mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-04T00:55:19.776186+00:00
This commit is contained in:
parent
6e65b3a25b
commit
399cb89b03
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-32221",
|
"id": "CVE-2023-32221",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2023-06-12T21:15:22.737",
|
"published": "2023-06-12T21:15:22.737",
|
||||||
"lastModified": "2024-11-21T08:02:55.783",
|
"lastModified": "2025-01-04T00:15:06.207",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -65,6 +65,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-11624",
|
"id": "CVE-2024-11624",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.030",
|
"published": "2025-01-03T04:15:06.030",
|
||||||
"lastModified": "2025-01-03T04:15:06.030",
|
"lastModified": "2025-01-03T23:15:06.157",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Existe la posibilidad de agregar aplicaciones para omitir la VPN debido a permisos no declarados. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
60
CVE-2024/CVE-2024-117xx/CVE-2024-11733.json
Normal file
60
CVE-2024/CVE-2024-117xx/CVE-2024-11733.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11733",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2025-01-03T23:15:06.313",
|
||||||
|
"lastModified": "2025-01-03T23:15:06.313",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The The WordPress Popular Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/wordpress-popular-posts/tags/7.1.0/src/Rest/ViewLoggerEndpoint.php#L70",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c38ac8d6-c6de-4be7-bf7b-198e085a0ad2?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-122xx/CVE-2024-12237.json
Normal file
64
CVE-2024/CVE-2024-122xx/CVE-2024-12237.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-12237",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2025-01-03T23:15:06.473",
|
||||||
|
"lastModified": "2025-01-03T23:15:06.473",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.15 via the rjg_get_youtube_info_justified_gallery_callback function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to retrieve limited information from internal services."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3023",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3044",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08e44434-8908-4c63-9e5b-9a8b387255d9?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-43767",
|
"id": "CVE-2024-43767",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2025-01-03T01:15:07.847",
|
"published": "2025-01-03T01:15:07.847",
|
||||||
"lastModified": "2025-01-03T01:15:07.847",
|
"lastModified": "2025-01-03T23:15:06.627",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En prepare_to_draw_into_mask de SkBlurMaskFilterImpl.cpp, existe un posible desbordamiento de pila debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807",
|
"url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-43768",
|
"id": "CVE-2024-43768",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2025-01-03T01:15:07.923",
|
"published": "2025-01-03T01:15:07.923",
|
||||||
"lastModified": "2025-01-03T01:15:07.923",
|
"lastModified": "2025-01-03T23:15:06.767",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En skia_alloc_func de SkDeflate.cpp, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93",
|
"url": "https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-43769",
|
"id": "CVE-2024-43769",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2025-01-03T01:15:08.003",
|
"published": "2025-01-03T01:15:08.003",
|
||||||
"lastModified": "2025-01-03T01:15:08.003",
|
"lastModified": "2025-01-03T23:15:06.903",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In isPackageDeviceAdmin of PackageManagerService.java, there is a possible edge case which could prevent the uninstallation of CloudDpc due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In isPackageDeviceAdmin of PackageManagerService.java, there is a possible edge case which could prevent the uninstallation of CloudDpc due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En isPackageDeviceAdmin de PackageManagerService.java, existe un posible caso extremo que podr\u00eda impedir la desinstalaci\u00f3n de CloudDpc debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/619ffc299bf33566ba6daee8301ee0fc96e015f4",
|
"url": "https://android.googlesource.com/platform/frameworks/base/+/619ffc299bf33566ba6daee8301ee0fc96e015f4",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-47032",
|
"id": "CVE-2024-47032",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.137",
|
"published": "2025-01-03T04:15:06.137",
|
||||||
"lastModified": "2025-01-03T04:15:06.137",
|
"lastModified": "2025-01-03T23:15:07.047",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In construct_transaction_from_cmd of lwis_ioctl.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In construct_transaction_from_cmd of lwis_ioctl.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En construct_transaction_from_cmd de lwis_ioctl.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento del b\u00fafer de mont\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53834",
|
"id": "CVE-2024-53834",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.310",
|
"published": "2025-01-03T04:15:06.310",
|
||||||
"lastModified": "2025-01-03T04:15:06.310",
|
"lastModified": "2025-01-03T23:15:07.190",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En sms_DisplayHexDumpOfPrivacyBuffer de sms_Utilities.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53835",
|
"id": "CVE-2024-53835",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.383",
|
"published": "2025-01-03T04:15:06.383",
|
||||||
"lastModified": "2025-01-03T04:15:06.383",
|
"lastModified": "2025-01-03T23:15:07.333",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Existe la posibilidad de una omisi\u00f3n biom\u00e9trica debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53836",
|
"id": "CVE-2024-53836",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.470",
|
"published": "2025-01-03T04:15:06.470",
|
||||||
"lastModified": "2025-01-03T04:15:06.470",
|
"lastModified": "2025-01-03T23:15:07.470",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In wbrc_bt_dev_write of wb_regon_coordinator.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In wbrc_bt_dev_write of wb_regon_coordinator.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En wbrc_bt_dev_write de wb_regon_coordinator.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53837",
|
"id": "CVE-2024-53837",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.560",
|
"published": "2025-01-03T04:15:06.560",
|
||||||
"lastModified": "2025-01-03T04:15:06.560",
|
"lastModified": "2025-01-03T23:15:07.620",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En prepare_response de lwis_periodic_io.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53838",
|
"id": "CVE-2024-53838",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.650",
|
"published": "2025-01-03T04:15:06.650",
|
||||||
"lastModified": "2025-01-03T04:15:06.650",
|
"lastModified": "2025-01-03T23:15:07.747",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En Exynos_parsing_user_data_registered_itu_t_t35 de VendorVideoAPI.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53839",
|
"id": "CVE-2024-53839",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.727",
|
"published": "2025-01-03T04:15:06.727",
|
||||||
"lastModified": "2025-01-03T04:15:06.727",
|
"lastModified": "2025-01-03T23:15:07.883",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation."
