mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-08-13T12:00:17.406075+00:00
This commit is contained in:
parent
4f1350f05d
commit
790e87a126
78
CVE-2024/CVE-2024-22xx/CVE-2024-2259.json
Normal file
78
CVE-2024/CVE-2024-22xx/CVE-2024-2259.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-2259",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-08-13T11:15:15.013",
|
||||
"lastModified": "2024-08-13T11:15:15.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability exists in InstaRISPACS software due to insufficient validation of user supplied input for the loginTo parameter in user login module of the web interface of the application. A remote attacker could exploit this vulnerability by sending a specially crafted input to the vulnerable parameter to perform reflected Cross Site Scripting (XSS) attacks on the targeted system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0241",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37935.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37935.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37935",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T10:15:04.883",
|
||||
"lastModified": "2024-08-13T10:15:04.883",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in anhvnit Woocommerce OpenPos allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woocommerce OpenPos: from n/a through 6.4.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-openpos/wordpress-woocommerce-openpos-plugin-6-4-4-unauthenticated-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-386xx/CVE-2024-38688.json
Normal file
56
CVE-2024/CVE-2024-386xx/CVE-2024-38688.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38688",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T10:15:06.677",
|
||||
"lastModified": "2024-08-13T10:15:06.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Igor Beni\u0107 Recipe Maker For Your Food Blog from Zip Recipes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/zip-recipes/wordpress-recipe-maker-for-your-food-blog-from-zip-recipes-plugin-8-2-6-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-386xx/CVE-2024-38699.json
Normal file
56
CVE-2024/CVE-2024-386xx/CVE-2024-38699.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38699",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:15.257",
|
||||
"lastModified": "2024-08-13T11:15:15.257",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in WP Swings Wallet System for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Wallet System for WooCommerce: from n/a through 2.5.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wallet-system-for-woocommerce/wordpress-wallet-system-for-woocommerce-plugin-2-5-13-sensitive-data-exposure-via-exported-file-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-387xx/CVE-2024-38724.json
Normal file
60
CVE-2024/CVE-2024-387xx/CVE-2024-38724.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38724",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:15.500",
|
||||
"lastModified": "2024-08-13T11:15:15.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF), Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Muhammad Rehman Contact Form 7 Summary and Print allows Stored XSS.This issue affects Contact Form 7 Summary and Print: from n/a through 1.2.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cf7-summary-and-print/wordpress-contact-form-7-summary-and-print-plugin-1-2-5-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38742.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38742.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38742",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:15.737",
|
||||
"lastModified": "2024-08-13T11:15:15.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in MBE Worldwide S.P.A. MBE eShip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects MBE eShip: from n/a through 2.1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mail-boxes-etc/wordpress-mbe-eship-plugin-2-1-2-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38747.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38747.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38747",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:15.967",
|
||||
"lastModified": "2024-08-13T11:15:15.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/hitpay-payment-gateway/wordpress-hitpay-payment-gateway-for-woocommerce-plugin-4-1-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38749.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38749.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38749",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:16.193",
|
||||
"lastModified": "2024-08-13T11:15:16.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Olive Themes Olive One Click Demo Import allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Olive One Click Demo Import: from n/a through 1.1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/olive-one-click-demo-import/wordpress-olive-one-click-demo-import-plugin-1-1-2-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38752.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38752.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38752",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:16.417",
|
||||
"lastModified": "2024-08-13T11:15:16.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zoho Campaigns allows Cross-Site Scripting (XSS).This issue affects Zoho Campaigns: from n/a through 2.0.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/zoho-campaigns/wordpress-zoho-campaigns-plugin-2-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38756.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38756.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38756",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:16.637",
|
||||
"lastModified": "2024-08-13T11:15:16.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Weblizar Coming Soon allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Coming Soon: from n/a through 1.6.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/responsive-coming-soon-page/wordpress-coming-soon-page-responsive-coming-soon-maintenance-mode-plugin-1-6-3-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38760.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38760.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38760",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:16.867",
|
||||
"lastModified": "2024-08-13T11:15:16.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Maucher Send Users Email allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Send Users Email: from n/a through 1.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/send-users-email/wordpress-send-users-email-plugin-1-5-1-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38787.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38787.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38787",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:17.080",
|
||||
