Auto-Update: 2024-09-25T14:00:17.899529+00:00

This commit is contained in:
cad-safe-bot 2024-09-25 14:03:17 +00:00
parent baa2be55c8
commit 791558267f
41 changed files with 1669 additions and 200 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-1383",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-02-02T15:59:04.113",
"lastModified": "2015-02-04T05:20:19.657",
"lastModified": "2024-09-25T13:10:58.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -63,9 +63,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geo_mashup_project:geo_mashup:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:cyberhobo:geo_mashup:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.8.2",
"matchCriteriaId": "69C403D6-40BB-4B50-94BE-39488F1D83A0"
"matchCriteriaId": "F4BC455A-460F-4518-8FC7-C609C5367714"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-14071",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-16T13:29:00.397",
"lastModified": "2018-09-12T19:06:15.137",
"lastModified": "2024-09-25T13:10:58.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geo_mashup_project:geo_mashup:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:cyberhobo:geo_mashup:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.10.4",
"matchCriteriaId": "BF48E8F7-B887-4AF7-AFE5-B276E65A7725"
"matchCriteriaId": "CEE4754C-5FAB-4490-BA1C-120C2C87F2B1"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26570",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:25.337",
"lastModified": "2023-10-28T03:20:26.277",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:03.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26571",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:25.397",
"lastModified": "2023-10-28T03:20:31.930",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:03.693",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26573",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:25.513",
"lastModified": "2023-10-28T03:22:35.543",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:03.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26574",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:25.577",
"lastModified": "2023-10-28T03:22:50.603",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:03.890",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26575",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:25.650",
"lastModified": "2023-10-28T03:22:26.930",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:03.983",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26576",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:25.720",
"lastModified": "2023-10-28T03:22:20.050",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27256",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.353",
"lastModified": "2023-10-28T03:23:01.543",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27257",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.410",
"lastModified": "2023-10-28T03:19:47.833",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27258",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.470",
"lastModified": "2023-10-28T03:19:57.333",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.347",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27259",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.527",
"lastModified": "2023-10-28T03:20:02.377",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27261",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.657",
"lastModified": "2023-10-28T03:23:33.637",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27375",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.773",
"lastModified": "2023-10-28T03:23:15.667",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27376",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.837",
"lastModified": "2023-10-28T03:23:11.250",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27377",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-25T18:17:26.897",
"lastModified": "2023-10-28T03:23:47.653",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.797",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28324",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-07-01T00:15:10.103",
"lastModified": "2023-07-10T17:46:59.287",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T13:35:00.443",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41311",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-09-27T15:19:29.137",
"lastModified": "2023-09-28T15:56:31.800",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T13:35:01.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4393",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2023-10-30T00:15:39.237",
"lastModified": "2023-11-08T20:56:59.690",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T12:15:04.887",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -80,11 +80,11 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-116"
},
{
"lang": "en",
"value": "CWE-74"
"value": "CWE-147"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40856",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.490",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:43:40.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,96 @@
"value": "Se solucion\u00f3 un problema de integridad con Beacon Protection. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, tvOS 18 y macOS Sequoia 15. Un atacante podr\u00eda forzar a un dispositivo a desconectarse de una red segura."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0",
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121248",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40857",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.537",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:41:41.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,144 @@
