mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-01-31T03:00:46.019537+00:00
This commit is contained in:
parent
0fe2cf69ca
commit
38bd6d2a8b
48
CVE-2020/CVE-2020-119xx/CVE-2020-11936.json
Normal file
48
CVE-2020/CVE-2020-119xx/CVE-2020-11936.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2020-11936",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2025-01-31T02:15:28.290",
|
||||
"lastModified": "2025-01-31T02:15:28.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "gdbus setgid privilege escalation"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@ubuntu.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1885633",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11936",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2022/CVE-2022-17xx/CVE-2022-1736.json
Normal file
29
CVE-2022/CVE-2022-17xx/CVE-2022-1736.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2022-1736",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2025-01-31T02:15:28.440",
|
||||
"lastModified": "2025-01-31T02:15:28.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ubuntu's configuration of gnome-control-center allowed Remote Desktop Sharing to be enabled by default."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1973028",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ubuntu.com/security/CVE-2022-1736",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ubuntu.com/security/notices/USN-5430-1",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2022/CVE-2022-286xx/CVE-2022-28653.json
Normal file
21
CVE-2022/CVE-2022-286xx/CVE-2022-28653.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2022-28653",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2025-01-31T01:15:08.727",
|
||||
"lastModified": "2025-01-31T01:15:08.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Users can consume unlimited disk space in /var/crash"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28653",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2023/CVE-2023-00xx/CVE-2023-0092.json
Normal file
48
CVE-2023/CVE-2023-00xx/CVE-2023-0092.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2023-0092",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2025-01-31T02:15:28.550",
|
||||
"lastModified": "2025-01-31T02:15:28.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@ubuntu.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-x5rv-w9pm-8qp8",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/juju/juju/commit/ef803e2a13692d355b784b7da8b4b1f01dab1556",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1813",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:19.973",
|
||||
"lastModified": "2024-11-21T08:51:22.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T01:25:17.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:presstigers:simple_job_board:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.11.1",
|
||||
"matchCriteriaId": "3BA27EF4-AF0A-45C2-8E6C-12C7EE5C7964"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3051715%40simple-job-board&old=3038476%40simple-job-board&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89584034-4a93-42a6-8fef-55dc3895c45c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3051715%40simple-job-board&old=3038476%40simple-job-board&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89584034-4a93-42a6-8fef-55dc3895c45c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1991",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:21.883",
|
||||
"lastModified": "2024-11-21T08:51:45.033",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-31T01:32:27.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,78 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.3.1.0",
|
||||
"matchCriteriaId": "5431F904-0597-4627-BD50-8286354EE517"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk//services/class_rm_user_services.php#L1205",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3049490/custom-registration-form-builder-with-submission-manager#file24",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/766e3966-157a-4db3-9179-813032343f76?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk//services/class_rm_user_services.php#L1205",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3049490/custom-registration-form-builder-with-submission-manager#file24",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/766e3966-157a-4db3-9179-813032343f76?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2117",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:28.177",
|
||||
"lastModified": "2024-11-21T09:09:03.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T01:37:06.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "3.20.3",
|
||||
"matchCriteriaId": "F9354981-E523-461C-A8DA-7116429C4915"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058940%40elementor&new=3058940%40elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d7448a-b8a6-4b0b-92df-a15272fc56bf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058940%40elementor&new=3058940%40elementor&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d7448a-b8a6-4b0b-92df-a15272fc56bf?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2138",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:28.597",
|
||||
"lastModified": "2024-11-21T09:09:06.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T01:41:07.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crocoblock:jetwidgets_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.16",
|
||||
