mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-09-27T02:00:18.120216+00:00
This commit is contained in:
parent
ef97e92d12
commit
dca79c9595
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-2446",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-13T15:15:13.577",
|
||||
"lastModified": "2024-09-13T16:37:22.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T01:09:05.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.9.1",
|
||||
"matchCriteriaId": "B0A1EFC6-E6D8-4194-84FB-380C14664177"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3151053/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3555702-4427-4569-8fd6-f84113593e9d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0926",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-24T02:15:03.993",
|
||||
"lastModified": "2024-08-26T12:47:20.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T01:01:34.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,26 +81,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:samiahmedsiddiqui:custom_permalinks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.0",
|
||||
"matchCriteriaId": "426C2909-5B31-4FE2-BD34-0FE93CEE0A02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/samiahmedsiddiqui/custom-permalinks/pull/96",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3138206/custom-permalinks/trunk/admin/class-custom-permalinks-post-types-table.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3138206/custom-permalinks/trunk/admin/class-custom-permalinks-taxonomies-table.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/custom-permalinks/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97f8549a-292d-4a6d-8ec0-550467e5cf0f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5583",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-22T03:15:03.933",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T00:47:36.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.6.3",
|
||||
"matchCriteriaId": "28A4B4C8-3683-44F7-9916-E424129CBAD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.6/modules/widgets/tp_testimonial_listout.php#L2284",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/55981e72-8d1a-4075-a372-6bddc95e99d8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5869",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-13T15:15:15.610",
|
||||
"lastModified": "2024-09-13T16:37:22.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T01:06:16.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arnoldgoodway:neighborly:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4",
|
||||
"matchCriteriaId": "9509D086-0A66-4FAB-B176-276E79C4FD2E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/neighborly/1.4/inc/extras.php#L151",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f65834c6-6da7-4033-aa2a-a4926d6c955d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6870",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-22T10:15:05.620",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T00:52:03.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dfactory:responsive_lightbox:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.4.8",
|
||||
"matchCriteriaId": "5B4EC304-97DA-4442-8934-88FDAE1C23B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/responsive-lightbox/tags/2.4.7/includes/class-remote-library.php#L261",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3137531%40responsive-lightbox&new=3137531%40responsive-lightbox&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/responsive-lightbox/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4d55309-d178-4b3d-9de6-2cf2769b76fe?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7568",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-24T02:15:04.490",
|
||||
"lastModified": "2024-08-26T12:47:20.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T00:41:18.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1",
|
||||