"value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18, iPadOS 18 y tvOS 18. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un ataque de cross site scripting."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0",
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0",
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121240",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121241",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121248",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121249",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40860",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.640",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:41:05.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,76 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.7",
"matchCriteriaId": "A25F3F21-0F63-4241-8C67-50A1169FA52D"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121247",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40863",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.793",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:40:28.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,74 @@
"value": "Este problema se solucion\u00f3 con una protecci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Una aplicaci\u00f3n puede filtrar informaci\u00f3n confidencial del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43988",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:07.953",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:55:55.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digitalnature:mystique:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.5.7",
"matchCriteriaId": "0D974FC4-53BD-4F3A-990E-65243BAC70F0"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mystique/wordpress-mystique-theme-2-5-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43991",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:08.147",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:53:50.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webdzier:hotel_galaxy:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.4.24",
"matchCriteriaId": "EADF02A6-E89B-4CF3-B7E7-721E19A5A72A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hotel-galaxy/wordpress-hotel-galaxy-theme-4-4-24-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43992",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:08.343",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:47:17.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.9.91",
"matchCriteriaId": "143A1E51-6A6F-4AC3-88C5-AE8A51E7E601"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/latepoint/wordpress-latepoint-plugin-4-9-91-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43993",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:08.530",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:44:39.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cryoutcreations:liquido:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.1.2",
"matchCriteriaId": "D35FD9AD-5E75-44E8-91AD-78099B045D40"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/liquido/wordpress-liquido-theme-1-0-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44125",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:49.940",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:30:11.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,76 @@
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7 y macOS Sequoia 15. Una aplicaci\u00f3n maliciosa podr\u00eda filtrar informaci\u00f3n confidencial del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.7",
"matchCriteriaId": "A25F3F21-0F63-4241-8C67-50A1169FA52D"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121247",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44128",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:50.040",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:29:42.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,91 @@
"value": "Este problema se solucion\u00f3 agregando un mensaje adicional para el consentimiento del usuario. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que un flujo de trabajo de acci\u00f3n r\u00e1pida de Automator pueda omitir Gatekeeper."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7",
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7",
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121234",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121247",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44129",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:50.090",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:28:21.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,76 @@
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n filtre informaci\u00f3n confidencial del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7",
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121234",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44135",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:50.393",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:28:09.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,76 @@
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.7 y macOS Sequoia 15. Una aplicaci\u00f3n puede acceder a archivos protegidos dentro de un contenedor de App Sandbox."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.7",
"matchCriteriaId": "A25F3F21-0F63-4241-8C67-50A1169FA52D"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121247",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44176",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:51.573",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:27:13.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,161 @@
