mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-09-17T23:55:17.376390+00:00
This commit is contained in:
parent
7d394069de
commit
794a8803dc
56
CVE-2024/CVE-2024-379xx/CVE-2024-37985.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37985.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37985",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-17T23:15:14.913",
|
||||
"lastModified": "2024-09-17T23:15:14.913",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Information Disclosure Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1037"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-439xx/CVE-2024-43938.json
Normal file
56
CVE-2024/CVE-2024-439xx/CVE-2024-43938.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43938",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:18.037",
|
||||
"lastModified": "2024-09-17T23:15:18.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jeroen Peters Name Directory allows Reflected XSS.This issue affects Name Directory: from n/a through 1.29.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/name-directory/wordpress-name-directory-plugin-1-29-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-439xx/CVE-2024-43969.json
Normal file
56
CVE-2024/CVE-2024-439xx/CVE-2024-43969.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43969",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:18.253",
|
||||
"lastModified": "2024-09-17T23:15:18.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spiffy Plugins Spiffy Calendar allows SQL Injection.This issue affects Spiffy Calendar: from n/a through 4.9.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-12-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-439xx/CVE-2024-43976.json
Normal file
56
CVE-2024/CVE-2024-439xx/CVE-2024-43976.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43976",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:18.450",
|
||||
"lastModified": "2024-09-17T23:15:18.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in highwarden Super Store Finder allows SQL Injection.This issue affects Super Store Finder: from n/a through 6.9.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/superstorefinder-wp/wordpress-super-store-finder-plugin-6-9-7-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-439xx/CVE-2024-43977.json
Normal file
56
CVE-2024/CVE-2024-439xx/CVE-2024-43977.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43977",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:18.647",
|
||||
"lastModified": "2024-09-17T23:15:18.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in POSIMYTH The Plus Addons for Elementor Page Builder Lite allows Stored XSS.This issue affects The Plus Addons for Elementor Page Builder Lite: from n/a through 5.6.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/the-plus-addons-for-elementor-page-builder/wordpress-the-plus-addons-for-elementor-plugin-5-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-439xx/CVE-2024-43978.json
Normal file
56
CVE-2024/CVE-2024-439xx/CVE-2024-43978.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43978",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:18.837",
|
||||
"lastModified": "2024-09-17T23:15:18.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in highwarden Super Store Finder allows SQL Injection.This issue affects Super Store Finder: from n/a before 6.9.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/superstorefinder-wp/wordpress-super-store-finder-plugin-6-9-8-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-439xx/CVE-2024-43985.json
Normal file
56
CVE-2024/CVE-2024-439xx/CVE-2024-43985.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43985",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.037",
|
||||
"lastModified": "2024-09-17T23:15:19.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Bus Ticket Booking with Seat Reservation allows Stored XSS.This issue affects Bus Ticket Booking with Seat Reservation: from n/a through 5.3.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/bus-ticket-booking-with-seat-reservation/wordpress-bus-ticket-booking-with-seat-reservation-plugin-5-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44004.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44004.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44004",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.230",
|
||||
"lastModified": "2024-09-17T23:15:19.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPTaskForce WPCargo Track & Trace allows SQL Injection.This issue affects WPCargo Track & Trace: from n/a through 7.0.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpcargo/wordpress-wpcargo-track-trace-plugin-7-0-6-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44007.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44007.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44007",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.423",
|
||||
"lastModified": "2024-09-17T23:15:19.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Templates \u2013 Elementor & Gutenberg templates allows Reflected XSS.This issue affects SKT Templates \u2013 Elementor & Gutenberg templates: from n/a through 6.14."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/skt-templates/wordpress-skt-templates-elementor-gutenberg-templates-plugin-6-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44008.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44008.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44008",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.617",
