Auto-Update: 2024-07-21T23:55:18.051366+00:00

This commit is contained in:
cad-safe-bot 2024-07-21 23:58:11 +00:00
parent 12500b92fb
commit 6d47e52428
15 changed files with 761 additions and 10 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37446",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T23:15:02.143",
"lastModified": "2024-07-21T23:15:02.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kiboko Labs Chained Quiz allows Stored XSS.This issue affects Chained Quiz: from n/a through 1.3.2.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/chained-quiz/wordpress-chained-quiz-plugin-1-3-2-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37447",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T23:15:02.390",
"lastModified": "2024-07-21T23:15:02.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PixelYourSite PixelYourSite \u2013 Your smart PIXEL (TAG) Manager allows Stored XSS.This issue affects PixelYourSite \u2013 Your smart PIXEL (TAG) Manager: from n/a through 9.6.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pixelyoursite/wordpress-pixelyoursite-your-smart-pixel-tag-api-manager-plugin-9-6-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37449",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T23:15:02.620",
"lastModified": "2024-07-21T23:15:02.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemePunch OHG Slider Revolution.This issue affects Slider Revolution: from n/a through 6.7.13."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/revslider/wordpress-slider-revolution-plugin-6-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37457",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T23:15:02.880",
"lastModified": "2024-07-21T23:15:02.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ultimate Blocks Ultimate Blocks \u2013 Gutenberg Blocks Plugin allows Stored XSS.This issue affects Ultimate Blocks \u2013 Gutenberg Blocks Plugin: from n/a through 3.1.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-blocks/wordpress-ultimate-blocks-wordpress-blocks-plugin-plugin-3-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37459",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:02.427",
"lastModified": "2024-07-21T22:15:02.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PayPlus LTD PayPlus Payment Gateway allows Reflected XSS.This issue affects PayPlus Payment Gateway: from n/a through 6.6.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/payplus-payment-gateway/wordpress-payplus-payment-gateway-plugin-6-6-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37460",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:02.690",
"lastModified": "2024-07-21T22:15:02.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SuperSaaS SuperSaaS \u2013 online appointment scheduling allows Stored XSS.This issue affects SuperSaaS \u2013 online appointment scheduling: from n/a through 2.1.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/supersaas-appointment-scheduling/wordpress-supersaas-online-appointment-scheduling-plugin-2-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37461",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:02.927",
"lastModified": "2024-07-21T22:15:02.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Gibson IdeaPush allows Stored XSS.This issue affects IdeaPush: from n/a through 8.65."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ideapush/wordpress-ideapush-plugin-8-65-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37465",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:03.173",
"lastModified": "2024-07-21T22:15:03.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Senol Sahin GPT3 AI Content Writer allows Stored XSS.This issue affects GPT3 AI Content Writer: from n/a through 1.8.66."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gpt3-ai-content-generator/wordpress-ai-power-complete-ai-pack-powered-by-gpt-4-plugin-1-8-66-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37466",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:03.407",
