Auto-Update: 2025-01-03T17:00:20.860601+00:00

This commit is contained in:
cad-safe-bot 2025-01-03 17:03:49 +00:00
parent 8931b55289
commit 3f8d5a7be2
42 changed files with 2153 additions and 146 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31635", "id": "CVE-2022-31635",
"sourceIdentifier": "hp-security-alert@hp.com", "sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-13T17:15:12.567", "published": "2023-06-13T17:15:12.567",
"lastModified": "2024-11-21T07:04:53.830", "lastModified": "2025-01-03T15:15:06.873",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.1, "exploitabilityScore": 1.1,
"impactScore": 6.0 "impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-367" "value": "CWE-367"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31636", "id": "CVE-2022-31636",
"sourceIdentifier": "hp-security-alert@hp.com", "sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-13T17:15:12.640", "published": "2023-06-13T17:15:12.640",
"lastModified": "2024-11-21T07:04:54.760", "lastModified": "2025-01-03T15:15:08.580",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.1, "exploitabilityScore": 1.1,
"impactScore": 6.0 "impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-367" "value": "CWE-367"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1323", "id": "CVE-2023-1323",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-12T18:15:09.910", "published": "2023-06-12T18:15:09.910",
"lastModified": "2024-11-21T07:38:55.407", "lastModified": "2025-01-03T15:15:09.330",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.7, "exploitabilityScore": 1.7,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
} }
] ]
}, },

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34615", "id": "CVE-2023-34615",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.143", "published": "2023-06-14T14:15:10.143",
"lastModified": "2024-11-21T08:07:26.823", "lastModified": "2025-01-03T16:15:23.910",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34616", "id": "CVE-2023-34616",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.190", "published": "2023-06-14T14:15:10.190",
"lastModified": "2024-11-21T08:07:26.973", "lastModified": "2025-01-03T16:15:24.527",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34617", "id": "CVE-2023-34617",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.233", "published": "2023-06-14T14:15:10.233",
"lastModified": "2024-11-21T08:07:27.120", "lastModified": "2025-01-03T16:15:24.740",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34620", "id": "CVE-2023-34620",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.277", "published": "2023-06-14T14:15:10.277",
"lastModified": "2024-11-21T08:07:27.273", "lastModified": "2025-01-03T16:15:24.927",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34623", "id": "CVE-2023-34623",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.317", "published": "2023-06-14T14:15:10.317",
"lastModified": "2024-11-21T08:07:27.437", "lastModified": "2025-01-03T16:15:25.113",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34755", "id": "CVE-2023-34755",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.660", "published": "2023-06-14T14:15:10.660",
"lastModified": "2024-11-21T08:07:34.057", "lastModified": "2025-01-03T16:15:25.290",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34756", "id": "CVE-2023-34756",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.707", "published": "2023-06-14T14:15:10.707",
"lastModified": "2024-11-21T08:07:34.217", "lastModified": "2025-01-03T16:15:25.463",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34823", "id": "CVE-2023-34823",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.750", "published": "2023-06-14T14:15:10.750",
"lastModified": "2024-11-21T08:07:35.497", "lastModified": "2025-01-03T16:15:25.640",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34824", "id": "CVE-2023-34824",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.790", "published": "2023-06-14T14:15:10.790",
"lastModified": "2024-11-21T08:07:35.637", "lastModified": "2025-01-03T15:15:09.623",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34865", "id": "CVE-2023-34865",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.837", "published": "2023-06-14T14:15:10.837",
"lastModified": "2024-11-21T08:07:39.150", "lastModified": "2025-01-03T15:15:09.823",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-22" "value": "CWE-22"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34867", "id": "CVE-2023-34867",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T16:15:20.277", "published": "2023-06-14T16:15:20.277",
"lastModified": "2024-11-21T08:07:39.293", "lastModified": "2025-01-03T15:15:10.020",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-617" "value": "CWE-617"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40478", "id": "CVE-2023-40478",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:20.650", "published": "2024-05-03T03:15:20.650",