"matchCriteriaId": "AA3E9B9B-E1C0-4564-8543-1C468DD78ECD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050010/jetwidgets-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f807b605-68a8-4340-a275-776eac0936fa?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050010/jetwidgets-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f807b605-68a8-4340-a275-776eac0936fa?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2226",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:30.320",
|
||||
"lastModified": "2024-11-21T09:09:17.873",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-31T01:45:28.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themeisle:otter_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.5",
|
||||
"matchCriteriaId": "A17730C4-688B-407E-A01B-30E3DF67967E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050429/otter-blocks",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/217d3148-d411-4fff-a4f6-d5d02ef207af?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050429/otter-blocks",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/217d3148-d411-4fff-a4f6-d5d02ef207af?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-239xx/CVE-2024-23920.json
Normal file
21
CVE-2024/CVE-2024-239xx/CVE-2024-23920.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-23920",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T01:15:09.483",
|
||||
"lastModified": "2025-01-31T01:15:09.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the onboardee module. The issue results from improper access control. An attacker can leverage this vulnerability to execute code in the context of root."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1048/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-239xx/CVE-2024-23921.json
Normal file
21
CVE-2024/CVE-2024-239xx/CVE-2024-23921.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-23921",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T01:15:09.593",
|
||||
"lastModified": "2025-01-31T01:15:09.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the wlanapp module. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1049/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-239xx/CVE-2024-23929.json
Normal file
21
CVE-2024/CVE-2024-239xx/CVE-2024-23929.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-23929",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-31T01:15:09.697",
|
||||
"lastModified": "2025-01-31T01:15:09.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of Pioneer DMH-WT7600NEX devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the telematics functionality. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1044/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2305",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:31.153",
|
||||
"lastModified": "2024-11-21T09:09:28.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T01:48:22.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:cards_for_beaver_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.3",
|
||||
"matchCriteriaId": "15C3215C-AD85-46A1-A8A8-61C63E99F6B5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/bb-bootstrap-cards/tags/1.1.2&old=3056277&new_path=/bb-bootstrap-cards/tags/1.1.3&new=3056277&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/bb-bootstrap-cards/tags/1.1.2&old=3056277&new_path=/bb-bootstrap-cards/tags/1.1.3&new=3056277&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2325",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:31.683",
|
||||
"lastModified": "2024-11-21T09:09:30.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T01:53:16.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.6.7",
|
||||
"matchCriteriaId": "11A75CE4-91F9-4DFC-94ED-172577DC7CD9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050134/link-library",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b93af9cc-cd9a-4bbb-8cb1-bf45c59e469c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050134/link-library",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b93af9cc-cd9a-4bbb-8cb1-bf45c59e469c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2340",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:32.520",
|
||||
"lastModified": "2024-11-21T09:09:32.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T01:57:32.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.11.7",
|
||||
"matchCriteriaId": "EA3C3037-32CE-484C-951A-3DAAFA229C13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://avada.com/documentation/avada-changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8bbc3-43ca-4ef5-a44d-2987c8597961?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://avada.com/documentation/avada-changelog/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8bbc3-43ca-4ef5-a44d-2987c8597961?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2341",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:32.687",
|
||||
"lastModified": "2024-11-21T09:09:33.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T02:02:01.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.7.9",
|
||||
"matchCriteriaId": "084F3A7F-71BB-4F17-945A-628A98465263"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4930b03-9142-464e-98ae-a910dfa46f2a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4930b03-9142-464e-98ae-a910dfa46f2a?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2342",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:32.870",
|
||||