"matchCriteriaId": "AD25634F-DF77-4192-AFC0-70242B138177"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3139340%40favicon-generator&new=3139340%40favicon-generator&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6eb3ad80-3510-4018-91af-b733ef62e28f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-7896",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-17T14:15:12.303",
|
||||
"lastModified": "2024-08-19T17:15:11.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T01:16:04.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tosei Online Store Management System \u30cd\u30c3\u30c8\u5e97\u8217\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability was found in Tosei Online Store Management System ??????????? 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E861BA-6DA0-406C-B610-038A8D505401"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0CA1252-1934-47A1-B72A-8274698F0E5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5927489-3F4C-4BE5-B473-35B5B6961CC8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274904",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274904",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.387131",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-7897",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-17T15:15:11.597",
|
||||
"lastModified": "2024-08-19T17:15:11.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T00:29:12.610",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Tosei Online Store Management System \u30cd\u30c3\u30c8\u5e97\u8217\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0 4.02/4.03/4.04. This affects an unknown part of the file /cgi-bin/tosei_kikai.php. The manipulation of the argument kikaibangou leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability classified as critical has been found in Tosei Online Store Management System ??????????? 4.02/4.03/4.04. This affects an unknown part of the file /cgi-bin/tosei_kikai.php. The manipulation of the argument kikaibangou leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei:online_store_management_system:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F2C67B8-502D-44D7-A85F-CC18050E44E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei:online_store_management_system:4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E130641F-958B-4683-9A8F-3A90015BB648"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei:online_store_management_system:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A44A20BE-91EC-42C7-B14E-12A37D55B754"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/b0rgch3n/bb47a1ed6f66c1e8c7a80f210f4ac8ef",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274905",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274905",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.387406",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-7898",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-17T18:15:04.250",
|
||||
"lastModified": "2024-08-19T15:15:09.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T00:34:27.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tosei Online Store Management System \u30cd\u30c3\u30c8\u5e97\u8217\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0 4.02/4.03/4.04. This vulnerability affects unknown code of the component Backend. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability classified as critical was found in Tosei Online Store Management System ??????????? 4.02/4.03/4.04. This vulnerability affects unknown code of the component Backend. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E861BA-6DA0-406C-B610-038A8D505401"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0CA1252-1934-47A1-B72A-8274698F0E5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5927489-3F4C-4BE5-B473-35B5B6961CC8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/b0rgch3n/3136cad95b09e42184fb2d78aae33651",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274906",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274906",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.386560",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-26T23:55:17.189694+00:00
|
||||
2024-09-27T02:00:18.120216+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-26T23:15:03.083000+00:00
|