"value": "Se solucion\u00f3 un problema de acceso fuera de los l\u00edmites con una verificaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7, iOS 17.7 y iPadOS 17.7, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 y iPadOS 18, macOS Sonoma 14.7 y tvOS 18. El procesamiento de una imagen puede provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7",
"matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7",
"matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7",
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7",
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0",
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121234",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121240",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121246",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121247",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121248",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121249",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44187",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:52.037",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:25:52.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,144 @@
"value": "Exist\u00eda un problema de origen cruzado con los elementos \"iframe\". Esto se solucion\u00f3 mejorando el seguimiento de los or\u00edgenes de seguridad. Este problema se solucion\u00f3 en Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18, iPadOS 18 y tvOS 18. Un sitio web malicioso puede filtrar datos de origen cruzado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0",
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0",
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121240",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121241",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121248",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121249",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44191",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:52.263",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T13:24:42.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,152 @@
"value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 17.7 y iPadOS 17.7, Xcode 16, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 y iPadOS 18, tvOS 18. Una aplicaci\u00f3n puede obtener acceso no autorizado a Bluetooth."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.0",
"matchCriteriaId": "E511C5FC-9B13-4AD5-ABBE-4DED7CD4A0DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7",
"matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7",
"matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0",
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0",
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121239",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121240",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121246",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121248",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121249",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-4657",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-25T13:15:04.110",
"lastModified": "2024-09-25T13:15:04.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Talent Software BAP Automation allows Stored XSS.This issue affects BAP Automation: before 30840."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1536",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6592",
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"published": "2024-09-25T12:15:05.027",
"lastModified": "2024-09-25T12:15:05.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00014",
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6593",
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"published": "2024-09-25T12:15:05.217",
"lastModified": "2024-09-25T12:15:05.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows allows an attacker with network access to execute restricted management commands.\nThis issue affects Authentication Gateway: through 12.10.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00015",
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6594",
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"published": "2024-09-25T12:15:05.397",
"lastModified": "2024-09-25T12:15:05.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Handling of Exceptional Conditions vulnerability in the WatchGuard Single Sign-On Client on Windows causes the client to crash while handling malformed commands. An attacker with network access to the client could create a denial of service condition for the Single Sign-On service by repeatedly issuing malformed commands.\n\nThis issue affects Single Sign-On Client: through 12.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00016",
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-8546",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T13:15:04.313",
"lastModified": "2024-09-25T13:15:04.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video widget in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/widgets/video/parts/video-button.php#L10",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3155880/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3155880/elementskit-lite/trunk/widgets/video/video.php",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/elementskit-lite/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d21aeeb6-2e7d-426e-82c5-ff65e33bc5cb?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-25T12:00:20.055507+00:00