|
||||
"lastModified": "2024-09-17T23:15:19.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dylan Kuhn Geo Mashup allows Stored XSS.This issue affects Geo Mashup: from n/a through 1.13.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/geo-mashup/wordpress-geo-mashup-plugin-1-13-12-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44009.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44009.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44009",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.810",
|
||||
"lastModified": "2024-09-17T23:15:19.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WC Lovers WCFM Marketplace allows Reflected XSS.This issue affects WCFM Marketplace: from n/a through 3.6.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wc-multivendor-marketplace/wordpress-wcfm-marketplace-3-6-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44047.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44047.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44047",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.983",
|
||||
"lastModified": "2024-09-17T23:15:19.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in IDX Broker IMPress for IDX Broker allows Stored XSS.This issue affects IMPress for IDX Broker: from n/a through 3.2.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/idx-broker-platinum/wordpress-impress-for-idx-broker-plugin-3-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44049.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44049.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44049",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:20.170",
|
||||
"lastModified": "2024-09-17T23:15:20.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeHunk Gutenberg Blocks \u2013 Unlimited blocks For Gutenberg allows Stored XSS.This issue affects Gutenberg Blocks \u2013 Unlimited blocks For Gutenberg: from n/a through 1.2.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/unlimited-blocks/wordpress-gutenberg-blocks-unlimited-blocks-for-gutenberg-plugin-1-2-7-authenticated-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44050.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44050.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44050",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:20.363",
|
||||
"lastModified": "2024-09-17T23:15:20.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Verbosa allows Stored XSS.This issue affects Verbosa: from n/a through 1.2.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/verbosa/wordpress-verbosa-theme-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44051.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44051.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44051",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:20.567",
|
||||
"lastModified": "2024-09-17T23:15:20.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Johan van der Wijk Content Blocks (Custom Post Widget) allows Stored XSS.This issue affects Content Blocks (Custom Post Widget): from n/a through 3.3.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44064.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44064.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44064",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:20.753",
|
||||
"lastModified": "2024-09-17T23:15:20.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in LikeBtn Like Button Rating allows Cross-Site Scripting (XSS).This issue affects Like Button Rating: from n/a through 2.6.54."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/likebtn-like-button/wordpress-like-button-rating-likebtn-plugin-2-6-53-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-454xx/CVE-2024-45451.json
Normal file
56
CVE-2024/CVE-2024-454xx/CVE-2024-45451.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45451",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:20.970",
|
||||
"lastModified": "2024-09-17T23:15:20.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Roseta allows Stored XSS.This issue affects Roseta: from n/a through 1.3.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/roseta/wordpress-roseta-theme-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-454xx/CVE-2024-45452.json
Normal file
56
CVE-2024/CVE-2024-454xx/CVE-2024-45452.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45452",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:21.183",
|
||||
"lastModified": "2024-09-17T23:15:21.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Septera septera allows Stored XSS.This issue affects Septera: from n/a through 1.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/septera/wordpress-septera-theme-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-469xx/CVE-2024-46982.json
Normal file
64
CVE-2024/CVE-2024-469xx/CVE-2024-46982.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-46982",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-17T22:15:02.273",
|
||||
