diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8760.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8760.json new file mode 100644 index 00000000000..5f86fbd01cf --- /dev/null +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8760.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8760", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T09:15:02.677", + "lastModified": "2024-10-12T09:15:02.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Stackable \u2013 Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to CSS Injection in all versions up to, and including, 3.13.6. This makes it possible for unauthenticated attackers to embed untrusted style information into comments resulting in a possibility of data exfiltration such as admin nonces with limited impact. These nonces could be used to perform CSRF attacks within a limited time window. The presence of other plugins may make additional nonces available, which may pose a risk in plugins that don't perform capability checks to protect AJAX actions or other actions reachable by lower-privileged users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3158674%40stackable-ultimate-gutenberg-blocks%2Ftrunk&old=3156448%40stackable-ultimate-gutenberg-blocks%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fd0b13c-7447-45da-9608-80b7629d9bbf?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8915.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8915.json new file mode 100644 index 00000000000..4470629f6ed --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8915.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-8915", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T09:15:02.950", + "lastModified": "2024-10-12T09:15:02.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Category Icon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/category-icon/trunk/category-icon.php#L437", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3167148/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/category-icon/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1dc4acdc-754f-4ee0-947d-ff0c277e8181?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9595.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9595.json new file mode 100644 index 00000000000..7a96333836c --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9595.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9595", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T09:15:03.230", + "lastModified": "2024-10-12T09:15:03.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TablePress \u2013 Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the table cell content in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3165531%40tablepress%2Ftrunk&old=3149006%40tablepress%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffa3b85c-7d08-4f6a-889e-b75620f72a1a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9696.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9696.json new file mode 100644 index 00000000000..915cc3079d1 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9696.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9696", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T09:15:03.590", + "lastModified": "2024-10-12T09:15:03.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Rescue Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rescue_tab' shortcode in all versions up to, and including, 2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3167329%40rescue-shortcodes&new=3167329%40rescue-shortcodes&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9517db1f-1704-4f25-9b02-795da3c4c067?