|
"value": "In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En GetCellInfoList() de protocolnetadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53840",
|
"id": "CVE-2024-53840",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.810",
|
"published": "2025-01-03T04:15:06.810",
|
||||||
"lastModified": "2025-01-03T04:15:06.810",
|
"lastModified": "2025-01-03T23:15:08.020",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Existe la posibilidad de una omisi\u00f3n biom\u00e9trica debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53841",
|
"id": "CVE-2024-53841",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.893",
|
"published": "2025-01-03T04:15:06.893",
|
||||||
"lastModified": "2025-01-03T04:15:06.893",
|
"lastModified": "2025-01-03T23:15:08.153",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En startListeningForDeviceStateChanges, existe una posible omisi\u00f3n de permisos debido a un subordinado confundido. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-53842",
|
"id": "CVE-2024-53842",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2025-01-03T04:15:06.980",
|
"published": "2025-01-03T04:15:06.980",
|
||||||
"lastModified": "2025-01-03T04:15:06.980",
|
"lastModified": "2025-01-03T23:15:08.293",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En cc_SendCcImsInfoIndMsg de cc_MmConManagement.c, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",
|
||||||
|
56
CVE-2024/CVE-2024-558xx/CVE-2024-55896.json
Normal file
56
CVE-2024/CVE-2024-558xx/CVE-2024-55896.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55896",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2025-01-03T23:15:08.437",
|
||||||
|
"lastModified": "2025-01-03T23:15:08.437",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames. \u00a0This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-451"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7180036",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
44
CVE-2024/CVE-2024-558xx/CVE-2024-55897.json
Normal file
44
CVE-2024/CVE-2024-558xx/CVE-2024-55897.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55897",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2025-01-03T23:15:08.573",
|
||||||
|
"lastModified": "2025-01-03T23:15:08.573",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 \n\ndoes not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7180036",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-01xx/CVE-2025-0199.json
Normal file
145
CVE-2025/CVE-2025-01xx/CVE-2025-0199.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0199",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-01-03T23:15:08.707",
|
||||||
|
"lastModified": "2025-01-03T23:15:08.707",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://code-projects.org/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/Masamuneee/eff0a0865d54305faa78624e63172a92",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.290136",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.290136",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.473384",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-22376",
|
"id": "CVE-2025-22376",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-01-03T22:15:07.917",
|
"published": "2025-01-03T22:15:07.917",
|
||||||
"lastModified": "2025-01-03T22:15:07.917",
|
"lastModified": "2025-01-03T23:15:08.897",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,30 @@
|
|||||||
"value": "In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong."
|
"value": "In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
@ -22,6 +45,16 @@
|
|||||||
"value": "CWE-338"
|
"value": "CWE-338"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-338"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
54
README.md
54
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-01-03T23:00:21.059268+00:00
|
2025-01-04T00:55:19.776186+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-01-03T22:49:49.463000+00:00
|
2025-01-04T00:15:06.207000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,42 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
275673
|
275678
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `4`
|
Recently added CVEs: `5`
|
||||||
|
|
||||||
- [CVE-2024-13129](CVE-2024/CVE-2024-131xx/CVE-2024-13129.json) (`2025-01-03T22:15:06.677`)
|
- [CVE-2024-11733](CVE-2024/CVE-2024-117xx/CVE-2024-11733.json) (`2025-01-03T23:15:06.313`)
|
||||||
- [CVE-2024-56332](CVE-2024/CVE-2024-563xx/CVE-2024-56332.json) (`2025-01-03T21:15:13.550`)
|
- [CVE-2024-12237](CVE-2024/CVE-2024-122xx/CVE-2024-12237.json) (`2025-01-03T23:15:06.473`)
|
||||||
- [CVE-2025-0198](CVE-2025/CVE-2025-01xx/CVE-2025-0198.json) (`2025-01-03T21:15:14.053`)
|
- [CVE-2024-55896](CVE-2024/CVE-2024-558xx/CVE-2024-55896.json) (`2025-01-03T23:15:08.437`)
|
||||||
- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T22:15:07.917`)
|
- [CVE-2024-55897](CVE-2024/CVE-2024-558xx/CVE-2024-55897.json) (`2025-01-03T23:15:08.573`)
|
||||||
|
- [CVE-2025-0199](CVE-2025/CVE-2025-01xx/CVE-2025-0199.json) (`2025-01-03T23:15:08.707`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `19`
|
Recently modified CVEs: `16`
|
||||||
|
|
||||||
- [CVE-2022-27539](CVE-2022/CVE-2022-275xx/CVE-2022-27539.json) (`2025-01-03T21:15:07.173`)
|
- [CVE-2023-32221](CVE-2023/CVE-2023-322xx/CVE-2023-32221.json) (`2025-01-04T00:15:06.207`)
|
||||||
- [CVE-2022-27541](CVE-2022/CVE-2022-275xx/CVE-2022-27541.json) (`2025-01-03T21:15:08.570`)
|
- [CVE-2024-11624](CVE-2024/CVE-2024-116xx/CVE-2024-11624.json) (`2025-01-03T23:15:06.157`)
|
||||||
- [CVE-2023-27837](CVE-2023/CVE-2023-278xx/CVE-2023-27837.json) (`2025-01-03T21:15:11.333`)
|
- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-01-03T23:15:06.627`)
|
||||||
- [CVE-2023-29160](CVE-2023/CVE-2023-291xx/CVE-2023-29160.json) (`2025-01-03T21:15:11.997`)
|
- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-01-03T23:15:06.767`)
|
||||||
- [CVE-2023-29167](CVE-2023/CVE-2023-291xx/CVE-2023-29167.json) (`2025-01-03T21:15:12.217`)
|
- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-01-03T23:15:06.903`)
|
||||||
- [CVE-2023-29498](CVE-2023/CVE-2023-294xx/CVE-2023-29498.json) (`2025-01-03T21:15:12.417`)
|
- [CVE-2024-47032](CVE-2024/CVE-2024-470xx/CVE-2024-47032.json) (`2025-01-03T23:15:07.047`)
|
||||||
- [CVE-2023-29562](CVE-2023/CVE-2023-295xx/CVE-2023-29562.json) (`2025-01-03T21:15:12.693`)
|
- [CVE-2024-53834](CVE-2024/CVE-2024-538xx/CVE-2024-53834.json) (`2025-01-03T23:15:07.190`)
|
||||||
- [CVE-2024-35365](CVE-2024/CVE-2024-353xx/CVE-2024-35365.json) (`2025-01-03T21:15:12.940`)