"lastModified": "2024-09-17T22:15:02.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/commit/7ed7f125e07ef0517a331009ed7e32691ba403d3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/commit/bd164d53af259c05f1ab434004bcfdd3837d7cda",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-gp8f-8m3g-qvj9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
README.md
60
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-17T22:00:17.642108+00:00
|
||||
2024-09-17T23:55:17.376390+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-17T21:35:07.080000+00:00
|
||||
2024-09-17T23:15:21.183000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263142
|
||||
263161
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2024-45398](CVE-2024/CVE-2024-453xx/CVE-2024-45398.json) (`2024-09-17T20:15:04.670`)
|
||||
- [CVE-2024-45604](CVE-2024/CVE-2024-456xx/CVE-2024-45604.json) (`2024-09-17T20:15:04.893`)
|
||||
- [CVE-2024-45605](CVE-2024/CVE-2024-456xx/CVE-2024-45605.json) (`2024-09-17T20:15:05.120`)
|
||||
- [CVE-2024-45606](CVE-2024/CVE-2024-456xx/CVE-2024-45606.json) (`2024-09-17T20:15:05.393`)
|
||||
- [CVE-2024-45811](CVE-2024/CVE-2024-458xx/CVE-2024-45811.json) (`2024-09-17T20:15:05.800`)
|
||||
- [CVE-2024-45812](CVE-2024/CVE-2024-458xx/CVE-2024-45812.json) (`2024-09-17T20:15:06.037`)
|
||||
- [CVE-2024-45815](CVE-2024/CVE-2024-458xx/CVE-2024-45815.json) (`2024-09-17T21:15:12.320`)
|
||||
- [CVE-2024-45816](CVE-2024/CVE-2024-458xx/CVE-2024-45816.json) (`2024-09-17T21:15:12.553`)
|
||||
- [CVE-2024-46976](CVE-2024/CVE-2024-469xx/CVE-2024-46976.json) (`2024-09-17T21:15:12.763`)
|
||||
- [CVE-2024-8904](CVE-2024/CVE-2024-89xx/CVE-2024-8904.json) (`2024-09-17T21:15:12.980`)
|
||||
- [CVE-2024-8905](CVE-2024/CVE-2024-89xx/CVE-2024-8905.json) (`2024-09-17T21:15:13.080`)
|
||||
- [CVE-2024-8906](CVE-2024/CVE-2024-89xx/CVE-2024-8906.json) (`2024-09-17T21:15:13.140`)
|
||||
- [CVE-2024-8907](CVE-2024/CVE-2024-89xx/CVE-2024-8907.json) (`2024-09-17T21:15:13.193`)
|
||||
- [CVE-2024-8908](CVE-2024/CVE-2024-89xx/CVE-2024-8908.json) (`2024-09-17T21:15:13.247`)
|
||||
- [CVE-2024-8909](CVE-2024/CVE-2024-89xx/CVE-2024-8909.json) (`2024-09-17T21:15:13.313`)
|
||||
- [CVE-2024-8951](CVE-2024/CVE-2024-89xx/CVE-2024-8951.json) (`2024-09-17T20:15:07.020`)
|
||||
- [CVE-2024-8956](CVE-2024/CVE-2024-89xx/CVE-2024-8956.json) (`2024-09-17T20:15:07.287`)
|
||||
- [CVE-2024-8957](CVE-2024/CVE-2024-89xx/CVE-2024-8957.json) (`2024-09-17T21:15:13.423`)
|
||||
- [CVE-2024-37985](CVE-2024/CVE-2024-379xx/CVE-2024-37985.json) (`2024-09-17T23:15:14.913`)
|
||||
- [CVE-2024-43938](CVE-2024/CVE-2024-439xx/CVE-2024-43938.json) (`2024-09-17T23:15:18.037`)
|
||||
- [CVE-2024-43969](CVE-2024/CVE-2024-439xx/CVE-2024-43969.json) (`2024-09-17T23:15:18.253`)
|
||||
- [CVE-2024-43976](CVE-2024/CVE-2024-439xx/CVE-2024-43976.json) (`2024-09-17T23:15:18.450`)
|
||||
- [CVE-2024-43977](CVE-2024/CVE-2024-439xx/CVE-2024-43977.json) (`2024-09-17T23:15:18.647`)
|
||||
- [CVE-2024-43978](CVE-2024/CVE-2024-439xx/CVE-2024-43978.json) (`2024-09-17T23:15:18.837`)
|
||||
- [CVE-2024-43985](CVE-2024/CVE-2024-439xx/CVE-2024-43985.json) (`2024-09-17T23:15:19.037`)
|
||||
- [CVE-2024-44004](CVE-2024/CVE-2024-440xx/CVE-2024-44004.json) (`2024-09-17T23:15:19.230`)
|
||||
- [CVE-2024-44007](CVE-2024/CVE-2024-440xx/CVE-2024-44007.json) (`2024-09-17T23:15:19.423`)
|
||||
- [CVE-2024-44008](CVE-2024/CVE-2024-440xx/CVE-2024-44008.json) (`2024-09-17T23:15:19.617`)
|
||||
- [CVE-2024-44009](CVE-2024/CVE-2024-440xx/CVE-2024-44009.json) (`2024-09-17T23:15:19.810`)
|
||||
- [CVE-2024-44047](CVE-2024/CVE-2024-440xx/CVE-2024-44047.json) (`2024-09-17T23:15:19.983`)
|
||||
- [CVE-2024-44049](CVE-2024/CVE-2024-440xx/CVE-2024-44049.json) (`2024-09-17T23:15:20.170`)
|
||||
- [CVE-2024-44050](CVE-2024/CVE-2024-440xx/CVE-2024-44050.json) (`2024-09-17T23:15:20.363`)
|
||||
- [CVE-2024-44051](CVE-2024/CVE-2024-440xx/CVE-2024-44051.json) (`2024-09-17T23:15:20.567`)
|
||||
- [CVE-2024-44064](CVE-2024/CVE-2024-440xx/CVE-2024-44064.json) (`2024-09-17T23:15:20.753`)
|
||||
- [CVE-2024-45451](CVE-2024/CVE-2024-454xx/CVE-2024-45451.json) (`2024-09-17T23:15:20.970`)
|
||||
- [CVE-2024-45452](CVE-2024/CVE-2024-454xx/CVE-2024-45452.json) (`2024-09-17T23:15:21.183`)
|
||||
- [CVE-2024-46982](CVE-2024/CVE-2024-469xx/CVE-2024-46982.json) (`2024-09-17T22:15:02.273`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `13`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-0094](CVE-2023/CVE-2023-00xx/CVE-2023-0094.json) (`2024-09-17T20:35:01.820`)
|
||||
- [CVE-2023-41747](CVE-2023/CVE-2023-417xx/CVE-2023-41747.json) (`2024-09-17T20:15:03.773`)
|
||||
- [CVE-2023-45854](CVE-2023/CVE-2023-458xx/CVE-2023-45854.json) (`2024-09-17T21:35:02.480`)
|
||||
- [CVE-2024-27869](CVE-2024/CVE-2024-278xx/CVE-2024-27869.json) (`2024-09-17T21:35:03.670`)
|
||||
- [CVE-2024-27876](CVE-2024/CVE-2024-278xx/CVE-2024-27876.json) (`2024-09-17T20:35:05.790`)
|
||||
- [CVE-2024-27879](CVE-2024/CVE-2024-278xx/CVE-2024-27879.json) (`2024-09-17T20:35:06.640`)
|
||||
- [CVE-2024-40825](CVE-2024/CVE-2024-408xx/CVE-2024-40825.json) (`2024-09-17T20:35:08.457`)
|
||||
- [CVE-2024-43276](CVE-2024/CVE-2024-432xx/CVE-2024-43276.json) (`2024-09-17T20:00:47.713`)
|
||||
- [CVE-2024-43324](CVE-2024/CVE-2024-433xx/CVE-2024-43324.json) (`2024-09-17T20:04:28.360`)