"lastModified": "2024-11-21T09:09:33.223",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T02:04:01.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.7.9",
|
||||
"matchCriteriaId": "084F3A7F-71BB-4F17-945A-628A98465263"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0dd466-a78a-4b79-b9bd-5363f69d9a4c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0dd466-a78a-4b79-b9bd-5363f69d9a4c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2343",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:33.033",
|
||||
"lastModified": "2024-11-21T09:09:33.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-31T02:08:29.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,82 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.11.7",
|
||||
"matchCriteriaId": "EA3C3037-32CE-484C-951A-3DAAFA229C13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://avada.com/documentation/avada-changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://avada.com/documentation/avada-changelog/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3423",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-07T15:15:07.253",
|
||||
"lastModified": "2024-11-21T09:29:34.370",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-31T01:22:52.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,83 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:argie:online_courseware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5C774C8-8C38-4E34-B5D3-74872B5F672A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-08.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259595",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259595",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311601",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-08.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259595",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259595",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311601",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21399",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-01-17T20:15:46.117",
|
||||
"lastModified": "2025-01-17T21:15:11.283",
|
||||
"lastModified": "2025-01-31T02:15:37.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -40,9 +40,19 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
48
README.md
48
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-31T00:56:11.048516+00:00
|
||||
2025-01-31T03:00:46.019537+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-31T00:15:20.607000+00:00
|
||||
2025-01-31T02:15:37.700000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,41 +27,45 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-01-30T01:00:04.368798+00:00
|
||||
2025-01-31T01:00:04.356246+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279570
|
||||
279577
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2023-6195](CVE-2023/CVE-2023-61xx/CVE-2023-6195.json) (`2025-01-31T00:15:08.697`)
|
||||
- [CVE-2024-1211](CVE-2024/CVE-2024-12xx/CVE-2024-1211.json) (`2025-01-31T00:15:08.863`)
|
||||
- [CVE-2024-23928](CVE-2024/CVE-2024-239xx/CVE-2024-23928.json) (`2025-01-31T00:15:09.030`)
|
||||
- [CVE-2024-23930](CVE-2024/CVE-2024-239xx/CVE-2024-23930.json) (`2025-01-31T00:15:09.147`)
|
||||
- [CVE-2024-23937](CVE-2024/CVE-2024-239xx/CVE-2024-23937.json) (`2025-01-31T00:15:09.257`)
|
||||
- [CVE-2024-23962](CVE-2024/CVE-2024-239xx/CVE-2024-23962.json) (`2025-01-31T00:15:09.367`)
|
||||
- [CVE-2024-23963](CVE-2024/CVE-2024-239xx/CVE-2024-23963.json) (`2025-01-31T00:15:09.483`)
|
||||
- [CVE-2024-23968](CVE-2024/CVE-2024-239xx/CVE-2024-23968.json) (`2025-01-31T00:15:09.593`)
|
||||
- [CVE-2024-23969](CVE-2024/CVE-2024-239xx/CVE-2024-23969.json) (`2025-01-31T00:15:09.703`)
|
||||
- [CVE-2024-23970](CVE-2024/CVE-2024-239xx/CVE-2024-23970.json) (`2025-01-31T00:15:09.810`)
|
||||
- [CVE-2024-23971](CVE-2024/CVE-2024-239xx/CVE-2024-23971.json) (`2025-01-31T00:15:09.920`)
|
||||
- [CVE-2024-23973](CVE-2024/CVE-2024-239xx/CVE-2024-23973.json) (`2025-01-31T00:15:10.027`)
|
||||
- [CVE-2024-24731](CVE-2024/CVE-2024-247xx/CVE-2024-24731.json) (`2025-01-31T00:15:10.137`)
|
||||
- [CVE-2025-24336](CVE-2025/CVE-2025-243xx/CVE-2025-24336.json) (`2025-01-31T00:15:20.607`)
|
||||
- [CVE-2025-24885](CVE-2025/CVE-2025-248xx/CVE-2025-24885.json) (`2025-01-30T23:15:07.993`)
|
||||
- [CVE-2025-24886](CVE-2025/CVE-2025-248xx/CVE-2025-24886.json) (`2025-01-30T23:15:08.990`)
|
||||
- [CVE-2020-11936](CVE-2020/CVE-2020-119xx/CVE-2020-11936.json) (`2025-01-31T02:15:28.290`)
|
||||
- [CVE-2022-1736](CVE-2022/CVE-2022-17xx/CVE-2022-1736.json) (`2025-01-31T02:15:28.440`)
|
||||
- [CVE-2022-28653](CVE-2022/CVE-2022-286xx/CVE-2022-28653.json) (`2025-01-31T01:15:08.727`)
|
||||
- [CVE-2023-0092](CVE-2023/CVE-2023-00xx/CVE-2023-0092.json) (`2025-01-31T02:15:28.550`)
|
||||
- [CVE-2024-23920](CVE-2024/CVE-2024-239xx/CVE-2024-23920.json) (`2025-01-31T01:15:09.483`)
|
||||
- [CVE-2024-23921](CVE-2024/CVE-2024-239xx/CVE-2024-23921.json) (`2025-01-31T01:15:09.593`)
|
||||
- [CVE-2024-23929](CVE-2024/CVE-2024-239xx/CVE-2024-23929.json) (`2025-01-31T01:15:09.697`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `13`
|
||||
|
||||
- [CVE-2024-1813](CVE-2024/CVE-2024-18xx/CVE-2024-1813.json) (`2025-01-31T01:25:17.393`)
|
||||
- [CVE-2024-1991](CVE-2024/CVE-2024-19xx/CVE-2024-1991.json) (`2025-01-31T01:32:27.643`)
|
||||
- [CVE-2024-2117](CVE-2024/CVE-2024-21xx/CVE-2024-2117.json) (`2025-01-31T01:37:06.183`)
|
||||
- [CVE-2024-2138](CVE-2024/CVE-2024-21xx/CVE-2024-2138.json) (`2025-01-31T01:41:07.187`)
|
||||