||||
2024-09-27T01:16:04.337000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-09-26T00:00:08.640595+00:00
|
||||
2024-09-27T00:00:08.672806+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
@ -38,34 +38,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2024-40506](CVE-2024/CVE-2024-405xx/CVE-2024-40506.json) (`2024-09-26T22:15:03.770`)
|
||||
- [CVE-2024-40507](CVE-2024/CVE-2024-405xx/CVE-2024-40507.json) (`2024-09-26T22:15:03.880`)
|
||||
- [CVE-2024-40508](CVE-2024/CVE-2024-405xx/CVE-2024-40508.json) (`2024-09-26T22:15:03.963`)
|
||||
- [CVE-2024-4099](CVE-2024/CVE-2024-40xx/CVE-2024-4099.json) (`2024-09-26T23:15:02.873`)
|
||||
- [CVE-2024-47076](CVE-2024/CVE-2024-470xx/CVE-2024-47076.json) (`2024-09-26T22:15:04.063`)
|
||||
- [CVE-2024-47175](CVE-2024/CVE-2024-471xx/CVE-2024-47175.json) (`2024-09-26T22:15:04.283`)
|
||||
- [CVE-2024-47176](CVE-2024/CVE-2024-471xx/CVE-2024-47176.json) (`2024-09-26T22:15:04.497`)
|
||||
- [CVE-2024-47177](CVE-2024/CVE-2024-471xx/CVE-2024-47177.json) (`2024-09-26T22:15:04.740`)
|
||||
- [CVE-2024-8974](CVE-2024/CVE-2024-89xx/CVE-2024-8974.json) (`2024-09-26T23:15:03.083`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `9`
|
||||
|
||||
- [CVE-2023-3774](CVE-2023/CVE-2023-37xx/CVE-2023-3774.json) (`2024-09-26T22:15:03.190`)
|
||||
- [CVE-2023-3775](CVE-2023/CVE-2023-37xx/CVE-2023-3775.json) (`2024-09-26T22:15:03.333`)
|
||||
- [CVE-2023-41094](CVE-2023/CVE-2023-410xx/CVE-2023-41094.json) (`2024-09-26T22:15:03.453`)
|
||||
- [CVE-2023-5077](CVE-2023/CVE-2023-50xx/CVE-2023-5077.json) (`2024-09-26T22:15:03.630`)
|
||||
- [CVE-2023-6987](CVE-2023/CVE-2023-69xx/CVE-2023-6987.json) (`2024-09-26T22:34:54.020`)
|
||||
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-09-26T23:15:02.303`)
|
||||
- [CVE-2024-2254](CVE-2024/CVE-2024-22xx/CVE-2024-2254.json) (`2024-09-26T22:36:20.803`)
|
||||
- [CVE-2024-6499](CVE-2024/CVE-2024-64xx/CVE-2024-6499.json) (`2024-09-26T22:07:50.040`)
|
||||
- [CVE-2024-7778](CVE-2024/CVE-2024-77xx/CVE-2024-7778.json) (`2024-09-26T22:22:04.053`)
|
||||
- [CVE-2024-7848](CVE-2024/CVE-2024-78xx/CVE-2024-7848.json) (`2024-09-26T22:12:13.457`)
|
||||
- [CVE-2024-8241](CVE-2024/CVE-2024-82xx/CVE-2024-8241.json) (`2024-09-26T22:03:42.123`)
|
||||
- [CVE-2022-2446](CVE-2022/CVE-2022-24xx/CVE-2022-2446.json) (`2024-09-27T01:09:05.217`)
|
||||
- [CVE-2023-0926](CVE-2023/CVE-2023-09xx/CVE-2023-0926.json) (`2024-09-27T01:01:34.407`)
|
||||
- [CVE-2024-5583](CVE-2024/CVE-2024-55xx/CVE-2024-5583.json) (`2024-09-27T00:47:36.233`)
|
||||
- [CVE-2024-5869](CVE-2024/CVE-2024-58xx/CVE-2024-5869.json) (`2024-09-27T01:06:16.247`)
|
||||
- [CVE-2024-6870](CVE-2024/CVE-2024-68xx/CVE-2024-6870.json) (`2024-09-27T00:52:03.737`)
|
||||
- [CVE-2024-7568](CVE-2024/CVE-2024-75xx/CVE-2024-7568.json) (`2024-09-27T00:41:18.483`)
|
||||
- [CVE-2024-7896](CVE-2024/CVE-2024-78xx/CVE-2024-7896.json) (`2024-09-27T01:16:04.337`)
|
||||
- [CVE-2024-7897](CVE-2024/CVE-2024-78xx/CVE-2024-7897.json) (`2024-09-27T00:29:12.610`)
|
||||
- [CVE-2024-7898](CVE-2024/CVE-2024-78xx/CVE-2024-7898.json) (`2024-09-27T00:34:27.567`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
58
_state.csv
58
_state.csv
@ -193525,7 +193525,7 @@ CVE-2022-24455,0,0,0fb7c21ac75f75938680ed09dda51b20cb3573772bdc895d70f7ef8ad0226
|
||||
CVE-2022-24456,0,0,3a5918be8844381214efd750f753f78e48866fbe1cfd85e666e644d514514ee7,2023-06-29T02:15:12.580000
|
||||
CVE-2022-24457,0,0,35d52b6f302a0bb51566e5f0fbc919a388c2caddf6f5007dbd51189d2bd5397b,2023-06-29T02:15:12.663000
|
||||
CVE-2022-24459,0,0,a6b15bf693b75b7e2547a916decc70ccc75d121cc9d03247b3268550b6dc4bec,2023-08-08T14:22:24.967000
|
||||
CVE-2022-2446,0,0,26e6c7c4be591918013590d0e43fc390c1495aab4f0a5d65af35081ac51fab40,2024-09-13T16:37:22.997000
|
||||
CVE-2022-2446,0,1,cd7dd4392ecd879e509f187b530648727687076da6b2c535eb1d9f8157986886,2024-09-27T01:09:05.217000
|
||||
CVE-2022-24460,0,0,1e74b7222b0a6dafaa9a37f6e488816f554b2ca0456998e3af8476dd378d6c73,2023-08-08T14:22:24.967000
|
||||
CVE-2022-24461,0,0,ca67b7157b3e2eb56e5ee53d32f0f837ebc78b56c637774b4668de5f691ccbb9,2023-06-29T02:15:12.927000
