diff --git a/2007/CVE-2007-2447.md b/2007/CVE-2007-2447.md index 677719aa4d..785f1a214b 100644 --- a/2007/CVE-2007-2447.md +++ b/2007/CVE-2007-2447.md @@ -60,6 +60,7 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote - https://github.com/crypticdante/CVE-2007-2447 - https://github.com/gwyomarch/Lame-HTB-Writeup-FR - https://github.com/hussien-almalki/Hack_lame +- https://github.com/jaydenxjayden/HTB-writeup - https://github.com/jwardsmith/Penetration-Testing - https://github.com/k4u5h41/CVE-2007-2447 - https://github.com/macosta-42/Exploit-Development diff --git a/2011/CVE-2011-3389.md b/2011/CVE-2011-3389.md index 1eaff481c8..5b81e6e028 100644 --- a/2011/CVE-2011-3389.md +++ b/2011/CVE-2011-3389.md @@ -56,6 +56,7 @@ The SSL protocol, as used in certain configurations in Microsoft Windows and Mic - https://github.com/odolezal/D-Link-DIR-655 - https://github.com/orgTestCodacy11KRepos110MB/repo-3654-reg - https://github.com/pashicop/3.9_1 +- https://github.com/password123456/setup-apache-http-server-with-shorts-security-best-practice - https://github.com/stanmay77/security - https://github.com/swod00/litecoin_demo - https://github.com/tzaffi/testssl-report diff --git a/2014/CVE-2014-3566.md b/2014/CVE-2014-3566.md index 3fb7fa939f..0aeb85d7a7 100644 --- a/2014/CVE-2014-3566.md +++ b/2014/CVE-2014-3566.md @@ -102,6 +102,7 @@ The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses - https://github.com/nikolay480/devops-netology - https://github.com/odolezal/D-Link-DIR-655 - https://github.com/pashicop/3.9_1 +- https://github.com/password123456/setup-apache-http-server-with-shorts-security-best-practice - https://github.com/puppetlabs/puppetlabs-compliance_profile - https://github.com/r0metheus/poodle-attack - https://github.com/r0metheus/poodle-attack-poc diff --git a/2019/CVE-2019-0708.md b/2019/CVE-2019-0708.md index 3201e7025a..d1545847c6 100644 --- a/2019/CVE-2019-0708.md +++ b/2019/CVE-2019-0708.md @@ -201,6 +201,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - https://github.com/chalern/Pentest-Tools - https://github.com/chandiradeshan12/CVE-Reports-and-TryHackMe-Room-Creation - https://github.com/ciakim/CVE-2019-0709 +- https://github.com/clcert/clcert-web - https://github.com/clcert/clcert.cl - https://github.com/closethe/CVE-2019-0708-POC - https://github.com/codereveryday/Programming-Hacking-Resources diff --git a/2019/CVE-2019-10894.md b/2019/CVE-2019-10894.md new file mode 100644 index 0000000000..8c2e7ce64f --- /dev/null +++ b/2019/CVE-2019-10894.md @@ -0,0 +1,17 @@ +### [CVE-2019-10894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called. + +### POC + +#### Reference +- https://usn.ubuntu.com/3986-1/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2019/CVE-2019-10895.md b/2019/CVE-2019-10895.md index e78f2047e3..0cc00ca6aa 100644 --- a/2019/CVE-2019-10895.md +++ b/2019/CVE-2019-10895.md @@ -10,7 +10,7 @@ In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file pars ### POC #### Reference -No PoCs from references. +- https://usn.ubuntu.com/3986-1/ #### Github - https://github.com/ARPSyndicate/cvemon diff --git a/2019/CVE-2019-10896.md b/2019/CVE-2019-10896.md new file mode 100644 index 0000000000..72b756123c --- /dev/null +++ b/2019/CVE-2019-10896.md @@ -0,0 +1,17 @@ +### [CVE-2019-10896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes. + +### POC + +#### Reference +- https://usn.ubuntu.com/3986-1/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2019/CVE-2019-10899.md b/2019/CVE-2019-10899.md new file mode 100644 index 0000000000..fc148bdfad --- /dev/null +++ b/2019/CVE-2019-10899.md @@ -0,0 +1,17 @@ +### [CVE-2019-10899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read. + +### POC + +#### Reference +- https://usn.ubuntu.com/3986-1/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2019/CVE-2019-10901.md b/2019/CVE-2019-10901.md new file mode 100644 index 0000000000..30da01adb0 --- /dev/null +++ b/2019/CVE-2019-10901.md @@ -0,0 +1,17 @@ +### [CVE-2019-10901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly. + +### POC + +#### Reference +- https://usn.ubuntu.com/3986-1/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2019/CVE-2019-10903.md b/2019/CVE-2019-10903.md index 3aacc76e15..b2fc16f05f 100644 --- a/2019/CVE-2019-10903.md +++ b/2019/CVE-2019-10903.md @@ -11,6 +11,7 @@ In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS diss #### Reference - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 +- https://usn.ubuntu.com/3986-1/ #### Github No PoCs found on GitHub currently. diff --git a/2019/CVE-2019-11358.md b/2019/CVE-2019-11358.md index c9875e3265..7a95826582 100644 --- a/2019/CVE-2019-11358.md +++ b/2019/CVE-2019-11358.md @@ -2495,6 +2495,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/WhitmoreLakeRobotics/2020-GameChangers-Club - https://github.com/WhitmoreLakeRobotics/2022-Mecanum - https://github.com/WhitmoreLakeRobotics/2022-TSOC +- https://github.com/WhitmoreLakeRobotics/2023-FTC-CenterStage - https://github.com/Wilke000/FTC-arm_drive-2023 - https://github.com/WillRages/23-24_CenterStage6093 - https://github.com/William-McGonagle/Maincode-2021 @@ -3415,6 +3416,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/lakeridgeacademy/2022-power-play - https://github.com/lancelarsen/PhoenixForceFreightFrenzy - https://github.com/lancelarsen/PhoenixForceUltimateGoal +- https://github.com/lancelarsen/PhoenixForceUltimateGoal2 - https://github.com/largoftc/Firsttech - https://github.com/larrytao05/FtcRobotController - https://github.com/laupetre/FTC-2021 @@ -4145,6 +4147,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan - https://github.com/zachwaffle4/InvictaCode-21-22 - https://github.com/zaheersufi/power-play-16911 - https://github.com/zandersmall/Robotics2020Code +- https://github.com/zedaes/PG-Odometry - https://github.com/zeitlerquintet/jquery-2.2.4-patched - https://github.com/zeitlersensetence/jquery-2.2.4-patched - https://github.com/zema1/oracle-vuln-crawler diff --git a/2019/CVE-2019-9208.md b/2019/CVE-2019-9208.md index a710a029dd..34db69c5a9 100644 --- a/2019/CVE-2019-9208.md +++ b/2019/CVE-2019-9208.md @@ -10,6 +10,7 @@ In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. ### POC #### Reference +- https://usn.ubuntu.com/3986-1/ - https://www.oracle.com/security-alerts/cpujan2020.html #### Github diff --git a/2019/CVE-2019-9209.md b/2019/CVE-2019-9209.md index fb1febe59e..94336a09f1 100644 --- a/2019/CVE-2019-9209.md +++ b/2019/CVE-2019-9209.md @@ -11,6 +11,7 @@ In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related disse #### Reference - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447 +- https://usn.ubuntu.com/3986-1/ #### Github No PoCs found on GitHub currently. diff --git a/2019/CVE-2019-9214.md b/2019/CVE-2019-9214.md new file mode 100644 index 0000000000..246241f590 --- /dev/null +++ b/2019/CVE-2019-9214.md @@ -0,0 +1,17 @@ +### [CVE-2019-9214](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9214) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation. + +### POC + +#### Reference +- https://usn.ubuntu.com/3986-1/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2021/CVE-2021-42013.md b/2021/CVE-2021-42013.md index ac13660411..cd511747dc 100644 --- a/2021/CVE-2021-42013.md +++ b/2021/CVE-2021-42013.md @@ -104,6 +104,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cybfar/cve-2021-42013-httpd - https://github.com/d4n-sec/d4n-sec.github.io +- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap - https://github.com/dial25sd/arf-vulnerable-vm - https://github.com/e-hakson/OSCP - https://github.com/eljosep/OSCP-Guide diff --git a/2023/CVE-2023-1606.md b/2023/CVE-2023-1606.md index a88e4c2ca7..1120c106f4 100644 --- a/2023/CVE-2023-1606.md +++ b/2023/CVE-2023-1606.md @@ -13,5 +13,5 @@ A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affect - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf #### Github -No PoCs found on GitHub currently. +- https://github.com/N0boy-0/vulenv diff --git a/2023/CVE-2023-21931.md b/2023/CVE-2023-21931.md index de297aa55f..930d57e4e4 100644 --- a/2023/CVE-2023-21931.md +++ b/2023/CVE-2023-21931.md @@ -21,6 +21,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top +- https://github.com/FeatherStark/GIOP-Protocol-Analysis - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/KimJun1010/WeblogicTool - https://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP diff --git a/2023/CVE-2023-26315.md b/2023/CVE-2023-26315.md new file mode 100644 index 0000000000..06e2a763ff --- /dev/null +++ b/2023/CVE-2023-26315.md @@ -0,0 +1,18 @@ +### [CVE-2023-26315](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26315) +![](https://img.shields.io/static/v1?label=Product&message=Router%20AX9000&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/Mr-xn/Penetration_Testing_POC +- https://github.com/winmt/winmt + diff --git a/2023/CVE-2023-29489.md b/2023/CVE-2023-29489.md index 277679c51c..67f771df54 100644 --- a/2023/CVE-2023-29489.md +++ b/2023/CVE-2023-29489.md @@ -13,6 +13,7 @@ An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the c - https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/ #### Github +- https://github.com/0-d3y/CVE-2023-29489 - https://github.com/0-d3y/XSS_1915 - https://github.com/1337r0j4n/CVE-2023-29489 - https://github.com/Abdullah7-ma/CVE-2023-29489 diff --git a/2023/CVE-2023-32235.md b/2023/CVE-2023-32235.md index c1f2d83038..0652a1fd95 100644 --- a/2023/CVE-2023-32235.md +++ b/2023/CVE-2023-32235.md @@ -13,6 +13,7 @@ Ghost before 5.42.1 allows remote attackers to read arbitrary files within the a No PoCs from references. #### Github +- https://github.com/AXRoux/Ghost-Path-Traversal-CVE-2023-32235- - https://github.com/VEEXH/Ghost-Path-Traversal-CVE-2023-32235- - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2023/CVE-2023-39344.md b/2023/CVE-2023-39344.md index 9bdf61d116..d591fdcc0d 100644 --- a/2023/CVE-2023-39344.md +++ b/2023/CVE-2023-39344.md @@ -13,5 +13,6 @@ social-media-skeleton is an uncompleted social media project. A SQL injection vu No PoCs from references. #### Github +- https://github.com/N0boy-0/vulenv - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2023/CVE-2023-4542.md b/2023/CVE-2023-4542.md index 859de0b0eb..c4fca8ca70 100644 --- a/2023/CVE-2023-4542.md +++ b/2023/CVE-2023-4542.md @@ -14,6 +14,7 @@ A vulnerability was found in D-Link DAR-8000-10 up to 20230809. It has been clas #### Github - https://github.com/20142995/sectool +- https://github.com/PumpkinBridge/CVE-2023-4542 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile - https://github.com/wjlin0/poc-doc diff --git a/2023/CVE-2023-4545.md b/2023/CVE-2023-4545.md new file mode 100644 index 0000000000..8f47527dec --- /dev/null +++ b/2023/CVE-2023-4545.md @@ -0,0 +1,17 @@ +### [CVE-2023-4545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4545) +![](https://img.shields.io/static/v1?label=Product&message=OA&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204.5.5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in IBOS OA 4.5.5. It has been classified as critical. Affected is an unknown function of the file ?r=recruit/bgchecks/export&checkids=x. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238056. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/siyu15/cve/blob/main/sql.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2023/CVE-2023-49582.md b/2023/CVE-2023-49582.md new file mode 100644 index 0000000000..25fd9064e2 --- /dev/null +++ b/2023/CVE-2023-49582.md @@ -0,0 +1,17 @@ +### [CVE-2023-49582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49582) +![](https://img.shields.io/static/v1?label=Product&message=Apache%20Portable%20Runtime%20(APR)&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0.9.0%3C%3D%201.7.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&color=brighgreen) + +### Description + +Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h)Users are recommended to upgrade to APR version 1.7.5, which fixes this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2023/CVE-2023-4993.md b/2023/CVE-2023-4993.md index bfa8ad7370..1d027a15b3 100644 --- a/2023/CVE-2023-4993.md +++ b/2023/CVE-2023-4993.md @@ -1,7 +1,7 @@ ### [CVE-2023-4993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4993) ![](https://img.shields.io/static/v1?label=Product&message=SoliPay%20Mobile%20App&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.0.8%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs&color=brighgreen) ### Description diff --git a/2023/CVE-2023-5983.md b/2023/CVE-2023-5983.md index a9508e8ba3..9aa87ac2b2 100644 --- a/2023/CVE-2023-5983.md +++ b/2023/CVE-2023-5983.md @@ -1,7 +1,7 @@ ### [CVE-2023-5983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5983) ![](https://img.shields.io/static/v1?label=Product&message=Pharmacy%20Automation&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.1.133.0%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) ### Description diff --git a/2023/CVE-2023-6190.md b/2023/CVE-2023-6190.md index 912fe825bb..a7f4072fcf 100644 --- a/2023/CVE-2023-6190.md +++ b/2023/CVE-2023-6190.md @@ -1,7 +1,7 @@ ### [CVE-2023-6190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6190) ![](https://img.shields.io/static/v1?label=Product&message=University%20Information%20Management%20System&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%2030.11.2023%20&color=brighgreen) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) ### Description diff --git a/2024/CVE-2024-0563.md b/2024/CVE-2024-0563.md index 7979163467..3866053d7d 100644 --- a/2024/CVE-2024-0563.md +++ b/2024/CVE-2024-0563.md @@ -1,7 +1,7 @@ ### [CVE-2024-0563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0563) ![](https://img.shields.io/static/v1?label=Product&message=M-Files%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) -![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Uncontrolled%20Resource%20Consumption&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen) ### Description diff --git a/2024/CVE-2024-1561.md b/2024/CVE-2024-1561.md index 4117fe65c9..b010b068ee 100644 --- a/2024/CVE-2024-1561.md +++ b/2024/CVE-2024-1561.md @@ -18,6 +18,7 @@ No PoCs from references. - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/k3ppf0r/2024-PocLib - https://github.com/nomi-sec/PoC-in-GitHub +- https://github.com/nvn1729/advisories - https://github.com/tanjiti/sec_profile - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC diff --git a/2024/CVE-2024-21442.md b/2024/CVE-2024-21442.md index 25cff1f656..57bba29bec 100644 --- a/2024/CVE-2024-21442.md +++ b/2024/CVE-2024-21442.md @@ -26,5 +26,6 @@ Windows USB Print Driver Elevation of Privilege Vulnerability No PoCs from references. #### Github +- https://github.com/5angjun/5angjun - https://github.com/NaInSec/CVE-LIST diff --git a/2024/CVE-2024-21445.md b/2024/CVE-2024-21445.md index 80eff4a200..176cac90e5 100644 --- a/2024/CVE-2024-21445.md +++ b/2024/CVE-2024-21445.md @@ -26,5 +26,6 @@ Windows USB Print Driver Elevation of Privilege Vulnerability No PoCs from references. #### Github +- https://github.com/5angjun/5angjun - https://github.com/NaInSec/CVE-LIST diff --git a/2024/CVE-2024-25641.md b/2024/CVE-2024-25641.md index 625982570f..fe8dfe20d4 100644 --- a/2024/CVE-2024-25641.md +++ b/2024/CVE-2024-25641.md @@ -13,5 +13,6 @@ Cacti provides an operational monitoring and fault management framework. Prior t - https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88 #### Github +- https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-28397.md b/2024/CVE-2024-28397.md index 743c4a79da..e2de7364e3 100644 --- a/2024/CVE-2024-28397.md +++ b/2024/CVE-2024-28397.md @@ -10,7 +10,7 @@ An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows a ### POC #### Reference -No PoCs from references. +- https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape #### Github - https://github.com/Marven11/CVE-2024-28397 diff --git a/2024/CVE-2024-31982.md b/2024/CVE-2024-31982.md index 22f8df5d08..dcf0ff65bb 100644 --- a/2024/CVE-2024-31982.md +++ b/2024/CVE-2024-31982.md @@ -15,6 +15,7 @@ XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 a #### Github - https://github.com/Ostorlab/KEV - https://github.com/bigb0x/CVE-2024-31982 +- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-34087.md b/2024/CVE-2024-34087.md new file mode 100644 index 0000000000..574b877bf3 --- /dev/null +++ b/2024/CVE-2024-34087.md @@ -0,0 +1,17 @@ +### [CVE-2024-34087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34087) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request. + +### POC + +#### Reference +- https://themodernham.com/bbs-hacking-discovering-rce-within-bpq32-seh-based-buffer-overflow/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-34510.md b/2024/CVE-2024-34510.md new file mode 100644 index 0000000000..4d057207d7 --- /dev/null +++ b/2024/CVE-2024-34510.md @@ -0,0 +1,17 @@ +### [CVE-2024-34510](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34510) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Gradio before 4.20 allows credential leakage on Windows. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nvn1729/advisories + diff --git a/2024/CVE-2024-35178.md b/2024/CVE-2024-35178.md new file mode 100644 index 0000000000..bb53125929 --- /dev/null +++ b/2024/CVE-2024-35178.md @@ -0,0 +1,17 @@ +### [CVE-2024-35178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35178) +![](https://img.shields.io/static/v1?label=Product&message=jupyter_server&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.14.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on Windows has a vulnerability that lets unauthenticated attackers leak the NTLMv2 password hash of the Windows user running the Jupyter server. An attacker can crack this password to gain access to the Windows machine hosting the Jupyter server, or access other network-accessible machines or 3rd party services using that credential. Or an attacker perform an NTLM relay attack without cracking the credential to gain access to other network-accessible machines. This vulnerability is fixed in 2.14.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nvn1729/advisories + diff --git a/2024/CVE-2024-38063.md b/2024/CVE-2024-38063.md index 734f688e04..6162c2b958 100644 --- a/2024/CVE-2024-38063.md +++ b/2024/CVE-2024-38063.md @@ -52,6 +52,7 @@ Windows TCP/IP Remote Code Execution Vulnerability No PoCs from references. #### Github +- https://github.com/0xMarcio/cve - https://github.com/being1943/my_rss_reader - https://github.com/kherrick/hacker-news - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-38859.md b/2024/CVE-2024-38859.md new file mode 100644 index 0000000000..2ca61dba83 --- /dev/null +++ b/2024/CVE-2024-38859.md @@ -0,0 +1,17 @@ +### [CVE-2024-38859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38859) +![](https://img.shields.io/static/v1?label=Product&message=Checkmk&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=2.3.0%3C%202.3.0p14%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)&color=brighgreen) + +### Description + +XSS in the view page with the SLA column configured in Checkmk versions prior to 2.3.0p14, 2.2.0p33, 2.1.0p47 and 2.0.0 (EOL) allowed malicious users to execute arbitrary scripts by injecting HTML elements into the SLA column title. These scripts could be executed when the view page was cloned by other users. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-39097.md b/2024/CVE-2024-39097.md new file mode 100644 index 0000000000..e129faf8bc --- /dev/null +++ b/2024/CVE-2024-39097.md @@ -0,0 +1,17 @@ +### [CVE-2024-39097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39097) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path. + +### POC + +#### Reference +- https://github.com/gnuboard/g6/issues/582 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-39641.md b/2024/CVE-2024-39641.md new file mode 100644 index 0000000000..7f37320fc7 --- /dev/null +++ b/2024/CVE-2024-39641.md @@ -0,0 +1,17 @@ +### [CVE-2024-39641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39641) +![](https://img.shields.io/static/v1?label=Product&message=LearnPress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in ThimPress LearnPress.This issue affects LearnPress: from n/a through 4.2.6.8.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-39645.md b/2024/CVE-2024-39645.md new file mode 100644 index 0000000000..8696e1dc27 --- /dev/null +++ b/2024/CVE-2024-39645.md @@ -0,0 +1,17 @@ +### [CVE-2024-39645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39645) +![](https://img.shields.io/static/v1?label=Product&message=Tutor%20LMS&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.7.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-39657.md b/2024/CVE-2024-39657.md new file mode 100644 index 0000000000..053135bd39 --- /dev/null +++ b/2024/CVE-2024-39657.md @@ -0,0 +1,17 @@ +### [CVE-2024-39657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39657) +![](https://img.shields.io/static/v1?label=Product&message=Sender%20%E2%80%93%20Newsletter%2C%20SMS%20and%20Email%20Marketing%20Automation%20for%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Sender Sender – Newsletter, SMS and Email Marketing Automation for WooCommerce.This issue affects Sender – Newsletter, SMS and Email Marketing Automation for WooCommerce: from n/a through 2.6.18. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-41173.md b/2024/CVE-2024-41173.md new file mode 100644 index 0000000000..7255eac2d5 --- /dev/null +++ b/2024/CVE-2024-41173.md @@ -0,0 +1,19 @@ +### [CVE-2024-41173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41173) +![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20package&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&color=brighgreen) + +### Description + +The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local authentication bypass by a low privileged attacker. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-41174.md b/2024/CVE-2024-41174.md new file mode 100644 index 0000000000..94dfc320e6 --- /dev/null +++ b/2024/CVE-2024-41174.md @@ -0,0 +1,19 @@ +### [CVE-2024-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41174) +![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20package&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The IPC-Diagnostics package in TwinCAT/BSD is susceptible to improper input neutralization by a low-privileged local attacker. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-41175.md b/2024/CVE-2024-41175.md new file mode 100644 index 0000000000..97c66a6085 --- /dev/null +++ b/2024/CVE-2024-41175.md @@ -0,0 +1,19 @@ +### [CVE-2024-41175](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41175) +![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20package&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen) + +### Description + +The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local denial-of-service attack by a low privileged attacker. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-41176.md b/2024/CVE-2024-41176.md new file mode 100644 index 0000000000..47578eb5da --- /dev/null +++ b/2024/CVE-2024-41176.md @@ -0,0 +1,19 @@ +### [CVE-2024-41176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41176) +![](https://img.shields.io/static/v1?label=Product&message=MDP%20package&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%2FBSD&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.2.7.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.1.2.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen) + +### Description + +The MPD package included in TwinCAT/BSD allows an authenticated, low-privileged localattacker to induce a Denial-of-Service (DoS) condition on the daemon and execute code inthe context of user “root” via a crafted HTTP request. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42008.md b/2024/CVE-2024-42008.md new file mode 100644 index 0000000000..0a2aab6c8f --- /dev/null +++ b/2024/CVE-2024-42008.md @@ -0,0 +1,17 @@ +### [CVE-2024-42008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42008) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header. + +### POC + +#### Reference +- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42009.md b/2024/CVE-2024-42009.md new file mode 100644 index 0000000000..51300616f7 --- /dev/null +++ b/2024/CVE-2024-42009.md @@ -0,0 +1,17 @@ +### [CVE-2024-42009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42009) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php. + +### POC + +#### Reference +- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42010.md b/2024/CVE-2024-42010.md index 1293aebff9..83c72a479a 100644 --- a/2024/CVE-2024-42010.md +++ b/2024/CVE-2024-42010.md @@ -10,7 +10,7 @@ mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insufficiently ### POC #### Reference -No PoCs from references. +- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-42474.md b/2024/CVE-2024-42474.md new file mode 100644 index 0000000000..8b3a695b60 --- /dev/null +++ b/2024/CVE-2024-42474.md @@ -0,0 +1,17 @@ +### [CVE-2024-42474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42474) +![](https://img.shields.io/static/v1?label=Product&message=streamlit&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.37.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) + +### Description + +Streamlit is a data oriented application development framework for python. Snowflake Streamlit open source addressed a security vulnerability via the static file sharing feature. Users of hosted Streamlit app(s) on Windows were vulnerable to a path traversal vulnerability when the static file sharing feature is enabled. An attacker could utilize the vulnerability to leak the password hash of the Windows user running Streamlit. The vulnerability was patched on Jul 25, 2024, as part of Streamlit open source version 1.37.0. The vulnerability only affects Windows. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nvn1729/advisories + diff --git a/2024/CVE-2024-42554.md b/2024/CVE-2024-42554.md new file mode 100644 index 0000000000..1ac0b05b77 --- /dev/null +++ b/2024/CVE-2024-42554.md @@ -0,0 +1,17 @@ +### [CVE-2024-42554](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42554) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_added.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/7d2ebfe6dfa87eecf8f3e6d4eefc48ba + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42555.md b/2024/CVE-2024-42555.md new file mode 100644 index 0000000000..f62e3cd3ea --- /dev/null +++ b/2024/CVE-2024-42555.md @@ -0,0 +1,17 @@ +### [CVE-2024-42555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42555) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component admin_room_removed.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/afd445b90e13a27a6422cea2f5ff0f64 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42556.md b/2024/CVE-2024-42556.md new file mode 100644 index 0000000000..ece2fdc4e3 --- /dev/null +++ b/2024/CVE-2024-42556.md @@ -0,0 +1,17 @@ +### [CVE-2024-42556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42556) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/9688bcdd3e05ba79ebf4ff1042609b20 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42557.md b/2024/CVE-2024-42557.md new file mode 100644 index 0000000000..74e4e74f21 --- /dev/null +++ b/2024/CVE-2024-42557.md @@ -0,0 +1,17 @@ +### [CVE-2024-42557](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42557) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component admin_modify_room.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/0785597ae7abc8f10cd5c5537f5467b5 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42560.md b/2024/CVE-2024-42560.md new file mode 100644 index 0000000000..25c8f905a3 --- /dev/null +++ b/2024/CVE-2024-42560.md @@ -0,0 +1,17 @@ +### [CVE-2024-42560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42560) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the component update_page_details.php of Blood Bank And Donation Management System commit dc9e039 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Details parameter. + +### POC + +#### Reference +- https://gist.github.com/topsky979/4c05ee72ab4b365ef81c199aaa0558d0 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42562.md b/2024/CVE-2024-42562.md new file mode 100644 index 0000000000..3b6b251b65 --- /dev/null +++ b/2024/CVE-2024-42562.md @@ -0,0 +1,17 @@ +### [CVE-2024-42562](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42562) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at preview.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/2dcca275bcc18e8058cefef714a2f61b + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42567.md b/2024/CVE-2024-42567.md new file mode 100644 index 0000000000..1a9ea774d2 --- /dev/null +++ b/2024/CVE-2024-42567.md @@ -0,0 +1,17 @@ +### [CVE-2024-42567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42567) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the sid parameter at /search.php?action=2. + +### POC + +#### Reference +- https://gist.github.com/topsky979/96ba3f6ccd333480aa86e7078c4886d7 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42568.md b/2024/CVE-2024-42568.md new file mode 100644 index 0000000000..f9ae0ac226 --- /dev/null +++ b/2024/CVE-2024-42568.md @@ -0,0 +1,17 @@ +### [CVE-2024-42568](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42568) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the transport parameter at vehicle.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/38a30275374ef796ab860795f5df4dac + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42569.md b/2024/CVE-2024-42569.md new file mode 100644 index 0000000000..e3167cfb55 --- /dev/null +++ b/2024/CVE-2024-42569.md @@ -0,0 +1,17 @@ +### [CVE-2024-42569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42569) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at paidclass.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/20a81dbf47d371e1dabe08f350c8185d + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42571.md b/2024/CVE-2024-42571.md new file mode 100644 index 0000000000..c4dbf37e8b --- /dev/null +++ b/2024/CVE-2024-42571.md @@ -0,0 +1,17 @@ +### [CVE-2024-42571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42571) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at insertattendance.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/5c8e289fa66702fd3acbed558ee449dd + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42574.md b/2024/CVE-2024-42574.md new file mode 100644 index 0000000000..41c40bc45a --- /dev/null +++ b/2024/CVE-2024-42574.md @@ -0,0 +1,17 @@ +### [CVE-2024-42574](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42574) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at attendance.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/7064f8bbd3977ee665a098efcd0170c0 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42575.md b/2024/CVE-2024-42575.md new file mode 100644 index 0000000000..b5903fc0d1 --- /dev/null +++ b/2024/CVE-2024-42575.md @@ -0,0 +1,17 @@ +### [CVE-2024-42575](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42575) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at substaff.php. + +### POC + +#### Reference +- https://gist.github.com/topsky979/2fddc00b33b038cd778c1e4fb1936a15 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42576.md b/2024/CVE-2024-42576.md new file mode 100644 index 0000000000..759aceeaa5 --- /dev/null +++ b/2024/CVE-2024-42576.md @@ -0,0 +1,17 @@ +### [CVE-2024-42576](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42576) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component edit_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/50a1d8ad7effd9ccd089952602c831d3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42578.md b/2024/CVE-2024-42578.md new file mode 100644 index 0000000000..63f0a279f6 --- /dev/null +++ b/2024/CVE-2024-42578.md @@ -0,0 +1,17 @@ +### [CVE-2024-42578](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42578) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component edit_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/5eacc7e418e3b73b7ad1fa05d1a72aeb + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42579.md b/2024/CVE-2024-42579.md new file mode 100644 index 0000000000..45f9060e7a --- /dev/null +++ b/2024/CVE-2024-42579.md @@ -0,0 +1,17 @@ +### [CVE-2024-42579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42579) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component add_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/ed59fb8b35a220dfa064a3a3cb1ecb1b + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42580.md b/2024/CVE-2024-42580.md new file mode 100644 index 0000000000..d2c1611cf4 --- /dev/null +++ b/2024/CVE-2024-42580.md @@ -0,0 +1,17 @@ +### [CVE-2024-42580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42580) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component edit_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/8a05309486637d8c6ce8c6624ec1e897 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42581.md b/2024/CVE-2024-42581.md new file mode 100644 index 0000000000..aee3dbf62a --- /dev/null +++ b/2024/CVE-2024-42581.md @@ -0,0 +1,17 @@ +### [CVE-2024-42581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42581) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component delete_group.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/2bd26343ccdff7c759f62d332c8caff6 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42582.md b/2024/CVE-2024-42582.md new file mode 100644 index 0000000000..daf1f93a92 --- /dev/null +++ b/2024/CVE-2024-42582.md @@ -0,0 +1,17 @@ +### [CVE-2024-42582](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42582) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component delete_categorie.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/c0d78b257ce1e661be30de1ce9551d27 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42583.md b/2024/CVE-2024-42583.md new file mode 100644 index 0000000000..3a57cdd03e --- /dev/null +++ b/2024/CVE-2024-42583.md @@ -0,0 +1,17 @@ +### [CVE-2024-42583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42583) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component delete_user.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42585.md b/2024/CVE-2024-42585.md new file mode 100644 index 0000000000..9c4f25c122 --- /dev/null +++ b/2024/CVE-2024-42585.md @@ -0,0 +1,17 @@ +### [CVE-2024-42585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42585) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Cross-Site Request Forgery (CSRF) in the component delete_media.