|
- [CVE-2024-53835](CVE-2024/CVE-2024-538xx/CVE-2024-53835.json) (`2025-01-03T23:15:07.333`)
|
||||||
- [CVE-2024-36613](CVE-2024/CVE-2024-366xx/CVE-2024-36613.json) (`2025-01-03T21:15:13.140`)
|
- [CVE-2024-53836](CVE-2024/CVE-2024-538xx/CVE-2024-53836.json) (`2025-01-03T23:15:07.470`)
|
||||||
- [CVE-2024-43077](CVE-2024/CVE-2024-430xx/CVE-2024-43077.json) (`2025-01-03T22:15:07.360`)
|
- [CVE-2024-53837](CVE-2024/CVE-2024-538xx/CVE-2024-53837.json) (`2025-01-03T23:15:07.620`)
|
||||||
- [CVE-2024-43097](CVE-2024/CVE-2024-430xx/CVE-2024-43097.json) (`2025-01-03T22:15:07.503`)
|
- [CVE-2024-53838](CVE-2024/CVE-2024-538xx/CVE-2024-53838.json) (`2025-01-03T23:15:07.747`)
|
||||||
- [CVE-2024-43762](CVE-2024/CVE-2024-437xx/CVE-2024-43762.json) (`2025-01-03T22:15:07.640`)
|
- [CVE-2024-53839](CVE-2024/CVE-2024-538xx/CVE-2024-53839.json) (`2025-01-03T23:15:07.883`)
|
||||||
- [CVE-2024-43764](CVE-2024/CVE-2024-437xx/CVE-2024-43764.json) (`2025-01-03T22:15:07.783`)
|
- [CVE-2024-53840](CVE-2024/CVE-2024-538xx/CVE-2024-53840.json) (`2025-01-03T23:15:08.020`)
|
||||||
- [CVE-2024-55507](CVE-2024/CVE-2024-555xx/CVE-2024-55507.json) (`2025-01-03T21:15:13.340`)
|
- [CVE-2024-53841](CVE-2024/CVE-2024-538xx/CVE-2024-53841.json) (`2025-01-03T23:15:08.153`)
|
||||||
- [CVE-2024-56410](CVE-2024/CVE-2024-564xx/CVE-2024-56410.json) (`2025-01-03T21:15:13.723`)
|
- [CVE-2024-53842](CVE-2024/CVE-2024-538xx/CVE-2024-53842.json) (`2025-01-03T23:15:08.293`)
|
||||||
- [CVE-2024-8811](CVE-2024/CVE-2024-88xx/CVE-2024-8811.json) (`2025-01-03T22:49:49.463`)
|
- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T23:15:08.897`)
|
||||||
- [CVE-2024-9257](CVE-2024/CVE-2024-92xx/CVE-2024-9257.json) (`2025-01-03T22:07:42.553`)
|
|
||||||
- [CVE-2024-9665](CVE-2024/CVE-2024-96xx/CVE-2024-9665.json) (`2025-01-03T21:58:29.893`)
|
|
||||||
- [CVE-2024-9710](CVE-2024/CVE-2024-97xx/CVE-2024-9710.json) (`2025-01-03T21:36:39.877`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
81
_state.csv
81
_state.csv
@ -196418,10 +196418,10 @@ CVE-2022-27535,0,0,1cd6253a7592e69bce8f5422a0f47245fc510e8ea772b035a7451e9ed1d4f
|
|||||||
CVE-2022-27536,0,0,68d5018ea0b495266f2ee0d5eb27a828a98d13012d37fb7e54356414e829f58f,2024-11-21T06:55:54.037000
|
CVE-2022-27536,0,0,68d5018ea0b495266f2ee0d5eb27a828a98d13012d37fb7e54356414e829f58f,2024-11-21T06:55:54.037000
|
||||||
CVE-2022-27537,0,0,f9fe620e75010dd8c009107b59488ac897d990c050930c096c76d6907e67be7c,2024-11-21T06:55:54.200000
|
CVE-2022-27537,0,0,f9fe620e75010dd8c009107b59488ac897d990c050930c096c76d6907e67be7c,2024-11-21T06:55:54.200000
|
||||||
CVE-2022-27538,0,0,038809a6acf0fdd8065c85744209857483747d8b095257d7aa8ab4fb763ae904,2024-11-21T06:55:54.680000
|
CVE-2022-27538,0,0,038809a6acf0fdd8065c85744209857483747d8b095257d7aa8ab4fb763ae904,2024-11-21T06:55:54.680000
|
||||||
CVE-2022-27539,0,1,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000
|
CVE-2022-27539,0,0,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000
|
||||||
CVE-2022-2754,0,0,5fd204098138c7c579a0e559edbbb117b8423f6089a27ae9bbe02e85b1b02437,2024-11-21T07:01:38.577000
|
CVE-2022-2754,0,0,5fd204098138c7c579a0e559edbbb117b8423f6089a27ae9bbe02e85b1b02437,2024-11-21T07:01:38.577000
|
||||||
CVE-2022-27540,0,0,7b937f21398b8778219a017044700af59f5e3b174221c511754c41d0c25a2e92,2024-11-21T06:55:55.787000
|
CVE-2022-27540,0,0,7b937f21398b8778219a017044700af59f5e3b174221c511754c41d0c25a2e92,2024-11-21T06:55:55.787000
|
||||||
CVE-2022-27541,0,1,63759ab83ad42605ce46899d88d69ab81bacd2fdcff23e3b2348c9128ac5d05d,2025-01-03T21:15:08.570000
|
CVE-2022-27541,0,0,63759ab83ad42605ce46899d88d69ab81bacd2fdcff23e3b2348c9128ac5d05d,2025-01-03T21:15:08.570000
|
||||||
CVE-2022-27544,0,0,97ae1750c0bbb6eb1b440ad74287f9286e451a76c0331131ed2e992416febf46,2024-11-21T06:55:56.463000
|
CVE-2022-27544,0,0,97ae1750c0bbb6eb1b440ad74287f9286e451a76c0331131ed2e992416febf46,2024-11-21T06:55:56.463000
|
||||||
CVE-2022-27545,0,0,f9d013f4fcb59c90d804839c16351243550a2e96b6123a0a0202783eae7ae12e,2024-11-21T06:55:56.570000
|
CVE-2022-27545,0,0,f9d013f4fcb59c90d804839c16351243550a2e96b6123a0a0202783eae7ae12e,2024-11-21T06:55:56.570000
|
||||||
CVE-2022-27546,0,0,320ed5ca83e4d364579d1d5a1bc45e960c5bf0f910433ed6485e80c2179e0b99,2024-11-21T06:55:56.677000
|
CVE-2022-27546,0,0,320ed5ca83e4d364579d1d5a1bc45e960c5bf0f910433ed6485e80c2179e0b99,2024-11-21T06:55:56.677000
|
||||||
@ -221460,7 +221460,7 @@ CVE-2023-27826,0,0,6347975b3ad6cd0a6c56e8ad212042e6480582857697baae9c7d72978fd34
|
|||||||
CVE-2023-2783,0,0,096c3b26e537bed1ca5ddb3ac65f36398fc1d487c37d85c199430095b0e32907,2024-11-21T07:59:16.937000
|
CVE-2023-2783,0,0,096c3b26e537bed1ca5ddb3ac65f36398fc1d487c37d85c199430095b0e32907,2024-11-21T07:59:16.937000
|
||||||
CVE-2023-27830,0,0,31134275eb53f6f7a000d54b47d97c7e7c9a150ff8289e7f25052e8f6b4f75b8,2024-11-21T07:53:32.780000
|
CVE-2023-27830,0,0,31134275eb53f6f7a000d54b47d97c7e7c9a150ff8289e7f25052e8f6b4f75b8,2024-11-21T07:53:32.780000
|
||||||
CVE-2023-27836,0,0,30b937837ffa1713e4b2f825e29485760bfb12129ee96c2dc2625ffc70ca344b,2024-11-21T07:53:32.950000
|
CVE-2023-27836,0,0,30b937837ffa1713e4b2f825e29485760bfb12129ee96c2dc2625ffc70ca344b,2024-11-21T07:53:32.950000
|
||||||
CVE-2023-27837,0,1,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000
|
CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000
|
||||||
CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000
|
CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000
|
||||||
CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000
|
CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000
|
||||||
CVE-2023-27843,0,0,b9d62937a262e9ac3f834c7160d689a0eba062e6de695ff9490a67ccc210c47d,2024-11-21T07:53:33.437000
|
CVE-2023-27843,0,0,b9d62937a262e9ac3f834c7160d689a0eba062e6de695ff9490a67ccc210c47d,2024-11-21T07:53:33.437000
|
||||||
@ -222728,13 +222728,13 @@ CVE-2023-29157,0,0,e139a470842d9e5b9d6b09da86981de056cc51c8cf1ef74955e9869ec1f8a
|
|||||||
CVE-2023-29158,0,0,d93e1a8f6332e77a5b3ca2ca77ab8702fcdee0067fa37722a2ec00c716cd850d,2024-11-21T07:56:38.070000
|
CVE-2023-29158,0,0,d93e1a8f6332e77a5b3ca2ca77ab8702fcdee0067fa37722a2ec00c716cd850d,2024-11-21T07:56:38.070000
|
||||||
CVE-2023-29159,0,0,cd911818f734775dab3175db6db6b98b2b6ea2654ed5bee8d236e6c77f00c323,2024-11-21T07:56:38.187000
|
CVE-2023-29159,0,0,cd911818f734775dab3175db6db6b98b2b6ea2654ed5bee8d236e6c77f00c323,2024-11-21T07:56:38.187000
|
||||||
CVE-2023-2916,0,0,27d1944ec651f5d060d75979b808931283d2f3099341e8c0d7dabfe85c912ba8,2024-11-21T07:59:33.867000
|