|
||||
- [CVE-2024-44132](CVE-2024/CVE-2024-441xx/CVE-2024-44132.json) (`2024-09-17T20:35:10.567`)
|
||||
- [CVE-2024-44169](CVE-2024/CVE-2024-441xx/CVE-2024-44169.json) (`2024-09-17T21:35:07.080`)
|
||||
- [CVE-2024-8120](CVE-2024/CVE-2024-81xx/CVE-2024-8120.json) (`2024-09-17T20:07:46.117`)
|
||||
- [CVE-2024-8418](CVE-2024/CVE-2024-84xx/CVE-2024-8418.json) (`2024-09-17T20:15:06.710`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
81
_state.csv
81
_state.csv
@ -212660,7 +212660,7 @@ CVE-2023-0089,0,0,898a8ecd5ef0527b2bb74ab2c823bf9c469f5b9e6c1a2f88efeb4dc4285805
|
||||
CVE-2023-0090,0,0,7cc49ed6c764b88175b982d09162b38c06167847d184fe59006bfdaaafaf6dde,2023-07-12T19:15:08.870000
|
||||
CVE-2023-0091,0,0,dee3c6fac7765018e50731c8fb7eba2ff6d63d73061ab2ee0f336b5aba95e367,2023-02-22T17:07:37.597000
|
||||
CVE-2023-0093,0,0,bfa3858d50175ed32043168745154267583d9edddd3db5af5daea75de987fdd1,2023-03-13T15:25:50.167000
|
||||
CVE-2023-0094,0,1,2ab615c4fbd12d444f0de0f988eb63e2547c4fb51861f2606f19bf76619b40b9,2024-09-17T20:35:01.820000
|
||||
CVE-2023-0094,0,0,2ab615c4fbd12d444f0de0f988eb63e2547c4fb51861f2606f19bf76619b40b9,2024-09-17T20:35:01.820000
|
||||
CVE-2023-0095,0,0,89b63c24cb0b0f228b6669dde56208ab055d180b5a81f888bed2acbfc667c286,2023-11-07T03:59:38.497000
|
||||
CVE-2023-0096,0,0,eba9e2dc96f4b09500a15c42ad238750e61db25750d18cae967d399aa5b53d92,2023-11-07T03:59:38.640000
|
||||
CVE-2023-0097,0,0,7f362639bb04c604874d5e597bd683a64cb81991cc62a48c2cff0a94fcc44156,2023-11-07T03:59:38.840000
|
||||
@ -231546,7 +231546,7 @@ CVE-2023-41743,0,0,a50db13c23f826aee66d7c185c9c4d7cdd9905055347313570fae0d351ea9
|
||||
CVE-2023-41744,0,0,497fa4c3f6ecbd539c9d71ca80f25eb0115adfa675e1ec73ee99f19b9b319c9c,2023-09-06T00:17:41.660000
|
||||
CVE-2023-41745,0,0,5087b77788bc8bc800b83e9f501d6678796cce31b64833aeed9d7c62f1ef9c98,2023-09-06T19:07:18.077000
|
||||
CVE-2023-41746,0,0,40ebd1bcb8eb155bce924ee53e3d56f34f342a8c75f2b61475c25c1341cfce44,2023-09-06T19:14:18.157000
|
||||
CVE-2023-41747,0,1,af35c54fbc08aab805358da94d1263d04da13ad61a984b3611471fbed5149fd4,2024-09-17T20:15:03.773000
|
||||
CVE-2023-41747,0,0,af35c54fbc08aab805358da94d1263d04da13ad61a984b3611471fbed5149fd4,2024-09-17T20:15:03.773000
|
||||
CVE-2023-41748,0,0,4e17e5351ec3770b3def9d88039d6c08b5e1f6f84e99e1da27252660d61f84b3,2023-09-06T19:20:31.677000
|
||||
CVE-2023-41749,0,0,365a572ca1d63a448400cf40000a4d63d60613a1fb006236ee34dfcdf0c41515,2023-09-06T20:50:56.357000
|
||||
CVE-2023-4175,0,0,a95ed5dd2dd9dacf5f2ef16daf20e91e9f9a84674c574f72f37d902dbd1b78d7,2024-05-17T02:31:24.073000
|
||||
@ -234308,7 +234308,7 @@ CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43b
|
||||
CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000
|
||||
CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000
|
||||
CVE-2023-45853,0,0,6503429cbf2e1e20ebf7ebe132f95a8b90c44cef1beb7aaa8cc28ef474dcc45b,2024-08-01T13:44:58.990000
|
||||
CVE-2023-45854,0,1,394313462a2368ea2f30526af8413d92e9573e06a35e5469bc30af67d449c491,2024-09-17T21:35:02.480000
|
||||
CVE-2023-45854,0,0,394313462a2368ea2f30526af8413d92e9573e06a35e5469bc30af67d449c491,2024-09-17T21:35:02.480000
|
||||
CVE-2023-45855,0,0,912d651ace420e3e306dbd306a33a1e9381017090da4aa2e9ea6f83c20cb2d32,2023-10-19T12:47:29.590000
|
||||
CVE-2023-45856,0,0,9549076e6d0a6fd1b223e9b67c01e74b49d52dd52325c68b86809e5c56a367bc,2023-10-19T12:51:51.217000
|
||||
CVE-2023-45857,0,0,73cdaec7d516e0e7ed8e90335cf635a85ba7d5cc487bbd7bc0e61ce086b2cacc,2024-06-21T19:15:29.593000
|
||||
@ -248585,17 +248585,17 @@ CVE-2024-27861,0,0,581f76bb10513bf36e61c3c28dba8360eeb4c4b6228aeea50291ba2abe2ab
|
||||
CVE-2024-27862,0,0,6a1c629c4e6507b4b49035253caa6ee93e62b8be69739e75e90d1bcc9a884e42,2024-08-01T14:35:05.210000
|
||||
CVE-2024-27863,0,0,508019dee070d0b71d963cf0aca914f810083800bc171b0f57fa8f39de1cbc93,2024-08-12T15:07:03.157000
|
||||
CVE-2024-27867,0,0,c8c0bef10450917c014bb0f5b8c10be2f4bd90c5c93e6cf14274f5f577a33a76,2024-07-04T05:15:15.540000
|
||||
CVE-2024-27869,0,1,ada2004e7ba0b6f62a98b6fdc774abb776f3d59ddb71f72d754001ab6ac2a166,2024-09-17T21:35:03.670000
|
||||
CVE-2024-27869,0,0,ada2004e7ba0b6f62a98b6fdc774abb776f3d59ddb71f72d754001ab6ac2a166,2024-09-17T21:35:03.670000
|
||||
CVE-2024-2787,0,0,2d4ec32358f3e4fff4e28d01c0d898cc511d2c65fccc3f39ec557fb8f116ac98,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27871,0,0,aa889bfaf64951ad81b8eaff6e3ebab3a984b1a00b69f7afbb60904dbe5078f9,2024-08-12T15:03:12.533000
|
||||
CVE-2024-27872,0,0,37b3013a393e2a4da5a8cab81b2aba84fb318151ed1cc07ffcd36e54f42e134f,2024-08-12T14:57:41.280000
|
||||
CVE-2024-27873,0,0,7729d99677f493b1646015ca9c6f3b42e2f48da1b219729ff59f6f38e1d663c8,2024-08-12T14:49:15.007000
|
||||
CVE-2024-27874,0,0,ecbd43c545a940e09f7bc08a9ff43e87770070e6218e7cb0f491733ba69001a4,2024-09-17T15:35:06.550000
|
||||
CVE-2024-27875,0,0,65d7774ea7046d1c2ffd52f7fb12ac73d091d641a1a51116bc36079c520a4fe3,2024-09-17T00:15:48.063000
|
||||
CVE-2024-27876,0,1,1bad73d880adabe99d8bedc08933eb4d0b97ae05d6168b4c2cf58b6f87f1d76b,2024-09-17T20:35:05.790000
|
||||
CVE-2024-27876,0,0,1bad73d880adabe99d8bedc08933eb4d0b97ae05d6168b4c2cf58b6f87f1d76b,2024-09-17T20:35:05.790000
|
||||
CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29c1a,2024-08-09T17:02:19.750000