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. + +### POC + +#### Reference +- https://gist.github.com/topsky979/33de7a4bd7a4517a26fa4e4911b7fb1d + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42604.md b/2024/CVE-2024-42604.md new file mode 100644 index 0000000000..181917dce0 --- /dev/null +++ b/2024/CVE-2024-42604.md @@ -0,0 +1,17 @@ +### [CVE-2024-42604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42604) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3 + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/1/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42605.md b/2024/CVE-2024-42605.md new file mode 100644 index 0000000000..3ec90cc5c4 --- /dev/null +++ b/2024/CVE-2024-42605.md @@ -0,0 +1,17 @@ +### [CVE-2024-42605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42605) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/edit_page.php?link_id=1 + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/3/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42607.md b/2024/CVE-2024-42607.md new file mode 100644 index 0000000000..e0823f68b1 --- /dev/null +++ b/2024/CVE-2024-42607.md @@ -0,0 +1,17 @@ +### [CVE-2024-42607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42607) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=database + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/9/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42609.md b/2024/CVE-2024-42609.md new file mode 100644 index 0000000000..f89adc9da2 --- /dev/null +++ b/2024/CVE-2024-42609.md @@ -0,0 +1,17 @@ +### [CVE-2024-42609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42609) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_backup.php?dobackup=avatars + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/8/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42611.md b/2024/CVE-2024-42611.md new file mode 100644 index 0000000000..e8b8346c6f --- /dev/null +++ b/2024/CVE-2024-42611.md @@ -0,0 +1,17 @@ +### [CVE-2024-42611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42611) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/admin_page.php?link_id=1&mode=delete + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/4/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42613.md b/2024/CVE-2024-42613.md new file mode 100644 index 0000000000..56f0767104 --- /dev/null +++ b/2024/CVE-2024-42613.md @@ -0,0 +1,17 @@ +### [CVE-2024-42613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42613) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=install&widget=akismet + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/14/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42616.md b/2024/CVE-2024-42616.md new file mode 100644 index 0000000000..f660638109 --- /dev/null +++ b/2024/CVE-2024-42616.md @@ -0,0 +1,17 @@ +### [CVE-2024-42616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42616) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=remove&widget=Statistics + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/13/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42617.md b/2024/CVE-2024-42617.md new file mode 100644 index 0000000000..f6865bc1be --- /dev/null +++ b/2024/CVE-2024-42617.md @@ -0,0 +1,17 @@ +### [CVE-2024-42617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42617) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_config.php?action=save&var_id=32 + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/11/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42619.md b/2024/CVE-2024-42619.md new file mode 100644 index 0000000000..c912cf6e9d --- /dev/null +++ b/2024/CVE-2024-42619.md @@ -0,0 +1,17 @@ +### [CVE-2024-42619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42619) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/domain_management.php?id=0&list=whitelist&remove=pligg.com + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/17/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42621.md b/2024/CVE-2024-42621.md new file mode 100644 index 0000000000..7a5b123473 --- /dev/null +++ b/2024/CVE-2024-42621.md @@ -0,0 +1,17 @@ +### [CVE-2024-42621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42621) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_editor.php + +### POC + +#### Reference +- https://github.com/jinwu1234567890/cms2/tree/main/12/readme.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42636.md b/2024/CVE-2024-42636.md new file mode 100644 index 0000000000..d3ae78c2a6 --- /dev/null +++ b/2024/CVE-2024-42636.md @@ -0,0 +1,17 @@ +### [CVE-2024-42636](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42636) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +DedeCMS V5.7.115 has a command execution vulnerability via file_manage_view.php?fmdo=newfile&activepath. + +### POC + +#### Reference +- https://github.com/iami233/cve/issues/1 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42787.md b/2024/CVE-2024-42787.md new file mode 100644 index 0000000000..b20fa954d0 --- /dev/null +++ b/2024/CVE-2024-42787.md @@ -0,0 +1,17 @@ +### [CVE-2024-42787](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42787) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Stored Cross Site Scripting (XSS) vulnerability was found in "/music/ajax.php?action=save_playlist" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via "title" & "description" parameter fields. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42789.md b/2024/CVE-2024-42789.md new file mode 100644 index 0000000000..bac2205546 --- /dev/null +++ b/2024/CVE-2024-42789.md @@ -0,0 +1,17 @@ +### [CVE-2024-42789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42789) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A Reflected Cross Site Scripting (XSS) vulnerability was found in "/music/controller.php?page=test" in Kashipara Music Management System v1.0. This vulnerability allows remote attackers to execute arbitrary code via the "page" parameter. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-42815.md b/2024/CVE-2024-42815.md new file mode 100644 index 0000000000..0f3a2fe54f --- /dev/null +++ b/2024/CVE-2024-42815.md @@ -0,0 +1,17 @@ +### [CVE-2024-42815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42815) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +In the TP-Link RE365 V1_180213, there is a buffer overflow vulnerability due to the lack of length verification for the USER_AGENT field in /usr/bin/httpd. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. + +### POC + +#### Reference +- https://gist.github.com/XiaoCurry/14d46e0becd79d9bb9907f2fbe147cfe + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42845.md b/2024/CVE-2024-42845.md index 42eaa7008f..93f192f92c 100644 --- a/2024/CVE-2024-42845.md +++ b/2024/CVE-2024-42845.md @@ -13,6 +13,7 @@ An eval Injection vulnerability in the component invesalius/reader/dicom.py of I No PoCs from references. #### Github +- https://github.com/alessio-romano/Sfoffo-Pentesting-Notes - https://github.com/alessio-romano/alessio-romano - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-42852.md b/2024/CVE-2024-42852.md new file mode 100644 index 0000000000..35660fb1d5 --- /dev/null +++ b/2024/CVE-2024-42852.md @@ -0,0 +1,17 @@ +### [CVE-2024-42852](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42852) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Cross Site Scripting vulnerability in AcuToWeb server v.10.5.0.7577C8b allows a remote attacker to execute arbitrary code via the index.php component. + +### POC + +#### Reference +- https://github.com/Hebing123/cve/issues/64 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42906.md b/2024/CVE-2024-42906.md new file mode 100644 index 0000000000..e663eb6ea3 --- /dev/null +++ b/2024/CVE-2024-42906.md @@ -0,0 +1,17 @@ +### [CVE-2024-42906](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42906) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +TestLink before v.1.9.20 is vulnerable to Cross Site Scripting (XSS) via the pop-up on upload file. When uploading a file, the XSS payload can be entered into the file name. + +### POC + +#### Reference +- https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-42906.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-42992.md b/2024/CVE-2024-42992.md index f73e53ce16..1407e00f94 100644 --- a/2024/CVE-2024-42992.md +++ b/2024/CVE-2024-42992.md @@ -1,11 +1,11 @@ ### [CVE-2024-42992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42992) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) -![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description -Python Pip Pandas v2.2.2 was discovered to contain an arbitrary file read vulnerability. +** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. ### POC diff --git a/2024/CVE-2024-43022.md b/2024/CVE-2024-43022.md index f280f63294..3c77a5500e 100644 --- a/2024/CVE-2024-43022.md +++ b/2024/CVE-2024-43022.md @@ -10,7 +10,7 @@ An issue in the downloader.php component of TOSEI online store management system ### POC #### Reference -No PoCs from references. +- https://gist.github.com/b0rgch3n/6ba0b04da7e48ead20f10b15088fd244 #### Github - https://github.com/b0rgch3n/b0rgch3n diff --git a/2024/CVE-2024-43116.md b/2024/CVE-2024-43116.md new file mode 100644 index 0000000000..ed7aba937a --- /dev/null +++ b/2024/CVE-2024-43116.md @@ -0,0 +1,17 @@ +### [CVE-2024-43116](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43116) +![](https://img.shields.io/static/v1?label=Product&message=Simple%20Local%20Avatars&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in 10up Simple Local Avatars.This issue affects Simple Local Avatars: from n/a through 2.7.10. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43117.md b/2024/CVE-2024-43117.md new file mode 100644 index 0000000000..26de5f5247 --- /dev/null +++ b/2024/CVE-2024-43117.md @@ -0,0 +1,17 @@ +### [CVE-2024-43117](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43117) +![](https://img.shields.io/static/v1?label=Product&message=Hummingbird&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.9.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43214.md b/2024/CVE-2024-43214.md new file mode 100644 index 0000000000..9f2e6b301e --- /dev/null +++ b/2024/CVE-2024-43214.md @@ -0,0 +1,17 @@ +### [CVE-2024-43214](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43214) +![](https://img.shields.io/static/v1?label=Product&message=myCred&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) + +### Description + +Missing Authorization vulnerability in myCred.This issue affects myCred: from n/a through 2.7.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43230.md b/2024/CVE-2024-43230.md new file mode 100644 index 0000000000..de2867a443 --- /dev/null +++ b/2024/CVE-2024-43230.md @@ -0,0 +1,17 @@ +### [CVE-2024-43230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43230) +![](https://img.shields.io/static/v1?label=Product&message=Shared%20Files&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Shared Files – File Upload Form Shared Files.This issue affects Shared Files: from n/a through 1.7.28. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43251.md b/2024/CVE-2024-43251.md new file mode 100644 index 0000000000..3eef01bd09 --- /dev/null +++ b/2024/CVE-2024-43251.md @@ -0,0 +1,17 @@ +### [CVE-2024-43251](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43251) +![](https://img.shields.io/static/v1?label=Product&message=Bit%20Form%20Pro&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.6.4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Bit Apps Bit Form Pro.This issue affects Bit Form Pro: from n/a through 2.6.4. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43255.md b/2024/CVE-2024-43255.md new file mode 100644 index 0000000000..4cfd4461ae --- /dev/null +++ b/2024/CVE-2024-43255.md @@ -0,0 +1,17 @@ +### [CVE-2024-43255](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43255) +![](https://img.shields.io/static/v1?label=Product&message=MyBookTable%20Bookstore&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%203.3.9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore allows Cross-Site Scripting (XSS).This issue affects MyBookTable Bookstore: from n/a through 3.3.9. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43257.md b/2024/CVE-2024-43257.md new file mode 100644 index 0000000000..fc2a423293 --- /dev/null +++ b/2024/CVE-2024-43257.md @@ -0,0 +1,17 @@ +### [CVE-2024-43257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43257) +![](https://img.shields.io/static/v1?label=Product&message=Leopard%20-%20WordPress%20offload%20media&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.0.36%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Nouthemes Leopard - WordPress offload media.This issue affects Leopard - WordPress offload media: from n/a through 2.0.36. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43258.md b/2024/CVE-2024-43258.md new file mode 100644 index 0000000000..450e8f5cf1 --- /dev/null +++ b/2024/CVE-2024-43258.md @@ -0,0 +1,17 @@ +### [CVE-2024-43258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43258) +![](https://img.shields.io/static/v1?label=Product&message=Store%20Locator%20Plus&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202311.17.01%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Store Locator Plus.This issue affects Store Locator Plus: from n/a through 2311.17.01. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43259.md b/2024/CVE-2024-43259.md new file mode 100644 index 0000000000..ba5e38cbf9 --- /dev/null +++ b/2024/CVE-2024-43259.md @@ -0,0 +1,17 @@ +### [CVE-2024-43259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43259) +![](https://img.shields.io/static/v1?label=Product&message=Order%20Export%20for%20WooCommerce&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in JEM Plugins Order Export for WooCommerce.This issue affects Order Export for WooCommerce: from n/a through 3.23. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43264.md b/2024/CVE-2024-43264.md new file mode 100644 index 0000000000..ff56bcbcaa --- /dev/null +++ b/2024/CVE-2024-43264.md @@ -0,0 +1,17 @@ +### [CVE-2024-43264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43264) +![](https://img.shields.io/static/v1?label=Product&message=Create%20by%20Mediavine&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.9.8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mediavine Create by Mediavine.This issue affects Create by Mediavine: from n/a through 1.9.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43265.md b/2024/CVE-2024-43265.md new file mode 100644 index 0000000000..40d4774cdc --- /dev/null +++ b/2024/CVE-2024-43265.md @@ -0,0 +1,17 @@ +### [CVE-2024-43265](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43265) +![](https://img.shields.io/static/v1?label=Product&message=Analytify&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Analytify.This issue affects Analytify: from n/a through 5.3.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43269.md b/2024/CVE-2024-43269.md new file mode 100644 index 0000000000..fbde99b220 --- /dev/null +++ b/2024/CVE-2024-43269.md @@ -0,0 +1,17 @@ +### [CVE-2024-43269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43269) +![](https://img.shields.io/static/v1?label=Product&message=Backup%20and%20Restore%20WordPress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.50%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in WPBackItUp Backup and Restore WordPress.This issue affects Backup and Restore WordPress: from n/a through 1.50. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43283.md b/2024/CVE-2024-43283.md new file mode 100644 index 0000000000..fdee8352db --- /dev/null +++ b/2024/CVE-2024-43283.md @@ -0,0 +1,17 @@ +### [CVE-2024-43283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43283) +![](https://img.shields.io/static/v1?label=Product&message=Contest%20Gallery&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Contest Gallery.This issue affects Contest Gallery: from n/a through 23.1.2. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43287.md b/2024/CVE-2024-43287.md new file mode 100644 index 0000000000..440853c235 --- /dev/null +++ b/2024/CVE-2024-43287.md @@ -0,0 +1,17 @@ +### [CVE-2024-43287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43287) +![](https://img.shields.io/static/v1?label=Product&message=Newsletter%2C%20SMTP%2C%20Email%20marketing%20and%20Subscribe%20forms%20by%20Sendinblue&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Brevo Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue.This issue affects Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue: from n/a through 3.1.82. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43289.md b/2024/CVE-2024-43289.md new file mode 100644 index 0000000000..d608d651d1 --- /dev/null +++ b/2024/CVE-2024-43289.md @@ -0,0 +1,17 @@ +### [CVE-2024-43289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43289) +![](https://img.shields.io/static/v1?label=Product&message=wpForo%20Forum&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in gVectors Team wpForo Forum.This issue affects wpForo Forum: from n/a through 2.3.4. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43295.md b/2024/CVE-2024-43295.md new file mode 100644 index 0000000000..0e451f5aef --- /dev/null +++ b/2024/CVE-2024-43295.md @@ -0,0 +1,17 @@ +### [CVE-2024-43295](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43295) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Data%20Access&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Passionate Programmers B.V. WP Data Access.This issue affects WP Data Access: from n/a through 5.5.7. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43299.md b/2024/CVE-2024-43299.md new file mode 100644 index 0000000000..acb57f8ffc --- /dev/null +++ b/2024/CVE-2024-43299.md @@ -0,0 +1,17 @@ +### [CVE-2024-43299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43299) +![](https://img.shields.io/static/v1?label=Product&message=SpeedyCache&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Team SpeedyCache.This issue affects SpeedyCache: from n/a through 1.1.8. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43301.md b/2024/CVE-2024-43301.md new file mode 100644 index 0000000000..fcb4e566f4 --- /dev/null +++ b/2024/CVE-2024-43301.md @@ -0,0 +1,17 @@ +### [CVE-2024-43301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43301) +![](https://img.shields.io/static/v1?label=Product&message=Fonts&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Fonts Plugin Fonts allows Stored XSS.This issue affects Fonts: from n/a through 3.7.7. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43316.md b/2024/CVE-2024-43316.md new file mode 100644 index 0000000000..47065aef22 --- /dev/null +++ b/2024/CVE-2024-43316.md @@ -0,0 +1,17 @@ +### [CVE-2024-43316](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43316) +![](https://img.shields.io/static/v1?label=Product&message=Stripe%20Payments%20For%20WooCommerce%20by%20Checkout&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43319.md b/2024/CVE-2024-43319.md new file mode 100644 index 0000000000..d6367cf04a --- /dev/null +++ b/2024/CVE-2024-43319.md @@ -0,0 +1,17 @@ +### [CVE-2024-43319](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43319) +![](https://img.shields.io/static/v1?label=Product&message=Flash%20%26%20HTML5%20Video&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) + +### Description + +Exposure of Sensitive Information to an Unauthorized Actor vulnerability in bPlugins LLC Flash & HTML5 Video.This issue affects Flash & HTML5 Video: from n/a through 2.5.31. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43325.md b/2024/CVE-2024-43325.md new file mode 100644 index 0000000000..fe34f62b8c --- /dev/null +++ b/2024/CVE-2024-43325.md @@ -0,0 +1,17 @@ +### [CVE-2024-43325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43325) +![](https://img.shields.io/static/v1?label=Product&message=Dark%20Mode%20for%20WP%20Dashboard&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Naiche Dark Mode for WP Dashboard.This issue affects Dark Mode for WP Dashboard: from n/a through 1.2.3. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43336.md b/2024/CVE-2024-43336.md new file mode 100644 index 0000000000..bd19dc51e5 --- /dev/null +++ b/2024/CVE-2024-43336.md @@ -0,0 +1,17 @@ +### [CVE-2024-43336](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43336) +![](https://img.shields.io/static/v1?label=Product&message=WP%20User%20Manager&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%202.9.10%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in WP User Manager.This issue affects WP User Manager: from n/a through 2.9.10. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43337.md b/2024/CVE-2024-43337.md new file mode 100644 index 0000000000..b9205748c4 --- /dev/null +++ b/2024/CVE-2024-43337.md @@ -0,0 +1,17 @@ +### [CVE-2024-43337](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43337) +![](https://img.shields.io/static/v1?label=Product&message=Brave%20Popup%20Builder&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Brave Brave Popup Builder.This issue affects Brave Popup Builder: from n/a through 0.7.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43339.md b/2024/CVE-2024-43339.md new file mode 100644 index 0000000000..d5e5a4584a --- /dev/null +++ b/2024/CVE-2024-43339.md @@ -0,0 +1,17 @@ +### [CVE-2024-43339](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43339) +![](https://img.shields.io/static/v1?label=Product&message=WebinarPress&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in WebinarPress allows Cross-Site Scripting (XSS).This issue affects WebinarPress: from n/a through 1.33.20. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43340.md b/2024/CVE-2024-43340.md new file mode 100644 index 0000000000..65890967d5 --- /dev/null +++ b/2024/CVE-2024-43340.md @@ -0,0 +1,17 @@ +### [CVE-2024-43340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43340) +![](https://img.shields.io/static/v1?label=Product&message=Advanced%20Form%20Integration&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in Nasirahmed Advanced Form Integration.This issue affects Advanced Form Integration: from n/a through 1.89.4. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43356.md b/2024/CVE-2024-43356.md new file mode 100644 index 0000000000..5621854b4b --- /dev/null +++ b/2024/CVE-2024-43356.md @@ -0,0 +1,17 @@ +### [CVE-2024-43356](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43356) +![](https://img.shields.io/static/v1?label=Product&message=oik&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +Cross-Site Request Forgery (CSRF) vulnerability in bobbingwide.This issue affects oik: from n/a through 4.12.0. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/20142995/nuclei-templates + diff --git a/2024/CVE-2024-43380.md b/2024/CVE-2024-43380.md new file mode 100644 index 0000000000..8cab59fda5 --- /dev/null +++ b/2024/CVE-2024-43380.md @@ -0,0 +1,17 @@ +### [CVE-2024-43380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43380) +![](https://img.shields.io/static/v1?label=Product&message=fugit&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.11.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen) + +### Description + +fugit contains time tools for flor and the floraison group. The fugit "natural" parser, that turns "every wednesday at 5pm" into "0 17 * * 3", accepted any length of input and went on attempting to parse it, not returning promptly, as expected. The parse call could hold the thread with no end in sight. Fugit dependents that do not check (user) input length for plausibility are impacted. A fix was released in fugit 1.11.1. + +### POC + +#### Reference +- https://github.com/floraison/fugit/issues/104 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43399.md b/2024/CVE-2024-43399.md new file mode 100644 index 0000000000..ef4d432e5e --- /dev/null +++ b/2024/CVE-2024-43399.md @@ -0,0 +1,17 @@ +### [CVE-2024-43399](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43399) +![](https://img.shields.io/static/v1?label=Product&message=Mobile-Security-Framework-MobSF&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.0.7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-23%3A%20Relative%20Path%20Traversal&color=brighgreen) + +### Description + +Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. + +### POC + +#### Reference +- https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43406.md b/2024/CVE-2024-43406.md new file mode 100644 index 0000000000..dfe4e538c2 --- /dev/null +++ b/2024/CVE-2024-43406.md @@ -0,0 +1,17 @@ +### [CVE-2024-43406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43406) +![](https://img.shields.io/static/v1?label=Product&message=ekuiper&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.14.2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. A user could utilize and exploit SQL Injection to allow the execution of malicious SQL query via Get method in sqlKvStore. This vulnerability is fixed in 1.14.2. + +### POC + +#### Reference +- https://github.com/lf-edge/ekuiper/security/advisories/GHSA-r5ph-4jxm-6j9p + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43410.md b/2024/CVE-2024-43410.md new file mode 100644 index 0000000000..a5f66eaa98 --- /dev/null +++ b/2024/CVE-2024-43410.md @@ -0,0 +1,17 @@ +### [CVE-2024-43410](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43410) +![](https://img.shields.io/static/v1?label=Product&message=russh&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.44.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen) + +### Description + +Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length.After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1. + +### POC + +#### Reference +- https://github.com/Eugeny/russh/security/advisories/GHSA-vgvv-x7xg-6cqg + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43785.md b/2024/CVE-2024-43785.md index 12a597909f..f0e29128b6 100644 --- a/2024/CVE-2024-43785.md +++ b/2024/CVE-2024-43785.md @@ -10,7 +10,7 @@ gitoxide An idiomatic, lean, fast & safe pure Rust implementation of Git. gitoxi ### POC #### Reference -No PoCs from references. +- https://github.com/Byron/gitoxide/security/advisories/GHSA-88g2-r9rw-g55h #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-43787.md b/2024/CVE-2024-43787.md index 18570ada0a..fbdafdb7f5 100644 --- a/2024/CVE-2024-43787.md +++ b/2024/CVE-2024-43787.md @@ -10,7 +10,7 @@ Hono is a Web application framework that provides support for any JavaScript run ### POC #### Reference -No PoCs from references. +- https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-43790.md b/2024/CVE-2024-43790.md new file mode 100644 index 0000000000..7114f5794a --- /dev/null +++ b/2024/CVE-2024-43790.md @@ -0,0 +1,17 @@ +### [CVE-2024-43790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43790) +![](https://img.shields.io/static/v1?label=Product&message=vim&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20v9.1.0689%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen) + +### Description + +Vim is an open source command line text editor. When performing a search and displaying the search-count message is disabled (:set shm+=S), the search pattern is displayed at the bottom of the screen in a buffer (msgbuf). When right-left mode (:set rl) is enabled, the search pattern is reversed. This happens by allocating a new buffer. If the search pattern contains some ASCII NUL characters, the buffer allocated will be smaller than the original allocated buffer (because for allocating the reversed buffer, the strlen() function is called, which only counts until it notices an ASCII NUL byte ) and thus the original length indicator is wrong. This causes an overflow when accessing characters inside the msgbuf by the previously (now wrong) length of the msgbuf. The issue has been fixed as of Vim patch v9.1.0689. + +### POC + +#### Reference +- https://github.com/vim/vim/security/advisories/GHSA-v2x2-cjcg-f9jm + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43798.md b/2024/CVE-2024-43798.md new file mode 100644 index 0000000000..e44b357a07 --- /dev/null +++ b/2024/CVE-2024-43798.md @@ -0,0 +1,18 @@ +### [CVE-2024-43798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43798) +![](https://img.shields.io/static/v1?label=Product&message=chisel&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.10.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1068%3A%20Inconsistency%20Between%20Implementation%20and%20Documented%20Design&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen) + +### Description + +Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. The Chisel server doesn't ever read the documented `AUTH` environment variable used to set credentials, which allows any unauthenticated user to connect, even if credentials were set. Anyone running the Chisel server that is using the `AUTH` environment variable to specify credentials to authenticate against is affected by this vulnerability. Chisel is often used to provide an entrypoint to a private network, which means services that are gated by Chisel may be affected. Additionally, Chisel is often used for exposing services to the internet. An attacker could MITM requests by connecting to a Chisel server and requesting to forward traffic from a remote port. This issue has been addressed in release version 1.10.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. + +### POC + +#### Reference +- https://github.com/jpillora/chisel/security/advisories/GHSA-38jh-8h67-m7mj + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43802.md b/2024/CVE-2024-43802.md new file mode 100644 index 0000000000..0bbb264b2c --- /dev/null +++ b/2024/CVE-2024-43802.md @@ -0,0 +1,17 @@ +### [CVE-2024-43802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43802) +![](https://img.shields.io/static/v1?label=Product&message=vim&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%209.1.0697%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen) + +### Description + +Vim is an improved version of the unix vi text editor. When flushing the typeahead buffer, Vim moves the current position in the typeahead buffer but does not check whether there is enough space left in the buffer to handle the next characters. So this may lead to the tb_off position within the typebuf variable to point outside of the valid buffer size, which can then later lead to a heap-buffer overflow in e.g. ins_typebuf(). Therefore, when flushing the typeahead buffer, check if there is enough space left before advancing the off position. If not, fall back to flush current typebuf contents. It's not quite clear yet, what can lead to this situation. It seems to happen when error messages occur (which will cause Vim to flush the typeahead buffer) in comnination with several long mappgins and so it may eventually move the off position out of a valid buffer size. Impact is low since it is not easily reproducible and requires to have several mappings active and run into some error condition. But when this happens, this will cause a crash. The issue has been fixed as of Vim patch v9.1.0697. Users are advised to upgrade. There are no known workarounds for this issue. + +### POC + +#### Reference +- https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43806.md b/2024/CVE-2024-43806.md new file mode 100644 index 0000000000..7c7435e73f --- /dev/null +++ b/2024/CVE-2024-43806.md @@ -0,0 +1,17 @@ +### [CVE-2024-43806](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43806) +![](https://img.shields.io/static/v1?label=Product&message=rustix&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%200.35.11%2C%20%3C%200.35.15%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen) + +### Description + +Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain directories that spontaneously pop in and out of existence. Attempting to iterate over them using `rustix::fs::Dir` directly or indirectly (e.g. with the `procfs` crate) can trigger this fault condition if the implementation decides to continue on errors. An attacker knowledgeable about the implementation details of a vulnerable target can therefore try to trigger this fault condition via any one or a combination of several available APIs. If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. This issue has been addressed in release versions 0.35.15, 0.36.16, 0.37.25, and 0.38.19. Users are advised to upgrade. There are no known workarounds for this issue. + +### POC + +#### Reference +- https://github.com/bytecodealliance/rustix/security/advisories/GHSA-c827-hfw6-qwvm + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-43966.md b/2024/CVE-2024-43966.md new file mode 100644 index 0000000000..461abe9718 --- /dev/null +++ b/2024/CVE-2024-43966.md @@ -0,0 +1,17 @@ +### [CVE-2024-43966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43966) +![](https://img.shields.io/static/v1?label=Product&message=WP%20Testimonial%20Widget&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%203.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stark Digital WP Testimonial Widget.This issue affects WP Testimonial Widget: from n/a through 3.1. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-44083.md b/2024/CVE-2024-44083.md index 7c87389932..22b913e10d 100644 --- a/2024/CVE-2024-44083.md +++ b/2024/CVE-2024-44083.md @@ -10,7 +10,7 @@ ida64.dll in Hex-Rays IDA Pro through 8.4 crashes when there is a section that h ### POC #### Reference -No PoCs from references. +- https://github.com/Azvanzed/IdaMeme #### Github - https://github.com/Azvanzed/IdaMeme diff --git a/2024/CVE-2024-44381.md b/2024/CVE-2024-44381.md new file mode 100644 index 0000000000..f2350b66f4 --- /dev/null +++ b/2024/CVE-2024-44381.md @@ -0,0 +1,17 @@ +### [CVE-2024-44381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44381) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +D-Link DI_8004W 16.07.26A1 contains a command execution vulnerability in jhttpd msp_info_htm function. + +### POC + +#### Reference +- https://github.com/GroundCTL2MajorTom/pocs/blob/main/dlink_DI8004W.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-44382.md b/2024/CVE-2024-44382.md new file mode 100644 index 0000000000..a21eaa421f --- /dev/null +++ b/2024/CVE-2024-44382.md @@ -0,0 +1,17 @@ +### [CVE-2024-44382](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44382) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +D-Link DI_8004W 16.07.26A1 contains a command execution vulnerability in the jhttpd upgrade_filter_asp function. + +### POC + +#### Reference +- https://github.com/GroundCTL2MajorTom/pocs/blob/main/dlink_DI8004W.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-4439.md b/2024/CVE-2024-4439.md index 61cafc0b31..c4bc5460ab 100644 --- a/2024/CVE-2024-4439.md +++ b/2024/CVE-2024-4439.md @@ -14,6 +14,7 @@ No PoCs from references. #### Github - https://github.com/MielPopsssssss/CVE-2024-4439 +- https://github.com/N0boy-0/vulenv - https://github.com/Ostorlab/KEV - https://github.com/d0rb/CVE-2024-4439 - https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-44556.md b/2024/CVE-2024-44556.md new file mode 100644 index 0000000000..7d04f5b71f --- /dev/null +++ b/2024/CVE-2024-44556.md @@ -0,0 +1,17 @@ +### [CVE-2024-44556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44556) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-44558.md b/2024/CVE-2024-44558.md new file mode 100644 index 0000000000..a0b316af88 --- /dev/null +++ b/2024/CVE-2024-44558.md @@ -0,0 +1,17 @@ +### [CVE-2024-44558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44558) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-44793.md b/2024/CVE-2024-44793.md new file mode 100644 index 0000000000..44b3614d0f --- /dev/null +++ b/2024/CVE-2024-44793.md @@ -0,0 +1,17 @@ +### [CVE-2024-44793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44793) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the component /managers/multiple_freeleech.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the torrents parameter. + +### POC + +#### Reference +- https://github.com/WhatCD/Gazelle/issues/131 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-44794.md b/2024/CVE-2024-44794.md new file mode 100644 index 0000000000..679746d7fc --- /dev/null +++ b/2024/CVE-2024-44794.md @@ -0,0 +1,17 @@ +### [CVE-2024-44794](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44794) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the component /master/auth/OnedriveRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter. + +### POC + +#### Reference +- https://github.com/xiebruce/PicUploader/issues/91 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-44795.md b/2024/CVE-2024-44795.md new file mode 100644 index 0000000000..422e69804c --- /dev/null +++ b/2024/CVE-2024-44795.md @@ -0,0 +1,17 @@ +### [CVE-2024-44795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44795) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the component /login/disabled.