|
||||
CVE-2022-24462,0,0,19506a0ad28ee8acac05aef6dd9555ec838e7d14b760f7762f2e85672b7ea6e0,2023-06-29T02:15:13.013000
|
||||
@ -213478,7 +213478,7 @@ CVE-2023-0922,0,0,e88363014fa03af766b81b29e87eb2a194c0e5b92a435d6d515221384ade58
|
||||
CVE-2023-0923,0,0,44dbf287658de483b7aae4b4ab4b93985a3f4a4e13a42b0866850d85395be8ab,2024-05-03T16:15:09.933000
|
||||
CVE-2023-0924,0,0,1c1c931ffe53d33cd77240221e3d9bd41c2d7a127f33b78399f18f146604e7ed,2023-11-07T04:01:56.437000
|
||||
CVE-2023-0925,0,0,4b2d3d1a23856c0a21902846c10a74c9d1c5bad5a1e8e0c6c1607e19da19aa9d,2023-11-07T04:01:56.647000
|
||||
CVE-2023-0926,0,0,9cb072de71712046484c44d0f940be51e8f4f8920b2e8433b6076302ae45769e,2024-08-26T12:47:20.187000
|
||||
CVE-2023-0926,0,1,4e50daef563561009e2736d35d770281206dfa42abe8d38a838272cf17990583,2024-09-27T01:01:34.407000
|
||||
CVE-2023-0927,0,0,48a3a17a5dd2e86be25ab4ded50c67ab57c24719ee93a0ab099f778f14fc0ea8,2023-10-26T19:58:09.573000
|
||||
CVE-2023-0928,0,0,870d522ea101c5c048031d09aa6ee4f91095da0f4ce0c9a7aaa8873d494878e3,2023-10-26T19:58:05.803000
|
||||
CVE-2023-0929,0,0,d6c0a1f7fef7eae178af90037b7fce08b6752100c90d127655c45ffe6c055088,2023-10-20T20:40:15.977000
|
||||
@ -228389,14 +228389,14 @@ CVE-2023-37732,0,0,18690bbd0f89c1e947931dd2910257c9bba69f42c70050ab3fda22f63381c
|
||||
CVE-2023-37733,0,0,e8ceedae410227aca6e76228ee82909725cbd4cbaaa63c0bfa541bec989ff65d,2023-07-26T21:05:38.297000
|
||||
CVE-2023-37734,0,0,21e0e5059ce8e7972e9057bc21c041f1cc4302c31104916324de291e6fea166b,2023-11-07T04:17:02.450000
|
||||
CVE-2023-37739,0,0,8ddb59849c608a8c82d775547acadd48123d9869a8d4858363ac1e6e340d6041,2023-11-07T04:17:03.387000
|
||||
CVE-2023-3774,0,1,4e8bf99e7542e33f087170ae084325e4049cd7129b244f881491710a91450065,2024-09-26T22:15:03.190000
|
||||
CVE-2023-3774,0,0,4e8bf99e7542e33f087170ae084325e4049cd7129b244f881491710a91450065,2024-09-26T22:15:03.190000
|
||||
CVE-2023-37742,0,0,3772bfd38caa3cca5f325b133a1991c41e71063d3378638b6b1f884662a8c37f,2023-07-27T18:07:19.663000
|
||||
CVE-2023-37743,0,0,10b34b170bfcaabc309a4dea16ca358eb31ed45ac9709bbf679673b6f3b49a13,2023-12-20T20:08:49.497000
|
||||
CVE-2023-37744,0,0,fe579bbb44d48168ac14972479d8f78bc1b575c19d00339893f9d8e272b50543,2023-11-14T22:04:44.023000
|
||||
CVE-2023-37745,0,0,9fca12999a2bc7931558814468756335e7ce94a96f5c1f172e759a9a286b5ed1,2023-11-14T22:04:44.023000
|
||||
CVE-2023-37746,0,0,744653f859b7f5ae4af51dc0fe26c700fa6ee10e8c0bfe9fbd9b153aff0b70d1,2023-11-14T22:04:44.023000
|
||||
CVE-2023-37748,0,0,fe3292814d6eb6ef7daa04d548913c26267dfb582cb08a7edce03729ff0a4cd6,2023-07-28T14:55:24.540000
|
||||
CVE-2023-3775,0,1,6240887eb14b51afa526443a7c7f5735d5eac8ded5553c58fa4e57c90e91b5b4,2024-09-26T22:15:03.333000
|
||||
CVE-2023-3775,0,0,6240887eb14b51afa526443a7c7f5735d5eac8ded5553c58fa4e57c90e91b5b4,2024-09-26T22:15:03.333000
|
||||
CVE-2023-37754,0,0,b3829a581f7950b491665b05fd3f01b225d41bf43853ed2cc1cc851da84e210d,2023-08-03T18:11:04.527000
|
||||
CVE-2023-37755,0,0,d7feac74f9cc218d5cfafa14ebddafd6f21d084107f2ae84d69e367dde916dff,2023-11-07T04:17:04.463000
|
||||
CVE-2023-37756,0,0,669162a115e862f67140188330b7c4e9110f3ad42f860c18393f51efb7d8a57f,2023-11-07T04:17:05.383000
|
||||
@ -231103,7 +231103,7 @@ CVE-2023-41090,0,0,4d5c0fd4d0575727f0bf2946f5c84c3a5bcfcb1a4c5d3adb384d0b3490f6a
|
||||
CVE-2023-41091,0,0,ca1acbfbb48698a0030abb208f0760a15256e3fda004078e03e1a216b077f0fa,2024-02-14T15:01:46.050000
|
||||
CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000
|
||||
CVE-2023-41093,0,0,e2ec8ffe14945965701d15ef17979727c54dc987034806d91272b18047967a11,2024-09-10T16:19:41.973000
|
||||
CVE-2023-41094,0,1,f19259e18ee5ecc21aebc175659559c20ae9ee22625a898f985fcca4d69d87b5,2024-09-26T22:15:03.453000
|
||||
CVE-2023-41094,0,0,f19259e18ee5ecc21aebc175659559c20ae9ee22625a898f985fcca4d69d87b5,2024-09-26T22:15:03.453000
|
||||
CVE-2023-41095,0,0,177941878e5bb1653ee1f949f20555c382f90ba02321d0d46d323e9050a11155,2024-09-25T17:15:14.257000
|
||||
CVE-2023-41096,0,0,bd326ec60943b89decd659139c45be416116554e0e19a59832973f2d01e7d744,2024-09-25T17:15:14.380000
|
||||