CVE-2023-2916,0,0,27d1944ec651f5d060d75979b808931283d2f3099341e8c0d7dabfe85c912ba8,2024-11-21T07:59:33.867000
|
||||||
CVE-2023-29160,0,1,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000
|
CVE-2023-29160,0,0,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000
|
||||||
CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000
|
CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000
|
||||||
CVE-2023-29162,0,0,fc28511a9719aa19e64a9b38fb6b29e7ab41ba9bfec25fae87ebdae7a06b9409,2024-11-21T07:56:38.497000
|
CVE-2023-29162,0,0,fc28511a9719aa19e64a9b38fb6b29e7ab41ba9bfec25fae87ebdae7a06b9409,2024-11-21T07:56:38.497000
|
||||||
CVE-2023-29163,0,0,6fe755248c7818416bda58be22dd7bac179c1b8424232d05103993a92144726d,2024-11-21T07:56:38.597000
|
CVE-2023-29163,0,0,6fe755248c7818416bda58be22dd7bac179c1b8424232d05103993a92144726d,2024-11-21T07:56:38.597000
|
||||||
CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a884a,2024-11-21T07:56:38.713000
|
CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a884a,2024-11-21T07:56:38.713000
|
||||||
CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000
|
CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000
|
||||||
CVE-2023-29167,0,1,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000
|
CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000
|
||||||
CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000
|
CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000
|
||||||
CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000
|
CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000
|
||||||
CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34
|
CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34
|
||||||
@ -223032,7 +223032,7 @@ CVE-2023-29492,0,0,6d699c439c5d8ded49fa6cb032f9de89a3509187577d5869add282334a403
|
|||||||
CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000
|
CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000
|
||||||
CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000
|
CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000
|
||||||
CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000
|
CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000
|
||||||
CVE-2023-29498,0,1,417c42363d496c93ed7d4765456e872dcdfbdf55653776a21f3143dd5b35c322,2025-01-03T21:15:12.417000
|
CVE-2023-29498,0,0,417c42363d496c93ed7d4765456e872dcdfbdf55653776a21f3143dd5b35c322,2025-01-03T21:15:12.417000
|
||||||
CVE-2023-29499,0,0,2039f92e848bda727c21c637c0c728fcf67f1b356f9be9a855b92af1487b4057,2024-11-21T07:57:10.807000
|
CVE-2023-29499,0,0,2039f92e848bda727c21c637c0c728fcf67f1b356f9be9a855b92af1487b4057,2024-11-21T07:57:10.807000
|
||||||
CVE-2023-2950,0,0,94be811c0c225a7d48b00d9c04d7ec06df07ac373a433760ce36652d9061d8fa,2024-11-21T07:59:37.900000
|
CVE-2023-2950,0,0,94be811c0c225a7d48b00d9c04d7ec06df07ac373a433760ce36652d9061d8fa,2024-11-21T07:59:37.900000
|
||||||
CVE-2023-29500,0,0,9566a3121b981ba012c5c86adc4c99589ab87eca50d6597b2c90f5856c8264c0,2024-11-21T07:57:10.947000
|
CVE-2023-29500,0,0,9566a3121b981ba012c5c86adc4c99589ab87eca50d6597b2c90f5856c8264c0,2024-11-21T07:57:10.947000
|
||||||
@ -223093,7 +223093,7 @@ CVE-2023-2955,0,0,9c0e18923443b98b3624f6a20eb4112985b6c80a66e21eac353915004989ba
|
|||||||
CVE-2023-29550,0,0,e4f3c9ebf56266ae93a8b7654d890809fa02038cee320637c5e05da2e3b4034c,2024-11-21T07:57:16.793000
|
CVE-2023-29550,0,0,e4f3c9ebf56266ae93a8b7654d890809fa02038cee320637c5e05da2e3b4034c,2024-11-21T07:57:16.793000
|
||||||
CVE-2023-29551,0,0,228f453bf40162e0ca56f9725a8243132d56c710990db765203fc98361e41d2b,2024-11-21T07:57:16.907000
|
CVE-2023-29551,0,0,228f453bf40162e0ca56f9725a8243132d56c710990db765203fc98361e41d2b,2024-11-21T07:57:16.907000
|
||||||
CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000
|
CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000
|
||||||
CVE-2023-29562,0,1,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000
|
CVE-2023-29562,0,0,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000
|
||||||
CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000
|
CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000
|
||||||
CVE-2023-29569,0,0,e838e1f5bbabf47f4c66b50e6c41d8d01307a1cf9562ef1e35b62f66e5510cd1,2024-11-21T07:57:17.467000
|
CVE-2023-29569,0,0,e838e1f5bbabf47f4c66b50e6c41d8d01307a1cf9562ef1e35b62f66e5510cd1,2024-11-21T07:57:17.467000
|
||||||
CVE-2023-2957,0,0,a1631a9ecee9b51a2f65999ed32ce5f5f06e2698dd986aecf16ed77d51c874ca,2024-11-21T07:59:38.720000
|
CVE-2023-2957,0,0,a1631a9ecee9b51a2f65999ed32ce5f5f06e2698dd986aecf16ed77d51c874ca,2024-11-21T07:59:38.720000
|
||||||
@ -224921,7 +224921,7 @@ CVE-2023-32218,0,0,f4668f6dec2ad787cba45f10fd52cbffde113c4295d5e52527a0a3bed9829
|
|||||||
CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000
|
CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000
|
||||||
CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000
|
CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000
|
||||||
CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000
|
CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000
|
||||||
CVE-2023-32221,0,0,ea601fc168225037ab26ac2ed11558bbef2c8c782572003af5f24916723d9cd0,2024-11-21T08:02:55.783000
|
CVE-2023-32221,0,1,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000
|
||||||
CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000
|
CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000
|
||||||
CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000
|
CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000
|
||||||
CVE-2023-32224,0,0,7c5c385f9388cab92c949ae1ed149caba7d8c92dca8e737241ce6522dad13863,2024-11-21T08:02:56.113000
|
CVE-2023-32224,0,0,7c5c385f9388cab92c949ae1ed149caba7d8c92dca8e737241ce6522dad13863,2024-11-21T08:02:56.113000
|
||||||
@ -244502,7 +244502,7 @@ CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee
|
|||||||
CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000
|
CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000
|
||||||
CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000
|
CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000
|
||||||
CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000
|
CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000
|
||||||
CVE-2024-11624,0,0,ffaf727b2fec9588d0225dcdd2218f3951c43d9f9a52eaef07026e9a1fa7747c,2025-01-03T04:15:06.030000
|
CVE-2024-11624,0,1,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000
|
||||||
CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000
|
CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000
|
||||||
CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000
|
CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000
|
||||||
CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000
|
CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000
|
||||||
@ -244602,6 +244602,7 @@ CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f4
|
|||||||
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
|
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
|
||||||
CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000
|
CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000
|
||||||
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
|
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
|
||||||
|
CVE-2024-11733,1,1,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000
|
||||||
CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000
|
CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000
|
||||||
CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000
|
CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000
|
||||||
CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000
|
CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000
|
||||||
@ -244940,6 +244941,7 @@ CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a5589
|
|||||||
CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
|
CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
|
||||||
CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000
|
CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000
|
||||||
CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000
|
CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000
|
||||||
|
CVE-2024-12237,1,1,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000
|
||||||
CVE-2024-12238,0,0,4bf6bf8d9d561e93dab20ec932a5f35fe4b6b4442d292c9962ed57407d619434,2024-12-29T06:15:05.487000
|
CVE-2024-12238,0,0,4bf6bf8d9d561e93dab20ec932a5f35fe4b6b4442d292c9962ed57407d619434,2024-12-29T06:15:05.487000
|
||||||
CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000
|
CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000
|
||||||
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
||||||
@ -245431,7 +245433,7 @@ CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb17648
|
|||||||
CVE-2024-13110,0,0,e4c3d49099bb33bcc7fe964c1285248d09f034b160a163d3fe86517eab3248ea,2025-01-02T14:15:06.240000
|
CVE-2024-13110,0,0,e4c3d49099bb33bcc7fe964c1285248d09f034b160a163d3fe86517eab3248ea,2025-01-02T14:15:06.240000
|
||||||
CVE-2024-13111,0,0,9810366fb45686c2113f1215d5c29bc6bc3772afbead961538a5f37f182e34f1,2025-01-02T17:15:08.223000
|
CVE-2024-13111,0,0,9810366fb45686c2113f1215d5c29bc6bc3772afbead961538a5f37f182e34f1,2025-01-02T17:15:08.223000
|
||||||
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
|
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
|
||||||
CVE-2024-13129,1,1,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000
|
CVE-2024-13129,0,0,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000
|
||||||
CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000
|
CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000
|
||||||
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
|
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
|
||||||
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
|
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
|
||||||
@ -257742,7 +257744,7 @@ CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089
|
|||||||
CVE-2024-3536,0,0,f61f758feff8e86a26533bd96329f276bdabc00164a17283a9ca7edca8ea810e,2024-11-21T09:29:48.253000
|
CVE-2024-3536,0,0,f61f758feff8e86a26533bd96329f276bdabc00164a17283a9ca7edca8ea810e,2024-11-21T09:29:48.253000
|
||||||
CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000
|
CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000
|
||||||
CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000
|
CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000
|
||||||
CVE-2024-35365,0,1,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000
|
CVE-2024-35365,0,0,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000
|
||||||
CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000
|
CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000
|
||||||
CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
|
CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
|
||||||
CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
|
CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
|
||||||
@ -258751,7 +258753,7 @@ CVE-2024-3661,0,0,11a579560faa5cc1a7695ecebefa36af8b143192151784b4c1d37ba82796f9
|
|||||||
CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000
|
CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000
|
||||||
CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000
|
CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000
|
||||||
CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
|
CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
|
||||||
CVE-2024-36613,0,1,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000
|
CVE-2024-36613,0,0,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000
|
||||||
CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000
|
CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000
|
||||||
CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
|
CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
|
||||||
CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
|
CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
|
||||||
@ -263385,7 +263387,7 @@ CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b
|
|||||||
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
|
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
|
||||||
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
|
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
|
||||||
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
|
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
|
||||||
CVE-2024-43077,0,1,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
|
CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
|
||||||
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
|
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
|
||||||
CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab537,2024-12-17T19:10:30.250000
|
CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab537,2024-12-17T19:10:30.250000
|
||||||
CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000
|
CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000
|
||||||
@ -263401,7 +263403,7 @@ CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c
