mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-12-11T00:55:46.185644+00:00
This commit is contained in:
parent
9b15234bdf
commit
2392b725c7
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11651",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T03:15:07.973",
|
||||
"lastModified": "2024-11-25T03:15:07.973",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:12:34.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,132 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/XIepwv7goiCcYxk5QAgc8Q2LnMc?from=from_copylink",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285972",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285972",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446623",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11652",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T03:15:08.533",
|
||||
"lastModified": "2024-11-25T03:15:08.533",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:13:23.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/Rf7wwXMpQiJkp8kp4pmcZb2tnPe",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285973",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285973",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446629",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11653",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T04:15:05.337",
|
||||
"lastModified": "2024-11-25T04:15:05.337",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:13:40.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/AHPnwdCaoiaQ3fkrdeUcqPfLnEd",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285974",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285974",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446633",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11654",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T04:15:05.577",
|
||||
"lastModified": "2024-11-25T04:15:05.577",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:13:58.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/YrKfwHqLjijPeYkMTQfcdhrBnyg?from=from_copylink",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446637",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11655",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T05:15:09.447",
|
||||
"lastModified": "2024-11-25T05:15:09.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:14:37.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6c",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285976",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285976",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446638",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11656",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T05:15:10.387",
|
||||
"lastModified": "2024-11-25T05:15:10.387",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:14:44.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/FBJCwjFPZiY4aakElh6cwF25nff",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285977",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285977",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446639",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11657",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T06:15:06.073",
|
||||
"lastModified": "2024-11-25T06:15:06.073",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:14:54.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/RURswTkepiuKCzkGMd2cA1M2nNc",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285978",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285978",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446640",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11658",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T06:15:06.593",
|
||||
"lastModified": "2024-11-25T06:15:06.593",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:15:02.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/VyKHwBhydiyeuDkATo9cFZTDnHb",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285979",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285979",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446641",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11659",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-25T07:15:04.837",
|
||||
"lastModified": "2024-11-25T07:15:04.837",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:15:14.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,133 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k9u7kv33ub.feishu.cn/wiki/OhR6w0THjiFeV1kSfZncaCxTn7f?from=from_copylink",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.285980",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.285980",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446642",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12000",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-30T12:15:17.200",
|
||||
"lastModified": "2024-11-30T12:15:17.200",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:16:02.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,74 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jaychou8023/cve/blob/main/xss3.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286415",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286415",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.453717",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12001",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-30T13:15:04.140",
|
||||
"lastModified": "2024-11-30T13:15:04.140",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:16:24.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,74 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anisha:wazifa_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0017ACDA-AB2A-4C45-81E8-8646C3FF9CE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jaychou8023/cve/blob/main/xss4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286416",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286416",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.453721",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12002",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-30T13:15:04.610",
|
||||
"lastModified": "2024-11-30T13:15:04.610",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:21:19.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -111,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,28 +142,192 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh451_firmware:1.0.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "645BB5C8-F542-4D2A-81EB-168982028C42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh451_firmware:1.0.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7587331C-8CDC-43FA-869B-CACC9E39CC4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7521568-7BCD-43F8-9F20-440DF3919D5D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97A8BF83-E42A-4D6B-A52D-146FE1AEE2B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0368A8C0-C2C0-477E-A0C2-4D941B963520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\\(408\\)_en:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84F68F46-077A-48C8-AA85-342A2264BF1C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:fh1201:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67A1C59D-AE12-4410-9173-B9B9A72B3AE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DA584AC-7E1F-4FF7-91EA-F82AC2D2D3CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9FD9D0A-39F4-4AD8-AEE0-71C9E77D2799"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\)_en:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A318B1F-C8E5-4C39-A1B3-83C5693CEB61"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A632A11-60A0-457C-A039-BED32F83BD52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "066BD21A-2694-474D-B885-6E9A2A1DBCFF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Kalvin2077/tenda-fh-cve",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286417",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286417",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.453974",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12188",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-05T01:15:04.943",
|
||||
"lastModified": "2024-12-05T01:15:04.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:18:39.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en 1000 Projects Library Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /brains/stu.php. La manipulaci\u00f3n del argumento useri conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SkGoing/CVE-repo_00/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286909",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286909",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.455061",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12228",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-05T14:15:20.123",
|
||||
"lastModified": "2024-12-05T14:15:20.123",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:19:04.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. Affected is an unknown function of the file /admin/user-search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/user-search.php. La manipulaci\u00f3n del argumento search provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PunyHunter/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286974",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286974",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.455059",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12229",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-05T15:15:09.050",
|
||||
"lastModified": "2024-12-05T15:15:09.050",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:19:31.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in PHPGurukul Complaint Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/complaint-search.php. La manipulaci\u00f3n del argumento search conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qiyes233/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.455065",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12230",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-05T15:15:09.280",
|
||||
"lastModified": "2024-12-05T15:15:09.280",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:19:46.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/subcategory.php. The manipulation of the argument category leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /admin/subcategory.php. La manipulaci\u00f3n del argumento category provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wqywfvc/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286976",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286976",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456517",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12233",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-05T17:15:11.037",
|
||||
"lastModified": "2024-12-05T17:15:11.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:24:57.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Online Notice Board up to 1.0 and classified as critical. This issue affects some unknown processing of the file /registration.php of the component Profile Picture Handler. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en code-projects Online Notice Board hasta la versi\u00f3n 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /registration.php del componente Profile Picture Handler. La manipulaci\u00f3n del argumento img provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:online_notice_board:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3CCB274-6AA2-45A3-BA71-B63D91134DED"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LamentXU123/cve/blob/main/RCE1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286979",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286979",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456458",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12234",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-05T17:15:11.213",
|
||||
"lastModified": "2024-12-05T17:15:11.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:25:36.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-customer-detailed.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en 1000 Projects Beauty Parlour Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/edit-customer-detailed.php. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Hacker0xone/CVE/issues/17",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286980",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286980",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456519",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12343",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-08T10:15:04.637",
|
||||
"lastModified": "2024-12-08T10:15:04.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:26:52.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TP-Link VN020 F3v(T) TT_V6.2.1021. Se ve afectada una funci\u00f3n desconocida del archivo /control/WANIPConnection del componente SOAP Request Handler. La manipulaci\u00f3n del argumento NewConnectionType provoca un desbordamiento del b\u00fafer. El ataque debe realizarse dentro de la red local. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,26 +144,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:vn020_f3v_firmware:6.2.1021:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08BBB07D-693A-4491-A084-F9DC21E5B94E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:vn020_f3v:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C2BBC06-4EC1-4568-9732-64E087F27332"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Zephkek/TP-WANPunch/blob/main/README.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287262",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287262",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.446212",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tp-link.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12344",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-08T23:15:04.980",