2024-09-25T14:00:17.899529+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-25T11:15:12.730000+00:00
2024-09-25T13:55:55.460000+00:00
```
### Last Data Feed Release
@ -33,28 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263732
263737
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `5`
- [CVE-2024-31145](CVE-2024/CVE-2024-311xx/CVE-2024-31145.json) (`2024-09-25T11:15:12.133`)
- [CVE-2024-31146](CVE-2024/CVE-2024-311xx/CVE-2024-31146.json) (`2024-09-25T11:15:12.220`)
- [CVE-2024-45817](CVE-2024/CVE-2024-458xx/CVE-2024-45817.json) (`2024-09-25T11:15:12.277`)
- [CVE-2024-7479](CVE-2024/CVE-2024-74xx/CVE-2024-7479.json) (`2024-09-25T11:15:12.330`)
- [CVE-2024-7481](CVE-2024/CVE-2024-74xx/CVE-2024-7481.json) (`2024-09-25T11:15:12.553`)
- [CVE-2024-8858](CVE-2024/CVE-2024-88xx/CVE-2024-8858.json) (`2024-09-25T11:15:12.730`)
- [CVE-2024-4657](CVE-2024/CVE-2024-46xx/CVE-2024-4657.json) (`2024-09-25T13:15:04.110`)
- [CVE-2024-6592](CVE-2024/CVE-2024-65xx/CVE-2024-6592.json) (`2024-09-25T12:15:05.027`)
- [CVE-2024-6593](CVE-2024/CVE-2024-65xx/CVE-2024-6593.json) (`2024-09-25T12:15:05.217`)
- [CVE-2024-6594](CVE-2024/CVE-2024-65xx/CVE-2024-6594.json) (`2024-09-25T12:15:05.397`)
- [CVE-2024-8546](CVE-2024/CVE-2024-85xx/CVE-2024-8546.json) (`2024-09-25T13:15:04.313`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `34`
- [CVE-2022-1778](CVE-2022/CVE-2022-17xx/CVE-2022-1778.json) (`2024-09-25T11:15:11.090`)
- [CVE-2022-2277](CVE-2022/CVE-2022-22xx/CVE-2022-2277.json) (`2024-09-25T11:15:11.927`)
- [CVE-2024-9169](CVE-2024/CVE-2024-91xx/CVE-2024-9169.json) (`2024-09-25T09:15:03.380`)
- [CVE-2023-27257](CVE-2023/CVE-2023-272xx/CVE-2023-27257.json) (`2024-09-25T12:15:04.267`)
- [CVE-2023-27258](CVE-2023/CVE-2023-272xx/CVE-2023-27258.json) (`2024-09-25T12:15:04.347`)
- [CVE-2023-27259](CVE-2023/CVE-2023-272xx/CVE-2023-27259.json) (`2024-09-25T12:15:04.440`)
- [CVE-2023-27261](CVE-2023/CVE-2023-272xx/CVE-2023-27261.json) (`2024-09-25T12:15:04.520`)
- [CVE-2023-27375](CVE-2023/CVE-2023-273xx/CVE-2023-27375.json) (`2024-09-25T12:15:04.620`)
- [CVE-2023-27376](CVE-2023/CVE-2023-273xx/CVE-2023-27376.json) (`2024-09-25T12:15:04.703`)
- [CVE-2023-27377](CVE-2023/CVE-2023-273xx/CVE-2023-27377.json) (`2024-09-25T12:15:04.797`)
- [CVE-2023-28324](CVE-2023/CVE-2023-283xx/CVE-2023-28324.json) (`2024-09-25T13:35:00.443`)
- [CVE-2023-41311](CVE-2023/CVE-2023-413xx/CVE-2023-41311.json) (`2024-09-25T13:35:01.407`)
- [CVE-2023-4393](CVE-2023/CVE-2023-43xx/CVE-2023-4393.json) (`2024-09-25T12:15:04.887`)
- [CVE-2024-40856](CVE-2024/CVE-2024-408xx/CVE-2024-40856.json) (`2024-09-25T13:43:40.657`)
- [CVE-2024-40857](CVE-2024/CVE-2024-408xx/CVE-2024-40857.json) (`2024-09-25T13:41:41.843`)
- [CVE-2024-40860](CVE-2024/CVE-2024-408xx/CVE-2024-40860.json) (`2024-09-25T13:41:05.177`)
- [CVE-2024-40863](CVE-2024/CVE-2024-408xx/CVE-2024-40863.json) (`2024-09-25T13:40:28.967`)
- [CVE-2024-43988](CVE-2024/CVE-2024-439xx/CVE-2024-43988.json) (`2024-09-25T13:55:55.460`)
- [CVE-2024-43991](CVE-2024/CVE-2024-439xx/CVE-2024-43991.json) (`2024-09-25T13:53:50.107`)
- [CVE-2024-43992](CVE-2024/CVE-2024-439xx/CVE-2024-43992.json) (`2024-09-25T13:47:17.277`)
- [CVE-2024-43993](CVE-2024/CVE-2024-439xx/CVE-2024-43993.json) (`2024-09-25T13:44:39.917`)
- [CVE-2024-44125](CVE-2024/CVE-2024-441xx/CVE-2024-44125.json) (`2024-09-25T13:30:11.570`)
- [CVE-2024-44128](CVE-2024/CVE-2024-441xx/CVE-2024-44128.json) (`2024-09-25T13:29:42.343`)
- [CVE-2024-44129](CVE-2024/CVE-2024-441xx/CVE-2024-44129.json) (`2024-09-25T13:28:21.447`)
- [CVE-2024-44135](CVE-2024/CVE-2024-441xx/CVE-2024-44135.json) (`2024-09-25T13:28:09.067`)
- [CVE-2024-44176](CVE-2024/CVE-2024-441xx/CVE-2024-44176.json) (`2024-09-25T13:27:13.333`)
- [CVE-2024-44187](CVE-2024/CVE-2024-441xx/CVE-2024-44187.json) (`2024-09-25T13:25:52.043`)
- [CVE-2024-44191](CVE-2024/CVE-2024-441xx/CVE-2024-44191.json) (`2024-09-25T13:24:42.380`)
## Download and Usage

View File

@ -74913,7 +74913,7 @@ CVE-2015-1379,0,0,1b953d1ae89c6c481112b181f3d965974511a137bacd640c146d9fed522857
CVE-2015-1380,0,0,4ad7fb032dd720555eacdff92c0a6152162ca1d6e2b045abafde727628cce99e,2018-10-30T16:27:35.843000
CVE-2015-1381,0,0,1f367f9ad0221485a6817f831fe7ef1290ec7919efe893bbd9e7ab7ccaf4f3d5,2018-10-30T16:27:35.843000
CVE-2015-1382,0,0,d447253463e0b96c2ea9e8b317321c2892edbb738fc2b47a788a17b4de0da8a1,2018-10-30T16:27:35.843000
CVE-2015-1383,0,0,22ee87b67d910e9504fcd6ce33f4688e59b5f068393c73bf8e5beda7679b1afe,2015-02-04T05:20:19.657000
CVE-2015-1383,0,1,162301886a671c085e33ad34a0954037e4a0941474dca7ba6f588369e3c3134c,2024-09-25T13:10:58.457000
CVE-2015-1384,0,0,cd9b8dd636cee83624f561a5fcdefe401c750b28230944273a94bed8894e1871,2018-10-09T19:55:49.513000
CVE-2015-1385,0,0,1cb965c5ee98441680d3c1f1c7768517246a8cfe484410abdeba1ebdb7eb0ca5,2023-06-15T19:57:37.947000
CVE-2015-1386,0,0,16974db8920b7aaf9a998c51b8b141893d1526a6715c870f1289136b2fabe30a,2017-08-31T19:01:00.123000
@ -114897,7 +114897,7 @@ CVE-2018-14067,0,0,2a2d411621e57c68cb32bec00024c7d96a5b3e8780cc1a4378ff2a9dca9a0
CVE-2018-14068,0,0,73ca0c3535752c9ab01d98ea5d8042c8ed5153e006781c7c2386d3be071dd417,2018-09-10T15:00:32.600000
CVE-2018-14069,0,0,a5a916c2fd1682ab6edefb82af335e5d17cebb1dbdff86d04abe83a98816b676,2018-09-10T15:19:36.250000
CVE-2018-1407,0,0,26764cf337365d0810fd3a33ec5dd61fdeb20cc3c6e1c809e1e5d1c5f21a76a8,2019-10-09T23:38:24.913000
CVE-2018-14071,0,0,89676043e35ab071f97ba6dda83beef1221a29cf859c6b61182d760cfabb045c,2018-09-12T19:06:15.137000
CVE-2018-14071,0,1,0decc732c0d07636ab40a37a15200c60f96a8548d379962919db82a7d51049e3,2024-09-25T13:10:58.457000
CVE-2018-14072,0,0,e08434ec000b275e2e1da7580a4753d3ba8f85ca7ffd332d413a5e348218f61d,2019-10-03T00:03:26.223000