"lastModified": "2024-08-13T11:15:17.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Codection Import and export users and customers allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Import and export users and customers: from n/a through 1.26.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/import-users-from-csv-with-meta/wordpress-import-and-export-users-and-customers-plugin-1-26-8-sensitive-information-via-imported-file-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39642.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39642.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39642",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:17.307",
|
||||
"lastModified": "2024-08-13T11:15:17.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authorization Bypass Through User-Controlled Key vulnerability in ThimPress LearnPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects LearnPress: from n/a through 4.2.6.8.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-2-6-8-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39651.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39651.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39651",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:17.523",
|
||||
"lastModified": "2024-08-13T11:15:17.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPWeb WooCommerce PDF Vouchers allows File Manipulation.This issue affects WooCommerce PDF Vouchers: from n/a before 4.9.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-pdf-vouchers/wordpress-woocommerce-pdf-vouchers-plugin-4-9-5-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-406xx/CVE-2024-40697.json
Normal file
60
CVE-2024/CVE-2024-406xx/CVE-2024-40697.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-40697",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-13T11:15:17.750",
|
||||
"lastModified": "2024-08-13T11:15:17.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Common Licensing 9.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 297895."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297895",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7165250",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-417xx/CVE-2024-41774.json
Normal file
60
CVE-2024/CVE-2024-417xx/CVE-2024-41774.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41774",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-13T11:15:17.973",
|
||||
"lastModified": "2024-08-13T11:15:17.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Common Licensing 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 350348."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/350348",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7165251",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-431xx/CVE-2024-43121.json
Normal file
56
CVE-2024/CVE-2024-431xx/CVE-2024-43121.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43121",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:18.210",
|
||||
"lastModified": "2024-08-13T11:15:18.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in realmag777 HUSKY allows Privilege Escalation.This issue affects HUSKY: from n/a through 1.3.6.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-6-1-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-431xx/CVE-2024-43128.json
Normal file
56
CVE-2024/CVE-2024-431xx/CVE-2024-43128.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43128",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:18.450",
|
||||
"lastModified": "2024-08-13T11:15:18.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in WC Product Table WooCommerce Product Table Lite allows Code Injection.This issue affects WooCommerce Product Table Lite: from n/a through 3.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wc-product-table-lite/wordpress-woocommerce-product-table-lite-plugin-3-5-1-arbitrary-code-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-431xx/CVE-2024-43129.json
Normal file
56
CVE-2024/CVE-2024-431xx/CVE-2024-43129.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43129",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:18.687",
|
||||
"lastModified": "2024-08-13T11:15:18.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPDeveloper BetterDocs allows PHP Local File Inclusion.This issue affects BetterDocs: from n/a through 3.5.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/betterdocs/wordpress-betterdocs-plugin-3-5-8-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-431xx/CVE-2024-43131.json
Normal file
56
CVE-2024/CVE-2024-431xx/CVE-2024-43131.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43131",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:18.913",
|
||||
"lastModified": "2024-08-13T11:15:18.913",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization vulnerability in WPWeb Docket (WooCommerce Collections / Wishlist / Watchlist) allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Docket (WooCommerce Collections / Wishlist / Watchlist): from n/a before 1.7.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-collections/wordpress-docket-woocommerce-collections-wishlist-watchlist-plugin-1-6-6-unauthenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-431xx/CVE-2024-43135.json
Normal file
56
CVE-2024/CVE-2024-431xx/CVE-2024-43135.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43135",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:19.133",
|
||||
"lastModified": "2024-08-13T11:15:19.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themewinter WPCafe allows PHP Local File Inclusion.This issue affects WPCafe: from n/a through 2.2.28."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-cafe/wordpress-wpcafe-plugin-2-2-28-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-13T10:00:18.540667+00:00
|
||||
2024-08-13T12:00:17.406075+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-13T09:15:04.610000+00:00
|
||||
2024-08-13T11:15:19.133000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,62 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259685
|
||||
259706
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2024-36398](CVE-2024/CVE-2024-363xx/CVE-2024-36398.json) (`2024-08-13T08:15:10.540`)
|
||||
- [CVE-2024-39922](CVE-2024/CVE-2024-399xx/CVE-2024-39922.json) (`2024-08-13T08:15:11.567`)
|
||||
- [CVE-2024-41681](CVE-2024/CVE-2024-416xx/CVE-2024-41681.json) (`2024-08-13T08:15:11.847`)
|
||||
- [CVE-2024-41682](CVE-2024/CVE-2024-416xx/CVE-2024-41682.json) (`2024-08-13T08:15:12.167`)
|
||||
- [CVE-2024-41683](CVE-2024/CVE-2024-416xx/CVE-2024-41683.json) (`2024-08-13T08:15:12.440`)
|
||||
- [CVE-2024-41903](CVE-2024/CVE-2024-419xx/CVE-2024-41903.json) (`2024-08-13T08:15:12.717`)
|
||||
- [CVE-2024-41904](CVE-2024/CVE-2024-419xx/CVE-2024-41904.json) (`2024-08-13T08:15:13.003`)
|
||||
- [CVE-2024-41905](CVE-2024/CVE-2024-419xx/CVE-2024-41905.json) (`2024-08-13T08:15:13.250`)
|
||||
- [CVE-2024-41906](CVE-2024/CVE-2024-419xx/CVE-2024-41906.json) (`2024-08-13T08:15:13.560`)
|
||||
- [CVE-2024-41907](CVE-2024/CVE-2024-419xx/CVE-2024-41907.json) (`2024-08-13T08:15:13.813`)