- [CVE-2024-2226](CVE-2024/CVE-2024-22xx/CVE-2024-2226.json) (`2025-01-31T01:45:28.230`)
|
||||
- [CVE-2024-2305](CVE-2024/CVE-2024-23xx/CVE-2024-2305.json) (`2025-01-31T01:48:22.557`)
|
||||
- [CVE-2024-2325](CVE-2024/CVE-2024-23xx/CVE-2024-2325.json) (`2025-01-31T01:53:16.193`)
|
||||
- [CVE-2024-2340](CVE-2024/CVE-2024-23xx/CVE-2024-2340.json) (`2025-01-31T01:57:32.613`)
|
||||
- [CVE-2024-2341](CVE-2024/CVE-2024-23xx/CVE-2024-2341.json) (`2025-01-31T02:02:01.173`)
|
||||
- [CVE-2024-2342](CVE-2024/CVE-2024-23xx/CVE-2024-2342.json) (`2025-01-31T02:04:01.137`)
|
||||
- [CVE-2024-2343](CVE-2024/CVE-2024-23xx/CVE-2024-2343.json) (`2025-01-31T02:08:29.417`)
|
||||
- [CVE-2024-3423](CVE-2024/CVE-2024-34xx/CVE-2024-3423.json) (`2025-01-31T01:22:52.200`)
|
||||
- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-01-31T02:15:37.700`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
65
_state.csv
65
_state.csv
@ -147103,6 +147103,7 @@ CVE-2020-11932,0,0,469c5fbb874e2ce3c2977f7166bc05778bd5f48d50cce7d1c214a21caf5b5
|
||||
CVE-2020-11933,0,0,0705c55ac12f2d731947a81e178dfba0120f93d678094caf5982aa9efe207ac5,2024-11-21T04:58:56.003000
|
||||
CVE-2020-11934,0,0,ebd85d2258bb5cdec7587f2d2f93ff13d3181b4947718544e1f1e911edcfc192,2024-11-21T04:58:56.127000
|
||||
CVE-2020-11935,0,0,dad03cea24f88294e961969a7fee1da6c6a47385b0aa1cd4e2877a928b5074e2,2024-11-21T04:58:56.233000
|
||||
CVE-2020-11936,1,1,e35f61986f41a3819206462fe309eb5bb8aa282ea551e775c265d99ed26a8387,2025-01-31T02:15:28.290000
|
||||
CVE-2020-11937,0,0,4f409b356d4e057aab349a4272ed211e5f8cbcd0f027ea0abed7b2e6b9fd9ba2,2024-11-21T04:58:56.357000
|
||||
CVE-2020-11938,0,0,5c5483f93c9cab0dd835b38d7dc1e8efb529f82c21062467bfa6fff780c5368a,2024-11-21T04:58:56.497000
|
||||
CVE-2020-11939,0,0,cbfb0430f629647bd7fb8905d6160d59546c17c35d5b10f608b4ea3ed57e7605,2024-11-21T04:58:56.630000
|
||||
@ -189477,6 +189478,7 @@ CVE-2022-1732,0,0,5c84180368debfddb078d2e88011be71b8789550ba2d09197bda40674f1d9a
|
||||
CVE-2022-1733,0,0,4f31822d2de876be63d4783393248684c57681ad975ae959265ca0914c98faa8,2024-11-21T06:41:21.003000
|
||||
CVE-2022-1734,0,0,33250dc450b207dfb92daec5e242e13cc7dc114dba3fd55de79449e1fc23d422,2024-11-21T06:41:21.163000
|
||||
CVE-2022-1735,0,0,7d10478262f962b10f91b0fa0afb7932c65e74b875449c50ba648cea6719f0a1,2024-11-21T06:41:21.320000
|
||||
CVE-2022-1736,1,1,b0669468fc1b817761f0abf4802d39ebff6fc24ca4915d98da079ec2967858a5,2025-01-31T02:15:28.440000
|
||||
CVE-2022-1737,0,0,0e3d75f5ba3296d07b3672893a9bafda724caf6ac2129455f810eb13e5fba8ea,2024-11-21T06:41:21.480000
|
||||
CVE-2022-1738,0,0,a4d4d144e08d80faa4f263a38c61cc18149e6ee52a901860d803985521f1d5a8,2024-11-21T06:41:21.610000
|
||||
CVE-2022-1739,0,0,cf997b425e6336e401050779d0718a1f58a45843ac1739817935fb7f7f04abc7,2024-11-21T06:41:21.720000
|
||||
@ -197330,6 +197332,7 @@ CVE-2022-2865,0,0,794baa87af15b0ea2a9065343d0946c5f462fbdf82f16fbe9e01d8b46a14e6
|
||||
CVE-2022-28650,0,0,05627b5da76bdebde0bdca3bcdd754487a84abbe70f08eac04003233f01e38b6,2024-11-21T06:57:39.270000
|
||||
CVE-2022-28651,0,0,ef67704b323ad53083204788c0fa9ed582969f6686754ef0f231443ad28defe7,2024-11-21T06:57:39.393000
|
||||
CVE-2022-28652,0,0,6028c7eee3555d680f37a7dcfc11f0896d65315b71d174fdc84f276eff470b52,2024-11-21T06:57:39.520000
|
||||
CVE-2022-28653,1,1,6c3bf9647d3efe748345b13200760e973f574f0b56e1bea6efe240da454d57a8,2025-01-31T01:15:08.727000
|
||||
CVE-2022-28654,0,0,ea07dcf35d2fa10ac051dfced437214661594eb15bc3e628b5c69dde3cb8a7f9,2024-11-21T06:57:39.657000
|
||||
CVE-2022-28655,0,0,6b77792ec87f797aee68224d1bc6414a65e7c103ed9a59f3cfb492af4b19a47e,2024-11-21T06:57:39.837000
|
||||
CVE-2022-28656,0,0,8db925d376d042656eb6a29d3eb9ef048b428a0ab972c11bd5092144607a22b8,2024-11-21T06:57:40.017000
|
||||
@ -213250,6 +213253,7 @@ CVE-2023-0088,0,0,d188407570451afd3a17ede76b506954b3342052eab7e267774fb3b2a709ef
|
||||
CVE-2023-0089,0,0,6c60b4af4ba253b8a4febd07150c06189513f24128db4ff7410488e1fad30c6d,2024-11-21T07:36:31.983000
|
||||
CVE-2023-0090,0,0,c15c40d6751ee339ab64f5b40aa08a3f54bcdabd5f7800894c5e0a44b85ec207,2024-11-21T07:36:32.103000
|
||||
CVE-2023-0091,0,0,46c0dab2e7d2216efa636bf9fbc629c5b6c2a3445fae33ad4f8cbb8e71e119c7,2024-11-21T07:36:32.227000
|
||||
CVE-2023-0092,1,1,2017fbf485855b4354e02e17959a06a195cdd64e2c666afb49be09c613e2f60a,2025-01-31T02:15:28.550000
|
||||
CVE-2023-0093,0,0,607afe295d61919d7ead04ba44446a45208196287b6f9acca487fdf4e095524e,2024-11-21T07:36:32.343000
|
||||
CVE-2023-0094,0,0,a89a17929970dc13f48dcdcd5ee44efd0ad1698543e99f1c3440861d97b08758,2024-11-21T07:36:32.463000
|
||||
CVE-2023-0095,0,0,6dc8e2554f999fe037965d222c5f05c6cb586eb1f5bdcea4bf6058bcd182fc9d,2024-11-21T07:36:32.640000
|
||||
@ -241472,7 +241476,7 @@ CVE-2023-6190,0,0,8ed78538c4041525960b803e88198605546a55c3cf47128d1e30e8cf0cec0d
|
||||
CVE-2023-6191,0,0,674a3b71d2e03d1cc751fb32a048486d4c88546b883dd69f41cb5965fd00e87e,2024-11-21T08:43:19.497000
|
||||
CVE-2023-6193,0,0,03fd5b3cb55751a3ff3471e4986ed4557dc70e8bb42417035f31e70fadacbbe5,2024-11-21T08:43:19.627000
|
||||
CVE-2023-6194,0,0,59f670df72e72c8f09561909ca051857ec403afebd9ce05e440183cf16436235,2024-11-21T08:43:19.773000
|
||||
CVE-2023-6195,1,1,cc774157f11097de6d1e844dbcedff1f17e9f084a504b8a4ca0666d36630752b,2025-01-31T00:15:08.697000
|
||||
CVE-2023-6195,0,0,cc774157f11097de6d1e844dbcedff1f17e9f084a504b8a4ca0666d36630752b,2025-01-31T00:15:08.697000
|
||||
CVE-2023-6196,0,0,72a55f844f4992430053e0719cd4d7fdeda22743f5a64c02a6af6c8bbee316cf,2024-11-21T08:43:19.917000
|
||||
