CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000
CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000
CVE-2018-25105,1,1,d835c3fa94757eebc66cde069811098b280fcd7d949b4852ed44631ae5059025,2024-10-16T07:15:05.467000
CVE-2018-25105,0,0,d835c3fa94757eebc66cde069811098b280fcd7d949b4852ed44631ae5059025,2024-10-16T07:15:05.467000
CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000
CVE-2018-2560,0,0,abeb87aebf654213323bee155595996aacb66704cd990a641203ef8ccfeaa82a,2020-08-24T17:37:01.140000
CVE-2018-2561,0,0,6c44c7f29655175e898d7e0c8e9efa3daa6d95623035a440e858ef0262739964,2018-01-25T13:53:15.120000
@ -138399,11 +138402,11 @@ CVE-2019-2521,0,0,557cd7afc62b8b0d5545a61da2b67008378b171f216bd58bad5399af268228
CVE-2019-25210,0,0,266aa4bd7522d806fa5da076db229c2449a919075778b85ff023cb6f7676cfb1,2024-09-04T18:35:00.600000
CVE-2019-25211,0,0,469c1561e074b807caf6701e40210358657a37dbe70bde81f85c8d68a4456e96,2024-08-01T13:41:57.540000
CVE-2019-25212,0,0,2a7e2cc8de54fa224ded29f3182e12267199b33c4461fd66ffca600627e7e093,2024-09-26T13:36:48.280000
CVE-2019-25213,1,1,c9021488850cf96cd67d0684c1e0ad93a17221fc65907f98197bbaa2ed0caf12,2024-10-16T07:15:05.790000
CVE-2019-25214,1,1,2cea621255963c0ef83dd541252554e0249b2b5f247e6fcffc56f1c8c5ae1600,2024-10-16T07:15:06.153000
CVE-2019-25215,1,1,417fa4dce61b30bceec93c3c72f9ccc884d93346fa9cb67c3b3aef971ba8f6e9,2024-10-16T07:15:06.467000
CVE-2019-25216,1,1,f7850eb53854ebb9e8b70ecf13789cc8b7ce6c80126159b35f204ce2cfe1ed77,2024-10-16T07:15:06.727000
CVE-2019-25217,1,1,796f0407440dc50dd1b6e2388d8c012d4093c3e220e0818a1f9800b29f3b68c3,2024-10-16T07:15:07.030000
CVE-2019-25213,0,0,c9021488850cf96cd67d0684c1e0ad93a17221fc65907f98197bbaa2ed0caf12,2024-10-16T07:15:05.790000
CVE-2019-25214,0,0,2cea621255963c0ef83dd541252554e0249b2b5f247e6fcffc56f1c8c5ae1600,2024-10-16T07:15:06.153000
CVE-2019-25215,0,0,417fa4dce61b30bceec93c3c72f9ccc884d93346fa9cb67c3b3aef971ba8f6e9,2024-10-16T07:15:06.467000
CVE-2019-25216,0,0,f7850eb53854ebb9e8b70ecf13789cc8b7ce6c80126159b35f204ce2cfe1ed77,2024-10-16T07:15:06.727000
CVE-2019-25217,0,0,796f0407440dc50dd1b6e2388d8c012d4093c3e220e0818a1f9800b29f3b68c3,2024-10-16T07:15:07.030000
CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000
CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000
CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000
@ -159328,16 +159331,18 @@ CVE-2020-36827,0,0,8898188aa97819ee831b61208ffecb850d1c02e65600a28bd33473d687839
CVE-2020-36828,0,0,a1b676217510ef46edc1fede0a4eb0bea0bc2e564c4e02f200c27ced72100dc7,2024-05-17T01:48:58.900000
CVE-2020-36829,0,0,fa56184e79fbe280b2933bbbe602a49d53f63fd12f0982a754bc29d86839a810,2024-08-26T20:35:00.633000
CVE-2020-36830,0,0,61dd7852409cfb39cad21ae3791ff5d5afc0cc5bb4ea791702b1fbd3ac62fda4,2024-09-05T21:47:09.243000
CVE-2020-36831,1,1,5fc5cbeb06aff1dd998ede353ed8f966cc530045c726d6eb55c92d2290765540,2024-10-16T07:15:07.280000
CVE-2020-36832,1,1,44885128af038984319b548ef6a4d515a25729a50971755951aee68cb8de19bb,2024-10-16T07:15:07.637000
CVE-2020-36833,1,1,9fcaa73e236ed40db62c0a0432e9c13fb6ed1cdd3ec075c57506cb1032e701ac,2024-10-16T07:15:07.893000
CVE-2020-36834,1,1,a607ba32c4ca47a22b767d2c8eb5f243dfa4318bcd7738688868c71a75188a44,2024-10-16T07:15:08.127000
CVE-2020-36835,1,1,9358173c5ae21ccca395ad39a077e5c172f859c65ae5894831f472a69eac5806,2024-10-16T07:15:08.387000
CVE-2020-36836,1,1,e7c5aff927b78c5a37750445b50aa86c2ffc36a8b918852e2c11921c4bec6991,2024-10-16T07:15:08.630000
CVE-2020-36837,1,1,eb54ab20bbd666451de9a2acf06cac05ca4a8ae756eb124d501330f7edcca6bc,2024-10-16T07:15:08.927000
CVE-2020-36838,1,1,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e54dd,2024-10-16T07:15:09.200000
CVE-2020-36839,1,1,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000
CVE-2020-36831,0,0,5fc5cbeb06aff1dd998ede353ed8f966cc530045c726d6eb55c92d2290765540,2024-10-16T07:15:07.280000
CVE-2020-36832,0,0,44885128af038984319b548ef6a4d515a25729a50971755951aee68cb8de19bb,2024-10-16T07:15:07.637000
CVE-2020-36833,0,0,9fcaa73e236ed40db62c0a0432e9c13fb6ed1cdd3ec075c57506cb1032e701ac,2024-10-16T07:15:07.893000