"lastModified": "2024-11-21T08:19:33.637", "lastModified": "2025-01-03T16:34:16.067",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "zdi-disclosures@trendmicro.com", "source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,76 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.10.94",
"matchCriteriaId": "94C6B573-5355-47EE-A262-E15AE88F8DDB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002", "url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002", "url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40479", "id": "CVE-2023-40479",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:20.813", "published": "2024-05-03T03:15:20.813",
"lastModified": "2024-11-21T08:19:33.773", "lastModified": "2025-01-03T16:35:43.653",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "zdi-disclosures@trendmicro.com", "source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,76 @@
"value": "CWE-78" "value": "CWE-78"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.9.92",
"matchCriteriaId": "9E718D58-EC6B-4500-AEE5-D3B6D6E8B06B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40480", "id": "CVE-2023-40480",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:20.987", "published": "2024-05-03T03:15:20.987",
"lastModified": "2024-11-21T08:19:33.900", "lastModified": "2025-01-03T16:36:16.097",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "zdi-disclosures@trendmicro.com", "source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,76 @@
"value": "CWE-78" "value": "CWE-78"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.9.92",
"matchCriteriaId": "9E718D58-EC6B-4500-AEE5-D3B6D6E8B06B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51634", "id": "CVE-2023-51634",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T20:15:06.050", "published": "2024-11-22T20:15:06.050",
"lastModified": "2024-11-22T20:15:06.050", "lastModified": "2025-01-03T16:40:16.203",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "zdi-disclosures@trendmicro.com", "source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,50 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139", "operator": "AND",
"source": "zdi-disclosures@trendmicro.com" "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.12.100_hotfix",
"matchCriteriaId": "37B657C4-72ED-4484-92DC-561EF7D8FB73"
}
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-583/", "operator": "OR",
"source": "zdi-disclosures@trendmicro.com" "negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-583/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51635", "id": "CVE-2023-51635",
"sourceIdentifier": "zdi-disclosures@trendmicro.com", "sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T20:15:06.167", "published": "2024-11-22T20:15:06.167",
"lastModified": "2024-11-22T20:15:06.167", "lastModified": "2025-01-03T16:40:28.000",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "zdi-disclosures@trendmicro.com", "source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,62 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.12.100_hotfix",
"matchCriteriaId": "37B657C4-72ED-4484-92DC-561EF7D8FB73"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139", "url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-584/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-584/",
"source": "zdi-disclosures@trendmicro.com" "source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27295", "id": "CVE-2024-27295",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-01T16:15:46.227", "published": "2024-03-01T16:15:46.227",
"lastModified": "2024-11-21T09:04:16.080", "lastModified": "2025-01-03T15:57:16.817",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 4.2 "impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
} }
] ]
}, },
@ -49,16 +69,52 @@
"value": "CWE-706" "value": "CWE-706"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.8.3",
"matchCriteriaId": "A159A530-7A69-4C0E-AB88-AB8C74036DE4"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5", "url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5", "url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27296", "id": "CVE-2024-27296",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-01T16:15:46.413", "published": "2024-03-01T16:15:46.413",
"lastModified": "2024-11-21T09:04:16.197", "lastModified": "2025-01-03T16:14:03.593",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
} }
] ]
}, },
@ -49,24 +69,64 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.8.3",
"matchCriteriaId": "A159A530-7A69-4C0E-AB88-AB8C74036DE4"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0", "url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j", "url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0", "url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j", "url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28238", "id": "CVE-2024-28238",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.297", "published": "2024-03-12T21:15:59.297",