CVE-2023-6197,0,0,412bb2a2992bffef076d6449a6c0d1e887e4445ad93dcf75cb3ff71dba1c4130,2024-11-21T08:43:20.060000
|
||||
CVE-2023-6198,0,0,36ef0c0269a26ece535846b9b762c2d5dfa12050e43dfd499c40199b7f6d148b,2024-11-21T08:43:20.190000
|
||||
@ -245223,7 +245227,7 @@ CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3
|
||||
CVE-2024-12106,0,0,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000
|
||||
CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05
|
||||
CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000
|
||||
CVE-2024-1211,1,1,32d530f65bf2c60dac8d5de9f0013a654064aec784500b24493db7e7928d63de,2025-01-31T00:15:08.863000
|
||||
CVE-2024-1211,0,0,32d530f65bf2c60dac8d5de9f0013a654064aec784500b24493db7e7928d63de,2025-01-31T00:15:08.863000
|
||||
CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000
|
||||
CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000
|
||||
CVE-2024-12112,0,0,675887d484c30a489c839813de06f4a2c0e83ee331233fc3bb15be475c6237ea,2025-01-08T04:15:06.683000
|
||||
@ -246761,7 +246765,7 @@ CVE-2024-1809,0,0,0695041dcd7996a752289634ae1652884b129f864a67876e9d511662212797
|
||||
CVE-2024-1810,0,0,ef1b9d193b4b6ae88eae6ce0797e5ed9ebca91266d6d772b21365fa841ac4299,2024-11-21T08:51:22.260000
|
||||
CVE-2024-1811,0,0,b058165d481733ff2f566034bd46cf5c38d757de178902f334844c3785c5239f,2024-11-21T08:51:22.387000
|
||||
CVE-2024-1812,0,0,a54788c84ddbd2b50d7e20cec09804d60d8562b7f5ea4a3a44c80febe86baeb6,2024-11-21T08:51:22.507000
|
||||
CVE-2024-1813,0,0,af9f2bb3eb6bc51b4a215435f235cab2662f97c1f121ca2b9815918d864a5af4,2024-11-21T08:51:22.617000
|
||||
CVE-2024-1813,0,1,8a11f5408f56d3036b98d2d2767053da86d5d03b15379a1b6ebbb011fdc88c3a,2025-01-31T01:25:17.393000
|
||||
CVE-2024-1814,0,0,b1f72ce435b20bd0e1ee07d579e48d7d435132109273eb1e21a4ad380ff59e20,2024-11-21T08:51:22.743000
|
||||
CVE-2024-1815,0,0,7f45c65a4288b28c557236a804803550ac7f7bfe0122910ba9eed9d92210e1ba,2024-11-21T08:51:22.880000
|
||||
CVE-2024-1816,0,0,fb2c71310049ea08362fe36bfa86864d1e43f918274976e175d670be0bdeca77,2024-11-21T08:51:22.990000
|
||||
@ -246929,7 +246933,7 @@ CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bc
|
||||
CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000
|
||||
CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000
|
||||
CVE-2024-1990,0,0,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000
|
||||
CVE-2024-1991,0,0,d5a6bde57be3916ed448846397b8321aa2019f60be0508a767d23c59db90aa0e,2024-11-21T08:51:45.033000
|
||||
CVE-2024-1991,0,1,e17e31758659ee5ba1f674468f604b336ea177778e5fd0e98e79413195a1da3d,2025-01-31T01:32:27.643000
|
||||
CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000
|
||||
CVE-2024-1993,0,0,010d59aa4d31f8f60f42634d27cfbdf469d8f3f88be31616056c1b25e622a672,2024-11-21T08:51:45.183000
|
||||
CVE-2024-1994,0,0,2799a8fba4da98163d1c8a4201d87bd63ba559669844539136acb52787911a32,2024-11-21T08:51:45.320000
|
||||
@ -247962,7 +247966,7 @@ CVE-2024-21166,0,0,a6bd0bb0f14f87d2cb260b91d37d1eb7d306bf89d70257e59bc4b4cc9def7
|
||||
CVE-2024-21167,0,0,432ec591febd00b127b82a752135eda1c54e57e24bfd3147b2b0c6e5e2008ae0,2024-12-05T21:40:35.573000
|
||||
CVE-2024-21168,0,0,5fadf957fe7007e144cd8dcc270cf5ce3de12be645969eb83067715a9c5bd8ae,2024-12-05T21:40:25.147000
|
||||
CVE-2024-21169,0,0,1f544ca6acd3e879097689406f06ebce769fe62e5c81b5c2af0ef227b367a6de,2024-11-21T08:53:55.117000
|
||||
CVE-2024-2117,0,0,4dc8becc80d43827dc23129a6337c22574d8832ac0e47b01d711c04a3d9ec761,2024-11-21T09:09:03.910000
|
||||
CVE-2024-2117,0,1,89ffb9ce686f74be9b52bd340e828f46f9a064c9853597ff90fcd49600cbbb01,2025-01-31T01:37:06.183000
|
||||
CVE-2024-21170,0,0,36d3ccb648c24bcb8a4316c968fb01d1c7477a513721d71af5995cdf5d33228b,2024-11-21T08:53:55.247000
|
||||
CVE-2024-21171,0,0,61b7882ff74299d4c34aa7d4392c360ac819414c7049ab797c7be620c6b6b39e,2024-11-21T08:53:55.370000
|
||||
CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000
|
||||
@ -248163,7 +248167,7 @@ CVE-2024-21376,0,0,74365a6fe1ea03cb8bcca4b647804df584cc285554299561038c8bdb0cda1
|
||||
CVE-2024-21377,0,0,d777e0faea661bcf5ad05a74be4dac22794aecdf9241895dff2da6d2b6b8afbc,2024-11-21T08:54:14.150000
|
||||
CVE-2024-21378,0,0,08b6806b1a75a618830a2c8c05eb7191537ab5daf1f38ff5164da8dafcfd538f,2024-11-21T08:54:14.297000
|
||||
CVE-2024-21379,0,0,4c561e0350e5a6bbd259a4e8babfa51198fef4e207ca5d304ab64c1cd9a5b834,2024-11-21T08:54:14.427000
|
||||
CVE-2024-2138,0,0,52a89346692b6636cd1668ae09391cf23923b189594fe541767af029c016c566,2024-11-21T09:09:06.643000
|
||||
CVE-2024-2138,0,1,2ffda663d7330a5f8ae0904a9494747f3a224fc2b9c9cb9ac62fe78f51fc7864,2025-01-31T01:41:07.187000
|
||||
CVE-2024-21380,0,0,8da7eb3474cc099e42a759c029636cf81b2ddbff1e455ba3cd9a50aa2a07a211,2024-11-21T08:54:14.550000
|
||||
CVE-2024-21381,0,0,d64ef6d978ecd563782354548f7f42add57e373ee4cd2a62663f79fa7dfca2c9,2024-11-21T08:54:14.680000
|
||||
CVE-2024-21382,0,0,11ff97c23512fc49419b724e3c797aadd6cbe0714e2907f834de69f472993c08,2024-11-21T08:54:14.803000
|
||||
@ -248958,7 +248962,7 @@ CVE-2024-22256,0,0,993de2145831c7f61700fd0ab2fd95ca6c5116ee67bd38000c382e5007dbf
|
||||
CVE-2024-22257,0,0,0fada1e669b9a17b3b43a52e9806a718eecb3983eb74b613ee54514e72e21baf,2024-11-21T08:55:54.403000
|
||||
CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000
|
||||
CVE-2024-22259,0,0,dbb569e509ea5651323d4048a88ab3ba6885052f60fe4cb85fc4c34cef61e1fc,2024-11-21T08:55:54.683000
|
||||
CVE-2024-2226,0,0,58148007a4d4ff50a71a1cc3bfe097f1a81059dfdb13ac32d0fd5b9aa0d8c69c,2024-11-21T09:09:17.873000
|
||||
CVE-2024-2226,0,1,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000