|
||||
CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000
|
||||
CVE-2024-27879,0,1,4df0bb60b45ddcffea4439007b5ee5dbc3d5ac2fbad1db1dec4c26fcd4e04a1c,2024-09-17T20:35:06.640000
|
||||
CVE-2024-27879,0,0,4df0bb60b45ddcffea4439007b5ee5dbc3d5ac2fbad1db1dec4c26fcd4e04a1c,2024-09-17T20:35:06.640000
|
||||
CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27880,0,0,55bc30865392b74c61625a9f4aa842c0b9edfc53af79a96ef7ccb89f05888202,2024-09-17T00:15:48.250000
|
||||
CVE-2024-27881,0,0,ecd3b41ffcf84a1b769c2ce9b805a207566f7e84b913888f092b35189f2e87e8,2024-08-16T17:37:25.757000
|
||||
@ -255595,6 +255595,7 @@ CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e7520035
|
||||
CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000
|
||||
CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000
|
||||
CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000
|
||||
CVE-2024-37985,1,1,3ecafe20c64b90da8359418af81f7c4b4beea8ceb42f4063f03f8b50f4e7476f,2024-09-17T23:15:14.913000
|
||||
CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000
|
||||
CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd53a,2024-07-12T18:51:17.253000
|
||||
CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000
|
||||
@ -257297,7 +257298,7 @@ CVE-2024-40821,0,0,487abc636b37954dfecb8c888cfc309cb83072f61f6b16a4997ec310f3270
|
||||
CVE-2024-40822,0,0,bb4dda0f197923f13f28883f6d166542a31444c99bd5734a02cac506a8ead59e,2024-08-15T17:06:23.417000
|
||||
CVE-2024-40823,0,0,67c48af0288d424c08a10899b8005bb32663e89913418e94f646262e5d0a3bd0,2024-08-15T17:08:03.857000
|
||||
CVE-2024-40824,0,0,f7238499f6070a1c6bcd15f8bf3e89f1de8d2d27cbbecc98c8a027de77cf1ec1,2024-08-01T13:58:12.907000
|
||||
CVE-2024-40825,0,1,11920ee67c7d7542729a23fab913c24e490a0265532315a425cc9c75dc6a2d0c,2024-09-17T20:35:08.457000
|
||||
CVE-2024-40825,0,0,11920ee67c7d7542729a23fab913c24e490a0265532315a425cc9c75dc6a2d0c,2024-09-17T20:35:08.457000
|
||||
CVE-2024-40826,0,0,2af114ae23007635d6813c41af8210981dea3c82561a06728199376b7fe4d206,2024-09-17T00:15:48.653000
|
||||
CVE-2024-40827,0,0,e7fe54c2477a039a62b334045d9b6bcf45e92847d1542e12e0d01f314b633ab2,2024-08-23T14:53:49.367000
|
||||
CVE-2024-40828,0,0,fb7cd21b5df82c55cfc24f9118f5ae0e27252cbbe3373763d0e4e9ed672ae982,2024-08-01T13:58:13.833000
|
||||
@ -258814,7 +258815,7 @@ CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763b
|
||||
CVE-2024-43271,0,0,3852afcf0359f6cc86523739d67c2c354f1f5e6dc92c419ef339ef64322d3b04,2024-08-19T18:36:07.297000
|
||||
CVE-2024-43272,0,0,e5c0ccec3dcf5a8380148a5313d6f966ea5609aaef234f6a5af2f197acc8f34c,2024-08-19T18:36:07.297000
|
||||
CVE-2024-43275,0,0,f94aa35e0baff5e9986092a090ce1e8de11bc4f581ead148df83dfd46fa583e2,2024-09-11T12:33:23.387000
|
||||
CVE-2024-43276,0,1,20fea6c1084924fc9c4e436124995a3a5cc382be23337a940bb2e5f3df58f8db,2024-09-17T20:00:47.713000
|
||||
CVE-2024-43276,0,0,20fea6c1084924fc9c4e436124995a3a5cc382be23337a940bb2e5f3df58f8db,2024-09-17T20:00:47.713000
|
||||
CVE-2024-43278,0,0,ce315fd6df2c7c03732ec4666e0eb8df6d4b7eb3d4a28c76f708a96fbe277c0a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43279,0,0,e987096db9ded741b69a195b2928ea4cd7001885008ed57560d4daa954a47390,2024-08-19T12:59:59.177000
|
||||
CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000
|
||||
@ -258854,7 +258855,7 @@ CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9
|
||||
CVE-2024-43320,0,0,ccee38afc2a835bb009830c4531368282e9727bc0052e4d4c17d31bfd55ad002,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43321,0,0,bb703b2de13a267b8724635b0dde06893a82d0524de00aebee7a6b84161b8d61,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd2e3,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43324,0,1,3fca11ef3a0d0aca94e1720b1500c02c9dcd66fee91e5ec95a4010a171418c83,2024-09-17T20:04:28.360000
|
||||
CVE-2024-43324,0,0,3fca11ef3a0d0aca94e1720b1500c02c9dcd66fee91e5ec95a4010a171418c83,2024-09-17T20:04:28.360000
|
||||
CVE-2024-43325,0,0,c7e71f31efef4adfd7b652340fa8f95169ea702400525766f98d28f2dbed3aec,2024-09-12T21:28:20.137000
|
||||
CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43327,0,0,acd099b8109083e63b5d816040ddc307da420ff33ea37d9f6c3f5b17cd1e029a,2024-08-19T12:59:59.177000
|
||||
@ -259166,6 +259167,7 @@ CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d6
|
||||
CVE-2024-43934,0,0,4e14707da9cba5c30b08d1fee5b95a63503f58541a5f170f7bdf2957916e0033,2024-09-03T15:17:36.507000
|
||||
CVE-2024-43935,0,0,507740bb6b2ff7008debdb7eb0a31d10ff2310284bc85a28c8516e97f01a540f,2024-09-03T15:19:13.313000
|
||||
CVE-2024-43936,0,0,13ff2ee8ac37d656ed3cfb9bac7c332b5831e52f7ec68739f3804a7d224b4b07,2024-09-03T15:20:22.557000
|
||||
CVE-2024-43938,1,1,47bd5aa1c071cc007c1d00c270027de83c84c7236d6fb57a01057b0f8da1b8ce,2024-09-17T23:15:18.037000
|
||||
CVE-2024-43939,0,0,038f7625de6a8661e4d4e3d67a6a9205d36179299b716c94d45c48dbdde60e93,2024-08-30T16:29:15.177000
|
||||
CVE-2024-43940,0,0,e2807b5b7542484ae9ed35e04d622dfaaddf93a950c2f3af8ce19e39df4a53a6,2024-08-30T16:27:22.270000
|
||||
CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2eb1,2024-09-04T13:40:41.620000
|
||||
@ -259192,15 +259194,28 @@ CVE-2024-43964,0,0,a296e79bf666a02822318fa0afa97e1b25cabc20d3cd08936c2b6152e8d8f
|
||||
CVE-2024-43965,0,0,878d660798d5f5ce29d081268f89e41be6b018fcbed5e4625677b64fd6bbb9af,2024-09-04T16:02:57.427000