|
||||
"lastModified": "2024-12-08T23:15:04.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:28:05.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TP-Link VN020 F3v(T) TT_V6.2.1021. Afecta a una parte desconocida del componente FTP USER Command Handler. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,35 +131,92 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:vn020_f3v_firmware:6.2.1021:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08BBB07D-693A-4491-A084-F9DC21E5B94E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:vn020_f3v:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C2BBC06-4EC1-4568-9732-64E087F27332"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Zephkek/TP-1450",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287265",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287265",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.452658",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tp-link.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12352",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T02:15:18.090",
|
||||
"lastModified": "2024-12-09T02:15:18.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:31:47.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en TOTOLINK EX1800T 9.1.0cu.2112_B20220316. Esta vulnerabilidad afecta a la funci\u00f3n sub_40662C del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento ssid provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria . El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,85 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A42AB5D-BBE3-46C5-B60E-0C5D0BE5BD61"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4ECDCF8F-01EE-4B54-AE5F-8793D54BB5A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287272",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287272",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457392",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12353",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T02:15:18.920",
|
||||
"lastModified": "2024-12-09T02:15:18.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:37:06.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Phone Contact Manager System 1.0. Este problema afecta a la funci\u00f3n UserInterface::MenuDisplayStart del componente User Menu. La manipulaci\u00f3n del argumento name provoca una validaci\u00f3n de entrada incorrecta. Es necesario realizar un ataque local. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,35 +131,81 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jasontimwong/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287273",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287273",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457438",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12354",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T02:15:19.120",
|
||||
"lastModified": "2024-12-09T02:15:19.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:36:25.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Phone Contact Manager System 1.0. La funci\u00f3n UserInterface::MenuDisplayStart del componente User Menu est\u00e1 afectada. La manipulaci\u00f3n provoca un desbordamiento de b\u00fafer. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jasontimwong/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287274",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287274",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457477",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12355",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T02:15:19.300",
|
||||
"lastModified": "2024-12-09T02:15:19.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:36:03.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Phone Contact Manager System 1.0 and classified as problematic. Affected by this vulnerability is the function ContactBook::adding of the file ContactBook.cpp. The manipulation leads to improper input validation. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en SourceCodester Phone Contact Manager System 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n ContactBook::adding del archivo ContactBook.cpp. La manipulaci\u00f3n provoca una validaci\u00f3n de entrada incorrecta. El ataque debe abordarse localmente. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,35 +131,78 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TinkAnet/cve/blob/main/BOF2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287275",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287275",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457864",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12357",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T05:15:06.973",
|
||||
"lastModified": "2024-12-09T05:15:06.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:35:15.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Best House Rental Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument page leads to file inclusion. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best House Rental Management System 1.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /index.php. La manipulaci\u00f3n del argumento page conduce a la inclusi\u00f3n de archivos. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,35 +131,77 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pastebin.com/Qupf8YbH",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287276",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287276",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457505",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12358",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T05:15:07.320",
|
||||
"lastModified": "2024-12-09T05:15:07.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:34:20.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in WeiYe-Jing datax-web 2.1.1. It has been classified as critical. This affects an unknown part of the file /api/job/add/. The manipulation of the argument glueSource leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en WeiYe-Jing datax-web 2.1.1. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /api/job/add/. La manipulaci\u00f3n del argumento glueSource provoca la inyecci\u00f3n de comandos en el sistema operativo. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,24 +142,67 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:datax-web_project:datax-web:2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68046A1A-9CA3-464C-BD18-E73CC16C91DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jxp98/VulResearch/blob/main/2024/12/1.Datax-Web%20-%20Remote%20Code%20Execution.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287277",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287277",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457865",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12359",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T05:15:07.630",
|
||||
"lastModified": "2024-12-09T05:15:07.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:34:02.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Admin Dashboard 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /vendor_management.php. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting product names."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en Admin Dashboard 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /vendor_management.php. La manipulaci\u00f3n del argumento username provoca cross site scripting. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona nombres de productos contradictorios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,71 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:admin_dashboard:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E47E6451-4F39-4F1E-8D0F-C7F9EE16AB27"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackmd.io/@salt9487/HyTgLR-V1l",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287278",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287278",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.458634",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12360",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-09T05:15:07.920",
|
||||
"lastModified": "2024-12-09T05:15:07.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-10T23:33:47.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as critical. This issue affects some unknown processing of the file class_update.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en Online Class and Exam Scheduling System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo class_update.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:online_class_and_exam_scheduling_system_project:online_class_and_exam_scheduling_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E869E51B-CF80-4761-B288-EBE89D8DA973"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bjtyyy/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System.docx",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.287279",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.287279",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.458891",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2058",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T11:15:08.237",
|
||||
"lastModified": "2024-11-21T09:08:57.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-10T23:23:40.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,83 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255373",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255373",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255373",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255373",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2059",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-01T12:15:48.890",
|
||||
"lastModified": "2024-11-21T09:08:57.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-10T23:24:34.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255374",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255374",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255374",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255374",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25149",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-20T07:15:10.557",
|
||||
"lastModified": "2024-11-21T09:00:21.293",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:03:54.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,176 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.2",
|
||||
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.4.2",
|
||||
"matchCriteriaId": "69440C19-B9E7-41F3-B731-B5C7E37C718A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149",
|
||||
"source": "security@liferay.com"
|
||||
"source": "security@liferay.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25150",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-20T08:15:07.290",
|
||||
"lastModified": "2024-11-21T09:00:21.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-10T23:01:58.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,206 @@
|
||||
"value": "CWE-201"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.2",
|
||||
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.4.3.4",
|
||||
"matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150",
|
||||
"source": "security@liferay.com"
|
||||
"source": "security@liferay.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2024/CVE-2024-541xx/CVE-2024-54133.json
Normal file
94
CVE-2024/CVE-2024-541xx/CVE-2024-54133.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2024-54133",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-10T23:15:06.240",
|
||||
"lastModified": "2024-12-10T23:15:06.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-556xx/CVE-2024-55653.json
Normal file
56
CVE-2024/CVE-2024-556xx/CVE-2024-55653.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-55653",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-10T23:15:06.410",
|
||||
"lastModified": "2024-12-10T23:15:06.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-556xx/CVE-2024-55655.json
Normal file
90
CVE-2024/CVE-2024-556xx/CVE-2024-55655.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-55655",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-10T23:15:06.570",
|
||||