CVE-2023-41097,0,0,0436ef672b193d9878984b4d43ea4e89fc5377ce41f01664c7f484a6cd337884,2024-09-25T17:15:14.483000
|
||||
@ -237767,7 +237767,7 @@ CVE-2023-50766,0,0,e17724b5fd94a06b700d30628021b2af9b0a38d92d904a8023202e456b862
|
||||
CVE-2023-50767,0,0,12c0bb735e4804a7f62ba2fd19ac33e875fc23a26bfed4495a69935746a1a8bc,2023-12-18T18:19:52.590000
|
||||
CVE-2023-50768,0,0,a14ce2c566268d7795db7864005ac678e5f82247de8caf997643b04b287d74c1,2023-12-18T18:18:11.293000
|
||||
CVE-2023-50769,0,0,173e2fc8312f1862b75291d0be8a26f7f7ec0cdf4bef05369468b3a9c1eea401,2023-12-18T18:17:24.077000
|
||||
CVE-2023-5077,0,1,43b37b63f96dfb1b9dffea726f6e4ae0e1687271ae283d488d8e70c20f9a3664,2024-09-26T22:15:03.630000
|
||||
CVE-2023-5077,0,0,43b37b63f96dfb1b9dffea726f6e4ae0e1687271ae283d488d8e70c20f9a3664,2024-09-26T22:15:03.630000
|
||||
CVE-2023-50770,0,0,2ca9b469cdfb011d152b199cdfebfc00d96275655213810972f96f404420a080,2023-12-18T18:08:39.403000
|
||||
CVE-2023-50771,0,0,808bc32ffb602c63fb33efcd73eadfa332430d68878f76a3f46b4e8da58b03e4,2023-12-18T17:59:04.007000
|
||||
CVE-2023-50772,0,0,8306f592dda0b9fee6e8eee7b72b3bea8ec427ebb65d99fc626720ab16916155,2023-12-18T17:12:57.847000
|
||||
@ -240980,7 +240980,7 @@ CVE-2023-6983,0,0,9bb17bb43513198b09baed08b06b563f410b7877b78a327f682b670ff2d038
|
||||
CVE-2023-6984,0,0,95e53ad3082089315ce478672330f2fb1a0b35ace6a3af51b62b497961afccdd,2024-01-09T20:31:06.297000
|
||||
CVE-2023-6985,0,0,0a6e72eeba37236b49b3d5673a2b7307f78ed31c2d1e923141cde22b0f76d7f8,2024-02-13T18:33:20.830000
|
||||
CVE-2023-6986,0,0,b98ac7e8ecf09abe48d97bc78f56f1ca29647e66fc7bd9cc3a8dab51e9c4cb87,2024-01-10T16:52:07.623000
|
||||
CVE-2023-6987,0,1,a195183b65d4dc1994dc80e822285576eae2f209ac385e57f569d11f44966ebf,2024-09-26T22:34:54.020000
|
||||
CVE-2023-6987,0,0,a195183b65d4dc1994dc80e822285576eae2f209ac385e57f569d11f44966ebf,2024-09-26T22:34:54.020000
|
||||
CVE-2023-6988,0,0,47aafcb676e1a091b533016a9967a0d8ba6d954019e0193c5a2ab40435d75ad8,2024-01-18T17:13:30.383000
|
||||
CVE-2023-6989,0,0,59d996ae67710cbe1732e95c5506bc554c15ae0c6fab12dfa7b2d96a1c208ea2,2024-02-13T15:23:09.840000
|
||||
CVE-2023-6990,0,0,6d6ca20a9223d0924e515a33c4a22954541cdfc6c34a10ac8cfd77904d6d36c1,2024-01-18T17:34:58.227000
|
||||
@ -242496,7 +242496,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d
|
||||
CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,1,172dbe985a0369798f3ae32519973258f77064a54d4514f3f348e4104e26ea42,2024-09-26T23:15:02.303000
|
||||
CVE-2024-1394,0,0,172dbe985a0369798f3ae32519973258f77064a54d4514f3f348e4104e26ea42,2024-09-26T23:15:02.303000
|
||||
CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000
|
||||
CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000
|
||||
@ -244932,7 +244932,7 @@ CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba7
|
||||
CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000
|
||||
CVE-2024-22532,0,0,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000
|
||||
CVE-2024-22533,0,0,85338afee49dae9d2d34419392208a0e08c059f930c68060a5bc4d947f64730e,2024-02-10T04:09:13.303000
|
||||
CVE-2024-2254,0,1,c2cf1416e067a5aeecbbf5782d825e3aa9fb97314a67bb5415a288cc55099a97,2024-09-26T22:36:20.803000
|
||||
CVE-2024-2254,0,0,c2cf1416e067a5aeecbbf5782d825e3aa9fb97314a67bb5415a288cc55099a97,2024-09-26T22:36:20.803000
|
||||
CVE-2024-22543,0,0,b1a889b0e18be55a9638cd371ddf76030836a5edd3b6465766a28cf814e1ba4e,2024-08-16T17:35:03.823000
|
||||
CVE-2024-22544,0,0,c83930b3fd617d56b4e76bf97e8edd2a7a4295e7011794060244a8c71ee5f812,2024-08-01T13:46:59.453000
|
||||
CVE-2024-22545,0,0,68df59d7f199c8b9a762129a9a26d5183a0bcd88eec159e4a975bd0c437f8e2d,2024-03-05T18:15:48.443000
|
||||
@ -257263,9 +257263,9 @@ CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d
|
||||
CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000
|
||||
CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000
|
||||
CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000
|
||||
CVE-2024-40506,1,1,50ff1b9d534c58546140d019d524853625251e6e08a2d14d7d8fc96e336df5ec,2024-09-26T22:15:03.770000
|
||||
CVE-2024-40507,1,1,613a1bd4f36a99780d11c648a9da0c130a6c3a3c4806b54e25f249d2a4df7639,2024-09-26T22:15:03.880000