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter. + +### POC + +#### Reference +- https://github.com/WhatCD/Gazelle/issues/129 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-44796.md b/2024/CVE-2024-44796.md new file mode 100644 index 0000000000..9d97b62dcc --- /dev/null +++ b/2024/CVE-2024-44796.md @@ -0,0 +1,17 @@ +### [CVE-2024-44796](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44796) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the component /auth/AzureRedirect.php of PicUploader commit fcf82ea allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error_description parameter. + +### POC + +#### Reference +- https://github.com/xiebruce/PicUploader/issues/90 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-44797.md b/2024/CVE-2024-44797.md new file mode 100644 index 0000000000..541df1c890 --- /dev/null +++ b/2024/CVE-2024-44797.md @@ -0,0 +1,17 @@ +### [CVE-2024-44797](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44797) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A cross-site scripting (XSS) vulnerability in the component /managers/enable_requests.php of Gazelle commit 63b3370 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the view parameter. + +### POC + +#### Reference +- https://github.com/WhatCD/Gazelle/issues/130 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-45244.md b/2024/CVE-2024-45244.md new file mode 100644 index 0000000000..20f2cfec90 --- /dev/null +++ b/2024/CVE-2024-45244.md @@ -0,0 +1,17 @@ +### [CVE-2024-45244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45244) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +Hyperledger Fabric through 2.5.9 does not verify that a request has a timestamp within the expected time window. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-45256.md b/2024/CVE-2024-45256.md index 82be3001f6..e5099c40f3 100644 --- a/2024/CVE-2024-45256.md +++ b/2024/CVE-2024-45256.md @@ -11,6 +11,7 @@ An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your O #### Reference - https://blog.chebuya.com/posts/unauthenticated-remote-command-execution-on-byob/ +- https://github.com/chebuya/exploits/tree/main/BYOB-RCE #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-45258.md b/2024/CVE-2024-45258.md index 770fd8b103..cdac7ccee8 100644 --- a/2024/CVE-2024-45258.md +++ b/2024/CVE-2024-45258.md @@ -10,7 +10,7 @@ The req package before 3.43.4 for Go may send an unintended request when a malfo ### POC #### Reference -No PoCs from references. +- https://github.com/imroc/req/commit/04e3ece5b380ecad9da3551c449f1b8a9aa76d3d #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-45265.md b/2024/CVE-2024-45265.md new file mode 100644 index 0000000000..eb06c764d8 --- /dev/null +++ b/2024/CVE-2024-45265.md @@ -0,0 +1,17 @@ +### [CVE-2024-45265](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45265) +![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) +![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) + +### Description + +A SQL injection vulnerability in the poll component in SkySystem Arfa-CMS before 5.1.3124 allows remote attackers to execute arbitrary SQL commands via the psid parameter. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/nomi-sec/PoC-in-GitHub + diff --git a/2024/CVE-2024-6377.md b/2024/CVE-2024-6377.md new file mode 100644 index 0000000000..275069d2e7 --- /dev/null +++ b/2024/CVE-2024-6377.md @@ -0,0 +1,17 @@ +### [CVE-2024-6377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6377) +![](https://img.shields.io/static/v1?label=Product&message=3DSwymer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=Release%203DEXPERIENCE%20R2022x%20Golden%3C%3D%20Release%203DEXPERIENCE%20R2022x.FP.CFA.2424%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brighgreen) + +### Description + +An URL redirection to untrusted site (open redirect) vulnerability affecting 3DPassport in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to redirect users to an arbitrary website via a crafted URL. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6379.md b/2024/CVE-2024-6379.md new file mode 100644 index 0000000000..ad0349dc43 --- /dev/null +++ b/2024/CVE-2024-6379.md @@ -0,0 +1,17 @@ +### [CVE-2024-6379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6379) +![](https://img.shields.io/static/v1?label=Product&message=3DSwymer&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=Release%203DEXPERIENCE%20R2022x%20Golden%3C%3D%20Release%203DEXPERIENCE%20R2022x.FP.CFA.2424%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen) + +### Description + +A reflected Cross-site Scripting (XSS) vulnerability affecting 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6386.md b/2024/CVE-2024-6386.md index 8302483763..f8fc47188d 100644 --- a/2024/CVE-2024-6386.md +++ b/2024/CVE-2024-6386.md @@ -14,4 +14,5 @@ The WPML plugin for WordPress is vulnerable to Remote Code Execution in all vers #### Github - https://github.com/20142995/nuclei-templates +- https://github.com/nomi-sec/PoC-in-GitHub diff --git a/2024/CVE-2024-6387.md b/2024/CVE-2024-6387.md index ec3979f4b5..99f4e27142 100644 --- a/2024/CVE-2024-6387.md +++ b/2024/CVE-2024-6387.md @@ -60,6 +60,7 @@ A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/rxerium/stars - https://github.com/ryanalieh/openSSH-scanner +- https://github.com/rylei-m/USU_2024_PS1_Script_For_SSH - https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH - https://github.com/sardine-web/CVE-2024-6387_Check - https://github.com/tanjiti/sec_profile diff --git a/2024/CVE-2024-6813.md b/2024/CVE-2024-6813.md new file mode 100644 index 0000000000..56a4b88a73 --- /dev/null +++ b/2024/CVE-2024-6813.md @@ -0,0 +1,17 @@ +### [CVE-2024-6813](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6813) +![](https://img.shields.io/static/v1?label=Product&message=ProSAFE%20Network%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.7.0.34%20x64%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +NETGEAR ProSAFE Network Management System getSortString SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.The specific flaw exists within the getSortString method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-23207. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6814.md b/2024/CVE-2024-6814.md new file mode 100644 index 0000000000..705ff738f2 --- /dev/null +++ b/2024/CVE-2024-6814.md @@ -0,0 +1,17 @@ +### [CVE-2024-6814](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6814) +![](https://img.shields.io/static/v1?label=Product&message=ProSAFE%20Network%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.7.0.34%20x64%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) + +### Description + +NETGEAR ProSAFE Network Management System getFilterString SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.The specific flaw exists within the getFilterString method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-23399. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6956.md b/2024/CVE-2024-6956.md index 9db1a4fdd1..c38d5850d3 100644 --- a/2024/CVE-2024-6956.md +++ b/2024/CVE-2024-6956.md @@ -11,6 +11,7 @@ A vulnerability was found in itsourcecode University Management System 1.0. It h #### Reference - https://github.com/DeepMountains/Mirage/blob/main/CVE6-2.md +- https://vuldb.com/?submit.377754 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-6973.md b/2024/CVE-2024-6973.md new file mode 100644 index 0000000000..0c03bf216e --- /dev/null +++ b/2024/CVE-2024-6973.md @@ -0,0 +1,17 @@ +### [CVE-2024-6973](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6973) +![](https://img.shields.io/static/v1?label=Product&message=SDP%20Client&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.10.34%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +Remote Code Execution in Cato Windows SDP client via crafted URLs.This issue affects Windows SDP Client before 5.10.34. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6974.md b/2024/CVE-2024-6974.md new file mode 100644 index 0000000000..c7cfc5a3f8 --- /dev/null +++ b/2024/CVE-2024-6974.md @@ -0,0 +1,18 @@ +### [CVE-2024-6974](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6974) +![](https://img.shields.io/static/v1?label=Product&message=SDP%20Client&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.10.34%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-276%20Incorrect%20Default%20Permissions&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426%20Untrusted%20Search%20Path&color=brighgreen) + +### Description + +Cato Networks Windows SDP Client Local Privilege Escalation via self-upgradeThis issue affects SDP Client: before 5.10.34. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-6975.md b/2024/CVE-2024-6975.md index 588e869e05..cb5245b245 100644 --- a/2024/CVE-2024-6975.md +++ b/2024/CVE-2024-6975.md @@ -14,4 +14,5 @@ No PoCs from references. #### Github - https://github.com/chnzzh/OpenSSL-CVE-lib +- https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-6977.md b/2024/CVE-2024-6977.md new file mode 100644 index 0000000000..8eb006fd44 --- /dev/null +++ b/2024/CVE-2024-6977.md @@ -0,0 +1,17 @@ +### [CVE-2024-6977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6977) +![](https://img.shields.io/static/v1?label=Product&message=SDP%20Client&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.10.28%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&color=brighgreen) + +### Description + +A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7062.md b/2024/CVE-2024-7062.md new file mode 100644 index 0000000000..b82c5dc93e --- /dev/null +++ b/2024/CVE-2024-7062.md @@ -0,0 +1,17 @@ +### [CVE-2024-7062](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7062) +![](https://img.shields.io/static/v1?label=Product&message=Nimble%20Commander&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%20v1.6.0%2C%20Build%204087%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brighgreen) + +### Description + +Nimble Commander suffers from a privilege escalation vulnerability due to the server (info.filesmanager.Files.PrivilegedIOHelperV2) performing improper/insufficient validation of a client’s authorization before executing an operation. Consequently, it is possible to execute system-level commands as the root user, such as changing permissions and ownership, obtaining a handle (file descriptor) of an arbitrary file, and terminating processes, among other operations. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7273.md b/2024/CVE-2024-7273.md index ab5d134f99..7f9a0befd1 100644 --- a/2024/CVE-2024-7273.md +++ b/2024/CVE-2024-7273.md @@ -11,6 +11,7 @@ A vulnerability classified as critical was found in itsourcecode Alton Managemen #### Reference - https://github.com/DeepMountains/Mirage/blob/main/CVE8-1.md +- https://vuldb.com/?submit.381089 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-7499.md b/2024/CVE-2024-7499.md index f6272620a4..18e7ac7f8d 100644 --- a/2024/CVE-2024-7499.md +++ b/2024/CVE-2024-7499.md @@ -11,6 +11,7 @@ A vulnerability was found in itsourcecode Airline Reservation System 1.0. It has #### Reference - https://github.com/DeepMountains/zzz/blob/main/CVE1-4.md +- https://vuldb.com/?submit.385895 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-7608.md b/2024/CVE-2024-7608.md new file mode 100644 index 0000000000..20f7af1e39 --- /dev/null +++ b/2024/CVE-2024-7608.md @@ -0,0 +1,17 @@ +### [CVE-2024-7608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7608) +![](https://img.shields.io/static/v1?label=Product&message=Trellix%20NX%2C%20EX%2C%20AX%2C%20FX%2C%20CMS%20and%20IVX&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20Trellix%20NX%2C%20EX%2C%20AX%2C%20FX%2C%20CMS%2010.0.1%20and%20older%2C%20for%20Trellix%20IVX%2010.02.%20and%20older%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-35%3A%20Path%20Traversal%3A%20'...%2F...%2F%2F'&color=brighgreen) + +### Description + +An authenticated user can download sensitive files from Trellix products NX, EX, FX, AX, IVX, and CMS using path traversal for the URL of network anomaly download_artifact. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7738.md b/2024/CVE-2024-7738.md index 2d4fb5d0e9..6eb91a8b1d 100644 --- a/2024/CVE-2024-7738.md +++ b/2024/CVE-2024-7738.md @@ -12,6 +12,7 @@ A vulnerability, which was classified as problematic, has been found in yzane vs #### Reference - https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/file_read_report.md - https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/poc_arbitrary_file_read.mp4 +- https://vuldb.com/?submit.385634 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-7853.md b/2024/CVE-2024-7853.md new file mode 100644 index 0000000000..d8e5d24c31 --- /dev/null +++ b/2024/CVE-2024-7853.md @@ -0,0 +1,17 @@ +### [CVE-2024-7853](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7853) +![](https://img.shields.io/static/v1?label=Product&message=Yoga%20Class%20Registration%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester Yoga Class Registration System up to 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=categories/view_category. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/Wsstiger/cve/blob/main/Yoga_sql.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-7937.md b/2024/CVE-2024-7937.md index 7c6b10a936..67c7e216a8 100644 --- a/2024/CVE-2024-7937.md +++ b/2024/CVE-2024-7937.md @@ -11,6 +11,7 @@ A vulnerability classified as critical was found in itsourcecode Project Expense #### Reference - https://github.com/DeepMountains/zzz/blob/main/CVE3-5.md +- https://vuldb.com/?submit.392949 #### Github No PoCs found on GitHub currently. diff --git a/2024/CVE-2024-7965.md b/2024/CVE-2024-7965.md index 214c20cba0..450a5f75bb 100644 --- a/2024/CVE-2024-7965.md +++ b/2024/CVE-2024-7965.md @@ -13,5 +13,7 @@ Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allow No PoCs from references. #### Github +- https://github.com/0xAtef/0xAtef - https://github.com/fkie-cad/nvd-json-data-feeds +- https://github.com/frlc/frlc diff --git a/2024/CVE-2024-7987.md b/2024/CVE-2024-7987.md new file mode 100644 index 0000000000..5ce622f49f --- /dev/null +++ b/2024/CVE-2024-7987.md @@ -0,0 +1,17 @@ +### [CVE-2024-7987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7987) +![](https://img.shields.io/static/v1?label=Product&message=ThinManager%C2%AE%20ThinServer%E2%84%A2&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.1.0-11.1.7%2011.2.0-11.2.8%2012.0.0-12.0.6%2012.1.0-12.1.7%2013.0.0-13.0.4%2013.1.0-13.1.2%2013.2.0-13.2.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=ThinManager%C2%AE%20ThinServer%E2%84%A2%20Remote%20Code%20Execution&color=brighgreen) + +### Description + +A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™that allows a threat actor to execute arbitrary code with System privileges. To exploit this vulnerability and a threat actor must abuse the ThinServer™ service by creating a junction and use it to upload arbitrary files. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-7988.md b/2024/CVE-2024-7988.md new file mode 100644 index 0000000000..61259e169b --- /dev/null +++ b/2024/CVE-2024-7988.md @@ -0,0 +1,17 @@ +### [CVE-2024-7988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7988) +![](https://img.shields.io/static/v1?label=Product&message=ThinManager%C2%AE%20ThinServer%E2%84%A2&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.1.0-11.1.7%2011.2.0-11.2.8%2012.0.0-12.0.6%2012.1.0-12.1.7%2013.0.0-13.0.4%2013.1.0-13.1.2%2013.2.0-13.2.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) + +### Description + +A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8003.md b/2024/CVE-2024-8003.md index be975cba41..2b8f0b96d4 100644 --- a/2024/CVE-2024-8003.md +++ b/2024/CVE-2024-8003.md @@ -10,6 +10,8 @@ A vulnerability was found in Go-Tribe gotribe-admin 1.0 and classified as proble ### POC #### Reference +- https://github.com/Go-Tribe/gotribe-admin/issues/1 +- https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923 - https://vuldb.com/?submit.393987 #### Github diff --git a/2024/CVE-2024-8046.md b/2024/CVE-2024-8046.md new file mode 100644 index 0000000000..2a676491af --- /dev/null +++ b/2024/CVE-2024-8046.md @@ -0,0 +1,17 @@ +### [CVE-2024-8046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8046) +![](https://img.shields.io/static/v1?label=Product&message=Logo%20Showcase%20Ultimate%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Slider%20%26%20Logo%20Grid&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.4.1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) + +### Description + +The Logo Showcase Ultimate – Logo Carousel, Logo Slider & Logo Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8080.md b/2024/CVE-2024-8080.md new file mode 100644 index 0000000000..306566f281 --- /dev/null +++ b/2024/CVE-2024-8080.md @@ -0,0 +1,17 @@ +### [CVE-2024-8080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8080) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Health%20Care%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in SourceCodester Online Health Care System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument f_name with the input 1%' or 1=1 ) UNION SELECT 1,2,3,4,5,database(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23# as part of string leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/shang159/sqli-vul/blob/main/sql2.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8081.md b/2024/CVE-2024-8081.md new file mode 100644 index 0000000000..eb33141b78 --- /dev/null +++ b/2024/CVE-2024-8081.md @@ -0,0 +1,17 @@ +### [CVE-2024-8081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8081) +![](https://img.shields.io/static/v1?label=Product&message=Payroll%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/ppp-src/ha/issues/6 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8083.md b/2024/CVE-2024-8083.md new file mode 100644 index 0000000000..394ca4e21e --- /dev/null +++ b/2024/CVE-2024-8083.md @@ -0,0 +1,17 @@ +### [CVE-2024-8083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8083) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Computer%20and%20Laptop%20Store&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /php-ocls/classes/Master.php?f=pay_order. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Sqli.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8084.md b/2024/CVE-2024-8084.md new file mode 100644 index 0000000000..9a43b38602 --- /dev/null +++ b/2024/CVE-2024-8084.md @@ -0,0 +1,17 @@ +### [CVE-2024-8084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8084) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Computer%20and%20Laptop%20Store&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability, which was classified as problematic, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file /php-ocls/classes/SystemSettings.php?f=update_settings of the component Setting Handler. The manipulation of the argument System Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Stored%20Cross-Site%20Scripting(XSS).md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8087.md b/2024/CVE-2024-8087.md new file mode 100644 index 0000000000..2baabb9f16 --- /dev/null +++ b/2024/CVE-2024-8087.md @@ -0,0 +1,17 @@ +### [CVE-2024-8087](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8087) +![](https://img.shields.io/static/v1?label=Product&message=E-Commerce%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester E-Commerce System 1.0 and classified as critical. This issue affects some unknown processing of the file /ecommerce/popup_Item.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/0xffaaa/cve/blob/main/ecommerce-Unauthorized%20sql%20union%20injection.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8089.md b/2024/CVE-2024-8089.md new file mode 100644 index 0000000000..104847f94e --- /dev/null +++ b/2024/CVE-2024-8089.md @@ -0,0 +1,17 @@ +### [CVE-2024-8089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8089) +![](https://img.shields.io/static/v1?label=Product&message=E-Commerce%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability was found in SourceCodester E-Commerce System 1.0. It has been classified as critical. Affected is an unknown function of the file /ecommerce/admin/products/controller.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/0xffaaa/cve/blob/main/ecommerce-Unauthorized%20arbitrary%20file%20upload%20vulnerability.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8105.md b/2024/CVE-2024-8105.md new file mode 100644 index 0000000000..c90d7a3316 --- /dev/null +++ b/2024/CVE-2024-8105.md @@ -0,0 +1,1499 @@ +### [CVE-2024-8105](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8105) +![](https://img.shields.io/static/v1?label=Product&message=AU47%20M1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=B760M%20D2HX%20LITE%20SI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=C621%20AORUS%20XTREME%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=C621-SD8&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=C621-SU8%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=C621-WD12&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=C621-WD12-IPMI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=D120-C20%20(rev.%20230)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E133-C10%20(rev.%20AAA1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E133-C10&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E152-ZE0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E152-ZE1%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E162-220&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E163-S30%20(rev.%20AAB1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E163-Z30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E251-U70%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E283-S90%20(rev.%20AAD1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E283-Z90&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=E283-Z91%20(rev.%20AAV1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=EL-20-3060-32G%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=EL-30%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G1.Sniper%203%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G1.Sniper%20B7&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G1.Sniper%20M3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G1.Sniper%20M7%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G1.Sniper%20Z170%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G150-B10%20(rev.%20111)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G152-Z12%20(rev.%20200)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G152-Z12&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G180-G00%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G182-C20&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G190-G30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G190-H44&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G191-H44&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G210-H4G%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G211-H4G&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G221-Z30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G241-G40%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G242-Z10&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G242-Z11&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G242-Z12&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G250-G50%20(rev.%20400)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G250-G51%20(rev.%20400)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G262-IR0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G262-IR0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G262-ZO0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G262-ZR0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G291-280&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G291-2G0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G291-Z20%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G291-Z20%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-280%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-280&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z20%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z20%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z40%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z40&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z42%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z43&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z45&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G292-Z46&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G293-S45&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G293-S46%20(rev.%20AAM1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G293-Z20&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G293-Z23&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G293-Z40&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G293-Z42%20(rev.%20IAP1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G363-ZR0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G481-H80%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G482-Z50%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G482-Z50&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G482-Z51%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G482-Z53&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G482-Z54%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G482-Z54&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-H80&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-ID0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-Z50%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-Z52&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-ZD0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-ZD0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G492-ZD2%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G493-SB0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G493-ZB0%20(rev.%20AAP1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G493-ZB1%20(rev.%20AAP1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G493-ZB4%20(rev.%20AAP1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G591-HS0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G593-ZD1%20(rev.%20AAX1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G593-ZD2%20(rev.%20AAX1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=G593-ZX1%20(rev.%20AAX1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LASH%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LASL%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LISL%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LXGH%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LXGL%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LXSG%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LXSL%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6LXSV%20(rev.%201.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6UASL1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6UASL3%20(rev.%201.x%2F2.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-6UASV3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-7PXSL1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-9SISL%20(rev.%201.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150-HD3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150-HD3%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150-HD3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-D2V%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-D2V&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-D3H%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-D3V%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-D3V&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-DS3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-DS3H%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-DS3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-Gaming%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-HD3%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150M-HD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150N%20Phoenix%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150N%20Phoenix-WIFI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B150N-GSM&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75-D3V%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75M-D2V%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75M-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75M-D3V%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75M-D3V&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75M-HD3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75M-S%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75N%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B75TN&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-B85TN&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-C1007UN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-C1007UN-D%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-E350N%20WIN8%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-E6010N%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-F2A55M-DS2%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-F2A85XM-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110-D3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110-D3A%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-A&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-D3H%20R2%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-D3H%20R2%20TPM%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-DS2%20(rev.%201.0%2F1.1%2F1.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-DS2%20(rev.%201.3)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-DS2%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-DS2V%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-DS2V%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-Gaming%203%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-H%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-HD2%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-HD3%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-M.2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2H%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2HP%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2PH%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2PH&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2PT&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2PV%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2PV&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2V%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-S2V&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110M-WW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110MSTX-HD3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110N&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110TN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110TN-E&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H110TN-M&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-D3HP%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-Designare%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-Gaming%203%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-Gaming%203&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-HD3%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170-HD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170M-D3H%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170M-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170M-DS3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170M-HD3%20DDR3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170N-WIFI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H170TN&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H310MSTX-HD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H310TN-CM&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H310TN-R2%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H61M-S&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H61M-S1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H61M-S2P-R3%20(rev.%203.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H61M-S2PV%20(rev.%202.3)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H61TN%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77-D3H-MVP%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77-DS3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77M-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77M-HD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77N-WIFI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H77TN&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H81TN&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H87TN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-H97TN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-IMB1900N&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-IMB1900TN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-IMB4100TN&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800M-D2P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800M-D2P-IN%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800M-D3P%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800N-D2H%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800N-D2P%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800N-D2PH%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1800N-H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1900M-D2P%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1900M-D3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1900N-D2H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-J1900N-D3V%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3050M-D3P%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3050N-D2P%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3050N-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3150M-D3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3150N-D2H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3150N-D3V%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3160M-D3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3160N-D2H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3160N-D3V%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-N3160TN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P110-D3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P67-DS3-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P67A-D3-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P67A-UD3-B3%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P67X-UD3-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P67X-UD3R-B3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P75-D3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-P75-D3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Q77M-D2H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Q87TN%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-SBC4100%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X150-PLUS%20WS%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X150-PRO%20ECC&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X150M-PLUS%20WS&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X150M-PRO%20ECC%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X170-EXTREME%20ECC&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Designare%20EX&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Gaming%205%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Gaming%205P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Gaming%207%20WIFI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Gaming%20G1%20WIFI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Phoenix%20SLI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-SLI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-SOC%20Champion&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-SOC%20Force&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-UD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-UD3P%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-UD4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-UD4P%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-UD5%20WIFI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-UD7%20WIFI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99-Ultra%20Gaming&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99M-Gaming%205%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99M-Gaming%205%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-X99P-SLI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170-Gaming%20K3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170-HD3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170-HD3%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170-HD3P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170M-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170M-D3H%20DDR3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170MX-Gaming%205&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170N-Gaming%205%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170N-WIFI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Designare&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Gaming%203%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Gaming%205%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Gaming%206&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Gaming%207&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Gaming%20G1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Gaming%20GT&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-SOC%20FORCE&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-UD3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-UD3%20Ultra%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-UD5%20TH%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-UD5&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170X-Ultra%20Gaming%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z170XP-SLI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68A-D3-B3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68A-D3H-B3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68AP-D3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68M-D2H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68MA-D2H-B3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68MX-UD2H-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68P-DS3%20(rev.