CVE-2018-14073,0,0,f7dbef298e90943523b352eb0f45996d8ba189895a2fcaf16bd65a139e9d0022,2019-10-03T00:03:26.223000
CVE-2018-14077,0,0,be39c7b2d1c2f42d10df91767af8cfb8294ae86fd410aca9d7e0d334de66bfe5,2020-08-24T17:37:01.140000
@ -189161,7 +189161,7 @@ CVE-2022-1774,0,0,bb72968dc351fc81cbc6770dbb6b410f69431145c40a6612fe00040d9473e6
CVE-2022-1775,0,0,11d3ff145b18a5433d3822918999b159882e908bcef93221ae007d64364221ed,2022-06-02T13:41:24.440000
CVE-2022-1776,0,0,45ff09ebfa9351b95dce217be52f895437f4dc058808af9def4df1f2d707f8d3,2022-07-06T18:36:53.747000
CVE-2022-1777,0,0,da12cc138ec62e8f53be839fb1e2025f503fae83d7926f36868d4e27dec446e2,2022-06-21T18:02:15.357000
CVE-2022-1778,0,1,ed4948a8469fa7931c0b8ac7a61c084ed5b7ce7da7f8a8982de5423a183302ba,2024-09-25T11:15:11.090000
CVE-2022-1778,0,0,ed4948a8469fa7931c0b8ac7a61c084ed5b7ce7da7f8a8982de5423a183302ba,2024-09-25T11:15:11.090000
CVE-2022-1779,0,0,cdb9fbac32084f1304d63cc7d0982f77dfa3fa92952bbb8a03d5afc2314a3811,2022-06-21T17:16:38.210000
CVE-2022-1780,0,0,8aef82816c3364aa8da1a6065d52f004d12980f5a99d94bd303d09ff29459f0a,2022-06-21T17:19:10.827000
CVE-2022-1781,0,0,35737d9ed29fa4df56cfcd617f1abb58ea3db6cbaa46c65d2eb71c96c52fec96,2022-06-21T17:20:34.937000
@ -192048,7 +192048,7 @@ CVE-2022-22765,0,0,223da71eef385cf824baf5782bfc0f793a53ad289f92fd859bdc084d29016
CVE-2022-22766,0,0,5d92e36149dd1bf75b820beb8f931e05ac6702d1a8d2fcf47ef8b83e7df83ca9,2022-05-11T14:59:38.777000
CVE-2022-22767,0,0,979ca06484886a2f8b1ee997a52bab84af07e5d00b130033df9ce41559ec4bc5,2022-06-11T00:53:59.060000
CVE-2022-22769,0,0,6ebde0cb7891473452986109c550748499597b0d5d5bd613d387a41b22d58e92,2022-01-26T15:30:15.380000
CVE-2022-2277,0,1,210da0cf862ae57c32f7202472236509df0a3259274d8ec5390979bd86be79f1,2024-09-25T11:15:11.927000
CVE-2022-2277,0,0,210da0cf862ae57c32f7202472236509df0a3259274d8ec5390979bd86be79f1,2024-09-25T11:15:11.927000
CVE-2022-22770,0,0,8cb61b4df56b0f1709476610617a7ceb3cb2a32d820a168a0e847d759fb3dea6,2022-02-23T20:47:45.877000
CVE-2022-22771,0,0,3bbac9c57cdd0768331a9373cd0f728e9a74d379c56e1ae62761d9c762fc4d68,2023-11-07T03:43:59.253000
CVE-2022-22772,0,0,ad137c3f591cdd5f3cab8fc7664444a0ec3334db8e085f3cd682913415378008,2022-04-07T19:26:22.550000
@ -220002,13 +220002,13 @@ CVE-2023-26567,0,0,2fdafb05923d5e9dda63087161b051ed776db5e87ba1f7f5bfb489fc31847
CVE-2023-26568,0,0,6977224c632433016d8ff2d2cb19348688d720856f15a54184e408bd244d7fb6,2023-10-28T03:20:16.467000
CVE-2023-26569,0,0,b1c8a19955ca28ef62fa087fa8ee5e319de6bb8443600fd874df9551a81f0caf,2023-10-28T03:20:20.530000
CVE-2023-2657,0,0,6bb86c6b8f97221a5a3adfae4b8836a1c6086c7469330d39586eadc2437a6979,2024-05-17T02:23:07.787000
CVE-2023-26570,0,0,985268058af4df2a5de0dbd43820c01c3d2d2152a8f395d7991b35230b4b7cd1,2023-10-28T03:20:26.277000
CVE-2023-26571,0,0,6ad7675087e078232159804d80694d014dc8c7b22ea14d122eef01cac63c681e,2023-10-28T03:20:31.930000
CVE-2023-26570,0,1,e062e418dd4e60d0b4cf3c642e7cac18b0e244ddcc351bdd312b7f2a949babe6,2024-09-25T12:15:03.550000
CVE-2023-26571,0,1,145d3254e3704347d146630b5cbea35d3f024d32b548b4a25088f6b90a9989d2,2024-09-25T12:15:03.693000
CVE-2023-26572,0,0,c838711d5ca1fe934b2a4e03300483cc4194eae1ad2a456ebcf41b09d402922d,2023-10-28T03:22:43.037000
CVE-2023-26573,0,0,01a914f4371792455febcc8174bf98bcd51aec779c56c2ca0074f0ca61d3e4e1,2023-10-28T03:22:35.543000
CVE-2023-26574,0,0,0179031543c96ae920852f26c5684c0c43fee85db82468af977566e1a399447f,2023-10-28T03:22:50.603000
CVE-2023-26575,0,0,bf6c9b9cfddb3c772bca12484c3efcbde61bca6309c9ab9d0e9e39f457fd0393,2023-10-28T03:22:26.930000
CVE-2023-26576,0,0,4c76572eff5449357691c7ddc739b83a906b752e39a31542ad7971d0566fe7ad,2023-10-28T03:22:20.050000
CVE-2023-26573,0,1,620e021ab2e2304942e3aa88633c0deb0898c915ed47fe74b5310c0f4bf465b7,2024-09-25T12:15:03.787000
CVE-2023-26574,0,1,99add887cfb1560d349baef59823dab84742049e28265b7ba9e9ffe7302cb766,2024-09-25T12:15:03.890000
CVE-2023-26575,0,1,773bffa73411451a82a68c7b90f228333cb4a2be04850f5e157b73b19a20294a,2024-09-25T12:15:03.983000
CVE-2023-26576,0,1,b6e4356178fb45cc8e4d0c09980afc7b5bfc85c28cf8478dc60cbc9b6512c719,2024-09-25T12:15:04.070000
CVE-2023-26577,0,0,e387b43db07597111e29d303d9128e385187422549d09a38938ea31e04f41f85,2023-10-28T03:22:14.633000
CVE-2023-26578,0,0,ba6419d6cd9adc08f3d9d2b1b07f4e78f6960abb31d0e4463f52347de7929d39,2023-10-28T03:22:06.693000
CVE-2023-26579,0,0,0d11d6d0470d7c1fea00625466cfa4bdfd047a078ae6785854c8528b0760a70e,2023-10-28T03:21:34.177000
@ -220375,13 +220375,13 @@ CVE-2023-27250,0,0,9a38b5d3d9104ffd11b543000f80c6f407e3c0edaf3802060491a056f2089
CVE-2023-27253,0,0,9208d75df1005d2bd5e7abb6ff00cd1294d8c7da73f06e3279890d8e23280f2b,2023-07-13T23:15:10.157000
CVE-2023-27254,0,0,41059f30436b4f8a4c052c41ad0605125a704f6391cfee8ca7e05b9c82853509,2023-10-28T03:20:53.253000
CVE-2023-27255,0,0,ac8c553e15a265f318ec023b2438a45227b1a06a8912b67f24cc5919737c478f,2023-10-28T03:22:55.287000
CVE-2023-27256,0,0,8f5b794448494ade40a75e67fcc4ac2960d26fdb7ffe1476d2270416f8c2a4a0,2023-10-28T03:23:01.543000
CVE-2023-27257,0,0,fe2b1d3edd9a911c3e0f7a2e2234f5c230e7201ce3ab724d116af175137f6347,2023-10-28T03:19:47.833000
CVE-2023-27258,0,0,99fcfba955ec1244ee0267478c560ef8a7793f8288adb2048cd9638e8f7ab69a,2023-10-28T03:19:57.333000
CVE-2023-27259,0,0,7d1c433cc856bf3dc4b3fb61013b33a1abf7f11f36edfc92cc099b9b98c7effa,2023-10-28T03:20:02.377000
CVE-2023-27256,0,1,65aa31ff10449c505609fa6dc86cd0ce71b9464d92443f742e70e56db5b8cc6f,2024-09-25T12:15:04.160000
CVE-2023-27257,0,1,dd21dff6561509ce5912a1e54a8494f7ac6d838d3edd51a6844968ba9d55300a,2024-09-25T12:15:04.267000
CVE-2023-27258,0,1,3d2cc14947fb15410b195fd019558a596fe6f41cf3fe89c69df802dc54ff70dc,2024-09-25T12:15:04.347000
CVE-2023-27259,0,1,62c6250b4c4d2c26b196bdaf9fe19261fea853d5cc27169219feee671bb62433,2024-09-25T12:15:04.440000