|
||||
- [CVE-2024-41908](CVE-2024/CVE-2024-419xx/CVE-2024-41908.json) (`2024-08-13T08:15:14.110`)
|
||||
- [CVE-2024-41938](CVE-2024/CVE-2024-419xx/CVE-2024-41938.json) (`2024-08-13T08:15:14.353`)
|
||||
- [CVE-2024-41939](CVE-2024/CVE-2024-419xx/CVE-2024-41939.json) (`2024-08-13T08:15:14.610`)
|
||||
- [CVE-2024-41940](CVE-2024/CVE-2024-419xx/CVE-2024-41940.json) (`2024-08-13T08:15:14.890`)
|
||||
- [CVE-2024-41941](CVE-2024/CVE-2024-419xx/CVE-2024-41941.json) (`2024-08-13T08:15:15.160`)
|
||||
- [CVE-2024-41976](CVE-2024/CVE-2024-419xx/CVE-2024-41976.json) (`2024-08-13T08:15:15.403`)
|
||||
- [CVE-2024-41977](CVE-2024/CVE-2024-419xx/CVE-2024-41977.json) (`2024-08-13T08:15:15.640`)
|
||||
- [CVE-2024-41978](CVE-2024/CVE-2024-419xx/CVE-2024-41978.json) (`2024-08-13T08:15:15.903`)
|
||||
- [CVE-2024-2259](CVE-2024/CVE-2024-22xx/CVE-2024-2259.json) (`2024-08-13T11:15:15.013`)
|
||||
- [CVE-2024-37935](CVE-2024/CVE-2024-379xx/CVE-2024-37935.json) (`2024-08-13T10:15:04.883`)
|
||||
- [CVE-2024-38688](CVE-2024/CVE-2024-386xx/CVE-2024-38688.json) (`2024-08-13T10:15:06.677`)
|
||||
- [CVE-2024-38699](CVE-2024/CVE-2024-386xx/CVE-2024-38699.json) (`2024-08-13T11:15:15.257`)
|
||||
- [CVE-2024-38724](CVE-2024/CVE-2024-387xx/CVE-2024-38724.json) (`2024-08-13T11:15:15.500`)
|
||||
- [CVE-2024-38742](CVE-2024/CVE-2024-387xx/CVE-2024-38742.json) (`2024-08-13T11:15:15.737`)
|
||||
- [CVE-2024-38747](CVE-2024/CVE-2024-387xx/CVE-2024-38747.json) (`2024-08-13T11:15:15.967`)
|
||||
- [CVE-2024-38749](CVE-2024/CVE-2024-387xx/CVE-2024-38749.json) (`2024-08-13T11:15:16.193`)
|
||||
- [CVE-2024-38752](CVE-2024/CVE-2024-387xx/CVE-2024-38752.json) (`2024-08-13T11:15:16.417`)
|
||||
- [CVE-2024-38756](CVE-2024/CVE-2024-387xx/CVE-2024-38756.json) (`2024-08-13T11:15:16.637`)
|
||||
- [CVE-2024-38760](CVE-2024/CVE-2024-387xx/CVE-2024-38760.json) (`2024-08-13T11:15:16.867`)
|
||||
- [CVE-2024-38787](CVE-2024/CVE-2024-387xx/CVE-2024-38787.json) (`2024-08-13T11:15:17.080`)
|
||||
- [CVE-2024-39642](CVE-2024/CVE-2024-396xx/CVE-2024-39642.json) (`2024-08-13T11:15:17.307`)
|
||||
- [CVE-2024-39651](CVE-2024/CVE-2024-396xx/CVE-2024-39651.json) (`2024-08-13T11:15:17.523`)
|
||||
- [CVE-2024-40697](CVE-2024/CVE-2024-406xx/CVE-2024-40697.json) (`2024-08-13T11:15:17.750`)
|
||||
- [CVE-2024-41774](CVE-2024/CVE-2024-417xx/CVE-2024-41774.json) (`2024-08-13T11:15:17.973`)
|
||||
- [CVE-2024-43121](CVE-2024/CVE-2024-431xx/CVE-2024-43121.json) (`2024-08-13T11:15:18.210`)
|
||||
- [CVE-2024-43128](CVE-2024/CVE-2024-431xx/CVE-2024-43128.json) (`2024-08-13T11:15:18.450`)
|
||||
- [CVE-2024-43129](CVE-2024/CVE-2024-431xx/CVE-2024-43129.json) (`2024-08-13T11:15:18.687`)
|
||||
- [CVE-2024-43131](CVE-2024/CVE-2024-431xx/CVE-2024-43131.json) (`2024-08-13T11:15:18.913`)
|
||||
- [CVE-2024-43135](CVE-2024/CVE-2024-431xx/CVE-2024-43135.json) (`2024-08-13T11:15:19.133`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `34`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-44320](CVE-2023/CVE-2023-443xx/CVE-2023-44320.json) (`2024-08-13T08:15:07.287`)
|
||||
- [CVE-2023-44321](CVE-2023/CVE-2023-443xx/CVE-2023-44321.json) (`2024-08-13T08:15:07.533`)
|
||||
- [CVE-2023-44322](CVE-2023/CVE-2023-443xx/CVE-2023-44322.json) (`2024-08-13T08:15:07.770`)
|
||||
- [CVE-2023-44373](CVE-2023/CVE-2023-443xx/CVE-2023-44373.json) (`2024-08-13T08:15:08.033`)
|
||||
- [CVE-2023-44374](CVE-2023/CVE-2023-443xx/CVE-2023-44374.json) (`2024-08-13T08:15:08.297`)
|
||||
- [CVE-2023-46280](CVE-2023/CVE-2023-462xx/CVE-2023-46280.json) (`2024-08-13T08:15:08.500`)
|
||||
- [CVE-2023-46281](CVE-2023/CVE-2023-462xx/CVE-2023-46281.json) (`2024-08-13T08:15:08.660`)
|
||||
- [CVE-2023-46282](CVE-2023/CVE-2023-462xx/CVE-2023-46282.json) (`2024-08-13T08:15:08.813`)
|
||||
- [CVE-2023-46283](CVE-2023/CVE-2023-462xx/CVE-2023-46283.json) (`2024-08-13T08:15:08.950`)
|
||||
- [CVE-2023-46284](CVE-2023/CVE-2023-462xx/CVE-2023-46284.json) (`2024-08-13T08:15:09.073`)
|
||||
- [CVE-2023-46285](CVE-2023/CVE-2023-462xx/CVE-2023-46285.json) (`2024-08-13T08:15:09.193`)
|
||||
- [CVE-2023-49691](CVE-2023/CVE-2023-496xx/CVE-2023-49691.json) (`2024-08-13T08:15:09.340`)
|
||||
- [CVE-2023-49692](CVE-2023/CVE-2023-496xx/CVE-2023-49692.json) (`2024-08-13T08:15:09.553`)
|
||||
- [CVE-2024-26275](CVE-2024/CVE-2024-262xx/CVE-2024-26275.json) (`2024-08-13T08:15:09.747`)
|
||||
- [CVE-2024-26276](CVE-2024/CVE-2024-262xx/CVE-2024-26276.json) (`2024-08-13T08:15:09.880`)
|
||||
- [CVE-2024-26277](CVE-2024/CVE-2024-262xx/CVE-2024-26277.json) (`2024-08-13T08:15:10.003`)
|
||||
- [CVE-2024-32635](CVE-2024/CVE-2024-326xx/CVE-2024-32635.json) (`2024-08-13T08:15:10.120`)
|
||||
- [CVE-2024-32636](CVE-2024/CVE-2024-326xx/CVE-2024-32636.json) (`2024-08-13T08:15:10.260`)
|
||||
- [CVE-2024-32637](CVE-2024/CVE-2024-326xx/CVE-2024-32637.json) (`2024-08-13T08:15:10.400`)
|
||||
- [CVE-2024-35161](CVE-2024/CVE-2024-351xx/CVE-2024-35161.json) (`2024-08-13T09:15:04.610`)
|
||||
- [CVE-2024-38867](CVE-2024/CVE-2024-388xx/CVE-2024-38867.json) (`2024-08-13T08:15:10.817`)
|
||||
- [CVE-2024-38876](CVE-2024/CVE-2024-388xx/CVE-2024-38876.json) (`2024-08-13T08:15:10.983`)
|
||||
- [CVE-2024-38877](CVE-2024/CVE-2024-388xx/CVE-2024-38877.json) (`2024-08-13T08:15:11.140`)
|
||||
- [CVE-2024-38878](CVE-2024/CVE-2024-388xx/CVE-2024-38878.json) (`2024-08-13T08:15:11.293`)
|
||||
- [CVE-2024-38879](CVE-2024/CVE-2024-388xx/CVE-2024-38879.json) (`2024-08-13T08:15:11.433`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
125
_state.csv
125
_state.csv
@ -202743,7 +202743,7 @@ CVE-2022-35864,0,0,1bfae45976b1ab402048c441952a0730ac732c7b125fee3474183c0ed1916
|
||||
CVE-2022-35865,0,0,13db658c4f9fa51aa824acb6d7ab73b34dc88bc4061dbb82373ab1cfa301e49d,2022-08-09T16:02:59.510000
|
||||
CVE-2022-35866,0,0,6eaa7476382bcac4a410312782e81300475b6119e48955b3be4d4924457f5ac0,2024-01-26T17:15:09.150000
|
||||
CVE-2022-35867,0,0,4e98aaef4d8528a422de359562f3980ea48bcfdca0330eb4a91995c98b69347d,2022-08-09T17:09:45.950000
|
||||
CVE-2022-35868,0,1,7e3d72eb7bd2c8ddbc0a9c81ae221fdabf131ffecf6dbede8b1d30f468145d5c,2024-08-13T08:15:05.163000
|
||||
CVE-2022-35868,0,0,7e3d72eb7bd2c8ddbc0a9c81ae221fdabf131ffecf6dbede8b1d30f468145d5c,2024-08-13T08:15:05.163000
|
||||
CVE-2022-35869,0,0,0f972661f0e63c0eacd04a1a216ca22f6989a6e80b61e3d22ecb897c4052298d,2022-08-03T16:56:53.823000
|
||||
CVE-2022-3587,0,0,cb951b8eea81bde9fedd4667bfd99ebcc9b6ae339be708c81e3b30d07e55c1a4,2023-12-28T16:46:19.600000
|
||||
CVE-2022-35870,0,0,b1418410196ae5e521edfaf75de133f2c3b09c4ed39790f38b17949dc2d7375c,2022-08-03T16:53:38.657000
|
||||
@ -210394,7 +210394,7 @@ CVE-2022-4614,0,0,7a88b9ab43606aa2914a80ea88031f70b341635413883b9e98c0a9e68e11c6
|
||||
CVE-2022-46140,0,0,0712d38e67b0ea79032215b4bf74ff40ac887fbb82d84f667826d6e174499b4a,2023-03-14T10:15:23.297000
|
||||
CVE-2022-46141,0,0,7e8b1bd776ac3ead1331d8517aad43a677ddf61c6250b76e8d2fe91ca8d647d2,2023-12-15T15:25:08.557000
|
||||
CVE-2022-46142,0,0,20adf9da98863cb88194bbb7f513fc1ee61c018019bc165f3c2b2a49e9c660b3,2023-03-14T10:15:24.137000
|
||||