"lastModified": "2024-12-10T23:15:06.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "sigstore-python is a Python tool for generating and verifying Sigstore signatures. Versions of sigstore-python newer than 2.0.0 but prior to 3.6.0 perform insufficient validation of the \"integration time\" present in \"v2\" and \"v3\" bundles during the verification flow: the \"integration time\" is verified *if* a source of signed time (such as an inclusion promise) is present, but is otherwise trusted if no source of signed time is present. This does not affect \"v1\" bundles, as the \"v1\" bundle format always requires an inclusion promise.\n\nSigstore uses signed time to support verification of signatures made against short-lived signing keys. The impact and severity of this weakness is *low*, as Sigstore contains multiple other enforcing components that prevent an attacker who modifies the integration timestamp within a bundle from impersonating a valid signature. In particular, an attacker who modifies the integration timestamp can induce a Denial of Service, but in no different manner than already possible with bundle access (e.g. modifying the signature itself such that it fails to verify). Separately, an attacker could upload a *new* entry to the transparency service, and substitute their new entry's time. However, this would still be rejected at validation time, as the new entry's (valid) signed time would be outside the validity window of the original signing certificate and would nonetheless render the attacker auditable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "UNREPORTED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-325"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sigstore/sigstore-python/commit/300b502ae99ebfaace124f1f4e422a6a669369cf",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/sigstore-python/releases/tag/v3.6.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sigstore/sigstore-python/security/advisories/GHSA-hhfg-fwrw-87w7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
85
README.md
85
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-10T23:00:30.405237+00:00
|
||||
2024-12-11T00:55:46.185644+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-10T22:59:32.727000+00:00
|
||||
2024-12-10T23:37:06.613000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,66 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
273151
|
||||
273154
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `153`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-53954](CVE-2024/CVE-2024-539xx/CVE-2024-53954.json) (`2024-12-10T21:15:20.560`)
|
||||
- [CVE-2024-53955](CVE-2024/CVE-2024-539xx/CVE-2024-53955.json) (`2024-12-10T22:15:25.610`)
|
||||
- [CVE-2024-53956](CVE-2024/CVE-2024-539xx/CVE-2024-53956.json) (`2024-12-10T22:15:25.767`)
|
||||
- [CVE-2024-53957](CVE-2024/CVE-2024-539xx/CVE-2024-53957.json) (`2024-12-10T22:15:25.917`)
|
||||
- [CVE-2024-53958](CVE-2024/CVE-2024-539xx/CVE-2024-53958.json) (`2024-12-10T22:15:26.510`)
|
||||
- [CVE-2024-53959](CVE-2024/CVE-2024-539xx/CVE-2024-53959.json) (`2024-12-10T22:15:27.347`)
|
||||
- [CVE-2024-53960](CVE-2024/CVE-2024-539xx/CVE-2024-53960.json) (`2024-12-10T22:15:27.550`)
|
||||
- [CVE-2024-54032](CVE-2024/CVE-2024-540xx/CVE-2024-54032.json) (`2024-12-10T21:15:20.690`)
|
||||
- [CVE-2024-54034](CVE-2024/CVE-2024-540xx/CVE-2024-54034.json) (`2024-12-10T21:15:20.817`)
|
||||
- [CVE-2024-54036](CVE-2024/CVE-2024-540xx/CVE-2024-54036.json) (`2024-12-10T21:15:20.947`)
|
||||
- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2024-12-10T21:15:21.080`)
|
||||
- [CVE-2024-54038](CVE-2024/CVE-2024-540xx/CVE-2024-54038.json) (`2024-12-10T21:15:21.210`)
|
||||
- [CVE-2024-54039](CVE-2024/CVE-2024-540xx/CVE-2024-54039.json) (`2024-12-10T21:15:21.337`)
|
||||
- [CVE-2024-54040](CVE-2024/CVE-2024-540xx/CVE-2024-54040.json) (`2024-12-10T21:15:21.463`)
|
||||
- [CVE-2024-54041](CVE-2024/CVE-2024-540xx/CVE-2024-54041.json) (`2024-12-10T21:15:21.590`)
|
||||
- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2024-12-10T21:15:21.720`)
|
||||
- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2024-12-10T21:15:21.850`)
|
||||
- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2024-12-10T21:15:21.977`)
|
||||
- [CVE-2024-54045](CVE-2024/CVE-2024-540xx/CVE-2024-54045.json) (`2024-12-10T21:15:22.110`)
|
||||
- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2024-12-10T21:15:22.237`)
|
||||
- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2024-12-10T21:15:22.360`)
|
||||
- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2024-12-10T21:15:22.490`)
|
||||
- [CVE-2024-54049](CVE-2024/CVE-2024-540xx/CVE-2024-54049.json) (`2024-12-10T21:15:22.627`)
|
||||
- [CVE-2024-54050](CVE-2024/CVE-2024-540xx/CVE-2024-54050.json) (`2024-12-10T21:15:22.767`)
|
||||
- [CVE-2024-54051](CVE-2024/CVE-2024-540xx/CVE-2024-54051.json) (`2024-12-10T21:15:22.927`)
|
||||
- [CVE-2024-54133](CVE-2024/CVE-2024-541xx/CVE-2024-54133.json) (`2024-12-10T23:15:06.240`)
|
||||
- [CVE-2024-55653](CVE-2024/CVE-2024-556xx/CVE-2024-55653.json) (`2024-12-10T23:15:06.410`)
|
||||
- [CVE-2024-55655](CVE-2024/CVE-2024-556xx/CVE-2024-55655.json) (`2024-12-10T23:15:06.570`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `22`
|
||||
Recently modified CVEs: `32`
|
||||
|
||||
- [CVE-2021-47077](CVE-2021/CVE-2021-470xx/CVE-2021-47077.json) (`2024-12-10T21:01:51.030`)
|
||||
- [CVE-2023-36358](CVE-2023/CVE-2023-363xx/CVE-2023-36358.json) (`2024-12-10T22:15:05.393`)
|
||||
- [CVE-2023-36359](CVE-2023/CVE-2023-363xx/CVE-2023-36359.json) (`2024-12-10T21:15:14.750`)
|
||||
- [CVE-2023-52503](CVE-2023/CVE-2023-525xx/CVE-2023-52503.json) (`2024-12-10T21:26:43.377`)
|
||||
- [CVE-2024-10968](CVE-2024/CVE-2024-109xx/CVE-2024-10968.json) (`2024-12-10T21:10:06.700`)
|
||||
- [CVE-2024-10969](CVE-2024/CVE-2024-109xx/CVE-2024-10969.json) (`2024-12-10T21:10:24.593`)
|
||||
- [CVE-2024-11138](CVE-2024/CVE-2024-111xx/CVE-2024-11138.json) (`2024-12-10T21:11:45.043`)
|
||||
- [CVE-2024-25604](CVE-2024/CVE-2024-256xx/CVE-2024-25604.json) (`2024-12-10T22:59:32.727`)
|
||||
- [CVE-2024-25605](CVE-2024/CVE-2024-256xx/CVE-2024-25605.json) (`2024-12-10T22:20:47.737`)
|
||||
- [CVE-2024-26271](CVE-2024/CVE-2024-262xx/CVE-2024-26271.json) (`2024-12-10T21:07:04.467`)
|
||||
- [CVE-2024-26272](CVE-2024/CVE-2024-262xx/CVE-2024-26272.json) (`2024-12-10T21:07:02.180`)
|
||||
- [CVE-2024-26273](CVE-2024/CVE-2024-262xx/CVE-2024-26273.json) (`2024-12-10T21:07:07.587`)
|
||||
- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-12-10T21:06:57.970`)
|
||||
- [CVE-2024-53470](CVE-2024/CVE-2024-534xx/CVE-2024-53470.json) (`2024-12-10T22:15:25.010`)
|
||||
- [CVE-2024-53471](CVE-2024/CVE-2024-534xx/CVE-2024-53471.json) (`2024-12-10T22:15:25.277`)
|
||||
- [CVE-2024-53481](CVE-2024/CVE-2024-534xx/CVE-2024-53481.json) (`2024-12-10T21:15:20.003`)
|
||||
- [CVE-2024-55635](CVE-2024/CVE-2024-556xx/CVE-2024-55635.json) (`2024-12-10T22:15:28.190`)
|
||||
- [CVE-2024-55636](CVE-2024/CVE-2024-556xx/CVE-2024-55636.json) (`2024-12-10T22:15:28.347`)
|
||||
- [CVE-2024-55637](CVE-2024/CVE-2024-556xx/CVE-2024-55637.json) (`2024-12-10T22:15:28.500`)
|
||||
- [CVE-2024-55638](CVE-2024/CVE-2024-556xx/CVE-2024-55638.json) (`2024-12-10T22:15:28.640`)
|
||||
- [CVE-2024-5660](CVE-2024/CVE-2024-56xx/CVE-2024-5660.json) (`2024-12-10T22:15:28.790`)
|
||||
- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-12-10T21:07:09.857`)
|
||||
- [CVE-2024-11658](CVE-2024/CVE-2024-116xx/CVE-2024-11658.json) (`2024-12-10T23:15:02.890`)
|
||||
- [CVE-2024-11659](CVE-2024/CVE-2024-116xx/CVE-2024-11659.json) (`2024-12-10T23:15:14.893`)
|
||||
- [CVE-2024-12000](CVE-2024/CVE-2024-120xx/CVE-2024-12000.json) (`2024-12-10T23:16:02.667`)
|
||||
- [CVE-2024-12001](CVE-2024/CVE-2024-120xx/CVE-2024-12001.json) (`2024-12-10T23:16:24.893`)
|
||||
- [CVE-2024-12002](CVE-2024/CVE-2024-120xx/CVE-2024-12002.json) (`2024-12-10T23:21:19.827`)
|
||||
- [CVE-2024-12188](CVE-2024/CVE-2024-121xx/CVE-2024-12188.json) (`2024-12-10T23:18:39.680`)
|
||||
- [CVE-2024-12228](CVE-2024/CVE-2024-122xx/CVE-2024-12228.json) (`2024-12-10T23:19:04.773`)
|
||||
- [CVE-2024-12229](CVE-2024/CVE-2024-122xx/CVE-2024-12229.json) (`2024-12-10T23:19:31.487`)
|
||||
- [CVE-2024-12230](CVE-2024/CVE-2024-122xx/CVE-2024-12230.json) (`2024-12-10T23:19:46.887`)
|
||||
- [CVE-2024-12233](CVE-2024/CVE-2024-122xx/CVE-2024-12233.json) (`2024-12-10T23:24:57.237`)
|
||||
- [CVE-2024-12234](CVE-2024/CVE-2024-122xx/CVE-2024-12234.json) (`2024-12-10T23:25:36.387`)
|
||||
- [CVE-2024-12343](CVE-2024/CVE-2024-123xx/CVE-2024-12343.json) (`2024-12-10T23:26:52.047`)
|
||||
- [CVE-2024-12344](CVE-2024/CVE-2024-123xx/CVE-2024-12344.json) (`2024-12-10T23:28:05.760`)
|
||||
- [CVE-2024-12352](CVE-2024/CVE-2024-123xx/CVE-2024-12352.json) (`2024-12-10T23:31:47.427`)
|
||||
- [CVE-2024-12353](CVE-2024/CVE-2024-123xx/CVE-2024-12353.json) (`2024-12-10T23:37:06.613`)
|
||||
- [CVE-2024-12354](CVE-2024/CVE-2024-123xx/CVE-2024-12354.json) (`2024-12-10T23:36:25.740`)
|
||||
- [CVE-2024-12355](CVE-2024/CVE-2024-123xx/CVE-2024-12355.json) (`2024-12-10T23:36:03.883`)
|
||||
- [CVE-2024-12357](CVE-2024/CVE-2024-123xx/CVE-2024-12357.json) (`2024-12-10T23:35:15.660`)
|
||||
- [CVE-2024-12358](CVE-2024/CVE-2024-123xx/CVE-2024-12358.json) (`2024-12-10T23:34:20.467`)
|
||||
- [CVE-2024-12359](CVE-2024/CVE-2024-123xx/CVE-2024-12359.json) (`2024-12-10T23:34:02.110`)
|
||||
- [CVE-2024-12360](CVE-2024/CVE-2024-123xx/CVE-2024-12360.json) (`2024-12-10T23:33:47.773`)
|
||||
- [CVE-2024-2058](CVE-2024/CVE-2024-20xx/CVE-2024-2058.json) (`2024-12-10T23:23:40.153`)
|
||||
- [CVE-2024-2059](CVE-2024/CVE-2024-20xx/CVE-2024-2059.json) (`2024-12-10T23:24:34.477`)
|
||||
- [CVE-2024-25149](CVE-2024/CVE-2024-251xx/CVE-2024-25149.json) (`2024-12-10T23:03:54.853`)
|
||||
- [CVE-2024-25150](CVE-2024/CVE-2024-251xx/CVE-2024-25150.json) (`2024-12-10T23:01:58.647`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
417
_state.csv
417
_state.csv
@ -187218,7 +187218,7 @@ CVE-2021-47073,0,0,1da6789de0e18c722faf0748d86b29266ec446ef02b371ec3294102d5dc16
|
||||
CVE-2021-47074,0,0,62606d2032895447276146a4bd74173d7188ecf09841f325ee145350e8690bb6,2024-11-21T06:35:20.813000
|
||||
CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000
|
||||
CVE-2021-47076,0,0,eb44f78121b9b3561a16c318aaec96c6c6576ae1ed25b0b86867d5e51cb5effd,2024-11-21T06:35:21.103000
|
||||
CVE-2021-47077,0,1,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000
|
||||
CVE-2021-47077,0,0,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000
|
||||
CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6ab93,2024-11-21T06:35:21.327000
|
||||
CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000
|
||||
CVE-2021-47080,0,0,b2998f659a4b3e4f9d004f3f3d103d7ee3c84ede27b87e416214f7ed38cac5e7,2024-12-09T18:45:03.330000
|
||||
@ -227855,8 +227855,8 @@ CVE-2023-36354,0,0,f52211b337a7b329ca6967c351c2cceb8600276a1c14ee18982757daf0433
|
||||
CVE-2023-36355,0,0,b13b6b4d1b429dcb0d564bf46350457d4136a5d32b0a65c6ff4288911b1c219a,2024-11-21T08:09:35.113000
|
||||
CVE-2023-36356,0,0,dfe0803ee38c4a445d74cdbb675a6baf3dc666a786ff0be950f1a18a5fe656c5,2024-11-21T08:09:35.277000
|
||||
CVE-2023-36357,0,0,7f8ec13898de07f57c7e8e66d0c8d2ff725c2b13b80d89d540b0324101332414,2024-12-02T19:15:07.480000
|
||||
CVE-2023-36358,0,1,ded194e7b200adb441b4fa709d63c99e2eef0e06835442964ff220e3502b3889,2024-12-10T22:15:05.393000
|
||||
CVE-2023-36359,0,1,f1cfdda5960f8b568ffa1ef340bf74059ceff420da4bb55dede3794d35432533,2024-12-10T21:15:14.750000
|
||||
CVE-2023-36358,0,0,ded194e7b200adb441b4fa709d63c99e2eef0e06835442964ff220e3502b3889,2024-12-10T22:15:05.393000
|
||||
CVE-2023-36359,0,0,f1cfdda5960f8b568ffa1ef340bf74059ceff420da4bb55dede3794d35432533,2024-12-10T21:15:14.750000
|
||||
CVE-2023-3636,0,0,f79ef9ecae829c199359798b63f24fb8a51eecaca990fa8998937337744d6ca2,2024-11-21T08:17:43.370000
|
||||
CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000
|
||||
CVE-2023-36361,0,0,4e0200c7874320e4f073214633a311a386756b789151e899a0bc24bab0baa2b5,2024-11-21T08:09:35.950000
|
||||
@ -239697,7 +239697,7 @@ CVE-2023-5250,0,0,58ce2b34b475373736e77e988be92b15eb836a64d3c5382c9b7f18d2986aa0
|
||||
CVE-2023-52500,0,0,fbb9efaa221bcebca4695082e7346353f1edaceda435306e7320013f86e44d86,2024-11-21T08:39:54.610000
|
||||
CVE-2023-52501,0,0,dce8fea28787eccd5fdf1c2279867b1856cfdadbf948affe1018e6b016ffe136,2024-11-21T08:39:54.730000
|
||||
CVE-2023-52502,0,0,53b5c7371b4f4373fe848296392853f59d8735375e39195cf54701f13f36c71d,2024-11-21T08:39:54.847000
|
||||
CVE-2023-52503,0,1,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000
|
||||
CVE-2023-52503,0,0,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000
|
||||
CVE-2023-52504,0,0,20d543413cbfdce3982f0e69879d8085fe9ae071f6db241d63eea26ff6923237,2024-11-21T08:39:55.150000
|
||||
CVE-2023-52505,0,0,457ceb32eaa0dbf4f3fb83c3def49ce35850e4a94f5e4c24c521950a01b60bc6,2024-11-21T08:39:55.273000
|
||||
CVE-2023-52506,0,0,2473aef6ecee2b11075221629d29edc4b86db27ed7be427c580f9b517750fde5,2024-11-21T08:39:55.397000
|
||||
@ -243631,8 +243631,8 @@ CVE-2024-10964,0,0,57b272f10f583f57ad350a67bc460132637ea8e73b01849caa65e88235230
|
||||
CVE-2024-10965,0,0,7a48e746780c9b936f9156485d79a795eb32972691169d69dc596fa55046e4dd,2024-11-23T01:45:14.267000
|
||||
CVE-2024-10966,0,0,b7a50c5d6f825b28e507a19c3844f5a82d0b4c6a45687a7c351c49bc0dd409eb,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10967,0,0,7c3473c2b77a8d05803cf7f270943b5290b5d24c3b903af32185338840b213c3,2024-11-26T01:30:41.650000
|
||||
CVE-2024-10968,0,1,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000
|
||||
CVE-2024-10969,0,1,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000
|
||||
CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000
|
||||
CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000
|
||||
CVE-2024-1097,0,0,f1ad2b99b98b2176c3b3ccdd494bed6625a86a9f96e0ed3a25e7d4f3cd789ac4,2024-11-19T19:05:30.620000
|
||||
CVE-2024-10971,0,0,f8d3e9d67661e4546a1e254ebb74d5d0c1dddae1c4d768a7ce5fd78bda7de46d,2024-11-21T08:49:10.613000
|
||||
CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000
|
||||
@ -243766,7 +243766,7 @@ CVE-2024-11127,0,0,a3efa55977cec0481a9d0f60f752166adc632313ccf7c08d957fcbfaa47d4
|
||||