CVE-2023-2726,0,0,a676b363020363c4c1f0ad8a6a07b45ba0a1aa75ce1af10a307a407938214927,2023-11-25T11:15:15.500000
CVE-2023-27260,0,0,5e6bdc7d9b83cbf41fe216801b3bb189101a053484437d15f2f76068f948fce4,2023-10-28T03:20:11.070000
CVE-2023-27261,0,0,bbe1b63cda47d1d243102dd0fd751f232eedd66da7924ae0d27ab0c2e5677b4f,2023-10-28T03:23:33.637000
CVE-2023-27261,0,1,b7c595a3152e75ec79d1f521d5381ab1d36c6c1db00e2729792677404f9ed106,2024-09-25T12:15:04.520000
CVE-2023-27262,0,0,caac8ec50512eb671360f25fa34045881c38191f203fca0faa1ae5fbb8afcbf6,2023-10-28T03:23:20.260000
CVE-2023-27263,0,0,7321fe736df422d5ab6748f2b41cffe795165e7103b6523cef8ecc079ad10836,2023-11-07T04:09:53.167000
CVE-2023-27264,0,0,5012d9666f52e1d64d2e30de42d2c1ad57116ad5fa028f3ae006f653e3465e0c,2023-11-07T04:09:53.240000
@ -220489,9 +220489,9 @@ CVE-2023-27370,0,0,8a51074535677b5a5ddfb77e2d5ed90aa22f20fb837425866fcd0b638d93a
CVE-2023-27371,0,0,bc1427797625faaaa1b1c13746235a3a4dee21b87bb2c971edcaf9ba15a6b470,2023-03-31T00:15:06.447000
CVE-2023-27372,0,0,140377125b71fa708eece5718b16a779b6bc4519b4b6307b0e12f0baa25e9109,2023-06-21T18:15:12.797000
CVE-2023-27373,0,0,0c5a6e2505edc294683fadbae329757286d6d5e9667ace25401a379f6857078f,2023-08-15T14:29:28.147000
CVE-2023-27375,0,0,64a4fdc53d160459875d0ab4aa3ef8ecae11faa6a959ce2aff63a955d1135599,2023-10-28T03:23:15.667000
CVE-2023-27376,0,0,34491057d9db3ee5ddec301a0a54d6413b97cb2c7df6d0a0aa915ca7464198c6,2023-10-28T03:23:11.250000
CVE-2023-27377,0,0,4663f74df7a2c23281f6a0ddd1e1f09d9134c83b0695205af8eff89000f2bdc4,2023-10-28T03:23:47.653000
CVE-2023-27375,0,1,5d4b5b038016121cc6c3c56d10c4fe48caf0a990b127afa54730ed1590ae0c1a,2024-09-25T12:15:04.620000
CVE-2023-27376,0,1,fe181908091c98d121d69936eff1bbfb60a8170aba03ae0a6afd90c1c8ae0366,2024-09-25T12:15:04.703000
CVE-2023-27377,0,1,b89077a4f13f1b1a2d61bc944066e1bbbaaa3e23fda0850aebd072bee6454136,2024-09-25T12:15:04.797000
CVE-2023-27378,0,0,31482c383e817f9d20b7bd76da956e9bad2eb654b8fe59b6a3bd6c47ff64305d,2023-05-10T18:42:24.563000
CVE-2023-27379,0,0,10d7b013cf0d14a894592dd7963a20baf17263cd521b117e31cd210f91544e11,2023-07-26T21:01:27.943000
CVE-2023-2738,0,0,255759be26e7795447f0c9a8ed26b9b32d3fb8b8611259cfdd49e891c8f110cf,2024-05-17T02:23:13.270000
@ -221328,7 +221328,7 @@ CVE-2023-28320,0,0,5227e72069a84089f10fac1339bbb3457663967a9fe65f4cfcdbbe543fe69
CVE-2023-28321,0,0,7ab7e472a08cbfbcee1cffe766366f8afabb5fa1fb871361581640f837006d09,2023-11-07T04:10:28.670000
CVE-2023-28322,0,0,e6f8a76dbfdaa1843cff4928586c0e102202ae87109018408c12011fd0e73a40,2023-12-22T16:15:07.493000
CVE-2023-28323,0,0,45a7580f5caaf370f52fa79201231573e457be28510d4650ecf80ae2fe96b361,2023-07-10T15:55:23.607000
CVE-2023-28324,0,0,7695c0797fe1bfec180932bce1dfd95a1dffa988f4d7567e1a1129cd7e1eaa11,2023-07-10T17:46:59.287000
CVE-2023-28324,0,1,9aea6ad31e5715b0a7ecba6b2b0f7468ba0870be2dca0f7bc052bb6544030f3e,2024-09-25T13:35:00.443000
CVE-2023-28325,0,0,4fd6e0b0b7c505c2fd43504d4b63a966dc708437fb5467ce1e281a243ba9f9bf,2023-05-22T14:29:00.840000
CVE-2023-28326,0,0,0c7b7956b8940c0928a48d68076b8f428679c68ea4c7d44789f578c2e29f73c0,2023-11-07T04:10:28.880000
CVE-2023-28327,0,0,b6f0484e5b7bfca56361e43c7bf8608f46ecfd24e3583be1082bf3cc2207865b,2023-04-29T03:12:41.973000
@ -231314,7 +231314,7 @@ CVE-2023-41307,0,0,b40206db3f664c3741f7b63048e1db296007a1580fe2faf85cefb526ef104
CVE-2023-41308,0,0,6835c8dc26ef7b1d8628f4b4565cdf08b38c79279b9714ee93f6f62ea090cff6,2024-09-25T01:36:05.800000
CVE-2023-41309,0,0,154e293d9c3d937fb04656c30c71ffaf7386d4b8e6863bd96a3d8a11bae1f2cc,2023-09-28T16:07:39.257000
CVE-2023-41310,0,0,baed8ce68083b6dbb90f516f90b0902dd047c6d89511f25ca69a36ee0c1ce871,2023-09-28T16:03:40.263000
CVE-2023-41311,0,0,7909df55551b90d7519f1d4404d50e09981c58eafcce58048025ceb8c809f7de,2023-09-28T15:56:31.800000
CVE-2023-41311,0,1,f9c60ca46138b44e528cc98d7a1515cebcbabbf569867d9c50588e1fe283bb03,2024-09-25T13:35:01.407000
CVE-2023-41312,0,0,58f8c57ed7582d0a806011fae75a0fa65cb09fde370ec1d14463d9b06219a7e6,2023-09-28T15:55:47.057000
CVE-2023-41313,0,0,30321f3e06cb0e59bba66fb59410219af7cd6bc368d72f5cfa5a6534ea657ffb,2024-08-05T18:35:02.890000
CVE-2023-41314,0,0,231103ce18fbd562745e97d45033e3484f45e746fb68dafcef5ec6dd9e6c6ec7,2023-12-22T17:19:15.287000
@ -233114,7 +233114,7 @@ CVE-2023-43906,0,0,ff14d8a22a132aecd242d338700d98c93de3c23cabb88a79d907b46e4d330
CVE-2023-43907,0,0,96d826a1afbfe78d28e5fc62e2d4cba36335d098a0b61b1aa2fe33b1754fdddf,2024-09-23T17:35:08.737000
CVE-2023-43909,0,0,2a52e5f92b53304c7bc4e54ac24676fe4e46f8d985d61293ac477491967852dc,2023-10-02T19:40:04.803000
CVE-2023-4392,0,0,1d3f2d738afdf027eae4b211f2e571cffa584d21a99ee02b4525f798db1c03e9,2024-05-17T02:31:31.610000
CVE-2023-4393,0,0,3e4c4292b8ee7f2ba488c5eb3a1cd28c34640bf970163ba9017f285851ab4040,2023-11-08T20:56:59.690000
CVE-2023-4393,0,1,c5af9a9c16a1e9bbc22080d93f65c06d20e60bb1e00e4221a8aa5681e06de445,2024-09-25T12:15:04.887000
CVE-2023-4394,0,0,1f57bf1c0cd94fb3a96400a16dd6f87e9c0313e4ee9e7f85cc8cb9e838e908d9,2023-11-07T04:22:31.487000
CVE-2023-43944,0,0,444cb16bb521303bb044c64676fbd90beb0aac62b40598010588900ff85bf29b,2023-10-02T19:37:07.767000
CVE-2023-4395,0,0,78dc7c95316407c5e68a1106c7fbdadf01339b63c6724f1e4f6fa4838b57b003,2023-08-22T00:55:09.250000
@ -250907,8 +250907,8 @@ CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2a
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
CVE-2024-31145,1,1,14bfd56957753a972b7293ba7d385ff3b3ae21a7f1330a21b84b6023b5b6fe39,2024-09-25T11:15:12.133000
CVE-2024-31146,1,1,5a631a88a6c48f9d5e2ebbcb599a1dfab46a04f08bc06cfe015b638853ef34e5,2024-09-25T11:15:12.220000
CVE-2024-31145,0,0,14bfd56957753a972b7293ba7d385ff3b3ae21a7f1330a21b84b6023b5b6fe39,2024-09-25T11:15:12.133000