|
|||||||
CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000
|
CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000
|
||||||
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
|
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
|
||||||
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
|
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
|
||||||
CVE-2024-43097,0,1,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
|
CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
|
||||||
CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000
|
CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000
|
||||||
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
|
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
|
||||||
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
|
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
|
||||||
@ -264009,11 +264011,11 @@ CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec8
|
|||||||
CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000
|
CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000
|
||||||
CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9f6,2024-11-21T09:42:43.643000
|
CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9f6,2024-11-21T09:42:43.643000
|
||||||
CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000
|
CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000
|
||||||
CVE-2024-43762,0,1,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
|
CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
|
||||||
CVE-2024-43764,0,1,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
|
CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
|
||||||
CVE-2024-43767,0,0,544837330e934fbd5665893a012e6ea136cc65551faeb81d27d6db256649d51f,2025-01-03T01:15:07.847000
|
CVE-2024-43767,0,1,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000
|
||||||
CVE-2024-43768,0,0,2a680b4666dbfb8855cfe115cfa668526d1408b554a74aebafb074e52b898e4c,2025-01-03T01:15:07.923000
|
CVE-2024-43768,0,1,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000
|
||||||
CVE-2024-43769,0,0,58a508b817a2419a010d84131e35f15b9d1d2e8f44fce65b53ae8e870eccbd1e,2025-01-03T01:15:08.003000
|
CVE-2024-43769,0,1,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000
|
||||||
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
|
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
|
||||||
CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000
|
CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000
|
||||||
CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000
|
CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000
|
||||||
@ -266097,7 +266099,7 @@ CVE-2024-47029,0,0,dee30063661ea67866801cfb2ecb7654f2218f2ce68d1de08a24516b75279
|
|||||||
CVE-2024-4703,0,0,8dae3b499efe136db7f398d4c41a1bfd4bf3b9aac5a043a02f530bb618a966e5,2024-11-21T09:43:24.660000
|
CVE-2024-4703,0,0,8dae3b499efe136db7f398d4c41a1bfd4bf3b9aac5a043a02f530bb618a966e5,2024-11-21T09:43:24.660000
|
||||||
CVE-2024-47030,0,0,2dfbd4a7868cc0b2ce9fa4921a019a022ddf4de093912df68c067097e504d63d,2024-10-28T20:35:16.973000
|
CVE-2024-47030,0,0,2dfbd4a7868cc0b2ce9fa4921a019a022ddf4de093912df68c067097e504d63d,2024-10-28T20:35:16.973000
|
||||||
CVE-2024-47031,0,0,9f628d7d133c819b06ff3de82f92bb7205005b4a410eced9d57c7a79d43f1b1d,2024-10-28T20:35:17.223000
|
CVE-2024-47031,0,0,9f628d7d133c819b06ff3de82f92bb7205005b4a410eced9d57c7a79d43f1b1d,2024-10-28T20:35:17.223000
|
||||||
CVE-2024-47032,0,0,c7442eac99225f8e83b038eb1a35a3adc5f73c5ed83bb8881288208a5f506b92,2025-01-03T04:15:06.137000
|
CVE-2024-47032,0,1,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000
|
||||||
CVE-2024-47033,0,0,55edc3ae29717e555bfd0e3e7b6b8889d14495fe139b3a950485b7473e7a9dca,2024-10-28T17:57:30.110000
|
CVE-2024-47033,0,0,55edc3ae29717e555bfd0e3e7b6b8889d14495fe139b3a950485b7473e7a9dca,2024-10-28T17:57:30.110000
|
||||||
CVE-2024-47034,0,0,25c2ef9ecb4e73ca1fa8dabb5e685185efaa515e35621fde72c2d30b8491c723,2024-10-28T17:56:51.787000
|
CVE-2024-47034,0,0,25c2ef9ecb4e73ca1fa8dabb5e685185efaa515e35621fde72c2d30b8491c723,2024-10-28T17:56:51.787000
|
||||||
CVE-2024-47035,0,0,a7a178fa9ebc80aea368dd0425eaa85245240ba008a832e23a0cba77ab278738,2024-10-31T00:05:18.113000
|
CVE-2024-47035,0,0,a7a178fa9ebc80aea368dd0425eaa85245240ba008a832e23a0cba77ab278738,2024-10-31T00:05:18.113000
|
||||||
@ -270627,16 +270629,16 @@ CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b
|
|||||||
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
|
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
|
||||||
CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000
|
CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000
|
||||||
CVE-2024-53833,0,0,83c2cd6c738c3b63237afc3b0a6973df3ebd3dd1be66df5ff62c4687f53f40a1,2025-01-03T04:15:06.227000
|
CVE-2024-53833,0,0,83c2cd6c738c3b63237afc3b0a6973df3ebd3dd1be66df5ff62c4687f53f40a1,2025-01-03T04:15:06.227000
|
||||||
CVE-2024-53834,0,0,95f824b0b20df943abd0cb3d475d26b1dc2d3fba585e091b536a3198607e6dcc,2025-01-03T04:15:06.310000
|
CVE-2024-53834,0,1,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000
|
||||||
CVE-2024-53835,0,0,a1cd0002f78945fcfeb24343b003794cf9ef09c52fa428c012cb7b469f05bb36,2025-01-03T04:15:06.383000
|
CVE-2024-53835,0,1,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000
|
||||||
CVE-2024-53836,0,0,1e0ff647b7d73bbae1146a38d8def42b43a2ce04fccf1bde2e572af18d4f066b,2025-01-03T04:15:06.470000
|
CVE-2024-53836,0,1,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000
|
||||||
CVE-2024-53837,0,0,22c83a1fa83f94b1accf37f58ddea874267ffadefc09a5121d07d6630619b5c5,2025-01-03T04:15:06.560000
|
CVE-2024-53837,0,1,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000
|
||||||
CVE-2024-53838,0,0,5a800c4c9a2319a3d123ac97e773b3bbeb257bc5749786382c54285e6a02c3ce,2025-01-03T04:15:06.650000
|
CVE-2024-53838,0,1,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000
|
||||||
CVE-2024-53839,0,0,e9203295f71f0456c08caa806e994cb13e5d7b534b2e0e475c5963a8d53c952b,2025-01-03T04:15:06.727000
|
CVE-2024-53839,0,1,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000
|
||||||
CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000
|
CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000
|
||||||
CVE-2024-53840,0,0,fd45d26350e6982c7cc334de85696b0442912dd4fdff65234ff9258cce036a54,2025-01-03T04:15:06.810000
|
CVE-2024-53840,0,1,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000
|
||||||
CVE-2024-53841,0,0,fe11be69b03118bc0d7bb6525bbe40e05a80d09ca9456ee9b0308de0a1f3f74b,2025-01-03T04:15:06.893000