CVE-2024-1113,0,0,db1a37354bc3ae93faa7351501dc98fbca0217da03c731fe56b764e77974ccf3,2024-11-21T08:49:49.557000
|
||||
CVE-2024-11130,0,0,2031b0d91a76a3ae308e67f748474890b1fb080d7d4cbebe58df244865c594b4,2024-11-15T17:57:53.270000
|
||||
CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d687b6,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11138,0,1,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000
|
||||
CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000
|
||||
CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000
|
||||
CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000
|
||||
CVE-2024-11145,0,0,49d8db8e9affdc9bd928055d93b635f15e5703854689b5be5f582242400a9150,2024-11-26T20:15:25.270000
|
||||
@ -244126,15 +244126,15 @@ CVE-2024-11648,0,0,7767a97f87e6ac5b52c62a9ab3e06af98c54488fb6fa6db87ff57d4b59586
|
||||
CVE-2024-11649,0,0,2e02a1b1ac73e9631e0d1a9797095a406b688cb0877d8f7698e9962760832419,2024-11-25T16:48:37.237000
|
||||
CVE-2024-1165,0,0,f0eb9b30d6a68836136018056f023b617295681fde22058072d340e5efc4e2a8,2024-11-21T08:49:56.660000
|
||||
CVE-2024-11650,0,0,c1a83adb5fe7f79d88eb6196b3c8ac6aa781d1511831a253d8e0e7484128306a,2024-11-25T03:15:06.707000
|
||||
CVE-2024-11651,0,0,17348de1119776db26030e9659dbb657f30e3390cd51cfca60aee866c70f68df,2024-11-25T03:15:07.973000
|
||||
CVE-2024-11652,0,0,6acb2a8b97f7a26528234ba6716df53272242783d16c311788f9fef9f07b6c47,2024-11-25T03:15:08.533000
|
||||
CVE-2024-11653,0,0,9918c1f7886c6d017bd9961c38b87c701db8070452b51fb5354ad45330dde2ba,2024-11-25T04:15:05.337000
|
||||
CVE-2024-11654,0,0,21401afaf8ecf74c5d0db69dfd7c0c17a97cc6c6a463b11ffdc1a1c2dd37902a,2024-11-25T04:15:05.577000
|
||||
CVE-2024-11655,0,0,ff8edbaf2b00fb02e08da5e071e47487c2f42a8aaec1793585954963c191b5a0,2024-11-25T05:15:09.447000
|
||||
CVE-2024-11656,0,0,3c38eb90724808c2d57ac7f1e37e526270af01870e1817c86338de10b4d1a27a,2024-11-25T05:15:10.387000
|
||||
CVE-2024-11657,0,0,3b1d1fe8d0758caf3b82c97d710174695e8f4631c95f72f8292876b320368551,2024-11-25T06:15:06.073000
|
||||
CVE-2024-11658,0,0,9c345fcddb5d970c1d299dc0ee97feeca68b6d2ff2ee9ddf6277fff83c8f2a43,2024-11-25T06:15:06.593000
|
||||
CVE-2024-11659,0,0,4ba25452a441f40b384f689a3137f1a167c9e2c6e3f82bf19d05a1cb716eb0db,2024-11-25T07:15:04.837000
|
||||
CVE-2024-11651,0,1,1ab789c9eacaad7c175ddc8afa1992c793e015c3b6f49833dba9691422e781b4,2024-12-10T23:12:34.057000
|
||||
CVE-2024-11652,0,1,33668e06a8390aec93f01c5243e821060407052a728d8fc9cf77a157eb5f30ec,2024-12-10T23:13:23.947000
|
||||
CVE-2024-11653,0,1,4f0865d84dde581169e5fc4f057c95f93f00192712fe5392e0e3b1c1b53093c7,2024-12-10T23:13:40.990000
|
||||
CVE-2024-11654,0,1,13b950818c431c00e0ccfa7e4708e0621c51a74698f1f42c1f1d8ee79f24642d,2024-12-10T23:13:58.150000
|
||||
CVE-2024-11655,0,1,76a02b250b83551be6a13ebd60a95c6bfd1919484c18f40e8609059b505aebaf,2024-12-10T23:14:37.130000
|
||||
CVE-2024-11656,0,1,ae5d62f8089e5b420c86674ec5b9d797d90254a7516b5d1e5cc0e66373221a54,2024-12-10T23:14:44.037000
|
||||
CVE-2024-11657,0,1,893d6eae4e57947a06d3ac1fe3a26f703d0cc35b972b40317f35a6ea8903cc90,2024-12-10T23:14:54.933000
|
||||
CVE-2024-11658,0,1,262660ae934203477e09837b0ae58d534fbf787226668bfcc4278980ecb805e2,2024-12-10T23:15:02.890000
|
||||
CVE-2024-11659,0,1,73971f1a5bede07ed8180dfa7d34f0b3b27aba70b99e0b8d5b25787aef733c4c,2024-12-10T23:15:14.893000
|
||||
CVE-2024-1166,0,0,9a4043bccbd810fe27a7f1e35eefa8a5ff4605f22a20be37f65eb257e1506a5a,2024-11-21T08:49:56.773000
|
||||
CVE-2024-11660,0,0,c69038363011e72870bf05ba1b77807b46b410512f645c7de24fbe53640bca7c,2024-12-04T17:49:09.103000
|
||||
CVE-2024-11661,0,0,245f7af368d483b99968c06f6626bb5531f9195deb8e8301e7998f114936ec1c,2024-12-04T18:41:52.773000
|
||||
@ -244307,9 +244307,9 @@ CVE-2024-11996,0,0,c9890e109cbd3473a593b35fd7d1b915d4d2a7a9695a33296844a7786a35e
|
||||
CVE-2024-11997,0,0,2af8126987a27c26e5e9fb866e5bf6a59fe0bc68e164aa36d761876f8d96a284,2024-12-04T21:26:54.147000
|
||||
CVE-2024-11998,0,0,c32498d8a84a24616240eccde60a71f350199dae5d10d57970d82263bdad0fd7,2024-12-04T21:23:13.700000
|
||||
CVE-2024-1200,0,0,e8315157751d481549a2635b52695b341549aeb4d8405db846b56db1c12fa29b,2024-11-21T08:50:01.490000
|
||||
CVE-2024-12000,0,0,ab0ea335fdef1f2943f85e72a95a6f1701ba706c44d94d7b431efd0dc394df24,2024-11-30T12:15:17.200000
|
||||
CVE-2024-12001,0,0,24a237e51a6a9afcac14598d7cc3b1fb087313623efcb8ea1294b11bfa7131f6,2024-11-30T13:15:04.140000
|
||||
CVE-2024-12002,0,0,188be46b4ba3746fdca63523598fd9a9beb4f35572d5dfe474c1d7df181eb4c0,2024-11-30T13:15:04.610000
|
||||
CVE-2024-12000,0,1,e45e46bd9049a7c2eac2343a939848eded6d5b005c7247796df205afc6eac9d3,2024-12-10T23:16:02.667000
|
||||
CVE-2024-12001,0,1,75bbf94d31b41f422ac1216beeda365d0b924dd232e408edb33262f11bb39f10,2024-12-10T23:16:24.893000
|
||||
CVE-2024-12002,0,1,642bad4c124467ff4f581f355ddf310f5dadc994966ff22ccdf8e42852d0744f,2024-12-10T23:21:19.827000
|
||||
CVE-2024-12003,0,0,e39ee63656708893dab4dc4b108494b2da97ab05cd1b7a687dd08b180fa7d4d8,2024-12-06T09:15:07.630000
|
||||
CVE-2024-12007,0,0,3f0955870ea9bdf12f159a9ff3518e539c39735afc0d33a5578fc33e0cfc6a81,2024-12-01T23:15:05.310000
|
||||
CVE-2024-1201,0,0,ede9ef00e40c3771a17b2608d045b2ee9c35ff3d800bb0d000b60662409e157c,2024-11-21T08:50:01.647000
|
||||
@ -244366,7 +244366,7 @@ CVE-2024-12183,0,0,82e7d00c0d43970561dcde149328e37153ec341d20500330a205d615cf784
|
||||
CVE-2024-12185,0,0,2794475f4c291bccc75d891cf053c96f74c5bfa44bdb40ae143fb3a0b3833593,2024-12-10T15:57:03.543000
|
||||
CVE-2024-12186,0,0,44e0fbeb8593926913663c90a8d76c7d9e63d8cea11901a6acafe7cca925b60d,2024-12-10T15:52:39.487000
|
||||
CVE-2024-12187,0,0,d5219bf8165d3b6d69ade284ac66cc01774c2830861f108855db8360e680b621,2024-12-10T15:25:53.537000
|
||||
CVE-2024-12188,0,0,9630a0796baa9ec4e8782d005d486e4f8bf046eb1e553a6bbf9ee9e7d1813812,2024-12-05T01:15:04.943000
|
||||
CVE-2024-12188,0,1,7ed239e8baff77cd72f7797865913dce6f434fc87b23f5e6feb697e0a02c98fb,2024-12-10T23:18:39.680000
|
||||
CVE-2024-1219,0,0,629287fb6c9fdb1db5a6b18292530d26bc4ea3297efdbbab51f719885479af95,2024-11-21T08:50:04.430000
|
||||
CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000
|
||||
CVE-2024-1220,0,0,9554836c8027e0b7a98d02c469b0640f37340ff8518df5c7c53c1851829f880c,2024-11-21T08:50:04.733000
|
||||
@ -244374,14 +244374,14 @@ CVE-2024-12209,0,0,e55df453280925a5ada6ceed594c84db1ea741f75d9f89eeca6eeeac114b8
|
||||
CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000
|
||||
CVE-2024-1222,0,0,ff0f67607974451388d42ae6b90b2e9690717b801a6493a4e7aa508a94c6883e,2024-11-21T08:50:05.110000
|
||||
CVE-2024-12227,0,0,ba90ebb2cf382c847aea04197c034e5e0e145f9bb34caf2219ef0758e476d6a3,2024-12-05T14:15:19.400000
|
||||
CVE-2024-12228,0,0,31eea3c62e91877dec1581810510afd90e847a91043b6cd6e253705405122f7d,2024-12-05T14:15:20.123000
|
||||
CVE-2024-12229,0,0,e946d82e348383155a1358ef71e119564a0942119e9b979a3266997d80839ffb,2024-12-05T15:15:09.050000
|
||||
CVE-2024-12228,0,1,cba3b66c66f8b74b7da0219a0273d1dd0c005a65d0aca4a38c9a6589b54985c9,2024-12-10T23:19:04.773000
|
||||
CVE-2024-12229,0,1,aa44844c8d830c107b3760370b58cb504158d7d7c510be09891b02a376b9c9ac,2024-12-10T23:19:31.487000
|
||||
CVE-2024-1223,0,0,be24dd89111c5fcc9b818c0848f8619380122cccb06e3640ec34c1018e50b1b4,2024-11-21T08:50:05.300000
|
||||
CVE-2024-12230,0,0,8fe309b024c3ce22cce3f311bb414add56c34b7a4edc5e4706470219b915d8ed,2024-12-05T15:15:09.280000
|
||||
CVE-2024-12230,0,1,973683b5e69b27d9daf3cfc7eb4a458b4dc39d62d7edd5222b7b5e4c000bda78,2024-12-10T23:19:46.887000
|
||||
CVE-2024-12231,0,0,2d61cd97d30688f5839da3e8db4d5653c16d2d28938561890550be74fc098362,2024-12-05T16:15:24.933000
|
||||
CVE-2024-12232,0,0,8ac258fec8b1773cf95dd11c943fcd65f455678e8beaddd5071d54b1acd6e5b3,2024-12-05T16:15:25.090000
|
||||
CVE-2024-12233,0,0,05b9925f1297f182adba9298e65b877490d4cb6f74e3cd9a5f7f5b2f5c9df9d4,2024-12-05T17:15:11.037000
|
||||
CVE-2024-12234,0,0,393ae01c764aca95a7ebbb32374a68fa6706a527e69981b016911f43ea345c05,2024-12-05T17:15:11.213000
|
||||
CVE-2024-12233,0,1,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a558942d,2024-12-10T23:24:57.237000
|
||||
CVE-2024-12234,0,1,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
|
||||
CVE-2024-12235,0,0,38f1b3feacaad948f40ac9e8f67e1ff40424da9b6b0097b46c94da1cb9b5c6b9,2024-12-05T18:15:21.660000
|
||||
CVE-2024-12236,0,0,caa087d872ef2d26c670019d91aa1248a68a09c1bcd376af7384f31b991183a0,2024-12-10T15:15:07.147000
|
||||
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
||||
@ -244407,8 +244407,8 @@ CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66
|
||||
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
|
||||
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
|
||||
CVE-2024-12342,0,0,c8f9d4658bb439c06796f6393d38c161608854ed130acdc85baa16bde35bc56c,2024-12-08T07:15:04.950000
|
||||
CVE-2024-12343,0,0,40124b18e2d3de18ab98a4f87f9d42f8013f21e96e390110cdec80fee777538a,2024-12-08T10:15:04.637000
|
||||
CVE-2024-12344,0,0,b6a25eb8c3525836c38e773d62e1b176ca33b20be4057ad5cd0025ceb055ea8f,2024-12-08T23:15:04.980000
|
||||
CVE-2024-12343,0,1,ac88dc9695a819696f313a26b68429a92402a92d44a44fae3dae004786557c5b,2024-12-10T23:26:52.047000
|
||||
CVE-2024-12344,0,1,a74c4de6f3ec8761526e235e0afb71aca4880eff4cfe7e19b9ce946c54f2c01c,2024-12-10T23:28:05.760000
|
||||
CVE-2024-12346,0,0,80cb0f641e48457b23b15bd65b063b12a84c74cd98692c10accc52ead008b067,2024-12-09T00:15:04.207000
|
||||
CVE-2024-12347,0,0,03b5c659fb7311a053f8959fd28372cdf56b1d1a85fe87823f3ed5487c3d37dc,2024-12-09T00:15:04.910000
|
||||
CVE-2024-12348,0,0,8a10f1d1bbeb46074f9e146f37bc90c671b027b7252fa3e978381ed5d459a2a7,2024-12-09T01:15:05.603000
|
||||
@ -244416,15 +244416,15 @@ CVE-2024-12349,0,0,3d063bdeee6aecc6e73ab3e1d240af7daa461f127325f4d59b59bef9f8695
|
||||
CVE-2024-1235,0,0,fd37d01ad20dcc5d0dd22397b78801055d1e00ef080900e252a8af428afe4d67,2024-11-21T08:50:07.683000
|
||||
CVE-2024-12350,0,0,c6ed55f56770c3ba92aae6fb67fd45964cbb43ddf597fb06d36f88fd90713d63,2024-12-09T01:15:05.943000
|
||||
CVE-2024-12351,0,0,c7a1c9b6e1b0366b89dc0ddff8a6358f5817bd99800138af16ab4bd5a31f1f3c,2024-12-09T01:15:06.120000
|
||||
CVE-2024-12352,0,0,df6e6e438031ecc98e4060be996123925a2d11714cbf6d67b70dfc73b77f0412,2024-12-09T02:15:18.090000
|
||||
CVE-2024-12353,0,0,cdfb3d26fac16a1a5d998eb3be106173119f8a00dbfb4191025a22992ab16e5a,2024-12-09T02:15:18.920000
|
||||
CVE-2024-12354,0,0,9cd087b8f40c9a4013f29fb518d260911b2e8d8a0b8a192d987032812a26f2d7,2024-12-09T02:15:19.120000
|
||||
CVE-2024-12355,0,0,59de9253426a92e27e7c3904943024aa25fb561f82b61f281cb2411b05b4fc81,2024-12-09T02:15:19.300000
|
||||
CVE-2024-12357,0,0,2e3ace4329dee544759b3943ce02a194d6d82c92302601be13110040a3e78f1c,2024-12-09T05:15:06.973000
|
||||
CVE-2024-12358,0,0,6ddb1068585d936786ad516cf6a6bcc212677513e0b470b785f791b17192fa88,2024-12-09T05:15:07.320000
|
||||
CVE-2024-12359,0,0,1b9eca10a0eb8c61148d2c180bd16045cbf319152c6d0689f3b60739161e9047,2024-12-09T05:15:07.630000
|
||||
CVE-2024-12352,0,1,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c417,2024-12-10T23:31:47.427000
|
||||
CVE-2024-12353,0,1,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
|
||||
CVE-2024-12354,0,1,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
|
||||
CVE-2024-12355,0,1,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
|
||||
CVE-2024-12357,0,1,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
|
||||
CVE-2024-12358,0,1,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
|
||||
CVE-2024-12359,0,1,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
|
||||
CVE-2024-1236,0,0,98cf8c8d0d2027d41420e47ce0e54a62c55b6c82b55779fb1975380b5e094f29,2024-11-21T08:50:07.797000
|
||||
CVE-2024-12360,0,0,73fc0231527ad06f2d47ddb3328eb56e1d3966ef0dded4f11416bdaabed92b1f,2024-12-09T05:15:07.920000
|
||||
CVE-2024-12360,0,1,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac745,2024-12-10T23:33:47.773000
|
||||
CVE-2024-12369,0,0,020d729c045c8eaa8f498306958a74fd2b364bdb1cd395ef2460e8703f80119a,2024-12-09T21:15:08.203000
|
||||
CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000
|
||||
CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000
|
||||
@ -245607,8 +245607,8 @@ CVE-2024-20540,0,0,5046d412fb4d977a66a069ad7e69b4507f6a0eef37dbd61ef109cc61fdb35
|
||||
CVE-2024-2055,0,0,9c9b4203c5a8691f7ee3b1c0f37424285bdb22c4e9691349b0a7161f418f3aa7,2024-11-21T09:08:56.533000
|
||||
CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c605,2024-11-21T09:08:56.727000
|
||||
CVE-2024-2057,0,0,e5c93f7381e9c562590637af109bc48ab64f0cda8b9656e06708802a9eaa17f2,2024-11-21T09:08:56.920000
|
||||
CVE-2024-2058,0,0,e868ae1e4fef69ae1bf90831cffd1310680740a4c2ab53c9ddd21491ac69ef7c,2024-11-21T09:08:57.057000
|
||||
CVE-2024-2059,0,0,30c11d5c2719e4dca8b1a55579561e83e75f72521b4ac95f37da2fcdad518f2d,2024-11-21T09:08:57.203000
|
||||
CVE-2024-2058,0,1,33a3e353af74f2d695cce3be2493a5677751c7365de6b1d8c6772bcf6a979a5a,2024-12-10T23:23:40.153000
|
||||
CVE-2024-2059,0,1,5f97477692139521401f190887f1f2478fd814e5ddd0152ac688240955c16848,2024-12-10T23:24:34.477000
|
||||
CVE-2024-2060,0,0,e30aa9c1a298c19807282a1755921a86bb2e5b5f93b64559a78c7077fba12793,2024-11-21T09:08:57.347000
|
||||
CVE-2024-2061,0,0,79dc1bd1746c35498269eb72fd4501df46f607a32105dcc0bd7da4fa73505d75,2024-11-21T09:08:57.477000
|
||||
CVE-2024-2062,0,0,4aff557e6e96d7678134b316b3c4ed63f2c8d5ed487405f524f805b6164b27d3,2024-11-21T09:08:57.603000
|
||||
@ -249039,9 +249039,9 @@ CVE-2024-25145,0,0,dbee4a8aa2955d24baa6ce590f567fd8a044639487641fff575b69d6b04e2
|
||||
CVE-2024-25146,0,0,70580878c7e66c134303e82bf314a0ea51bb4c7efa77286154d103535edb2832,2024-11-21T09:00:20.870000
|
||||
CVE-2024-25147,0,0,84387167479e85437a489a3c440f913c2250ff97704942139aa39a68fe27bcc6,2024-11-21T09:00:21.010000