CVE-2020-36834,0,0,a607ba32c4ca47a22b767d2c8eb5f243dfa4318bcd7738688868c71a75188a44,2024-10-16T07:15:08.127000
CVE-2020-36835,0,0,9358173c5ae21ccca395ad39a077e5c172f859c65ae5894831f472a69eac5806,2024-10-16T07:15:08.387000
CVE-2020-36836,0,0,e7c5aff927b78c5a37750445b50aa86c2ffc36a8b918852e2c11921c4bec6991,2024-10-16T07:15:08.630000
CVE-2020-36837,0,0,eb54ab20bbd666451de9a2acf06cac05ca4a8ae756eb124d501330f7edcca6bc,2024-10-16T07:15:08.927000
CVE-2020-36838,0,0,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e54dd,2024-10-16T07:15:09.200000
CVE-2020-36839,0,0,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000
CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000
CVE-2020-36840,1,1,19f312115ec11958b9e6a2d7c5d1461a9b9a720952690bab09ad8fcbc82536d2,2024-10-16T08:15:03.710000
CVE-2020-36842,1,1,2b0ab9021e8c3546f5c3ac016af5850bb6ea577b04ff806dd46ba7237500c4c0,2024-10-16T08:15:03.923000
CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000
CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000
CVE-2020-3687,0,0,c13127e6314fa1c7f5be79f0d170282e8a396f8bc554c10a42c33b710015dc5e,2021-01-29T22:33:38.940000
@ -185232,7 +185237,7 @@ CVE-2021-44426,0,0,bf6b57725b013a6044de8b7642b1205398baadbe68b7f716f0f53e02dbfef
CVE-2021-44427,0,0,783ab76fe28ccce570d29d8c66a408b8ca0bb34f5bf6e84813ccbe2199231d12,2021-11-30T13:41:10.420000
CVE-2021-44428,0,0,76724755f2a122986a95c51d3dcc12a0fa10b92686c51c7b4749bd11c22fc8fd,2021-11-30T13:37:17.570000
CVE-2021-44429,0,0,587dd6f9b5247698d13ef87c63be2d5aa09d646473aaea92c43d5a7308e07779,2021-11-30T13:36:20.317000
CVE-2021-4443,1,1,3ace1904df87cc92e689437799a87cfd007adb259b0cc15e4988a058bd49107a,2024-10-16T07:15:09.713000
CVE-2021-4443,0,0,3ace1904df87cc92e689437799a87cfd007adb259b0cc15e4988a058bd49107a,2024-10-16T07:15:09.713000
CVE-2021-44430,0,0,3ccff7839f65b11012b2019e299a651a1a17f2885eedffa9b9ec86da31611366,2021-12-14T19:21:12.880000
CVE-2021-44431,0,0,2e91f2763edc27376940aa47a9d7ab53556daddc2ad1a88e7ef2f6781fce4591,2021-12-14T17:47:20.180000
CVE-2021-44432,0,0,cd0a316a7386777a874880c1121c3553a3950ff2e437c34667d62e28d050422c,2021-12-14T17:53:03.413000
@ -185243,7 +185248,7 @@ CVE-2021-44436,0,0,048c6caebfcf7ab113da66a41bb26b2e0e70f5b8984a7c1a06881d2739d02
CVE-2021-44437,0,0,8a90d342aeb0cad87d32332c31581acd0f43c4a26aa09ef1140c37671bf5f20b,2021-12-14T19:13:02.280000
CVE-2021-44438,0,0,f9c77e7d144a7d50606e49c0f020b58e9e86bc0d05d5051b4ae94f067cdfe7b7,2021-12-14T19:13:48.997000
CVE-2021-44439,0,0,2aec4cc9f5f9a164a5548cc985fffb27b760329eb4143a8dcf9cc767d6fba58e,2021-12-14T19:13:27.520000
CVE-2021-4444,1,1,11465f71823e867d0991718317b3c621418f5cacbb65ad9b37515c018e9d1f87,2024-10-16T07:15:09.960000
CVE-2021-4444,0,0,11465f71823e867d0991718317b3c621418f5cacbb65ad9b37515c018e9d1f87,2024-10-16T07:15:09.960000
CVE-2021-44440,0,0,ef5b4a328b3ec30165d26a37452b2792e7c38d4a44aaadf6785ec52f7882ffa1,2021-12-14T19:03:15.087000
CVE-2021-44441,0,0,022e3584046d89a11fa3be90acd6668a02a2a92ca85fe3c62a731255fe77064b,2021-12-14T19:11:58.420000
CVE-2021-44442,0,0,b6cffb64f2da0ca8a4ec309d90afdac29f72df45be3daf155c6544991fcde95c,2021-12-14T19:12:44.137000
@ -185254,14 +185259,14 @@ CVE-2021-44446,0,0,675abf2c9d1ddbbbfb7eede0bc3602140400072bc0b231ff5a10a1676baeb
CVE-2021-44447,0,0,93ef1e3910fa7102abd2f9702876c40b3e58e9d0ed8f3d3538e8bd3261689298,2021-12-14T19:17:47.723000
CVE-2021-44448,0,0,b01d9542808ee630f6aefba5237f5068238285fa517e68fb8f9e00d5878be7cb,2021-12-14T19:18:17.553000
CVE-2021-44449,0,0,c405e6578ea25a9896061f4ed02c4a77707a77d09ddf2691e57e0aedcb094da6,2021-12-14T19:18:57.800000
CVE-2021-4445,1,1,2b12b88721aae8bbf3bc61b7fb0361751a30fa52d7d43a69870400fda1c9dcb7,2024-10-16T07:15:10.193000
CVE-2021-4445,0,0,2b12b88721aae8bbf3bc61b7fb0361751a30fa52d7d43a69870400fda1c9dcb7,2024-10-16T07:15:10.193000
CVE-2021-44450,0,0,d5a43b418b439f4f8014f1828747af423a8377d6775795e6603d47519342268f,2021-12-14T17:24:55.260000
CVE-2021-44451,0,0,64e256f598449eb16a9a352e1f50cc92084a6a20874366d23dca4c7763685e20,2022-02-05T02:06:44.807000