|
||||
CVE-2024-22260,0,0,7a7ec824f5ee06e50803ba498f9aef05f0816e9454ff00b22048fb01f9eeb0f0,2024-11-21T08:55:54.833000
|
||||
CVE-2024-22261,0,0,2f3f327d5f00b5b399eeb14b1642972cb9f1a03fa2d26a05c05601b888eaa6cf,2024-11-21T08:55:54.960000
|
||||
CVE-2024-22262,0,0,d1dae9c8bed10fc237c952b05c6b18a50635ff407c8788f5b94072234e0e55e1,2024-11-21T08:55:55.080000
|
||||
@ -249380,7 +249384,7 @@ CVE-2024-23033,0,0,3ac6629c5b401e92929ee396e66c086b06329f9bd4e0a5a005721cb9868c8
|
||||
CVE-2024-23034,0,0,f4f664a4a31c484f7eed2bcd4ad32346a076a1dfba5bb52ec53f33d4f295c321,2024-11-21T08:56:51.800000
|
||||
CVE-2024-2304,0,0,230462e62d4597d9526e82d1b5f4a2f18975cd9c4bc9f381b618660e1e44cfc7,2024-11-21T09:09:28.047000
|
||||
CVE-2024-23049,0,0,123bfbcf3c065f85e1671e94c372b42e7730e61d2f549ac590a6713bc73df88a,2024-11-21T08:56:51.953000
|
||||
CVE-2024-2305,0,0,ebf585b0fc63d5aeb634f952383d1e0c14b5b4ef6ba4de8b432c53217b286d26,2024-11-21T09:09:28.173000
|
||||
CVE-2024-2305,0,1,8e03b8f2ed7cc707ba8b68648aaba53ab636fc8cf60b101c18404f02d1218f6c,2025-01-31T01:48:22.557000
|
||||
CVE-2024-23052,0,0,f64915640578da4aa31f36b2448b98b95ef3ed79182c0b353ac064ff3a6c2d29,2025-01-16T17:53:25.507000
|
||||
CVE-2024-23054,0,0,57c8ee13e5deea4252b00a79726f9264b2ea14e0ed94c41b033e36787c15e590,2024-11-21T08:56:52.347000
|
||||
CVE-2024-23055,0,0,424171c81b8faebe79d8fa44169374c5df8b725bc8a3c3cfaa5dd80c008f24c8,2024-11-21T08:56:52.597000
|
||||
@ -249547,7 +249551,7 @@ CVE-2024-23246,0,0,dba86fcd1448c512e3001d37ec498b089b198c155206beb9371cc0d8180b4
|
||||
CVE-2024-23247,0,0,c204ca7ef7979ea0603fec0bd8eddb1c65df637a5bcdac9a9a2ba060eb81fcf4,2024-12-06T01:58:51.233000
|
||||
CVE-2024-23248,0,0,c48fd9ad2631eef3f53ac5adca0b91801108c15be181b815768304a228795f1c,2024-12-06T01:52:41.503000
|
||||
CVE-2024-23249,0,0,5da154d890c56feee3aeb01a7ee9508a41a9ca6982e5c902a0c40bac654d6a2e,2024-12-06T01:51:51.123000
|
||||
CVE-2024-2325,0,0,453beb4b9b8d8aec78934ca4c38e62a6ce95c98d0294e5c2c907cd71bdb011e5,2024-11-21T09:09:30.457000
|
||||
CVE-2024-2325,0,1,e9d7a45ac74cb9e9f2d916c1beca5a8f9ee8a82216a382217b47300a50214cdf,2025-01-31T01:53:16.193000
|
||||
CVE-2024-23250,0,0,e71404135f796bc9c7f5cde9739de15e0cada9132b6e03839ee534a79eb07fbc,2024-12-06T02:30:56.107000
|
||||
CVE-2024-23251,0,0,1587640133a2f817ad30f95a94ba7bd8ca5859ce26e39d61bfc476489c905acc,2024-11-21T08:57:18.450000
|
||||
CVE-2024-23252,0,0,14d67c7764d249aa5fb6c8bb08b3f6111a58e8166149c197fa34aac49c932454,2024-03-26T19:15:48.757000
|
||||
@ -249703,7 +249707,7 @@ CVE-2024-23396,0,0,3046ceaa908b73ab3dd595a52812030977739472b3a7f09aa9cadd5541ac4
|
||||
CVE-2024-23397,0,0,2eb6252aeb61730c91465d754058b0008522b815ef66ad269db9e54267928aab,2025-01-01T00:15:38.550000
|
||||
CVE-2024-23398,0,0,e88f9120927e9476413a926fb0b918880c7a2e031519af4bc9d0d9ceed8976f4,2025-01-01T00:15:38.607000
|
||||
CVE-2024-23399,0,0,c5d39a21b30070b8372e260c55ce2bfb8562f41128ebd4c9761d8d6a1c092e11,2025-01-01T00:15:38.680000
|
||||
CVE-2024-2340,0,0,c5b40e0d2f54f8d895ab78d87ae8ef170b0cb883382e17c6998adcc28c738df7,2024-11-21T09:09:32.950000
|
||||
CVE-2024-2340,0,1,b708670974fb68f4db2179ff00ab23f9a7c04f08cf9b2664c3233e617e696330,2025-01-31T01:57:32.613000
|
||||
CVE-2024-23400,0,0,c1c7fa9b24fc72031a84aaf751be0aa1d9207bcf72c8a5c077cb22cda9fc6a14,2025-01-01T00:15:38.750000
|
||||
CVE-2024-23401,0,0,cf1e976858104bf7b85d5a96467fa5fdef66034253393db849eb3f4d24501cf2,2025-01-01T00:15:38.817000
|
||||
CVE-2024-23402,0,0,8a47257cf8cf9bbe4ed1fcfa3fa826a35a1d95d9519082619e4e0d6a9abd64b2,2025-01-01T00:15:38.883000
|
||||
@ -249714,7 +249718,7 @@ CVE-2024-23406,0,0,6632d70cf63187e2d5db68b8be533d52d2a71c1a6a8bf883615c716b65dee
|
||||
CVE-2024-23407,0,0,e54b27f95f95e8b8a99f18855702286c4e1a12b5b3c3ddb6618856497b7f8530,2025-01-01T00:15:39.213000
|
||||
CVE-2024-23408,0,0,8869056e91b99bceac4adb484bb24bc8dd9c9f436cc5088f317d8b038f75f01a,2025-01-01T00:15:39.287000
|
||||
CVE-2024-23409,0,0,cc1cb3dfe5bb70f718153978ad3925f2626ffa6968c32e5d9d9a40bd7f076780,2025-01-01T00:15:39.353000
|
||||
CVE-2024-2341,0,0,27a8f5765cebc5ea370b34d6397b8dd45fa3b6ccad0be41b03ef456e1274f9f1,2024-11-21T09:09:33.090000
|
||||
CVE-2024-2341,0,1,e6fd41dd6461488d38a24bccb99f5e22ba326a663a2d761a5cd5988edd87d982,2025-01-31T02:02:01.173000
|
||||
CVE-2024-23410,0,0,5045f508c9d245b3fd8d60012e1a58df0137c84c6e169586f2239396bed0a1ec,2025-01-01T00:15:39.410000
|
||||
CVE-2024-23411,0,0,888f4db91a9816eb333443152b669ba8a17e49794eb6f6d5965f7ecd74a461d0,2025-01-01T00:15:39.470000
|
||||
CVE-2024-23412,0,0,550760e96400b77f6a315acb5c566be08f9642548ff6d18e15331565b7095268,2025-01-01T00:15:39.533000
|
||||
@ -249725,7 +249729,7 @@ CVE-2024-23416,0,0,c26b1d059b352cfba2580ba9de4f2d9a7e2afa996413289605a061816c11e
|
||||
CVE-2024-23417,0,0,36a492d9bd4eb7bdaa571a950db8097ba7140fbbd8786f7d94eb400d6f61698f,2025-01-01T00:15:39.850000
|
||||
CVE-2024-23418,0,0,b9a0039ce552f8561e56e92c3c42626636761c919712584962a0d55673bea1d2,2025-01-01T00:15:39.910000
|
||||
CVE-2024-23419,0,0,6b5f4a05a471454df189ec43a000b6c92041cdac5504094ad6bd23f4be53e903,2025-01-01T00:15:39.970000
|
||||
CVE-2024-2342,0,0,2686d0d764b1cef6f46e8b8e7c1dd7ada4af34ce4c3fa49f721c6ef7016f045f,2024-11-21T09:09:33.223000
|
||||
CVE-2024-2342,0,1,5969e172bb17c16c2817e29023111094c71c743466e60a2465e365add63773f2,2025-01-31T02:04:01.137000
|
||||
CVE-2024-23420,0,0,69afeb8db87b287a36d94b45bf19289154879c0b6414d14de6a7bb4afcc332b8,2025-01-01T00:15:40.037000
|
||||
CVE-2024-23421,0,0,f6d475246274171fe2909ecd3714348684ae173bc256a02c767ef1fe49b09f4f,2025-01-01T00:15:40.100000