CVE-2022-46143,0,1,b2840c246c8f5cf8b044875496df1888552d6b323ee32c20f66a96f8ea7c1783,2024-08-13T08:15:05.483000
|
||||
CVE-2022-46143,0,0,b2840c246c8f5cf8b044875496df1888552d6b323ee32c20f66a96f8ea7c1783,2024-08-13T08:15:05.483000
|
||||
CVE-2022-46144,0,0,9f4d0a1d99f33ccf042d56c5770f1a63b93ead0d06152f6e232560517cd2ac5f,2024-06-11T09:15:12.590000
|
||||
CVE-2022-46145,0,0,6bbab686c5e58e3eba776c5bf03bc3a160f730f487ff34eb9da030dbc8db223a,2023-06-23T17:54:04.830000
|
||||
CVE-2022-46146,0,0,7165ae3c480087b46becbb3e46119b1ead04bccea1432ff5ddbe81728aa47431,2024-01-12T12:15:45.110000
|
||||
@ -219551,7 +219551,7 @@ CVE-2023-2629,0,0,21397e525ac41df26b8c18bc0045d1b7263f8621bfadf0b1224b0c2fbfedb9
|
||||
CVE-2023-26290,0,0,b45b134fbb8059d4d4a1ebae8fcfa511a842f92cfbbd7470a968c4d99358ab04,2023-11-07T04:09:33.393000
|
||||
CVE-2023-26291,0,0,06cc66dbb2bc40c140a9d706389f20fb4cb58bd9ff5dd353e4433818c6edbc38,2023-11-07T04:09:33.470000
|
||||
CVE-2023-26292,0,0,6b6a08faca6011f65bd54a771eac398f442833e03384acc6e7bddbe0e1b409c1,2023-11-07T04:09:33.547000
|
||||
CVE-2023-26293,0,1,10ed6049b197b4081e362a20e4edecaffca5f5eb8f26627f0110e2d6ae638156,2024-08-13T08:15:05.880000
|
||||
CVE-2023-26293,0,0,10ed6049b197b4081e362a20e4edecaffca5f5eb8f26627f0110e2d6ae638156,2024-08-13T08:15:05.880000
|
||||
CVE-2023-26294,0,0,e1c003d89d6db5b0f3e03a2c8162e2cc504399d8e80fb184d565d393352ecd42,2023-06-16T18:48:22.633000
|
||||
CVE-2023-26295,0,0,f04dfda8467c2311140c5490a6147562bfccf02c6808128b029721bd51c00d2c,2023-06-20T19:49:05.647000
|
||||
CVE-2023-26296,0,0,92b400319439208ff67eea4ac1d130d48a5e4b5eb1567aea02b1dbcf32e6a990,2023-06-20T19:48:53.800000
|
||||
@ -228856,17 +228856,17 @@ CVE-2023-38519,0,0,6feaff72ade735a2704fe8b8d9fef165f38317b422d397afb665c1d949162
|
||||
CVE-2023-3852,0,0,2e1924f99097894c16104baab278a5a9ebf2db30430b465cf669815f850b7012,2024-05-17T02:27:53.627000
|
||||
CVE-2023-38520,0,0,197a50cf0e44468d0337f27c399e1eb786a843546ac6c93f4b96fc50b52947ed,2024-06-04T16:57:41.053000
|
||||
CVE-2023-38521,0,0,db18a9cb610e915922179831c59c7c6fe34d72db737eedb8a3400ffd344e745d,2023-09-08T06:42:06.290000
|
||||
CVE-2023-38522,0,1,3705cb7abacfca0d330b8bf15cb363bf3ff75592fdecba113317ee3087bef4c7,2024-08-13T09:15:04.310000
|
||||
CVE-2023-38522,0,0,3705cb7abacfca0d330b8bf15cb363bf3ff75592fdecba113317ee3087bef4c7,2024-08-13T09:15:04.310000
|
||||
CVE-2023-38523,0,0,4aeddda5cda4b987f05bc442064079c7a51cd36ed6a7d399ee18b0f7f42fa30b,2023-08-01T15:24:35.470000
|
||||
CVE-2023-38524,0,0,c9e82639b2360f7e976dd3c089d1e601c218712b31ea68380c38a40a316e9b16,2024-06-11T12:15:10.860000
|
||||
CVE-2023-38525,0,0,a4b40a45af79e11e4c16594d15803bcacdf8a6cc50b68a023dfce812a89911bf,2024-06-11T12:15:11.073000
|
||||
CVE-2023-38526,0,0,5c1b7c780b6ac94326eca1359e72390c8acae17eb185ba53be64dc13bb8d2f48,2024-06-11T12:15:11.213000
|
||||
CVE-2023-38527,0,1,bc1db887124c7f9708bbeb42c797729ab4a02bda89b6004c3e1eb19bd6310f4e,2024-08-13T08:15:06.110000
|
||||
CVE-2023-38527,0,0,bc1db887124c7f9708bbeb42c797729ab4a02bda89b6004c3e1eb19bd6310f4e,2024-08-13T08:15:06.110000
|
||||
CVE-2023-38528,0,0,ecef100a8025d9e21349c7141a0f1437d6a269ac3c505cd935121d3166959698,2024-06-11T12:15:11.500000
|
||||
CVE-2023-38529,0,1,196f9e17e9512b17adbc0e97b216938a72092e0f36c413cc7fdfef87ddd308c0,2024-08-13T08:15:06.310000
|
||||
CVE-2023-38529,0,0,196f9e17e9512b17adbc0e97b216938a72092e0f36c413cc7fdfef87ddd308c0,2024-08-13T08:15:06.310000
|
||||
CVE-2023-3853,0,0,122bf89d59764340de7782babfbd508593fee48979cc152d1ef2930b153133be,2024-05-17T02:27:53.740000
|
||||
CVE-2023-38530,0,0,6072192cedd4af889097aa33d0b65fb33aed0c4d5231786be68fa212782c35b8,2024-06-11T12:15:11.777000
|
||||
CVE-2023-38531,0,1,a33fc6a54c5564cdb0aaca3d3d4510d19dd0972300a86b75a4bf042cebe110dc,2024-08-13T08:15:06.457000
|
||||
CVE-2023-38531,0,0,a33fc6a54c5564cdb0aaca3d3d4510d19dd0972300a86b75a4bf042cebe110dc,2024-08-13T08:15:06.457000
|
||||
CVE-2023-38532,0,0,523600b2a5028799263d298578c45fbee089e386d5a006abf211c6d0746e4b89,2024-06-11T12:15:12.053000
|
||||
CVE-2023-38533,0,0,08104e07a00f54f81d588c890fadfea850ee2ddb32235187b01cc48bd44be939,2024-06-11T13:54:12.057000
|
||||
CVE-2023-38534,0,0,faa4dbd5a129861ba727722b7a204dbec0cc464a8563ca6b84ca79b2877cdfa5,2024-03-14T12:52:16.723000
|
||||
@ -233163,13 +233163,13 @@ CVE-2023-44311,0,0,9f636032c75ac4719bb65806f83757bdf9682aff3f1b2894f2cbe3ab5b109
|
||||
CVE-2023-44312,0,0,b55f0bed5b32fb9a10fa80dd795e2a2db26a169b62814fff44ce562370ac3d2a,2024-02-08T17:08:11.110000
|
||||
CVE-2023-44313,0,0,788473dd20e15d46c26fea0a15a6b80abab92e76b77692224f7f5c1f6f19eb2b,2024-02-08T17:13:28.083000
|
||||
CVE-2023-44315,0,0,989ee8dd510367f8ebba5e7cf28e331f132b578d9ff891d305f14cbf78005dc7,2024-07-09T12:15:09.857000
|
||||
CVE-2023-44317,0,1,5b40f3b137944ee7309810dc95cd6d4561ca4a6369ab8f1b610de660d4d5af0a,2024-08-13T08:15:06.607000
|
||||
CVE-2023-44317,0,0,5b40f3b137944ee7309810dc95cd6d4561ca4a6369ab8f1b610de660d4d5af0a,2024-08-13T08:15:06.607000
|
||||
CVE-2023-44318,0,0,341d3d7b5d255dfa45a58efd8e36917c2d894512ced069601d4078d3de342de5,2024-06-11T09:15:14.333000
|
||||
CVE-2023-44319,0,1,f1034bb4c3cfa156461340b46c9ac77771e8f34bb839833cb765da35f2c64cf9,2024-08-13T08:15:07.073000
|
||||
CVE-2023-44319,0,0,f1034bb4c3cfa156461340b46c9ac77771e8f34bb839833cb765da35f2c64cf9,2024-08-13T08:15:07.073000
|
||||
CVE-2023-4432,0,0,51ff4ba9dfac44079fda611bd0d9b919e7063984434f59354de6e0beba3ce6e3,2023-08-23T16:58:29.763000
|
||||
CVE-2023-44320,0,1,6344f9126342aa35fddb910bc60595b9532030a76bd0ffdb7a12da43fa45332e,2024-08-13T08:15:07.287000
|
||||
CVE-2023-44321,0,1,4d96c3edcd86c04f8abee4e92403b97d81a1c6794e81f7b6e407b7f611741095,2024-08-13T08:15:07.533000
|
||||
CVE-2023-44322,0,1,68f374f6c0b9ad2f427fc2e63de583c593c2eb890681d350c1db40e225e7d171,2024-08-13T08:15:07.770000
|
||||
CVE-2023-44320,0,0,6344f9126342aa35fddb910bc60595b9532030a76bd0ffdb7a12da43fa45332e,2024-08-13T08:15:07.287000
|
||||
CVE-2023-44321,0,0,4d96c3edcd86c04f8abee4e92403b97d81a1c6794e81f7b6e407b7f611741095,2024-08-13T08:15:07.533000
|
||||
CVE-2023-44322,0,0,68f374f6c0b9ad2f427fc2e63de583c593c2eb890681d350c1db40e225e7d171,2024-08-13T08:15:07.770000
|
||||
CVE-2023-44323,0,0,ff7a9922bdf6aa8039277a81ef2b9c6d30bece716d751d01a8b5f0e2e31e9add,2023-11-08T00:23:53.110000
|
||||
CVE-2023-44324,0,0,3faf2d9f8507ba59dbb4d74e2c7ec76f2ac9734c35d28ed63f184027d317a1ed,2024-03-15T10:15:07.113000
|
||||
CVE-2023-44325,0,0,4a9167d4b6576a59a7ad78436610e1cb61d6cc273b43ad752f5396b11d83fe6a,2023-11-22T17:44:29.977000
|
||||
@ -233218,8 +233218,8 @@ CVE-2023-44367,0,0,b2fa876e2c5c15f1395c9e41b01f1feb1719988292d1815b87ad4714f259d
|
||||
CVE-2023-4437,0,0,df0a9da3302d6af0df861f09577d9469303f893542a9e5ce64396ce50e5aa37d,2024-05-17T02:31:33.640000
|
||||
CVE-2023-44371,0,0,bcac815259e9d0d227b6d57ce65befcbec474b70d67e89fe586add9b777aa421,2023-11-22T16:58:39.573000
|
||||
CVE-2023-44372,0,0,eb6ed7074e4d7482b32cad1947a98bab6eedf35acd3f76700b52a63bd165fe2b,2024-02-23T19:15:08.467000
|
||||
CVE-2023-44373,0,1,679e0f962cd10fe14e819ad59b51216c7708bba227ed36e648b8743542ab3d31,2024-08-13T08:15:08.033000