CVE-2021-44453,0,0,04e583c25b1f2414923ac33503e872a613a811300a0da768cdaadd532f88e20f,2022-01-05T19:03:39.660000
CVE-2021-44454,0,0,72264a6cead2b9958d8f2b0e48dfdb458a983d383bcf8105200dae54fdf2a17f,2022-02-16T14:34:19.853000
CVE-2021-44457,0,0,c8432866d17694d2e8559b1902d29956d945569a8d05aa7b9afb0be1ff50de3d,2024-05-17T02:02:17.200000
CVE-2021-44458,0,0,91539b14cf8e9d7a6d40bf519e12077ba54b4d46db9df621c0914a80c10792ea,2022-08-09T00:51:42.403000
CVE-2021-4446,1,1,9dbd8a1aef156af69285a89e8e7602256f1cae0553a0bfe33bdd59fc6f2fac25,2024-10-16T07:15:10.447000
CVE-2021-4446,0,0,9dbd8a1aef156af69285a89e8e7602256f1cae0553a0bfe33bdd59fc6f2fac25,2024-10-16T07:15:10.447000
CVE-2021-44460,0,0,91b42a7a3efb9da8dec18db1d14c6cefea2b38c03b66d30e24112a66fe273a06,2024-07-15T02:15:03.363000
CVE-2021-44461,0,0,7dc941f5a6643886eaebd18adbe4501e760fbb54d562083a44ffba8dcb1ba015,2024-07-15T02:15:03.457000
CVE-2021-44462,0,0,28c37d96a23a332e4387295f29ae0af534ae561a8321e12cf19712bf4778f18e,2022-04-04T15:38:59.057000
@ -185270,14 +185275,14 @@ CVE-2021-44464,0,0,ee767844e25ca947b4eaba9073fe808069921fbe5c56b123e7252d8d65655
CVE-2021-44465,0,0,14f6bf0c1d10be913fa0fb8873231995b4e1af285efdb408357af10f77cba4b4,2024-07-15T02:15:03.533000
CVE-2021-44466,0,0,a1a2cb3cba7adf6029dbf608607b8d21b39603b1ba2c4dff1356169abf0ac25b,2022-07-12T17:42:04.277000
CVE-2021-44467,0,0,af2ebaaccfd6798ad3cbe410ec38c4b5d82f125ea8c7851703ed78c73d7a4dd8,2024-09-30T15:15:04.563000
CVE-2021-4447,1,1,4dc6b573d477cf51bda4169a22d676f14f1b956afe7c3ed2b2e7cbf827e4c916,2024-10-16T07:15:10.687000
CVE-2021-4447,0,0,4dc6b573d477cf51bda4169a22d676f14f1b956afe7c3ed2b2e7cbf827e4c916,2024-10-16T07:15:10.687000
CVE-2021-44470,0,0,bf65356876fadd1e4bbcdca9a11a5da49fc1164e8405c0765b86a57037d02fed,2022-08-19T18:34:58.277000
CVE-2021-44471,0,0,e9bb470313aa03110af56de4588b2a051a21c5b54cc2f1053c5abc56bb7075e5,2021-12-28T14:46:12.543000
CVE-2021-44476,0,0,398362e6030dea7ee9aefc21638361a67f4ab579aa9d4980350cb25266bbdf29,2024-07-15T02:15:03.617000
CVE-2021-44477,0,0,8059f08690d70d464f9a6a49458bee5cc6ff0a947abf25f59957ab405e2daf7b,2022-04-04T14:30:52.257000
CVE-2021-44478,0,0,c89e69a0e964419c068765deaec3ff1e239e6f118958dbe52e02236674e17c7e,2022-07-28T18:12:36.160000
CVE-2021-44479,0,0,8cea3450cf8bac0a6e4a6300cc359f9a7c00b5b6bea31be6f8e8b19c33781aca,2021-12-16T18:17:26.373000
CVE-2021-4448,1,1,17710524d0b4575dd834a6a96d8f4c877991197f85fd68775acf487a43de1bfa,2024-10-16T07:15:10.980000
CVE-2021-4448,0,0,17710524d0b4575dd834a6a96d8f4c877991197f85fd68775acf487a43de1bfa,2024-10-16T07:15:10.980000
CVE-2021-44480,0,0,ddea244291b0724396d82dc4281cc3c83442a2fc58c58c2e60bc63edd247b296,2022-07-12T17:42:04.277000
CVE-2021-44481,0,0,dbcfe1893eb2f7985aefe165b81e9828ea61d702498caab8e3bd89688cb1d9bc,2022-04-22T17:20:15.950000
CVE-2021-44482,0,0,fd07f92c02617685f2f0d51129d25a98428904018ae992cb5341865e68692d10,2022-04-22T17:20:33.857000
@ -185288,7 +185293,7 @@ CVE-2021-44486,0,0,27651a6cdbc22fd811c396815fcd58c7e9df9e9f02efddd164029d4bd79fd
CVE-2021-44487,0,0,ce0f49aeeb21b12eb994e31f9dc8ea4fe493e2fe9799304f6f5aad363af30a48,2022-04-22T18:01:28.737000
CVE-2021-44488,0,0,bc8fc47b2dc1fbdd2ff6796c164eebb69dd5e7769c2abff2f3b40703b1585918,2023-08-08T14:21:49.707000
CVE-2021-44489,0,0,fc081116b281e7438a800f81bf67993d6eaa9a04d13c5b0ce5603c38a8798416,2022-04-22T18:07:30.377000
CVE-2021-4449,1,1,cafc795192522c5eda50913bfabcb0ed6b016dad21948f9f80806f768449507c,2024-10-16T07:15:11.243000
CVE-2021-4449,0,0,cafc795192522c5eda50913bfabcb0ed6b016dad21948f9f80806f768449507c,2024-10-16T07:15:11.243000
CVE-2021-44490,0,0,51f6af39f7e9972b590a3dbba460e49e28124b6ab2ac9cafcc1c5568b297a218,2022-04-22T18:09:36.837000
CVE-2021-44491,0,0,724834766a658e6af5246aa62e8b332579badff28d2a1ca2e55cfbfb4cacb43d,2022-04-22T18:10:27.727000
CVE-2021-44492,0,0,a173c7c4257b833737dbbd312753d696476e51ef65f5326b2a29e920081a90a5,2022-04-22T17:35:22.267000
@ -185299,7 +185304,7 @@ CVE-2021-44496,0,0,a07c07b6904c144bd70645c1900f72e0a5308f16f5c8420754481bf17edd8
CVE-2021-44497,0,0,948a4f8a98e6d117d49b08d1c2fa9965216be8b16c34304f2be2dfe99b7b45a6,2022-04-22T15:57:06.907000
