diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9592.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9592.json new file mode 100644 index 00000000000..9689a0287c9 --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9592.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9592", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T03:15:02.243", + "lastModified": "2024-10-12T03:15:02.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy PayPal Gift Certificate plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the 'wpppgc_plugin_options' function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/paypal-gift-certificate/tags/1.2.3/paypal-gift-certificate.php#L200", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72880e44-b0e0-47f4-82f0-c36c81091ba8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9821.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9821.json new file mode 100644 index 00000000000..eb054757939 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9821.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9821", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T03:15:02.507", + "lastModified": "2024-10-12T03:15:02.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the 'stm_wpcfto_get_settings' AJAX action in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to view the Telegram Bot Token, a secret token used to control the bot, which can then be used to log in as any existing user on the site, such as an administrator, if they know the username, due to the Login with Telegram feature." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/bot-for-telegram-on-woocommerce/trunk/nuxy/helpers/helpers.php?rev=2575772#L54", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a662c904-ba2e-494c-a603-b22eeeddf43d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9860.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9860.json new file mode 100644 index 00000000000..5ee250cae9e --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9860.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9860", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-12T03:15:02.757", + "lastModified": "2024-10-12T03:15:02.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Bridge Core plugin for WordPress is vulnerable to unauthorized modification of data or loss of data due to a missing capability check on the 'import_action' and 'install_plugin_per_demo' functions in versions up to, and including, 3.3. This makes it possible for authenticated attackers with subscriber-level permissions or above, to delete or change plugin settings, import demo data, and install limited plugins." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://themeforest.net/item/bridge-creative-multipurpose-wordpress-theme/7315054", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/968d5d31-2592-4bed-9d18-5877f0d6062e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 14ab28c2525..ae5234833e7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-11T23:55:17.536248+00:00 +2024-10-12T04:00:18.152634+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-11T22:35:00.770000+00:00 +2024-10-12T03:15:02.757000+00:00 ``` ### Last Data Feed Release @@ -27,43 +27,28 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-10-11T00:00:08.650560+00:00 +2024-10-12T00:00:08.665067+00:00 ``` ### Total Number of included CVEs ```plain -265420 +265423 ``` ### CVEs added in the last Commit Recently added CVEs: `3` -- [CVE-2024-35517](CVE-2024/CVE-2024-355xx/CVE-2024-35517.json) (`2024-10-11T22:15:03.930`) -- [CVE-2024-35522](CVE-2024/CVE-2024-355xx/CVE-2024-35522.json) (`2024-10-11T22:15:04.117`) -- [CVE-2024-45754](CVE-2024/CVE-2024-457xx/CVE-2024-45754.json) (`2024-10-11T22:15:04.337`) +- [CVE-2024-9592](CVE-2024/CVE-2024-95xx/CVE-2024-9592.json) (`2024-10-12T03:15:02.243`) +- [CVE-2024-9821](CVE-2024/CVE-2024-98xx/CVE-2024-9821.json) (`2024-10-12T03:15:02.507`) +- [CVE-2024-9860](CVE-2024/CVE-2024-98xx/CVE-2024-9860.json) (`2024-10-12T03:15:02.757`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `0` -- [CVE-2023-40158](CVE-2023/CVE-2023-401xx/CVE-2023-40158.json) (`2024-10-11T22:35:00.770`) -- [CVE-2023-4685](CVE-2023/CVE-2023-46xx/CVE-2023-4685.json) (`2024-10-11T22:15:03.733`) -- [CVE-2024-45124](CVE-2024/CVE-2024-451xx/CVE-2024-45124.json) (`2024-10-11T22:05:43.650`) -- [CVE-2024-45125](CVE-2024/CVE-2024-451xx/CVE-2024-45125.json) (`2024-10-11T22:05:54.723`) -- [CVE-2024-45127](CVE-2024/CVE-2024-451xx/CVE-2024-45127.json) (`2024-10-11T22:06:10.140`) -- [CVE-2024-45128](CVE-2024/CVE-2024-451xx/CVE-2024-45128.json) (`2024-10-11T22:06:27.283`) -- [CVE-2024-45129](CVE-2024/CVE-2024-451xx/CVE-2024-45129.json) (`2024-10-11T22:09:06.553`) -- [CVE-2024-45130](CVE-2024/CVE-2024-451xx/CVE-2024-45130.json) (`2024-10-11T22:08:57.837`) -- [CVE-2024-45131](CVE-2024/CVE-2024-451xx/CVE-2024-45131.json) (`2024-10-11T22:09:51.867`) -- [CVE-2024-45132](CVE-2024/CVE-2024-451xx/CVE-2024-45132.json) (`2024-10-11T22:12:11.877`) -- [CVE-2024-45133](CVE-2024/CVE-2024-451xx/CVE-2024-45133.json) (`2024-10-11T22:12:17.887`) -- [CVE-2024-45134](CVE-2024/CVE-2024-451xx/CVE-2024-45134.json) (`2024-10-11T22:12:19.693`) -- [CVE-2024-45135](CVE-2024/CVE-2024-451xx/CVE-2024-45135.json) (`2024-10-11T22:12:21.470`) -- [CVE-2024-45148](CVE-2024/CVE-2024-451xx/CVE-2024-45148.json) (`2024-10-11T22:12:23.237`) -- [CVE-2024-45149](CVE-2024/CVE-2024-451xx/CVE-2024-45149.json) (`2024-10-11T22:12:25.263`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 451887dc9ab..28fb4643245 100644 --- a/_state.csv +++ b/_state.csv @@ -230358,7 +230358,7 @@ CVE-2023-40153,0,0,68082b8d0b1cd673ce13fc831779593073884ad14dff8278795b2977ab85b CVE-2023-40154,0,0,6db426d68f75684e01202401e3ecbe622403876ecbe4560542d2a6ae1522887b,2024-02-14T15:01:46.050000 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000 -CVE-2023-40158,0,1,f5c33dd671eaea6944f90c9c2dcc1f233b63eb3f3d167e9fce8fa1f154c769a3,2024-10-11T22:35:00.770000 +CVE-2023-40158,0,0,f5c33dd671eaea6944f90c9c2dcc1f233b63eb3f3d167e9fce8fa1f154c769a3,2024-10-11T22:35:00.770000 CVE-2023-40159,0,0,f23653787b2c8d1c7ab49dff62eab2cb6aa12e31e549c1c4d79a1506883bf305,2024-09-05T20:41:09.723000 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000 CVE-2023-40160,0,0,de8c32a875ccf6f89392dafa209d66eda2b9b820e48facccb8082fc450366841,2024-03-18T01:53:02.353000 @@ -235129,7 +235129,7 @@ CVE-2023-46846,0,0,69a664a6c6f758667799ffe9457f8d63a5c7afe1356244c05bfca1140da13 CVE-2023-46847,0,0,1d30f40e16010cef8fdd91f645fa02270c2625f5e003bdd93f8a5c5cd1588e18,2024-09-16T16:15:06.180000 CVE-2023-46848,0,0,a196c496809ca59a515e1d905421811772e2bda9ccae9cb87af53735256eeeb0,2024-09-16T16:15:06.523000 CVE-2023-46849,0,0,c13a9e39d7b251b9b38925d72d3bb6c8e9f6e0feb2e13839428677048a030875,2023-11-29T03:15:42.383000 -CVE-2023-4685,0,1,105ff91da63855ec210931d52875363d6b0f7a9d9f0138db3fa26a26a404e110,2024-10-11T22:15:03.733000 +CVE-2023-4685,0,0,105ff91da63855ec210931d52875363d6b0f7a9d9f0138db3fa26a26a404e110,2024-10-11T22:15:03.733000 CVE-2023-46850,0,0,2d3c7da49b79f2b2203ae7789128eb2b6c188e979f2a63526bc11c9c06fb9790,2023-11-29T03:15:42.467000 CVE-2023-46851,0,0,a6c6a39768bb9d7a4638fbcbf845131443a4e9cb26ca9f75377d4295fd0f7704,2023-11-15T14:13:57.780000 CVE-2023-46852,0,0,f49b1a0a580fe4b187594a31e9758de51cca04745c572c9b48a372f3cc918b43,2023-11-07T19:53:13.173000 @@ -254154,9 +254154,9 @@ CVE-2024-35510,0,0,caaffeb522a9243cb4a1bb41637eced11d63455c55d5f889189d39467161e CVE-2024-35511,0,0,0925e571054fff897af51a6c91c2579c2749b26c74104183a16b37d4fa6c6517,2024-07-03T02:01:47.583000 CVE-2024-35512,0,0,b896e4527afcecfdf8ee8b9a5d8645a7997efcebb8181c42302f1215247b04ab,2024-08-22T21:35:05.483000 CVE-2024-35515,0,0,0a6259433dc8b772a7751534ecb780dbd399dd4b702a82474be04ca505d614d4,2024-09-20T12:30:17.483000 -CVE-2024-35517,1,1,bfec791a0cb04e3630fa083b2e569215c8722a3346743b806d1ebf61c836a0f3,2024-10-11T22:15:03.930000 +CVE-2024-35517,0,0,bfec791a0cb04e3630fa083b2e569215c8722a3346743b806d1ebf61c836a0f3,2024-10-11T22:15:03.930000 CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000 -CVE-2024-35522,1,1,22d6e02f9325c21ee5222c88289910f8f2671497792135b8ac5269387a1004a7,2024-10-11T22:15:04.117000 +CVE-2024-35522,0,0,22d6e02f9325c21ee5222c88289910f8f2671497792135b8ac5269387a1004a7,2024-10-11T22:15:04.117000 CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f171,2024-06-26T12:44:29.693000 CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000 CVE-2024-3553,0,0,d92b272ac91b29131b7e7854674ae1f210f8268a2cb6312d80e7312af083b77c,2024-05-02T18:00:37.360000 @@ -260364,18 +260364,18 @@ CVE-2024-45120,0,0,5f0561f7069ac7696eeae13e26e558a6f6aedeb818e919517eb26d4bc1abb CVE-2024-45121,0,0,2cee5e70ae658dedd8711e83034e604c9000553a071e8889c7492bbfbaeaf164,2024-10-10T21:37:08.743000 CVE-2024-45122,0,0,416d7bdef3f05aa6196af57a7e46b71f393ea5306a521a39da2e865d3196eec6,2024-10-10T21:35:53.717000 CVE-2024-45123,0,0,ce142fe257e2af522fabc394413dafdbd35cd8a9472574877f35e8bbc986e8ea,2024-10-10T21:34:32.123000 -CVE-2024-45124,0,1,26f1b1e9ac566a375a325226d77f8101a4d8a21f40f56a1d1db3cd186bb5244a,2024-10-11T22:05:43.650000 -CVE-2024-45125,0,1,d41ac0876a02a9a5885bb943ab78f24f24e81df9c6782167a74ade509969d6bd,2024-10-11T22:05:54.723000 -CVE-2024-45127,0,1,2fb2b7b557c21b56035d07b249c92752fbd6332ca94c716d768de23d17ade7fc,2024-10-11T22:06:10.140000 -CVE-2024-45128,0,1,07e0db31de2b9c0d720bbe02d8110a91384897552c572982d58d5153dd50345c,2024-10-11T22:06:27.283000 -CVE-2024-45129,0,1,9fd18ee13c4181b5e86a01d1cc03b7a53b52bb37b00733ac5f9ac37046d6f9e4,2024-10-11T22:09:06.553000 +CVE-2024-45124,0,0,26f1b1e9ac566a375a325226d77f8101a4d8a21f40f56a1d1db3cd186bb5244a,2024-10-11T22:05:43.650000 +CVE-2024-45125,0,0,d41ac0876a02a9a5885bb943ab78f24f24e81df9c6782167a74ade509969d6bd,2024-10-11T22:05:54.723000 +CVE-2024-45127,0,0,2fb2b7b557c21b56035d07b249c92752fbd6332ca94c716d768de23d17ade7fc,2024-10-11T22:06:10.140000 +CVE-2024-45128,0,0,07e0db31de2b9c0d720bbe02d8110a91384897552c572982d58d5153dd50345c,2024-10-11T22:06:27.283000 +CVE-2024-45129,0,0,9fd18ee13c4181b5e86a01d1cc03b7a53b52bb37b00733ac5f9ac37046d6f9e4,2024-10-11T22:09:06.553000 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 -CVE-2024-45130,0,1,f3584e6907d26bb61172e8b2a7210e2b63858f024074c1560fef167d477e7e26,2024-10-11T22:08:57.837000 -CVE-2024-45131,0,1,decc09a938553b7134d2da015b3ff961be86f5e9591d6fe11c50b98ee4c78cf6,2024-10-11T22:09:51.867000 -CVE-2024-45132,0,1,397d3eb797dedd1dd3095e2fb6f7b31811ba52b3d752c9b6f44123a8f440a2a7,2024-10-11T22:12:11.877000 -CVE-2024-45133,0,1,103d543ed5581d1dfc304ffab62b79435b24bed8e495cc4abcf906721143af93,2024-10-11T22:12:17.887000 -CVE-2024-45134,0,1,550e4d2b38e543b69e1996387a380be574f3babac927c5f3f5f9789e55179cfb,2024-10-11T22:12:19.693000 -CVE-2024-45135,0,1,0b557b0805a0697b0bf5971b4d4d6cdd801c6fc3dfc152778ad149fbd479323d,2024-10-11T22:12:21.470000 +CVE-2024-45130,0,0,f3584e6907d26bb61172e8b2a7210e2b63858f024074c1560fef167d477e7e26,2024-10-11T22:08:57.837000 +CVE-2024-45131,0,0,decc09a938553b7134d2da015b3ff961be86f5e9591d6fe11c50b98ee4c78cf6,2024-10-11T22:09:51.867000 +CVE-2024-45132,0,0,397d3eb797dedd1dd3095e2fb6f7b31811ba52b3d752c9b6f44123a8f440a2a7,2024-10-11T22:12:11.877000 +CVE-2024-45133,0,0,103d543ed5581d1dfc304ffab62b79435b24bed8e495cc4abcf906721143af93,2024-10-11T22:12:17.887000 +CVE-2024-45134,0,0,550e4d2b38e543b69e1996387a380be574f3babac927c5f3f5f9789e55179cfb,2024-10-11T22:12:19.693000 +CVE-2024-45135,0,0,0b557b0805a0697b0bf5971b4d4d6cdd801c6fc3dfc152778ad149fbd479323d,2024-10-11T22:12:21.470000 CVE-2024-45136,0,0,6d878b8fc19c1bbaa4211ae18c5528aaafebd03237826b2c504e0c238b7c9c3d,2024-10-10T12:51:56.987000 CVE-2024-45137,0,0,ababe78ba9b8707d589a30ef25e9786587eb5690e3f605ad62718c447e4f0e2f,2024-10-10T12:51:56.987000 CVE-2024-45138,0,0,ff26113f92d73f4e0243abadebc3cc88674170d4c50a5c390ae8bcee9b7e5f18,2024-10-10T12:51:56.987000 @@ -260388,8 +260388,8 @@ CVE-2024-45143,0,0,a044f4c2e601b647a5a200d37a7cbb82f54800f1d75921780407b9f5c209a