|
||||
CVE-2024-25148,0,0,baaba4bd1038fed5c1e9c1ed403cafba105c20610c41c31a35b866b1248f5d6d,2024-11-21T09:00:21.143000
|
||||
CVE-2024-25149,0,0,04b9d2424a206d9847edbab3d8b70b1199935dcf381076c6b352936ae0a85cf3,2024-11-21T09:00:21.293000
|
||||
CVE-2024-25149,0,1,c3bee153938ba2820767f603be3339e9a49705623e20e7321fe693091302456b,2024-12-10T23:03:54.853000
|
||||
CVE-2024-2515,0,0,44f3fa018c3519699334cca505032d6c5d3c8e2affb7c2ada212e4ff428377b2,2024-11-21T09:09:55.143000
|
||||
CVE-2024-25150,0,0,5aa15083b71af9814955e4db2bad49ef0137000d46664df6beaa1afdc2009fa9,2024-11-21T09:00:21.417000
|
||||
CVE-2024-25150,0,1,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000
|
||||
CVE-2024-25151,0,0,0b01c254dc10f34581a176a2dd1392ead139db1f1f92ec88900940bbbe02d51c,2024-11-21T09:00:21.530000
|
||||
CVE-2024-25152,0,0,c4883d942930ec99a7ece74f3181fc32c370260063ba88e828c32188ee6d7978,2024-11-21T09:00:21.653000
|
||||
CVE-2024-25153,0,0,28781d25e5c087d6ca5fbaa17986781f84cb0a151f81a7762bfeb961d739885f,2024-11-21T09:00:21.797000
|
||||
@ -249313,8 +249313,8 @@ CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a3597
|
||||
CVE-2024-25601,0,0,592b72e8287af6c7a3150c0f52361c80173956d1cbaa844c63524e684c186930,2024-11-21T09:01:03.450000
|
||||
CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9400,2024-11-21T09:01:03.573000
|
||||
CVE-2024-25603,0,0,6efc2ab54ea3be651c1cc1d95ba47da582406dbdf361cbfd55e80b7611a41412,2024-11-21T09:01:03.690000
|
||||
CVE-2024-25604,0,1,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
|
||||
CVE-2024-25605,0,1,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
|
||||
CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
|
||||
CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
|
||||
CVE-2024-25606,0,0,bde9b15898ae8e9ac91d25fcc0eaa7295bb6e28d0668446fd2e7868187bc749d,2024-11-21T09:01:04.087000
|
||||
CVE-2024-25607,0,0,92a9fb01b0a8ceee06add8818a4f6f32834dea0c68b94bc58e295449a80a9e8b,2024-11-21T09:01:04.213000
|
||||
CVE-2024-25608,0,0,7279c61e8730c275fdc995418fe07aa60ec60482b57bc6e0726dab12a2b3647c,2024-11-21T09:01:04.343000
|
||||
@ -249889,9 +249889,9 @@ CVE-2024-26268,0,0,23e044f877833d2fc9c6cb2791fea7f1b133aec4b8fae18bf04051ac445c2
|
||||
CVE-2024-26269,0,0,d870fd7aea3811009ab17d04f9dd1d54494e5857babaaa4dcaab41af1197170c,2024-11-21T09:02:16.430000
|
||||
CVE-2024-2627,0,0,de67bfac37d74088e8645fc2f654e4a2f29dfe354b1fc4a8ac77cbde5ca7bfda,2024-11-21T09:10:09.897000
|
||||
CVE-2024-26270,0,0,49db57e31c30404ffb3f7bccb6cb6e19533f6fa5e6e33873d874c52de8711e91,2024-11-21T09:02:16.553000
|
||||
CVE-2024-26271,0,1,f5e20f3e7ade7688c430ad4b5e84f0ca9756226805976c19d5b4529200159d1e,2024-12-10T21:07:04.467000
|
||||
CVE-2024-26272,0,1,58a64a22c48ee9a99d489ffa86f4aa8bb22502dcecbaf406b7d5815d612ddd8d,2024-12-10T21:07:02.180000
|
||||
CVE-2024-26273,0,1,3ee41ff0c2ea2c1b4a7735a51d1950b78cbd34107596c9cdbc77e1aa48114140,2024-12-10T21:07:07.587000
|
||||
CVE-2024-26271,0,0,f5e20f3e7ade7688c430ad4b5e84f0ca9756226805976c19d5b4529200159d1e,2024-12-10T21:07:04.467000
|
||||
CVE-2024-26272,0,0,58a64a22c48ee9a99d489ffa86f4aa8bb22502dcecbaf406b7d5815d612ddd8d,2024-12-10T21:07:02.180000
|
||||
CVE-2024-26273,0,0,3ee41ff0c2ea2c1b4a7735a51d1950b78cbd34107596c9cdbc77e1aa48114140,2024-12-10T21:07:07.587000
|
||||
CVE-2024-26275,0,0,7adf3b58cf07abc79b09e6a4e3ae91eec8606977c2d24583ab33b1ecfa27dc67,2024-11-21T09:02:17.087000
|
||||
CVE-2024-26276,0,0,2507a0d98d6e86bf82fb6c6e69a8d9b42268b993e1b77dacbb992126b34776dc,2024-11-21T09:02:17.223000
|
||||
CVE-2024-26277,0,0,883b80b0c2f142d921ae2a08f7c7ab6d81c3acfa65435daae1b7c2df6c5457f2,2024-11-21T09:02:17.347000
|
||||
@ -258695,7 +258695,7 @@ CVE-2024-37997,0,0,2006b990dbbb2069eddd0adaaf33aad8aa0cc21c743589acaa3ecc874870e
|
||||
CVE-2024-37998,0,0,dfd861d0b4df4e8d176ddf44fe3d2f2766e372fba153c1d9134a8a6bac6c195f,2024-11-21T09:24:40.713000
|
||||
CVE-2024-37999,0,0,902faf7d67489217cd37d263849f71c3123d5265d393df6999a24ac65f3049a9,2024-11-21T09:24:40.843000
|
||||
CVE-2024-3800,0,0,dfab3c406824ce0d4eb335e80feb62aa951ff12b204f0958a043e16218a90fc2,2024-11-21T09:30:25.690000
|
||||
CVE-2024-38002,0,1,0094626d4d749888df36614a8d2f1e1c8cae759add919cae9539858de17c7d9e,2024-12-10T21:06:57.970000
|
||||
CVE-2024-38002,0,0,0094626d4d749888df36614a8d2f1e1c8cae759add919cae9539858de17c7d9e,2024-12-10T21:06:57.970000
|
||||
CVE-2024-3801,0,0,0f8bfa58ad160c9f71633ed43875c383317300520d9a57afb022ce5659399045,2024-11-21T09:30:25.820000
|
||||
CVE-2024-38010,0,0,738538b21364387fdf533aba47443ed1eb58bd43ab96778d2e27a558178da55f,2024-11-21T09:24:41.133000
|
||||
CVE-2024-38011,0,0,36a42c1107d1e04c268b3d9879d9ba8cd10e71d7fb8849da71f609adece6ec99,2024-11-21T09:24:41.290000
|
||||
@ -262785,52 +262785,52 @@ CVE-2024-43702,0,0,026195b67973267c5f7e1b66b43eadfe3de1f0eaa8dad79a11b9df4d6c345
|
||||
CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61a86,2024-12-01T23:15:06.383000
|
||||
CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000
|
||||
CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000
|
||||
CVE-2024-43712,1,1,9ee48631a6c800619b6220970e4109eb3e24b302c90d74a7304d64274af05c08,2024-12-10T22:15:05.830000
|
||||
CVE-2024-43713,1,1,88956e95548256f6c441e123f3270b1fea317d031bbd101ad92b391bb25a18e2,2024-12-10T22:15:06.017000
|
||||
CVE-2024-43714,1,1,666f0d2462b8965622f2bce3e1536481448c0776ccb5be0162067dee976b3f8e,2024-12-10T22:15:06.200000
|
||||
CVE-2024-43715,1,1,40e6484d984150edb4ff88bf91b63943f5590c2eacd1a349b7ae86c49294189c,2024-12-10T22:15:06.377000
|
||||
CVE-2024-43716,1,1,07d0c20c4e1a2fa7a3b090c83bbc14eeb6af21216e32e6f9129956c8ae2fdbf9,2024-12-10T22:15:06.533000
|
||||
CVE-2024-43717,1,1,8c5304f4d78bbbcef5a32ae9021c13cb27a91dba45d8d57dcebd7def864f105d,2024-12-10T22:15:06.703000
|
||||
CVE-2024-43718,1,1,0ab5b1e3d3ace879d3623681441f70a779d5314e5c6f6389c1ff5e977a88a438,2024-12-10T22:15:06.860000
|
||||
CVE-2024-43719,1,1,9764b408538f848cead0dbf1069f4f60876464b760786acd334cf9fdc053a9f3,2024-12-10T22:15:07.010000
|
||||
CVE-2024-43712,0,0,9ee48631a6c800619b6220970e4109eb3e24b302c90d74a7304d64274af05c08,2024-12-10T22:15:05.830000
|
||||
CVE-2024-43713,0,0,88956e95548256f6c441e123f3270b1fea317d031bbd101ad92b391bb25a18e2,2024-12-10T22:15:06.017000
|
||||
CVE-2024-43714,0,0,666f0d2462b8965622f2bce3e1536481448c0776ccb5be0162067dee976b3f8e,2024-12-10T22:15:06.200000
|
||||
CVE-2024-43715,0,0,40e6484d984150edb4ff88bf91b63943f5590c2eacd1a349b7ae86c49294189c,2024-12-10T22:15:06.377000
|
||||
CVE-2024-43716,0,0,07d0c20c4e1a2fa7a3b090c83bbc14eeb6af21216e32e6f9129956c8ae2fdbf9,2024-12-10T22:15:06.533000
|
||||
CVE-2024-43717,0,0,8c5304f4d78bbbcef5a32ae9021c13cb27a91dba45d8d57dcebd7def864f105d,2024-12-10T22:15:06.703000
|
||||
CVE-2024-43718,0,0,0ab5b1e3d3ace879d3623681441f70a779d5314e5c6f6389c1ff5e977a88a438,2024-12-10T22:15:06.860000
|
||||
CVE-2024-43719,0,0,9764b408538f848cead0dbf1069f4f60876464b760786acd334cf9fdc053a9f3,2024-12-10T22:15:07.010000
|
||||
CVE-2024-4372,0,0,80047d29f24899dba9fb9823b96bdeb83dfdd1716f145c555f0448a73bb4cc01,2024-11-21T09:42:43.207000
|
||||
CVE-2024-43720,1,1,76928c5ef0db8034461437c52b5e02bc4ab89b62901520cc068aaecd2e3bd7e1,2024-12-10T22:15:07.160000
|
||||
CVE-2024-43721,1,1,1d14669fb2267cca251017e411673fc0a5df2b6fd792dc42405d131907e00156,2024-12-10T22:15:07.310000
|
||||
CVE-2024-43722,1,1,4026577d9c2c5d0a91c4a01d11148854c0f7c886ab80408495ce0328beeb76e2,2024-12-10T22:15:07.500000
|
||||
CVE-2024-43723,1,1,a882053d237d18e0e8eefe2d71e82c0a14d443b202d47a33a30e3e8adbf3bfa5,2024-12-10T22:15:07.663000
|
||||
CVE-2024-43724,1,1,3763064ce7e37065a077ec6473a10ccc04397cda18e7c8c86f86b3ae8f2db6df,2024-12-10T22:15:07.827000
|
||||
CVE-2024-43725,1,1,b99691726340b14dfc9dd0a0f49db5e6762d480ba8b60b38feeec8069cdfb7e0,2024-12-10T22:15:07.987000
|
||||
CVE-2024-43726,1,1,00d012e8bd070b6cdc9c1783a3576c3cf39050d3d6de64779d2c2dc095eb4d11,2024-12-10T22:15:08.170000
|
||||
CVE-2024-43727,1,1,39302cc38bcac03174fffb97dd3d3a6d80358a26c96b3ce45b836ad145d7c9e1,2024-12-10T22:15:08.330000
|
||||
CVE-2024-43728,1,1,c80985dd09e7ad8e39033d40eab120361ef4cd20028c9141a119799a6de9cb56,2024-12-10T22:15:08.500000
|
||||
CVE-2024-43729,1,1,adb8cec74aefe4e2cfc467a901674867119c5db8a8c5ed8279b28d237247afbb,2024-12-10T22:15:08.653000
|
||||
CVE-2024-43720,0,0,76928c5ef0db8034461437c52b5e02bc4ab89b62901520cc068aaecd2e3bd7e1,2024-12-10T22:15:07.160000
|
||||
CVE-2024-43721,0,0,1d14669fb2267cca251017e411673fc0a5df2b6fd792dc42405d131907e00156,2024-12-10T22:15:07.310000
|
||||
CVE-2024-43722,0,0,4026577d9c2c5d0a91c4a01d11148854c0f7c886ab80408495ce0328beeb76e2,2024-12-10T22:15:07.500000
|
||||
CVE-2024-43723,0,0,a882053d237d18e0e8eefe2d71e82c0a14d443b202d47a33a30e3e8adbf3bfa5,2024-12-10T22:15:07.663000
|
||||
CVE-2024-43724,0,0,3763064ce7e37065a077ec6473a10ccc04397cda18e7c8c86f86b3ae8f2db6df,2024-12-10T22:15:07.827000
|
||||
CVE-2024-43725,0,0,b99691726340b14dfc9dd0a0f49db5e6762d480ba8b60b38feeec8069cdfb7e0,2024-12-10T22:15:07.987000
|
||||
CVE-2024-43726,0,0,00d012e8bd070b6cdc9c1783a3576c3cf39050d3d6de64779d2c2dc095eb4d11,2024-12-10T22:15:08.170000
|
||||
CVE-2024-43727,0,0,39302cc38bcac03174fffb97dd3d3a6d80358a26c96b3ce45b836ad145d7c9e1,2024-12-10T22:15:08.330000
|
||||
CVE-2024-43728,0,0,c80985dd09e7ad8e39033d40eab120361ef4cd20028c9141a119799a6de9cb56,2024-12-10T22:15:08.500000
|
||||
CVE-2024-43729,0,0,adb8cec74aefe4e2cfc467a901674867119c5db8a8c5ed8279b28d237247afbb,2024-12-10T22:15:08.653000
|
||||
CVE-2024-4373,0,0,90a0bc6a003143c6727c6fb96559f1f531614f51612ca46e3d9865e65abf33ed,2024-11-21T09:42:43.307000
|
||||
CVE-2024-43730,1,1,554b1f9dd4303d16e148076363d22a5eaf6cd3919eca15f869c24534b3e41a85,2024-12-10T22:15:08.800000
|
||||
CVE-2024-43731,1,1,618b4905d50c5a0f9653dc2d108ad6dbef8dcb1c3da71a8e0ab10155221c1c24,2024-12-10T22:15:08.953000
|
||||
CVE-2024-43732,1,1,16f50ba3e588ed01ca62ccb83b3016c041510ef147ba4e1eb16e8a57578344ec,2024-12-10T22:15:09.130000
|
||||
CVE-2024-43733,1,1,8a2211464cd02d7d0b3b54ac4e6e1bb3e3daabe02b23e820e01a3134f70c7b70,2024-12-10T22:15:09.330000
|
||||
CVE-2024-43734,1,1,5cf55b57e5738f86b87bbf2f8c7946ec3009db6f917dff7efaa176e79862b48b,2024-12-10T22:15:09.507000
|
||||
CVE-2024-43735,1,1,3de86dad72105c21814c232ac1ef9a581d3117e305e89a6a34fb420fef13f244,2024-12-10T22:15:09.670000
|
||||
CVE-2024-43736,1,1,3bd86a8f7c02c75b998104c9d43a9b6ec3fe6cbe8f381abaf6fa63a2a0b7d5ac,2024-12-10T22:15:09.840000
|
||||
CVE-2024-43737,1,1,2de6a61b4b618b9aeb86d6d56b2c66702cf2bc626d9e8e3bb1c75c86799d1cfb,2024-12-10T22:15:09.990000
|
||||
CVE-2024-43738,1,1,cf243843202dfab5a56a12222bca23d48fee7cc9c3056586bd57879f9e07aaa1,2024-12-10T22:15:10.153000
|
||||
CVE-2024-43739,1,1,49b94328668b277f5692616ddd2ee3143ee106234cbb03ec090baea1fcd6519e,2024-12-10T22:15:10.320000
|
||||
CVE-2024-43730,0,0,554b1f9dd4303d16e148076363d22a5eaf6cd3919eca15f869c24534b3e41a85,2024-12-10T22:15:08.800000
|
||||
CVE-2024-43731,0,0,618b4905d50c5a0f9653dc2d108ad6dbef8dcb1c3da71a8e0ab10155221c1c24,2024-12-10T22:15:08.953000
|
||||
CVE-2024-43732,0,0,16f50ba3e588ed01ca62ccb83b3016c041510ef147ba4e1eb16e8a57578344ec,2024-12-10T22:15:09.130000
|
||||
CVE-2024-43733,0,0,8a2211464cd02d7d0b3b54ac4e6e1bb3e3daabe02b23e820e01a3134f70c7b70,2024-12-10T22:15:09.330000
|
||||
CVE-2024-43734,0,0,5cf55b57e5738f86b87bbf2f8c7946ec3009db6f917dff7efaa176e79862b48b,2024-12-10T22:15:09.507000
|
||||
CVE-2024-43735,0,0,3de86dad72105c21814c232ac1ef9a581d3117e305e89a6a34fb420fef13f244,2024-12-10T22:15:09.670000
|
||||
CVE-2024-43736,0,0,3bd86a8f7c02c75b998104c9d43a9b6ec3fe6cbe8f381abaf6fa63a2a0b7d5ac,2024-12-10T22:15:09.840000
|
||||
CVE-2024-43737,0,0,2de6a61b4b618b9aeb86d6d56b2c66702cf2bc626d9e8e3bb1c75c86799d1cfb,2024-12-10T22:15:09.990000
|
||||
CVE-2024-43738,0,0,cf243843202dfab5a56a12222bca23d48fee7cc9c3056586bd57879f9e07aaa1,2024-12-10T22:15:10.153000
|
||||
CVE-2024-43739,0,0,49b94328668b277f5692616ddd2ee3143ee106234cbb03ec090baea1fcd6519e,2024-12-10T22:15:10.320000
|
||||
CVE-2024-4374,0,0,0fc50b1de94238d83b826da2552010ff2a72cfbd8cd99e9aecee9f37433a6dbd,2024-11-21T09:42:43.410000
|
||||
CVE-2024-43740,1,1,c42a7cb58a34fe645b4e8ba4fa4f8195739fe32fc629b332138fc00fdc3d2eaa,2024-12-10T22:15:10.480000
|
||||
CVE-2024-43742,1,1,3626c593ea81e22089939d8eac91324d283bf7ae758a9ddc4900be70cdbb89bb,2024-12-10T22:15:10.633000
|
||||
CVE-2024-43743,1,1,30d50929f9185598230408f40fefb5ac6acf1ca6df5d52dec9f2959ea925a099,2024-12-10T22:15:10.787000
|
||||
CVE-2024-43744,1,1,a2c80a04a2d0b0708514970dd2adae417c720657458d50b19d922560cb75bea5,2024-12-10T22:15:10.950000
|
||||
CVE-2024-43745,1,1,b4e07d49a252d0ab5d4b47d0387e1c0cc24d59ba34f7c05c774af898ebab4667,2024-12-10T22:15:11.110000
|
||||
CVE-2024-43746,1,1,2da115c92ba05ae13896d0a270473a809ddb02762d8bd8a1e96866e650ebfc75,2024-12-10T22:15:11.277000
|
||||
CVE-2024-43747,1,1,e6cb69f695b1a963b1cc982b1f1849f12c9404b32a2f4dccf9b1006f06626cfa,2024-12-10T22:15:11.440000
|
||||
CVE-2024-43748,1,1,70a7a62895d4866bcda6fbe965b30937af6854c16b6c23de9c20cc6466631add,2024-12-10T22:15:11.597000
|
||||
CVE-2024-43749,1,1,035809cd32c66ba2d3808ce1bf38a99f7a6a8179f1fa29c433623b873f955924,2024-12-10T22:15:11.763000
|
||||
CVE-2024-43740,0,0,c42a7cb58a34fe645b4e8ba4fa4f8195739fe32fc629b332138fc00fdc3d2eaa,2024-12-10T22:15:10.480000
|
||||
CVE-2024-43742,0,0,3626c593ea81e22089939d8eac91324d283bf7ae758a9ddc4900be70cdbb89bb,2024-12-10T22:15:10.633000
|
||||
CVE-2024-43743,0,0,30d50929f9185598230408f40fefb5ac6acf1ca6df5d52dec9f2959ea925a099,2024-12-10T22:15:10.787000
|
||||
CVE-2024-43744,0,0,a2c80a04a2d0b0708514970dd2adae417c720657458d50b19d922560cb75bea5,2024-12-10T22:15:10.950000
|
||||