CVE-2021-44498,0,0,c81b74e5f1199a3a2e4776dfaa85d0faa4c68db76a10423d7a5f2d91f494dcf5,2022-04-22T15:58:01.770000
CVE-2021-44499,0,0,8c6047bfb74db5465d98b5344cfe14293befc2375500f0f94b07a920dcf8b7b4,2022-04-22T16:10:34.870000
CVE-2021-4450,1,1,4370356082b20811b7627b73474e264d06eed946d644db3c645463a1064affc2,2024-10-16T07:15:11.527000
CVE-2021-4450,0,0,4370356082b20811b7627b73474e264d06eed946d644db3c645463a1064affc2,2024-10-16T07:15:11.527000
CVE-2021-44500,0,0,025bfd6caf5a2b7ad2796c2ed667f9f1b2ed0b57a8e1158094e8cd856a2925a8,2022-04-22T16:11:19.893000
CVE-2021-44501,0,0,8865bba6dd75ef7675fb9be6a3ca0476f574dcc24bb3fbedb17e1dd48b2e17e1,2022-04-22T17:32:13.303000
CVE-2021-44502,0,0,81821cd79b4d30f62969daad02d568ded97c95de61241e894ca7a3b889192d79,2022-04-22T16:13:14.973000
@ -185310,7 +185315,7 @@ CVE-2021-44506,0,0,58aea1c6e9a257ce746f10c108c19ad7fec6cb4b1c3efb015f5efff33d4ea
CVE-2021-44507,0,0,aebde9357e585eff7a908d0de741a5e2985f463655b48ff7bcf113e5f679573e,2022-04-22T17:33:03.377000
CVE-2021-44508,0,0,c6792eaf6eb2a60c5e6ecdad5a800d632bb5b7ce863a54c68f8e7ac2a06ffd14,2022-04-22T15:16:26.873000
CVE-2021-44509,0,0,f649a3c99dfb2035d5f2555476d3723c6b7a288e6f77c9ccc7c73904b306808f,2022-04-22T15:24:17.437000
CVE-2021-4451,1,1,b358e155ee8534204ca81ba9155df685e8a41db3914ed87ff845cb56387fec64,2024-10-16T07:15:11.770000
CVE-2021-4451,0,0,b358e155ee8534204ca81ba9155df685e8a41db3914ed87ff845cb56387fec64,2024-10-16T07:15:11.770000
CVE-2021-44510,0,0,dfa3f0eec83167d212f23d0e1521038a3d1d2b98db47c6c7c2dc0e3c17256d77,2022-04-22T15:30:29.873000
CVE-2021-44512,0,0,9ea723d5afac9658d5da6130a4b16112f4aad592a684696723d489c785f3a5b6,2022-05-03T16:04:40.443000
CVE-2021-44513,0,0,1652b513dfbea72dbecb281e6d0e273723050582e745fe46b7e47813c9a3bc54,2021-12-08T14:27:43.643000
@ -185318,6 +185323,7 @@ CVE-2021-44514,0,0,2a7086d1d54601eed770c0454ba29e18c0e1f41fa1b58e45f7ebbd09a20aa
CVE-2021-44515,0,0,a65db06535f8b4773d2daf0133304ead4b1fddcb4c7f082e1d77b40dfd421d31,2022-07-12T17:42:04.277000
CVE-2021-44518,0,0,6a19081138328f03517640b5c96243598b3cb901fb1ceb955c9e8d22a7e1dae7,2022-10-27T19:02:42.367000
CVE-2021-44519,0,0,5d73bf5c61aacc79bc9b1378ba7e93da4b38fa87a7610cea8485b03f5bcaeb05,2022-12-02T22:41:25.380000
CVE-2021-4452,1,1,35e4569dbe860d84dc0415bd5cb4bfac4c6ababf277a376b027fcd4c2cd6f438,2024-10-16T08:15:04.160000
CVE-2021-44520,0,0,8d7ae8652eba2a0efbd36203eb59dc7a9c75f2ef5b741c6daec860d078052e63,2022-07-12T17:42:04.277000
CVE-2021-44521,0,0,a386c301b2435823e8baf3812cb1ebfee9d09544605bd5c15eec2dfa07791349,2022-08-09T00:39:07.850000
CVE-2021-44522,0,0,9a3dee88c414ef86293eaef6059ce8b99d1d61c06b661eb2e9d7e479ab95e389,2021-12-17T02:06:42.010000
@ -212622,10 +212628,10 @@ CVE-2022-4966,0,0,d7772092edb1c4f6ea77758ef1a2b38cc5d3bd7ded1e7c81a0173f7456d0da
CVE-2022-4967,0,0,acbcdcd64f9485d059508255d49aabf4f78227f1537ec6f5aeb5af6241be26cb,2024-06-14T13:15:49.633000
CVE-2022-4968,0,0,e0fb0f21bd0757ce18bf39146f9d80fa921c9791f06b9f657a0acbeb470dddd2,2024-06-27T22:15:10.033000
CVE-2022-4969,0,0,6da77d75911b6f9f4d4eed5e8e9a02ef51bdb2636c0fddb313d49f06fb600e32,2024-06-06T16:15:10.250000
CVE-2022-4971,1,1,ba68a66890cd2489331f782a9f3d14687fb64709c4084be2263fdfb9d006e43f,2024-10-16T07:15:12.040000
CVE-2022-4972,1,1,8766b8c9ef7f8198234b3fdbcef1d352638b90e67611351ed50be5c078fa203e,2024-10-16T07:15:12.257000
CVE-2022-4973,1,1,a01e901900f241608c4733092a96e8e51faff4f3fbaeaa96a4efb5e034e13c66,2024-10-16T07:15:12.497000
CVE-2022-4974,1,1,b23fa8d9e7f67244e89725af4bc1b87ed53c84fe972309e895baf9a33ec42c52,2024-10-16T07:15:12.760000
CVE-2022-4971,0,0,ba68a66890cd2489331f782a9f3d14687fb64709c4084be2263fdfb9d006e43f,2024-10-16T07:15:12.040000
CVE-2022-4972,0,0,8766b8c9ef7f8198234b3fdbcef1d352638b90e67611351ed50be5c078fa203e,2024-10-16T07:15:12.257000
CVE-2022-4973,0,0,a01e901900f241608c4733092a96e8e51faff4f3fbaeaa96a4efb5e034e13c66,2024-10-16T07:15:12.497000
CVE-2022-4974,0,0,b23fa8d9e7f67244e89725af4bc1b87ed53c84fe972309e895baf9a33ec42c52,2024-10-16T07:15:12.760000