|
||||
CVE-2023-44374,0,1,b430949d488bb1a5130f412c5e0ae44503ab5e89484424fe561aaa673c3bb077,2024-08-13T08:15:08.297000
|
||||
CVE-2023-44373,0,0,679e0f962cd10fe14e819ad59b51216c7708bba227ed36e648b8743542ab3d31,2024-08-13T08:15:08.033000
|
||||
CVE-2023-44374,0,0,b430949d488bb1a5130f412c5e0ae44503ab5e89484424fe561aaa673c3bb077,2024-08-13T08:15:08.297000
|
||||
CVE-2023-44375,0,0,48b5cc51553000a2cfa67cea7f8a951d3659b6e093f2df35e76499db8afb9eef,2024-01-02T19:15:10.480000
|
||||
CVE-2023-44376,0,0,03f27121c4f8ffca1841f5abcc6f000d7525e270077c8b212bbafd4e41d1bb9e,2024-01-02T19:15:10.550000
|
||||
CVE-2023-44377,0,0,960eac8de781cbaac5ac605f1641529954ab7d1adeca62e37948b52710054780,2024-01-02T19:15:10.630000
|
||||
@ -234404,12 +234404,12 @@ CVE-2023-46277,0,0,a6fa4dbc780bfb3b6a6202bb0e83283f9b99e7e1a7b8f1ed53b4a92f0140d
|
||||
CVE-2023-46278,0,0,283a5f4d3b1f995039a2ae4f0ff4efe94da460721819375532b8f8104a5b1ff6,2023-11-08T23:22:08.177000
|
||||
CVE-2023-46279,0,0,cad5cbf92c67be5e79c0f7d5a9fbe732104c543f1cf9a464893a67bc498495cf,2023-12-19T17:40:49.427000
|
||||
CVE-2023-4628,0,0,9dd80f318e00bb6d35ea5e4f6175e104ad476846cbe758532913d6d17d532560,2024-03-12T12:40:13.500000
|
||||
CVE-2023-46280,0,1,cca9a4196b97bf87f929801fc57b778ce5bfa52e126f588c4e6fc746ec0bcff9,2024-08-13T08:15:08.500000
|
||||
CVE-2023-46281,0,1,9678d340eb8e8c3621a2295da0b683b5e535db74f413ed14e49bcf7e35065612,2024-08-13T08:15:08.660000
|
||||
CVE-2023-46282,0,1,714753b6e8e7ef185c481709b11ed97b39e6fe8519123ef990d1a58187414101,2024-08-13T08:15:08.813000
|
||||
CVE-2023-46283,0,1,bab6b2fd315ce2915b2ec49714854fb8bb67b39c2fc95b271f118cc3bddfba55,2024-08-13T08:15:08.950000
|
||||
CVE-2023-46284,0,1,ade280cffed44a7b9421e4fbda9724a436bd200e40758e77ae5e4208b337c9fc,2024-08-13T08:15:09.073000
|
||||
CVE-2023-46285,0,1,d188afff2af593d8f56e8e14ecfe1ee22fbe460fb35b399bc88e5907a79028e3,2024-08-13T08:15:09.193000
|
||||
CVE-2023-46280,0,0,cca9a4196b97bf87f929801fc57b778ce5bfa52e126f588c4e6fc746ec0bcff9,2024-08-13T08:15:08.500000
|
||||
CVE-2023-46281,0,0,9678d340eb8e8c3621a2295da0b683b5e535db74f413ed14e49bcf7e35065612,2024-08-13T08:15:08.660000
|
||||
CVE-2023-46282,0,0,714753b6e8e7ef185c481709b11ed97b39e6fe8519123ef990d1a58187414101,2024-08-13T08:15:08.813000
|
||||
CVE-2023-46283,0,0,bab6b2fd315ce2915b2ec49714854fb8bb67b39c2fc95b271f118cc3bddfba55,2024-08-13T08:15:08.950000
|
||||
CVE-2023-46284,0,0,ade280cffed44a7b9421e4fbda9724a436bd200e40758e77ae5e4208b337c9fc,2024-08-13T08:15:09.073000
|
||||
CVE-2023-46285,0,0,d188afff2af593d8f56e8e14ecfe1ee22fbe460fb35b399bc88e5907a79028e3,2024-08-13T08:15:09.193000
|
||||
CVE-2023-46287,0,0,85a909e3e554790149fd7a7bdc6ee45250511abf7ba5aad16e27d821e125bedd,2023-10-26T17:05:56.627000
|
||||
CVE-2023-46288,0,0,4e7c3d0f2a47c2cdb963e20693070bcb74b570c31f4c02925a81ed68bcc5f5b3,2024-05-01T18:15:10.563000
|
||||
CVE-2023-46289,0,0,b718fe11c7d9982447dba29076a54dbfa45cb0ef9825d49911b46533095026f6,2023-11-07T18:18:35.950000
|
||||
@ -236844,8 +236844,8 @@ CVE-2023-49688,0,0,a5f89d12b475893ebdb5550737c740d16805195ddd6399e3298925ef8f7a2
|
||||
CVE-2023-49689,0,0,195f004e514ebf379352087458a884e8450a7f773f64f87ef67d530bdf029e9f,2023-12-27T20:49:07.780000
|
||||
CVE-2023-4969,0,0,744bd0cd4763140fc38006881ac562f2cd1b870d1a88ba37251cbcfb0871089f,2024-01-23T16:56:25.943000
|
||||
CVE-2023-49690,0,0,999d02d01749b1b180865fd3573e2f572ecd04362da35ff492a3993eaef81495,2024-01-02T20:15:09.933000
|
||||
CVE-2023-49691,0,1,81013496a54ef0925524e74c4cfc8c9f041b36788804904c1161857af42f123d,2024-08-13T08:15:09.340000
|
||||
CVE-2023-49692,0,1,ed086762f7f32a4984a92deca01d74ba16600237d85b2ee8f1ef8417a630367e,2024-08-13T08:15:09.553000
|
||||
CVE-2023-49691,0,0,81013496a54ef0925524e74c4cfc8c9f041b36788804904c1161857af42f123d,2024-08-13T08:15:09.340000
|
||||
CVE-2023-49692,0,0,ed086762f7f32a4984a92deca01d74ba16600237d85b2ee8f1ef8417a630367e,2024-08-13T08:15:09.553000
|
||||
CVE-2023-49693,0,0,89e556c9027decf6a274154cf28fa56775d660d6bb79978a3c9d9cb9d88a7524,2023-12-05T01:54:46.047000
|
||||
CVE-2023-49694,0,0,d9890a558360fe6a8f62af5449bc61d293e813ded45dbac9797405356821f396,2023-12-05T01:54:34.097000
|
||||
CVE-2023-49695,0,0,31cc92b76e39c54f94cdc6f7d8f4c1294f30378e3c140ae3131399183ab25363,2023-12-15T14:17:40.347000
|
||||
@ -244498,6 +244498,7 @@ CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173
|
||||
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
|
||||
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-22588,0,0,8bc5ffa2d82b0a2b5c7a4f7b05618c8edfe047109115070d834077f2cb63d9ca,2024-05-24T18:09:20.027000
|
||||
CVE-2024-2259,1,1,15adf35e0c6d85c21b473bd460e2aecbc546c19b814b5006f1c6be3d89693bbd,2024-08-13T11:15:15.013000
|
||||
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
|
||||
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
|
||||
CVE-2024-22592,0,0,268d0bb3e8d404d0087cf60d681467b452c81f0d7e52d485caa72c08138c2725,2024-01-20T18:49:41.750000
|
||||
@ -246875,9 +246876,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c
|
||||
CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000
|
||||
CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000
|
||||
CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26275,0,1,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000
|
||||
CVE-2024-26276,0,1,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000
|
||||
CVE-2024-26277,0,1,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000
|
||||
CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000
|
||||
CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000
|
||||
CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000
|
||||
CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab446,2024-07-19T18:53:12.727000
|
||||
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
||||
CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000
|
||||
@ -251354,9 +251355,9 @@ CVE-2024-32631,0,0,976960b3233145908ee4314174d96ae9dd1a5e40ad826957114103ac5674a
|
||||
CVE-2024-32632,0,0,e6384cc01582683119468e9848b671ebc539dd7dee05a03deb8d8f1b4d1f1993,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32633,0,0,19ad52f194d80eee7b9d476fc9a522e9cbf796c6004e91d4a96a91a259fcc742,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32634,0,0,43d388a83adeabeb1237fa331a2d12cfa391871d0a62537b40c518c9137c3766,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32635,0,1,394f2dd78385a39fe36e689d1af678bb5668148ab15de0a78a0573a4958a9c59,2024-08-13T08:15:10.120000
|
||||
CVE-2024-32636,0,1,ca36f8bffc29e00003438b022f666beafdd48df654150275974796d436bb0010,2024-08-13T08:15:10.260000
|
||||
CVE-2024-32637,0,1,ab31d0941abce293673c4b03fef248c906f30d3fbc8d1798d0a78de4928ecf8b,2024-08-13T08:15:10.400000
|
||||
CVE-2024-32635,0,0,394f2dd78385a39fe36e689d1af678bb5668148ab15de0a78a0573a4958a9c59,2024-08-13T08:15:10.120000
|
||||
CVE-2024-32636,0,0,ca36f8bffc29e00003438b022f666beafdd48df654150275974796d436bb0010,2024-08-13T08:15:10.260000
|
||||
CVE-2024-32637,0,0,ab31d0941abce293673c4b03fef248c906f30d3fbc8d1798d0a78de4928ecf8b,2024-08-13T08:15:10.400000
|
||||