|
||||
CVE-2024-23422,0,0,a6c4af7b91dae3c549126d461b022109b184bfd297970d0c36c6382149f2e3c0,2025-01-01T00:15:40.163000
|
||||
@ -249736,7 +249740,7 @@ CVE-2024-23426,0,0,d362a9499347a86c4013fac201077c7ee926840fd2665d5bd58a1b143e7c7
|
||||
CVE-2024-23427,0,0,bf9b1ce4e8b60e120c9e8e79d50f5779ff56e34b8f6868aa7ac1516304982bf6,2025-01-01T00:15:40.477000
|
||||
CVE-2024-23428,0,0,1e9ea1eb7ad430366e0f2732ebcc64571734d8c263746bcfd871d9b25c72630d,2025-01-01T00:15:40.543000
|
||||
CVE-2024-23429,0,0,e8e828161cd5e2b7ef2fd65d37b548c14b34c00fffe254c543f5ebc5a00c341c,2025-01-01T00:15:40.607000
|
||||
CVE-2024-2343,0,0,ff9964481c43aa0f18599732f44e073db21b70998c79c5208b453b3e6a942b69,2024-11-21T09:09:33.350000
|
||||
CVE-2024-2343,0,1,32a6a2d66fb113d644a9c5d82a8edeb496ef12dfbddfcc64caa8414159e904a4,2025-01-31T02:08:29.417000
|
||||
CVE-2024-23430,0,0,b245320d91535cd01f34459b21c02446d04b827eaf02e28147a3b5a9e4f699c7,2025-01-01T00:15:40.670000
|
||||
CVE-2024-23431,0,0,d346c1ded25732c69b97411ec7e1a91f0fc1b1aacd8003918d973866cdc97754,2025-01-01T00:15:40.727000
|
||||
CVE-2024-23432,0,0,4b0a62a7fc9b3de8555667118dad22468af386a34ff7b0bb5a5bd51c103c206e,2025-01-01T00:15:40.793000
|
||||
@ -250192,16 +250196,19 @@ CVE-2024-23917,0,0,87446e79af64f56ab4b2f0757fc8cfd7321e882a0255933c4f0f19299c37c
|
||||
CVE-2024-23918,0,0,b899df058c396303cc4d9dbbab88919628903240d3fbc9fd19e8667d12d0e55c,2024-11-15T14:00:09.720000
|
||||
CVE-2024-23919,0,0,058e35e0621537e23cbd18e05aae6e013440d01fecbaaddd297d731639d19875,2024-11-15T14:00:09.720000
|
||||
CVE-2024-2392,0,0,eeaf76ffa059802be448df469408e08c4579d4ec4b5263bd4359d00f105d8d03,2025-01-28T18:32:57.513000
|
||||
CVE-2024-23920,1,1,f99e25f33e56ffbd7288181b382b02b2bfd9552589b2c639cbf60b3479040b2d,2025-01-31T01:15:09.483000
|
||||
CVE-2024-23921,1,1,4ea4b618e36fc88ef24386e22737b92d45bbc65c24e79a1beac41ad8d94a7f0c,2025-01-31T01:15:09.593000
|
||||
CVE-2024-23922,0,0,2d559582d23c0b1aa77c5c48b51f0b0c564ebc51a759834728fd4f27625943e0,2024-09-30T15:37:28.453000
|
||||
CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2cf16,2024-10-03T18:07:35.977000
|
||||
CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000
|
||||
CVE-2024-23928,1,1,5411d9272c1a5a621d9f3d2e6ccb28ceb427a63dbc56730b74239818ce56f1d1,2025-01-31T00:15:09.030000
|
||||
CVE-2024-23928,0,0,5411d9272c1a5a621d9f3d2e6ccb28ceb427a63dbc56730b74239818ce56f1d1,2025-01-31T00:15:09.030000
|
||||
CVE-2024-23929,1,1,56123b9ce5553a7639a1aba360e38138070f2f5cd459a15243fa222c3f91e652,2025-01-31T01:15:09.697000
|
||||
CVE-2024-2393,0,0,b6127d3f8197d098d229238d65ed3c274935d9588c7b7a15821e57a641aa69a9,2024-11-21T09:09:39.413000
|
||||
CVE-2024-23930,1,1,7c032c39b9a65ef6c02a997c6d0d3110786beb878ebc540d6c49d3b447bd601d,2025-01-31T00:15:09.147000
|
||||
CVE-2024-23930,0,0,7c032c39b9a65ef6c02a997c6d0d3110786beb878ebc540d6c49d3b447bd601d,2025-01-31T00:15:09.147000
|
||||
CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000
|
||||
CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000
|
||||
CVE-2024-23935,0,0,8074757a7750aac4e40a15499625e0de0f941684b6e4e8032ec6635cd7c0aafb,2024-10-03T18:07:01.967000
|
||||
CVE-2024-23937,1,1,24af6bad61351de0dcfe24df81f30ce5cbb22e6232fcea12851a7e4859a990c3,2025-01-31T00:15:09.257000
|
||||
CVE-2024-23937,0,0,24af6bad61351de0dcfe24df81f30ce5cbb22e6232fcea12851a7e4859a990c3,2025-01-31T00:15:09.257000
|
||||
CVE-2024-23938,0,0,5569f095c88d3edc91da7b05d4b47aad5d8c07d6eab7699149a618af2c5b094a,2024-10-03T17:29:28.230000
|
||||
CVE-2024-2394,0,0,621d534b6e99ea3eb7663377d97ee0e05ad2be3959f632056cfe6794bf2d117f,2024-11-21T09:09:39.550000
|
||||
CVE-2024-23940,0,0,06d04c2e3a7f29a0e7a62a5331ae3d9d5c7acce3a81c480978850a16e4f0b74a,2024-11-21T08:58:43.807000
|
||||
@ -250222,16 +250229,16 @@ CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27
|
||||
CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000
|
||||
CVE-2024-23960,0,0,cff56ab82ea9e077741b7c7712db67327c7a66944d1aacabc3102eca8aa98039,2024-10-03T18:06:26.457000
|
||||
CVE-2024-23961,0,0,cddb82f65f7f594870e3234d43ec53693c26d34fff040eeedd46a915ad4dd550,2024-10-03T18:06:59.083000
|
||||
CVE-2024-23962,1,1,74681b850f1fc9fad5ded385cd4fa7d962da2f7e200b3b0e73a07785086473a7,2025-01-31T00:15:09.367000
|
||||
CVE-2024-23963,1,1,6108221548131f2f3e3765d1c26eaa8d41f1537f9c20c59cbfb9cc41211e5c05,2025-01-31T00:15:09.483000
|
||||
CVE-2024-23962,0,0,74681b850f1fc9fad5ded385cd4fa7d962da2f7e200b3b0e73a07785086473a7,2025-01-31T00:15:09.367000
|
||||
CVE-2024-23963,0,0,6108221548131f2f3e3765d1c26eaa8d41f1537f9c20c59cbfb9cc41211e5c05,2025-01-31T00:15:09.483000
|
||||
CVE-2024-23967,0,0,7280cb7c94ec5dda172d5df2bf80662cc9068f65953193c91dccf565d7d9da83,2024-10-03T17:37:37.907000
|
||||
CVE-2024-23968,1,1,95298310eddb8597c0e66221e981a88d853baa7f2fc8e00d871d9a6d29ecf0ea,2025-01-31T00:15:09.593000
|
||||
CVE-2024-23969,1,1,18861054b5ffc1db58d21c09d8c9eb7a84d143d2dc35da378a87f9bab477594c,2025-01-31T00:15:09.703000
|
||||
CVE-2024-23968,0,0,95298310eddb8597c0e66221e981a88d853baa7f2fc8e00d871d9a6d29ecf0ea,2025-01-31T00:15:09.593000
|
||||
CVE-2024-23969,0,0,18861054b5ffc1db58d21c09d8c9eb7a84d143d2dc35da378a87f9bab477594c,2025-01-31T00:15:09.703000
|
||||
CVE-2024-2397,0,0,5fb0197db4b3c4d2227b13547694e85857b7a4c74effd50b8a6745026ec33bdc,2024-11-21T09:09:39.813000
|
||||
CVE-2024-23970,1,1,89562f29d73cd9fd5fa39f13917218fe4c893d6c725cf64696f63b3f606d5cd5,2025-01-31T00:15:09.810000
|
||||
CVE-2024-23971,1,1,52f01954a7c5cb68a42e7813a33ad36ec91f4ececa14e67cc3b671e8be1b9a3e,2025-01-31T00:15:09.920000