"lastModified": "2024-11-21T09:06:04.200", "lastModified": "2025-01-03T16:14:55.823",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 0.8, "exploitabilityScore": 0.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
} }
] ]
}, },
@ -53,16 +73,50 @@
"value": "CWE-598" "value": "CWE-598"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.10.0",
"matchCriteriaId": "1A284199-40D8-4833-A273-84ED86C5A82E"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677", "url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677", "url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28239", "id": "CVE-2024-28239",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.513", "published": "2024-03-12T21:15:59.513",
"lastModified": "2024-11-21T09:06:04.327", "lastModified": "2025-01-03T16:17:32.100",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 2.5 "impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
@ -49,32 +69,80 @@
"value": "CWE-601" "value": "CWE-601"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.10.0",
"matchCriteriaId": "1A284199-40D8-4833-A273-84ED86C5A82E"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers", "url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203", "url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p", "url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers", "url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203", "url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p", "url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34708", "id": "CVE-2024-34708",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:39:31.083", "published": "2024-05-14T15:39:31.083",
"lastModified": "2024-11-21T09:19:14.427", "lastModified": "2025-01-03T16:19:08.750",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
} }
] ]
}, },
@ -49,24 +69,68 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.11.0",
"matchCriteriaId": "EE19D15A-1ADB-4207-8730-3EC25C39DE58"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b", "url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx", "url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b", "url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx", "url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34709", "id": "CVE-2024-34709",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:39:31.547", "published": "2024-05-14T15:39:31.547",
"lastModified": "2024-11-21T09:19:14.557", "lastModified": "2025-01-03T16:20:01.927",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 4.2 "impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
} }
] ]
}, },
@ -49,24 +69,66 @@
"value": "CWE-613" "value": "CWE-613"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.11.0",
"matchCriteriaId": "EE19D15A-1ADB-4207-8730-3EC25C39DE58"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf", "url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3", "url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf", "url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3", "url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36128", "id": "CVE-2024-36128",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-03T15:15:09.547", "published": "2024-06-03T15:15:09.547",
"lastModified": "2024-11-21T09:21:40.603", "lastModified": "2025-01-03T16:24:06.250",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -49,24 +69,66 @@
"value": "CWE-754" "value": "CWE-754"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.11.2",
"matchCriteriaId": "21D40FEA-DB7C-4E7F-80B2-D703E2271BAA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b", "url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5", "url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b", "url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5", "url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39895", "id": "CVE-2024-39895",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T17:15:11.980", "published": "2024-07-08T17:15:11.980",
"lastModified": "2024-11-21T09:28:31.113", "lastModified": "2025-01-03T16:29:09.890",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,24 +69,66 @@
"value": "CWE-400" "value": "CWE-400"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.12.0",
"matchCriteriaId": "A7FA42AF-B23C-44DD-A402-9382A4E30AF0"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8", "url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4", "url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8", "url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4", "url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39896", "id": "CVE-2024-39896",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T18:15:08.383", "published": "2024-07-08T18:15:08.383",