|
||||
CVE-2024-40508,1,1,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000
|
||||
CVE-2024-40506,0,0,50ff1b9d534c58546140d019d524853625251e6e08a2d14d7d8fc96e336df5ec,2024-09-26T22:15:03.770000
|
||||
CVE-2024-40507,0,0,613a1bd4f36a99780d11c648a9da0c130a6c3a3c4806b54e25f249d2a4df7639,2024-09-26T22:15:03.880000
|
||||
CVE-2024-40508,0,0,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000
|
||||
CVE-2024-40515,0,0,d91b9531ef5ed5978894d52371df8275215aaf629121566b57a4e661954c33e9,2024-08-01T13:57:33.567000
|
||||
CVE-2024-40516,0,0,aed239a0d38ccfd87fd9b80e3f289cfeb35e1a0ac4b960ecd30c2aa738783f2c,2024-08-01T13:57:34.333000
|
||||
CVE-2024-40518,0,0,bbc8a85aaa975d14f5cd2cd0045fd3aa844f2bf8933730369940256a4cf29a05,2024-08-01T13:57:35.120000
|
||||
@ -257614,7 +257614,7 @@ CVE-2024-40986,0,0,e11c6af819396a110129f1e7859e06c0772bed04c3fb1bbbaea29870bb8d4
|
||||
CVE-2024-40987,0,0,bd162da49fe1fb86bcc7ce9143288253658754ac905f49dbeb8377eff94c5a38,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40988,0,0,fee50aa21ac1f7599bace66ea0a5b4dd99eddaf99acede81ddb3e4c91a447b9e,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40989,0,0,2f3227e456cf3b119ccfa262dfec37e99ce70cb4da10bde2d819344e6e1324eb,2024-07-12T16:34:58.687000
|
||||
CVE-2024-4099,1,1,00bf42274a8b997f1b78babdd12a83899a1c4db5d30529b6ef2229935a4db7d1,2024-09-26T23:15:02.873000
|
||||
CVE-2024-4099,0,0,00bf42274a8b997f1b78babdd12a83899a1c4db5d30529b6ef2229935a4db7d1,2024-09-26T23:15:02.873000
|
||||
CVE-2024-40990,0,0,cd4ca053a0ec5d11c69e407da176119a515b6b0abc494934cf9d76e0e1606550,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40991,0,0,ec2ddb2f3ffaaab4f22b585138329157aff6badf22f9c0dc433ce0a15fb727e1,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40992,0,0,59330320f1c372354ad798dc40538850329b5c6373bec47c4461455ccd576b86,2024-07-12T16:34:58.687000
|
||||
@ -260578,7 +260578,7 @@ CVE-2024-47068,0,0,9fa18205ed6db75eac8827f604c295b45fb5105b39b9b04ec6642eaaaf0df
|
||||
CVE-2024-47069,0,0,de213caeb9a769191162a97261070a3d98c902d6acfdcac434afd1818328a8ff,2024-09-26T13:32:55.343000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-47075,0,0,a4c707482ed9ed15f197cc08f0fd770eba503eb24d934030135a9caa3e32073c,2024-09-26T18:15:08.757000
|
||||
CVE-2024-47076,1,1,4303df594e4b2557b464094d9194eb22d685492e61c9a7849614bf245ae949d0,2024-09-26T22:15:04.063000
|
||||
CVE-2024-47076,0,0,4303df594e4b2557b464094d9194eb22d685492e61c9a7849614bf245ae949d0,2024-09-26T22:15:04.063000
|
||||
CVE-2024-47078,0,0,64213b6a5c750c509872d49c1274178c839b92046b4e8257c5790cb7b4a5d616,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
|
||||
CVE-2024-47082,0,0,863bd134b5e2e2c07206cfa4641c79a7f77a6df89fcd648b7374dfe92c23c92f,2024-09-26T13:32:02.803000
|
||||
@ -260615,9 +260615,9 @@ CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691a
|
||||
CVE-2024-47170,0,0,fe4d13cf77d513f35ba2853821b8e2ae8222bd4eed1fa1e6b09b0cddf4424717,2024-09-26T18:15:10.370000
|
||||
CVE-2024-47171,0,0,08a80451561ba5bbd5c611d866676ab79cf9777345aa0dcce4bf15d17a3b3559,2024-09-26T18:15:10.590000
|
||||
CVE-2024-47174,0,0,a9e224a534d1dc1418acac6fb1d9c84f8610e405f9c48f2cb604b84073ae235a,2024-09-26T18:15:10.840000
|
||||
CVE-2024-47175,1,1,0b42a73e9b3c9ee1c8a433b8f55adfec0615c0b3f1a75ff38be6b0ea39353dfa,2024-09-26T22:15:04.283000
|
||||
CVE-2024-47176,1,1,fd5df7e91e50706bec9dd5d8b4c6da50748e95ace1a3171c59677a6deebee8b2,2024-09-26T22:15:04.497000
|
||||
CVE-2024-47177,1,1,4693ff070f9f11940b1b6fa608419c33ee06a3d35c330a56c23ddcccb6e86a77,2024-09-26T22:15:04.740000
|
||||
CVE-2024-47175,0,0,0b42a73e9b3c9ee1c8a433b8f55adfec0615c0b3f1a75ff38be6b0ea39353dfa,2024-09-26T22:15:04.283000
|
||||
CVE-2024-47176,0,0,fd5df7e91e50706bec9dd5d8b4c6da50748e95ace1a3171c59677a6deebee8b2,2024-09-26T22:15:04.497000
|
||||
CVE-2024-47177,0,0,4693ff070f9f11940b1b6fa608419c33ee06a3d35c330a56c23ddcccb6e86a77,2024-09-26T22:15:04.740000
|
||||
CVE-2024-47179,0,0,9058d44736aa5879fe15ebac05ddf4897c6368571c116083074f73c4d934c6d8,2024-09-26T20:15:06.950000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-47180,0,0,d098d674c2c5dd84a239cf91df06907f039b4828c306456dcad3f506e675b516,2024-09-26T20:15:07.310000