|
||||
CVE-2024-43966,0,0,2901acb1eb63b7a55cb46d133ca8742f966f34bb1db4feb1259a3cd63030f204,2024-09-13T16:01:42.997000
|
||||
CVE-2024-43967,0,0,058d81312da48659f7d07dbe37562102bf6a7259028130f2d17364cdc71b5244,2024-08-26T19:10:09.607000
|
||||
CVE-2024-43969,1,1,e26f311e05eb6990dcc6348fd6e980e4dcceb0042db2094a3923d85c868f6220,2024-09-17T23:15:18.253000
|
||||
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43976,1,1,27b2727ce03169152704486288c2dfcbcdadb5e4553bf4b3371da31f2c996ce9,2024-09-17T23:15:18.450000
|
||||
CVE-2024-43977,1,1,2c63d47d9a73a29dc22bfd4860abfb6da62e1ccf79f4dfec31d1480a2bee45c8,2024-09-17T23:15:18.647000
|
||||
CVE-2024-43978,1,1,a489a0cc2522b21a9304e5412dbb704dcc8e818c12140083d4bbb0a661d29509,2024-09-17T23:15:18.837000
|
||||
CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd54,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43985,1,1,15dd13fc460f6cceaa61200e7f29fdfe36d95164375ca054b826fa36eaf5592c,2024-09-17T23:15:19.037000
|
||||
CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000
|
||||
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
|
||||
CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000
|
||||
CVE-2024-44004,1,1,8fdea8b2485ba244b493f0cfebf273a15cdfa259125ddb319ebe8f26029d6432,2024-09-17T23:15:19.230000
|
||||
CVE-2024-44007,1,1,753a12cc95ac2937f01bcf420e3f38cff2803caf67491b4a60aa756759cbf769,2024-09-17T23:15:19.423000
|
||||
CVE-2024-44008,1,1,fb2eef83b449915682450ef7b09368e0602ee6384298b4ea39f030fb18db93a6,2024-09-17T23:15:19.617000
|
||||
CVE-2024-44009,1,1,a4a5b3044dfd0cdce3d24515f4e5c950490d84dec42d04909f89c618641bf5c5,2024-09-17T23:15:19.810000
|
||||
CVE-2024-4401,0,0,48f8e641129f81284635fb93c6fe88c5c5fc547b585fa75e650b46a3bc3c0b8f,2024-09-04T14:33:01.807000
|
||||
CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000
|
||||
CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000
|
||||
CVE-2024-44047,1,1,f5310b42432716ab0eb586cf21ec036c95d1600db7f36b3d0c930ea835532186,2024-09-17T23:15:19.983000
|
||||
CVE-2024-44049,1,1,b2a6dbb3531bd2a9915754cfe59a39b1eddd56dfdf5d9ada583ad69549ed10e6,2024-09-17T23:15:20.170000
|
||||
CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000
|
||||
CVE-2024-44050,1,1,112e5de368d7bb55d757925d6c83de468cec9a8853d13686826b3f2a2c1d56e7,2024-09-17T23:15:20.363000
|
||||
CVE-2024-44051,1,1,21ef55b7e973e2cb5e9927cb54ad9cf52e06b6e6d1cd1dc9e53e7965543bdb0d,2024-09-17T23:15:20.567000
|
||||
CVE-2024-44053,0,0,83d8923ba60cf9279e6750cc431daaab1e1e350d146e3f688dad663630566e4b,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44054,0,0,aac6ee4842c7130587f73f4ed7c6e96f84a7c00d827a149adaa8654efd7c1333,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44056,0,0,c99585cd0dcda5c81c68a8c27fe2576a5ab4d77342f1c34b32b44751c11dcc8b,2024-09-16T15:30:28.733000
|
||||
@ -259211,6 +259226,7 @@ CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef9
|
||||
CVE-2024-44060,0,0,ea289f0bdc9789c9ec67d1508aa08afeb9f803f52099e34e6af184526da44eb7,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44062,0,0,14538aba5f6d0cee1fffe23d891617a033aae9a8c2411d6855777f0a1a7aba3c,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44063,0,0,d642b3fb89950affe44ef0b88153cbec24d22c27c53a8da8ab9d205a291c0668,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44064,1,1,cc532be85a29c3897f823999317e0fedeef91fc2f6e2412ab4193e7866cc9f8b,2024-09-17T23:15:20.753000
|
||||
CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000
|
||||
CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000
|
||||
CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000
|
||||
@ -259250,7 +259266,7 @@ CVE-2024-44129,0,0,80d6bfe9f589639c6b37cf4bc9d9a0337225f91fda36e2734cbcf804c1050
|
||||
CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44130,0,0,8b7bac72cd82930fe473fab5aac1053d3c9017a18ce274bcfb0126f6015fb62e,2024-09-17T00:15:50.147000
|
||||
CVE-2024-44131,0,0,b267a6183213b9af680517d98dadaf8ee8254ca3d098b903aee17731bb751574,2024-09-17T00:15:50.200000
|
||||
CVE-2024-44132,0,1,768650c39f2465579333f2ffdb38dd2bade832eda43a93b5312bf7febc840788,2024-09-17T20:35:10.567000
|
||||
CVE-2024-44132,0,0,768650c39f2465579333f2ffdb38dd2bade832eda43a93b5312bf7febc840788,2024-09-17T20:35:10.567000
|
||||
CVE-2024-44133,0,0,2342efabdfb486acbd84b01a67b4429c3f220894b32420494f740a374a8b7a02,2024-09-17T00:15:50.300000
|
||||
CVE-2024-44134,0,0,08861eb717240c3274a4b430984ab8105b0dbbf7f1f275826256555a7a05b703,2024-09-17T00:15:50.350000
|
||||
CVE-2024-44135,0,0,87bd09056774a11e5987bc31387cce2c52820c19b2c6c0364c242beae92f1a3f,2024-09-17T00:15:50.393000
|
||||
@ -259273,7 +259289,7 @@ CVE-2024-44165,0,0,a7e8f145a76de2fcef8206444371e2a7f7ad0b6c0af30e6cd99ee6833ed6e
|
||||
CVE-2024-44166,0,0,2d8190455851a8a67b982415e9d3ab8fddb339b6e45b81afd68e2435f8536ac5,2024-09-17T00:15:51.260000
|
||||
CVE-2024-44167,0,0,0fc7ed8cffb900bd9864c44df59df3d069be7e146339c6595bd34bfb4910f251,2024-09-17T00:15:51.310000
|
||||
CVE-2024-44168,0,0,4c6aa60d3ee36133c15b85dacb7853804a1499a3b87e6bf9a00be00f39f6c9c9,2024-09-17T00:15:51.367000
|
||||
CVE-2024-44169,0,1,92236126660592a1c9f1a92db5cf0926d3435475ab83053e9be05d8c74b3b13f,2024-09-17T21:35:07.080000
|
||||
CVE-2024-44169,0,0,92236126660592a1c9f1a92db5cf0926d3435475ab83053e9be05d8c74b3b13f,2024-09-17T21:35:07.080000