"lastModified": "2024-07-21T22:15:03.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kraftplugins Mega Elements.This issue affects Mega Elements: from n/a through 1.2.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mega-elements-addons-for-elementor/wordpress-mega-elements-plugin-1-2-2-contributor-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37480",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:03.647",
"lastModified": "2024-07-21T22:15:03.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Apollo13Themes Apollo13 Framework Extensions apollo13-framework-extensions allows Stored XSS.This issue affects Apollo13 Framework Extensions: from n/a through 1.9.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/apollo13-framework-extensions/wordpress-apollo13-framework-extensions-plugin-1-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37485",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:03.880",
"lastModified": "2024-07-21T22:15:03.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Vinny Alves (UseStrict Consulting) bbPress Notify allows Reflected XSS.This issue affects bbPress Notify: from n/a through 2.18.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bbpress-notify-nospam/wordpress-bbpress-notify-no-spam-plugin-2-18-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38781",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:04.180",
"lastModified": "2024-07-21T22:15:04.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ArtistScope CopySafe Web Protection allows Reflected XSS.This issue affects CopySafe Web Protection: from n/a through 3.15."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-copysafe-web/wordpress-copysafe-web-protection-plugin-3-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38782",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-21T22:15:04.423",
"lastModified": "2024-07-21T22:15:04.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MapsMarker.Com e.U. Leaflet Maps Marker allows Stored XSS.This issue affects Leaflet Maps Marker: from n/a through 3.12.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/leaflet-maps-marker/wordpress-leaflet-maps-marker-plugin-3-12-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-21T22:00:18.324888+00:00
2024-07-21T23:55:18.051366+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-21T21:15:02.527000+00:00
2024-07-21T23:15:02.880000+00:00
```
### Last Data Feed Release
@ -33,16 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257668
257681
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `13`
- [CVE-2024-38784](CVE-2024/CVE-2024-387xx/CVE-2024-38784.json) (`2024-07-21T21:15:02.030`)
- [CVE-2024-38785](CVE-2024/CVE-2024-387xx/CVE-2024-38785.json) (`2024-07-21T21:15:02.293`)
- [CVE-2024-38786](CVE-2024/CVE-2024-387xx/CVE-2024-38786.json) (`2024-07-21T21:15:02.527`)
- [CVE-2024-37446](CVE-2024/CVE-2024-374xx/CVE-2024-37446.json) (`2024-07-21T23:15:02.143`)
- [CVE-2024-37447](CVE-2024/CVE-2024-374xx/CVE-2024-37447.json) (`2024-07-21T23:15:02.390`)
- [CVE-2024-37449](CVE-2024/CVE-2024-374xx/CVE-2024-37449.json) (`2024-07-21T23:15:02.620`)
- [CVE-2024-37457](CVE-2024/CVE-2024-374xx/CVE-2024-37457.json) (`2024-07-21T23:15:02.880`)
- [CVE-2024-37459](CVE-2024/CVE-2024-374xx/CVE-2024-37459.json) (`2024-07-21T22:15:02.427`)
- [CVE-2024-37460](CVE-2024/CVE-2024-374xx/CVE-2024-37460.json) (`2024-07-21T22:15:02.690`)
- [CVE-2024-37461](CVE-2024/CVE-2024-374xx/CVE-2024-37461.json) (`2024-07-21T22:15:02.927`)
- [CVE-2024-37465](CVE-2024/CVE-2024-374xx/CVE-2024-37465.json) (`2024-07-21T22:15:03.173`)
- [CVE-2024-37466](CVE-2024/CVE-2024-374xx/CVE-2024-37466.json) (`2024-07-21T22:15:03.407`)
- [CVE-2024-37480](CVE-2024/CVE-2024-374xx/CVE-2024-37480.json) (`2024-07-21T22:15:03.647`)
- [CVE-2024-37485](CVE-2024/CVE-2024-374xx/CVE-2024-37485.json) (`2024-07-21T22:15:03.880`)
- [CVE-2024-38781](CVE-2024/CVE-2024-387xx/CVE-2024-38781.json) (`2024-07-21T22:15:04.180`)
- [CVE-2024-38782](CVE-2024/CVE-2024-387xx/CVE-2024-38782.json) (`2024-07-21T22:15:04.423`)
### CVEs modified in the last Commit

View File

@ -254136,12 +254136,21 @@ CVE-2024-37430,0,0,f63f8a79ba000a8d3292c8fa1235cffff817858e9420c3da871f375702319