CVE-2024-31146,0,0,5a631a88a6c48f9d5e2ebbcb599a1dfab46a04f08bc06cfe015b638853ef34e5,2024-09-25T11:15:12.220000
CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
@ -257451,14 +257451,14 @@ CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000
CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000
CVE-2024-40856,0,0,c53b64bcb96ffb53e7c5a3c98eae693333efe12e0fd41b0de336502a91b09e8c,2024-09-20T12:31:20.110000
CVE-2024-40857,0,0,49afbef84ab3139bba403d8137a9332468e61958e86197138141f0362c1b3d27,2024-09-20T12:31:20.110000
CVE-2024-40856,0,1,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000
CVE-2024-40857,0,1,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000
CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
CVE-2024-40860,0,0,95ecf460e2c86924b53fb7d3aa5f8264e4519b36b6fe383f1caae112d3199182,2024-09-20T12:31:20.110000
CVE-2024-40860,0,1,e5ead227110aa19c4042e26e364c8228b4489bfdf6f0431771df4e3ccb8a59ef,2024-09-25T13:41:05.177000
CVE-2024-40861,0,0,7204d4c395d904aba2687d268d077938e2cf1cd101497574171fb4f0b590be98,2024-09-20T12:31:20.110000
CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe834e,2024-09-20T12:31:20.110000
CVE-2024-40863,0,0,6d19988e7f98214ad02b31d8b0b7ea2f69e12db56e9a0545de8d6a7e8a3a5527,2024-09-20T12:31:20.110000
CVE-2024-40863,0,1,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000
CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
@ -259357,12 +259357,12 @@ CVE-2024-43983,0,0,1129654801fd3266f7fe50d30c14628ba8e34277b02cfc392393ce4aaa513
CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000
CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000
CVE-2024-43987,0,0,5f2ad565a5d32bae37360bc37876e8a6cdef75055ca9a1d57a5047cb69a7250c,2024-09-20T12:30:51.220000
CVE-2024-43988,0,0,58810a59167a152a28df3aac148f6a81b7e962eeb8f36cca2c04029c80f728ba,2024-09-20T12:30:51.220000
CVE-2024-43988,0,1,43ffe19e41988c419aca249be075847312c9c8cd41c433297d22c781cef44325,2024-09-25T13:55:55.460000
CVE-2024-43989,0,0,9f19cbbd07eac2d4997a02808c8ed7b359c9c31bd68dd720d1ab97474c15e7dd,2024-09-23T00:15:10.800000
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
CVE-2024-43991,0,0,dda8dfaf96eadcbed1e5201447898b359abd71dadd4fa20fb8b97e3a369fa7a3,2024-09-20T12:30:51.220000
CVE-2024-43992,0,0,ce482abec0688eb2a57431414e5c7c14ed21653accf87cc53624b71f8332ee14,2024-09-20T12:30:51.220000
CVE-2024-43993,0,0,8429fddc72b66938c1cabc2c62cfe7b55cdfd9517ee1a2cff304c65b1cd15c63,2024-09-20T12:30:51.220000
CVE-2024-43991,0,1,62375b0bd15282a5169a9db83c3c584ee6643c24a05676f00ee713a46015a5a5,2024-09-25T13:53:50.107000
CVE-2024-43992,0,1,e9a152f92c5b0e9db22adc26709ee0e8b5e307e1de9d16d60489758c638181ee,2024-09-25T13:47:17.277000
CVE-2024-43993,0,1,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f7fc,2024-09-25T13:44:39.917000
CVE-2024-43994,0,0,92a57f752ce2faa73917c46fd03cd7058c3f4fe6668ac24e011d5cce000e100c,2024-09-20T12:30:51.220000
CVE-2024-43995,0,0,d2bc15228a0936c9d52925ee78d8f61fa4f243d84362a990cf6cd93f080ed156,2024-09-20T12:30:51.220000
CVE-2024-43996,0,0,d7156f428d1448ad8b6ccd44d882e30f14df1390e059d6ddfa9925733f3aeac4,2024-09-23T01:15:11.510000
@ -259428,17 +259428,17 @@ CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0
CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
CVE-2024-44124,0,0,44c7ca8146afbbf39c096f933ced467146f947fcf582f4483eb2ab72de8f0e4d,2024-09-20T12:31:20.110000
CVE-2024-44125,0,0,9e664118d2ae4edc8a767eed4bd017c05d52d36e00239c51040c0b095af7ae9c,2024-09-20T12:31:20.110000
CVE-2024-44125,0,1,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000
CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000
CVE-2024-44128,0,0,0d066e39a9d2e85c653bba4cb69edb057d90c1a06e2e2de543fb82ec551e1666,2024-09-20T12:31:20.110000
CVE-2024-44129,0,0,e53a9ce09955a665419f7026ace3914c7b269c25d0abbbe77b9d291ebff0baa1,2024-09-20T12:31:20.110000
CVE-2024-44128,0,1,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000
CVE-2024-44129,0,1,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000
CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000
CVE-2024-44130,0,0,f4e89b68598385cc10c7257ab5a15425ed9bf99a914c2f9da983ff94c809a0d7,2024-09-24T18:49:47.557000
CVE-2024-44131,0,0,e8738fd0c6ae001394ef8981882c811c82e7272ea012840137fc1618fe06c3bc,2024-09-24T19:01:55.470000
CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd908,2024-09-20T12:31:20.110000
CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000
CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000
CVE-2024-44135,0,0,5965a57b9acfdbabd92fe864390d08c378d2b08941f576cb0b1177942ddb4946,2024-09-20T12:31:20.110000
CVE-2024-44135,0,1,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000
CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000
CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000
@ -259462,7 +259462,7 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
CVE-2024-44170,0,0,ad9c7ebf0677867158c66367ee67fb353ce44ea245452aff8d81c248a025d15c,2024-09-20T12:31:20.110000
CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
CVE-2024-44176,0,0,ba7f8b73267c9c45a3d8e8ca5968b7373044b3082c40552641c913654fc3e7d6,2024-09-20T12:31:20.110000
CVE-2024-44176,0,1,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000
CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000
CVE-2024-4418,0,0,b4bbbecff5b748c422c3d0ed121fdcb8cd9b2330acacbc04d39874726279d92b,2024-09-13T22:15:02.123000
@ -259472,12 +259472,12 @@ CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988
CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000
CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000
CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000
CVE-2024-44187,0,0,b2cacf02341e442dbf4e00cfcfa5cbe1b0a709de7f1ce9cb6d9bd942234b3b65,2024-09-20T12:31:20.110000