%202.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68X-UD3-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68X-UD3H-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68X-UD3P-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68X-UD3R-B3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68X-UD4-B3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68XP-D3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68XP-UD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68XP-UD3-iSSD%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68XP-UD3P%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68XP-UD3R%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z68XP-UD4%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77-DS3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77-HD3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77-HD4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77M-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77M-D3H-MVP%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77MX-D3H%20TH%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77MX-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77N-WIFI&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77P-D3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-D3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-D3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-UD3H%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-UD3H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-UD4H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-UP4%20TH%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GA-Z77X-UP5%20TH%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BACE-3000&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BACE-3000-FT-BW%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BACE-3010%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BACE-3150&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BACE-3150-FT-BW%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BACE-3160&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER3-5300&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER3-5400&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER5-5500%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER5-5600&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER7-5700&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER7-5800&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BER7-7840&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BEi3-1220%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BEi5-1240%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BEi7-1260%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi3A-7100%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi5A-7200%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi5HT-7200%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi5HT2-7200%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi7A-7500&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi7HT-7500&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BKi7HT2-7500%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BMCE-4500C&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BMCE-5105&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BMPD-6005&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNE3HG4-950%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi5HG4-950&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi5HG6-1060&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi7G4-1050Ti&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi7G4-950%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi7HG4-1050Ti%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi7HG4-950&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi7HG6-1060%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BNi7QG4-950%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BPCE-3350%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BPCE-3350C%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BPCE-3455&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BPCE-3455C&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRR3-4300%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRR5-4500%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRR7-4700&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRR7-4800&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi3-10110%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi3-8130&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi5-10210(E)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi5-8250&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi7-10510%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi7-10710%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BRi7-8550%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSCE-3955&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSCEA-3955&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSI3H-6100-ZA-IWUS%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSRE-1505%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSRE-1605%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi3-1115G4%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi3-6100%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi3A-6100%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi5-1135G7&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi5-6200%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi5A-6200&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi5A-6300%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi5H-6200-B2-IW%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi5HT-6200%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi7-1165G7&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi7-6500&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi7A-6500%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi7A-6600%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi7H-6500-LA-IW%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BSi7HT-6500&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXBT-1900&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXBT-2807&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXBT-3825%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXCE-2955%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXCE-3205&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXPi3-4010%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi3-4010%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi3-5010%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi5-4200%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi5-4570R&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi5-5200&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi5G-760%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi5G3-760%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi7-4500%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi7-4770R%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi7-5500&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-BXi7G3-760&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-EACE-3450&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-EAPD-4200&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-EKi3A-7100&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-EKi3M-7100&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-GZ1DTi5K%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-GZ1DTi7-1070-NK%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-KMA1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-KMA3%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-SIOPS-4550U%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-SIOPS-J1900%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-TCV2A%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=GB-XM12-3227%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H223-V10&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H223-Z10%20(rev.%20AAP1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H230-R4C%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H231-G20%20(rev.%20100%2FA00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H231-H60%20(rev.%20100%2FA00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H233-Z80&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H23N-H60&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H23N-R4O&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H242-Z10%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H252-3C0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H252-Z12%20(rev.%20A02)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H253-Z10&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H261-H61%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H261-NO0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H261-T60%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H261-Z60%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H261-Z60&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-NO0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-NO1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-PC0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-PC1%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-PC2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-Z61&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-Z6A&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H262-Z6B&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H263-S62&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H263-V11&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H263-V60%20(rev.%20AAW1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H263-V60&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H270-F4G%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H270-H70%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H273-Z80&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H281-PE0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H282-ZC0%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=H310N&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=J4005N%20D2P&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=J4105N%20H&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=M9M3XAI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MA10-ST0%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MATMH81%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MB10-DS0%20(rev.%201.3)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MB12-CE0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MB51-PS0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MC12-LE0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MC13-LE0%20(rev.%201.x%2F3.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MC13-LE0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MC62-G41%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD30-RS0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD60-SC0%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD60-SC1%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD61-SC2%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD70-HB1%20(rev.%201.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD70-HB2%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD71-HB0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD71-HB1%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD72-HB0%20(rev.%201.x%2F2.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD72-HB1%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD72-HB2%20(rev.%201.x%2F2.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD72-HB2%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD72-HB3%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD80-TM0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MD80-TM1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MDH11BM%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MDH11HI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MDH11JI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MDH11KI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MDH11TI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=ME03-CE0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=ME03-PE0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=ME03-PE0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=ME33-AR0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MF51-ES0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MF51-ES1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MF51-ES2%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MFH27AI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MJ11-EC0%20(rev.%201.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MP30-AR1%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MQHUDVI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MSH61DI%20(rev.%201.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MSH87FI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MSQ77DI%20(rev.%201.1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MU70-SU0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MU71-SU0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MU72-SU0%20(rev.%201.x%2F2.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MU92-TU0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MU92-TU1%20(rev.%201.x%2F2.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MVBAYAI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW21-SE0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW22-SE0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW31-SP0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW32-SP0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW34-SP0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW50-SV0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW51-HP0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MW70-3S0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MX32-4L0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MX32-BS0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MX33-BS0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MX34-BS0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MX34-BS0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ32-AR0%20(rev.%203.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ33-AR0%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ33-AR0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ33-CP0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ71-CE0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ71-CE0%20(rev.%203.x%2F4.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ72-HB0%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ72-HB0%20(rev.%203.0%2F4.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ72-HB0%20(rev.%203.x%2F4.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ72-HB2%20(rev.%203.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ72-HB2%20(rev.%203.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ73-LM0%20(rev.%202.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ73-LM0%20(rev.%202.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ73-LM1%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZ73-LM1%20(rev.%201.x)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZAPLAI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZBAYAC%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZBAYAD%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZBAYAG%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZBAYAI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZBAYVA%20(rev.%201.2)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZBSWAI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=MZJ19AI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Multiple&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=P15F%20R5&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PRIMERGY%20CX270%20S2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PRIMERGY%20CX420%20S1%20Chassis&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PRIMERGY%20RX100%20S7p&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PRIMERGY%20TX100%20S3p&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=PRIMERGY%20TX120%20S3p&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Q1742F&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Q2542N&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R121-340&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R121-X30%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R123-C00&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R123-X00%20(rev.%20AA01)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R130-134&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R133-C10%20(rev.%20AAG1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R133-X11%20(rev.%20AAG1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R133-X13%20(rev.%20AAB1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R143-E30%20(rev.%20AAB1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R143-EG0%20(rev.%20AAC1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R143-EG0-AAC1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R152-Z30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R160-S34&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R161-340%20(rev.%20100%2F200)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R161-R12&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R162-Z10&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R162-ZA0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R162-ZA0%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R162-ZA1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R162-ZA2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R163-S30%20(rev.%20AAB1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R163-S35%20(rev.%20AAH1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R163-SG0%20(rev.%20AAC1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R163-Z30%20(rev.%20AAB1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R163-Z32%20(rev.%20AAG1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R163-Z35%20(rev.%20AAC1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R180-F28%20(rev.%20152)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R181-2A0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R181-T90%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R181-Z90%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R181-Z90&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R182-340%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R182-34A&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R182-NA0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R182-NC0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R182-Z90%20(rev.%20A00%2FB00%2FAT0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R183-S90%20(rev.%20LAD1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R183-Z90%20(rev.%20LAD1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R183-Z93%20(rev.%20AAV1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R243-E30-AAC1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R260-R3C&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R262-ZA2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R263-Z30%20(rev.%20AAC1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R263-Z33%20(rev.%20AAL1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R263-Z34%20(rev.%20AAH1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R263-Z35%20(rev.%20AAF1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R263-Z35%20(rev.%20AAL1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R270-D70&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R270-R3C%20(rev.%20143)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R271-Z00%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R271-Z00%20(rev.%20B00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R272-Z30%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R280-G2O&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R281-3C1&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R281-3C2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R282-G30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R282-Z90%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R282-Z93%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R282-Z96%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R282-Z97%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-S94&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-Z93%20(rev.%20AAF1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-Z93&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-Z94&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-Z97&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-ZF0%20(rev.%20AAL1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R283-ZF0%20(rev.%20IAL1)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=R292-4S0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=S12-P04R%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=S251-3O0%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=S252-ZC0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=S451-3R0&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=S453-S70&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=S453-Z30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=Studio%20Sys%20UPD&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=T181-G20%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=T181-Z70%20(rev.%20A00)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TO15-Z40&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TO23-H60&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TO25-S11%20(rev.%20AA01)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TO25-Z11&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=TO25-Z12%20(rev.%20AA01)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=U21M&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=W131-X30&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=W281-G40&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=W331-Z00%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=W42G-P08R&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=W771-Z00%20(rev.%20100)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=WRX80-SU8-IPMI%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Gaming%203%20Pro&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Gaming%203&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Gaming%207%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Gaming%207%20Pro%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Gaming%209%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Gaming&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20MASTER&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Ultra%20Gaming%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20AORUS%20Ultra%20Gaming%20Pro%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20DESIGNARE%20EX%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20UD4%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20UD4%20EX%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299%20UD4%20Pro%20(rev.%201.0)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=X299-WU8&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=aio-300-22isu&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=aio-510-22asr&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-13&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-13-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-13-r2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-15-r4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-17-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-17-r2&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-17-r3&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-alpha&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-area51m-r2-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-aurora-r11-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-aurora-r13-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-aurora-r14-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-aurora-r15-amd-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-aurora-r15-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-aurora-r16-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-m15-r2-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-m17-r3-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-m17-r4-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-x14-r1-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-x15-r1-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=alienware-x17-r2-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=altos%20r680%20f4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=altos%20r680s%20f4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=aspire%20c22-1600&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=aspire%20s%2027&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=aspire%20s32-1856&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=aspire%20xc-1710&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=c24-1655&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=c24-962&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-compaq-elite-8380-convertible-minitower-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-compaq-pro-6305-microtower-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-elitedesk-705-g1-desktop-mini-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-elitedesk-800-g1-tower-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-prodesk-400-g1-microtower-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-prodesk-600-g1-desktop-mini-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pc&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-rp5-retail-system-model-5810&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-z1-all-in-one-g2-workstation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-z1-all-in-one-workstation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-z220-convertible-minitower-workstation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-z228-microtower-workstation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-z420-workstation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=hp-z820-workstation&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=iAPLx-DE(TAA30%20TEST)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=iKBLMUx-DER(Volta%20Charging)&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=iTXL-Q170A&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-15-3502-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-15-3510-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-15-3521-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-15-5552-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-17-3782-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-17-5755-laptop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-20-3059-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-22-3263-desktop-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-22-3265-desktop-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-24-3455-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-24-3464-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-24-5459-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-3250-small-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-3472-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-3646-small-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-3655-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-3656-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-3662-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-5680-gaming-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=inspiron-one-23-2330-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=lenovo-10w-type-82st-82su&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=lenovo-62-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=lenovo-c365-all-in-one&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=lenovo-c460-all-in-one&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=lenovo-erazer-x700-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=lenovo-h520e-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=poweredge-c5230&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=thinkcentre-edge-62z&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=thinkcentre-edge-92z&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=thinkcentre-m62z&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=thinkcentre-m72z&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=vostro-20-3015-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=vostro-20-3052-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=vostro-24-5460-aio&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=vostro-3252-small-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=vz2694g&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=xps-8950-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=xps-8960-desktop&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2000089e4dbac3fcc36ba347ac7d7f9067722601a9a55c2360bf9cae439a52c010%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20002c5c88a393a9da6b48c30d64bd702f6b50fef07c32f45b7c09f40fe2f3f2c0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20003130dabf11c8b5df286d9584b3174faa9529cd6149513d13c7ce85d63d97b0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2000d23573a79d5737cfc6a1094b12e22c8a8601618934193dba2242f0246af559%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2000f354e79abadfb8b4aea11bb07c3ddc16f00b3055ec8c221ad4d69538bdeffd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2000fa676c6d12df8a48049f39b87e3343769356e880d2abcaf04ab1b679c450f9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2001b2fa505a7a377587ea64b20e1a1570eb7f6567a9204ec972ae478998236a0e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2001c95a23c9bfeff78ab2b6d77ca33e6a967cf624d1afb5fad393776c79a25920%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200215ce75b3629651d0c64b0b241095b58f0af921cec3022c524d531c22f1385e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20023f4c9928786909d9fcb2143edcb1ce9a20d1b15cf281559996f21617503f91%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2002877ae1ee43c787fa980d6e897e14546ac193100395bbcc6bc26fdf3077e860%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20030031c6c1b9422a56ed44f04efa2ec84fc8a2de254f24d14989934f613d12b8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20030615cdc1d2e52fe185f8fa8e6e1c1028beca283a6be9215482a39df1418622%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200307e5ffce3a9981334d7eb19b13caeed61ab8074212943438b4a423b5d2a9b8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2003299dee42886b0856629da99bce9cedee322b80bfbb89aa6943913d2da15e03%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2003662e2e512cfe18afe431d968d60e944af5f7514f840754864ee4cd97990130%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2003e23d40902c4e68730e74ddadcc716f46032774001e1b6bc606c5294d4bacf8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20044e3800c05a232d4a8821edc28aae7927474c8814a385f717010ef9b12a5622%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200455dd8b57341d5667d4c4dd71767321c3f72770f84db4e46f93d31e50b376a7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2005001b41f2adc9d6c008f12f9d1d9669225a2366c9a05f6bd19d420cd5b13fc3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20059d906408ac5c7daa81504d9e9057023d7686c9383faa48ef6f195d4b32d997%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2005b03dab647098c957cadd2a66ebb1401dc5dae51f267351c0d076c239d5856b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2005cb527ef122bbe9ebe54d4678686e6a21b961f16392841f5f0b0bc3882a184e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2005e89382e73afb280f637acbfa1029e9107dd30c78df37b6a00f184657f5f2c3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20062e3100bfbe635c66feed863141f7a6f2bfcf0b887a5b3d7ae31fb610d17cac%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2006879fa2383284b0222247992f7d359bf5d0ddcebfdcd5b42a20ee5f46a8473f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2006a9dffc8fb3edafd1b6377cf38879860a0ae3c87f97258e09d189d291f64ead%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20073a6246ab57b038afd9050e2dd017aefdde6dfad5d61b80bb2d5c3c71134b73%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20076310804e591d1c2d4ab1d53cff0866c04a4189e03e6964b528b8a94faa7991%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20081c82a0748297ca5841b1772330fb6e776c678d425789a66e3072fb73d072d7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20083289beeb6b2d85285084059994d0ae833833cc7284428b6eea303099d99090%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20086d80a421ed4cc907120e6c96117c3b69b9edaf2ef6951fde7d3dbe6ea4c878%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20092c46188af77b69b4c19e349712a23244ec7cdc885c2e0150a8209c1693c95a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20094ba53bd3f96434153ed4c426a2c9f8b62ccab2b7ff60932061f9fa84a9309e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2009d1d8dff99b19615f14413d6ba20891819d481b12667452786510209344095e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200a1aa3edaeb6b389a08cded1ce036ea9178527389ca1549442a35f8b1b2bcdf6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200aa384720b8e5c0d09b9b0b14cf14a105e4b607681f778bcaa202412e666bdf1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200b2bd8851706081fb9e310e5f4a7a97c3a0bb32eb7167a609e602ba6cec1ea89%