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c1b024ac231..cfa29dbb743 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-12T08:00:16.800823+00:00 +2024-10-12T10:00:16.620153+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-12T07:15:02.820000+00:00 +2024-10-12T09:15:03.590000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265433 +265437 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `4` -- [CVE-2024-7489](CVE-2024/CVE-2024-74xx/CVE-2024-7489.json) (`2024-10-12T06:15:02.337`) -- [CVE-2024-9047](CVE-2024/CVE-2024-90xx/CVE-2024-9047.json) (`2024-10-12T07:15:02.170`) -- [CVE-2024-9187](CVE-2024/CVE-2024-91xx/CVE-2024-9187.json) (`2024-10-12T06:15:02.803`) -- [CVE-2024-9656](CVE-2024/CVE-2024-96xx/CVE-2024-9656.json) (`2024-10-12T06:15:03.077`) -- [CVE-2024-9670](CVE-2024/CVE-2024-96xx/CVE-2024-9670.json) (`2024-10-12T06:15:03.347`) -- [CVE-2024-9704](CVE-2024/CVE-2024-97xx/CVE-2024-9704.json) (`2024-10-12T07:15:02.570`) -- [CVE-2024-9756](CVE-2024/CVE-2024-97xx/CVE-2024-9756.json) (`2024-10-12T07:15:02.820`) -- [CVE-2024-9776](CVE-2024/CVE-2024-97xx/CVE-2024-9776.json) (`2024-10-12T06:15:03.640`) -- [CVE-2024-9778](CVE-2024/CVE-2024-97xx/CVE-2024-9778.json) (`2024-10-12T06:15:03.930`) -- [CVE-2024-9824](CVE-2024/CVE-2024-98xx/CVE-2024-9824.json) (`2024-10-12T06:15:04.230`) +- [CVE-2024-8760](CVE-2024/CVE-2024-87xx/CVE-2024-8760.json) (`2024-10-12T09:15:02.677`) +- [CVE-2024-8915](CVE-2024/CVE-2024-89xx/CVE-2024-8915.json) (`2024-10-12T09:15:02.950`) +- [CVE-2024-9595](CVE-2024/CVE-2024-95xx/CVE-2024-9595.json) (`2024-10-12T09:15:03.230`) +- [CVE-2024-9696](CVE-2024/CVE-2024-96xx/CVE-2024-9696.json) (`2024-10-12T09:15:03.590`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 25abc05baec..556ce1d1394 100644 --- a/_state.csv +++ b/_state.csv @@ -264038,7 +264038,7 @@ CVE-2024-7481,0,0,029caf1b5321966d6fff7b258f5edb21656af3703408123f2c0a2bb28c2a7f CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000 CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 -CVE-2024-7489,1,1,6bee47903e820549e5e90c739107dc8047ac1f65bad2428fe064821e77e6f9e3,2024-10-12T06:15:02.337000 +CVE-2024-7489,0,0,6bee47903e820549e5e90c739107dc8047ac1f65bad2428fe064821e77e6f9e3,2024-10-12T06:15:02.337000 CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000 CVE-2024-7491,0,0,a01b632cdea4b7de4f1d96a6110e5895a43b6bc1c1fcfe3f5789f97da5b84105,2024-09-26T13:32:02.803000 CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000 @@ -264956,6 +264956,7 @@ CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f19 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 CVE-2024-8755,0,0,d48cd781a066209d88f0be43bcbea7039d3c727125dd2ea2d4b21d6a406c14cf,2024-10-11T15:15:06.150000 CVE-2024-8758,0,0,fea72da3ec447aa80df355b080e42aa6b936f28594d975635bc512eef8e85985,2024-10-07T21:35:03.193000 +CVE-2024-8760,1,1,03352c1eb2ac9432712a82db712313c58c37383e2280bbd1ef44383c1d23d33f,2024-10-12T09:15:02.677000 CVE-2024-8761,0,0,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000 CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000 CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588dfe2,2024-09-20T12:31:20.110000 @@ -265027,6 +265028,7 @@ CVE-2024-8911,0,0,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89d CVE-2024-8912,0,0,cc754920a66c9505b940e8219b2e4d1d89e8006fc7a2b380aec11b363ea547b9,2024-10-11T19:15:11.110000 CVE-2024-8913,0,0,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 +CVE-2024-8915,1,1,3d7924a02140bffa633b7bd8d59b4b3fbe9f92ae6bde22761e2a4adcfdb52420,2024-10-12T09:15:02.950000 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 @@ -265099,7 +265101,7 @@ CVE-2024-9040,0,0,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff5008 CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000 CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000 CVE-2024-9046,0,0,ccf29b7f950c2068a983470342fd395555ea1d4320e405e4ca055421117646d1,2024-10-11T16:15:15 -CVE-2024-9047,1,1,236d4a938dbf8360d416199184100e319df421426259a181e4669f68aa2f4eed,2024-10-12T07:15:02.170000 +CVE-2024-9047,0,0,236d4a938dbf8360d416199184100e319df421426259a181e4669f68aa2f4eed,2024-10-12T07:15:02.170000 CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000 CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 CVE-2024-9051,0,0,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000 @@ -265173,7 +265175,7 @@ CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb5 CVE-2024-9174,0,0,70fba8b83f62f6c4709cde03a07baa90e2b7205b145527e48fd4fbdcbf5b21e3,2024-10-04T13:50:43.727000 CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000 