"lastModified": "2024-11-21T09:28:31.230", "lastModified": "2025-01-03T16:30:43.367",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
} }
] ]
}, },
@ -49,24 +69,66 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.13.0",
"matchCriteriaId": "1C808521-9592-4730-A53F-CCBA4486C092"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2", "url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v", "url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2", "url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v", "url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41780",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-03T15:15:10.367",
"lastModified": "2025-01-03T15:15:10.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could \n\ncould allow a physical user to obtain sensitive information due to not masking passwords during entry."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7180119",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47822", "id": "CVE-2024-47822",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-08T18:15:31.170", "published": "2024-10-08T18:15:31.170",
"lastModified": "2024-10-10T12:56:30.817", "lastModified": "2025-01-03T16:31:38.163",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 0.6, "exploitabilityScore": 0.6,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.6,
"impactScore": 3.6
} }
] ]
}, },
@ -51,10 +71,32 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/directus/directus/security/advisories/GHSA-vw58-ph65-6rxp", "nodes": [
"source": "security-advisories@github.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.13.2",
"matchCriteriaId": "995104A5-7032-4BC1-9E90-ABE8E13DC287"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-vw58-ph65-6rxp",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48814",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T15:15:10.570",
"lastModified": "2025-01-03T15:15:10.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Silverpeas 6.4.1 allows a remote attacker to obtain sensitive information via the ViewType parameter of the findbywhereclause function"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/SubZ3r0-0x01/7150f7cbc3b7d810adb221cae3d08fc8",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Silverpeas/Silverpeas-Components/pull/859",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Silverpeas/Silverpeas-Core/pull/1353",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-55078",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T15:15:10.697",
"lastModified": "2025-01-03T15:15:10.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/summerxxoo/8a0c9905feda6e192c10b860888afd26",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/summerxxoo/VulnPoc/blob/main/WukongCRM-11.0-JAVA%20-File%20upload%20across%20directories.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-55507",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T16:15:26.027",
"lastModified": "2025-01-03T16:15:26.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in CodeAstro Complaint Management System v.1.0 allows a remote attacker to escalate privileges via the delete_e.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55507.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-5591",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-03T15:15:10.813",
"lastModified": "2025-01-03T15:15:10.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7180120",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-56320",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.180",
"lastModified": "2025-01-03T16:15:26.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions prior to 24.5.0 are vulnerable to admin privilege escalation due to improper authorization of access to the admin \"Configuration XML\" UI feature, and its associated API. A malicious insider/existing authenticated GoCD user with an existing GoCD user account could abuse this vulnerability to access information intended only for GoCD admins, or to escalate their privileges to that of a GoCD admin in a persistent manner. it is not possible for this vulnerability to be abused prior to authentication/login. The issue is fixed in GoCD 24.5.0. GoCD users who are not able to immediate upgrade can mitigate this issue by using a reverse proxy, WAF or similar to externally block access paths with a `/go/rails/` prefix. Blocking this route causes no loss of functionality. If it is not possible to upgrade or block the above route, consider reducing the GoCD user base to more trusted set of users, including temporarily disabling use of plugins such as the guest-login-plugin, which allow limited anonymous access as a regular user account."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/68b598b97bd283a5a85e20d018d69fe86acf4165",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-346h-q594-rj8j",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-56321",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.340",