|
||||
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44170,0,0,eaee94625696e10e244480f362239ab3b8c5d3e94d8657717d77fa54a9c25544,2024-09-17T00:15:51.463000
|
||||
CVE-2024-44171,0,0,6d6988c5b02b24d58bcd2c90e99110317d20ac11c5529524260344531b895d3a,2024-09-17T00:15:51.520000
|
||||
@ -259743,7 +259759,7 @@ CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb
|
||||
CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000
|
||||
CVE-2024-45394,0,0,bfa856fd3910cd158abdb0649aaa3b144a57df0415e22d97c0d54c8ae8371de9,2024-09-17T13:26:42.567000
|
||||
CVE-2024-45395,0,0,40bba716ba89648b0a5b0a469128bfb2472f289be140a10878a9431641f22b04,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45398,1,1,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000
|
||||
CVE-2024-45398,0,0,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000
|
||||
CVE-2024-45399,0,0,037a7bffbd0f8d9091903d0d9148831df46e7343b0a57250b24ff56b22720edf,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
|
||||
CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000
|
||||
@ -259777,6 +259793,8 @@ CVE-2024-45448,0,0,baaac6177753b9ef1526bea7e39de3dc043a4ca1913a07543e6e5e11685c2
|
||||
CVE-2024-45449,0,0,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc227,2024-09-06T14:38:08.067000
|
||||
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000
|
||||
CVE-2024-45451,1,1,5229461646061f5229c33d4bf801b0a9f7047a3683ddb2578fb28570321f2734,2024-09-17T23:15:20.970000
|
||||
CVE-2024-45452,1,1,fdfee902792e194b32d188f2f974cff27f1fb2a2547b725b9bb68c5c8e0a2fab,2024-09-17T23:15:21.183000
|
||||
CVE-2024-45455,0,0,2252ed0190aceaaf231db9e13c20002f9f0347dbc9cd3d6637ac9295250f3d43,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45456,0,0,f24597a7e3d48154883583103775982966f08c6eeafb8e5ace41268c1fcf3230,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45457,0,0,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000
|
||||
@ -259824,9 +259842,9 @@ CVE-2024-45595,0,0,ede23268a540135a5b850bb94c6f703a5aa5e0c31883aaf264822fc090a91
|
||||
CVE-2024-45596,0,0,6e565b4a7c9ad9fc7c8e22389ae667ed11775275e4e8d0d4bae0af105f45843b,2024-09-11T16:26:11.920000
|
||||
CVE-2024-45597,0,0,0fad881157bfd299e8512a05afe15ba28f7513c6a1c09923d6036dedef269a28,2024-09-11T16:26:11.920000
|
||||
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45604,1,1,df9309ebee69f4ec700bb7840ba1cc6f02080f3fc26293d013bd69264df2338d,2024-09-17T20:15:04.893000
|
||||
CVE-2024-45605,1,1,e087e48cc4df76249173d7a618d4b2cb5065b1483d2a45b39541842585093271,2024-09-17T20:15:05.120000
|
||||
CVE-2024-45606,1,1,8b315609968854b688a141eba7c889d1bac462088775a65d9695e6d2d8c00cf9,2024-09-17T20:15:05.393000
|
||||
CVE-2024-45604,0,0,df9309ebee69f4ec700bb7840ba1cc6f02080f3fc26293d013bd69264df2338d,2024-09-17T20:15:04.893000
|
||||
CVE-2024-45605,0,0,e087e48cc4df76249173d7a618d4b2cb5065b1483d2a45b39541842585093271,2024-09-17T20:15:05.120000
|
||||
CVE-2024-45606,0,0,8b315609968854b688a141eba7c889d1bac462088775a65d9695e6d2d8c00cf9,2024-09-17T20:15:05.393000
|
||||
CVE-2024-45607,0,0,67a6e47c29587e42f4488dd77fa36902f2c8b9e4de4df31afdc94977a83ab49c,2024-09-12T21:34:55.633000
|
||||
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-45612,0,0,ef43e3990d9c954ad7bf7532592a25b6df1296840bab862dfc7fa4022c718569,2024-09-17T19:15:28.250000
|
||||
@ -259882,10 +259900,10 @@ CVE-2024-45801,0,0,6cf2908141281733da9f2c82737c6811e04d5fe422e7fcc54cfb6d6ab7ce7
|
||||
CVE-2024-45803,0,0,3545b99fe22bbd854319c3d83e4e919bd18f67ffd67280643db637b7c5607646,2024-09-17T19:15:28.660000
|
||||
CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000
|
||||
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45811,1,1,f0df0a439acb31f6186bb710f50e08de1db9507a40924c9c8e01331981994a78,2024-09-17T20:15:05.800000
|
||||
CVE-2024-45812,1,1,5296a33ded9dac212f5f77eaf6bb8e39d45694864c0a4631f697e8131e868b30,2024-09-17T20:15:06.037000
|
||||
CVE-2024-45815,1,1,6121c6708e592c490155dce1fe575882728b0a6c1af42d4541c312ae5b01ce7e,2024-09-17T21:15:12.320000
|
||||
CVE-2024-45816,1,1,bd13ff224f761096d12293be0d33d1aab90974326ea62d89cf84a16485cf8833,2024-09-17T21:15:12.553000
|
||||
CVE-2024-45811,0,0,f0df0a439acb31f6186bb710f50e08de1db9507a40924c9c8e01331981994a78,2024-09-17T20:15:05.800000
|
||||
CVE-2024-45812,0,0,5296a33ded9dac212f5f77eaf6bb8e39d45694864c0a4631f697e8131e868b30,2024-09-17T20:15:06.037000
|
||||
CVE-2024-45815,0,0,6121c6708e592c490155dce1fe575882728b0a6c1af42d4541c312ae5b01ce7e,2024-09-17T21:15:12.320000
|
||||
CVE-2024-45816,0,0,bd13ff224f761096d12293be0d33d1aab90974326ea62d89cf84a16485cf8833,2024-09-17T21:15:12.553000
|
||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||
CVE-2024-45823,0,0,54a17f937d68305d32d91930064931beaa080879f88a3df13aee6b9073c444aa,2024-09-12T18:14:03.913000
|
||||
CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a270,2024-09-12T18:14:03.913000
|
||||
@ -260068,8 +260086,9 @@ CVE-2024-46958,0,0,55b6c34933d7f404734afe78f6fca5f500d88d2d153f0079c17dd51e529b7
|
||||
CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000
|
||||
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46970,0,0,850e1f9bd88ec99bda9e7fcbc1327358ebf0bb50f2ce23e44dc920d53302143a,2024-09-16T15:30:28.733000
|
||||