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200b739af751913ea6ff42999069963dcf6a1bdd58a3de800ab721d9bdbd59bf0d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200b851b25b7dfd2d50e710016c21c06a5aab78fcd64597ca631669b7e6344db6d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200bd8853cb934be142b7edb2ef31a2031fb348a6ecea1db37e466dce25bf7fd6a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200c8eb9d218ca1706bd15989efc2915e792918b52cdcac38a4845913631f6cccd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200cd64d233ea4db6db2a90962d2888f4e5b967fbb24fa944ccbbfc2c02d5a358a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200d274a7eb05cebe468e07b2e6692a11c90f222d18077b3d058fc02b464046265%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200d28128151819a06848aeb241f3dc4737d3a9b3918b739f8c512085af375b368%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200db641b3a89e75061d6af75e41e365cab69a819f6880d4bd0a0f4ea7960fa17e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200dbbb711ff0879479dc30b9a7116fb94f093e0225b74916f6b79edae90d8fb2a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200dc9159572d38d754e168d1290219dc558cc72e67e8fa72727ddd43a5ad187e7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200dcd7494f4926fb04b56e9713f0b62eff3a345b626fa2adaf47636bf0bb4c3eb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200e26169fbddeb0ca9b8283dba44d571b554487b5dd9348caf84fe9d7a6a20dcc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200e761b6f3c7d3a1407addf499ff848c493a9d0b0197368cbe858bbc4fa5a4702%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200ee94a5c0d4b93a2a1618d144bb0a505865a5d308c484c80fcf26fe31f23617a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200f77013fe1a7795b311828614ab371df89c88dd7ddd165d17130422289838731%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%200fe0c762e396660fb30aeddcf5a5928af864eb44399271ed975913f36e46190e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20104c3173aff7cbf07c72956516cdc7c34e6169604293aec90e86bcc4384a799a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201096dfa8e4e5f5d2410eacac73c51bd1b946bc4d2f110a44e8c33f53d0182eb5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2010cef05010197e635c330548e99ad98827223f0c8eada8a6e5a95ac7dc2880fa%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201190d15905ff8656d2d0601c388df633b1646fd585de4fe871fdf93fc23d35a0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20122baff0bf1243b945a7eaa9ca55303469d624d6150d4da136d697878177f1a8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201235ca01cc48484db1157b312ec1632c45be511cfbff28d25404df0a3df47148%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2012886ede3cef3c93c4602ff26519a04c9143e903b103006ca3805c3df2744c8c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2013b00bbbbe69eb17f726a086841770b17b9b5b02c903d165e5dcbc371b87e4d6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2013deddbbdccb6e5411317e96bdb045e28c0dcbb7e86ed5f32e5d24b4b54a5657%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20140cae90bff7b80c41f0fc69c6439ec9ef3e7b54e408a29dcb9b41bcdf07bb3d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2014c74b9b80e71d3302c13aea0dfea3560e1452a55c698c20e457c5b495154443%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2014d6cfb20110768c3da503050dd9222a2514aecd0ca49f2c08e64bf6595b0cd2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2014dca67fdba7b20c48d3c16446db2a648c79e5f94712afba6e720ecf04ba5223%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2015f2bdadf43e6d3731df0693552d4aa4780ed958dcbe0ea4ef80bc27510cdc85%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20161c97b5c0ce6cc90a70034d8de30b18d07c43e50d5566c1802dadc967cb05eb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201650cfd06bb698ad3cecd9e0c38b0de04d29f9c397492ba70b985b033e2458da%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2016f990d85b5a42e9b762a08f69614b0c6e3f5c1236364ca38efe92a5dd729bb4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2018216a9c0fedbfa3a8c8cb3380845ff086beaec130296234d58d02d24fe051a2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201859a1e462fbb1db039e99f7cfea16e6da59188ad37b313181211ab2c3d70150%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2018def9ce5aa6551c1d7e77e9f53e34701f77b89d6b32d41ea050cc94d52941e1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20190d03dff0cfed20b38ae3270c8bb197b024765963dff6b7730d96bfebcbb24c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2019967c4eebd851b31936c8cab20f86008c7f065cf93217f6cc82350521cc640f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2019a209b004631abf16b5f6abdbe22b3e9578e1f5ffc4bb94b6601fb612ae47f1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2019b4ba1388707838d0de17b6f2e9ce01f70f728926ab7e2dcc0566f6dbce8e90%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2019c85b8fbc25322544c775c9fdcee793a563d51b32ede6b29c02248e0813f42b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2019e2a33d2a28a825fb89e7dfda9609776110876b204c5ff760edf716cc7c390b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201b6ff7d60400c7c21a5b28f947475e61abee187627c1ff12cddb25b1ce59ecb3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201bea20b7f9327d743487da2db53e5fb89ace6d22f56600b58918737418e716ee%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201c4cf96a2ce5bae121b0594c2b41664510cffcdfc4001072f2275964c20fe12e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201c6801b8a7920939facfa379b6141016651601971156e426db947ca40b6f1708%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201ca64768668cac95b2c49594df5412492fd3e84a5ec279f5e5782d9d08d641e8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201d3295cec309f0649ecec6952824abfad776ecc1f46199a080932b5e99ac206b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201d3552918dfc84151da3dabc0687a4513f1dea9d6879d53a8b8646398fc462e5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201dcce1bfce8c75c3fdf8a307ba7f6d0231504095e1c4e6bf2166a4cf75df29cc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201ecbdd2c9fdb6e9bc4f2e48b5b3e1651977a39eddc6480cc4888462636648f38%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201fee6620306388e1d23dba7889b858bd56a091cf04ee68db32639e14d9b87a14%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201ffb3921b21ffdb876b2cbc7b6ff939fb5168efdf5ceed571d2d220e195fb150%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020607b0f670b297b45523730d2204e46603cb3c65f47e6cf8293b07b7b1178ec%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202065b895916edbec17057603ba98779b4bd10cbfc3477a87c767a36fb027b76a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20209045f2bba172fb91679d4319cfe548c24921f1e28dd9f887e3a78bce515e7c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20210688036c5ecadc5d764691d511e738ff32146bc69f26601fd45321c65b0c7d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20210d858cd9ce7dbb1b76277fd580e1c71214d1f7ceff46788efda64e817fa95e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202221d582286ebe04101fc5bd7e353e3f8826c86f948defeb8ac265b8c7ceb8d9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20225cea866d8c5843d32d6edc97764b69b05707e47c9537e6e6e7f4ac06775816%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2022869435dede4b52f75a6b82266b67f8930857829185f97bd322c3a72a8899e1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20235c6f47146d2bf5dd20ff3971421489c69517be3b467ec1a2b6f7dc0f2d8a94%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20240c0e6220a07f27d4debd867f2a1774a50be1b37c3f53a2dab272a71280af4e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20249510667c5c37bd25d731655d7dbf18c5fc2d8d377c0c2326810cda6d9c0f46%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2024be564cb337350bd9cbf409cd95f29b760e1ff872f99b27379c40b533e9f2e6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20253743e7a39d0b709122c5329799f4c4608536eeb632218e7f0cbe1f6e8b5db8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2025555956322c0eaecf58fd759ed9b0b7857f9dd149b02de55e2f5eedb291117b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20255ffd2b1161bb8a53626ad3920c40eb5f0f63cb1d5710969abf31797f8771de%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2025917f5dcd5f5a4c2daaa9fc0cdf991b365e226856202b4e5e987d406e6af95b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2025b628eb776a57d9fa45cffb00f8f3347cb9d7c2f3c33712348b85c3ecad2d4f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2025c38be153f85659377f63b4968f5425bf7e8d6c99fb695eeaaed973939bd943%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20260811f239a5a92f4a894f52c5b7218faa75c5765e3db17a4ee33530bbfc1295%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2026778248ce3156bc2d3e70461f079d1292435aeca9ea2c6ef0e536c979845164%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2026a447a94e96fa8d9c590888cae490750c32d5af95faece3595f21efc41c1f2c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2027abdc6ac0e50d6d6ca0e937c0a7ab1efe8d2c53c46532b68f0cb1a5fb955517%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2028068e88e5041161f4485f958f49060d6a865e4beb0b53bafc8f3c5e5e3923b9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20289cffe9f81f1e9a9cd087bc529701a9343084e499684caf4d34bfe8db15f3f7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20289f0fa72150a52f2b71bc6bf23f343ad9c1c412aa5977e89ffde7474562cb18%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20295417e80fba51a322a02a7e4c35ab04af54a48355711066339743e88e3922f1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2029837e239487cc83818a7f40f9280d9692a50376487899edd603494b0f30e4c5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20298d5755fa084d9268d09063222030993755cee31f9fe5429323b830c8c3f5cb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2029ed1fb8fd445c86fb30ef02e78db0b5be5213ece5edebf5f9702daaa94f5ed2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202a090cfc69ebd88dbe2e2e9c52a7f3a75b8b150478e30a752c5c0f09129f3bc9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202ab6af312a78886a13144814ce766a771604755f8dd303381658026304415280%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202ac696517ae7da9f3efe81af66b89b5f7b24beb6e09aca06e61e454915070a3b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202ad038a3b127e95df1fc8fa61bafb96a113fe0093d9ecee66db9ece973c5a257%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202af044c4474abc534ec6da84e1e6415386421dbc897ed2946efe131840de8161%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202bd2bfaf79a72eaca45e544e5c6a5bb842b292bdc229b8975b3101a4013e0d5f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202bf55cd3046c8fb548063466ea9eb0802c4401f3c04a13f9ef693fe7c23570ef%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202c0e4341f91bcedf78c301778d52492fa304380cdd15bdda725910cc6709e033%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202c185f2a4900213d87796a8f1b7ba719d3506961c3587cc6b6c39ebae2067e93%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202c6a0bd7b3a91b9e1b309bde7d405812a42abe40001ce661252d81e7cd009650%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202ca3df4ff24732338397d64dc81509ea5a7c4b979ca3f2ee6c7446d690355c52%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202cb69c081c6413077fd076d7230ff816931ae65bbead2f94f0b12d33e1861c9e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202d34f17d147062c8aa223fd2e528b8c10c0879e8ee2d6064607f45e93908a935%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202d40ec6b83d08a885cb576844e609105e15fdc4e48181dbc861e2bce0b657b59%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202d4c55cc53de9adaaacd9e70527becc4de1cb0b39a605791601fefcd0156ced4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202d5900b5a13292df17073793a00393ea8e60a645104ebf8d95c5407674421c76%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202d817d05c86c92a00f00e286c6c26cc52e6a50019970a71d98aa07c53d9690c8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202da499751e8a5446ac8445cee5b95f6bf75ded5c8ec6738eb67f5c4ac2081c32%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202e1be66c511bc8367a2b1ab41a3ca60cfe46648bcab2d5f1f5bdf5df14de1c05%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202e24220caffd6ba7c7e1835f12740073a9e3a826a1ffb9bca210756c224eb99a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202f18902d7afbe8d900b6552c2d7a86760f05c4698c1018053b2fad97f6ab51f7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202f7481194b1e0a153551fbc9e68fef59f463882e3fc0238673ed6293715366c5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202fd0f72190810fa5c4a2a3f57a7bce51dd0baa47584b59b7cba4752a92c66ee5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%202fdb64f2007196150cda167f3eb121cedba80d75d0b79def30c4d7155ea0b2a7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20303797b38020f7b91381f887954f819112509c4b855ebd75c7a31dd227acf1cc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20305b23937168ebedc60ac6756010c07e4588c48e9fe4694fb935945dbf4be6ee%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2031a7af2885146a94a82ce214a26e4dcdcfa36969aa47a7a1eaf3725fa6a2198d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2031aa7ba19f6edb9472a3da22793803c265a0cb0b7cd7979db56251c37edcfe5f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20326280954738ecffd23930791fec6dc0ba2b9774c85886b98d33723974c3427d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20327e84e3cfce4cb086435232d033a20ebcd4b95cd5aa4b85cb92206f44507170%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2032b1eee6b2e1553ceb902d17d0ecf5534034685dc8c2863f9ec99d2dc587bb72%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2032d8482434dfaae6405eca2bf724939194c8740da638c9e3e8b760489b2a1128%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20330f761ad2d43d72a4a09776d76bdffdfdd88d4ddf6002e0056e2826828372ab%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203353c109a69e6fdd86adbec899e2669cce724bc35db33a86fb0bf1c81a508c2c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2033793d37f2415d724c58c993c2ad6cc67d661253b929165f6f0ab0c88c8325c4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20340cc5c8f4468eb2d36b684dffbf139b4ac4504b5db3993c3c1b5145858c5131%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203448017b88b33e3949d6c18876be32e506d827f65de6c425ebf82f33a2c3f502%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20350cc51e5e7fa472e95460eed374eb1f9a43ea4e615e2654c26a9da4d83bf529%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203584936b2dad0ff3ee3d6b167442d39dce8400e1016267462827ff20d15dcdf7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2035ec23b26774c9030a1deca1b66837805aa7bedd6518d5be506681f2296b5e17%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2035f6ab275afa77bb30a5672f32b196d8c76208e48500d7f381e05f8f12e400e6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203631995d059e336863527f1511894bdfc61361bc0691a430b3896fb94746aded%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2036b023bf42423988805835e5b7c48af57c0b487c7308cfaf5a7a0ff75e3ae8cc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2036b879d3be098143f10fd76db48424f3c3470ffffbe2f828ec7462bd8ec73dcf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2036d2df2564747908c8f8b28df00ea5504783b9308fc76899d0a5ac1b57f43361%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203716034ddd789a3e8e1c688a477e4735f228bc3acfa18b63e719d7cd1e8fedfb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20372c9a6f86f60d7cef6ae2d2ee7ca0d55df998ba0a47468668c6758b3d3db725%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20374f19a62abe5b7c195038ebc945528046478ba7fac2b7b429edfaa47122e6e6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203835eeda7653120a02ce98ea98ba75ebce53ac1efabe3b81d0b6dcc9e611d1ac%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20384d9e1e3cad82b7841f33115dbfdf38589420716c8c0aa5a190971a44aa39e9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2038643b383b7d51cc53298693e108cc293779dc43f254b2e2b17f66a80f9e4175%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20390cd14f2be9ff14cdcc90a9e705cc017bb2535e66b93859eddc233425998937%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20394bf746dc6183441ea4d034769683c92eb999195fe6ab6e1fbf10c4cd1aed32%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20399f68dc94a6c42030efcd57fd034ff721f860b7b5d447779e7a6a6c99aba34f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2039b90d14141556595814f43afeb015cc34e75acc31d23b0c505ba00d1c4a6a7c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2039ea2372c5af03dacf3a4112895e5bb59489497c23828e38acd4b4fec35df970%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203aa61cde7b1886fab7e60e077bdb39d0a94e3c451593d13e87306b88b4e56a80%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203b999a0a4b3a7336597e7373e3317dd29b91f5510fdfcc8323988d1edab6c23a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203b9ef069c1c67a9caa29f8eaa915605cd0bbf1edb735d92abf2c4e959ca4a726%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203ba7690791f1adeaa12e45dc9adca1ee7f08c99bf5f1c51961c6975d1cd14770%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203c50ff8443f151a8022b4934dc0e87cd74d500719b586c82bce2184bac3ec2d3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203d1879acf606abac026703a7fe242feb538192ec6f01642ca33ba6d6de55a725%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203d2868fe9d5c6ff7e0397d929f170cc6ff006c5d1b5f7bd99d937de8f93dbcd5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203d525f96f63995c51ab1bcd2c50ebb71661ffeca9f78f97cc97e851d0e2bbbdd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203d6faf2792722d1b9fbff087e4d85ddd2a4f9922a7848ed4db99284687df3b23%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203df7b53ef2284dd2f3385aaa589f87f2e3fadc93d2755e28781452a273d999ec%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203e3fbdde80c01e9755408922f67ad04834a61cb5e519ab010b151b68772a9784%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203ff3a0cad413c0b862ba515d60cac0e98e373e199f0d92c79a77ebe6fa6a2247%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203ffd081959db4684563f0044cca9ac16d5467a42d40913f503bad8d171bf1c99%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2040234a98894a9855db1a921ffe9d272caa1e5702dcdd14afc82f6a91753fd460%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2040d4956a427564b83b0c1a86f1c32510feeeb5282eccfb211bd29f0a0a7767c4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2040f56a09ded19979902613399e9d6c84cee02b72b7114cabac53629fe2c068be%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20410a0aebc3826f029ee6a4cd0c5816eb0676fe99a0b112e8ce55e8b2f3b49e6d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20413a04c12bde19f1f97d9d334ed57197f0405f9f10ab7154d2b71e5471577c97%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204151a030854ddba555d497a9d2626723d662a9c81e86b39e4e2c02c209ebabbc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2041bbe9daa5808a1c5b9836a654d6c6d312ed7034c304f963af28d13eaad84340%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20421dfe54ac2554e627762ea96f454f95f7232f3f238dc9f5d5fc96bbf284fbac%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2042329f479e5572eadd01b94fa8f3f3ae16b7fb4452ac2111f886855e4f52597b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20424e8b46bd3feec4aae4ec33eae1ca8658526eeb66e121adb244d3c322dd005d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204260703c9695e6975438598d85f4046bd34a1f16f77fe797b22cb45b4428f83c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204270e08e2fca65beb36f8adaf338c4b94d248a98eb3d205d0fcf6a1cd2d6ca6e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2043216a565586f1c49090c7982e6f3c1e41b179e430d7ac0c47c8ad07308a5bc3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20435e0ba0715afef2a466835c19105c6480a35f921af59b863f2c29ed2d1de0e6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20436d56f15a1373c341638cc0edd950866bd519e0cb1e0de07ab7df2c59fba5d1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20438bf66c9433bfe1ba92452f5f7eb1d46cbdf9af9ab3c3d1d4354e902fb0f257%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2043cce322b194b9be7bedb247098e8b691878f238b14199cfba11af4422b3464d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2043dd7e97fc6fd1fc0ac1ef601c00eed9ec9b5d5325243fb8c6f0ae3517fce89b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2043eacbb8f8ffe499f4d0715cf6f798cd81351474abce0e410ecfeed7071740e3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204438137139edb1e04de7e265e94444e1c87316b0821178285d87763f00bcc5df%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20447d66dd22c3af2bbdeea4b2a766cb3fa4442466d0c02d62647de9f3683cd6c2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2044988d41019bf5c7989b71e966b97752f60c835ba2300c7d55323eded97c21e6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2044c75c03ddbd8689b7a5df96689d730f002367d428da0982bf089c8f6909a75e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20455164a23e14f8cc9567b458dfb85106294f149f0e446d2d8b4036551f894cf5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20464643065d45eeb1c2566dcce90bd868313319547c91d46e3cea78126109d374%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20464be29c2ee1a3f706063374be13365d0a296776aed73fd0c8506f1cdddb568a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204685e5a58d4cf84102460110a5fad72931b1b46eb9f71650811832f80580bc0c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20473033483d404754621122afe34dc8f8f47432bde116cfdde03ac38fdf2fb054%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2047a969af17efdfe04690233319d36d12ff820901d0817ce17846281e7d5f49ea%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2047affcc25ded66333920985902473398438b49dac28be82542062ddabffec3c8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2047b54ae65d44b227a3bab252fcd465df6e6d4875cf2511f1261f1c8e5b196e1a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2047da1b96a4296aa07edf9e4f54df7dc663e8c8134477ee8718319667073a5d7f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20485b963baebaf9e0d0d3f0438da8fc3a5e74cac6fc7781e732df5ad0a3be3eec%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20493437a68a7a7b46b645d46660e17c3b6599eee86cd06f592683e56963cf9a8c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204978fa8b487795206594ef340a6c846814e02e248aaf6d6d22e21e58c194fc00%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20499d17336ee9e6be59a733507c25f7b343933bd728f296f6ef08af611d0a8ae2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204a901cc6ab10bd1546d8453bd1bcf75379880ee549329c03ecfd4b445b52de99%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204ab2b4adb933a22cc5b3b3739e315a68c9a9a3dca20b1ae7f27713c0279f6670%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204ae3a48e1a715461671107f9e8e790cfd1c4ee4d2b8ddaa50b140d67622b920f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204b0a77259b2af63a9704b094688237ff3c29fac1c011a373a0f2537a8a543d1a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204b4fd4cc68e48cfbacaf1279ff42ce6e9d37aa7706efffb2a0bb84fbda2aabd2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204b5caac23e6866a9bbfd7962a5557ddc9b0369cdce09b664910b35bd66e690cd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204be0b29ff5fd55d855e5529912b92acea24740eb7fa0250ba01a44824c4685b3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204cec11820244f485baa7f61d50e60a514b0c5aedb87d1a26cd6b6fb153fdf9ef%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204d3a05e1006e9d5a1045ea65277cc4fba148ab4533ccb1b6d52ffe54edc7fffc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204dcab1a378bb4cc541f210917c563b95dd678e185b4d0dc8483b175cbf9097ad%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204ecd2f653fab0c6dc0ed24c68a8f04c454cf8dea68b58d149e9d79758aac2c54%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204f59fb01703b0e6cd5140683e9eb6d98c452b3acb64ab642004276daf49e1ace%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204f7c60d69e3c374da221c2ab2d2393794965f2e0e1cf296f5a64d4d77299089e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204fc54067f263791aed2fa4b57b226ea15c4eb0f55b3797e002bb62aa936bdd8c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204fd09df247091f6c6ead14d012325d14055ab38095f5c4d8c258352f48c2052f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20506f5abb01dade2137a4b8d3ea42d1127f24f59f96339e77c59883571ae63443%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205077c5d90bce52e6e22371dd64910f30aad69c42aaf9a144165682fffe23c3e0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2050d3dc2e80333527177e5f5e1dbc06357ecaae3fa2dd1d51272a906ade3cd7e1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2050f77912004b73bade539e1c3983a7ab78984b8590a64d3e030ade4352c49eb0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205174331d57cf3392012b00a6de381ee7a873f7fbd217bfa3e744b7dd6136807b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2051a9197d05b1aad84546d9469b2c400bd7536eea62b2760a308e5bf84e71d74b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2051c5cd38074336d75c166ad86a2df881b53b4fed849b538e3281d1bcf0502094%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2051ebb3341dae5033164b3b45470115f49f327e5dae5ab111df2a59bc04afad8f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20523817566d04fde3f7fc0215b4c4758243319affa5c1819e4f041c290a36970f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20523e9d1bf5710144e36f9535141955dcf9a3d075fff092f6b4d1e12ee2eda562%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205297e4a26fd8ed927abcb2438a5ac2a4e35e770d06d272ed77b3d847bebb11fb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2052dbddaf0c9803e7f9dd389519b829515abe97dc0fbd9b979230de28880f595d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205380cc7bc3d652f0d0316dd3225fb45f1bb054e9c568b9c8e8bf9591306cdbaf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2053a8edb12be4b79c231d3f950e20343f20f3727a6544504259639fa6506f2457%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2055099b8c517078f75299dc02afe1f09167bcd7760c0f46546cf4f8274b54c465%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20554e7be483afb47c81760179da5199ebe2f59a97b7146e50ed42f35728df9c5f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2056289ef76755acc7f4e843b3ee0f29ec8f063f113f640b157d095d18a866d874%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205641071fccfc0169979343e131d614caa71a2b334ffa45d1ee10817ccef73d8a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2056430f2f4f9aef4e50f503dc8397fdb20b005bf38a8b9029c43e3eed56c39229%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20575fc48c70ea9ee40f8016ea2328ebe790e7e556333a95b9b511be466047f668%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20577535df524a000747a1e15828af3de0cfe6865b0b20170d024974d6b5b81160%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2057be6485a091b1f60afa9a2af34cff051e293d03696c04ba578f97ac38a34d4f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205823dc1fbc95d092e02519c069c4fd111783428757b969fd8b9dbac1009fe91e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20586ca26deb275734620c0b80c8d16dd86538bff6116f5d7db1fc10230d775eb0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2058a47d7e153b03ce005686aac24bfe31f405a7cc4670b826ccc775a839de7ee1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2058d19c2ca76b765809a99f0eb2227291f4f51860723d303f9ef0cb20d4d19dcc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20591b486bba979b64d20fc90bd63a5991b7df16b5aab1447de888e3d6090f1086%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2059a3fe40e2896be666fd2712f7e5176ab10ca9335b39bd04fa48867ee607c066%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2059c838f97265422664d3508ad13e370351e9f482983d942dd7fbf33bbbf00587%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205a02b9214bb7ca03030323835a85efd84d369ff02a6baf9193083e2b22e8d0c3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205abc359c698cd90030a597105c4ef899e4ef56271b9e0f43c843408b9fb53d33%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205ad827acb383f51e80cfd4605f8b02186b680f61ba0129e6c054af896dbe6d48%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205b5b834775e9fa3cb50db4d25d9df7849cf0f13011a209fc53c51245aa963856%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205b7eee5f852ce1424dfd476d8713650e528fa359f19e551b7adb9b6a12ad467e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205bbd2f88bf68b66e974356e0e49f63b83fdeea8d148da445e24073d8012c0c3a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205bcc229773a51f96a3904ab181bc621231f881b88a9f59b9427555d9bc868045%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205be6bd89d0e644714c6c98502efcb6e5b90fbdf3101f82cd821d04d2fb11e60f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205c25f790a4eb79b4ad3c4ceae05329c0878337257a6e31c276ff7aa5c18accc4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205caad5c1ff5d9518017d64a2dc8cb2a83e294520ba6460c0a1b14212688f39a4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205cb60622a0063c6d261c5693fd423d7fa44d826e8250812f50c7b9a28921712c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205cc12fd686928c97fa7fbfda17250579adc4e7bd11e46e88650de5ebca6ed03c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205d3bf4c8452e70a4ee31e25cfd555694af3cf64eda965fade0b21e8a262a2c10%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205e55411efbcff6e593a2de57f46b6040324f35c1ed14f902333a71b6cea38930%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205ebbac1eb55e763bd4efa47f6232ecbcc62d73645c3291e00a3d5cd880898ebb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205f237b90cd70e0f63c0414262a0af2fbf8456ea78252750ccc6ef7fe59cb8774%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205f53230a65454b8805179f246ac3c8b36bd274ae0051d900cd04890e7b765555%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205fb07e319cf6d523a488d879e7eeef3321e90fbee049efb642b34ad2a32611b8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205fd1eb03f29343e1ba70dce50264a7143129fe60bde396f6e3715330623db8de%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%205ffc9128e64f5a30a78f594923301a6110a8a97c236665f4d4ca7ea28d8a8d21%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20602a23f43b11817ad5439579969753866a54b836f34dfe19342e5188cf088d85%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2060370916ce5edea7899125ad1b470d59cc04b0aeccea1ae5474f78ccf187e4ae%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206051ccb31aaab7240147a1fdf9b8f444c7ee4bde73ffb4baca63b02bc77dea81%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20605db3a5cf91d915929488803446e5a51dda16d661e76840b707474d2df79069%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20608e410d1c0475dac58b1e8f36b477aa8d9e9f28d30ec89d44b550e36bbbaf47%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2060a230b0a5722bfbb364b6d64ae3e1b1cccb6161bbd6f8cc034977f4d283b4f7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2060d70e509fc3f7c1da701e5195218f20e297c11d2dd4f0327ea4d25732c120d0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20620848eeadb74a572d6400672aecca35f46dfdc7b5152bb028fbcbf74ea7bccd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2062bb737d55f4caa082b7ea2aa6f8a59c8efdaf9d5ac5b158cbfb32a6cead8164%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2062c02a9b5a4d4328ac41c3e3aa7757e64e6c5cd52b9e047333ad18e60d17fcb6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20630321979d80b22e20ca5fc713b2e3e1a8d9ec9ecaa6e2f814193ab8471636aa%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206348442334e85e8374884ea848685771053a7cf274ccb77559c710b5a00f61e9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20637be0a8baa2b2a07788add89178c5ff71b837b0d7313d31252293e87a8c3734%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206399b690346ae7ceda0f8dafbca5acd17ac4d796619568a51cc8e50f5b630b42%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20639cd1a8d45af689d2fe1aea44b62d2110146b314f39be8a5d472e412842e61c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2063cd7d4698c89b720c73125900f4cba4b8b1c2b962064280a93dc9ce2a0e9549%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20641b9c056a8fecdc3a572db60e00f0b0fed7722fe9cf377bc4b6ee9208423107%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20642290f1b37e616b64b3c6b60921e24ddad599a38e67cd46a281b24c1ab62bb3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2064c336027bad7ec398c64d31ec444c47ec0d0b60eaf89202547967cc1b21fed3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206504f61ce57f6caae37cc7c56910267d18a1db46e6681178b6807f0e26ab966c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20659078fcdff1dead57cd05eafa0af4de667b52e981d1b907f0d963b41902dc7a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2065f5939878deede2e1b24a6412ba025b78f45b1562e9d365d97e1c76a32a1832%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20663977d4a882f59c8a8791d427ef4431ca63f89ed5683a4cb6d61006f1b1c8d5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206662b3f0d921aaee11ecae2893271fe861524620b05540e255d1e364aa65abb6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2066ff6219a24fb3662b7b3d4fb1fb7937649dcf052cea4364d4c9b178735807f3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20672102a1648ac9839230ff8c818edc737b01fbe92250ae0db8ae2441b257f5d7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206775386a28b32b93d1853880a8ccf1b916a3bedaf7ba4d34f2a64904de792417%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20678f05bab483e1cb9cc2cd51415c920bb4307b31ff917dc46cc44c6c2083b5bb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2067c4f4ad83e151ebe6e61092bec3153ec269e7be1945dbba0c61091a345a885e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2068f88269c87ecb16f9b7d9269005ce505a3498b9e3440054742481a2254d5aea%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206917b15d532856e0c0f7cbfc3501f4d5c273616046d94695e01ce07303f6011f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206982be0bd8e1aed1251fe5300eec2b515b7cab70e761cfb72074f5d658d092d9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2069da86e9cf24c49496529f3041604a6bb1c0c0ab86c192239d31d3a9b92467cd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2069dae6e64125b37fa0ee09f5cd9bf3581b3244e99d9b4651395834f9eef021af%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206a24bb276e5c9b05ac4cca0da01e1b381245a0d217efb5190543de6ec41b2505%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206b0b62e4ea23df186b7bbf0fff342ec107596e1fd249721eea75375982054535%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206b636c9fc0ec84737f2238365e71c23e9227695cd5ad52bf40dbe8290920fb60%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206b6d0ebe479ce082420f5412fc099860ab825450e58d96a6b33c5013ea061864%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206c404dfcb9550bf9080bb679ccfba607c96b149772c345ddeab0f881fdd16f8b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206ca7152161d4d3a65a2d4fa707a3784811bbb7507332f1c82662456f5f76b5a5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206d6107f0d094fab41eaf6073089de8a0b24bb7a66c5851f534a8f1d26812c3d2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206e166fd67041801b0481c69bc271ae73e0657f1078442b5740b09f6774128e01%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206e276e4fdfd0ddecdf0c1df49718595d0c4bcb28850897215b88fa01c239b62d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206ea3c21e1aadbadfc2e9ac0860d94eb87e6590ab37f98326e00b9615a13a6208%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206ea44803e9b188161126374021e9d845136edd676d33fc80e5f9348b8d577a87%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206f14b4087af44921d294462fb0d65259f18af0cc23b7ab1c5b87773b9c3c13e4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206f6b51ad77bb7963ec455923fa731323ceb72af167a0a40b8c2b91696301bae1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206f6c034629c0d8df05227f4e7d85d02d8fa52d7fda0940fd4f80f62a23be06c8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206fb97ce4f81eb4d83364b9377cf654a6f0e8d9271bd8e1e9f45f78b07f838172%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%206fbe2e27bf4b4543e39c88a4702f487b15d02a47b04e006759cfb6432d82fa0b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