CVE-2024-32638,0,0,64e69b6286f832bc6f0cd7c0b6e78e47c45f311d06cafdc54ce151131c91d6d4,2024-07-03T01:56:53.103000
|
||||
CVE-2024-32639,0,0,232ef605e4b2372003eb65a59a12a61d9eff09ea7045b736b7381401f755e0b9,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3264,0,0,4fd9bc9e99380154396f065d7cf7d8392313fe896c9d71fccf19b4661e489df6,2024-06-24T19:26:47.037000
|
||||
@ -252980,7 +252981,7 @@ CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec12
|
||||
CVE-2024-35155,0,0,371571e1aae62a09e601d6099b5578266a4a707997394118a0b1e39997d5568b,2024-08-01T17:56:03.997000
|
||||
CVE-2024-35156,0,0,7c4915a6e4fe8b0271ff6d9725c9fe229558124031a1900b31f29119291d2b8c,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000
|
||||
CVE-2024-35161,0,1,6aea9c3989d886688e1b7e99fb5bea03a80c08fc501d3b5e12f47ed8f4b07628,2024-08-13T09:15:04.610000
|
||||
CVE-2024-35161,0,0,6aea9c3989d886688e1b7e99fb5bea03a80c08fc501d3b5e12f47ed8f4b07628,2024-08-13T09:15:04.610000
|
||||
CVE-2024-35162,0,0,e2e13ef2eb30c7b92e657f4b1e361b879f73f57d79701db01dafa5276f6f5a54,2024-08-12T16:35:03.640000
|
||||
CVE-2024-35165,0,0,a5a2ced0aefc202025ce7b223ffafe3ffc4109906dfd07a5a8a0577e3f72ac5b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35166,0,0,288535809aded0d0429463b3203e908304fa856ed04133053a9493366e89b509,2024-05-14T16:11:39.510000
|
||||
@ -253917,7 +253918,7 @@ CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b
|
||||
CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
|
||||
CVE-2024-36396,0,0,6296e5e5abad58fd92610447f6d594c40593fdd339b1a18f1de671640ea0ec15,2024-08-07T17:40:12.830000
|
||||
CVE-2024-36397,0,0,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
|
||||
CVE-2024-36398,1,1,5d0cf40180b275ae9fc57b4f7335602bd00cc9b2981a75922b6f11b82d4a648d,2024-08-13T08:15:10.540000
|
||||
CVE-2024-36398,0,0,5d0cf40180b275ae9fc57b4f7335602bd00cc9b2981a75922b6f11b82d4a648d,2024-08-13T08:15:10.540000
|
||||
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3640,0,0,634a3a61b60e4b6447ed9849adb2e8bddc05031ce5f2169a17d54b538992fc1b,2024-05-17T18:36:31.297000
|
||||
CVE-2024-36400,0,0,47a38d468bfeafda14a4695dfbafb860220a66750f81a96f50551b5447b95aa6,2024-06-10T19:39:21.660000
|
||||
@ -254843,6 +254844,7 @@ CVE-2024-37930,0,0,b47abc968f9ae33d4c1793c2ea75018720d800e5bffc0a66cb656a6f077d6
|
||||
CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37933,0,0,89aadc1bfbd864beebf6ce61583dd3e0e43426698e502bc5c6a9b9f602b29135,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37934,0,0,20d80f75e222e93cd8bf312483db42a7dd2efce13206dab8e3080dada5a4be9e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37935,1,1,84520f22aba8be04176d553ba457c0dc966585e470bbd16dc4547255c511b730,2024-08-13T10:15:04.883000
|
||||
CVE-2024-37936,0,0,70e5dbee812b290ecca86e6d5cbebf144efe57fbc385415862eb03c9a3bb1e50,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37938,0,0,7b3a6d6420f31bf37b355b942f855aefd8f1648c6acabb976e80a1736b113df5,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37939,0,0,1e975f14d60abc3972d891d3881ac6dad4a79e9e4d07ca7d20f27c798e79422a,2024-07-12T16:34:58.687000
|
||||
@ -255319,6 +255321,7 @@ CVE-2024-38684,0,0,de2604bb564cc434d07df81940a8260c4b3d699e13c5c4b0afa4745c84869
|
||||
CVE-2024-38685,0,0,59bac4b8404d77f8fc1c0cdc9fe4021b8e96d3d207cf1a68dc260c160fc894d5,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38686,0,0,ca8f4f25ca8d3ba06f67bdacb6029bd19890f07767fdf9ef77f98e4bafb70469,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38687,0,0,f0cff34686afd44d154a8ccd7570e1d62449845a805d2513aece2d14a15ffa23,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38688,1,1,662760f8860e2c95b4b038ede2384abfbe10dfa5a91ef92e8ef905201804add2,2024-08-13T10:15:06.677000
|
||||
CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000
|
||||
CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000
|
||||
CVE-2024-38692,0,0,fc33d68523c1b621e2e40da51c2b133dfc056e5efe69c93d78ca937f5e04fb48,2024-07-22T13:00:31.330000
|
||||
@ -255326,6 +255329,7 @@ CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa0
|
||||
CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38698,0,0,1edde839f5f793082457812b7b588da594d6a461cdc498477c0986a7fe004fb1,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38699,1,1,cff9fe08bf269bbc7719a8127e50acc5ff2dcb1af2a8293d42359daf7d454df8,2024-08-13T11:15:15.257000
|
||||
CVE-2024-3870,0,0,0a94fe58f68a2a55a9a615e303c503c3189a8068ab169c2fe45504536e49912a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38700,0,0,5e4bd50c4e7369161e2cd3ff2af0ba7e11eedddf0da3736808759ae69637e2f7,2024-07-12T16:34:58.687000
|
||||
CVE-2024-38701,0,0,b514886e191b9c90792a71620990b9cd4dface8ab97ed8527ed77f16347cfe3e,2024-07-22T13:00:31.330000
|
||||
@ -255348,6 +255352,7 @@ CVE-2024-3872,0,0,e0746b0ccf3c2bc5c1cf6b271b7bc58e10aa7c45ec1e77f360e4d291ead633
|
||||
CVE-2024-38720,0,0,f9b8c8ed2efe93225496b04ed9fba739cb8ba9d99b25a127d2bb4233a5d4753d,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38722,0,0,ac4063575d52a48f994e5dc466d71dd1e5a91f3a1145c47a0fe2a10e4850fe33,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38723,0,0,c163e156ec3ebbc80fa4644640c2ef22e9b0f04e4301b0d8bf8152e210ebd688,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38724,1,1,c878a61815cc59b834feeeae846f61758676e8b15e8f827d649c7592606eaec0,2024-08-13T11:15:15.500000
|
||||
CVE-2024-38725,0,0,7ebdb10d062cd40a3fc7776e923871f38820bab7217d8965a48109a6cbce5191,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38728,0,0,6f2a2ec6a9158917795eaaf8412abd254d72d505e1d76ed823aaaaa26c24c1f5,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3873,0,0,9f41cb948a87fde9385789dcbf920beb2d5b41b44037ffd26229becab16e904c,2024-05-17T02:40:09.627000
|
||||
@ -255359,14 +255364,20 @@ CVE-2024-38738,0,0,bc587636026bafbf557ab7ba8ec07e058c1701d82e90dc0010a07705f8e61
|
||||
CVE-2024-38739,0,0,e943ba897b18a5e605971ababc29ec37d438434e3cdbca441e7fccf03f6560b8,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3874,0,0,f386620c295e4adf2d0e1bcb131bf4999519006b93485a0a9655b1dc65db42b9,2024-06-04T19:20:25.697000
|
||||
CVE-2024-38741,0,0,ba8ea7a8f0396a64e75e460984ae328b0142ace4ad761010bd9470b3238b8238,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38742,1,1,2bdba511138d7960ad67673c056b495edf411da05d94274862f024f86ae29064,2024-08-13T11:15:15.737000
|
||||
CVE-2024-38746,0,0,988faa32e10f00cdfc73197d6a4b5a9effdd55c479491e986d878e425b43dc75,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38747,1,1,31a36ce57ae3dfff44ba2549c0629d8018b713f8884b3d9558b95d4a82f993d7,2024-08-13T11:15:15.967000
|
||||
CVE-2024-38749,1,1,61c5dd6bb213a165ff36d08b754f95b39a02c3fb9df932eac1ff1780d5579c32,2024-08-13T11:15:16.193000
|
||||
CVE-2024-3875,0,0,089beeefeb959936719f61ddb82cb79408bd763795142eb9b4bb9ae3be3050ea,2024-06-04T19:20:25.807000
|
||||
CVE-2024-38750,0,0,222ab97d7171c5f5aa490a3c05e43069eeeb208df63406b1a04c82e08ae0bf5a,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38752,1,1,5469a5bb10fb14337332f3e689939f7c21690ee1f66c8772fe821f1f03355889,2024-08-13T11:15:16.417000
|
||||