"lastModified": "2025-01-03T16:15:26.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions 18.9.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse the backup configuration \"post-backup script\" feature to potentially execute arbitrary scripts on the hosting server or container as GoCD's user, rather than pre-configured scripts. In practice the impact of this vulnerability is limited, as in most configurations a user who can log into the GoCD UI as an admin also has host administration permissions for the host/container that GoCD runs on, in order to manage artifact storage and other service-level configuration options. Additionally, since a GoCD admin has ability to configure and schedule pipelines tasks on all GoCD agents available to the server, the fundamental functionality of GoCD allows co-ordinated task execution similar to that of post-backup-scripts. However in restricted environments where the host administration is separated from the role of a GoCD admin, this may be unexpected. The issue is fixed in GoCD 24.5.0. Post-backup scripts can no longer be executed from within certain sensitive locations on the GoCD server. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/631f315d17fcb73f310eee6c881974c9b55ca9f0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-7jr3-gh3w-vjxq",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-56322",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.480",
"lastModified": "2025-01-03T16:15:26.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions 16.7.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse a hidden/unused configuration repository (pipelines as code) feature to allow XML External Entity (XXE) injection on the GoCD Server which will be executed when GoCD periodically scans configuration repositories for pipeline updates, or is triggered by an administrator or config repo admin. In practice the impact of this vulnerability is limited, in most cases without combining with another vulnerability, as only GoCD (super) admins have the ability to abuse this vulnerability. Typically a malicious GoCD admin can cause much larger damage than that they can do with XXE injection. The issue is fixed in GoCD 24.5.0. As a workaround, prevent external access from the GoCD server to arbitrary locations using some kind of environment egress control."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-8xwx-hf68-8xq7",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-56324",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.643",
"lastModified": "2025-01-03T16:15:26.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions prior to 24.4.0 can allow GoCD \"group admins\" to abuse ability to edit the raw XML configuration for groups they administer to trigger XML External Entity (XXE) injection on the GoCD server. Theoretically, the XXE vulnerability can result in additional attacks such as SSRF, information disclosure from the GoCD server, and directory traversal, although these additional attacks have not been explicitly demonstrated as exploitable. This issue is fixed in GoCD 24.5.0. Some workarounds are available. One may temporarily block access to `/go/*/pipelines/snippet` routes from an external reverse proxy or WAF if one's \"group admin\" users do not need the functionality to edit the XML of pipelines directly (rather than using the UI, or using a configuration repository). One may also prevent external access from one's GoCD server to arbitrary locations using some kind of environment egress control."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-3w9f-fgr5-5g78",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-56408",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.773",
"lastModified": "2025-01-03T16:15:26.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have is no sanitization in the `/vendor/phpoffice/phpspreadsheet/samples/Engineering/Convert-Online.php` file, which leads to the possibility of a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0176", "id": "CVE-2025-0176",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-03T02:15:07.870", "published": "2025-01-03T02:15:07.870",
"lastModified": "2025-01-03T02:15:07.870", "lastModified": "2025-01-03T15:15:11.360",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /user/add_cart.php. La manipulaci\u00f3n del argumento id/qty provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -107,7 +111,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -140,6 +144,10 @@
{ {
"url": "https://vuldb.com/?submit.473347", "url": "https://vuldb.com/?submit.473347",
"source": "cna@vuldb.com" "source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-01-03T15:00:25.495310+00:00 2025-01-03T17:00:20.860601+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-01-03T14:53:06.053000+00:00 2025-01-03T16:40:28+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,26 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