207013aca3c062f040cf9d0448f7e2892101b30e5956915c8dc3a53c3c2aacd13d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2070c80b940abbafb0d631870322b5f7c8e306a2063097493ab471f0ba8ddd228b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2070ed5ca85b768ef6f9bb36baa9596d07fb259c775b457464c138a7494f7340a2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2071337bea704f642aad176d64c9f64fdcdb9f38f8107294a417c9bce7a104cdd4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20713c6e95151ae02f075d0391a12e47fa2aaeed199379377bddc00590ceda1795%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20718662066149651d1b7506c7582df2252c555428481b1821829b4db25e2a836e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207196b64c2f89763d2ea7f0f106d06352ae2c0e17a83fed2d10548e1aefa39245%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207213c438e3f07e82dff82a5b6cdeb5f80e8b82ce6e12fc377732a8df2c527bfc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2073a8fdf89ed1a2d0af45142f4b4498545ce4182ca704ad2b292490263480b1fd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2073e72a45f92daa7ef76dcf82e6d13113cd9acbd2250d78d2e02232535f83fbc5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2073f5c64009c9b8ce26c13399584a65b73b3b5201475b04dd9621f5433ef959da%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207452bdc99e762f3b54571e03c1b6ab0873529b798275149fe0a8bc057929f8c8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2074e19d515a7d2d4644f026bd8ea3ee5035b1d325189d9ff2184892a62a7cddc2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207540b3951f0ddc6c1c1f4eaf062525f55a1c6e862022e4a545530895510d772a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2075468e84df86d3133927f5c08028dfb6dce55168c99ec9fde08397f5ab0865ce%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20756777ea660defef2629b8802bcbdd29b61020fa8ae8cb07045a7d5f991f3508%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2075adec4e87cb200578f3899c3bd7435bbdadcc4941e5edcb5a3fe3055a8ad190%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20764d56cd4e5b88fa97313d5eef173bb426aa27aef5d81794eaf5b9c1fdf38375%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207678e64f7728c059b228ddec74f0918f0544d5193f7b8efe0bf03e8f36c2f5c5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2076c5461e86a33095c4191aa02ccba85cdad5f24ac9c816fb8ab6f408cf32dcdf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2076f7ae620a91ff5e8590a2f22f59018e613aeb12b626b886d6ce2f5e4276fce9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207704838038c24fa47fadd54f19c5911fa39823ecfb5f451db59271112a07e777%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20776719490d81637a1604081fa3e9ea7fc975020cbb45103bbe4efc70ed69c6e6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207796142d4d8a09c6f416d5b3cd452caa659cfca40992683d7f8af55cf4e6a7c8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2077b27203150cbb0b885df35e361b1a193163316e3f315be4e7967312b097aedd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207802bf1fde1f8771ff7165acab0474471598a46df398d7db84adf911d2d37260%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2078bff3425a6b42b846508850f03a040c22c43566947ac1d039b431fb80a31451%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2078ce8406e3b09a3450d41ba11c1dae91456f25c796441dabb52c7b7e261b3a69%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2079700c28616b906f5534cf45d4582878a73f96eff24f1f894bd04b24c00eade8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207b1cb9593c0c1890a7f1e922777c206012f2f1ded7b3339d66fa49efaca44c74%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207b2aaaa9f92c0e6fa23a59bdda27d5cb26e8fdece26bc756893490d3ee657a4b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207c0c8fab8b15d6de59936a3921f85d9e79f710c6c6db6459804b679d82760e26%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207cf94927f6826886883baf229f3cc2f2545588a564ddb7583f2b52853aeb5b21%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207d216a628dc15d65ad64ee6535a8c190260c9616945108237dab43b3fb1ed549%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207e310dca802db0f7a22d39bb2d7d5b79c7e9df8e5698f0e691942ec334ce5794%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207e95d1a64976573e5ed1c8c3466e24037d33fcfbbd9f02d1ae69643fdaa44d7f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207eab23785afd939c2abdf53e001e896c67216a6cc75b646d990fdf92ae226748%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207edc3eecb5d5ed515e06f8130d875fcae07cb0c7bfaa2e4cd8d86862e5ecc256%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207fb3aff9b87102cb3535bd80904b7252c40ba4f556d9f355a45fc9003cb29e9d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207fbfd8b03d178e074572dff764f28af98c87c7556ce3837ccb8dfe993efa1940%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%207fd571d3ff56fa697a130f06d98ae3d2568e4e3d5848cc0966f4e00617801cf2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2080073632c479a5522a64e14cd9bdb4cb12c3b86eb8eee5c36f63c40c96865334%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20810a53fa70ab5b27f2dbe92948b79638dc87fe6015f94c41501562a47805e28f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20819cf98fc21e036b3ae7e6390ae09edcf6fc6c260b22bf6ede0852029ef2495b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208222535124cf1bf77c3af3e6ce3b3a942390794440b01f8d2fd44b4e416b049b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20825b4bc9bf807631611cd33434d1455bca3d412b9a03463fdd1092c54d5ebbfd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20826f711b5accbc542c3e33d607f1dd10edfb3486772975f204aa2de43bdb52fb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2082bbbdeed52e95c3f19ad09cc8fff5ea17f9f5341fbef5f88fba478c24e9fd66%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2082f181dfcdb973537274d8fbf4ad83d60ba8b7315bf99def64780a8c29c6a843%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2083d24271a7b1b9bba7070c128edcc8b4d6a5e7c96caa920baf5c014efbf6775d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2083eeeab2bc322fa12b1ab2be69ba64ade98d999f8e1118ba1d6957c45b52a6c7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208448a4dad1df740fb0882eb8533c40a2227e385f9f2f07a546c1d2e6020b7cbf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2084c011953dcd5981156d4d5488c82f53ee73cc839d3359004d491b0f1fbf2808%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208567d8f2fd8a32c33c81aae33ef21e34f818159199f0beed6c10dd6e2283351f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2085f9cdc44ed670c411f0892b769e91567f9a81bcdeb92861fcf6e2ffc7773f9c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2086a0a4b3efcbc51e14a0a307a0efe343c7a7e3e2bae3a6e0502869f610034ead%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20873e676d25545b3d6e133a2c85cedd5a4627a11f67513e54e6a99e812e7618cc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20876f82d1e8632fff9b24a04be60fb1486a1e4eefb8b20183580874680fc06150%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20878450f31de9dd84201895e81547ada2085ec94608d7fb6bdf84d73dc3b98538%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20879f28f51c3b235744352f0808b6267258131f2594f3ff85a6938401e73eb9da%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20882fa77c019e12dc61165308318657941c1b15c1259213e78aa035017fd50445%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208927ee41096d71b75bbef2672e22f640a22ae3588f4f44786fff92c70b861885%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20898a0ddce89b59e6993ea651b0a0d4b54752957b63274dda75160674fa0928f6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208a4342c4bacccf07bdaf52b9cfadc8789c37092ccc0c414e1848e4d0317d01b4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208b02d988ee00fe78039974032b856c56e741a4594744b4f6376cbe1df8271226%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208ba0474e2bdeb945adf9a819854cde336f3cca848e1ac41e381aaf03d397c7d0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208bc76dc04271ff2014eaab3560bbe3177cc08eb3337f4f512c7d44b98a40d1d9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208bdf9b526d2e9e65f23ded60745006c65678d184a258761666d3864432cc0cac%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208ca806b8be055f9b5df84871c469279930b34b89de515068b1cb30bfa9c3cae0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208cc6129ba23848fbd65b91a9b70999aad19d3b7a6d168066cbe4a0b759fc5a5c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208d49dfb69b420390cf13ff8f3a3b3ab88e5dcd46a182c4ac5be9868bc6278c35%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208dbcebb69c00242f0a346c34776171061d606262f412e92f84be99301d413c21%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208e0251d4518373ebab7aa1dc037d732b5c04e92306e16a8e8ca1479df0a9ae88%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208e37407821e4af774debc51d6dd492c11fe6652ebfd25febae7a603a7ef69822%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208e8b934cc0bd3127262a9e52fac754d64abe27c09902a78acec81c0daf883f77%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%208f79d9de33f5f131226a78ccb10bb16218a5be51b2105cc32e38ceb0c8c30e9a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20901396591f3682b308f9cfa279cf1a7f8d4cc6622a9ca799e6b5e1d5bf769f2e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20901658f7361b4d15145d07de99b9d921d7293699a15479f086f4d1a00fedf089%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2090818dd14d621360badea1463f975a367952e2a0d43e7dc73401a7ab0a2d3a1f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20912834981a1de06dcdd4f8cfd11e7db46ac691e5ef20616d76d859e889c303be%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2091933d348054953096135089baa7b6ca61dc43e9fc25dff45c9fb4dbf9e8d606%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20920c4d1c705e8b80e94b19f2c690d1fa4f25f0f6954db6209ed5118d7927fc32%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2092311971e888a24238c48086febf47b2d0820856e514dd6308575291b6de4e48%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20923e61ed9ecf1c37848cbe56822ce753f455fddf25c1eca816f3ac04aa46daa4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2092780ca87316f207f58c61f65bc8f702fbb2881688d9819dbe8ebbbbed6e1f67%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2092c197c09f8aaa2e20427f649cacd1484ef7a345040f54eeb3135745b6f671dd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20930761233953091f36c6f92e069229f7dd6c86555c03315e1cf51f9fd349ac79%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20934742dd01634ef45d78c2a7f9f3e89a0db2cbc7baf994570cd8b64fa4491da0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209387c8f1b5d856bdf0ce43c88413c22f98214768708183bc610381363dd269d8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2093d6ae2ede6573f018ca1dccc5b686a0461a0d662a353511a0b420a10935267d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209424cd10408253ab228dc2125524340f5ca53759e3ad4e996e7cf0320f41884f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20945d5b0e567bf5604ea9b12fc7f3f3bb12ccfb1935b9de78c9bc77241632fc9b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2094a5124370c2d66b38a568b3d8be4a98dd8d2e25313b68506f7753c4d60be97e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2094c6f84946db100b505af8a308f69ef6cddc2e310b50641a6e2e63bc9aed54e0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2095446bcddec63d36a9f5554815892c104febb73c676a075d789e4b7c69979fa6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209546a8c62b6d285172acc0ca17340040cd18ff76bfe5b9e7672824e948f7331f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20955038954a0d1463be658fe518b6006f9fde166b67e9007f3befb9cfa62e5da9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2095eddffa23bfc032d7d65b730d49a4d87bdaa93e349fd9e30dde6a450b9a9bff%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2098372c6dea313b0660ae2f1b1c80a8a5d7e93ce07010621392faca75818c0fe6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20984e1178ed45439578fc0b3cc2787cc8f972987c087fc5b4762ef5f421cf5782%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2098c90d7d56e82fcf28b362fbf659c3dfd3f987de96d997defe2ef2e78f33cecf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2098d605b3578ac3b7518f151c24c937455b204441ba806ea244f22e54c03af2be%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2099f913a3f88561d7163bb1ed79380dd346897e577315eef71695aeb861e82579%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209a8e636b33372a34e9719b8b20d2073bc56f549b64e5af83fe617187a51b97c1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209ad9beef2a8253dc72e6bdd37d76bd54fcae482fbd3308904d87dfaa4df281e2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209b0c2aaaef88b38db18e4efd44b2582c8401f9a17f2c54d0e1f07d2c94a9a5f4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209bb0e8c4030538d2b820b333ffa1b211a7930953f30bc9ba206eb26adfa45741%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209bd110e7a5a1e1cdd77af3702309d98f748cdec6d25a5e76c04f63417e2e6a8d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209cc04e65928cf4852d0ae16d55808b42542387ae389ebbd3e42f888638909932%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209cd9ea2490848b03659e0e7dd7871ac815c54080e5588a530afe35cfc1ed585e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209cee49e6b444421c55798f7ce7bf7a1eebc6d6f75319c2bcb39bd11b4075c71a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209d318d27111a3c5a2e3a6451103750d70dec9d6e9d048f7e98fcd60066b98aee%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209d8b09f7fdf906dff7d92049fa20921927f3cfebf564455eac78ce2518ad03a1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209e23a81c581d5e6c351c2cac1a944ef5759271739f6150c3ef6857bfe401ae62%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209e2baeb611484b3c3460fbabe2b48ad91111e9a0cd7d1f189ab2d0438a69b3dd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209f5d955a2b3e33b9ba93e98d56a3ce4c997c4234161a4637aa88eda81cfc743a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209f715f7b4128701de97332885c28547fe89ca4214de5af85623ab90670fdbbff%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%209fb2a464f53ad26c1bab90ee2437c0c265ef6d0faf419af58baca323c6156b7a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a01bb5e701b3b847766d027e7b9bed8e7bb05403ca0160734bc73c93fb77b6fc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a04064b45ec7d0c5b6ae123d779095e23315e6ac1a150d4b3190909a2237603b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a080c1d64fb844389bad75a733e3b4c5483b07623276b114575d5cba32170869%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a08c05bf56e1c4e4d180d69266bbcb244e7e2f85259d86c05bfcf5593cfa33f9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a09c15eaf24a7804b16fa6fc8e4d16c8ebbc850d070439b2c1ead835f4626dc0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a0c57eb7255f99412b62429f165eeb1f8a297c26a13eb6d7ddbee91e32dbce6c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a0e12007dd08b6d9a22fcc6548d0562ea3a966b2030ea9d00c739971e02b6c9a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a0e138096681313a3923eefa3bd3480e6416c73d627d3888b36ce7bb6b2b989f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a0ed7595a6c1b6e26d1e930ca3a8c1c0dd619db049ef112fa653b8bf9b026bda%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a1f593c61f035734a87dddbe547a18a52d641785c40cfd320b0a0802be57a1e5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a2679a9595a104d70bddc024dbc4f65f0dc9d906f30a0d1ae6b996b14246a6c2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a34cb81eac53b0800c2c02d2984c0960c0d68a22707869befd4af3996be42e7c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a3ab1a934f5806b5472f13257771924e3fcbaed289b2d6a860ec2fbbfd2d0c11%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a402dd098614ebc89fe70642661c52da9ed9ba0b21627cff4868defc97db0274%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a4102b19258804214beb838f61699a7623cc654341e6f60ad986dae805935c14%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a42535bbb37725951ac18b0fa9b5771454ce707bcdbeacb8120d0aa0eee0cf1b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a451ed9d6359fd109f495c75bab2678285265a72be64b3e5d0d5447a0e167cd5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a462c1a73072f541b6719e4cdee351d44a7cb3593dabbc6809b5b387d909eee5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a5013d7b2208a6c2d1ea75bbef06711be676430321f4b275140049d6fd53f8df%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a5cda726ef82b73f9c764e39a64ceab32e4d6e238c3019e06d3b7f2218d68ea8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a6b6a2940a5f4c98e2f531624707fd8ab7dc61f4b3d3de0457fe00ba3cc5c135%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a74d2353acccf98743271fd296b2bf6f1e047cca1fcaccc2fd9095a7f72fba2d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a7ac0837b77d7a91edb4e5fbfde127eafe1601e858a6312af9e555646de46480%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a80a5c395fd3b28b0130d4579dd3e462f9e38bccb2a42cc5245cedd70b27ff0e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a85cfd3acbec43f545c8586b63aa52622d9fd00303bf80ff3890012032699ea7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a89940e207a6fdd61170536d0d8fe66b4584c38a804c0df15d23c0cf30d49e35%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20a9638651a2475403924f124552dc199689a45d2e2e59e3dea2b223667dfb63de%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20abe7715141d75d5817b2456105d037d116c441796c7a373dbf3307412e111bf5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ac416150a9752dc20107bef240e73c6054af4992348003429bfd97a7373f4f27%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ac5ec67cafd72fd7f497c3759b0dcf359de8b7db6941120c0c69d5f3eea4bcbc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ac8e4d6a033b6a2d130404eb06e193b248a76308d4a82eeb5736d4f251af6826%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ad457250d51a0638880d9cf1df9dd029ab34b36265eda73c5459d8d0460ba3de%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ad921f429c443cd2a73ba3373fb6407a81b4b8d53b3fd5cbea07ca847ddc75c9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20add3e41160a5effcd5a6dbfcda45072059e02f5a6fa39042fdbf36ae8193067f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ade7666d9e200c0929260025880128674b63349911f1d03857a42cf753f10b80%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ae9c0a6e84b0c2912eda99c2de4e95d45c0c8feb2a097e02832ae03c74796f50%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20aecee44ca1c8bd43d65abeafcd5f0085e1165d42baa953808d566005189746a9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20aef16fc11c0f6ddca64581dc5b42b9d6e4ab66807ae7c5a30ccfd8f6774a2b18%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20af4026ab4defc142e75d57ae35e7ef4492fac8ab6c0cc55c6de47f3e21f5ac24%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20af98c4cea319d387751cb356a28390fa630a1b2f66920a3202b37e0acb861ade%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b02cdd16e398c2f31e9641d27d99865c404357136f857a1e2dcf2f7479b9457d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b0474259effceedf7aedde543afa096fdcca74d9865eac223b6a91b4ed922310%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b04cc879ac09941e714a8ccce371111bcbbc8d7b1dd1ecdc823de09fd2dad7b3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b0766c740aceae7f71543bfb22d3c757640e714e52f32a17a3d42f9d16d39383%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b1276f7ad8788d3db650a672e6ce6785d5c3922d2bc5aae554ad1b48b62dec5d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b14d2e3fadc16c97684a4ae947798bb3a67372441dd7252568f71fc86e98ae9f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b191f4293202c488ba673c288bb5edbaf506a9835a508ec38fa705797738c918%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b22a7a1693d8cb2deb608f8e3ab366f5eea0e6bdef6ddb03a86d599fb2efdd48%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b2977acab6438edeb2af8a4e3d0c353fd89e9b2d47082b528c3c23fbddbdcbe3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b2bdfb3a454065b92210cf8a11ef836b45b1db8679d31b45e65a71d1f5efdee8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b3148d78c2efd368e986a43b19e209f2ad4817e8a4ef41bb79c57ec7b9dc09f3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b3cb86dfc649346ea7ed4c8ff117ca91b59435b9baa9bdd8e6f2bde1dc1b1124%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b51371864d4322ca5c584cded0f6bbad11dd01cf498b841b270ede1f03497137%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b565acd86a3f4e294d606bf6c0e42eedc4b7361f4adf7c31ee4a806b54767cfb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b66a10f650f73f5497b22a2d45d9c0bf4df9a987668c4d617e62925c5c26c388%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b6fd5cd3364bdfa459f040c1693b879bbcf508513124bb95b5f36743efd8e73c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b73d5f184db4524883fae5f01e681f52371964740bd6fa957998ab4d65537732%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b767595393d045e4adb4225856611b3a51848a17495666be273823220a0dd165%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b772a8c72de61e4821a04793a16c8dc8ff7b354fa2a0bff189d879df254c9f1e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b7981e34bc8994973c48a18ac01d6b075f092de47d35fc62fffdc503ecf081ed%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b87e20d143fef2fc32233444070130834ce5dbbffe06409cb537e59c911f49cf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b8fb25742a7753c0f7ebac50e9e3d6186ea123dcd0e33eb0a64abc111eaa7728%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b9017e90f6c47a9d9560cfd92206c4b2e624cd91cd7f0680fb75dd972ef9582d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b98e94dc0b78131fe59ca6a9c0a142037d412e2ce5fcdb9d0d6d10f102b1d5fe%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b9ea15324d90a1b750cfcbf964321370a56b116b44a0cbee2035cf11ffcc0ef8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20b9f880e1df8c0a237dd9cf607e19287817eb75f59057e8df89ade763ca7b6812%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bacd1c945c9ff1ecea3e29039ad8b742c6d040e5792bb45008c1b7f664fb36bb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20baddfacc85e4aa97915493c4f66cde6002104bfc10ecfa3839c4fc6e32597953%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bae6e219e1ed8e8164382c4f05db847386c5f2908fb2fa453066aed4531310b4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bbb58a67574c989b095f38c9fe031cadd5a709235d6e0bfc9a206f98fd5318f0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bc4bcea45075ba867a4aadd97494ddcbbe693b23131bb52703d3c42b41340719%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bc5aa15ece1e486f4b7d31c5ba6d45382204c115e556a6412d751e25703a4a7d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bcd286446cd358474b492a2c9a4d49eab652aeda52c0e69ef94b1cd12b7579b5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bce2bb4589e9ba8bc8029514a887f3f3bb4ded3556bb5d77dc1a38bad564b435%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bceea4f950f07347b40c579223456984c0515a2cc94c4cedbbea3c17e1c459eb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bcf637c0c5be2018d76681b66661d1e6f061c2e1366124f4ef8754c074f8a95c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20be9c2feced70f810a5d08ec03dd8e7df75f9abd066a2ee30ad82136f355ceaf7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20beedbc9f64d20973229b584d965bcaf2f8fdc4a88c4bc202eb5e9f5565c85fa4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bef72cba124fcef35a3ccd67b94707f20c2bfe2a4f4d89f3497affd72b8c2a73%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bf0aac3f13b0d68c6a255735eaed4000c7e5f09748818746b4a1038f0be34f78%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20bfadb1d20541d4c39857e7b295b7ad20ce81d393f014eae27565bc173c1880c0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c02c66a7d393e7bd8cf757197bbc6bc22fd9f9b38a8a1068166eba97bc5b4a29%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c061fffcfd8d7e38afb97fb434afc78d39d22bf9b02884c7c1b04487cbb7dea7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c0adc82a52cbe367efed31279d6e1ea3ab98311db49a68ae149e4af9a70ab67a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c0c4215e8207d397914a56edf50428f01ad3676c23630ef7b8c06cf36e45a7e1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c1209a2eb0b5eb9324e1a8ce11c77ca141023b94b988bd1df4db390dda4c275a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c17b5d0b9140f95f5317619866739be362765e6165292cb183f539b6758f34b3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c19f30c4c9a444922cb61cf136cd48d9674d2134b98e618f6e7ab9654eb7a7ef%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c1cc2040975c62eabeae3df92e63b2c1a22c690a97edcea1576f83e975355db4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c27a0ca23c6d3ee9eea18c0e700f33f13c568dc209341b8ab4b64148a235c70b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c27a0e267f18a89c8ba8aadd37786ef8fe18162b60b45fc209bf992b570837af%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c2902ae30064150ea9236e92b819a2cf96c47ad73f0439233471b89bb04cc13a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c2b46f65550950fb75d45f5bff54bbed8d4877d803a9688739abd47909fc5f6e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c3d754d426defee4e705ab9b72862764a22a64f316a1f8a2563a72cae308c31f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c412ba0cc85278e93f349b9fae6011982f23f8f3a7b6539a36d90b551ae1006f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c4574a6a5e1e6b4f3b4a3317b51d75c3764395775f900b9ede99dca5e76849f2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c46c76138b4cf0a3407c3fe2844c11fdd5c0c2c4d335ab58aa0b0617a6f13f33%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c4dca3104af399295b160bd3ad7d01d38f9dc86e7143dceae68403480d7c19cc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c5310894b9a2bb510f37c49852d743d64343a698436ca22d9b7a44bcf20e447a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c544cd0b03384834b08b784ec0339e2b91a129ee56e7f4881101a10af567e6a2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c5534cc441ef64739b9609ed3160f296cefda8faaae992448baedb01e9310be7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c564d83ca92af69a296c473cf748d2a6062883164794856c8be429a652e421fe%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c5697a205b0e85c8f31e3538135e32b72ca60d1652162c30007d94ad079096fe%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c5b7f646ddc82ab730c91e13b52d86d9fa3c28d0b0cd1569fcf0a9b77509d7c4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c6009503816a44e0d4fa7d0d74ac7418b6551e31e58bab97390711055449e52d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c67607819bad2d7abfd1d47eebad947f9920352c33b96db61f9f25c05bddc7c5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c676efd7e6c8bf4a7d3da8aa51b2b564d77c67f6d2be68b25232326166e0c20b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c6957244c7417f2ea28889e02d23b63091b6049b82263872ec3a952765becf9c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c6ed04464891a4cdc3a25ba34d3cd44599bd118ed953c68c8b63f11be2dc83d3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c70331be155ee7c048b0296e15de195158c1215b1ddb31fb842018467c5857d1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c717a5d6b61b22bd458dbb497dc5abad9e30fedb668810e558a46f994a656435%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c754aa67ba523b595de11270897af05dc22907a4fce3f4880bb372b1e18d9164%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c7e9eff716b9e7000c89692637c58014ee0be37d7ddd39a0c2ae4ecba82e38fe%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c7f73261e85bdc43932e49254cb8654ed2ce0945379592cecb081d51e5834289%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c80df47ed107f7ea4eca4e15a55fce37f1578b985ed45131b8c67dce9ac2bdad%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c8ab653dc8a40406c0a8a4d71b56059a2f9b7c7ab9e883290acd071941c7bc25%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c9387dfa08afff4cd1f875331c6eb24ac6758d608976603c7398c039dde35890%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c9a2e7d55dcf6e3f7537515d2c6cb0e36770a5fbea7a01dafe4a90359ade90eb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20c9c8f182cf3b058d12bddb039d8a3f3686d1c325c9b2719ec5fc8644e066274a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ca65772cdd5fef0d287957d5a6e308fa1126b9b40a2cd701e1190e852ce0bfd2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ca8a556421eb318b0e5901085e97c448f1646a1636e34ec6e4d76f4a3d61f601%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cac095d827e58ed8992e3eb2bc4285823c8378247de15d7ddc3f97c79d275f8d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cb0603d8ecac9baf7de500500990ad0a7e9068dfee69f296d62de549f69f9b1c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cb25317443d65ba126174c8b7547c7d2f6c0288f859e2063436eb7b350d9bf62%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cb4e9aa8b2416ed2fb7593a3c93d5fed07d24d1f349761a1790deb97778a565c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cbb6d5a01124074eda2161e53a5128e0d0d8eedaffa55b14c1dfdd6fbc5a067d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cc5a9c2d4827e9b1501c2dc0a464f580d4a2d65e4ff83dbab548e51839339d06%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cc7b733f36b027823b3f501864d74397d308f8bc169149cca5307855234a4527%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cc9b6fc8540a6abe60b8966ae6c4217180cabbb3471d12f93e3c81dc206c8bd4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ccb5cecbe797ba2e130f297ec86bfbdc629ebaf919065e50d3f8911cc05b3a1d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cd755796109542b3da08826c56951102e5034c76428138d1a6dd4f1ca29955a7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cdaa406bda1a58fbe9933622dec218a26f79871d42f0d3576fbf878e51a16201%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cde8f07d2e7d14233748df612e113ce348140090694b96c407053fe4e6e1690b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cef953fd8883203ef326a6b195a90328ae31ddc10736afa171b617a906fab77e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cf2df7d9f1ff5f087021f7b47cef6aa3efb47cbfd639f730512bc630e0c91f81%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cfa61511dad005aeb4ab01678f87169c7d509d59042b2fd33e8b58bdb34febe6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d04141fdfff53843c10ef247e885ad9fb62ffc58c89580718ecd2b102a590f30%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d07d7094aa0dbdb896f8d3dceb093ea8c1d72ee0009472ece73190d2071aee6e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d0a54ae69192d2d0289b2c9ae33a6ffd0a0db78189b41b032e18a3452c878eab%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d11d8f85507e54952adcfbb82d5d58ecfeec7674b756ba62c8e1316d9a1500de%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d15d9bd6d7980d27bb56848643aecef336c8ff0a695e155071b7dafb1f75d08c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d18f17a61f21b0b96542a3efd2a543cf87b434d86055e48aaac951f09c53e0e3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d1d3adca998106090f4b2f08d6c50769e88e944ed640518d23f8865102c2ec0d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d2565f697c692df559b665d0b97b3743c9de07c0ffa83b0fbb5b86aa821e8622%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d27437e85db58b607bc173e844b31dbfb8b949ea3c225e13377ae942572c4611%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d31512a9a475071b6e14a03aed7c5286aa0c622925d7a840bdee7158a7d9583c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d36182899b2c912ba34f51b50bbf228e1ec367b0fc009d20d34e4f011f4e9fc1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d369b68d0c38afedcbb0eeb82f2d06d486e9c0ce212ebe3b0d9f8dfcdbbbf5b0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d3715136d50fc486ef59fb4aee1d7f06552fdf98423809939538fe905a1aa0b3%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d3b797002d243cbed1182569ffc6b5e5f6243e59ee27bbabae7362fa80be6e91%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d3d7862eb46bcec3f0eecb5ec94caa94456def40792a125cb9b7912625be5973%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d3e85abb0959e87075f3a91e0048163e92c1831edf3c70a4d85f6ebbe5d56cfd%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d4c6ce9d730179b7a5cab37a8744a2ca588c9a2a8b8462b62d2c96757adaee61%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d4ed519bd5e5ba2f027d00635494d485f19f3080d8baf6d711b190323294e216%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d4fc77114a472bf1902a66a35f51a11689446c8d0dc18000717a5f74ae6b3a2b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d54e560849c716d0ded4b25d9aacc746f77174cc6d3eeb3a50424eaf337c92aa%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d5844b2dc05f8374705493e1d67700d0421f63c27ea10070c60f1871dcf540c6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d6389e5f47ee85c43b2d9aebef2e0c8a9f06856fabb148496a8acf251cdb3c1c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d6626703c5940d244a87f2967f0c54f4a5a7b53597dd92a0b561f28a2f9a9161%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d67b82421d81df8f3d64966609e3c963be6d0dbd87df531ba5f3ef0bd61e5353%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d6ad23c1fab3f0a2babb23e7907385e25a06801c2edd50d108e5b08f923855a8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d6c0481e584911e1758040140b89593d1839956ef379a6d45d5ac37d0666b866%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d6c9d4c8caf3307da9b1d6543e00682a3cddf1dc06c41f0f973355cb9c8554bc%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d6d451499ebe6d8dd621f1c2ebb00b87dd01f7870b791e682b66d5f33eb01d8b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d72f64d5a25b9088f7fff456d3783c2fb0e7926cd4de6469c6c3f57690830907%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d733c74eeca529ae54b842ea757213532781db14b38c9222f4eb34be5ac7e1b8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d7f1a6c78df7317f866866e74e881d91485ef816e492fdf2a6fa02b940629494%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d86ef77e6d28671ef838b314840a4ff9237798c058244805b3b3bc01010db097%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d938d08543d35d4249a51057c1d9c62bb1f6440af19913c5feffcea47dd3de95%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20d98134626baccb58d0d97613efeae6d504b112a4f8d8849e2599ceecf55f7fad%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20da480d23fe57a6003e41f8c88e2aacbade99186f0b62ba4561663b346e9f96e9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20da898f000b47ebe799f88868276a9f9a0744ae283480c70b4506f17218696a52%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20db38dafec56ac3bb8948390f699fddf5a3f3f2b33d0a696d41c803c059a5b940%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20db4668c191b9266a2afbf974c348885a9d10a3e1750d1e100418aaa896a5a103%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dbd77ee47e4bccbb2b8af2883765641e9d7c404937da2942637fa1b4b6d4d635%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dbe505cc1f3a4135628b7e22c7fddb99bf3ee1d46f82a84219e8cb0905c20ff2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dc4153ee0a3333ab789383cef8b0d9760b9f416138a093cd3357370261babf4e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dc45a2e1fd0112f5deac4678b7b093d4e233256af8e492104658c38a5ad426da%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dc5912033c5ca14475f2d59ca47f25c8840f362f0c8553d13bb06a8e47c42abf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dcac97ed60b61b1991fc9f499fb3bf0e8594d49d102e76a988ea8933d099d396%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dcb8c9ec0cdddcf94852ac34e952a349af1ca970d825dc239075286875a9257d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dcff49fc24b1b8cf02fce97a15b0bc8bb19c6979df21136007c677ac3b9023c7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dd75c90a2a81a34fee2c17a6e72b8ec2c93120fbd98c437c4648ac5fd78b6af1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ddce5a86b35fcf3fe494169bd1834b1f40f24b1a4938e5239bba011dfb981949%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ddff03dbd491004d20587de561e976bc8b5b5366723b51d3f59dfd1892b9dc25%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20de983965452c5d6bdbf7e4137ef30782337efded699beb2db1cb1cfab2a9cdb9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20dea