CVE-2024-9180,0,0,9779e65e93417b197f46f5c463aa8866d46d5d3340da4da9b2b9c7085aba9dad,2024-10-10T21:15:05.010000 -CVE-2024-9187,1,1,2781007ebf5b70adc7be2615b0370144f38bf44011cf16033b8612315f867048,2024-10-12T06:15:02.803000 +CVE-2024-9187,0,0,2781007ebf5b70adc7be2615b0370144f38bf44011cf16033b8612315f867048,2024-10-12T06:15:02.803000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000 CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 @@ -265368,6 +265370,7 @@ CVE-2024-9581,0,0,dcdedf39f55e8b175c72a20e72a1aed92038e920265594b4fc9925b7183ce1 CVE-2024-9586,0,0,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000 CVE-2024-9587,0,0,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000 CVE-2024-9592,0,0,0f39969df8cdd7221e2f8596842e380d11b968fb83c9650c71ea7d95ce8c2502,2024-10-12T03:15:02.243000 +CVE-2024-9595,1,1,038cc18ae435612d58f078c33771272fd0e9d6928588729ef19a0045b7a00bbd,2024-10-12T09:15:03.230000 CVE-2024-9596,0,0,41f14771e651cbc1c37017cbe5a91040128a2c351e859a7b312163502a24a950,2024-10-10T12:51:56.987000 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 @@ -265378,17 +265381,18 @@ CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf7 CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000 CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 CVE-2024-9623,0,0,05eef687418519373d15ec19a86683cd7648219a76f4b58bf6e516098fb1b885,2024-10-10T12:51:56.987000 -CVE-2024-9656,1,1,a26feea40e7851e228d42b73e4b177c0c2083535fb7c5011d1e1dbc8247518bf,2024-10-12T06:15:03.077000 -CVE-2024-9670,1,1,467e4a0d60b3ea8b5613919329bb37afd090c0014621c671b410e31a2a2a3636,2024-10-12T06:15:03.347000 +CVE-2024-9656,0,0,a26feea40e7851e228d42b73e4b177c0c2083535fb7c5011d1e1dbc8247518bf,2024-10-12T06:15:03.077000 +CVE-2024-9670,0,0,467e4a0d60b3ea8b5613919329bb37afd090c0014621c671b410e31a2a2a3636,2024-10-12T06:15:03.347000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000 CVE-2024-9685,0,0,0533577bd5534b2238dda3fc39c720d3ca57598c0c892e8a746063784dfa2119,2024-10-10T12:51:56.987000 -CVE-2024-9704,1,1,eac985eabca9a3c6a15dbb5a4e611613c412ae3dd37df6667fc5aafbc6bc84d5,2024-10-12T07:15:02.570000 +CVE-2024-9696,1,1,a63df99df1f6813fb55c58d350483f24d63b6efd0cdffde98a71bd76ffa94a8e,2024-10-12T09:15:03.590000 +CVE-2024-9704,0,0,eac985eabca9a3c6a15dbb5a4e611613c412ae3dd37df6667fc5aafbc6bc84d5,2024-10-12T07:15:02.570000 CVE-2024-9707,0,0,5022899338c6a36d44072ae7018b6a919d11834b1f5740a300f73a64606c0150,2024-10-11T13:15:21.233000 -CVE-2024-9756,1,1,68b121e1aaaab7f10ceb18cbdb5136f7cd438a7e04d1f722b0583aec18b45115,2024-10-12T07:15:02.820000 -CVE-2024-9776,1,1,fd96ce126483e0639392cf2b3a5f9adb3f107706002f2ef2a96dfd4212d77df7,2024-10-12T06:15:03.640000 -CVE-2024-9778,1,1,70f493b0089ba6ea3e74556b332f92784788d5bac40eef0d2025e5998ec03b8d,2024-10-12T06:15:03.930000 +CVE-2024-9756,0,0,68b121e1aaaab7f10ceb18cbdb5136f7cd438a7e04d1f722b0583aec18b45115,2024-10-12T07:15:02.820000 +CVE-2024-9776,0,0,fd96ce126483e0639392cf2b3a5f9adb3f107706002f2ef2a96dfd4212d77df7,2024-10-12T06:15:03.640000 +CVE-2024-9778,0,0,70f493b0089ba6ea3e74556b332f92784788d5bac40eef0d2025e5998ec03b8d,2024-10-12T06:15:03.930000 CVE-2024-9780,0,0,64cb4b42f9787f95c4bcb2f0ffb7a4034eca385e970ac2bedc9fcd69728d3075,2024-10-10T12:51:56.987000 CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000 CVE-2024-9782,0,0,f6fdadb6173e6b1d6cefc02344a50956f97519ff0da6213ed752274ca4260d60,2024-10-10T12:51:56.987000 @@ -265426,7 +265430,7 @@ CVE-2024-9817,0,0,64961e55de2aecac95e692e2205c7e393510ae0087bb3b78e5af557801c488 CVE-2024-9818,0,0,4a540b8f9903a9b9420b63ef2490b163dd3b5219ef38e22237dcd7875973e6a1,2024-10-10T23:15:03.680000 CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000 CVE-2024-9822,0,0,d08d61a8f285dedd6e0156668251bfed17abd9d34a7fc326c5d7b2d904c03ab9,2024-10-11T03:15:10.967000 -CVE-2024-9824,1,1,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000 +CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000 CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000 CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000 CVE-2024-9859,0,0,4c2e27e83d096af209ad8d4a7ba60ec60caaadb1032a58969905b29c3c0c3d1f,2024-10-11T17:15:04.677000