CVE-2024-43745,0,0,b4e07d49a252d0ab5d4b47d0387e1c0cc24d59ba34f7c05c774af898ebab4667,2024-12-10T22:15:11.110000
|
||||
CVE-2024-43746,0,0,2da115c92ba05ae13896d0a270473a809ddb02762d8bd8a1e96866e650ebfc75,2024-12-10T22:15:11.277000
|
||||
CVE-2024-43747,0,0,e6cb69f695b1a963b1cc982b1f1849f12c9404b32a2f4dccf9b1006f06626cfa,2024-12-10T22:15:11.440000
|
||||
CVE-2024-43748,0,0,70a7a62895d4866bcda6fbe965b30937af6854c16b6c23de9c20cc6466631add,2024-12-10T22:15:11.597000
|
||||
CVE-2024-43749,0,0,035809cd32c66ba2d3808ce1bf38a99f7a6a8179f1fa29c433623b873f955924,2024-12-10T22:15:11.763000
|
||||
CVE-2024-4375,0,0,226fb639a4436df6c70ad0c0a2a37d985a688254ed5b66b084e0fcdf89f3a83f,2024-11-21T09:42:43.523000
|
||||
CVE-2024-43750,1,1,5ff2bfa8f71453312fdcd917de2a161927bb75aec34801406c9417234bcaa687,2024-12-10T22:15:11.913000
|
||||
CVE-2024-43751,1,1,3884ff7ef488e7bbf2ab6953f704cfc41f1ed4521198206ecbe782828399e93b,2024-12-10T22:15:12.057000
|
||||
CVE-2024-43752,1,1,ba2dd2eda9200d8f82d846378bdcc47ad8ef5b6b8cbc72dd3e5f07ec22d3d559,2024-12-10T22:15:12.203000
|
||||
CVE-2024-43754,1,1,5798001f2eace304b743b28c8777db35d8d6bf4097d149a34408e50277858bd8,2024-12-10T22:15:12.343000
|
||||
CVE-2024-43755,1,1,220e68bab73625cee39348db067804689cbea3cc00850eb811f1343d1aeb2a7b,2024-12-10T22:15:12.507000
|
||||
CVE-2024-43750,0,0,5ff2bfa8f71453312fdcd917de2a161927bb75aec34801406c9417234bcaa687,2024-12-10T22:15:11.913000
|
||||
CVE-2024-43751,0,0,3884ff7ef488e7bbf2ab6953f704cfc41f1ed4521198206ecbe782828399e93b,2024-12-10T22:15:12.057000
|
||||
CVE-2024-43752,0,0,ba2dd2eda9200d8f82d846378bdcc47ad8ef5b6b8cbc72dd3e5f07ec22d3d559,2024-12-10T22:15:12.203000
|
||||
CVE-2024-43754,0,0,5798001f2eace304b743b28c8777db35d8d6bf4097d149a34408e50277858bd8,2024-12-10T22:15:12.343000
|
||||
CVE-2024-43755,0,0,220e68bab73625cee39348db067804689cbea3cc00850eb811f1343d1aeb2a7b,2024-12-10T22:15:12.507000
|
||||
CVE-2024-43756,0,0,574012d52ba61623896d593dde944e97d1e4486f17b00226542a0b61b33f8b0d,2024-09-13T17:00:59.890000
|
||||
CVE-2024-43758,0,0,572e17c14d16efa1d490120c56ed34a19c6fc103a35ebd610b716ea536d9632d,2024-09-13T17:27:33.230000
|
||||
CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000
|
||||
@ -263754,8 +263754,8 @@ CVE-2024-4515,0,0,7504024f77fc639532586006edbcd7df35e7f34ba56f61d68d467513e18a66
|
||||
CVE-2024-45150,0,0,95b51ecadaebd1691fb6d0830c72849a15d157444cecbdab2e0bb3fba208f418,2024-10-18T14:35:32.140000
|
||||
CVE-2024-45152,0,0,078be3b278fe562a83e4cffd61092d0b3a581e3cb96347e3601fbbc38485ff00,2024-10-18T14:41:51.683000
|
||||
CVE-2024-45153,0,0,fbfef51b891369d8b4535dbd73c5037c896ececfed8b242bc1453c48af4b8df5,2024-12-02T22:44:29.430000
|
||||
CVE-2024-45155,1,1,91bfa5e04c5eb2f4e380705bd73ab70bce386f8d80e6e498ed0a8564bf2c613b,2024-12-10T21:15:15.983000
|
||||
CVE-2024-45156,1,1,393e553077f143d91adf4733a682f0adbf93d392b916d327253f5b4a77c3d538,2024-12-10T21:15:16.137000
|
||||
CVE-2024-45155,0,0,91bfa5e04c5eb2f4e380705bd73ab70bce386f8d80e6e498ed0a8564bf2c613b,2024-12-10T21:15:15.983000
|
||||
CVE-2024-45156,0,0,393e553077f143d91adf4733a682f0adbf93d392b916d327253f5b4a77c3d538,2024-12-10T21:15:16.137000
|
||||
CVE-2024-45157,0,0,a69b06d34ddf029527ac0ac1fe5b34d92807642f681ef6bd757e92f99741f827,2024-09-12T16:29:42.717000
|
||||
CVE-2024-45158,0,0,3f9bce1afa9a77d0a545f8d7bc11dfbcc4df3d1e21a774f7f4e024057033de58,2024-09-06T19:35:26.390000
|
||||
CVE-2024-45159,0,0,6443b31bd8a87954adf636c6caa04225967184f7d72f05db7c10765203afb376,2024-09-19T18:26:24.687000
|
||||
@ -266355,7 +266355,7 @@ CVE-2024-49509,0,0,15e897a9631a64e5146680986f3191fcf788babf34f3f0ba79ae3fe2c381d
|
||||
CVE-2024-49510,0,0,fe711f4c1936cc4d1c1a59bfdb147d64db234c5a51b851c0183ceb3b562d496d,2024-11-16T00:35:01.073000
|
||||
CVE-2024-49511,0,0,c1a397163534f4b11a270038019b332581e67fda877ef20583e441a6f830b9d0,2024-11-16T00:34:33.607000
|
||||
CVE-2024-49512,0,0,02ef47bf10e6dce59ce4befda9ee5100105274d34a60a4569c66eb776013d5cb,2024-11-16T00:34:20.890000
|
||||
CVE-2024-49513,1,1,f2e4fe215006d0241ece39a7212b8e68a1ac71e5d832e3383127ee041cc059a9,2024-12-10T21:15:16.343000
|
||||
CVE-2024-49513,0,0,f2e4fe215006d0241ece39a7212b8e68a1ac71e5d832e3383127ee041cc059a9,2024-12-10T21:15:16.343000
|
||||
CVE-2024-49514,0,0,168a9134372c0d9a29fab9f489e9694c2368c05c346e3fe45209179b57524370,2024-11-18T18:06:39.030000
|
||||
CVE-2024-49515,0,0,4ad3af5f10e18882a5a32566a0bec8998bc31a66f706415135803550e7f84b15,2024-11-13T19:14:24.320000
|
||||
CVE-2024-49516,0,0,44da5d94482e4b65792e0d29a7ef15205438256f74e207e521457b4cb0fb7589,2024-11-13T18:52:31.573000
|
||||
@ -266379,17 +266379,17 @@ CVE-2024-49533,0,0,75968618599fd3437292a06f84769b4df1570448be7e5d716f073cc32a878
|
||||
CVE-2024-49534,0,0,2de7ddeb964d1e2f1108f1d599e0866d435c778aa898e98642e7d656c11b74cf,2024-12-10T20:15:18.743000
|
||||
CVE-2024-49535,0,0,e52b71be2403d7e7c7ec6df87555241b12f0d6af2e7ed28d403cc9e5574871ea,2024-12-10T20:15:18.923000
|
||||
CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000
|
||||
CVE-2024-49537,1,1,9069a21f9ad82f63c2008fa214d1f0de46072a9dfd4ccd673ef0f8c9a149a49e,2024-12-10T21:15:16.500000
|
||||
CVE-2024-49538,1,1,81e85541e5661b26b50f4faa760250dc680859c0e56bb2cdf63fb912d594cf0a,2024-12-10T21:15:16.650000
|
||||
CVE-2024-49541,1,1,6c831ac9f6a3d11b676851a3d48c47166db3deef8bf35cccb4c42727ed1f24c2,2024-12-10T21:15:16.793000
|
||||
CVE-2024-49543,1,1,924475ae14f5d8ac0778b81265b81215ae6e2e70c39ad4176421ee7522bfb47e,2024-12-10T21:15:16.937000
|
||||
CVE-2024-49544,1,1,4ad36cc37598ffc2500960ab3589eedde9fbfb4be99d63a99a410eb31f285cb3,2024-12-10T21:15:17.073000
|
||||
CVE-2024-49545,1,1,4388025dcd940fca76d7eb8cf825b27e42f62038077b655f252866452a814b21,2024-12-10T21:15:17.220000
|
||||
CVE-2024-49546,1,1,3fa6d3ea3e007d50bb60e9761b11c951037efca9d325db42c8cdc612d790891e,2024-12-10T21:15:17.350000
|
||||
CVE-2024-49547,1,1,42cbe1a8169f080c60083e78853a43df10036fc439fec11e8c9fbb6ee3bc7ade,2024-12-10T21:15:17.483000
|
||||
CVE-2024-49548,1,1,d15d7a4ef91d0628ddda6e603a3bee21c45696be5f379adad00ea725e1a1245e,2024-12-10T21:15:17.617000
|
||||
CVE-2024-49549,1,1,fde806fc727424d2a36b3e057dc22c4803c1ce162cbcff5dca073789456a2c1e,2024-12-10T21:15:17.753000
|
||||
CVE-2024-49550,1,1,05badb1c283042dac26c35d1bdd2b9cbec87de216b529b66dd1d3cafdffb27e9,2024-12-10T21:15:17.903000
|
||||
CVE-2024-49537,0,0,9069a21f9ad82f63c2008fa214d1f0de46072a9dfd4ccd673ef0f8c9a149a49e,2024-12-10T21:15:16.500000
|
||||
CVE-2024-49538,0,0,81e85541e5661b26b50f4faa760250dc680859c0e56bb2cdf63fb912d594cf0a,2024-12-10T21:15:16.650000
|
||||
CVE-2024-49541,0,0,6c831ac9f6a3d11b676851a3d48c47166db3deef8bf35cccb4c42727ed1f24c2,2024-12-10T21:15:16.793000
|
||||
CVE-2024-49543,0,0,924475ae14f5d8ac0778b81265b81215ae6e2e70c39ad4176421ee7522bfb47e,2024-12-10T21:15:16.937000
|
||||
CVE-2024-49544,0,0,4ad36cc37598ffc2500960ab3589eedde9fbfb4be99d63a99a410eb31f285cb3,2024-12-10T21:15:17.073000
|
||||
CVE-2024-49545,0,0,4388025dcd940fca76d7eb8cf825b27e42f62038077b655f252866452a814b21,2024-12-10T21:15:17.220000
|
||||
CVE-2024-49546,0,0,3fa6d3ea3e007d50bb60e9761b11c951037efca9d325db42c8cdc612d790891e,2024-12-10T21:15:17.350000
|
||||
CVE-2024-49547,0,0,42cbe1a8169f080c60083e78853a43df10036fc439fec11e8c9fbb6ee3bc7ade,2024-12-10T21:15:17.483000
|
||||
CVE-2024-49548,0,0,d15d7a4ef91d0628ddda6e603a3bee21c45696be5f379adad00ea725e1a1245e,2024-12-10T21:15:17.617000
|
||||
CVE-2024-49549,0,0,fde806fc727424d2a36b3e057dc22c4803c1ce162cbcff5dca073789456a2c1e,2024-12-10T21:15:17.753000
|
||||
CVE-2024-49550,0,0,05badb1c283042dac26c35d1bdd2b9cbec87de216b529b66dd1d3cafdffb27e9,2024-12-10T21:15:17.903000
|
||||
CVE-2024-49551,0,0,9445123a9c53b54d733fa08f43beb18f2ce6084e52ab61a7d528ad5ab92d83ca,2024-12-10T20:15:19.110000
|
||||
CVE-2024-49552,0,0,012ff5acfeb4e368169fa593e29c252993e80910ce98090bc36411dfd72cd242,2024-12-10T20:15:19.297000
|
||||
CVE-2024-49553,0,0,0ee5fb71153e208c0ba26614c22b2b1366f3826855b9b3b8fb41e8c5ca08636a,2024-12-10T20:15:19.530000
|
||||
@ -268555,56 +268555,56 @@ CVE-2024-52810,0,0,bc519c3395fca90f2847180bace5d2bd61f10ead143c379d0438b1982cdf8
|
||||
CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000
|
||||
CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000
|
||||
CVE-2024-52815,0,0,c1e8fde97970f9249cef290754120e31a2a9f9b91031232cee085d5724ae3d3e,2024-12-03T17:15:12.267000
|
||||
CVE-2024-52816,1,1,9cd2f301c6ad090e9d7c870bdf8f9fb2cdad0c6ad494c1f4c7311d6427b21b93,2024-12-10T22:15:13.527000
|
||||
CVE-2024-52817,1,1,a2afad4adbb58fe46e8180fd8fcf21dbe3bc4a25fe48e063062835e55e702b15,2024-12-10T22:15:13.703000
|
||||
CVE-2024-52818,1,1,c591d3cdd4b4dff4dbb430e663018e6f0482cebb5a15b0e56af6bf8ebf53b92e,2024-12-10T22:15:13.870000
|
||||
CVE-2024-52816,0,0,9cd2f301c6ad090e9d7c870bdf8f9fb2cdad0c6ad494c1f4c7311d6427b21b93,2024-12-10T22:15:13.527000
|
||||
CVE-2024-52817,0,0,a2afad4adbb58fe46e8180fd8fcf21dbe3bc4a25fe48e063062835e55e702b15,2024-12-10T22:15:13.703000
|
||||
CVE-2024-52818,0,0,c591d3cdd4b4dff4dbb430e663018e6f0482cebb5a15b0e56af6bf8ebf53b92e,2024-12-10T22:15:13.870000
|
||||
CVE-2024-5282,0,0,4f51eeaed389eb920a9aeb3a8c1e7ea5a9931768c3b7eb6744dae1b0adac061c,2024-11-21T09:47:20.920000
|
||||
CVE-2024-52822,1,1,22387ebff73677ed4f22b111a4ee51601ee1201ceeb655c0752c8406dc17c0a9,2024-12-10T22:15:14.070000
|
||||
CVE-2024-52823,1,1,7021b3fcf4d4b0f71b69ecbe3da196d9cf95c1e44a4eb8efbc8526196469adcd,2024-12-10T22:15:14.223000
|
||||
CVE-2024-52824,1,1,1673a49210295a6fc082a70b6b56c4788aaf535d6c6f3e943289e352f3685054,2024-12-10T22:15:14.367000
|
||||
CVE-2024-52825,1,1,03a6f20a540fbfe10cdbb4208bc17b62c1b1164aeb084113ee07584f80a47d41,2024-12-10T22:15:14.523000
|
||||
CVE-2024-52826,1,1,eb36d0c5f25dce1e2da616d7f54aafa0f8ce1b6b1f356d5ddb388243c8394811,2024-12-10T22:15:14.687000
|
||||
CVE-2024-52827,1,1,ce6b5b33bf3e549364019f6a6df626ca03e15278b76c16543c0963f403e8cdfc,2024-12-10T22:15:14.860000
|
||||
CVE-2024-52828,1,1,ffc66369dd2cff4e7a711b14587329d3250b0469537555be32472488a634a8b4,2024-12-10T22:15:15.027000
|
||||
CVE-2024-52829,1,1,e888ccf25e1c2fd2ad6e4e0d09e84cd8942e9d25c855d328ed23fe106093daa1,2024-12-10T22:15:15.173000
|
||||
CVE-2024-52822,0,0,22387ebff73677ed4f22b111a4ee51601ee1201ceeb655c0752c8406dc17c0a9,2024-12-10T22:15:14.070000
|
||||
CVE-2024-52823,0,0,7021b3fcf4d4b0f71b69ecbe3da196d9cf95c1e44a4eb8efbc8526196469adcd,2024-12-10T22:15:14.223000
|
||||
CVE-2024-52824,0,0,1673a49210295a6fc082a70b6b56c4788aaf535d6c6f3e943289e352f3685054,2024-12-10T22:15:14.367000
|
||||
CVE-2024-52825,0,0,03a6f20a540fbfe10cdbb4208bc17b62c1b1164aeb084113ee07584f80a47d41,2024-12-10T22:15:14.523000
|
||||
CVE-2024-52826,0,0,eb36d0c5f25dce1e2da616d7f54aafa0f8ce1b6b1f356d5ddb388243c8394811,2024-12-10T22:15:14.687000
|
||||
CVE-2024-52827,0,0,ce6b5b33bf3e549364019f6a6df626ca03e15278b76c16543c0963f403e8cdfc,2024-12-10T22:15:14.860000
|
||||
CVE-2024-52828,0,0,ffc66369dd2cff4e7a711b14587329d3250b0469537555be32472488a634a8b4,2024-12-10T22:15:15.027000
|
||||
CVE-2024-52829,0,0,e888ccf25e1c2fd2ad6e4e0d09e84cd8942e9d25c855d328ed23fe106093daa1,2024-12-10T22:15:15.173000
|
||||
CVE-2024-5283,0,0,2e4c0e59b537a1fa6ef21044d27ad6c5c503d962bc23f2bfaaea7d6483dfc4a1,2024-11-21T09:47:21.083000
|
||||
CVE-2024-52830,1,1,19f7903b85c1532a422d34d1e9861acaf8c14a85bc7b10106fd28adb2bebffeb,2024-12-10T22:15:15.333000
|
||||
CVE-2024-52831,1,1,dc7f0b41c9248d2c032245d59bb15968be8ce0e9e78696545855e3a8a31b7cd6,2024-12-10T22:15:15.533000
|
||||
CVE-2024-52832,1,1,6b0fb930aba7a58c1e47c5feada2dbce541cb9afb931929d1787e423ebefe1cc,2024-12-10T22:15:18.100000
|
||||
CVE-2024-52833,1,1,f775271d8e1525ec1c720a874d9c56a107552706da04f4612742afe3d52f10c8,2024-12-10T22:15:18.250000
|
||||
CVE-2024-52834,1,1,e77f5eb9f7764d2efe0114af11137e65b77270553d3af3f3f047b1f77e63425e,2024-12-10T22:15:18.393000
|
||||
CVE-2024-52835,1,1,336545064d1861dc9ff401e157d88f4c988d4e832514b89199b784a4f850e6b2,2024-12-10T22:15:18.540000
|
||||
CVE-2024-52836,1,1,8407be9e351ce90331d0d6a24be87ca97a8e9d22a835c5172b2ad8d4b473b3a3,2024-12-10T22:15:18.687000
|
||||
CVE-2024-52837,1,1,f324dc392916019d8f6d706a98650bd28f14995ee2f27f21edb92de12ff1ebab,2024-12-10T22:15:18.850000
|
||||
CVE-2024-52838,1,1,aa684fb4dc0e6a326bb6932006784d5d9804e348a05a2fbff4b983ada57c3d15,2024-12-10T22:15:19
|
||||
CVE-2024-52839,1,1,8fc042291bf4fd05aceb42a32c171ba44e7085e1c28e888235ab14771202447e,2024-12-10T22:15:19.150000
|
||||
CVE-2024-52830,0,0,19f7903b85c1532a422d34d1e9861acaf8c14a85bc7b10106fd28adb2bebffeb,2024-12-10T22:15:15.333000
|
||||
CVE-2024-52831,0,0,dc7f0b41c9248d2c032245d59bb15968be8ce0e9e78696545855e3a8a31b7cd6,2024-12-10T22:15:15.533000
|
||||
CVE-2024-52832,0,0,6b0fb930aba7a58c1e47c5feada2dbce541cb9afb931929d1787e423ebefe1cc,2024-12-10T22:15:18.100000
|
||||
CVE-2024-52833,0,0,f775271d8e1525ec1c720a874d9c56a107552706da04f4612742afe3d52f10c8,2024-12-10T22:15:18.250000
|
||||
CVE-2024-52834,0,0,e77f5eb9f7764d2efe0114af11137e65b77270553d3af3f3f047b1f77e63425e,2024-12-10T22:15:18.393000
|
||||
CVE-2024-52835,0,0,336545064d1861dc9ff401e157d88f4c988d4e832514b89199b784a4f850e6b2,2024-12-10T22:15:18.540000
|
||||
CVE-2024-52836,0,0,8407be9e351ce90331d0d6a24be87ca97a8e9d22a835c5172b2ad8d4b473b3a3,2024-12-10T22:15:18.687000
|
||||
CVE-2024-52837,0,0,f324dc392916019d8f6d706a98650bd28f14995ee2f27f21edb92de12ff1ebab,2024-12-10T22:15:18.850000
|
||||
CVE-2024-52838,0,0,aa684fb4dc0e6a326bb6932006784d5d9804e348a05a2fbff4b983ada57c3d15,2024-12-10T22:15:19
|
||||
CVE-2024-52839,0,0,8fc042291bf4fd05aceb42a32c171ba44e7085e1c28e888235ab14771202447e,2024-12-10T22:15:19.150000
|
||||
CVE-2024-5284,0,0,f27d035f8fcaa3c5dd2f39806299edcb6edf39605d373e0e7746729a950daa3c,2024-11-21T09:47:21.243000
|
||||