CVE-2023-0001,0,0,89cc7c25326dd5727e94c3abe5ce2365a868c05aa8d47b4c236024303b20e03e,2024-01-12T22:10:50.817000
CVE-2023-0002,0,0,85151726e26db3dd412b666129cc1146d77d486c542304fa6aa1433f4f16452f,2023-11-07T03:59:26.433000
CVE-2023-0003,0,0,0f4cd63b6620e63a4c26b7158c334115eb4a14a033fde970e1fda8144d0dfe5d,2024-02-16T17:04:22.737000
@ -216858,7 +216864,9 @@ CVE-2023-22644,0,0,2e4e89ceb342737c49170c7c0542da6c5a09f3dc7477231f3f78658177ecd
CVE-2023-22645,0,0,98c54d8f7492de84ea534bda447d0a2e6c33352ecae4e300edd6bdf72922ced2,2023-04-29T02:15:41.093000
CVE-2023-22647,0,0,0681a89ef45e77cb88370b6be3b7fa1bc36fb3f322132affe5240d43f6147e4b,2024-10-09T09:15:03.133000
CVE-2023-22648,0,0,efcbdf59a79cc8b674d3df58e9203094276b2160da909666a01d8f83b10e10b0,2024-10-09T09:15:04.260000
CVE-2023-22649,1,1,d4ebf42ad718951503cab5c9b7b7a3e67f336adaccd056c63ea4e50903ae1ff3,2024-10-16T08:15:04.390000
CVE-2023-2265,0,0,6f6b69921089c30ff5335917053cb9d5a1a7f59a21a953d6d1041152fa7874ac,2023-12-06T00:35:41.900000
CVE-2023-22650,1,1,580262d04ddf34ae6b0fb497a834627526d09ac5a6bb987876be1c2a568653b7,2024-10-16T09:15:02.957000
CVE-2023-22651,0,0,6d0f20aeda01e69ecd80dc8867cf7c9b361c7ee144fe7c3ff65cbb9e3210ad1c,2023-05-10T18:08:49.957000
CVE-2023-22652,0,0,b96b1da985da20364c0e2e7f35e5ae49a780ad08eb5a89d6ab26c66053650903,2023-09-13T03:15:07.693000
CVE-2023-22653,0,0,3d72c27281a8ea8408016eac6c592251cdcbf44d004ab30840957e6a323b7ed4,2023-08-02T15:34:59.683000
@ -224280,6 +224288,7 @@ CVE-2023-32183,0,0,89db0e51560cda7144a4bc04901d7db9ee2db289560d2b478872936494607
CVE-2023-32184,0,0,123bec51d72ff65d7213bf06e3d98dc3786350eb64238bdb1de857862a0ef22c,2023-09-22T15:23:52.010000
CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b8885e0,2023-09-22T02:00:06.313000
CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000
CVE-2023-32188,1,1,414806e16a24df1ecbb6aadbe57c9884e174210dd398c42b014e332ad5c10d7d,2024-10-16T09:15:03.260000
CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000
CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f910122,2023-06-27T12:44:47.967000
CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000
@ -241287,15 +241296,17 @@ CVE-2023-7273,0,0,774cfced0b2ee4833f367ba7f35fc76f033b87073fddd91ce6539024f87d7d
CVE-2023-7279,0,0,f98ffb9aa7111762ac351724f18f9d9ee505a1023f26a13d8e9efc5698c9c712,2024-09-05T21:59:17.957000
CVE-2023-7281,0,0,0790d4bfb469f439660a23ce8eab8f87d3be095fc643fdfe8eec46cdbb17ca3a,2024-09-26T13:32:55.343000
CVE-2023-7282,0,0,f4fc1de03735b00b3526c9c4836a11bcc7904328f1e64bbcb0646541be7349bd,2024-09-26T13:32:55.343000
CVE-2023-7286,1,1,f8c5ecb1a96ceefb733f652ca7d2ac290a293dd6476bd4cb3e1b9ac6bf41c551,2024-10-16T07:15:13.223000
CVE-2023-7287,1,1,a5f45e98ba672295fe732ed480c7c3adff2570375965aa5b0c14e8368887aade,2024-10-16T07:15:13.507000
CVE-2023-7288,1,1,f8570d17517116b7ca85153cc7ef91db8295791fe1557b9d53e570a0f2e1bb49,2024-10-16T07:15:13.743000
CVE-2023-7289,1,1,0945637520f108d05c0727db0b1b22decd89ebf9c98f2b72c43ee7aa8cd37169,2024-10-16T07:15:14
CVE-2023-7290,1,1,1e4d8363d283f5afd307bf62ea4b56c99c4c216c9d280b35c2fb724f60ff7977,2024-10-16T07:15:14.243000
CVE-2023-7291,1,1,ef9826823269a63449c680b1fd36f980392c8c03638d8541a289f67e25afefbc,2024-10-16T07:15:14.503000
CVE-2023-7292,1,1,7a8fe156abe76013973de0181b135aba33babcf286649d4a9c9a86373c6a9d8f,2024-10-16T07:15:14.737000
CVE-2023-7293,1,1,673f003595e117fb5e010a499c08e675f325e27ef80171be3f6d6becd71daa1e,2024-10-16T07:15:14.970000
CVE-2023-7294,1,1,8f7a0b4dcaedad6035ae3a7fa1755e6699ca8385c85027fe80bbc613dc0fefda,2024-10-16T07:15:15.277000
CVE-2023-7286,0,0,f8c5ecb1a96ceefb733f652ca7d2ac290a293dd6476bd4cb3e1b9ac6bf41c551,2024-10-16T07:15:13.223000
CVE-2023-7287,0,0,a5f45e98ba672295fe732ed480c7c3adff2570375965aa5b0c14e8368887aade,2024-10-16T07:15:13.507000
CVE-2023-7288,0,0,f8570d17517116b7ca85153cc7ef91db8295791fe1557b9d53e570a0f2e1bb49,2024-10-16T07:15:13.743000
CVE-2023-7289,0,0,0945637520f108d05c0727db0b1b22decd89ebf9c98f2b72c43ee7aa8cd37169,2024-10-16T07:15:14
CVE-2023-7290,0,0,1e4d8363d283f5afd307bf62ea4b56c99c4c216c9d280b35c2fb724f60ff7977,2024-10-16T07:15:14.243000