|
||||
@ -261402,7 +261402,7 @@ CVE-2024-5575,0,0,1d8c4bc7bfefa9359f03236311a531b02997d0972adc424dea9dbc344e7a3d
|
||||
CVE-2024-5576,0,0,fb4e227ac1bca19b4b9b0346951bcae4e9457605b7b3160f8ccda6cb8cea0d35,2024-08-20T15:44:20.567000
|
||||
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
|
||||
CVE-2024-5583,0,0,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000
|
||||
CVE-2024-5583,0,1,ade347dd1ad43ece826c5e86f2da2c910a5ba35590f61bd781f2121412e26d71,2024-09-27T00:47:36.233000
|
||||
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,0,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000
|
||||
CVE-2024-5586,0,0,0ee3a32a0a5dc88926ac745a2d0659b1dc6bdda8e4833fd7b551018aeccce302,2024-08-27T14:37:06.513000
|
||||
@ -261649,7 +261649,7 @@ CVE-2024-5865,0,0,138ff35d750b8e07b0e092128feaf723949a6c208cd5aaf580ee8e55695a14
|
||||
CVE-2024-5866,0,0,dcb091b491607b6fa4e644115dbd76fe9fe06b2f0bf1b83685c3a237070dac5b,2024-08-29T20:06:39.417000
|
||||
CVE-2024-5867,0,0,3ef97320b25dfc481542075f2d474026ae8723fcacaaf511d6bfac8913f2af32,2024-09-26T20:32:27.483000
|
||||
CVE-2024-5868,0,0,9a8536b47a27c25b7062405f8aad2263147d3121835e9d2d4eb9b37e61c344ed,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5869,0,0,705d93efe497604ab060a75ac47ccd177b11eb69db78ec395cace6ac685dea62,2024-09-13T16:37:22.997000
|
||||
CVE-2024-5869,0,1,ac31123050953cab453d946d356cff9b3bf190017120885c260ec74e1adab440,2024-09-27T01:06:16.247000
|
||||
CVE-2024-5870,0,0,0aa695d89cdd655a437917c8eab40c3a3800f26a0b20313868860e15514c1912,2024-09-26T20:24:16.813000
|
||||
CVE-2024-5871,0,0,bfc23a1063e8c2c3d98988ddd8df8ea7002d8802bf04bd4c0c941cb9250f6a3f,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000
|
||||
@ -262177,7 +262177,7 @@ CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d9
|
||||
CVE-2024-6496,0,0,4f2145d6969061de095037c65c4c02c00a89d2331ecd0d31a6eacfc030927f42,2024-08-07T14:35:07.403000
|
||||
CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6498,0,0,1ed281221bc697855933115a42dfe940bdc52a0072d0e3695abed7f798c88ab5,2024-09-06T17:35:19.293000
|
||||
CVE-2024-6499,0,1,5aefcf3098945d08365a478f93189a0b1b6a19cac1228ed97908dfeeb06cd006,2024-09-26T22:07:50.040000
|
||||
CVE-2024-6499,0,0,5aefcf3098945d08365a478f93189a0b1b6a19cac1228ed97908dfeeb06cd006,2024-09-26T22:07:50.040000
|
||||
CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000
|
||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||
CVE-2024-6502,0,0,7304740865a2d9646b306af4eab2981d10cf59323822892a921ddddc4962ea79,2024-09-11T16:49:28.650000
|
||||
@ -262462,7 +262462,7 @@ CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b3563
|
||||
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
|
||||
CVE-2024-6867,0,0,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000
|
||||
CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000
|
||||
CVE-2024-6870,0,1,b8787438d65804a2db5bbc8c04084c34ae58bc1819956a7afefdca8ed2b91985,2024-09-27T00:52:03.737000
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
|
||||
CVE-2024-6874,0,0,805a0b27cbdf811d96209b292e2d5909e967f9d3161226db1f6fe45d6b995555,2024-09-10T15:27:04.190000
|
||||
@ -262995,7 +262995,7 @@ CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785
|
||||
CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9cd1,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000
|
||||
CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8dfa6,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7568,0,0,d240e1c33af9e03c75feb4937b0ddf33906a854d9c30167cff3fa79482350e46,2024-08-26T12:47:20.187000
|
||||
CVE-2024-7568,0,1,fc850c4dc7382eb1c532a12fdb074c868e94a69ea2940a03f3f65bba93f8ff11,2024-09-27T00:41:18.483000
|
||||
CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000
|
||||
CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
|
||||
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
|
||||
@ -263156,7 +263156,7 @@ CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25
|
||||
CVE-2024-7772,0,0,c8a2214184ae5302e25d01656ca4793d6f8521697bc26b9cba85e2932172367a,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000