275644 275654
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `0` Recently added CVEs: `10`
- [CVE-2024-41780](CVE-2024/CVE-2024-417xx/CVE-2024-41780.json) (`2025-01-03T15:15:10.367`)
- [CVE-2024-48814](CVE-2024/CVE-2024-488xx/CVE-2024-48814.json) (`2025-01-03T15:15:10.570`)
- [CVE-2024-55078](CVE-2024/CVE-2024-550xx/CVE-2024-55078.json) (`2025-01-03T15:15:10.697`)
- [CVE-2024-55507](CVE-2024/CVE-2024-555xx/CVE-2024-55507.json) (`2025-01-03T16:15:26.027`)
- [CVE-2024-5591](CVE-2024/CVE-2024-55xx/CVE-2024-5591.json) (`2025-01-03T15:15:10.813`)
- [CVE-2024-56320](CVE-2024/CVE-2024-563xx/CVE-2024-56320.json) (`2025-01-03T16:15:26.180`)
- [CVE-2024-56321](CVE-2024/CVE-2024-563xx/CVE-2024-56321.json) (`2025-01-03T16:15:26.340`)
- [CVE-2024-56322](CVE-2024/CVE-2024-563xx/CVE-2024-56322.json) (`2025-01-03T16:15:26.480`)
- [CVE-2024-56324](CVE-2024/CVE-2024-563xx/CVE-2024-56324.json) (`2025-01-03T16:15:26.643`)
- [CVE-2024-56408](CVE-2024/CVE-2024-564xx/CVE-2024-56408.json) (`2025-01-03T16:15:26.773`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `7` Recently modified CVEs: `30`
- [CVE-2021-43783](CVE-2021/CVE-2021-437xx/CVE-2021-43783.json) (`2025-01-03T14:52:50.143`) - [CVE-2023-34617](CVE-2023/CVE-2023-346xx/CVE-2023-34617.json) (`2025-01-03T16:15:24.740`)
- [CVE-2024-12694](CVE-2024/CVE-2024-126xx/CVE-2024-12694.json) (`2025-01-03T14:15:23.560`) - [CVE-2023-34620](CVE-2023/CVE-2023-346xx/CVE-2023-34620.json) (`2025-01-03T16:15:24.927`)
- [CVE-2024-12798](CVE-2024/CVE-2024-127xx/CVE-2024-12798.json) (`2025-01-03T14:15:24.370`) - [CVE-2023-34623](CVE-2023/CVE-2023-346xx/CVE-2023-34623.json) (`2025-01-03T16:15:25.113`)
- [CVE-2024-12801](CVE-2024/CVE-2024-128xx/CVE-2024-12801.json) (`2025-01-03T14:15:24.500`) - [CVE-2023-34755](CVE-2023/CVE-2023-347xx/CVE-2023-34755.json) (`2025-01-03T16:15:25.290`)
- [CVE-2024-45815](CVE-2024/CVE-2024-458xx/CVE-2024-45815.json) (`2025-01-03T14:53:06.053`) - [CVE-2023-34756](CVE-2023/CVE-2023-347xx/CVE-2023-34756.json) (`2025-01-03T16:15:25.463`)
- [CVE-2024-45816](CVE-2024/CVE-2024-458xx/CVE-2024-45816.json) (`2025-01-03T14:52:37.133`) - [CVE-2023-34823](CVE-2023/CVE-2023-348xx/CVE-2023-34823.json) (`2025-01-03T16:15:25.640`)
- [CVE-2024-46976](CVE-2024/CVE-2024-469xx/CVE-2024-46976.json) (`2025-01-03T14:52:32.863`) - [CVE-2023-34824](CVE-2023/CVE-2023-348xx/CVE-2023-34824.json) (`2025-01-03T15:15:09.623`)
- [CVE-2023-34865](CVE-2023/CVE-2023-348xx/CVE-2023-34865.json) (`2025-01-03T15:15:09.823`)
- [CVE-2023-34867](CVE-2023/CVE-2023-348xx/CVE-2023-34867.json) (`2025-01-03T15:15:10.020`)
- [CVE-2023-40478](CVE-2023/CVE-2023-404xx/CVE-2023-40478.json) (`2025-01-03T16:34:16.067`)
- [CVE-2023-40479](CVE-2023/CVE-2023-404xx/CVE-2023-40479.json) (`2025-01-03T16:35:43.653`)
- [CVE-2023-40480](CVE-2023/CVE-2023-404xx/CVE-2023-40480.json) (`2025-01-03T16:36:16.097`)
- [CVE-2023-51634](CVE-2023/CVE-2023-516xx/CVE-2023-51634.json) (`2025-01-03T16:40:16.203`)
- [CVE-2023-51635](CVE-2023/CVE-2023-516xx/CVE-2023-51635.json) (`2025-01-03T16:40:28.000`)
- [CVE-2024-27295](CVE-2024/CVE-2024-272xx/CVE-2024-27295.json) (`2025-01-03T15:57:16.817`)
- [CVE-2024-27296](CVE-2024/CVE-2024-272xx/CVE-2024-27296.json) (`2025-01-03T16:14:03.593`)
- [CVE-2024-28238](CVE-2024/CVE-2024-282xx/CVE-2024-28238.json) (`2025-01-03T16:14:55.823`)
- [CVE-2024-28239](CVE-2024/CVE-2024-282xx/CVE-2024-28239.json) (`2025-01-03T16:17:32.100`)
- [CVE-2024-34708](CVE-2024/CVE-2024-347xx/CVE-2024-34708.json) (`2025-01-03T16:19:08.750`)
- [CVE-2024-34709](CVE-2024/CVE-2024-347xx/CVE-2024-34709.json) (`2025-01-03T16:20:01.927`)
- [CVE-2024-36128](CVE-2024/CVE-2024-361xx/CVE-2024-36128.json) (`2025-01-03T16:24:06.250`)
- [CVE-2024-39895](CVE-2024/CVE-2024-398xx/CVE-2024-39895.json) (`2025-01-03T16:29:09.890`)
- [CVE-2024-39896](CVE-2024/CVE-2024-398xx/CVE-2024-39896.json) (`2025-01-03T16:30:43.367`)
- [CVE-2024-47822](CVE-2024/CVE-2024-478xx/CVE-2024-47822.json) (`2025-01-03T16:31:38.163`)
- [CVE-2025-0176](CVE-2025/CVE-2025-01xx/CVE-2025-0176.json) (`2025-01-03T15:15:11.360`)
## Download and Usage ## Download and Usage

View File

@ -184990,7 +184990,7 @@ CVE-2021-4378,0,0,74f6da3f33a7c118184c27d64759b3d770af0bc53ab336b374ba189ff85f99
CVE-2021-43780,0,0,1bfa3db9d94130ef24b2593e757aaf7121510a117571de0bff270a0cdd24ad47,2024-11-21T06:29:46.333000 CVE-2021-43780,0,0,1bfa3db9d94130ef24b2593e757aaf7121510a117571de0bff270a0cdd24ad47,2024-11-21T06:29:46.333000
CVE-2021-43781,0,0,83b5431bdd3e4f24307a6d5be3002e7c44252557aa22d5c0f2a1b6fa8d139a40,2024-11-21T06:29:46.457000 CVE-2021-43781,0,0,83b5431bdd3e4f24307a6d5be3002e7c44252557aa22d5c0f2a1b6fa8d139a40,2024-11-21T06:29:46.457000