|
CVE-2024-53841,0,1,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000
|
||||||
CVE-2024-53842,0,0,854e77d323c245e8752f72a677b4da1f2264d9d88ba6cda8173c9d7ada535690,2025-01-03T04:15:06.980000
|
CVE-2024-53842,0,1,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000
|
||||||
CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000
|
CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000
|
||||||
CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000
|
CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000
|
||||||
CVE-2024-53845,0,0,6016d80f197703cecce3c68f8c667ba88f504a297b5ec5a264d36bac2815592b,2024-12-12T02:15:29.087000
|
CVE-2024-53845,0,0,6016d80f197703cecce3c68f8c667ba88f504a297b5ec5a264d36bac2815592b,2024-12-12T02:15:29.087000
|
||||||
@ -271312,7 +271314,7 @@ CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e87
|
|||||||
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
||||||
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
|
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
|
||||||
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
|
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
|
||||||
CVE-2024-55507,0,1,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000
|
CVE-2024-55507,0,0,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000
|
||||||
CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000
|
CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000
|
||||||
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
|
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
|
||||||
CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000
|
CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000
|
||||||
@ -271412,6 +271414,8 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3
|
|||||||
CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000
|
CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000
|
||||||
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
|
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
|
||||||
CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000
|
CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000
|
||||||
|
CVE-2024-55896,1,1,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000
|
||||||
|
CVE-2024-55897,1,1,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000
|
||||||
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
|
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
|
||||||
CVE-2024-5591,0,0,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000
|
CVE-2024-5591,0,0,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000
|
||||||
CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000
|
CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000
|
||||||
@ -271669,7 +271673,7 @@ CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9
|
|||||||
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
||||||
CVE-2024-56330,0,0,cc2469855b48dd40812f7fbbf009598abdbeb1081f50cb0a33dff8e3cf6f718e,2024-12-20T20:15:24.167000
|
CVE-2024-56330,0,0,cc2469855b48dd40812f7fbbf009598abdbeb1081f50cb0a33dff8e3cf6f718e,2024-12-20T20:15:24.167000
|
||||||
CVE-2024-56331,0,0,56bb9f9373efee702b7689a46e1daacea45f4bf1b3344e95d6a09a02cb29916d,2024-12-20T20:15:24.337000
|
CVE-2024-56331,0,0,56bb9f9373efee702b7689a46e1daacea45f4bf1b3344e95d6a09a02cb29916d,2024-12-20T20:15:24.337000
|
||||||
CVE-2024-56332,1,1,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000
|
CVE-2024-56332,0,0,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000
|
||||||
CVE-2024-56333,0,0,fe45e753af8e2751ee1e363cda61187450051dec4bd66c266f1a6acfb0239817,2024-12-20T20:15:24.520000
|
CVE-2024-56333,0,0,fe45e753af8e2751ee1e363cda61187450051dec4bd66c266f1a6acfb0239817,2024-12-20T20:15:24.520000
|
||||||
CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f5a4,2024-12-24T17:15:09.760000
|
CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f5a4,2024-12-24T17:15:09.760000
|
||||||
CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000
|
CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000
|
||||||
@ -271704,7 +271708,7 @@ CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c
|
|||||||
CVE-2024-56408,0,0,cd4b6b211e0a160b70acb972ac8ce8a8f58fca4bf287c8875ce7a1ecf63f672e,2025-01-03T19:15:12.533000
|
CVE-2024-56408,0,0,cd4b6b211e0a160b70acb972ac8ce8a8f58fca4bf287c8875ce7a1ecf63f672e,2025-01-03T19:15:12.533000
|
||||||
CVE-2024-56409,0,0,d99656fa69c650421ca8cbabcdd83e678caa5cfb8b9a6a9a68c5e4694cb43a45,2025-01-03T19:15:12.627000
|
CVE-2024-56409,0,0,d99656fa69c650421ca8cbabcdd83e678caa5cfb8b9a6a9a68c5e4694cb43a45,2025-01-03T19:15:12.627000
|
||||||
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
|
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
|
||||||
CVE-2024-56410,0,1,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000
|
CVE-2024-56410,0,0,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000
|
||||||
CVE-2024-56411,0,0,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000
|
CVE-2024-56411,0,0,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000
|
||||||
CVE-2024-56412,0,0,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000
|
CVE-2024-56412,0,0,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000
|
||||||
CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000
|
CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000
|
||||||
@ -274697,7 +274701,7 @@ CVE-2024-8807,0,0,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a97
|
|||||||
CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000
|
CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000
|
||||||
CVE-2024-8809,0,0,ddcec2f4533e074351604de84f4e1e1092a516d94554ae853c415169483cb0c2,2024-11-22T21:15:19.110000
|
CVE-2024-8809,0,0,ddcec2f4533e074351604de84f4e1e1092a516d94554ae853c415169483cb0c2,2024-11-22T21:15:19.110000
|
||||||
CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000
|
CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-8811,0,1,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000
|
CVE-2024-8811,0,0,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000
|
||||||
CVE-2024-8812,0,0,b302d09d72bb26c6b8a77cc5743f5dc39c42e30907950ec8ee651ff959fb9767,2024-12-04T14:56:07.463000
|
CVE-2024-8812,0,0,b302d09d72bb26c6b8a77cc5743f5dc39c42e30907950ec8ee651ff959fb9767,2024-12-04T14:56:07.463000
|
||||||
CVE-2024-8813,0,0,3fdeb0e42e1f0b2ec132d72cdddab3a3e88fd6d1f776048bdf5fdfbe967da3ce,2024-12-04T14:56:03.620000
|
CVE-2024-8813,0,0,3fdeb0e42e1f0b2ec132d72cdddab3a3e88fd6d1f776048bdf5fdfbe967da3ce,2024-12-04T14:56:03.620000
|
||||||