CVE-2024-52840,1,1,2ef05a7a1d4726aad93ff9927589eabbf69b8713394ec8276c85ad82a3a7a449,2024-12-10T22:15:19.297000
|
||||
CVE-2024-52841,1,1,7acf477452bda97d064d1f98fc400d370a895937ed08c14a6ceca91683f11675,2024-12-10T22:15:19.440000
|
||||
CVE-2024-52842,1,1,bc90bac451465cd8dde720d278c7d7d0ed9441f2cf253864e85e5ad2a9dc6295,2024-12-10T22:15:19.593000
|
||||
CVE-2024-52843,1,1,bef2831b52c31d865a5ccd34b6cc1e0f39d83f33e4f43802f0ef6d3504564364,2024-12-10T22:15:19.737000
|
||||
CVE-2024-52844,1,1,523d68c9040a71f7d53514ced8d09219880f2d34b2fa425b43088225a2bd7af6,2024-12-10T22:15:19.900000
|
||||
CVE-2024-52845,1,1,a63f3fa33ec8d8f293b8bee7a9828fc08a4d3c85538b914dddaf573eb5e83101,2024-12-10T22:15:20.040000
|
||||
CVE-2024-52846,1,1,e9ebde3d1908d2c426b776cca864e3a2491e837a0a578ef32e077f554f7250d7,2024-12-10T22:15:20.197000
|
||||
CVE-2024-52847,1,1,109507e52d56b83ccc80c4de9f9174f0399ce85dd73fc5f5694e7651193d8d58,2024-12-10T22:15:20.340000
|
||||
CVE-2024-52848,1,1,cb65185dccae884335aad1f12c57c4bb19ee27520fe7c74b5ba8d1ea27b26435,2024-12-10T22:15:20.483000
|
||||
CVE-2024-52849,1,1,b351c123633b435c42646f208c9b7e12281b00f61b5c1ac683652c2ddc266070,2024-12-10T22:15:20.640000
|
||||
CVE-2024-52840,0,0,2ef05a7a1d4726aad93ff9927589eabbf69b8713394ec8276c85ad82a3a7a449,2024-12-10T22:15:19.297000
|
||||
CVE-2024-52841,0,0,7acf477452bda97d064d1f98fc400d370a895937ed08c14a6ceca91683f11675,2024-12-10T22:15:19.440000
|
||||
CVE-2024-52842,0,0,bc90bac451465cd8dde720d278c7d7d0ed9441f2cf253864e85e5ad2a9dc6295,2024-12-10T22:15:19.593000
|
||||
CVE-2024-52843,0,0,bef2831b52c31d865a5ccd34b6cc1e0f39d83f33e4f43802f0ef6d3504564364,2024-12-10T22:15:19.737000
|
||||
CVE-2024-52844,0,0,523d68c9040a71f7d53514ced8d09219880f2d34b2fa425b43088225a2bd7af6,2024-12-10T22:15:19.900000
|
||||
CVE-2024-52845,0,0,a63f3fa33ec8d8f293b8bee7a9828fc08a4d3c85538b914dddaf573eb5e83101,2024-12-10T22:15:20.040000
|
||||
CVE-2024-52846,0,0,e9ebde3d1908d2c426b776cca864e3a2491e837a0a578ef32e077f554f7250d7,2024-12-10T22:15:20.197000
|
||||
CVE-2024-52847,0,0,109507e52d56b83ccc80c4de9f9174f0399ce85dd73fc5f5694e7651193d8d58,2024-12-10T22:15:20.340000
|
||||
CVE-2024-52848,0,0,cb65185dccae884335aad1f12c57c4bb19ee27520fe7c74b5ba8d1ea27b26435,2024-12-10T22:15:20.483000
|
||||
CVE-2024-52849,0,0,b351c123633b435c42646f208c9b7e12281b00f61b5c1ac683652c2ddc266070,2024-12-10T22:15:20.640000
|
||||
CVE-2024-5285,0,0,25a8229cdfa4e13254dd0951e315a68edbe7ddfe1ffb4dedc6bf2138cc2fad8f,2024-11-21T09:47:21.403000
|
||||
CVE-2024-52850,1,1,c61d8c15323f5fe60a6bb33ff0b4523c95ca577ef372ce4e493befa517294c81,2024-12-10T22:15:20.783000
|
||||
CVE-2024-52851,1,1,5c7c472ab454ae08b0d4ac83b0e5ef9b32b8d2c0f6d4083fc6598ae0f25fc294,2024-12-10T22:15:20.917000
|
||||
CVE-2024-52852,1,1,74f02244650cea9b338bf8c6b77a0129125ca442d662b4c2bf9f2b45f871c052,2024-12-10T22:15:21.060000
|
||||
CVE-2024-52853,1,1,e7458c1ef49ccf0d8ea1ba998c86b437710477c6be8a041826e7351c00455252,2024-12-10T22:15:21.217000
|
||||
CVE-2024-52854,1,1,009841fa040f8f67d9d6d903a2358e2d8e69e21bf548fccc901e2583abfc248f,2024-12-10T22:15:21.373000
|
||||
CVE-2024-52855,1,1,4492248e1817f494f8ba3e559ba29141d3fc5dfb18c00af373c17316d2f822e5,2024-12-10T22:15:21.523000
|
||||
CVE-2024-52857,1,1,86db52201160974439d4088fd4de753eb451ab5c80d3a46f608ba42f78414496,2024-12-10T22:15:21.667000
|
||||
CVE-2024-52858,1,1,da4f0319a7d2920a929366a5da796388ca7d499b384c1b2cc814fd8adf768345,2024-12-10T22:15:21.817000
|
||||
CVE-2024-52859,1,1,dd90b33a51281c2049b0b0f22847034b3e1a07b8a718369194027b8d65102dd8,2024-12-10T22:15:21.957000
|
||||
CVE-2024-52850,0,0,c61d8c15323f5fe60a6bb33ff0b4523c95ca577ef372ce4e493befa517294c81,2024-12-10T22:15:20.783000
|
||||
CVE-2024-52851,0,0,5c7c472ab454ae08b0d4ac83b0e5ef9b32b8d2c0f6d4083fc6598ae0f25fc294,2024-12-10T22:15:20.917000
|
||||
CVE-2024-52852,0,0,74f02244650cea9b338bf8c6b77a0129125ca442d662b4c2bf9f2b45f871c052,2024-12-10T22:15:21.060000
|
||||
CVE-2024-52853,0,0,e7458c1ef49ccf0d8ea1ba998c86b437710477c6be8a041826e7351c00455252,2024-12-10T22:15:21.217000
|
||||
CVE-2024-52854,0,0,009841fa040f8f67d9d6d903a2358e2d8e69e21bf548fccc901e2583abfc248f,2024-12-10T22:15:21.373000
|
||||
CVE-2024-52855,0,0,4492248e1817f494f8ba3e559ba29141d3fc5dfb18c00af373c17316d2f822e5,2024-12-10T22:15:21.523000
|
||||
CVE-2024-52857,0,0,86db52201160974439d4088fd4de753eb451ab5c80d3a46f608ba42f78414496,2024-12-10T22:15:21.667000
|
||||
CVE-2024-52858,0,0,da4f0319a7d2920a929366a5da796388ca7d499b384c1b2cc814fd8adf768345,2024-12-10T22:15:21.817000
|
||||
CVE-2024-52859,0,0,dd90b33a51281c2049b0b0f22847034b3e1a07b8a718369194027b8d65102dd8,2024-12-10T22:15:21.957000
|
||||
CVE-2024-5286,0,0,ffcd0e1ed442acf970104f3248793a2ad8bce94591cd92edc7dccb735466eae6,2024-11-21T09:47:21.590000
|
||||
CVE-2024-52860,1,1,92b871d90d15ef165f8c777c51eab434a63512d59606036ce7531fbbd14c7f9a,2024-12-10T22:15:22.097000
|
||||
CVE-2024-52861,1,1,d98bf81ccae2045616e8f90105015b86928e39b59021ec8b9adc91787f8d85da,2024-12-10T22:15:22.230000
|
||||
CVE-2024-52862,1,1,ff7feb4033305bb9603b443894ca7e1821f63bd92cc2a7ef3c702449b17d24c0,2024-12-10T22:15:22.377000
|
||||
CVE-2024-52864,1,1,344db1c8e80cd3870272e5b0e7f2f750b1520b0520d6c69b05ffa75ced8e0f77,2024-12-10T22:15:22.520000
|
||||
CVE-2024-52865,1,1,ce4b9bc93e1340740e22119661ed960f798d2b0f9d93c5cf6ab09b063beb6c65,2024-12-10T22:15:22.663000
|
||||
CVE-2024-52860,0,0,92b871d90d15ef165f8c777c51eab434a63512d59606036ce7531fbbd14c7f9a,2024-12-10T22:15:22.097000
|
||||
CVE-2024-52861,0,0,d98bf81ccae2045616e8f90105015b86928e39b59021ec8b9adc91787f8d85da,2024-12-10T22:15:22.230000
|
||||
CVE-2024-52862,0,0,ff7feb4033305bb9603b443894ca7e1821f63bd92cc2a7ef3c702449b17d24c0,2024-12-10T22:15:22.377000
|
||||
CVE-2024-52864,0,0,344db1c8e80cd3870272e5b0e7f2f750b1520b0520d6c69b05ffa75ced8e0f77,2024-12-10T22:15:22.520000
|
||||
CVE-2024-52865,0,0,ce4b9bc93e1340740e22119661ed960f798d2b0f9d93c5cf6ab09b063beb6c65,2024-12-10T22:15:22.663000
|
||||
CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000
|
||||
CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000
|
||||
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
|
||||
@ -268645,32 +268645,32 @@ CVE-2024-52959,0,0,2eb2157890632ca954f7c150a61a989fe40d967f91d0ca40fadb69eac73b6
|
||||
CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000
|
||||
CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000
|
||||
CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000
|
||||
CVE-2024-52982,1,1,d4c8cf917744a1fead78b8ade90a4122e489131dde6a21024387c784388b07c5,2024-12-10T21:15:18.053000
|
||||
CVE-2024-52983,1,1,32f716a4ee996ee93a11134a523dbdcc04456d0b12d72d48c947054bd93ef1f2,2024-12-10T21:15:18.203000
|
||||
CVE-2024-52984,1,1,9f4fa98da214a5c55e0a26e9c6fa0cdbcee4632e62475188f7d50d034471e8ae,2024-12-10T21:15:18.347000
|
||||
CVE-2024-52985,1,1,0d55d1fc87ef1e1890a8bd3d147b2ad872c29dabc90a82bc7046d59271c809a4,2024-12-10T21:15:18.483000
|
||||
CVE-2024-52986,1,1,8302c940a08ae37c097cec8a4c165e4074a4b7d15080465dcdd82ae75c28f5c7,2024-12-10T21:15:18.627000
|
||||
CVE-2024-52987,1,1,a439891a04556f94a07a5caadc799167cd1b027e7464a630f332a47bf4345530,2024-12-10T21:15:18.760000
|
||||
CVE-2024-52988,1,1,e8bcbc0ecd6fe39f74e69d3af61e03c91fc054f693ecbfa650f21c12688923c7,2024-12-10T21:15:18.910000
|
||||
CVE-2024-52989,1,1,81491d0f65d8a7345ca04f13f5d8c90c19ad2f44f9bf39b5272fc930e77722aa,2024-12-10T21:15:19.040000
|
||||
CVE-2024-52982,0,0,d4c8cf917744a1fead78b8ade90a4122e489131dde6a21024387c784388b07c5,2024-12-10T21:15:18.053000
|
||||
CVE-2024-52983,0,0,32f716a4ee996ee93a11134a523dbdcc04456d0b12d72d48c947054bd93ef1f2,2024-12-10T21:15:18.203000
|
||||
CVE-2024-52984,0,0,9f4fa98da214a5c55e0a26e9c6fa0cdbcee4632e62475188f7d50d034471e8ae,2024-12-10T21:15:18.347000
|
||||
CVE-2024-52985,0,0,0d55d1fc87ef1e1890a8bd3d147b2ad872c29dabc90a82bc7046d59271c809a4,2024-12-10T21:15:18.483000
|
||||
CVE-2024-52986,0,0,8302c940a08ae37c097cec8a4c165e4074a4b7d15080465dcdd82ae75c28f5c7,2024-12-10T21:15:18.627000
|
||||
CVE-2024-52987,0,0,a439891a04556f94a07a5caadc799167cd1b027e7464a630f332a47bf4345530,2024-12-10T21:15:18.760000
|
||||
CVE-2024-52988,0,0,e8bcbc0ecd6fe39f74e69d3af61e03c91fc054f693ecbfa650f21c12688923c7,2024-12-10T21:15:18.910000
|
||||
CVE-2024-52989,0,0,81491d0f65d8a7345ca04f13f5d8c90c19ad2f44f9bf39b5272fc930e77722aa,2024-12-10T21:15:19.040000
|
||||
CVE-2024-5299,0,0,2529d83f4332340dd8e75b95926982e4ae8b624f13bfc3e75814ba5d64949f5a,2024-11-21T09:47:23.213000
|
||||
CVE-2024-52990,1,1,bd2f0de42826863f33e952bec766a3e63faebab4bec1f9cc4287a21759add14e,2024-12-10T21:15:19.170000
|
||||
CVE-2024-52991,1,1,8a6821b7f3b06f04b77be1068e019e2a9fca024a567b021c86f4eb9a2fb41b72,2024-12-10T22:15:22.883000
|
||||
CVE-2024-52992,1,1,3e38f4643e1141961ac4b544253d85cedc850a050573c8615becfa4a718a6505,2024-12-10T22:15:23.033000
|
||||
CVE-2024-52993,1,1,748892de9e9d59351bd15771ff43c45e736b1f012ed3a213c6de1f0854b492af,2024-12-10T22:15:23.190000
|
||||
CVE-2024-52994,1,1,2cd0586fb40792c7a487ff88a2682a1ecd6f2d454b9994169352cd7df9aeb6df,2024-12-10T21:15:19.310000
|
||||
CVE-2024-52995,1,1,a3099d90b55abcf26b549c067920f32a315aa9a3ca364123259b3a6e079a22f5,2024-12-10T21:15:19.440000
|
||||
CVE-2024-52996,1,1,a57afb01d3277dc8f1c34b62e9696316a1a26d9c78ffb0410a0300bb2c1dc079,2024-12-10T21:15:19.573000
|
||||
CVE-2024-52997,1,1,a5ab10ce606936e2cfb895068f98aa9f46c96c6578e4ed8df8154c7e1884d01f,2024-12-10T21:15:19.740000
|
||||
CVE-2024-52990,0,0,bd2f0de42826863f33e952bec766a3e63faebab4bec1f9cc4287a21759add14e,2024-12-10T21:15:19.170000
|
||||
CVE-2024-52991,0,0,8a6821b7f3b06f04b77be1068e019e2a9fca024a567b021c86f4eb9a2fb41b72,2024-12-10T22:15:22.883000
|
||||
CVE-2024-52992,0,0,3e38f4643e1141961ac4b544253d85cedc850a050573c8615becfa4a718a6505,2024-12-10T22:15:23.033000
|
||||
CVE-2024-52993,0,0,748892de9e9d59351bd15771ff43c45e736b1f012ed3a213c6de1f0854b492af,2024-12-10T22:15:23.190000
|
||||
CVE-2024-52994,0,0,2cd0586fb40792c7a487ff88a2682a1ecd6f2d454b9994169352cd7df9aeb6df,2024-12-10T21:15:19.310000
|
||||
CVE-2024-52995,0,0,a3099d90b55abcf26b549c067920f32a315aa9a3ca364123259b3a6e079a22f5,2024-12-10T21:15:19.440000
|
||||
CVE-2024-52996,0,0,a57afb01d3277dc8f1c34b62e9696316a1a26d9c78ffb0410a0300bb2c1dc079,2024-12-10T21:15:19.573000
|
||||
CVE-2024-52997,0,0,a5ab10ce606936e2cfb895068f98aa9f46c96c6578e4ed8df8154c7e1884d01f,2024-12-10T21:15:19.740000
|
||||
CVE-2024-52998,0,0,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000
|
||||
CVE-2024-52999,1,1,95094939bfd6900cf25010b48f43c6d669c48c53977270952939580400b5673a,2024-12-10T22:15:23.547000
|
||||
CVE-2024-53000,1,1,723fd44d0fa4c10847595664197057a9d5c075f93324ef9320ae7996448cf078,2024-12-10T22:15:23.693000
|
||||
CVE-2024-53001,1,1,6027b6bf4bd2e0541d44309761cda27d9f5d859e89bdf09504d92dd8c06a87ba,2024-12-10T22:15:23.837000
|
||||
CVE-2024-53002,1,1,97d9d1f10417834075f33d462468d1505b456bdcf996215b44a6a1c8df77a490,2024-12-10T22:15:24
|
||||
CVE-2024-53003,1,1,7ec181dbbf51dcee94abe1495b97e08b47f599c2b84fb505c7959a9ca50c835b,2024-12-10T22:15:24.140000
|
||||
CVE-2024-53004,1,1,f0691fe6059760f11f76965205dce3364b2da2ff2af1141452b95793c6854333,2024-12-10T22:15:24.287000
|
||||
CVE-2024-53005,1,1,b4b91484a4802af6ee99458daeb2041f9650c5d1dd9592932ad0ce610dc38603,2024-12-10T22:15:24.463000
|
||||
CVE-2024-53006,1,1,1b77a93f61b789d73a3401b2f32b9c484aa597e79953855de24b5f01d9cc1099,2024-12-10T22:15:24.617000
|
||||
CVE-2024-52999,0,0,95094939bfd6900cf25010b48f43c6d669c48c53977270952939580400b5673a,2024-12-10T22:15:23.547000
|
||||
CVE-2024-53000,0,0,723fd44d0fa4c10847595664197057a9d5c075f93324ef9320ae7996448cf078,2024-12-10T22:15:23.693000
|
||||
CVE-2024-53001,0,0,6027b6bf4bd2e0541d44309761cda27d9f5d859e89bdf09504d92dd8c06a87ba,2024-12-10T22:15:23.837000
|
||||
CVE-2024-53002,0,0,97d9d1f10417834075f33d462468d1505b456bdcf996215b44a6a1c8df77a490,2024-12-10T22:15:24
|
||||
CVE-2024-53003,0,0,7ec181dbbf51dcee94abe1495b97e08b47f599c2b84fb505c7959a9ca50c835b,2024-12-10T22:15:24.140000
|
||||
CVE-2024-53004,0,0,f0691fe6059760f11f76965205dce3364b2da2ff2af1141452b95793c6854333,2024-12-10T22:15:24.287000
|
||||
CVE-2024-53005,0,0,b4b91484a4802af6ee99458daeb2041f9650c5d1dd9592932ad0ce610dc38603,2024-12-10T22:15:24.463000
|
||||
CVE-2024-53006,0,0,1b77a93f61b789d73a3401b2f32b9c484aa597e79953855de24b5f01d9cc1099,2024-12-10T22:15:24.617000
|
||||
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
|
||||
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
|
||||
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
|
||||
@ -268858,14 +268858,14 @@ CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25
|
||||
CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000
|
||||
CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28
|
||||
CVE-2024-5347,0,0,a4eb7d8feed8c584fc13b2c0e6136e67598b45cb75b5638081f14ed1c0f5fa79,2024-11-21T09:47:28.127000
|
||||
CVE-2024-53470,0,1,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000
|
||||
CVE-2024-53471,0,1,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
|
||||
CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000
|
||||
CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
|
||||
CVE-2024-53472,0,0,72dbc0cce14855ba1d3569457dbee3a8b2bcc3ee364096a0891b3e57adbf038f,2024-12-05T16:15:25.977000
|
||||
CVE-2024-53473,0,0,358e2b05fdc54a6e3691e8ba3f77fedff57be14fcbc952f41ed19a97501744e2,2024-12-07T23:15:34.137000
|
||||
CVE-2024-53477,0,0,0bf7b09ba287b24f18c03a66d52e9150f8f87653e9cc33aac9bf4a8d9356bba9,2024-12-02T21:15:11.217000
|
||||
CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000
|
||||
CVE-2024-53480,0,0,4889d0ff1fe4dddc3829b2478649a6155b88e7256aa2574b5a87fc73b9645c93,2024-12-10T20:15:20.920000