CVE-2023-7291,0,0,ef9826823269a63449c680b1fd36f980392c8c03638d8541a289f67e25afefbc,2024-10-16T07:15:14.503000
CVE-2023-7292,0,0,7a8fe156abe76013973de0181b135aba33babcf286649d4a9c9a86373c6a9d8f,2024-10-16T07:15:14.737000
CVE-2023-7293,0,0,673f003595e117fb5e010a499c08e675f325e27ef80171be3f6d6becd71daa1e,2024-10-16T07:15:14.970000
CVE-2023-7294,0,0,8f7a0b4dcaedad6035ae3a7fa1755e6699ca8385c85027fe80bbc613dc0fefda,2024-10-16T07:15:15.277000
CVE-2023-7295,1,1,dfcfcc824f1b0ac8779a698b90931483f9c10f5426b460a0db0d036d6c004cb5,2024-10-16T08:15:04.767000
CVE-2023-7296,1,1,6467a9345706e9c70c0741441611fd5024e17ea9f00c22f856e5bc8ed9fc5642,2024-10-16T08:15:04.977000
CVE-2024-0001,0,0,ddc97ec95f63469ba72943e3a1a3c2055a0f787a376d00af08b9e1c9de1e66b0,2024-09-27T14:08:57.327000
CVE-2024-0002,0,0,8eba00d67fa29dcfc182e2e2367ab4a3c005649f9c2970e7f365907a3a42b06a,2024-09-27T14:13:24.427000
CVE-2024-0003,0,0,46c85e4a496f19260982bccddc0ca5126276fd9fc3f3c6d4be9e905c5a7e34b8,2024-09-27T14:23:58.243000
@ -244381,7 +244392,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957
CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000
CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000
CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000
CVE-2024-21534,0,0,fbfd2c9efbdef3792dc1f4e6bcdeb527f71693fa6f6530e9cd12d16dcbf1069d,2024-10-15T12:58:51.050000
CVE-2024-21534,0,1,b752ab4dc63cdf4c5681dd0e8f0538c7b04ba97e65d41096c405fe76b964ca23,2024-10-16T09:15:03.410000
CVE-2024-21535,0,0,dd690d7709ed4ced0a9a8cbf1f59dfc2612ba8c6a810d6d21ffc9a3f5e9a7d9a,2024-10-15T12:57:46.880000
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
@ -255622,7 +255633,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5
CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000
CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000
CVE-2024-3727,0,1,ed44f253572252eb15ee966703d1a76f4efe48b3e89b2596353950937d8c7ded,2024-10-16T07:15:15.583000
CVE-2024-3727,0,0,ed44f253572252eb15ee966703d1a76f4efe48b3e89b2596353950937d8c7ded,2024-10-16T07:15:15.583000
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
@ -260589,6 +260600,9 @@ CVE-2024-45200,0,0,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
CVE-2024-45216,1,1,847241c32163fa2f1da44e964dd82e09a72e1b9e33fe800bf971295cc5f43631,2024-10-16T08:15:05.233000
CVE-2024-45217,1,1,39e9fcd4bde0ccbb93f23fb3a4d5a3075f7982e2b29366e996c36d7651f566cc,2024-10-16T08:15:05.353000
CVE-2024-45219,1,1,06b619a7ceeb8d6cb7f11a182142d97bca23ca2b11f4b8ef3e2808092ace22d3,2024-10-16T08:15:05.473000
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
CVE-2024-45229,0,0,9c8c70fcda9c99c754f0fdd9cd19b64ab40d1023f96876f950167f9ed6ee6a43,2024-09-26T13:32:55.343000
CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000
@ -260753,6 +260767,8 @@ CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55
CVE-2024-45459,0,0,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000
CVE-2024-4546,0,0,b54fd960b0f682682e91f5a439869fe44d7d9c83b2d79e063c1697b7441a9761,2024-05-16T13:03:05.353000
CVE-2024-45460,0,0,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000
CVE-2024-45461,1,1,faed0db56c27b3ef74d610140abacd74da969db5207083f811208f75d998496d,2024-10-16T08:15:05.717000
CVE-2024-45462,1,1,45f22b46d2b8bea7546b2a7b05fd01cd8ec47bd42cd7404ed91727ebeff8fd56,2024-10-16T08:15:05.933000
CVE-2024-45463,0,0,a9a5f56b759215b2281ec627fe0c607aa07ab62cdff5847ecbdaa1e6768d0035,2024-10-15T17:35:51.263000
CVE-2024-45464,0,0,8b929b4e136ea61613724435daa38f3adbab6eb0ab0969f0cee83dc792efc84a,2024-10-15T17:35:33.887000
CVE-2024-45465,0,0,810f47d979302bb0c310fa31cc05b9821ef43ec873eb81fa46fb54894361c8d3,2024-10-15T17:35:22.230000
@ -260843,6 +260859,7 @@ CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec42
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
CVE-2024-45693,1,1,e6dae0ca07bcafa329f0219f5f3de89f23ee3660c7e568b52ee1f50938babc10,2024-10-16T08:15:06.160000
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
CVE-2024-45695,0,0,da601d84ea417c0c9279d85654ade81af5192308ba1ba5409f7a2b21c121a433,2024-09-17T18:40:38.573000