CVE-2024-46976,1,1,f3786e54e8d51b8dd39dbbbd9771974fd9112681cfc7638f96badfdf4c35d719,2024-09-17T21:15:12.763000
|
||||
CVE-2024-46976,0,0,f3786e54e8d51b8dd39dbbbd9771974fd9112681cfc7638f96badfdf4c35d719,2024-09-17T21:15:12.763000
|
||||
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
|
||||
CVE-2024-46982,1,1,ea2fe597553d263f2cd1280d984988f3dd8bd84e5f24bd16a84753abcca26655,2024-09-17T22:15:02.273000
|
||||
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
|
||||
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000
|
||||
@ -262785,7 +262804,7 @@ CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb81
|
||||
CVE-2024-8113,0,0,955ebfeb47657ee688d94f4a91bdebad900106533d62e5ae0eb920a40b616cec,2024-09-12T18:21:30.677000
|
||||
CVE-2024-8117,0,0,8911918cea1d80613ef158836fc25c8d180447229a308c8b8d66c79bd51e5356,2024-09-06T16:04:23.413000
|
||||
CVE-2024-8119,0,0,209c67cb8bfc8afcb7a4732dcac7c96ef9caf231c5c5c990646aa6c9fa168084,2024-09-06T16:11:02.370000
|
||||
CVE-2024-8120,0,1,94d6700060407df9049e5baa85dfe75b2dcfe8ef464f0408d491eefb42a5e54b,2024-09-17T20:07:46.117000
|
||||
CVE-2024-8120,0,0,94d6700060407df9049e5baa85dfe75b2dcfe8ef464f0408d491eefb42a5e54b,2024-09-17T20:07:46.117000
|
||||
CVE-2024-8121,0,0,ff1e52368219900437efe7b0d09c59c3cd45c1a8ee1d51b7c00a17f9caa0d460,2024-09-06T16:20:59.767000
|
||||
CVE-2024-8123,0,0,0c7aca2112819fbb5f60b01b3de749c0321788022ccd287129bcc300c493718d,2024-09-06T17:20:28.600000
|
||||
CVE-2024-8124,0,0,02c59f30d4d00678a507631ef49dae97166d69f81e7a4ab71ebdf86641cfe454,2024-09-17T12:15:03.333000
|
||||
@ -262970,7 +262989,7 @@ CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af
|
||||
CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000
|
||||
CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000
|
||||
CVE-2024-8417,0,0,06f2fb3a9c5f24d70d3e64f2adf01488c8a1074d97d657d22a3388a406d1616e,2024-09-05T12:53:21.110000
|
||||
CVE-2024-8418,0,1,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000
|
||||
CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000
|
||||
CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000
|
||||
CVE-2024-8428,0,0,d38eeb7d0c97ad7b1cddb799376a1380930df039d2cf833bc9165ae4323bcbef,2024-09-06T16:46:26.830000
|
||||
CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000
|
||||
@ -263125,12 +263144,12 @@ CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee
|
||||
CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8897,0,0,b99b42e128a3a937599a5ee8c7a3b275ca81dee2198a043376f3ec3c0daeea34,2024-09-17T13:15:04.423000
|
||||
CVE-2024-8900,0,0,f58f5185481b4f9d895145fbfe2d15f4fe9fa908c07bf76713d81ef85bc63469,2024-09-17T19:15:29.163000
|
||||
CVE-2024-8904,1,1,ce74e59d7cc6aefa4bdd9474354070b40a396e35a6b9e3e411821983b2305342,2024-09-17T21:15:12.980000
|
||||
CVE-2024-8905,1,1,42232b47781127da504ce11f730ec8a0335185eb290dfa96eacff6a9acc97c02,2024-09-17T21:15:13.080000
|
||||
CVE-2024-8906,1,1,a825cb604140b0e13ad78ca82d1d231a96e53bbe511215a792b4240c110540db,2024-09-17T21:15:13.140000
|
||||
CVE-2024-8907,1,1,64dc4dc8a4d40c7e225809d67f10cc92608ae63c53341c28f0018040d67ff7cd,2024-09-17T21:15:13.193000
|
||||
CVE-2024-8908,1,1,5ad2b20eaf7b11cce42e37ec1af63dc38b712b10d9cb0d1e4c7b4750e472beb6,2024-09-17T21:15:13.247000
|
||||
CVE-2024-8909,1,1,6e8b76716a7583909abac5259bbc846654dc137ba42004644398974c5fd98eaa,2024-09-17T21:15:13.313000
|
||||
CVE-2024-8904,0,0,ce74e59d7cc6aefa4bdd9474354070b40a396e35a6b9e3e411821983b2305342,2024-09-17T21:15:12.980000
|
||||
CVE-2024-8905,0,0,42232b47781127da504ce11f730ec8a0335185eb290dfa96eacff6a9acc97c02,2024-09-17T21:15:13.080000
|
||||
CVE-2024-8906,0,0,a825cb604140b0e13ad78ca82d1d231a96e53bbe511215a792b4240c110540db,2024-09-17T21:15:13.140000
|
||||
CVE-2024-8907,0,0,64dc4dc8a4d40c7e225809d67f10cc92608ae63c53341c28f0018040d67ff7cd,2024-09-17T21:15:13.193000
|
||||
CVE-2024-8908,0,0,5ad2b20eaf7b11cce42e37ec1af63dc38b712b10d9cb0d1e4c7b4750e472beb6,2024-09-17T21:15:13.247000
|
||||
CVE-2024-8909,0,0,6e8b76716a7583909abac5259bbc846654dc137ba42004644398974c5fd98eaa,2024-09-17T21:15:13.313000
|
||||
CVE-2024-8939,0,0,957d3e495c1f91e1f01ec85026d867d3ef775813b5ad800712d45bf5da2fd527,2024-09-17T17:15:11.327000
|
||||
CVE-2024-8944,0,0,e33cef62d9a54e3c9644e7c4b2af554d4827e7ec1a566e407d17d5b44ecd7aca,2024-09-17T18:15:05.690000
|
||||
CVE-2024-8945,0,0,fd45c5052c525bcd2663848f4b04e9d4ca0dd08a1af7e68c5c053387b1392731,2024-09-17T18:15:06.023000
|
||||
@ -263138,6 +263157,6 @@ CVE-2024-8946,0,0,f683e89c1a7c4d3f311a742522396e1eb7b882f209db6b5cf4981f5f483bbf
|
||||
CVE-2024-8947,0,0,e7358c360d7018d342c095a0ae4b74d3493e808891550c9a094bb59ec7b9a4b3,2024-09-17T19:15:29.483000
|
||||
CVE-2024-8948,0,0,fb95c4586dc1832c9169ff9ab84deb54253d2f0155e4f47c91bfeed6e755aedd,2024-09-17T19:15:29.747000
|
||||
CVE-2024-8949,0,0,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832de3,2024-09-17T19:15:30.017000
|
||||
CVE-2024-8951,1,1,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000
|
||||
CVE-2024-8956,1,1,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000
|
||||
CVE-2024-8957,1,1,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000
|
||||
CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000
|
||||
CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000
|
||||
CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user