CVE-2024-44187,0,1,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000
CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000
CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6842,2024-09-24T18:33:02.477000
CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000
CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000
CVE-2024-44191,0,0,9e7190477f5b53cdae1382f8881362b81dc3dc904a3ab39bb84ac8eeaa1923a3,2024-09-20T12:31:20.110000
CVE-2024-44191,0,1,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000
@ -260100,7 +260100,7 @@ CVE-2024-45812,0,0,489679080c302c07130a30d30d7a91b5b88da7ba1022d4140c8924855fd12
CVE-2024-45813,0,0,98386851201b0e15badf0fa3bf589a7fa5db9873ebefbf247a44caa5f088f23f,2024-09-20T12:30:17.483000
CVE-2024-45815,0,0,06eeda73da6aeda58a6c8960f205d7a720011d27a4bce46e59b74e204055e7cb,2024-09-23T18:31:37.277000
CVE-2024-45816,0,0,405ccbf15ea8ae9fcc093aec52f9637ed1c1902b9f58c1816b340eb464d6fa85,2024-09-23T18:41:15.603000
CVE-2024-45817,1,1,cda843af3c32b899959725e5bf3ccbd79fb1b4d1dcca6576639ab61a17455e96,2024-09-25T11:15:12.277000
CVE-2024-45817,0,0,cda843af3c32b899959725e5bf3ccbd79fb1b4d1dcca6576639ab61a17455e96,2024-09-25T11:15:12.277000
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
CVE-2024-45823,0,0,54a17f937d68305d32d91930064931beaa080879f88a3df13aee6b9073c444aa,2024-09-12T18:14:03.913000
CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a270,2024-09-12T18:14:03.913000
@ -260234,6 +260234,7 @@ CVE-2024-46565,0,0,66b2d0d6228a7c5a2d4ccc7ad93a78f84212bb6cc08e71806aef1bcd5a1e1
CVE-2024-46566,0,0,ef325864839d5d2a7c7484211bd16ddf5a2b8bc0be80252bca80b3d5f7f77da3,2024-09-24T16:41:58.953000
CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada268,2024-09-24T16:42:00.340000
CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000
CVE-2024-4657,1,1,eae89e8fcad590b7fe7133398ad07a355faf27158c77572d59c838a0e84149cb,2024-09-25T13:15:04.110000
CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000
CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000
CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000
@ -262126,6 +262127,9 @@ CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5a
CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000
CVE-2024-6590,0,0,d599bcb4d0f25ca739f37db31b680f97bc141672263ff713109907df31ecad32,2024-09-25T03:15:02.830000
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
CVE-2024-6592,1,1,ea91eabcca4cd25be833adbe59cc5a3b48b1040680a1ad6ced0fe29bc04503af,2024-09-25T12:15:05.027000
CVE-2024-6593,1,1,9edeef2aea70d3eeaf2b3af59cc3d2a0656100b969bbb83ab66dd314d2313b25,2024-09-25T12:15:05.217000
CVE-2024-6594,1,1,ecaec2014a1041aad6bda6271b8cc0fb6dba7d6d7a643e1049fc3aadca6b34ae,2024-09-25T12:15:05.397000
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
CVE-2024-6596,0,0,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
@ -262790,9 +262794,9 @@ CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
CVE-2024-7477,0,0,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000
CVE-2024-7479,1,1,2c8805ea505fc48a0a1b3d384b08626d15f99209d9dcc6a4a8572d8d1fa024cb,2024-09-25T11:15:12.330000
CVE-2024-7479,0,0,2c8805ea505fc48a0a1b3d384b08626d15f99209d9dcc6a4a8572d8d1fa024cb,2024-09-25T11:15:12.330000
CVE-2024-7480,0,0,3513e9b1b40322abc4857852444e6547d08e759bdd020204145d34efe837e109,2024-09-11T15:03:37.293000
CVE-2024-7481,1,1,a0a2d601a6957cfe47817d74542037be5dff828d6c06a2c0847ebcc05c623714,2024-09-25T11:15:12.553000
CVE-2024-7481,0,0,a0a2d601a6957cfe47817d74542037be5dff828d6c06a2c0847ebcc05c623714,2024-09-25T11:15:12.553000
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
@ -263488,6 +263492,7 @@ CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a851
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
CVE-2024-8544,0,0,b92ed2b51bae3f52bc853d79bde121bda69091c5cde9cc12e546571a35641dfd,2024-09-24T02:15:03.687000
CVE-2024-8546,1,1,72dd0e8b3978c165f9beb60b55e8d42aa02c7869febf0ff1b80c593288834bb9,2024-09-25T13:15:04.313000
CVE-2024-8549,0,0,fcd242b6ea38a056c01db9880c2a52a409c7d0c95c3a6f9a54b5be14b01f3eaf,2024-09-25T03:15:05.393000
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000
@ -263623,7 +263628,7 @@ CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b
CVE-2024-8801,0,0,f1edc9c7bb1482d2f7aa53a58527c89ff09517b0d8b72cf3ccbe7bbb09f96d53,2024-09-25T01:15:47.050000
CVE-2024-8850,0,0,16d3ef25e9e3c3a395e24ef62b53309c976d74bdad746efe4904407697f24dbe,2024-09-20T12:30:17.483000
CVE-2024-8853,0,0,9f4483af2fc4525065d6409c29e78f86f7ea099a8bfb3db8a350d2fbd96a1485,2024-09-20T12:30:17.483000
CVE-2024-8858,1,1,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000
CVE-2024-8858,0,0,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000
CVE-2024-8862,0,0,d2fbbde6c386af624a5ae935a7a4eac6c09ff6dabefe8b3cf0bd8d2bf80b0d66,2024-09-20T15:47:10.697000
CVE-2024-8863,0,0,1a5131e94b007579c37dce9de5dfd5f9d496b886a484aa9376e9e793818d4aa7,2024-09-20T15:43:43.927000
CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000
@ -263730,4 +263735,4 @@ CVE-2024-9123,0,0,172c86ced5df086b16e63a8a266a4c5ff3fe491725d35f3cb8541fcec31e93
CVE-2024-9141,0,0,97f84a42cf7f2b9f57889b2bac4e897bf7424fe08455ac2a5757a2f7675a5b26,2024-09-25T01:15:48.980000
CVE-2024-9142,0,0,b03e9d1b56d58ec574118dab2b1ce3d1ed2fc8b91f932eace62a06c5ffb66458,2024-09-25T01:37:10.240000
CVE-2024-9148,0,0,476f188a7cb9a6ff6b5d6b29c0400e1d253afd3805ffb422b248b0b3633cd7e2,2024-09-25T01:15:49.297000
CVE-2024-9169,0,1,9ade5656a55df3bdd926cb6199a2755f77bced759ae3ff6b46fec0c99536503c,2024-09-25T09:15:03.380000
CVE-2024-9169,0,0,9ade5656a55df3bdd926cb6199a2755f77bced759ae3ff6b46fec0c99536503c,2024-09-25T09:15:03.380000

Can't render this file because it is too large.