CVE-2024-37437,0,0,83ef1ea78c6e8ed1e0567a248a21cf468b1495feae2ba1cce072befcd95360ad,2024-07-09T18:19:14.047000
CVE-2024-3744,0,0,40b0f0c765c7a4ad7df2de19ce2eb9519fa9c2af93a33399e8c5730df134e208,2024-06-10T16:15:16.980000
CVE-2024-37442,0,0,78875ce6f4ee251957afe776cc270daef543fd5a212b6acf13b07c615995ce9a,2024-07-09T18:19:14.047000
CVE-2024-37446,1,1,740195a179f691843735ec6f0029804dc39d00a3a21243b6b9055ba647d2f0a4,2024-07-21T23:15:02.143000
CVE-2024-37447,1,1,882058c00c4877391f2aaf6b4cd6e2e6a00de15f079820757a1bc87deb79832a,2024-07-21T23:15:02.390000
CVE-2024-37449,1,1,472b485e640ecfd381dfb6da95c90adf91773f4a801b810510fb784123d41c90,2024-07-21T23:15:02.620000
CVE-2024-3745,0,0,6c9edfff9e79c22a28b880b426148983da8f8a5db27e4bfd2a1dfcfd3cb4de8f,2024-05-20T13:00:34.807000
CVE-2024-37454,0,0,5dd61dd0d84c4b3f5941735c6171883bab82a8d9b454b6d1ba19ff534234505c,2024-07-09T18:19:14.047000
CVE-2024-37455,0,0,57b2f9feca4098778a62954cb394ad6294cd222d3c3a0a03ec9db535b59c5042,2024-07-09T18:19:14.047000
CVE-2024-37457,1,1,5e9a40de0b9d1f0ffb5862b32792a5c53693986be0e408e9732799adace685bf,2024-07-21T23:15:02.880000
CVE-2024-37459,1,1,6ccc3bb2d3fcbc6ae6c1c59994c5e48bd4639a09455cd564096402d74bb33fed,2024-07-21T22:15:02.427000
CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e35b,2024-07-03T02:06:31.490000
CVE-2024-37460,1,1,8def78f0038f5afa5e2ffd52266477b0f4c958ab4c12ec2f2f6dd0218dc101ec,2024-07-21T22:15:02.690000
CVE-2024-37461,1,1,5c3793b3665fbfe4a94742615886845684b439b714e3df775bfccb1a6e487771,2024-07-21T22:15:02.927000
CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000
CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000
CVE-2024-37465,1,1,f4ce5bb507e053f87354c1d5dd1c84cc0183b6e6792ee5a74fa6034b39111964,2024-07-21T22:15:03.173000
CVE-2024-37466,1,1,437a76cd98816d10f67cb0960225b92210581dac31f58459b9ffafe2094ae04b,2024-07-21T22:15:03.407000
CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000
CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000
CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
@ -254149,7 +254158,9 @@ CVE-2024-37474,0,0,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6c
CVE-2024-37476,0,0,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
CVE-2024-37480,1,1,3d56861457270229f4fd51d3085469517d8d352af37222a0ae0fcff4cf6cb602,2024-07-21T22:15:03.647000
CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd642,2024-07-09T18:19:14.047000
CVE-2024-37485,1,1,dda2b394144d119ce0471bb1669a5ae4633bb4a9ffd6d22a3fe7bee0418d1f57,2024-07-21T22:15:03.880000
CVE-2024-37486,0,0,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5be44,2024-07-09T18:19:14.047000
CVE-2024-37487,0,0,a6462181d6cf78c447a4fa272907c387da09a35bb5485f6f3a8530161ab70264,2024-07-21T08:15:02.587000
CVE-2024-37488,0,0,87af524e6c59a27379b0e368f160dfa5c422cf6e371f88d099ef3b011c633510,2024-07-21T08:15:02.837000
@ -254856,9 +254867,11 @@ CVE-2024-38767,0,0,5ad0da711e375b5faa75cfeef9e50fe3656523a9e63748dcd031d21a52f71
CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72aa,2024-06-04T19:20:25.903000
CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000
CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000
CVE-2024-38784,1,1,c721b43ac825ceb05c320557f7d43de2ea1f932710ab088d445551198093bdbe,2024-07-21T21:15:02.030000
CVE-2024-38785,1,1,909cc2b7a94f7da3b0b6b4202501ab2d895290210e84ed2c0225d20b5d920d05,2024-07-21T21:15:02.293000
CVE-2024-38786,1,1,0b4641f2efea70795810ddd5e11cff593e4c5989c77ec1683892594d39b5f7f2,2024-07-21T21:15:02.527000
CVE-2024-38781,1,1,49fc4bcd3e4c79f1e53e05f548f229607679b56108a5d09bee08053543a492e8,2024-07-21T22:15:04.180000
CVE-2024-38782,1,1,49c668604cb31af81eb3ec8654028aac8a895eed4e60ff95619eff83baeacf0c,2024-07-21T22:15:04.423000
CVE-2024-38784,0,0,c721b43ac825ceb05c320557f7d43de2ea1f932710ab088d445551198093bdbe,2024-07-21T21:15:02.030000
CVE-2024-38785,0,0,909cc2b7a94f7da3b0b6b4202501ab2d895290210e84ed2c0225d20b5d920d05,2024-07-21T21:15:02.293000
CVE-2024-38786,0,0,0b4641f2efea70795810ddd5e11cff593e4c5989c77ec1683892594d39b5f7f2,2024-07-21T21:15:02.527000
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000

Can't render this file because it is too large.