CVE-2024-38755,0,0,c1eb4fbc941f067570b6df47700dceae56b94124f3422699ef8660741d53e6d7,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38756,1,1,810b620264af9b0ec9bfd5681b87c3f95d7aaf90f60c13bf27ac9eb94950fc38,2024-08-13T11:15:16.637000
|
||||
CVE-2024-38757,0,0,421e25aafaa8f24ca203f7704697e053a3b4c9c58e7bb7a0a06fc6226027ccb1,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38758,0,0,01ca07e85b1f1438d40acc21dae8bc4e8a4e622d1f60d60a02b659505eb185f9,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38759,0,0,b9fa7ce22eebb94e2617e669160f4e670eabfdcde229d0ec6de28ef0c8571a32,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000
|
||||
CVE-2024-38760,1,1,9850b80bd46db3a1e354504d874cc9379517b548d996a2c27bc837ab9a87c089,2024-08-13T11:15:16.867000
|
||||
CVE-2024-38761,0,0,163d643979adbf8920122e6726130a646970ec33787f98daf4f56c619ee9308f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38768,0,0,95304e2a98b024fab4e11f928777fafec4b510f27612acafcf61c70a99635beb,2024-08-02T12:59:43.990000
|
||||
@ -255383,6 +255394,7 @@ CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61
|
||||
CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
|
||||
CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
|
||||
CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
|
||||
CVE-2024-38787,1,1,4f37d0f0926f79a50a53a09f4436e54e731260fc7e4cfd214ce54dffeb9cc61d,2024-08-13T11:15:17.080000
|
||||
CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000
|
||||
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
|
||||
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
|
||||
@ -255394,7 +255406,7 @@ CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045f
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,0,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38867,0,1,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
|
||||
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
|
||||
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
|
||||
CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000
|
||||
CVE-2024-38871,0,0,7b8770d00947c719a3dd8fe17f4a1ff79757e750998a4996ef9fa64a87345086,2024-07-29T14:12:08.783000
|
||||
@ -255402,10 +255414,10 @@ CVE-2024-38872,0,0,dbf8cb370f3281d99398aef0cb2a514c7e42473174f976e3fef6fdbb067cc
|
||||
CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000
|
||||
CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
|
||||
CVE-2024-38876,0,1,ccd04c79533857063dcbf06cadc74557c79dc3e8ac98350df230d0b06b3c2732,2024-08-13T08:15:10.983000
|
||||
CVE-2024-38877,0,1,92a669ce00e3184d9acc95ecff13efbf4424a0a44bf529ff5b71996f6ef415fe,2024-08-13T08:15:11.140000
|
||||
CVE-2024-38878,0,1,e0cbe6db69126882fd9868bf050190fc5744969b032ce63732f277d3640cafa0,2024-08-13T08:15:11.293000
|
||||
CVE-2024-38879,0,1,061dfba5bc87f3ac7f768a7008b32952fc11607dc48e866352cf259904b8fcd2,2024-08-13T08:15:11.433000
|
||||
CVE-2024-38876,0,0,ccd04c79533857063dcbf06cadc74557c79dc3e8ac98350df230d0b06b3c2732,2024-08-13T08:15:10.983000
|
||||
CVE-2024-38877,0,0,92a669ce00e3184d9acc95ecff13efbf4424a0a44bf529ff5b71996f6ef415fe,2024-08-13T08:15:11.140000
|
||||
CVE-2024-38878,0,0,e0cbe6db69126882fd9868bf050190fc5744969b032ce63732f277d3640cafa0,2024-08-13T08:15:11.293000
|
||||
CVE-2024-38879,0,0,061dfba5bc87f3ac7f768a7008b32952fc11607dc48e866352cf259904b8fcd2,2024-08-13T08:15:11.433000
|
||||
CVE-2024-3888,0,0,bc342da7901e0094f72065e6dd2aedad38420d6e9d380693e035c77fa5fe3f90,2024-06-04T16:57:41.053000
|
||||
CVE-2024-38881,0,0,2ea60d09d0d9ff87b6dd792d394f437879631637f2111fab8651cc5ce17e3b46,2024-08-07T16:15:44.930000
|
||||
CVE-2024-38882,0,0,ea1448ebae28393db0b7622f2675e28d74dab9b17e97c9a882ec3bbe17d057da,2024-08-07T16:15:45
|
||||
@ -255786,6 +255798,7 @@ CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c
|
||||
CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
|
||||
CVE-2024-39642,1,1,33640b588c6ebd8f6ba682c7e12476d5a0f0e6b81d3a45cb3cb63b50f3b5d28f,2024-08-13T11:15:17.307000
|
||||
CVE-2024-39643,0,0,ab690f644bd8107c9b6f111fea454f517942fa99d057356f81485b17fdbb7467,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39644,0,0,d3581da15e50573fdc66cccf372916528eaf253913bd99dd7ea69d512d0d7709,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39646,0,0,bb182e2388ee05be62a2bee46707e3cedd648df938bee18d71dc058292ae064e,2024-08-02T12:59:43.990000
|
||||
@ -255793,6 +255806,7 @@ CVE-2024-39647,0,0,6e1f994aff430711e600420bf7a77dd8b1f3e358bedde7107dd7e4563194f
|
||||
CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56ebe,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000
|
||||
CVE-2024-39651,1,1,54ee8d1a63e9dc256ec82209a98043621d16fe9da0edbd9d1a265d729289bec2,2024-08-13T11:15:17.523000
|
||||
CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
|
||||
@ -255950,7 +255964,7 @@ CVE-2024-39918,0,0,a01d13ae0b603735ac5bf07d7a2e68692283e08ddeecd7e6f7dcec848231b
|
||||
CVE-2024-39919,0,0,ef22e6bc228ea2cf3764fb5e5dab9f5aabfb0f60858f62004efb01879ab42cf0,2024-07-16T13:43:58.773000
|
||||
CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe7336d,2024-08-07T19:08:22.713000
|
||||
CVE-2024-39920,0,0,6bef49e28b0964791fd5773db4da2a4c4749e9b59fc7a5ce56343d0a0b5eb623,2024-08-05T19:35:13.550000
|
||||
CVE-2024-39922,1,1,b89333caf950da4653b2ec0f0ab30e298687f5d026ebf9185c88168411fb1bad,2024-08-13T08:15:11.567000
|
||||
CVE-2024-39922,0,0,b89333caf950da4653b2ec0f0ab30e298687f5d026ebf9185c88168411fb1bad,2024-08-13T08:15:11.567000
|
||||
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
|
||||
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
|
||||
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
|
||||
@ -256168,6 +256182,7 @@ CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f
|
||||
CVE-2024-40689,0,0,b737e3a1f88271d05934916a1e9611bb299eb972b578fcd1907e65284f8f8a13,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
|
||||
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
|
||||
CVE-2024-40697,1,1,0b0c37720deb6f0ce475f234b1ea28552c99464d8ac63c9e433dd5a0268558bc,2024-08-13T11:15:17.750000
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
|
||||
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
|
||||
@ -256689,9 +256704,9 @@ CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbc
|
||||
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41681,1,1,50c462ab13c1b85217a2ab2aa24e4694b9f475d8ddc654460954ef0e0a9753fa,2024-08-13T08:15:11.847000
|
||||
CVE-2024-41682,1,1,2b2464c3ee98c49acbd919e7f5e34e6bd802d8388f87ab25acef6b2d477bdeed,2024-08-13T08:15:12.167000
|
||||
CVE-2024-41683,1,1,9780ad11940d3f32d58091a056b090b52b11484c73d996cf91c57ff9fc50fbf6,2024-08-13T08:15:12.440000
|
||||
CVE-2024-41681,0,0,50c462ab13c1b85217a2ab2aa24e4694b9f475d8ddc654460954ef0e0a9753fa,2024-08-13T08:15:11.847000
|
||||
CVE-2024-41682,0,0,2b2464c3ee98c49acbd919e7f5e34e6bd802d8388f87ab25acef6b2d477bdeed,2024-08-13T08:15:12.167000
|
||||
CVE-2024-41683,0,0,9780ad11940d3f32d58091a056b090b52b11484c73d996cf91c57ff9fc50fbf6,2024-08-13T08:15:12.440000
|
||||
CVE-2024-41684,0,0,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
|
||||