|
||||
CVE-2024-23970,0,0,89562f29d73cd9fd5fa39f13917218fe4c893d6c725cf64696f63b3f606d5cd5,2025-01-31T00:15:09.810000
|
||||
CVE-2024-23971,0,0,52f01954a7c5cb68a42e7813a33ad36ec91f4ececa14e67cc3b671e8be1b9a3e,2025-01-31T00:15:09.920000
|
||||
CVE-2024-23972,0,0,c1da4dfb8070c5982ab47e4270a0ccda6bc573b9715ff386ebc743af774de5bf,2024-09-30T15:37:30.903000
|
||||
CVE-2024-23973,1,1,9aeb316aeb64f2a02b0c2c201b7f456c16f6f79700cf9e84d54457faf3376693,2025-01-31T00:15:10.027000
|
||||
CVE-2024-23973,0,0,9aeb316aeb64f2a02b0c2c201b7f456c16f6f79700cf9e84d54457faf3376693,2025-01-31T00:15:10.027000
|
||||
CVE-2024-23974,0,0,35a59c7b28e59857044701b56dc055f1b24022c784e66981040930f49ee8a096,2024-08-14T17:49:14.177000
|
||||
CVE-2024-23975,0,0,3d9da3af337279e9b313ac08550c2e823f587b547ba35308d77261dd2e00a96d,2024-11-21T08:58:46.250000
|
||||
CVE-2024-23976,0,0,0a3cf0bfcca01615b967f2d2997adff248a3f967097a8f4e588dad3de97db194,2025-01-23T19:52:58.893000
|
||||
@ -250616,7 +250623,7 @@ CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5
|
||||
CVE-2024-24724,0,0,1d4f547e29f1ac6cd7eb5ae81fd8b236270fe4c23ef6bd5d247bd14b860d3f45,2024-11-21T08:59:35.290000
|
||||
CVE-2024-24725,0,0,d017b08edcbd2a3884154e1dbc0dbc1ac3aa94a44515a00866c71ade3dc58c6c,2024-11-21T08:59:35.513000
|
||||
CVE-2024-2473,0,0,acadb547139f591a97806220ebdf2a3534557dbddc3fc15183d421387cd351e4,2024-11-21T09:09:49.860000
|
||||
CVE-2024-24731,1,1,82cd697dfd1151765ad73c776837b6734939ae00a1761c923cbd6fa960262cb5,2025-01-31T00:15:10.137000
|
||||
CVE-2024-24731,0,0,82cd697dfd1151765ad73c776837b6734939ae00a1761c923cbd6fa960262cb5,2025-01-31T00:15:10.137000
|
||||
CVE-2024-24736,0,0,d0fa5e077e44be2d79b6fcbd911bf7ac67fb3df6bf0c252c9b605cc03f993ae3,2024-11-21T08:59:35.727000
|
||||
CVE-2024-24739,0,0,6787b39ccf56a39b6b5f966ae1bc0cc7aab398904a033df39fc9b573881219e7,2024-11-21T08:59:35.887000
|
||||
CVE-2024-2474,0,0,37d7ab7215e32fd563c4e70b124becb40537dfa1c8a597cea490413dbe83653a,2024-11-21T09:09:49.993000
|
||||
@ -257880,7 +257887,7 @@ CVE-2024-34223,0,0,c2ee839afb9b1fac1c90169923bdab548a7c7cf9533cc5507d2fca08bb6f0
|
||||
CVE-2024-34224,0,0,3a60fcfa0164eec7a80099b3676c3554e933619cb6a29b591672b45bc0c440e9,2024-11-21T09:18:20.030000
|
||||
CVE-2024-34225,0,0,6d2138de3835c9191c51c4afb4300d242b9779d66092f9c88507f5e324d1fce4,2024-11-21T09:18:20.260000
|
||||
CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4cd17,2024-11-21T09:18:20.477000
|
||||
CVE-2024-3423,0,0,04c44e8c396e88e33e76b227756ab6e4a3cdb303568294582004d57706273469,2024-11-21T09:29:34.370000
|
||||
CVE-2024-3423,0,1,5c28f6a27e8c49f5d0774f94cea4e72250ac0f626cffdb04fd7d52cfa4e7c084,2025-01-31T01:22:52.200000
|
||||
CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000
|
||||
CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000
|
||||
CVE-2024-34235,0,0,dab26bff88668dca45ccc233b8bf548c9cad07c0297c9b8098d31cd0ae0063e1,2025-01-22T15:15:12.900000
|
||||
@ -278332,7 +278339,7 @@ CVE-2025-21389,0,0,b734af143001cdbe15aeee14fe9e8d94be90a7e77dca2b7c7e3d41d7dfa35
|
||||
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
|
||||
CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
|
||||
CVE-2025-21396,0,0,8fe692a379ce2414e6e0333af1d8968765358477dbdc34cfe813f989291fa433,2025-01-29T23:15:32.640000
|
||||
CVE-2025-21399,0,0,35cd7b1b1969accaedcde29eba1e481458b35a096143c28ca4c47fcddb55b1c9,2025-01-17T21:15:11.283000
|
||||
CVE-2025-21399,0,1,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000
|
||||
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
|
||||
CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000
|
||||
CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
|
||||
@ -279361,7 +279368,7 @@ CVE-2025-24169,0,0,6d755845d64c6951c077fbd505366a52b470f5f801a7504189b5dfcb4650f
|
||||
CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000
|
||||
CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000
|
||||
CVE-2025-24177,0,0,7093231474cd37fc1206cb86983fb697c3827c42e0c7d917cda4d55518409c14,2025-01-30T16:26:45.687000
|
||||
CVE-2025-24336,1,1,1aa8b22c952431e7547e9cae53c4b88dde35cd11b44cdaca2c824f85347f12ef,2025-01-31T00:15:20.607000
|
||||
CVE-2025-24336,0,0,1aa8b22c952431e7547e9cae53c4b88dde35cd11b44cdaca2c824f85347f12ef,2025-01-31T00:15:20.607000
|
||||
CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000
|
||||
CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000
|
||||
CVE-2025-24354,0,0,199df517a0aee7e33fd2ec9adb1554ea78ea05529e77b04513fa860b5618b486,2025-01-27T18:15:41.197000
|
||||
@ -279567,5 +279574,5 @@ CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab9
|
||||
CVE-2025-24882,0,0,a23ce05efaa4af8c3630627536762c229213516f16a0fddf8927088c78e2a99f,2025-01-29T18:15:47.570000
|
||||
CVE-2025-24883,0,0,e4977be39a4935cccc31d44b4babca335570d7230803a869c62284a8184b38eb,2025-01-30T16:15:31.947000
|
||||
CVE-2025-24884,0,0,a1ca36a099d9726efc182c133a664383454ee2f707a06a51fc353abfffeb9263,2025-01-29T21:15:21.667000
|
||||
CVE-2025-24885,1,1,6db9bb3eb3b2095c8c21eef287986cb79d8d13f16a086eb14d1d414a2f8264a4,2025-01-30T23:15:07.993000
|
||||
CVE-2025-24886,1,1,22fe46ec70a40a868eba2ce8010e4edb050dca5246d72f260cb907446680300d,2025-01-30T23:15:08.990000
|
||||
CVE-2025-24885,0,0,6db9bb3eb3b2095c8c21eef287986cb79d8d13f16a086eb14d1d414a2f8264a4,2025-01-30T23:15:07.993000
|
||||
CVE-2025-24886,0,0,22fe46ec70a40a868eba2ce8010e4edb050dca5246d72f260cb907446680300d,2025-01-30T23:15:08.990000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user