CVE-2021-43782,0,0,7c4869e5fc20cf7eb07405a14f392311fc327dfc5d31aef4373794d140731cb3,2024-11-21T06:29:46.593000 CVE-2021-43782,0,0,7c4869e5fc20cf7eb07405a14f392311fc327dfc5d31aef4373794d140731cb3,2024-11-21T06:29:46.593000
CVE-2021-43783,0,1,23825690a236bdc2dd01fb30b9e53324e3e4b3ac6341e2bba6525b48b94186df,2025-01-03T14:52:50.143000 CVE-2021-43783,0,0,23825690a236bdc2dd01fb30b9e53324e3e4b3ac6341e2bba6525b48b94186df,2025-01-03T14:52:50.143000
CVE-2021-43784,0,0,073ec769af326eddbd549dfc99ec29559882aff8249bd3d38a6dc118a67136cf,2024-11-21T06:29:46.873000 CVE-2021-43784,0,0,073ec769af326eddbd549dfc99ec29559882aff8249bd3d38a6dc118a67136cf,2024-11-21T06:29:46.873000
CVE-2021-43785,0,0,75d1cca129ea42ebb4fc89f19485476d7d4a2f72e66bec77a999aa5e33d0e46a,2024-11-21T06:29:47.030000 CVE-2021-43785,0,0,75d1cca129ea42ebb4fc89f19485476d7d4a2f72e66bec77a999aa5e33d0e46a,2024-11-21T06:29:47.030000
CVE-2021-43786,0,0,ae7238f3759020b8217e66fa8ae738ef36819e2d7b2254a6da7ac805cc1ab6b8,2024-11-21T06:29:47.163000 CVE-2021-43786,0,0,ae7238f3759020b8217e66fa8ae738ef36819e2d7b2254a6da7ac805cc1ab6b8,2024-11-21T06:29:47.163000
@ -199832,8 +199832,8 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95
CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000 CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000
CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000 CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000
CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000 CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000
CVE-2022-31635,0,0,9fa1f7b2e398fb6b2c51f0cd924bed5570d7cfcb9e6000cb2f71c0fecd954d44,2024-11-21T07:04:53.830000 CVE-2022-31635,0,1,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000
CVE-2022-31636,0,0,3dde94b5af6733fb77f8357055347d897ee2984f52a5eb2f297bff7574e2bcce,2024-11-21T07:04:54.760000 CVE-2022-31636,0,1,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000
CVE-2022-31637,0,0,7e118aefb900f1b8771bfb03c3f88a05095e573d84c8f798deca45c7a537e9d6,2024-11-21T07:04:55.353000 CVE-2022-31637,0,0,7e118aefb900f1b8771bfb03c3f88a05095e573d84c8f798deca45c7a537e9d6,2024-11-21T07:04:55.353000
CVE-2022-31638,0,0,2059d84d26545dd04336453f64b35e323c5ddc67e0fdd01032a49e7d96e0e32b,2024-11-21T07:04:55.950000 CVE-2022-31638,0,0,2059d84d26545dd04336453f64b35e323c5ddc67e0fdd01032a49e7d96e0e32b,2024-11-21T07:04:55.950000
CVE-2022-31639,0,0,2db9867db165c9710bd5f24a4058d245249a75be5ab8aab9a798192b24a8bc65,2024-11-21T07:04:56.547000 CVE-2022-31639,0,0,2db9867db165c9710bd5f24a4058d245249a75be5ab8aab9a798192b24a8bc65,2024-11-21T07:04:56.547000
@ -214374,7 +214374,7 @@ CVE-2023-1319,0,0,b368dbf8ee7ea09a72a801be40a1f8e95308556cc4f9a243194f9c5ced6a57
CVE-2023-1320,0,0,a1b35f71aa2c62d9c7c6e39c28e5aa6fb59975fffcfd2bebdd707399549f1c48,2024-11-21T07:38:55.037000 CVE-2023-1320,0,0,a1b35f71aa2c62d9c7c6e39c28e5aa6fb59975fffcfd2bebdd707399549f1c48,2024-11-21T07:38:55.037000
CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3bcd,2024-11-21T07:38:55.153000 CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3bcd,2024-11-21T07:38:55.153000
CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000 CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000
CVE-2023-1323,0,0,d4cda04501884a75dcd9305573a74ca92050af41895470a71604635c3260a819,2024-11-21T07:38:55.407000 CVE-2023-1323,0,1,982823bb59d32330f0a13e86fef0c7d44c0b9e06b6c23575f1cffc35d2f30647,2025-01-03T15:15:09.330000
CVE-2023-1324,0,0,8df1f393b710a69755021078a93585fd0e089e9aa03e35b99d882a23f469d2a3,2024-11-21T07:38:55.520000 CVE-2023-1324,0,0,8df1f393b710a69755021078a93585fd0e089e9aa03e35b99d882a23f469d2a3,2024-11-21T07:38:55.520000
CVE-2023-1325,0,0,0959d70918885d472cdc91efc9bd6dc4dd3a4b413a8c9a9ff5d155b9a97a3461,2024-11-21T07:38:55.627000 CVE-2023-1325,0,0,0959d70918885d472cdc91efc9bd6dc4dd3a4b413a8c9a9ff5d155b9a97a3461,2024-11-21T07:38:55.627000
CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000 CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000
@ -226948,12 +226948,12 @@ CVE-2023-34611,0,0,687b023253523d6e78594d20204e464b5b48f1822b7ada6e96002f20770ef
CVE-2023-34612,0,0,d9562c519a29403cbf5df3cdef7fae0d47649a05b55ea20c1399dcd942ad2eab,2024-11-21T08:07:26.347000 CVE-2023-34612,0,0,d9562c519a29403cbf5df3cdef7fae0d47649a05b55ea20c1399dcd942ad2eab,2024-11-21T08:07:26.347000
CVE-2023-34613,0,0,0980ba4370da51c40e36e15c7829f03ca9eb6219138e5fca5c693b4dcbe6d730,2024-11-21T08:07:26.520000 CVE-2023-34613,0,0,0980ba4370da51c40e36e15c7829f03ca9eb6219138e5fca5c693b4dcbe6d730,2024-11-21T08:07:26.520000
CVE-2023-34614,0,0,cfc5c897e7b775196b47d21236ed0a510f788fe6f12193dfb910a564a3234725,2024-11-21T08:07:26.670000 CVE-2023-34614,0,0,cfc5c897e7b775196b47d21236ed0a510f788fe6f12193dfb910a564a3234725,2024-11-21T08:07:26.670000
CVE-2023-34615,0,0,d0a1cdc98d7a33162618a17d005e7e5661243581da307e00efcedbd2769c575c,2024-11-21T08:07:26.823000 CVE-2023-34615,0,1,c7f7a620070310271ec68b0c4f6b84fdb07c3e4647f34669639a2792700ad451,2025-01-03T16:15:23.910000