93336a790f6ce8a80f451d1dc454eaf29b034a38a802140937b3166c4d450%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e01af875c3100fa3d72d014aaf93417317a1a4a4e69c4a28c216c73dfa5e041f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e03efb41e61ac04cb14a63c5ee5a71d3deeddb29426e38eab1c68946d60e26a7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e0a3837abd91821c4ad98687d2dc6456b7fcb05c8b672c48f242ffeabfa3e9b4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e0ae28d4aca350a31f66402f4b0f46e05e4aaf77adfc813179a7df20c8f4b148%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e0c5fec105a86f8b7ffa77bd983d3ed0b54cbc65542e0ffdb9aae29cfc2ddd8e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e112ae0d90739fa839e6e29687412b5669a2f23bbe2b418d96b65ead135ec349%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e13105b80056966dee303194e6eb7e2f622dccb80f5fc5780100197d43b871ea%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e133210fdecf2d57cde25b0bc706437210318e37655eb22a97000bf27a02c177%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e2242e4aa3a284fcbbcf2f38a10bec24408f1eff74bb307e699ea46f483359f2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e32576a5522533c1914ea8aed13f238022bf60eb6fb86ec5393bc8ee56cf5a06%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e37c7b66aef1c9702b08f3d08a41edf3e4617fc94a17f318297506868e1d254e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e3b619d396378c2e6bc2f550cf1c55cd17e7091fa4ab90761f32582eba28884d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e3b8e6db2e08d8cf93dcd44adf437d6a6fabfa7b309702b35f7ddd4c1790734c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e42a49d2674808c57b781e8b3d78613a143ba9797d1a856ccd2a62302a49520e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e44c2088ee54191192cc690787d74d8ddbfe3fc97c58fb2c42cf8a952784c94f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e4a209b19361c13d7a18fa41d8a257a22f6c806bd62f04dd24cd77abd7d3134f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e4f33b57947d45b3e43bdd7bafd68d2f4c799fdf0b72a8a2ca61319ab760ae67%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e555305c3219cca7d7b8d5a667ae2ef454aca7eb84341f07e1fa8288cdb38359%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e5ddbae819b82a8237740cccc23cee00844fa79a15e18e6187854b29e7e81a2a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e5fdaabf11b236c5c7b040d674936e84db746a180ab9999317e16dcb77aeeba4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e649eb460cc049ddac440fe93528336fa42bdd9cd7a284ad9a2481647b57e75a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e6819bd24e063807336994f36e1b7cafbbec46c2679a365dde1b54b720a049e4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e69ba3bdca3335f01b749abb84c702f6f926eab3e4d6ca70dd5ab84c3aee24a2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e6bc9c983e21a0cfcb2d86a9dc88c28e5ba33387acdff81bccd6caf780e4619c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e7049738618fc298adb3099074b3419bcf553f0e54acd9ada2d611fe64925026%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e71744d4e18cbee18a1fe381a8a83350487baa6cfbf3729d999f85d7b650610a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e7969888310f2eceb73544fd8108eda95c1a3ea62ff57da93c643bc55b898f50%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e79fefca976e762f76a8ce36494928dc2ba039de02b69659a87b5245cb27ac2f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e81cd2760e4d5090b1d0da86309ba993256d88a4abb8065ce83266bcf4f0ca34%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e8d1572bf6bb0b658f618c735322e6c1aa20d01b79c9100e3d177b6c27ced480%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e8f28f55ed2fb648c7237e216e5c377da45e9f6d6a746605515002aaf502ae4c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e94ccb36573d53127cfdf1f6d617c31ba8562fbdd4b43e48fe1fd52325315756%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20e9bc71596a97741893377b2c52a13b5b2ff0a7b6f985af40725e0755d2c537c8%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ea3e4c728b066bf6827adb0497ec6e32ab66c546c4ca89fca8f3113c3d74e950%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20eacba20ef05b116d70c6344a54486bb7c23a131d7c897f5399b9a084a5bd5205%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20eb08694cb68b19cc7bd0bc323a46e8ce6de5036078a61dc8827ee480269c88eb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ebd6b43db01ccccaffc4a08182e03cf6633d5371aa69c82f7300141277fe7d7d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ebf41cbd3da1701755a788922944f1ec7e13aa8396a03611cef2e3940da4cc20%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ec439231fb2d3491a63b173bda078a128bf02b19262b3549f3a799992442d9e7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ec7f01320c848a88e89d3db821f462448f62e5ae65fb4fd02dc3a5602ad1eac0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ed3834eedb770cbb44be9357c5b05d9800ec9577ba3eb6faa3c47460d78814ee%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ed85051f384bd7694f0a86322c705f819cc18a0ced71d4e3c3946b37d4f3abe7%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20edd3eccfbbc2ef2ac40e723697f67a346fca062ddd6679c5ff8cfbb91d3b6afb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ede862fa7c647cdd18ab5b2cc90aeec53c35e7f2a9e8d3cc9bd4f1f4e7837b30%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ee03798b5db2710360c33566b2e61b46bc664ff8a25b257bbfb620c332d70f2b%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ee21f7397347f3b42d5229b41f9d9a6b4be739419f6f2bef1c3eec8f5d3a17e2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ee788077e078691ba0f587f2f9f044667b3463f794d8f38fa0c96e8b68550703%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20eeef50c6dbb27c9ae8bbca0e2be73384ba60469957414bc2943892ef28836b4f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20eef3fd99672410b85e6342c5757723d0d3ccecef9805237955baa20780de8b4f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20efaf5f327a471776f0a75a2b8b7f963c8ab72190be7f606d51a0c04715dafe70%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20efb150fe9825a88101d934fb5a9801f970f6e734e758344062d37152e8baa1af%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20efc056c3caa782e178b7ade2333316ef39a0a6e17157c68a61927b3a045061e9%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20eff883c442f1805faa24a44e645413d9c9d3d95e6e0bb5c227124f7eac8187b6%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f0d6176199b56171ec12bd663025c664b2bf3f8b844bc90edc8dbc3cc062871d%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f0e7e5b4689bf7e81db1b56185b2a1186d31a50f1cfd1c9863a0746f490ebf3f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f1075841f54237735c1135ebf92baeab9c0c3f8b051229f898520f5b0f265353%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f19c7fe7e25a9a41b4065791fa390b8d79ceee0cc7fafae702a92a6ec0e86696%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f1d2c02737ba96e93892f38c161b3f35fbca79a4302e439e8405d3434ed88fdb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f21b8f836105cdb4051d8bb29302dcf86836b640bf048b24f3c76e930b513b32%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f2da89fe72acf6892b139fd4f7a047c30eea75cf5c572da6f901511658ae1522%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f37453e390737ec297686b784da5aad11acbaf8375d377fac533caee996c1d66%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f4426a3de06ca8015af5798b631afe601a78a069be9e70fc818222d9b4f679cf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f446b6d7d932602558e4abdbea9a9b826a12d27c535ca6c2d0bafa5e34ec3864%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f528dbe55aba35bd4e5d55fe853afed41c54d78719765944a5ea74dbc062f4b5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f5502f7f96b9ca121d3b52a1a804c877839e76e3dbb45beda100bea672067d26%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f5f374f38948ddbde29b9673cd70ce05e27af9f3be23a7bc086f37f35a68ede4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f5f61e3f93c7f6615cfdc26efce6a83b3188d697e2243643d08d10dfa9de8afb%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f5fa2136e6ebb55d5aa3c0bcee64bcf4506a7854ca10fb5a43b8141ff4bf1275%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f615668a861c9d430afe7b40f42f352881132d193d16426951563997fbdc81da%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f61c63e919c797c1faae135458e0db89f288a1d05402380823562f34452806be%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f63845840d8dabf49f4a1137c4b1558257748fc26812bd693de92ed0257362ec%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f6cd8446d78da9720f06cd360a48e9b6bdae33e342e18cb05420adb78fe05858%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f71a5cfc0646d85af2847e6816752e81f3b4d2a3ea5fa94516aed9464eaa4024%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f75b595b9ce5e1e25a5d64e54edffdf696251b4f4e860c0d3a03a183631f090e%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f7c504d3d3907aa4c7f70ca1fbe1fed7e73426eb987b9c5e2f6b31d42e801af1%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f86f7ad9ffbc7437bba6bcf99d08b8de38f945bedff00c2d35362387077eabea%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f89741fdf7f21d8670407a4b8038e75319d73486009e08a795632e94fa27df82%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f8c314404f2801dc3b04cce95fa27a97f58459f9d70c8e3b03bbfd45bbaf5e40%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f8c33896586db20586273c8378d4fd18e49a4db7b6ac15333eb67536536c40da%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f93b61306682c563bb68ecb67dea64f9d5b86a8e1c7cfa7fb2b4ea02a15146e5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20f96a77ebf7806cc05507582f25810237aeaea30ef819dbe90ab2227f8a36ce8c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fa52c6150c49a84699bec9739b84f5a2c073f4f69b1bc84028f3b2cb15b2167f%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fa7e7ca9fd48d608094d5f56ad6f0166db7be91862666abbb6fa631055b98f5c%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20faa729af295c234dfcfc5ac4ab91c8c255c1b054c612b9cbda1fce33f88b4d51%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fbf652a641fc3d847c148abb65130f7eece7a51a9c6607f1c403a8bbdde6ce48%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fc0eb68179f1363c19896c7cc043021a57cd45a3492187829b329474c361722a%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fcbed542b232be01a0ed2d52dcd3dddc101fafed3da9f3e3aa6b17b652e640f4%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fcd339e12730f057e41ad41228f9612d4954f2d0dbcfeef37e14dcdaf2866e05%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fcf7c3d07e1bf9f1347e48dd3ac6e45fc9492648985a06394ab6568a7a71e262%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fddafb4af375516cb2f72c9308852c88738a66d57af9deb08e9a10f1dc983499%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fdedaff9a18229027689f23bef37cd8424e248412137bbf710fb6163eac6ac43%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fe510a8d06c948ca3e699a51d8f60bc0411df8056124d5e4a993cd526da8a0a5%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fe702d3ce5fdade4ab194ec43fcf6f0a070123ab547ae49b9cbaec33c474dfb0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20fe9e2b75babda09ba22a3e99494198e125188d9345bda2b961f10e98e6c2b784%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20ff5f5836457aa7fd0f02d037d0dc23b5c5a49fef8f7360268d7276e577060256%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20https%3A%2F%2Fsecurity.ts.fujitsu.com%2FProductSecurity%2Fcontent%2FFujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fsecurity-center%2Fannouncement%2Fintel-security-announcement-2024-07-25-001.html%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20https%3A%2F%2Fwww.supermicro.com%2Fen%2Fsupport%2Fsecurity_PKFAIL_Jul_2024%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key&color=brighgreen) + +### Description + +A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised. + +### POC + +#### Reference +- https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8127.md b/2024/CVE-2024-8127.md new file mode 100644 index 0000000000..a342b10a1f --- /dev/null +++ b/2024/CVE-2024-8127.md @@ -0,0 +1,36 @@ +### [CVE-2024-8127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8127) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This vulnerability affects the function cgi_unzip of the file /cgi-bin/webfile_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument path leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_unzip.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8128.md b/2024/CVE-2024-8128.md index 88342a19df..4348a421dd 100644 --- a/2024/CVE-2024-8128.md +++ b/2024/CVE-2024-8128.md @@ -29,7 +29,7 @@ ### POC #### Reference -No PoCs from references. +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_add_zip.md #### Github - https://github.com/fkie-cad/nvd-json-data-feeds diff --git a/2024/CVE-2024-8129.md b/2024/CVE-2024-8129.md new file mode 100644 index 0000000000..ba8210dbd3 --- /dev/null +++ b/2024/CVE-2024-8129.md @@ -0,0 +1,36 @@ +### [CVE-2024-8129](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8129) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_s3_modify of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_job_name leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3_modify.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8130.md b/2024/CVE-2024-8130.md new file mode 100644 index 0000000000..9570387b6a --- /dev/null +++ b/2024/CVE-2024-8130.md @@ -0,0 +1,36 @@ +### [CVE-2024-8130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8130) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this vulnerability is the function cgi_s3 of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_a_key leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8131.md b/2024/CVE-2024-8131.md new file mode 100644 index 0000000000..c9c9cb1b02 --- /dev/null +++ b/2024/CVE-2024-8131.md @@ -0,0 +1,36 @@ +### [CVE-2024-8131](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8131) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function module_enable_disable of the file /cgi-bin/apkg_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_module_name leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_module_enable_disable.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8132.md b/2024/CVE-2024-8132.md new file mode 100644 index 0000000000..e7177a2eab --- /dev/null +++ b/2024/CVE-2024-8132.md @@ -0,0 +1,36 @@ +### [CVE-2024-8132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8132) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been classified as critical. This affects the function webdav_mgr of the file /cgi-bin/webdav_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8133.md b/2024/CVE-2024-8133.md new file mode 100644 index 0000000000..7902faba6a --- /dev/null +++ b/2024/CVE-2024-8133.md @@ -0,0 +1,36 @@ +### [CVE-2024-8133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8133) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_R5_SpareDsk_DiskMGR of the file /cgi-bin/hd_config.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_source_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R5_SpareDsk_DiskMGR.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8134.md b/2024/CVE-2024-8134.md new file mode 100644 index 0000000000..df582f1a67 --- /dev/null +++ b/2024/CVE-2024-8134.md @@ -0,0 +1,36 @@ +### [CVE-2024-8134](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8134) +![](https://img.shields.io/static/v1?label=Product&message=DNR-202L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-322L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNR-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1100-4&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-120&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1200-05&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-1550-04&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-315L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-320LW&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-321&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-323&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-325&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-326&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-327L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-340L&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-343&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-345&color=blue) +![](https://img.shields.io/static/v1?label=Product&message=DNS-726-4&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2020240814%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen) + +### Description + +** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been rated as critical. This issue affects the function cgi_FMT_Std2R5_1st_DiskMGR of the file /cgi-bin/hd_config.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_source_dev leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. + +### POC + +#### Reference +- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_1st_DiskMGR.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8135.md b/2024/CVE-2024-8135.md new file mode 100644 index 0000000000..9e77ab4420 --- /dev/null +++ b/2024/CVE-2024-8135.md @@ -0,0 +1,17 @@ +### [CVE-2024-8135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8135) +![](https://img.shields.io/static/v1?label=Product&message=gotribe&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%20cd3ccd32cd77852c9ea73f986eaf8c301cfb6310%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Hard-coded%20Credentials&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f. It is recommended to apply a patch to fix this issue. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8136.md b/2024/CVE-2024-8136.md new file mode 100644 index 0000000000..c696ab989a --- /dev/null +++ b/2024/CVE-2024-8136.md @@ -0,0 +1,17 @@ +### [CVE-2024-8136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8136) +![](https://img.shields.io/static/v1?label=Product&message=Record%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability, which was classified as problematic, was found in SourceCodester Record Management System 1.0. This affects an unknown part of the file sort1_user.php. The manipulation of the argument position leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8137.md b/2024/CVE-2024-8137.md new file mode 100644 index 0000000000..476b1bb48f --- /dev/null +++ b/2024/CVE-2024-8137.md @@ -0,0 +1,17 @@ +### [CVE-2024-8137](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8137) +![](https://img.shields.io/static/v1?label=Product&message=Record%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability has been found in SourceCodester Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file search_user.php. The manipulation of the argument search leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8138.md b/2024/CVE-2024-8138.md new file mode 100644 index 0000000000..5a8083b80c --- /dev/null +++ b/2024/CVE-2024-8138.md @@ -0,0 +1,17 @@ +### [CVE-2024-8138](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8138) +![](https://img.shields.io/static/v1?label=Product&message=Pharmacy%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in code-projects Pharmacy Management System 1.0. Affected is the function editManager of the file /index.php?action=editManager of the component Parameter Handler. The manipulation of the argument id as part of String leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8139.md b/2024/CVE-2024-8139.md new file mode 100644 index 0000000000..ae4bdb23e3 --- /dev/null +++ b/2024/CVE-2024-8139.md @@ -0,0 +1,17 @@ +### [CVE-2024-8139](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8139) +![](https://img.shields.io/static/v1?label=Product&message=E-Commerce%20Website&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability has been found in itsourcecode E-Commerce Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file search_list.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/ppp-src/ha/issues/7 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8155.md b/2024/CVE-2024-8155.md new file mode 100644 index 0000000000..68374b8144 --- /dev/null +++ b/2024/CVE-2024-8155.md @@ -0,0 +1,17 @@ +### [CVE-2024-8155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8155) +![](https://img.shields.io/static/v1?label=Product&message=Admin&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%203.2.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in ContiNew Admin 3.2.0. Affected by this vulnerability is the function top.continew.starter.extension.crud.controller.BaseController#tree of the file /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/Chiexf/cve/issues/3 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8162.md b/2024/CVE-2024-8162.md new file mode 100644 index 0000000000..1e34a392f0 --- /dev/null +++ b/2024/CVE-2024-8162.md @@ -0,0 +1,17 @@ +### [CVE-2024-8162](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8162) +![](https://img.shields.io/static/v1?label=Product&message=T10%20AC1200&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%204.1.8cu.5207%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Hard-coded%20Credentials&color=brighgreen) + +### Description + +A vulnerability classified as critical has been found in TOTOLINK T10 AC1200 4.1.8cu.5207. Affected is an unknown function of the file /squashfs-root/web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to hard-coded credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/rohitburke/TOTOLINK + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8163.md b/2024/CVE-2024-8163.md new file mode 100644 index 0000000000..96b99b35fd --- /dev/null +++ b/2024/CVE-2024-8163.md @@ -0,0 +1,17 @@ +### [CVE-2024-8163](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8163) +![](https://img.shields.io/static/v1?label=Product&message=BeikeShop&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.5.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Path%20Traversal&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8164.md b/2024/CVE-2024-8164.md new file mode 100644 index 0000000000..2642e82bed --- /dev/null +++ b/2024/CVE-2024-8164.md @@ -0,0 +1,17 @@ +### [CVE-2024-8164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8164) +![](https://img.shields.io/static/v1?label=Product&message=BeikeShop&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.5.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, has been found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function rename of the file /Admin/Http/Controllers/FileManagerController.php. The manipulation of the argument new_name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8165.md b/2024/CVE-2024-8165.md new file mode 100644 index 0000000000..b192dcca3d --- /dev/null +++ b/2024/CVE-2024-8165.md @@ -0,0 +1,17 @@ +### [CVE-2024-8165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8165) +![](https://img.shields.io/static/v1?label=Product&message=BeikeShop&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.5.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Path%20Traversal&color=brighgreen) + +### Description + +A vulnerability, which was classified as problematic, was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. This affects the function exportZip of the file /admin/file_manager/export. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +- https://vuldb.com/?submit.393376 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8166.md b/2024/CVE-2024-8166.md new file mode 100644 index 0000000000..6ac3212136 --- /dev/null +++ b/2024/CVE-2024-8166.md @@ -0,0 +1,17 @@ +### [CVE-2024-8166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8166) +![](https://img.shields.io/static/v1?label=Product&message=EG2000K&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.1(6)B2%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload&color=brighgreen) + +### Description + +A vulnerability has been found in Ruijie EG2000K 11.1(6)B2 and classified as critical. This vulnerability affects unknown code of the file /tool/index.php?c=download&a=save. The manipulation of the argument content leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + +### POC + +#### Reference +No PoCs from references. + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8167.md b/2024/CVE-2024-8167.md new file mode 100644 index 0000000000..5865236f5f --- /dev/null +++ b/2024/CVE-2024-8167.md @@ -0,0 +1,17 @@ +### [CVE-2024-8167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8167) +![](https://img.shields.io/static/v1?label=Product&message=Job%20Portal&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/t4rrega/cve/issues/1 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8168.md b/2024/CVE-2024-8168.md new file mode 100644 index 0000000000..207eb69d6c --- /dev/null +++ b/2024/CVE-2024-8168.md @@ -0,0 +1,17 @@ +### [CVE-2024-8168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8168) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Bus%20Reservation%20Site&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/t4rrega/cve/issues/2 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8169.md b/2024/CVE-2024-8169.md new file mode 100644 index 0000000000..190fabff3f --- /dev/null +++ b/2024/CVE-2024-8169.md @@ -0,0 +1,17 @@ +### [CVE-2024-8169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8169) +![](https://img.shields.io/static/v1?label=Product&message=Online%20Quiz%20Site&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability was found in code-projects Online Quiz Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file signupuser.php. The manipulation of the argument lid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/t4rrega/cve/issues/5 + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8171.md b/2024/CVE-2024-8171.md new file mode 100644 index 0000000000..5baa96f4a0 --- /dev/null +++ b/2024/CVE-2024-8171.md @@ -0,0 +1,17 @@ +### [CVE-2024-8171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8171) +![](https://img.shields.io/static/v1?label=Product&message=Tailoring%20Management%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/t4rrega/cve/issues/6 + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8173.md b/2024/CVE-2024-8173.md new file mode 100644 index 0000000000..c05162ee6d --- /dev/null +++ b/2024/CVE-2024-8173.md @@ -0,0 +1,17 @@ +### [CVE-2024-8173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8173) +![](https://img.shields.io/static/v1?label=Product&message=Blood%20Bank%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) + +### Description + +A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file /login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/prankfulin/cve/blob/main/sql1.md + +#### Github +No PoCs found on GitHub currently. + diff --git a/2024/CVE-2024-8174.md b/2024/CVE-2024-8174.md new file mode 100644 index 0000000000..9ba728cae6 --- /dev/null +++ b/2024/CVE-2024-8174.md @@ -0,0 +1,17 @@ +### [CVE-2024-8174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8174) +![](https://img.shields.io/static/v1?label=Product&message=Blood%20Bank%20System&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) + +### Description + +A vulnerability has been found in code-projects Blood Bank System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login.php of the component Login Page. The manipulation of the argument user leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + +### POC + +#### Reference +- https://github.com/prankfulin/cve/blob/main/xss.md + +#### Github +- https://github.com/fkie-cad/nvd-json-data-feeds + diff --git a/2024/CVE-2024-8197.md b/2024/CVE-2024-8197.md new file mode 100644 index 0000000000..6625592206 --- /dev/null +++ b/2024/CVE-2024-8197.md @@ -0,0 +1,17 @@ +### [CVE-2024-8197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8197) +![](https://img.shields.io/static/v1?label=Product&message=Visual%20Sound&color=blue) +![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%201.03%20&color=brighgreen) +![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) + +### Description + +The Visual Sound plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.03. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. + +### POC + +#### Reference +- https://wpscan.com/vulnerability/88cacd47-d900-478c-b833-c6c55fd4b082/ + +#### Github +No PoCs found on GitHub currently. + diff --git a/github.txt b/github.txt index f75a6ff878..cbd78c2cf6 100644 --- a/github.txt +++ b/github.txt @@ -2119,6 +2119,7 @@ CVE-2007-2447 - https://github.com/cherrera0001/CVE-2007-2447 CVE-2007-2447 - https://github.com/crypticdante/CVE-2007-2447 CVE-2007-2447 - https://github.com/gwyomarch/Lame-HTB-Writeup-FR CVE-2007-2447 - https://github.com/hussien-almalki/Hack_lame +CVE-2007-2447 - https://github.com/jaydenxjayden/HTB-writeup CVE-2007-2447 - https://github.com/jwardsmith/Penetration-Testing CVE-2007-2447 - https://github.com/k4u5h41/CVE-2007-2447 CVE-2007-2447 - https://github.com/macosta-42/Exploit-Development @@ -7484,6 +7485,7 @@ CVE-2011-3389 - https://github.com/nikolay480/devops-netology CVE-2011-3389 - https://github.com/odolezal/D-Link-DIR-655 CVE-2011-3389 - https://github.com/orgTestCodacy11KRepos110MB/repo-3654-reg CVE-2011-3389 - https://github.com/pashicop/3.9_1 +CVE-2011-3389 - https://github.com/password123456/setup-apache-http-server-with-shorts-security-best-practice CVE-2011-3389 - https://github.com/stanmay77/security CVE-2011-3389 - https://github.com/swod00/litecoin_demo CVE-2011-3389 - https://github.com/tzaffi/testssl-report @@ -13217,6 +13219,7 @@ CVE-2014-3566 - https://github.com/neominds/ric13351 CVE-2014-3566 - https://github.com/nikolay480/devops-netology CVE-2014-3566 - https://github.com/odolezal/D-Link-DIR-655 CVE-2014-3566 - https://github.com/pashicop/3.9_1 +CVE-2014-3566 - https://github.com/password123456/setup-apache-http-server-with-shorts-security-best-practice CVE-2014-3566 - https://github.com/puppetlabs/puppetlabs-compliance_profile CVE-2014-3566 - https://github.com/r0metheus/poodle-attack CVE-2014-3566 - https://github.com/r0metheus/poodle-attack-poc @@ -58522,6 +58525,7 @@ CVE-2019-0708 - https://github.com/cgoncalves1/Infosec-Resources CVE-2019-0708 - https://github.com/chalern/Pentest-Tools CVE-2019-0708 - https://github.com/chandiradeshan12/CVE-Reports-and-TryHackMe-Room-Creation CVE-2019-0708 - https://github.com/ciakim/CVE-2019-0709 +CVE-2019-0708 - https://github.com/clcert/clcert-web CVE-2019-0708 - https://github.com/clcert/clcert.cl CVE-2019-0708 - https://github.com/closethe/CVE-2019-0708-POC CVE-2019-0708 - https://github.com/codereveryday/Programming-Hacking-Resources @@ -63159,6 +63163,7 @@ CVE-2019-11358 - https://github.com/Whiperface/16688---Power-Play CVE-2019-11358 - https://github.com/WhitmoreLakeRobotics/2020-GameChangers-Club CVE-2019-11358 - https://github.com/WhitmoreLakeRobotics/2022-Mecanum CVE-2019-11358 - https://github.com/WhitmoreLakeRobotics/2022-TSOC +CVE-2019-11358 - https://github.com/WhitmoreLakeRobotics/2023-FTC-CenterStage CVE-2019-11358 - https://github.com/Wilke000/FTC-arm_drive-2023 CVE-2019-11358 - https://github.com/WillRages/23-24_CenterStage6093 CVE-2019-11358 - https://github.com/William-McGonagle/Maincode-2021 @@ -64079,6 +64084,7 @@ CVE-2019-11358 - https://github.com/laawingnuts/LAAWingnuts CVE-2019-11358 - https://github.com/lakeridgeacademy/2022-power-play CVE-2019-11358 - https://github.com/lancelarsen/PhoenixForceFreightFrenzy CVE-2019-11358 - https://github.com/lancelarsen/PhoenixForceUltimateGoal +CVE-2019-11358 - https://github.com/lancelarsen/PhoenixForceUltimateGoal2 CVE-2019-11358 - https://github.com/largoftc/Firsttech CVE-2019-11358 - https://github.com/larrytao05/FtcRobotController CVE-2019-11358 - https://github.com/laupetre/FTC-2021 @@ -64809,6 +64815,7 @@ CVE-2019-11358 - https://github.com/z3db0y/FGC22 CVE-2019-11358 - https://github.com/zachwaffle4/InvictaCode-21-22 CVE-2019-11358 - https://github.com/zaheersufi/power-play-16911 CVE-2019-11358 - https://github.com/zandersmall/Robotics2020Code +CVE-2019-11358 - https://github.com/zedaes/PG-Odometry CVE-2019-11358 - https://github.com/zeitlerquintet/jquery-2.2.4-patched CVE-2019-11358 - https://github.com/zeitlersensetence/jquery-2.2.4-patched CVE-2019-11358 - https://github.com/zema1/oracle-vuln-crawler @@ -115744,6 +115751,7 @@ CVE-2021-42013 - https://github.com/corelight/CVE-2021-41773 CVE-2021-42013 - https://github.com/cyberanand1337x/bug-bounty-2022 CVE-2021-42013 - https://github.com/cybfar/cve-2021-42013-httpd CVE-2021-42013 - https://github.com/d4n-sec/d4n-sec.github.io +CVE-2021-42013 - https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap CVE-2021-42013 - https://github.com/dial25sd/arf-vulnerable-vm CVE-2021-42013 - https://github.com/e-hakson/OSCP CVE-2021-42013 - https://github.com/eljosep/OSCP-Guide @@ -143860,6 +143868,7 @@ CVE-2023-1596 - https://github.com/truocphan/VulnBox CVE-2023-1597 - https://github.com/truocphan/VulnBox CVE-2023-1598 - https://github.com/morpheuslord/CVE-llm_dataset CVE-2023-1604 - https://github.com/20142995/nuclei-templates +CVE-2023-1606 - https://github.com/N0boy-0/vulenv CVE-2023-1614 - https://github.com/ARPSyndicate/cvemon CVE-2023-1629 - https://github.com/ARPSyndicate/cvemon CVE-2023-1629 - https://github.com/zeze-zeze/WindowsKernelVuln @@ -144970,6 +144979,7 @@ CVE-2023-21931 - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sh CVE-2023-21931 - https://github.com/BrittanyKuhn/javascript-tutorial CVE-2023-21931 - https://github.com/CVEDB/awesome-cve-repo CVE-2023-21931 - https://github.com/CVEDB/top +CVE-2023-21931 - https://github.com/FeatherStark/GIOP-Protocol-Analysis CVE-2023-21931 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet CVE-2023-21931 - https://github.com/KimJun1010/WeblogicTool CVE-2023-21931 - https://github.com/MMarch7/weblogic_CVE-2023-21931_POC-EXP @@ -148122,6 +148132,7 @@ CVE-2023-29478 - https://github.com/ARPSyndicate/cvemon CVE-2023-29478 - https://github.com/Exopteron/BiblioRCE CVE-2023-29478 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-29483 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-29489 - https://github.com/0-d3y/CVE-2023-29489 CVE-2023-29489 - https://github.com/0-d3y/XSS_1915 CVE-2023-29489 - https://github.com/1337r0j4n/CVE-2023-29489 CVE-2023-29489 - https://github.com/Abdullah7-ma/CVE-2023-29489 @@ -148863,6 +148874,7 @@ CVE-2023-32233 - https://github.com/void0red/CVE-2023-32233 CVE-2023-32233 - https://github.com/xairy/linux-kernel-exploitation CVE-2023-32233 - https://github.com/xhref/OSCP CVE-2023-32233 - https://github.com/xyxj1024/xyxj1024.github.io +CVE-2023-32235 - https://github.com/AXRoux/Ghost-Path-Traversal-CVE-2023-32235- CVE-2023-32235 - https://github.com/VEEXH/Ghost-Path-Traversal-CVE-2023-32235- CVE-2023-32235 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-32236 - https://github.com/me2nuk/me2nuk @@ -151721,6 +151733,7 @@ CVE-2023-39325 - https://github.com/testing-felickz/docker-scout-demo CVE-2023-39326 - https://github.com/testing-felickz/docker-scout-demo CVE-2023-39336 - https://github.com/netlas-io/netlas-dorks CVE-2023-39341 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2023-39344 - https://github.com/N0boy-0/vulenv CVE-2023-39344 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-39351 - https://github.com/DiRaltvein/memory-corruption-examples CVE-2023-39357 - https://github.com/NaInSec/CVE-LIST @@ -153871,6 +153884,7 @@ CVE-2023-45386 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4539 - https://github.com/defragmentator/mitmsqlproxy CVE-2023-4540 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2023-4542 - https://github.com/20142995/sectool +CVE-2023-4542 - https://github.com/PumpkinBridge/CVE-2023-4542 CVE-2023-4542 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2023-4542 - https://github.com/tanjiti/sec_profile CVE-2023-4542 - https://github.com/wjlin0/poc-doc @@ -162756,6 +162770,7 @@ CVE-2024-1561 - https://github.com/DiabloHTB/Nuclei-Template-CVE-2024-1561 CVE-2024-1561 