|
||||
CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000
|
||||
CVE-2024-7778,0,1,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000
|
||||
CVE-2024-7778,0,0,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000
|
||||
CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000
|
||||
CVE-2024-7781,0,0,82f0f06f464f4c11f034a45b76a02bf3fd17c439601993902c095779d8e71986,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000
|
||||
@ -263207,7 +263207,7 @@ CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca18
|
||||
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
|
||||
CVE-2024-7845,0,0,2b4134672992a5057330a35c489891fcdc0ff66c466c2c96e09ea314c06bb030,2024-09-26T15:10:57.870000
|
||||
CVE-2024-7846,0,0,8e15bdd83a5e179d37b373daa0289519d9b1688a7106bd69b16fbadef1928218,2024-09-26T13:32:55.343000
|
||||
CVE-2024-7848,0,1,b79248ef369f661dc93f45ab33fbf95a9110e81107fbfafbebe6c98477861dfa,2024-09-26T22:12:13.457000
|
||||
CVE-2024-7848,0,0,b79248ef369f661dc93f45ab33fbf95a9110e81107fbfafbebe6c98477861dfa,2024-09-26T22:12:13.457000
|
||||
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7851,0,0,59aa43af6902d4a788d7da1730827e642c78bd3a9a790eb7c6cdc9cf8851f000,2024-08-29T15:22:08.227000
|
||||
@ -263240,9 +263240,9 @@ CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b
|
||||
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
|
||||
CVE-2024-7892,0,0,5a17e6dc4af3f458d953d43b60adeccfeda5ed35899ab1d0e75c745409ad436e,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000
|
||||
CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000
|
||||
CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000
|
||||
CVE-2024-7898,0,0,8c09771630e516b5f0f9a153f946d68f8ead0f340784a4987dcbcd7e91566a30,2024-08-19T15:15:09.297000
|
||||
CVE-2024-7896,0,1,686b3ea8f40cbfa59e9c8aaf3bfed43f8c67199d511134e228c788725cd05d9d,2024-09-27T01:16:04.337000
|
||||
CVE-2024-7897,0,1,09383529a14f6af8e39b162e2647e16d5c6e13b17bcee383d4501a3a3cd9b09a,2024-09-27T00:29:12.610000
|
||||
CVE-2024-7898,0,1,60d26204e6e46a5cc119a358c72debd6f618b28c5e027a10bdabcf97a0713c81,2024-09-27T00:34:27.567000
|
||||
CVE-2024-7899,0,0,cfb034d584ec57c54a452952f1e9ea5328fa16a087f468358eb1f83d95f5ebde,2024-08-20T19:32:22.207000
|
||||
CVE-2024-7900,0,0,e30c4c9c97e9fe61d4511d7f217dd466c54cc5f7234e763e2e8a56588b7c11ab,2024-08-20T19:32:15.573000
|
||||
CVE-2024-7901,0,0,690690bcb0644869d1d05b72dee845ecd30f8d7264eaf6d922f2f706b8b6819a,2024-08-20T19:32:53.300000
|
||||
@ -263471,7 +263471,7 @@ CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd
|
||||
CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8235,0,0,98b75635820a87efbdd2b77979ec96dd3fdeb5e53f45b0aed13f360f5eadfbaa,2024-09-25T18:56:19.090000
|
||||
CVE-2024-8241,0,1,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000
|
||||
CVE-2024-8241,0,0,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000
|
||||
CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
|
||||
CVE-2024-8246,0,0,bdaeed559e2a925d1cf782bec3165b97ce80a327963423b92b0db3cfac285297,2024-09-26T14:00:09.783000
|
||||
CVE-2024-8247,0,0,fcbdec6a2008dfeaed8390f987d382af34f3ecfe1f1962e571c7da897df6ef15,2024-09-26T21:49:54.290000
|
||||
@ -263830,7 +263830,7 @@ CVE-2024-8956,0,0,469912f1c3a233b9c6103ff1ea98b03260e653e6a7cf65fa430bb18bb060e2
|
||||
CVE-2024-8957,0,0,479bb87a5ce094312d7bf571ad4a1b1d6922673dde5733f096aa7041bc35da67,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000
|
||||
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8974,1,1,26ac7fe97d711c6c7291aa307faa66606548d67509cefc5366462d6f4ecc6d3c,2024-09-26T23:15:03.083000
|
||||
CVE-2024-8974,0,0,26ac7fe97d711c6c7291aa307faa66606548d67509cefc5366462d6f4ecc6d3c,2024-09-26T23:15:03.083000
|
||||
CVE-2024-8975,0,0,a2beb9ac88df273c47e0fcc3ef47b5e42686ea2e8e78701b5e0748ded0bed0e2,2024-09-26T17:15:04.283000
|
||||
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8996,0,0,98127d05f9d21e990cd3f25f52ac884c3b968a9f9fe294830d657f5707b05245,2024-09-26T17:15:04.373000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user