CVE-2024-45144,0,0,e0c90730fb1d310a9920d6d7253aed4376e3e2f4db4ef521210396cd355620eb,2024-10-10T12:51:56.987000 CVE-2024-45145,0,0,64db84a3afb06c70040114eb4c29768ff0f4f0450893d0fd7c3be4dce996a99b,2024-10-10T12:51:56.987000 CVE-2024-45146,0,0,3d3ac3cec43dc3d8a3ae36a2e22f9b1eb1c7d76488daae52e6b9e8c47b7fa9b4,2024-10-10T12:51:56.987000 -CVE-2024-45148,0,1,9cb33460bbb35056f58ae317dd69784c25057b5c95ac53296d7214a24f478bc5,2024-10-11T22:12:23.237000 -CVE-2024-45149,0,1,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000 +CVE-2024-45148,0,0,9cb33460bbb35056f58ae317dd69784c25057b5c95ac53296d7214a24f478bc5,2024-10-11T22:12:23.237000 +CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45150,0,0,167a4191471f3fa946e58a55111d7addc1a05cf292397eebc010a5c52c665dd2,2024-10-10T12:51:56.987000 CVE-2024-45152,0,0,277bf8061ad989d3fb02585b018bc50b7247f827e72814d05b3a0214c8b184fa,2024-10-10T12:51:56.987000 @@ -260702,7 +260702,7 @@ CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48 CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000 -CVE-2024-45754,1,1,8640c6bfccb63c37900b2a06f890f53e60ab7feef5bd9c9ab044d090e3df76a9,2024-10-11T22:15:04.337000 +CVE-2024-45754,0,0,8640c6bfccb63c37900b2a06f890f53e60ab7feef5bd9c9ab044d090e3df76a9,2024-10-11T22:15:04.337000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000 @@ -265364,6 +265364,7 @@ CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03 CVE-2024-9581,0,0,dcdedf39f55e8b175c72a20e72a1aed92038e920265594b4fc9925b7183ce1e6,2024-10-10T12:51:56.987000 CVE-2024-9586,0,0,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000 CVE-2024-9587,0,0,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000 +CVE-2024-9592,1,1,0f39969df8cdd7221e2f8596842e380d11b968fb83c9650c71ea7d95ce8c2502,2024-10-12T03:15:02.243000 CVE-2024-9596,0,0,41f14771e651cbc1c37017cbe5a91040128a2c351e859a7b312163502a24a950,2024-10-10T12:51:56.987000 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 @@ -265414,8 +265415,10 @@ CVE-2024-9815,0,0,88a550f6cb92a368ea0bbbf49b20d73379efa44934b30bcb818d49eaa9b3f3 CVE-2024-9816,0,0,b558749b310662e562a03139cd743ab5e13638cae5288ab2349400fc9e4a8f44,2024-10-10T22:15:12.230000 CVE-2024-9817,0,0,64961e55de2aecac95e692e2205c7e393510ae0087bb3b78e5af557801c488ea,2024-10-10T23:15:03.410000 CVE-2024-9818,0,0,4a540b8f9903a9b9420b63ef2490b163dd3b5219ef38e22237dcd7875973e6a1,2024-10-10T23:15:03.680000 +CVE-2024-9821,1,1,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000 CVE-2024-9822,0,0,d08d61a8f285dedd6e0156668251bfed17abd9d34a7fc326c5d7b2d904c03ab9,2024-10-11T03:15:10.967000 CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000 CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000 CVE-2024-9859,0,0,4c2e27e83d096af209ad8d4a7ba60ec60caaadb1032a58969905b29c3c0c3d1f,2024-10-11T17:15:04.677000 +CVE-2024-9860,1,1,9c9c6a59ce227b8b9c92f258ea8c8577b19c36b99b060db27cd4697c8991bf8d,2024-10-12T03:15:02.757000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000