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-1561 - https://github.com/k3ppf0r/2024-PocLib CVE-2024-1561 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-1561 - https://github.com/nvn1729/advisories CVE-2024-1561 - https://github.com/tanjiti/sec_profile CVE-2024-1561 - https://github.com/wjlin0/poc-doc CVE-2024-1561 - https://github.com/wy876/POC @@ -163674,9 +163689,11 @@ CVE-2024-21438 - https://github.com/NaInSec/CVE-LIST CVE-2024-21439 - https://github.com/NaInSec/CVE-LIST CVE-2024-21440 - https://github.com/NaInSec/CVE-LIST CVE-2024-21441 - https://github.com/NaInSec/CVE-LIST +CVE-2024-21442 - https://github.com/5angjun/5angjun CVE-2024-21442 - https://github.com/NaInSec/CVE-LIST CVE-2024-21443 - https://github.com/NaInSec/CVE-LIST CVE-2024-21444 - https://github.com/NaInSec/CVE-LIST +CVE-2024-21445 - https://github.com/5angjun/5angjun CVE-2024-21445 - https://github.com/NaInSec/CVE-LIST CVE-2024-21446 - https://github.com/NaInSec/CVE-LIST CVE-2024-21447 - https://github.com/Wh04m1001/UserManagerEoP @@ -166010,6 +166027,7 @@ CVE-2024-25638 - https://github.com/phax/peppol-commons CVE-2024-25638 - https://github.com/phax/ph-web CVE-2024-2564 - https://github.com/NaInSec/CVE-LIST CVE-2024-2564 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-25641 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-25641 - https://github.com/tanjiti/sec_profile CVE-2024-25642 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-25643 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -169217,6 +169235,7 @@ CVE-2024-31976 - https://github.com/actuator/cve CVE-2024-31977 - https://github.com/actuator/cve CVE-2024-31982 - https://github.com/Ostorlab/KEV CVE-2024-31982 - https://github.com/bigb0x/CVE-2024-31982 +CVE-2024-31982 - https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap CVE-2024-31982 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-31982 - https://github.com/tanjiti/sec_profile CVE-2024-31989 - https://github.com/nomi-sec/PoC-in-GitHub @@ -169976,6 +169995,7 @@ CVE-2024-34487 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34488 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34489 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34490 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-34510 - https://github.com/nvn1729/advisories CVE-2024-34523 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-34523 - https://github.com/piuppi/Proof-of-Concepts CVE-2024-34538 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -170075,6 +170095,7 @@ CVE-2024-3515 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-3516 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35176 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35176 - https://github.com/lifeparticle/Ruby-Cheatsheet +CVE-2024-35178 - https://github.com/nvn1729/advisories CVE-2024-35179 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35181 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-35182 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -170491,6 +170512,7 @@ CVE-2024-38041 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3806 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-3806 - https://github.com/tanjiti/sec_profile CVE-2024-3806 - https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc +CVE-2024-38063 - https://github.com/0xMarcio/cve CVE-2024-38063 - https://github.com/being1943/my_rss_reader CVE-2024-38063 - https://github.com/kherrick/hacker-news CVE-2024-38063 - https://github.com/nomi-sec/PoC-in-GitHub @@ -171065,6 +171087,10 @@ CVE-2024-41150 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4116 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-41164 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4117 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-41173 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41174 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41175 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-41176 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4118 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4119 - https://github.com/LaPhilosophie/IoT-vulnerable CVE-2024-4120 - https://github.com/LaPhilosophie/IoT-vulnerable @@ -171296,6 +171322,7 @@ CVE-2024-42464 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42465 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42466 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4247 - https://github.com/LaPhilosophie/IoT-vulnerable +CVE-2024-42474 - https://github.com/nvn1729/advisories CVE-2024-42477 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42478 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42479 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171334,6 +171361,7 @@ CVE-2024-42786 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42787 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42789 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-42834 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-42845 - https://github.com/alessio-romano/Sfoffo-Pentesting-Notes CVE-2024-42845 - https://github.com/alessio-romano/alessio-romano CVE-2024-42845 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-42849 - https://github.com/nomi-sec/PoC-in-GitHub @@ -171616,6 +171644,7 @@ CVE-2024-43381 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-43398 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-43398 - https://github.com/lifeparticle/Ruby-Cheatsheet CVE-2024-4340 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-43425 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-43442 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-43443 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-43444 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -171690,6 +171719,7 @@ CVE-2024-44083 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4418 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4433 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4439 - https://github.com/MielPopsssssss/CVE-2024-4439 +CVE-2024-4439 - https://github.com/N0boy-0/vulenv CVE-2024-4439 - https://github.com/Ostorlab/KEV CVE-2024-4439 - https://github.com/d0rb/CVE-2024-4439 CVE-2024-4439 - https://github.com/nomi-sec/PoC-in-GitHub @@ -171743,6 +171773,7 @@ CVE-2024-4524 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-45240 - https://github.com/Ch0pin/related_work CVE-2024-45241 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-45242 - https://github.com/actuator/cve +CVE-2024-45244 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-4525 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-45258 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-4526 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -172254,9 +172285,12 @@ CVE-2024-6342 - https://github.com/yikesoftware/yikesoftware CVE-2024-6343 - https://github.com/yikesoftware/yikesoftware CVE-2024-6347 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6366 - https://github.com/nomi-sec/PoC-in-GitHub +CVE-2024-6377 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6379 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6384 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6385 - https://github.com/Ostorlab/KEV CVE-2024-6386 - https://github.com/20142995/nuclei-templates +CVE-2024-6386 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6387 - https://github.com/0xMarcio/cve CVE-2024-6387 - https://github.com/CVEDB/awesome-cve-repo CVE-2024-6387 - https://github.com/David-M-Berry/openssh-cve-discovery @@ -172284,6 +172318,7 @@ CVE-2024-6387 - https://github.com/maycon/stars CVE-2024-6387 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-6387 - https://github.com/rxerium/stars CVE-2024-6387 - https://github.com/ryanalieh/openSSH-scanner +CVE-2024-6387 - https://github.com/rylei-m/USU_2024_PS1_Script_For_SSH CVE-2024-6387 - https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH CVE-2024-6387 - https://github.com/sardine-web/CVE-2024-6387_Check CVE-2024-6387 - https://github.com/tanjiti/sec_profile @@ -172334,6 +172369,8 @@ CVE-2024-6589 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6617 - https://github.com/20142995/nuclei-templates CVE-2024-6629 - https://github.com/20142995/nuclei-templates CVE-2024-6631 - https://github.com/20142995/nuclei-templates +CVE-2024-6632 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6633 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6639 - https://github.com/20142995/nuclei-templates CVE-2024-6639 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6646 - https://github.com/wy876/POC @@ -172386,10 +172423,13 @@ CVE-2024-6798 - https://github.com/20142995/nuclei-templates CVE-2024-6800 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6802 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6807 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6813 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6814 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6823 - https://github.com/20142995/nuclei-templates CVE-2024-6823 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6824 - https://github.com/20142995/nuclei-templates CVE-2024-6836 - https://github.com/20142995/nuclei-templates +CVE-2024-6842 - https://github.com/20142995/nuclei-templates CVE-2024-6852 - https://github.com/20142995/nuclei-templates CVE-2024-6853 - https://github.com/20142995/nuclei-templates CVE-2024-6855 - https://github.com/20142995/nuclei-templates @@ -172429,7 +172469,11 @@ CVE-2024-6968 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6969 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6970 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6972 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6973 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6974 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6975 - https://github.com/chnzzh/OpenSSL-CVE-lib +CVE-2024-6975 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-6977 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-6987 - https://github.com/20142995/nuclei-templates CVE-2024-6990 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7007 - https://github.com/ericyoc/prob_vuln_assess_space_iot_sys_poc @@ -172441,9 +172485,11 @@ CVE-2024-7047 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7054 - https://github.com/20142995/nuclei-templates CVE-2024-7057 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7060 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7062 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7063 - https://github.com/20142995/nuclei-templates CVE-2024-7064 - https://github.com/20142995/nuclei-templates CVE-2024-7066 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7071 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7080 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7081 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7082 - https://github.com/20142995/nuclei-templates @@ -172646,6 +172692,7 @@ CVE-2024-7590 - https://github.com/20142995/nuclei-templates CVE-2024-7590 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7592 - https://github.com/ch4n3-yoon/ch4n3-yoon CVE-2024-7593 - https://github.com/20142995/nuclei-templates +CVE-2024-7608 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7610 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7621 - https://github.com/20142995/nuclei-templates CVE-2024-7624 - https://github.com/20142995/nuclei-templates @@ -172711,8 +172758,12 @@ CVE-2024-7906 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7928 - https://github.com/20142995/nuclei-templates CVE-2024-7928 - https://github.com/nomi-sec/PoC-in-GitHub CVE-2024-7928 - https://github.com/tanjiti/sec_profile +CVE-2024-7940 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7941 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7964 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7965 - https://github.com/0xAtef/0xAtef CVE-2024-7965 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-7965 - https://github.com/frlc/frlc CVE-2024-7966 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7967 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-7968 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -172737,12 +172788,24 @@ CVE-2024-8011 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8033 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8034 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8035 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8046 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8071 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8072 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8112 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8113 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8120 - https://github.com/20142995/nuclei-templates +CVE-2024-8127 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8128 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8129 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8130 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8131 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8132 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8133 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8134 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8135 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8136 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8137 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8138 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8146 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8147 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8161 - https://github.com/fkie-cad/nvd-json-data-feeds @@ -172754,6 +172817,9 @@ CVE-2024-8166 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8167 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8168 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-8169 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8174 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8181 - https://github.com/fkie-cad/nvd-json-data-feeds +CVE-2024-8182 - https://github.com/fkie-cad/nvd-json-data-feeds CVE-2024-87654 - https://github.com/runwuf/clickhouse-test CVE-2024-98765 - https://github.com/runwuf/clickhouse-test CVE-2024-99999 - https://github.com/kolewttd/wtt diff --git a/references.txt b/references.txt index c3af0496c3..709e0eccf2 100644 --- a/references.txt +++ b/references.txt @@ -56623,9 +56623,15 @@ CVE-2019-10893 - http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0. CVE-2019-10893 - https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt CVE-2019-10893 - https://www.exploit-db.com/exploits/46669 CVE-2019-10893 - https://www.exploit-db.com/exploits/46669/ +CVE-2019-10894 - https://usn.ubuntu.com/3986-1/ +CVE-2019-10895 - https://usn.ubuntu.com/3986-1/ +CVE-2019-10896 - https://usn.ubuntu.com/3986-1/ CVE-2019-10898 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585 +CVE-2019-10899 - https://usn.ubuntu.com/3986-1/ CVE-2019-10900 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612 +CVE-2019-10901 - https://usn.ubuntu.com/3986-1/ CVE-2019-10903 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 +CVE-2019-10903 - https://usn.ubuntu.com/3986-1/ CVE-2019-10906 - https://usn.ubuntu.com/4011-1/ CVE-2019-10909 - https://www.drupal.org/sa-core-2019-005 CVE-2019-10919 - http://packetstormsecurity.com/files/153123/Siemens-LOGO-8-Missing-Authentication.html @@ -63017,14 +63023,17 @@ CVE-2019-9206 - https://packetstormsecurity.com/files/151925/PRTG-Network-Monito CVE-2019-9206 - https://seclists.org/fulldisclosure/2019/Mar/3 CVE-2019-9207 - https://packetstormsecurity.com/files/151925/PRTG-Network-Monitor-7.1.3.3378-Cross-Site-Scripting.html CVE-2019-9207 - https://seclists.org/fulldisclosure/2019/Mar/3 +CVE-2019-9208 - https://usn.ubuntu.com/3986-1/ CVE-2019-9208 - https://www.oracle.com/security-alerts/cpujan2020.html CVE-2019-9209 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447 +CVE-2019-9209 - https://usn.ubuntu.com/3986-1/ CVE-2019-9210 - https://sourceforge.net/p/advancemame/bugs/277/ CVE-2019-9211 - https://bugzilla.redhat.com/show_bug.cgi?id=1683499 CVE-2019-9212 - https://github.com/alipay/sofa-hessian/issues/34 CVE-2019-9213 - http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html CVE-2019-9213 - https://usn.ubuntu.com/3932-1/ CVE-2019-9213 - https://www.exploit-db.com/exploits/46502/ +CVE-2019-9214 - https://usn.ubuntu.com/3986-1/ CVE-2019-9220 - https://gitlab.com/gitlab-org/gitlab-ce/issues/55653 CVE-2019-9226 - https://github.com/baigoStudio/baigoCMS/issues/7 CVE-2019-9227 - https://github.com/baigoStudio/baigoCMS/issues/8 @@ -94357,6 +94366,7 @@ CVE-2023-45396 - https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20 CVE-2023-4542 - https://github.com/PumpkinBridge/cve/blob/main/rce.md CVE-2023-4543 - https://github.com/spcck/cve/blob/main/sql.md CVE-2023-4544 - https://vuldb.com/?id.238049 +CVE-2023-4545 - https://github.com/siyu15/cve/blob/main/sql.md CVE-2023-45463 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md CVE-2023-45464 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md CVE-2023-45465 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md @@ -97891,6 +97901,7 @@ CVE-2024-28345 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-2834 CVE-2024-2836 - https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/ CVE-2024-2837 - https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/ CVE-2024-28383 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md +CVE-2024-28397 - https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape CVE-2024-28417 - https://gitee.com/shavchen214/pwn/issues/I94VFH CVE-2024-28421 - https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9 CVE-2024-28421 - https://github.com/cobub/razor/issues/178 @@ -98667,6 +98678,7 @@ CVE-2024-3407 - https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b CVE-2024-34070 - https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53 CVE-2024-34075 - https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr CVE-2024-34082 - https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69 +CVE-2024-34087 - https://themodernham.com/bbs-hacking-discovering-rce-within-bpq32-seh-based-buffer-overflow/ CVE-2024-3410 - https://wpscan.com/vulnerability/e2067637-45f3-4b42-96ca-85867c4c0409/ CVE-2024-34102 - https://www.vicarius.io/vsociety/posts/cosmicsting-critical-unauthenticated-xxe-vulnerability-in-adobe-commerce-and-magento-cve-2024-34102 CVE-2024-3414 - https://vuldb.com/?id.259583 @@ -99284,6 +99296,7 @@ CVE-2024-3909 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC CVE-2024-3909 - https://vuldb.com/?id.261145 CVE-2024-39090 - https://github.com/arijitdirghanji/My-CVEs/blob/main/CVE-2024-39090.md CVE-2024-39091 - https://joerngermany.github.io/mipc_vulnerability/ +CVE-2024-39097 - https://github.com/gnuboard/g6/issues/582 CVE-2024-3910 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md CVE-2024-3910 - https://vuldb.com/?id.261146 CVE-2024-39119 - https://github.com/2477231995/cms/blob/main/1.md @@ -99716,7 +99729,10 @@ CVE-2024-41957 - https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-h CVE-2024-41965 - https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f CVE-2024-41996 - https://dheatattack.gitlab.io/details/ CVE-2024-41996 - https://dheatattack.gitlab.io/faq/ +CVE-2024-42008 - https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ +CVE-2024-42009 - https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ CVE-2024-4201 - https://gitlab.com/gitlab-org/gitlab/-/issues/458229 +CVE-2024-42010 - https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ CVE-2024-42029 - https://github.com/hyprwm/xdg-desktop-portal-hyprland/issues/242 CVE-2024-42054 - https://github.com/CervantesSec/cervantes/commit/78631a034d0fb3323a53fb7428b2022b29a0d2cd CVE-2024-42055 - https://github.com/CervantesSec/cervantes/commit/78631a034d0fb3323a53fb7428b2022b29a0d2cd @@ -99764,8 +99780,38 @@ CVE-2024-42543 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLIN CVE-2024-42545 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWizardCfg.md CVE-2024-42546 - https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3100R/loginauth_password.md CVE-2024-42547 - https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3100R/loginauth.md +CVE-2024-42554 - https://gist.github.com/topsky979/7d2ebfe6dfa87eecf8f3e6d4eefc48ba +CVE-2024-42555 - https://gist.github.com/topsky979/afd445b90e13a27a6422cea2f5ff0f64 +CVE-2024-42556 - https://gist.github.com/topsky979/9688bcdd3e05ba79ebf4ff1042609b20 +CVE-2024-42557 - https://gist.github.com/topsky979/0785597ae7abc8f10cd5c5537f5467b5 +CVE-2024-42560 - https://gist.github.com/topsky979/4c05ee72ab4b365ef81c199aaa0558d0 +CVE-2024-42562 - https://gist.github.com/topsky979/2dcca275bcc18e8058cefef714a2f61b +CVE-2024-42567 - https://gist.github.com/topsky979/96ba3f6ccd333480aa86e7078c4886d7 +CVE-2024-42568 - https://gist.github.com/topsky979/38a30275374ef796ab860795f5df4dac +CVE-2024-42569 - https://gist.github.com/topsky979/20a81dbf47d371e1dabe08f350c8185d CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md +CVE-2024-42571 - https://gist.github.com/topsky979/5c8e289fa66702fd3acbed558ee449dd +CVE-2024-42574 - https://gist.github.com/topsky979/7064f8bbd3977ee665a098efcd0170c0 +CVE-2024-42575 - https://gist.github.com/topsky979/2fddc00b33b038cd778c1e4fb1936a15 +CVE-2024-42576 - https://gist.github.com/topsky979/50a1d8ad7effd9ccd089952602c831d3 +CVE-2024-42578 - https://gist.github.com/topsky979/5eacc7e418e3b73b7ad1fa05d1a72aeb +CVE-2024-42579 - https://gist.github.com/topsky979/ed59fb8b35a220dfa064a3a3cb1ecb1b +CVE-2024-42580 - https://gist.github.com/topsky979/8a05309486637d8c6ce8c6624ec1e897 +CVE-2024-42581 - https://gist.github.com/topsky979/2bd26343ccdff7c759f62d332c8caff6 +CVE-2024-42582 - https://gist.github.com/topsky979/c0d78b257ce1e661be30de1ce9551d27 +CVE-2024-42583 - https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc +CVE-2024-42585 - https://gist.github.com/topsky979/33de7a4bd7a4517a26fa4e4911b7fb1d CVE-2024-4260 - https://wpscan.com/vulnerability/69f33e20-8ff4-491c-8f37-a4eadd4ea8cf/ +CVE-2024-42604 - https://github.com/jinwu1234567890/cms2/tree/main/1/readme.md +CVE-2024-42605 - https://github.com/jinwu1234567890/cms2/tree/main/3/readme.md +CVE-2024-42607 - https://github.com/jinwu1234567890/cms2/tree/main/9/readme.md +CVE-2024-42609 - https://github.com/jinwu1234567890/cms2/tree/main/8/readme.md +CVE-2024-42611 - https://github.com/jinwu1234567890/cms2/tree/main/4/readme.md +CVE-2024-42613 - https://github.com/jinwu1234567890/cms2/tree/main/14/readme.md +CVE-2024-42616 - https://github.com/jinwu1234567890/cms2/tree/main/13/readme.md +CVE-2024-42617 - https://github.com/jinwu1234567890/cms2/tree/main/11/readme.md +CVE-2024-42619 - https://github.com/jinwu1234567890/cms2/tree/main/17/readme.md +CVE-2024-42621 - https://github.com/jinwu1234567890/cms2/tree/main/12/readme.md CVE-2024-42623 - https://github.com/Kirtoc/cms/tree/main/8/readme.md CVE-2024-42624 - https://github.com/Kirtoc/cms/tree/main/3/readme.md CVE-2024-42625 - https://github.com/Kirtoc/cms/tree/main/9/readme.md @@ -99776,6 +99822,7 @@ CVE-2024-42629 - https://github.com/Kirtoc/cms/tree/main/2/readme.md CVE-2024-42630 - https://github.com/Kirtoc/cms/tree/main/10/readme.md CVE-2024-42631 - https://github.com/Kirtoc/cms/tree/main/7/readme.md CVE-2024-42632 - https://github.com/Kirtoc/cms/tree/main/1/readme.md +CVE-2024-42636 - https://github.com/iami233/cve/issues/1 CVE-2024-4268 - https://www.dropbox.com/scl/fi/zh7t1qsvxkxk2dfhwd7nn/Ultimate-Blocks-Stored-XSS_POC_4.20.24.mov?rlkey=ws16dcu7f6mjd3h9emsqev7jm&e=2&st=fdr7q9h7&dl=0 CVE-2024-4269 - https://wpscan.com/vulnerability/8aae7aa1-6170-45d8-903f-8520913276da/ CVE-2024-4270 - https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/ @@ -99793,10 +99840,13 @@ CVE-2024-42744 - https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/ CVE-2024-42745 - https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setUPnPCfg/setUPnPCfg.md CVE-2024-42747 - https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setWanIeCfg/setWanIeCfg.md CVE-2024-42748 - https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setWiFiWpsCfg/setWiFiWpsCfg.md +CVE-2024-42815 - https://gist.github.com/XiaoCurry/14d46e0becd79d9bb9907f2fbe147cfe CVE-2024-42843 - https://github.com/ganzhi-qcy/cve/issues/6 CVE-2024-42849 - https://github.com/njmbb8/CVE-2024-42849/tree/main +CVE-2024-42852 - https://github.com/Hebing123/cve/issues/64 CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/ CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ +CVE-2024-42906 - https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-42906.md CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md CVE-2024-42918 - https://packetstormsecurity.com CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md @@ -99837,24 +99887,35 @@ CVE-2024-42986 - https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda CVE-2024-42987 - https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromPptpUserAdd.md CVE-2024-42994 - https://www.shielder.com/advisories/vtiger-mailmanager-sqli/ CVE-2024-42995 - https://www.shielder.com/advisories/vtiger-migration-bac/ +CVE-2024-43022 - https://gist.github.com/b0rgch3n/6ba0b04da7e48ead20f10b15088fd244 CVE-2024-4305 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/ CVE-2024-43167 - https://github.com/NLnetLabs/unbound/issues/1072 CVE-2024-43168 - https://github.com/NLnetLabs/unbound/issues/1039 CVE-2024-43360 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-9cmr-7437-v9fj CVE-2024-43373 - https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w CVE-2024-43374 - https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw +CVE-2024-43380 - https://github.com/floraison/fugit/issues/104 CVE-2024-43381 - https://github.com/yogeshojha/rengine/security/advisories/GHSA-96q4-fj2m-jqf7 CVE-2024-43396 - https://github.com/khoj-ai/khoj/security/advisories/GHSA-cf72-vg59-4j4h +CVE-2024-43399 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/ CVE-2024-43401 - https://jira.xwiki.org/browse/XWIKI-20331 CVE-2024-43403 - https://github.com/kanisterio/kanister/security/advisories/GHSA-h27c-6xm3-mcqp +CVE-2024-43406 - https://github.com/lf-edge/ekuiper/security/advisories/GHSA-r5ph-4jxm-6j9p +CVE-2024-43410 - https://github.com/Eugeny/russh/security/advisories/GHSA-vgvv-x7xg-6cqg CVE-2024-4348 - https://vuldb.com/?submit.320855 CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19 CVE-2024-43688 - https://www.supernetworks.org/CVE-2024-43688/openbsd-cron-heap-underflow.txt CVE-2024-43688 - https://www.supernetworks.org/advisories/CVE-2024-43688-openbsd-cron-heap-underflow.txt CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/ CVE-2024-4377 - https://wpscan.com/vulnerability/778cebec-bdbb-4538-9518-c5bd50f76961/ +CVE-2024-43785 - https://github.com/Byron/gitoxide/security/advisories/GHSA-88g2-r9rw-g55h +CVE-2024-43787 - https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5 +CVE-2024-43790 - https://github.com/vim/vim/security/advisories/GHSA-v2x2-cjcg-f9jm +CVE-2024-43798 - https://github.com/jpillora/chisel/security/advisories/GHSA-38jh-8h67-m7mj +CVE-2024-43802 - https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh +CVE-2024-43806 - https://github.com/bytecodealliance/rustix/security/advisories/GHSA-c827-hfw6-qwvm CVE-2024-4381 - https://wpscan.com/vulnerability/9b3cda9a-17a7-4173-93a2-d552a874fae9/ CVE-2024-4382 - https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/ CVE-2024-4384 - https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9e0d26/ @@ -99862,10 +99923,18 @@ CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5 CVE-2024-4395 - https://khronokernel.com/macos/2024/05/01/CVE-2024-4395.html CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/ CVE-2024-44067 - https://ghostwriteattack.com +CVE-2024-44083 - https://github.com/Azvanzed/IdaMeme +CVE-2024-44381 - https://github.com/GroundCTL2MajorTom/pocs/blob/main/dlink_DI8004W.md +CVE-2024-44382 - https://github.com/GroundCTL2MajorTom/pocs/blob/main/dlink_DI8004W.md CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/ CVE-2024-4474 - https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/ CVE-2024-4475 - https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/ CVE-2024-4477 - https://wpscan.com/vulnerability/ab551552-944c-4e2a-9355-7011cbe553b0/ +CVE-2024-44793 - https://github.com/WhatCD/Gazelle/issues/131 +CVE-2024-44794 - https://github.com/xiebruce/PicUploader/issues/91 +CVE-2024-44795 - https://github.com/WhatCD/Gazelle/issues/129 +CVE-2024-44796 - https://github.com/xiebruce/PicUploader/issues/90 +CVE-2024-44797 - https://github.com/WhatCD/Gazelle/issues/130 CVE-2024-4480 - https://wpscan.com/vulnerability/c1e5dee9-c540-4cc1-8b94-c6d1650b52d3/ CVE-2024-4483 - https://wpscan.com/vulnerability/8f2ac76c-f3f8-41f9-a32a-f414825cf6f1/ CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md @@ -99891,6 +99960,8 @@ CVE-2024-45188 - https://research.jfrog.com/vulnerabilities/mage-ai-file-content CVE-2024-45189 - https://research.jfrog.com/vulnerabilities/mage-ai-git-content-request-remote-arbitrary-file-leak-jfsa-2024-001039604/ CVE-2024-45190 - https://research.jfrog.com/vulnerabilities/mage-ai-pipeline-interaction-request-remote-arbitrary-file-leak-jfsa-2024-001039605/ CVE-2024-45256 - https://blog.chebuya.com/posts/unauthenticated-remote-command-execution-on-byob/ +CVE-2024-45256 - https://github.com/chebuya/exploits/tree/main/BYOB-RCE +CVE-2024-45258 - https://github.com/imroc/req/commit/04e3ece5b380ecad9da3551c449f1b8a9aa76d3d CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md CVE-2024-4529 - https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/ CVE-2024-4530 - https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/ @@ -100426,6 +100497,7 @@ CVE-2024-6949 - https://github.com/DeepMountains/Mirage/blob/main/CVE4-2.md CVE-2024-6952 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-1.md CVE-2024-6953 - https://github.com/333-uit/CVE/issues/1 CVE-2024-6956 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-2.md +CVE-2024-6956 - https://vuldb.com/?submit.377754 CVE-2024-6957 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-3.md CVE-2024-6958 - https://github.com/DeepMountains/Mirage/blob/main/CVE6-4.md CVE-2024-6960 - https://research.jfrog.com/vulnerabilities/h2o-model-deserialization-rce-jfsa-2024-001035518/ @@ -100520,6 +100592,7 @@ CVE-2024-7272 - https://ffmpeg.org/ CVE-2024-7272 - https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc5 CVE-2024-7272 - https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc6 CVE-2024-7273 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-1.md +CVE-2024-7273 - https://vuldb.com/?submit.381089 CVE-2024-7274 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-2.md CVE-2024-7274 - https://vuldb.com/?submit.381091 CVE-2024-7275 - https://github.com/DeepMountains/Mirage/blob/main/CVE8-3.md @@ -100621,6 +100694,7 @@ CVE-2024-7497 - https://github.com/DeepMountains/zzz/blob/main/CVE1-2.md CVE-2024-7498 - https://github.com/DeepMountains/zzz/blob/main/CVE1-3.md CVE-2024-7498 - https://vuldb.com/?submit.385894 CVE-2024-7499 - https://github.com/DeepMountains/zzz/blob/main/CVE1-4.md +CVE-2024-7499 - https://vuldb.com/?submit.385895 CVE-2024-7500 - https://github.com/DeepMountains/zzz/blob/main/CVE1-5.md CVE-2024-7505 - https://github.com/CveSecLook/cve/issues/56 CVE-2024-7506 - https://github.com/CveSecLook/cve/issues/57 @@ -100663,6 +100737,7 @@ CVE-2024-7707 - https://github.com/VodkaVortex/IoT/blob/main/formSafeEmailFilter CVE-2024-7715 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_photo_search.md CVE-2024-7738 - https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/file_read_report.md CVE-2024-7738 - https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/poc_arbitrary_file_read.mp4 +CVE-2024-7738 - https://vuldb.com/?submit.385634 CVE-2024-7739 - https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Script%20Injection/poc_script_inject.mp4 CVE-2024-7739 - https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Script%20Injection/script_injection_report.md CVE-2024-7740 - https://github.com/DeepMountains/Mirage/blob/main/CVE14-1.md @@ -100704,6 +100779,7 @@ CVE-2024-7845 - https://github.com/Wsstiger/cve/blob/main/Tracer_sql2.md CVE-2024-7849 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_create_album.md CVE-2024-7851 - https://github.com/Wsstiger/cve/blob/main/Yoga_add.md CVE-2024-7852 - https://github.com/Wsstiger/cve/blob/main/Yoga_xss.md +CVE-2024-7853 - https://github.com/Wsstiger/cve/blob/main/Yoga_sql.md CVE-2024-7868 - https://www.xpdfreader.com/security-bug/CVE-2024-7868.html CVE-2024-7887 - https://github.com/Hebing123/cve/issues/67 CVE-2024-7896 - https://gist.github.com/b0rgch3n/4788c7c429d49095915d84161a157295 @@ -100726,10 +100802,40 @@ CVE-2024-7934 - https://github.com/DeepMountains/zzz/blob/main/CVE3-2.md CVE-2024-7935 - https://github.com/DeepMountains/zzz/blob/main/CVE3-3.md CVE-2024-7936 - https://github.com/DeepMountains/zzz/blob/main/CVE3-4.md CVE-2024-7937 - https://github.com/DeepMountains/zzz/blob/main/CVE3-5.md +CVE-2024-7937 - https://vuldb.com/?submit.392949 CVE-2024-7943 - https://github.com/DeepMountains/zzz/blob/main/CVE2-1.md CVE-2024-7945 - https://github.com/DeepMountains/zzz/blob/main/CVE2-3.md CVE-2024-7946 - https://github.com/a1175165157/cve/issues/1 CVE-2024-7947 - https://github.com/CveSecLook/cve/issues/60 CVE-2024-7954 - https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/ +CVE-2024-8003 - https://github.com/Go-Tribe/gotribe-admin/issues/1 +CVE-2024-8003 - https://github.com/Go-Tribe/gotribe-admin/issues/1#issuecomment-2298187923 CVE-2024-8003 - https://vuldb.com/?submit.393987 CVE-2024-8072 - https://research.jfrog.com/vulnerabilities/mage-ai-terminal-server-infoleak-jfsa-2024-001039574/ +CVE-2024-8080 - https://github.com/shang159/sqli-vul/blob/main/sql2.md +CVE-2024-8081 - https://github.com/ppp-src/ha/issues/6 +CVE-2024-8083 - https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Sqli.md +CVE-2024-8084 - https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Stored%20Cross-Site%20Scripting(XSS).md +CVE-2024-8087 - https://github.com/0xffaaa/cve/blob/main/ecommerce-Unauthorized%20sql%20union%20injection.md +CVE-2024-8089 - https://github.com/0xffaaa/cve/blob/main/ecommerce-Unauthorized%20arbitrary%20file%20upload%20vulnerability.md +CVE-2024-8105 - https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf +CVE-2024-8127 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_unzip.md +CVE-2024-8128 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_add_zip.md +CVE-2024-8129 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3_modify.md +CVE-2024-8130 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3.md +CVE-2024-8131 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_module_enable_disable.md +CVE-2024-8133 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R5_SpareDsk_DiskMGR.md +CVE-2024-8134 - https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_1st_DiskMGR.md +CVE-2024-8139 - https://github.com/ppp-src/ha/issues/7 +CVE-2024-8155 - https://github.com/Chiexf/cve/issues/3 +CVE-2024-8162 - https://github.com/rohitburke/TOTOLINK +CVE-2024-8163 - https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md +CVE-2024-8164 - https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md +CVE-2024-8165 - https://vuldb.com/?submit.393376 +CVE-2024-8167 - https://github.com/t4rrega/cve/issues/1 +CVE-2024-8168 - https://github.com/t4rrega/cve/issues/2 +CVE-2024-8169 - https://github.com/t4rrega/cve/issues/5 +CVE-2024-8171 - https://github.com/t4rrega/cve/issues/6 +CVE-2024-8173 - https://github.com/prankfulin/cve/blob/main/sql1.md +CVE-2024-8174 - https://github.com/prankfulin/cve/blob/main/xss.md +CVE-2024-8197 - https://wpscan.com/vulnerability/88cacd47-d900-478c-b833-c6c55fd4b082/