|
||||
CVE-2024-53481,0,1,8c2a844186665814baa9349f5f9eb75c05702deacf50797c7fa1db6e74c909d8,2024-12-10T21:15:20.003000
|
||||
CVE-2024-53481,0,0,8c2a844186665814baa9349f5f9eb75c05702deacf50797c7fa1db6e74c909d8,2024-12-10T21:15:20.003000
|
||||
CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904a22,2024-12-03T16:15:23.980000
|
||||
CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000
|
||||
CVE-2024-53490,0,0,c2f3aa4cff7ef0e114b620eaf49a4030edbb963b6051b20627f7157e432c7834,2024-12-05T17:15:14.180000
|
||||
@ -269110,17 +269110,17 @@ CVE-2024-53947,0,0,f3f49f507fdd673942647045e7a6129704131798f17f201931ae5ff94b253
|
||||
CVE-2024-53948,0,0,6ea9a9bf9db83504c3565ac4e6f0a87dd0b4b80d29ed015b913925534416c4a7,2024-12-09T18:15:23.893000
|
||||
CVE-2024-53949,0,0,b536a3aaccc48e4b523395b29ca4495755368005bd7e091272f9f8a953010750,2024-12-09T18:15:24.013000
|
||||
CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f19,2024-11-21T09:47:34.290000
|
||||
CVE-2024-53951,1,1,43e509fee888dfedc1ddd04d17a82a93b47aa2d7f61f4a6291f1cd966a3839d8,2024-12-10T21:15:20.167000
|
||||
CVE-2024-53952,1,1,38daed262ef75a5427be61fbe61366babf285e64ee4dda69e669dbd911c9195f,2024-12-10T21:15:20.307000
|
||||
CVE-2024-53953,1,1,5dc2d3b87414abd1b0a86230f9d8acddf47be361a7c50818b7ce9ac006f308f3,2024-12-10T21:15:20.437000
|
||||
CVE-2024-53954,1,1,12337a35199c24ab8d7ec22f5a08d121844d28c7a25b063dca67d12a40591e05,2024-12-10T21:15:20.560000
|
||||
CVE-2024-53955,1,1,c5af8768fe7083075e11107c6d540f2f7727b32060d9923503be5a85bf08f0e6,2024-12-10T22:15:25.610000
|
||||
CVE-2024-53956,1,1,e5a8521a14e4cbb76222eef41cd69b2793f16069558b7af55be6244ddaff726e,2024-12-10T22:15:25.767000
|
||||
CVE-2024-53957,1,1,1bb9e76a3063f3f957d1b9a7506439ae97014640321e8abb9df957ae9e9cf255,2024-12-10T22:15:25.917000
|
||||
CVE-2024-53958,1,1,b8642d2277418d24dfeb23f78defa8e23296fe394a736852cb16590879257a5f,2024-12-10T22:15:26.510000
|
||||
CVE-2024-53959,1,1,5a246505d595c5cbf97996d80b5e32a114e38474dd1156baf85534b2cb2948eb,2024-12-10T22:15:27.347000
|
||||
CVE-2024-53951,0,0,43e509fee888dfedc1ddd04d17a82a93b47aa2d7f61f4a6291f1cd966a3839d8,2024-12-10T21:15:20.167000
|
||||
CVE-2024-53952,0,0,38daed262ef75a5427be61fbe61366babf285e64ee4dda69e669dbd911c9195f,2024-12-10T21:15:20.307000
|
||||
CVE-2024-53953,0,0,5dc2d3b87414abd1b0a86230f9d8acddf47be361a7c50818b7ce9ac006f308f3,2024-12-10T21:15:20.437000
|
||||
CVE-2024-53954,0,0,12337a35199c24ab8d7ec22f5a08d121844d28c7a25b063dca67d12a40591e05,2024-12-10T21:15:20.560000
|
||||
CVE-2024-53955,0,0,c5af8768fe7083075e11107c6d540f2f7727b32060d9923503be5a85bf08f0e6,2024-12-10T22:15:25.610000
|
||||
CVE-2024-53956,0,0,e5a8521a14e4cbb76222eef41cd69b2793f16069558b7af55be6244ddaff726e,2024-12-10T22:15:25.767000
|
||||
CVE-2024-53957,0,0,1bb9e76a3063f3f957d1b9a7506439ae97014640321e8abb9df957ae9e9cf255,2024-12-10T22:15:25.917000
|
||||
CVE-2024-53958,0,0,b8642d2277418d24dfeb23f78defa8e23296fe394a736852cb16590879257a5f,2024-12-10T22:15:26.510000
|
||||
CVE-2024-53959,0,0,5a246505d595c5cbf97996d80b5e32a114e38474dd1156baf85534b2cb2948eb,2024-12-10T22:15:27.347000
|
||||
CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000
|
||||
CVE-2024-53960,1,1,7010c91cffe8702ad07fc789dd9a0c2b48640368e9c1eab4aa8d0a4b82defe1e,2024-12-10T22:15:27.550000
|
||||
CVE-2024-53960,0,0,7010c91cffe8702ad07fc789dd9a0c2b48640368e9c1eab4aa8d0a4b82defe1e,2024-12-10T22:15:27.550000
|
||||
CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000
|
||||
CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000
|
||||
CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000
|
||||
@ -269151,26 +269151,26 @@ CVE-2024-54008,0,0,c83adc0070c7b9fe5dc822e3df77a6cc986e702399c7129cd968ded9ec0b9
|
||||
CVE-2024-54014,0,0,9895136be901bda6024d3c86fc774e344b5ffa93f0cfe6e13e8990c6229717ed,2024-12-05T03:15:14.530000
|
||||
CVE-2024-5402,0,0,ff0d9bb22ac0a71984c61b65bae28749f481f4dd7d54b4eb8642f168357fe194,2024-11-21T09:47:34.947000
|
||||
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
||||
CVE-2024-54032,1,1,df0158302690dede6512412fea2d6ccccc394f592fbabea5c3d49cd38dd7f328,2024-12-10T21:15:20.690000
|
||||
CVE-2024-54034,1,1,baaa40662bc32f195cddc79f3445c5d2533af057773b700c7fef44d6833372be,2024-12-10T21:15:20.817000
|
||||
CVE-2024-54036,1,1,21405c4cb11cd6b4deb8ff32afbb450126cd9ec1484d35e315024d84e8c8a188,2024-12-10T21:15:20.947000
|
||||
CVE-2024-54037,1,1,4f1c9e1bdd3e5e66246dfdf3e682f75fa5431cc6ed04a6b8c3b10699379f1e08,2024-12-10T21:15:21.080000
|
||||
CVE-2024-54038,1,1,508c9e54004006962495f03a00b50c70c49263e5fc81ce6f7870a7da64ac2daf,2024-12-10T21:15:21.210000
|
||||
CVE-2024-54039,1,1,3b2e527d49295c6804e18cf2f92ddd23f41d3c6345c8b9ac0c14f1f2ed50f544,2024-12-10T21:15:21.337000
|
||||
CVE-2024-54032,0,0,df0158302690dede6512412fea2d6ccccc394f592fbabea5c3d49cd38dd7f328,2024-12-10T21:15:20.690000
|
||||
CVE-2024-54034,0,0,baaa40662bc32f195cddc79f3445c5d2533af057773b700c7fef44d6833372be,2024-12-10T21:15:20.817000
|
||||
CVE-2024-54036,0,0,21405c4cb11cd6b4deb8ff32afbb450126cd9ec1484d35e315024d84e8c8a188,2024-12-10T21:15:20.947000
|
||||
CVE-2024-54037,0,0,4f1c9e1bdd3e5e66246dfdf3e682f75fa5431cc6ed04a6b8c3b10699379f1e08,2024-12-10T21:15:21.080000
|
||||
CVE-2024-54038,0,0,508c9e54004006962495f03a00b50c70c49263e5fc81ce6f7870a7da64ac2daf,2024-12-10T21:15:21.210000
|
||||
CVE-2024-54039,0,0,3b2e527d49295c6804e18cf2f92ddd23f41d3c6345c8b9ac0c14f1f2ed50f544,2024-12-10T21:15:21.337000
|
||||
CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000
|
||||
CVE-2024-54040,1,1,549d978f7583a4825b97064030c5badb3762cf7e6723188bcefb9be1a6200d33,2024-12-10T21:15:21.463000
|
||||
CVE-2024-54041,1,1,f606483c8aa9eca45ff6f1881b32b573f4344237f4044c5f4b6ae4fed277b694,2024-12-10T21:15:21.590000
|
||||
CVE-2024-54042,1,1,627992c033209e845a6af41961f6f72dbd144af08f18d5464d315f1b5874ced1,2024-12-10T21:15:21.720000
|
||||
CVE-2024-54043,1,1,55493f4f1751ed4dc7c97754ee71be29e965f63c4bc095b4a32f8cd59aae22e4,2024-12-10T21:15:21.850000
|
||||
CVE-2024-54044,1,1,06fe2a3b8d676ceb22e837bcdf275bfc416d9d966ef51cb8951620a42b790759,2024-12-10T21:15:21.977000
|
||||
CVE-2024-54045,1,1,423094df5e959be2432263e2ec7f568bf9c0ded1dc0c87e6596f89c05684b444,2024-12-10T21:15:22.110000
|
||||
CVE-2024-54046,1,1,589bf843ec98f51533159c4e2ecab05e1a70204de35a8fc003fe2b3a60389b77,2024-12-10T21:15:22.237000
|
||||
CVE-2024-54047,1,1,468dbe2f56cb4813dd8eda8a037852b48318d240118d1d600cef498d5bed864d,2024-12-10T21:15:22.360000
|
||||
CVE-2024-54048,1,1,39b377fa96a757b526e90a8c59e7b3f7cfc1a9151ce03d075db32fe19596a203,2024-12-10T21:15:22.490000
|
||||
CVE-2024-54049,1,1,c1e7f2cbe12586d407f72f606a5e2a9c6ca117139095e3df497b3a8c2ce3a497,2024-12-10T21:15:22.627000
|
||||
CVE-2024-54040,0,0,549d978f7583a4825b97064030c5badb3762cf7e6723188bcefb9be1a6200d33,2024-12-10T21:15:21.463000
|
||||
CVE-2024-54041,0,0,f606483c8aa9eca45ff6f1881b32b573f4344237f4044c5f4b6ae4fed277b694,2024-12-10T21:15:21.590000
|
||||
CVE-2024-54042,0,0,627992c033209e845a6af41961f6f72dbd144af08f18d5464d315f1b5874ced1,2024-12-10T21:15:21.720000
|
||||
CVE-2024-54043,0,0,55493f4f1751ed4dc7c97754ee71be29e965f63c4bc095b4a32f8cd59aae22e4,2024-12-10T21:15:21.850000
|
||||
CVE-2024-54044,0,0,06fe2a3b8d676ceb22e837bcdf275bfc416d9d966ef51cb8951620a42b790759,2024-12-10T21:15:21.977000
|
||||
CVE-2024-54045,0,0,423094df5e959be2432263e2ec7f568bf9c0ded1dc0c87e6596f89c05684b444,2024-12-10T21:15:22.110000
|
||||
CVE-2024-54046,0,0,589bf843ec98f51533159c4e2ecab05e1a70204de35a8fc003fe2b3a60389b77,2024-12-10T21:15:22.237000
|
||||
CVE-2024-54047,0,0,468dbe2f56cb4813dd8eda8a037852b48318d240118d1d600cef498d5bed864d,2024-12-10T21:15:22.360000
|
||||
CVE-2024-54048,0,0,39b377fa96a757b526e90a8c59e7b3f7cfc1a9151ce03d075db32fe19596a203,2024-12-10T21:15:22.490000
|
||||
CVE-2024-54049,0,0,c1e7f2cbe12586d407f72f606a5e2a9c6ca117139095e3df497b3a8c2ce3a497,2024-12-10T21:15:22.627000
|
||||
CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000
|
||||
CVE-2024-54050,1,1,428c85900ce276f730a05cb59342cccb3401b06f05c398638e56ca8561c03ce2,2024-12-10T21:15:22.767000
|
||||
CVE-2024-54051,1,1,1d913bcc4017b91db45413bcbfda71d5158f669904b648b89bb2fe4e4425403e,2024-12-10T21:15:22.927000
|
||||
CVE-2024-54050,0,0,428c85900ce276f730a05cb59342cccb3401b06f05c398638e56ca8561c03ce2,2024-12-10T21:15:22.767000
|
||||
CVE-2024-54051,0,0,1d913bcc4017b91db45413bcbfda71d5158f669904b648b89bb2fe4e4425403e,2024-12-10T21:15:22.927000
|
||||
CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000
|
||||
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
|
||||
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
||||
@ -269192,6 +269192,7 @@ CVE-2024-5413,0,0,9c8ff2da29f08732e07c89fc8382f308bef7d11e6924d70a41370457152a22
|
||||
CVE-2024-54130,0,0,d743b97b688f1889df506833c19b059d59c521aa9cf19eb794486082f55f5a26,2024-12-05T16:15:27.020000
|
||||
CVE-2024-54131,0,0,c463433824fe5efdee504c6600137f62c1f6f3079653cf467045d47ec224d2f9,2024-12-03T21:15:08.127000
|
||||
CVE-2024-54132,0,0,527670a307280752e14dbc843883c73b56ba2891158d4335a64d013e5f7b3f3b,2024-12-04T16:15:26.730000
|
||||
CVE-2024-54133,1,1,9f28f1b1196428f0b352b2fc621327cac84b53a445be84368cd6337d539f12db,2024-12-10T23:15:06.240000
|
||||
CVE-2024-54134,0,0,3a899a081edf0165ba2208f8f25abf5168b570b324e22e9511247da0e409bb1b,2024-12-04T16:15:26.883000
|
||||
CVE-2024-54135,0,0,0a2cd21806eae801f971086127a29556a7e3e1448341f7576c0282d14711f088,2024-12-06T16:15:22.340000
|
||||
CVE-2024-54136,0,0,a25cfad5b733779b89f1058e830aa0566695b66d6e2a5fd70ee19ee3a2642062,2024-12-06T16:15:22.500000
|
||||
@ -269433,12 +269434,14 @@ CVE-2024-55601,0,0,89175adefd85ee52b8d0660bf5cffaad0818c3ee1a9c4ccd9c1b1dad82da5
|
||||
CVE-2024-55602,0,0,50669de054a1828aef63b70e8d626e9a1c733113b3df3c2b5b9e9ba1699877b0,2024-12-10T18:15:43.500000
|
||||
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
|
||||
CVE-2024-55634,0,0,ad2c430955951ebc1817bb1d3d7bee47a20555d925042aca8d328fb0e4be76b9,2024-12-10T00:15:22.323000
|
||||
CVE-2024-55635,0,1,02aeec60dc680ba5e64ba21b7921f79d14588994f0456ea0982ac81c3eef7905,2024-12-10T22:15:28.190000
|
||||
CVE-2024-55636,0,1,b733e66d088dc80ea0d2f7272ec2b8b2908f8b8b999bac93067067b2ba1c576a,2024-12-10T22:15:28.347000
|
||||
CVE-2024-55637,0,1,b339d1b46d013911874bbdadbc242ce2cec2e62c40f0c0b5fcadabacc3a18ead,2024-12-10T22:15:28.500000
|
||||
CVE-2024-55638,0,1,a4181edcafad19b32a68c9307a9f7762f0502e887b0637bf4f98f55d3d91262d,2024-12-10T22:15:28.640000
|
||||
CVE-2024-55635,0,0,02aeec60dc680ba5e64ba21b7921f79d14588994f0456ea0982ac81c3eef7905,2024-12-10T22:15:28.190000
|
||||
CVE-2024-55636,0,0,b733e66d088dc80ea0d2f7272ec2b8b2908f8b8b999bac93067067b2ba1c576a,2024-12-10T22:15:28.347000
|
||||
CVE-2024-55637,0,0,b339d1b46d013911874bbdadbc242ce2cec2e62c40f0c0b5fcadabacc3a18ead,2024-12-10T22:15:28.500000
|
||||
CVE-2024-55638,0,0,a4181edcafad19b32a68c9307a9f7762f0502e887b0637bf4f98f55d3d91262d,2024-12-10T22:15:28.640000
|
||||
CVE-2024-5564,0,0,3aa73f6c6404c243b9f6f394613afc94e063551efa8746acdefa8554437d3ac7,2024-11-21T09:47:56.340000
|
||||
CVE-2024-5565,0,0,032bdcff8dac2089c90f98c674e66bb1a3269fca437d11950d454869056d685d,2024-11-25T13:15:07.310000
|
||||
CVE-2024-55653,1,1,23cbcdc73ea3dd154265821e22496b95434ef5c6f5ff0474f2c26897e605302d,2024-12-10T23:15:06.410000
|
||||
CVE-2024-55655,1,1,07019389634e3065fbeabfcfefa9ff068beb42552c22fbc2c221237f731ec5c6,2024-12-10T23:15:06.570000
|
||||
CVE-2024-5566,0,0,55157068cefe792f617f9d985299d525c0156c753cbd8d7bb670501225f08f89,2024-11-21T09:47:56.607000
|
||||
CVE-2024-5567,0,0,58e82791c8fea00e3d24c3a38ca7e73d8284e730929acebb640917b4f39b60a1,2024-09-26T18:27:51.817000
|
||||
CVE-2024-5569,0,0,af3784ad99fd1d8f40146e3cc0f791571d7dbaa8c15694f8f3c51428e2663498,2024-11-21T09:47:56.840000
|
||||
@ -269521,7 +269524,7 @@ CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6
|
||||
CVE-2024-5657,0,0,322b989a97af9a632a310787c45ccef95cbff8f0006f11abe6348fcd1668034b,2024-11-21T09:48:06.280000
|
||||
CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000
|
||||
CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000
|
||||
CVE-2024-5660,0,1,16e07c0fdda274ec7d4c36bf5943e00082ee54db66c328edcf07e7ace2166180,2024-12-10T22:15:28.790000
|
||||
CVE-2024-5660,0,0,16e07c0fdda274ec7d4c36bf5943e00082ee54db66c328edcf07e7ace2166180,2024-12-10T22:15:28.790000
|
||||
CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000
|
||||
CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000
|
||||
CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000
|
||||
@ -272368,7 +272371,7 @@ CVE-2024-8975,0,0,2e1af783568cf7ad44e3b33e6ac71980410920ee6be566fa4a01ec060d747a
|
||||
CVE-2024-8977,0,0,cb8e4225cbeae27a4d5cd5a6caff3e78c74f90a4a117f3ebee8859bf0cf66b60,2024-10-16T17:10:13.220000
|
||||
CVE-2024-8978,0,0,d27b973a30e145b038f4aa46488a1a73c5d80a05af06996c64c589eb06d82073,2024-11-19T17:04:38.903000
|
||||
CVE-2024-8979,0,0,c8d7a454a2e21b5a6419915f563e8d188611a09ebbbeb9864f16825c369f1ca3,2024-11-19T17:05:08.270000
|
||||
CVE-2024-8980,0,1,f21e1b5a085b95548892c69cb9e71b81f9ad3987b25a3b637ff6f5bc1ea3182e,2024-12-10T21:07:09.857000
|
||||
CVE-2024-8980,0,0,f21e1b5a085b95548892c69cb9e71b81f9ad3987b25a3b637ff6f5bc1ea3182e,2024-12-10T21:07:09.857000
|
||||
CVE-2024-8981,0,0,ab731ebe09d14b423954c8d1c309f529eca9637e35f5ff7d59615aebbb87cece,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8983,0,0,27bd060291bf8fbf2987becf30df5e9011a78deda3d7b017aa5acbc337d382f1,2024-10-10T12:57:21.987000
|
||||
CVE-2024-8985,0,0,2747a15c007aed3b55062332e399a5ed9dbfdc53f9e2cb4a2cbced1eaac1da1a,2024-11-13T17:01:16.850000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user