CVE-2024-45696,0,0,15dc5b5bd95cf2badd72adb77d96e01d4ef86e61af344574364ee75cad060ea9,2024-09-19T21:42:36.557000
@ -260850,6 +260867,10 @@ CVE-2024-45697,0,0,f5a37290219fae59e8d61a5bcf73769a3b20c61fab40a7e37a2a1d321507c
CVE-2024-45698,0,0,f6526298a3f199ded6c907356b8dd6f5db94f0696639cd8ae5a504a08cbeae04,2024-10-15T10:15:02.853000
CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
CVE-2024-45710,1,1,6b23b070c353040a5c1ff63de53fdc7e006ecfebbb63edd81f77a770e7e538f1,2024-10-16T08:15:06.387000
CVE-2024-45711,1,1,5fa7b955f441fc449a6d055cdd4a0a305b2241253e21ae0f9a82864b8f0dc705,2024-10-16T08:15:06.690000
CVE-2024-45714,1,1,fddccf934ff5cfed6ab2883c33c973a4a8eb0984ee03efe9b85c7e509d97cc5e,2024-10-16T08:15:06.897000
CVE-2024-45715,1,1,701e82d31c5ef34eaf266be991461f01e406af5d4df14e149ae62858110921f3,2024-10-16T08:15:07.110000
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
@ -263516,7 +263537,7 @@ CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe3247
CVE-2024-6505,0,0,2472b280b959c45a84076dc8298b1f0ea15132bfdd2f045bf3ab100aab446db1,2024-09-19T06:15:03.463000
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000
CVE-2024-6508,0,1,d23055a39e1df773d98780577d434c72bc67df9f2fd0b90538a160cf45e32579,2024-10-16T07:15:16.027000
CVE-2024-6508,0,0,d23055a39e1df773d98780577d434c72bc67df9f2fd0b90538a160cf45e32579,2024-10-16T07:15:16.027000
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
CVE-2024-6510,0,0,5e8ec1aef4696d364d1cf0507192e6236a7f19c30decdfeea7966d96cda0feda,2024-10-02T17:17:46.450000
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
@ -264294,7 +264315,7 @@ CVE-2024-7481,0,0,029caf1b5321966d6fff7b258f5edb21656af3703408123f2c0a2bb28c2a7f
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
CVE-2024-7489,0,1,a911c458f8c85ecb33feabe2fee5828bb307bd0fdaa5447d2dc32acdf03946c2,2024-10-16T07:15:16.160000
CVE-2024-7489,0,0,a911c458f8c85ecb33feabe2fee5828bb307bd0fdaa5447d2dc32acdf03946c2,2024-10-16T07:15:16.160000
CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000
CVE-2024-7491,0,0,d689a374fb3537e15633f4540eb868e4dc80670c3ee0d8274c63d44d12227824,2024-09-26T13:32:02.803000
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
@ -265053,7 +265074,7 @@ CVE-2024-8499,0,0,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53
CVE-2024-8507,1,1,92659dc14de63bdd971bb2b8cd9dcbd96ec45d659353901efc35a70fd03146d9,2024-10-16T07:15:16.277000
CVE-2024-8507,0,0,92659dc14de63bdd971bb2b8cd9dcbd96ec45d659353901efc35a70fd03146d9,2024-10-16T07:15:16.277000
CVE-2024-8508,0,0,095cff01fb00165e2108ed0a6b3f940edeffb7916515f1cc0f2ea48f2031a7c8,2024-10-04T13:50:43.727000
CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000
CVE-2024-8513,0,0,910ae7d47a27f3be55b8ebbee4133c06edee61ebde300e418feb96105acdd2ce,2024-10-15T13:33:14.333000
@ -265210,7 +265231,7 @@ CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d1
CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000
CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
CVE-2024-8743,0,0,65920323e1d664fd8f354bc76b73276103c2d19a537eecec01fa5cc8c5638d58,2024-10-07T17:48:28.117000
CVE-2024-8746,1,1,2adbd9e55fcc7075a1cff31cd1a1b9830f00a38e64a33dd240261d3beed9461f,2024-10-16T07:15:16.537000
CVE-2024-8746,0,0,2adbd9e55fcc7075a1cff31cd1a1b9830f00a38e64a33dd240261d3beed9461f,2024-10-16T07:15:16.537000
CVE-2024-8747,0,0,c8071dd8d89406610db13dc6a04dbbb98461ebd7257641ae31a11de6b1ad5c9f,2024-09-26T19:23:12.477000
CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000
CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b5620,2024-09-18T20:38:42.123000
@ -265296,7 +265317,7 @@ CVE-2024-8913,0,0,fca416d77c5623788a9db07f1a3764802595b9fed9406445b458bbb4d1cd4d
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da01,2024-10-15T12:57:46.880000
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
CVE-2024-8918,1,1,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000
CVE-2024-8918,0,0,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000
CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000
CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000