CVE-2024-41685,0,0,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
|
||||
CVE-2024-41686,0,0,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
|
||||
@ -256733,6 +256748,7 @@ CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d30
|
||||
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
|
||||
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
|
||||
CVE-2024-41774,1,1,0e75f547d26400842a75e4fd1a76f44221c7ec2b7b6745ec83224ff915b47b5e,2024-08-13T11:15:17.973000
|
||||
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
|
||||
CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000
|
||||
@ -256776,12 +256792,12 @@ CVE-2024-41888,0,0,732035365d9dca966bbb01cf0554f084d6d5446f352b0bfbfd05d657e62c4
|
||||
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
|
||||
CVE-2024-41890,0,0,db9be7aaec3f0e305c1425d168e81c684e69b3cb2cbbd809f74a130e7ea87d73,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41903,1,1,9ec8defdeaf0474e771dced78b4e68b4ddb59cc3a8413a88a4543a10e24448b0,2024-08-13T08:15:12.717000
|
||||
CVE-2024-41904,1,1,d9d50831e94ac60e404deed7b6af874afdd1c5918cdf543c6e98305f959c46b9,2024-08-13T08:15:13.003000
|
||||
CVE-2024-41905,1,1,5c74655633f38bf188f38fb0a90f6c3ea4919cc759beef0a8a2cc40c3d74533c,2024-08-13T08:15:13.250000
|
||||
CVE-2024-41906,1,1,f3f4161f2c77c5cbaea7c1abd685df48a69f4f32b558220fb718bcaa4965e140,2024-08-13T08:15:13.560000
|
||||
CVE-2024-41907,1,1,d07be0d1be7beadc8da7999186b7159ef6079d20ea5f5345ce0c5192b04aded3,2024-08-13T08:15:13.813000
|
||||
CVE-2024-41908,1,1,3e3225b863bf687d2be1f70faa9e1698d73dbab5ab3f26e0cfe3ea3c137a2c1b,2024-08-13T08:15:14.110000
|
||||
CVE-2024-41903,0,0,9ec8defdeaf0474e771dced78b4e68b4ddb59cc3a8413a88a4543a10e24448b0,2024-08-13T08:15:12.717000
|
||||
CVE-2024-41904,0,0,d9d50831e94ac60e404deed7b6af874afdd1c5918cdf543c6e98305f959c46b9,2024-08-13T08:15:13.003000
|
||||
CVE-2024-41905,0,0,5c74655633f38bf188f38fb0a90f6c3ea4919cc759beef0a8a2cc40c3d74533c,2024-08-13T08:15:13.250000
|
||||
CVE-2024-41906,0,0,f3f4161f2c77c5cbaea7c1abd685df48a69f4f32b558220fb718bcaa4965e140,2024-08-13T08:15:13.560000
|
||||
CVE-2024-41907,0,0,d07be0d1be7beadc8da7999186b7159ef6079d20ea5f5345ce0c5192b04aded3,2024-08-13T08:15:13.813000
|
||||
CVE-2024-41908,0,0,3e3225b863bf687d2be1f70faa9e1698d73dbab5ab3f26e0cfe3ea3c137a2c1b,2024-08-13T08:15:14.110000
|
||||
CVE-2024-41909,0,0,337038a3b5c59abd8e55d975739739e11455537d62050bba02f94002d048f34d,2024-08-12T18:57:29.247000
|
||||
CVE-2024-41910,0,0,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000
|
||||
CVE-2024-41911,0,0,bcede814e75673c8612430bdf7cb23c705580c34203914afdea68119c277efad,2024-08-06T16:30:24.547000
|
||||
@ -256795,11 +256811,11 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
|
||||
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41936,0,0,3e7584de3119384718885fa91426c70960b6e9df5afd267fe806c0b221ea60dd,2024-08-12T13:41:36.517000
|
||||
CVE-2024-41938,1,1,ddfd3d26deac0162392d7581e0125c856605ef762a07dcd7ca53209e4c5caaf5,2024-08-13T08:15:14.353000
|
||||
CVE-2024-41939,1,1,debde528a56e104b5d10701cd73482901350eec4c14a18a5336b65360e5fb436,2024-08-13T08:15:14.610000
|
||||
CVE-2024-41938,0,0,ddfd3d26deac0162392d7581e0125c856605ef762a07dcd7ca53209e4c5caaf5,2024-08-13T08:15:14.353000
|
||||
CVE-2024-41939,0,0,debde528a56e104b5d10701cd73482901350eec4c14a18a5336b65360e5fb436,2024-08-13T08:15:14.610000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
CVE-2024-41940,1,1,84195dc8ecc8101f63b7d952c792fb8adea5349f5341ed8a2376ed93a70cff65,2024-08-13T08:15:14.890000
|
||||
CVE-2024-41941,1,1,8e5ac1eedf419d1b61544050c7dfd656c6038cc8de9711a933db4faf6bab3dc7,2024-08-13T08:15:15.160000
|
||||
CVE-2024-41940,0,0,84195dc8ecc8101f63b7d952c792fb8adea5349f5341ed8a2376ed93a70cff65,2024-08-13T08:15:14.890000
|
||||
CVE-2024-41941,0,0,8e5ac1eedf419d1b61544050c7dfd656c6038cc8de9711a933db4faf6bab3dc7,2024-08-13T08:15:15.160000
|
||||
CVE-2024-41942,0,0,7923ac40921d31d0296434cafefbd05115f6a6de46c0d45a5dcdea9f8a32742f,2024-08-12T15:53:27.457000
|
||||
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
|
||||
@ -256825,9 +256841,9 @@ CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9
|
||||
CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000
|
||||
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41976,1,1,387abae391577a5e677e5839f9dce7e51f3265a1dccc97da15c65b14665baf5f,2024-08-13T08:15:15.403000
|
||||
CVE-2024-41977,1,1,948be1e5f151df35485ecd695eff5c8fa6dea1d6db65e7d979e78ef001ed5616,2024-08-13T08:15:15.640000
|
||||
CVE-2024-41978,1,1,98b3f91c7b29c337e3e96ae32968a63e556d5be66a9f1f06a387848c1996c5c8,2024-08-13T08:15:15.903000
|
||||
CVE-2024-41976,0,0,387abae391577a5e677e5839f9dce7e51f3265a1dccc97da15c65b14665baf5f,2024-08-13T08:15:15.403000
|
||||
CVE-2024-41977,0,0,948be1e5f151df35485ecd695eff5c8fa6dea1d6db65e7d979e78ef001ed5616,2024-08-13T08:15:15.640000
|
||||
CVE-2024-41978,0,0,98b3f91c7b29c337e3e96ae32968a63e556d5be66a9f1f06a387848c1996c5c8,2024-08-13T08:15:15.903000
|
||||
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000
|
||||
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
||||
@ -257180,14 +257196,19 @@ CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca
|
||||
CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000
|
||||
CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43121,1,1,0248c96be5d5da6540123787b6025659ab553bea527379162d935f839950c037,2024-08-13T11:15:18.210000
|
||||
CVE-2024-43123,0,0,2e2c050e05eceebebb6764bf76439c256ea30edeaf99f7777c98dcb013d605b5,2024-08-12T23:15:16.177000
|
||||
CVE-2024-43124,0,0,159a6e3a5154401c268b9283252d7586e765ab7a3b09a609d57c59d73980ec29,2024-08-12T23:15:16.407000
|
||||
CVE-2024-43125,0,0,6f8ec68758ec079ee9729debe12e8e02714b04708086483fe3f3e1be363e8ea4,2024-08-12T23:15:16.637000
|
||||
CVE-2024-43126,0,0,740227e0fc9eabd775401b86378322641fa395c98aaa294b0e51f66d78b9c273,2024-08-12T23:15:16.863000
|
||||
CVE-2024-43127,0,0,d4f5c1b20e60840e320608c58c84e0ac666a5976f98e74b730764b8f3b2a598f,2024-08-12T23:15:17.097000
|
||||
CVE-2024-43128,1,1,72c05761a36eaa7a115d958811a8a51be4a04b1adb5bfbc6fc3adabae30b1f1b,2024-08-13T11:15:18.450000
|
||||
CVE-2024-43129,1,1,5a348f79fac0618b7021d5ae050512f2cb22c45070b938ba59a2a3a042a76dad,2024-08-13T11:15:18.687000
|
||||
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
|
||||
CVE-2024-43130,0,0,f0c894fb49048185e3da95689d302b7c2e99c7b3677710d304a8e2f1785c5edc,2024-08-12T23:15:17.320000
|
||||
CVE-2024-43131,1,1,947ab3e5d40fe306158c60305b7163ec144593f7f905ec0b0c65fa02b87ca89d,2024-08-13T11:15:18.913000
|
||||
CVE-2024-43133,0,0,2c0100fa05c934b61e5c9a46d226b379db3a64e04b2a9f1bc46b8ad6b2d21213,2024-08-12T23:15:17.560000
|
||||
CVE-2024-43135,1,1,f115696ebea6b065b3eda3c8521b7c3dc428591c0bb0564788641762fb299b47,2024-08-13T11:15:19.133000
|
||||
CVE-2024-43137,0,0,f3fc866897aede9c70e5951a4c9720e4cf044f3eeb210af260c38a29b016593e,2024-08-12T23:15:17.773000
|
||||
CVE-2024-43139,0,0,55eb0f9a37bda0bafd1339d01b07e485dfec14707f0813bce22c8fefee993094,2024-08-12T23:15:17.997000
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user