CVE-2024-8814,0,0,b7d91a5acc439f46e09af24d678f7610aaf43632fd42bfe8fa08f3612c8551d8,2024-12-04T14:55:59.677000
|
CVE-2024-8814,0,0,b7d91a5acc439f46e09af24d678f7610aaf43632fd42bfe8fa08f3612c8551d8,2024-12-04T14:55:59.677000
|
||||||
@ -275050,7 +275054,7 @@ CVE-2024-9253,0,0,8deb45874f368402d2e8267bdd80d22218d667a369f413173fc1bab2f02e0c
|
|||||||
CVE-2024-9254,0,0,8ddbd67d95e607f435cddadf820f6b8a493bce024ad0e3a2a2fd3478d0537cfa,2024-11-29T18:17:31.663000
|
CVE-2024-9254,0,0,8ddbd67d95e607f435cddadf820f6b8a493bce024ad0e3a2a2fd3478d0537cfa,2024-11-29T18:17:31.663000
|
||||||
CVE-2024-9255,0,0,cebd6fb0e3bd38591c9ac35321c4111f3a938526041eb33febcdad00871c8366,2024-11-29T18:17:15.040000
|
CVE-2024-9255,0,0,cebd6fb0e3bd38591c9ac35321c4111f3a938526041eb33febcdad00871c8366,2024-11-29T18:17:15.040000
|
||||||
CVE-2024-9256,0,0,3cca80ad6510af9986479b87828fe97955ba908cd307377d7659a0e4289380d2,2024-11-29T18:17:00.713000
|
CVE-2024-9256,0,0,3cca80ad6510af9986479b87828fe97955ba908cd307377d7659a0e4289380d2,2024-11-29T18:17:00.713000
|
||||||
CVE-2024-9257,0,1,56d949a6b9532c08babf6ca3ed0f1bd04c0075ed5ddb6a7732235f8801d5cfb9,2025-01-03T22:07:42.553000
|
CVE-2024-9257,0,0,56d949a6b9532c08babf6ca3ed0f1bd04c0075ed5ddb6a7732235f8801d5cfb9,2025-01-03T22:07:42.553000
|
||||||
CVE-2024-9258,0,0,dfeacc96c4cbe2d903f9c98e056fc6af76a986a9830050ecfb795eca6832c408,2024-11-25T17:15:32.283000
|
CVE-2024-9258,0,0,dfeacc96c4cbe2d903f9c98e056fc6af76a986a9830050ecfb795eca6832c408,2024-11-25T17:15:32.283000
|
||||||
CVE-2024-9259,0,0,8199f5373fafb1bc0110a9ab29f4a6bb990bedca0d1854f1f17c52cddd1870c9,2024-11-25T17:13:49.060000
|
CVE-2024-9259,0,0,8199f5373fafb1bc0110a9ab29f4a6bb990bedca0d1854f1f17c52cddd1870c9,2024-11-25T17:13:49.060000
|
||||||
CVE-2024-9260,0,0,fb15d05363604469725e6c13cee9e50285abd70981488963df56e48460b3435e,2024-11-25T17:16:40.663000
|
CVE-2024-9260,0,0,fb15d05363604469725e6c13cee9e50285abd70981488963df56e48460b3435e,2024-11-25T17:16:40.663000
|
||||||
@ -275365,7 +275369,7 @@ CVE-2024-9656,0,0,fe9df299e1627df8ed3d1b46925ce86dfb46c361033644f0c6f5f5d626358e
|
|||||||
CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000
|
CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000
|
||||||
CVE-2024-9659,0,0,61d80596c8eeece9a279644799e43a0096a680cf6e7f5012ddc6e840730623b6,2024-11-23T08:15:03.860000
|
CVE-2024-9659,0,0,61d80596c8eeece9a279644799e43a0096a680cf6e7f5012ddc6e840730623b6,2024-11-23T08:15:03.860000
|
||||||
CVE-2024-9660,0,0,604fbe7b326b0e24567d0c1c45833d32f6a2dfc816b9bf095d9b2fea052201c6,2024-11-23T08:15:04.033000
|
CVE-2024-9660,0,0,604fbe7b326b0e24567d0c1c45833d32f6a2dfc816b9bf095d9b2fea052201c6,2024-11-23T08:15:04.033000
|
||||||
CVE-2024-9665,0,1,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000
|
CVE-2024-9665,0,0,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000
|
||||||
CVE-2024-9666,0,0,6c38470f0d709ef8f8b86da6cc48d947838dc50ebd4f9c3888341c719b6a8f91,2024-11-25T08:15:10.943000
|
CVE-2024-9666,0,0,6c38470f0d709ef8f8b86da6cc48d947838dc50ebd4f9c3888341c719b6a8f91,2024-11-25T08:15:10.943000
|
||||||
CVE-2024-9667,0,0,cd67020c0637f62cf6584504253f57e6151bc5b9ac2da6f70bd06c3cab478063,2024-11-08T15:27:25.697000
|
CVE-2024-9667,0,0,cd67020c0637f62cf6584504253f57e6151bc5b9ac2da6f70bd06c3cab478063,2024-11-08T15:27:25.697000
|
||||||
CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b367650786092773,2024-11-19T15:55:00.840000
|
CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b367650786092773,2024-11-19T15:55:00.840000
|
||||||
@ -275399,7 +275403,7 @@ CVE-2024-9705,0,0,d3e6e0cdfa50d1f44cfdccc6623bdd59d96e39c6b3b67c956a243ca7bda34d
|
|||||||
CVE-2024-9706,0,0,0990872c6794dc6bd9cf2f3c5fd27263b0ba4cad305032f2567799b99ef0e2f1,2024-12-06T09:15:08.727000
|
CVE-2024-9706,0,0,0990872c6794dc6bd9cf2f3c5fd27263b0ba4cad305032f2567799b99ef0e2f1,2024-12-06T09:15:08.727000
|
||||||
CVE-2024-9707,0,0,f20a21de398140b8d6cd9fa80d26368471f3c29d9493920f2122c5232d98d04a,2024-11-25T18:50:39.867000
|
CVE-2024-9707,0,0,f20a21de398140b8d6cd9fa80d26368471f3c29d9493920f2122c5232d98d04a,2024-11-25T18:50:39.867000
|
||||||
CVE-2024-9708,0,0,f728686179ba13414752570ea9b9034e944845f8c6fd05717e98b48a3f80f48a,2024-11-25T19:59:31.110000
|
CVE-2024-9708,0,0,f728686179ba13414752570ea9b9034e944845f8c6fd05717e98b48a3f80f48a,2024-11-25T19:59:31.110000
|
||||||
CVE-2024-9710,0,1,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000
|
CVE-2024-9710,0,0,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000
|
||||||
CVE-2024-9712,0,0,3c0025ed12da22fff31c874b55bf94d1f6bd79f9e74da0748a61a1382c7caa7b,2024-12-19T19:17:34.457000
|
CVE-2024-9712,0,0,3c0025ed12da22fff31c874b55bf94d1f6bd79f9e74da0748a61a1382c7caa7b,2024-12-19T19:17:34.457000
|
||||||
CVE-2024-9713,0,0,eab37c74e5a6a8128766965a86c4f26e4851c463a4609ddef74e4502f569d29d,2024-12-19T19:16:28.340000
|
CVE-2024-9713,0,0,eab37c74e5a6a8128766965a86c4f26e4851c463a4609ddef74e4502f569d29d,2024-12-19T19:16:28.340000
|
||||||
CVE-2024-9714,0,0,0f3ce79bd55096572e33f259d58ea23abd9525db69dd9124bf8561703c89aea5,2024-12-19T19:14:46.480000
|
CVE-2024-9714,0,0,0f3ce79bd55096572e33f259d58ea23abd9525db69dd9124bf8561703c89aea5,2024-12-19T19:14:46.480000
|
||||||
@ -275666,9 +275670,10 @@ CVE-2025-0176,0,0,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e6819
|
|||||||
CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000
|
CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000
|
||||||
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
|
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
|
||||||
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
|
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
|
||||||
CVE-2025-0198,1,1,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000
|
CVE-2025-0198,0,0,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000
|
||||||
|
CVE-2025-0199,1,1,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000
|
||||||
CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000
|
CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000
|
||||||
CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000
|
CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000
|
||||||
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000
|
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000
|
||||||
CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000
|
CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000
|
||||||
CVE-2025-22376,1,1,41b448fcde4d9ad88cdc8d51c6f7ffc1e85de423001807db846fdb1c49d736b9,2025-01-03T22:15:07.917000
|
CVE-2025-22376,0,1,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user