CVE-2024-8925,0,0,573fa9fc5dcadaf344ac622d80d126966b00ab4fb4c5a5f790f844b7bfe8b0ca,2024-10-10T12:57:21.987000
@ -265375,6 +265396,7 @@ CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829d
CVE-2024-9054,0,0,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
CVE-2024-9061,1,1,562c310fa8881d33082aa6f79185fddd34abe9046bbc5c1d456162d7271bc94b,2024-10-16T08:15:07.323000
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
CVE-2024-9064,0,0,4bd835018f8ee84a333231ae5a909dfea000d9b5863547b4810da47567f71043,2024-10-15T14:11:11.790000
CVE-2024-9065,0,0,9f19d6078338677f112d6f1d89cff294845d2bd1abe5e252fa8925e15f71d1bc,2024-10-15T14:14:18.590000
@ -265612,6 +265634,7 @@ CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f61
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
CVE-2024-9540,1,1,9e4922d87ea2ee3572be93d179833331fe4596b65ad6d5de59d2554ecb210480,2024-10-16T08:15:07.547000
CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000
CVE-2024-9546,0,0,bf353c5a5978f7f8468721bb633c8599b93f34e5026cc20c4dc4e5683c7393da,2024-10-15T12:57:46.880000
CVE-2024-9548,0,0,c926d1965d0fc43d341cc5174337c64b2123a47e21014504a2a02f5aaf1cda9c,2024-10-15T12:57:46.880000
@ -265644,7 +265667,7 @@ CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df
CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5d7,2024-10-14T08:15:02.970000
CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000
CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000
CVE-2024-9582,1,1,6f9edfac65352910eb4469af0c7a4c3dab761a8e62e31b1b92c75db9096c1974,2024-10-16T07:15:17.033000
CVE-2024-9582,0,0,6f9edfac65352910eb4469af0c7a4c3dab761a8e62e31b1b92c75db9096c1974,2024-10-16T07:15:17.033000
CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000
CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000
CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000
@ -265721,11 +265744,12 @@ CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca42489
CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000
CVE-2024-9858,1,1,739e2f5935100ddc3d64a1f7fc2fb460fdc295e6845bb9ad27c16b38943f183c,2024-10-16T09:15:03.550000
CVE-2024-9859,0,0,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000
CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df555,2024-10-15T12:57:46.880000
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
CVE-2024-9873,1,1,cd4ff22f11313acb0d82df82e47be4f4940aecb8b45f90ef5f3e186f0e33c740,2024-10-16T06:15:02.527000
CVE-2024-9888,1,1,68fc5031c0a52291fb2b329f8fc062d33bbb29cbbfbe4c31c17b0360603a1eae,2024-10-16T06:15:03.650000
CVE-2024-9873,0,0,cd4ff22f11313acb0d82df82e47be4f4940aecb8b45f90ef5f3e186f0e33c740,2024-10-16T06:15:02.527000
CVE-2024-9888,0,0,68fc5031c0a52291fb2b329f8fc062d33bbb29cbbfbe4c31c17b0360603a1eae,2024-10-16T06:15:03.650000
CVE-2024-9891,0,0,4c8a9a58887e98726942bc0a2fd35c0c88241c217c7fd52663f3ef69115d2406,2024-10-16T02:15:08.333000
CVE-2024-9894,0,0,14c1a187244ef98f70dad85c66b4e9e50b1523e45b13c684f05d8920a1d43b87,2024-10-15T12:57:46.880000
CVE-2024-9895,0,0,1804aadc601cefc0a637c4245324ad03665b7298686ff057930daf35aa0b9bfa,2024-10-15T12:57:46.880000
@ -265751,7 +265775,7 @@ CVE-2024-9923,0,0,1744d806aab87c1cbef5524d43cf9cad10cdae75dc6a2cfd8b34f2d3877dca
CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
CVE-2024-9925,0,0,40ec06885e2cf941cc3fd6c1effc99e4018421341691aa45ec80f48176ade482,2024-10-15T12:57:46.880000
CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000
CVE-2024-9937,1,1,fc21cd16c574ce1a245aba103e1615576201cab8b5d108df1842ab1a89488a60,2024-10-16T06:15:04.177000
CVE-2024-9937,0,0,fc21cd16c574ce1a245aba103e1615576201cab8b5d108df1842ab1a89488a60,2024-10-16T06:15:04.177000
CVE-2024-9944,0,0,0105315be1482473acf9cccf2807cd53dd651f41a7a3739bca8c3d692de03102,2024-10-15T12:57:46.880000
CVE-2024-9952,0,0,75bf1164383c64f84aaae3ebb54926536c4d8cc1bc9810fac6b8f11ba1e426eb,2024-10-15T12:57:46.880000
CVE-2024-9953,0,0,d4420057cd6ff540e58057e827a120bd402b45b9e9ab6580a72e462bb02065ee,2024-10-15T15:15:13.660000

Can't render this file because it is too large.