CVE-2023-34616,0,0,8c3efff83061b386f95199185e7ff2006ee844f861264c96eeeed3285d91dfbd,2024-11-21T08:07:26.973000 CVE-2023-34616,0,1,3f8ab3b615eb5e2615351002ea9e99bf37d3130f5b0111bf2e24904c92119046,2025-01-03T16:15:24.527000
CVE-2023-34617,0,0,a406025411886c1efd2a867f88854d9e4ee21cd3c016dd803806fbabafdb6dd6,2024-11-21T08:07:27.120000 CVE-2023-34617,0,1,7ca29ae5a0478a1651698f89316d2d918e35d5e4adefb7a7c7cbf3fdd95d9f86,2025-01-03T16:15:24.740000
CVE-2023-3462,0,0,4177db0cffdc2613ba002ba4d01507ab8e47e6dfa38809c372fa791238948542,2024-11-21T08:17:19.147000 CVE-2023-3462,0,0,4177db0cffdc2613ba002ba4d01507ab8e47e6dfa38809c372fa791238948542,2024-11-21T08:17:19.147000
CVE-2023-34620,0,0,41e40bf172b6b1fa36d26fee77ee204f20fc5b943a5f298e29cf527a932b1805,2024-11-21T08:07:27.273000 CVE-2023-34620,0,1,98a0155672d14828973b2182db5672affa676d339ad8cd7b89db373949a38754,2025-01-03T16:15:24.927000
CVE-2023-34623,0,0,4803c558369a990f0e334156c10be25674dec139081968ff4ee6791af549c44c,2024-11-21T08:07:27.437000 CVE-2023-34623,0,1,f8df0f0e9dde144d4b6f6069842c529376e77c80103dc857feeebe365f1193f0,2025-01-03T16:15:25.113000
CVE-2023-34624,0,0,ccb6b9c3240373aba7f518b106fb079f69bf4f22dad6c2d7f2ea4f5936bf3118,2024-11-21T08:07:27.583000 CVE-2023-34624,0,0,ccb6b9c3240373aba7f518b106fb079f69bf4f22dad6c2d7f2ea4f5936bf3118,2024-11-21T08:07:27.583000
CVE-2023-34625,0,0,6c4b73c7e9e48fa3c20aa62115f9bf66d09a0cd82510154a4c28d19d705d3e2c,2024-11-21T08:07:27.740000 CVE-2023-34625,0,0,6c4b73c7e9e48fa3c20aa62115f9bf66d09a0cd82510154a4c28d19d705d3e2c,2024-11-21T08:07:27.740000
CVE-2023-34626,0,0,593591497027e767148eea3cc4f048b12753ab18a7094ecfb88edc2a0c3ef2b2,2024-11-21T08:07:27.927000 CVE-2023-34626,0,0,593591497027e767148eea3cc4f048b12753ab18a7094ecfb88edc2a0c3ef2b2,2024-11-21T08:07:27.927000
@ -227007,8 +227007,8 @@ CVE-2023-34751,0,0,8682934644407bc06186deb0a81834cf5b8a5790b0dce10df459f9b510d0b
CVE-2023-34752,0,0,615bea58318106ba6ad4032c7d4aa234fe3427b6716a974f8b74ffb6f76a0dde,2025-01-02T20:16:02.933000 CVE-2023-34752,0,0,615bea58318106ba6ad4032c7d4aa234fe3427b6716a974f8b74ffb6f76a0dde,2025-01-02T20:16:02.933000
CVE-2023-34753,0,0,b5cfd78eed4154500a7bc8867dbf749fd6af8b5c24d367aeff1fa2fc7eeeea27,2025-01-02T20:16:03.177000 CVE-2023-34753,0,0,b5cfd78eed4154500a7bc8867dbf749fd6af8b5c24d367aeff1fa2fc7eeeea27,2025-01-02T20:16:03.177000
CVE-2023-34754,0,0,12d97e4f9a13202971d428941c83713e5b8a6fa712854e15428501cc4f423d61,2025-01-02T20:16:03.420000 CVE-2023-34754,0,0,12d97e4f9a13202971d428941c83713e5b8a6fa712854e15428501cc4f423d61,2025-01-02T20:16:03.420000
CVE-2023-34755,0,0,ad9d976aebf6a13a4d8d5e030a5115982976ae2d5d58da0b6a7b2f2c1e146936,2024-11-21T08:07:34.057000 CVE-2023-34755,0,1,43bac1549910ba2f6b627492786c57aa3a6957cd30d83bcc27bb7ddef8551b02,2025-01-03T16:15:25.290000
CVE-2023-34756,0,0,073e07a7dff5c7ec8f546bc2d03a122938a7c9838ebc4eee7cf13f8662c523cd,2024-11-21T08:07:34.217000 CVE-2023-34756,0,1,0e4bfc03184a4dfa953cf99cf05978f022073f98c83d01a9ba68e5cbfa001d63,2025-01-03T16:15:25.463000
CVE-2023-34758,0,0,0f68d6687c3ddce1fe46cc75662a62eeb29c0ad98d09a62e8cfac50bfc6c2c85,2024-11-21T08:07:34.370000 CVE-2023-34758,0,0,0f68d6687c3ddce1fe46cc75662a62eeb29c0ad98d09a62e8cfac50bfc6c2c85,2024-11-21T08:07:34.370000
CVE-2023-3476,0,0,40618b39925a8749af57b51f48be9f8a0417a1d39f925ba493f541ee61e68c0b,2024-11-21T08:17:21.123000 CVE-2023-3476,0,0,40618b39925a8749af57b51f48be9f8a0417a1d39f925ba493f541ee61e68c0b,2024-11-21T08:17:21.123000
CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000 CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000
@ -227022,8 +227022,8 @@ CVE-2023-34798,0,0,6cb910bdabdb3563f84fc57831ebcda7ba4c5ee7c3dd75bac8c3c8a80deff
CVE-2023-34800,0,0,84bba67803e1bbd4ca8cc01710d354e93f725db60979993fa12a34f73c09acc2,2024-12-16T20:15:07.120000 CVE-2023-34800,0,0,84bba67803e1bbd4ca8cc01710d354e93f725db60979993fa12a34f73c09acc2,2024-12-16T20:15:07.120000
CVE-2023-3481,0,0,b2741aa0f42f156d4fee2c27ab01bac08a1a34d5e3aebc870718d36773e447a7,2024-11-21T08:17:21.767000 CVE-2023-3481,0,0,b2741aa0f42f156d4fee2c27ab01bac08a1a34d5e3aebc870718d36773e447a7,2024-11-21T08:17:21.767000
CVE-2023-3482,0,0,4f17c87c8ca4abd9150a3bc0ff1634cb2b99e8f7558db4292a90748d3f170833,2024-11-21T08:17:21.910000 CVE-2023-3482,0,0,4f17c87c8ca4abd9150a3bc0ff1634cb2b99e8f7558db4292a90748d3f170833,2024-11-21T08:17:21.910000
CVE-2023-34823,0,0,40513740fed68e8e66396debac889f6fe387d9792eb250b68461072643b7caab,2024-11-21T08:07:35.497000 CVE-2023-34823,0,1,1e9de38f8e622ec4466d8c92c24cb606d3f2863d1045f144021cdfe4dda4d37a,2025-01-03T16:15:25.640000
CVE-2023-34824,0,0,e4d073d174f9fdc33a97086b24703d80ff2edaad6b0b9ee4e4e1f3e2c5b3ef9d,2024-11-21T08:07:35.637000 CVE-2023-34824,0,1,8e4fa292c32a57ed3992fa7f05ed57c4210704d4df81723ebb6147791e46bd6b,2025-01-03T15:15:09.623000
CVE-2023-34829,0,0,90606f64ce5b5ca9675100d75480645a14da247f5a747da7b09b465e80b3a21f,2024-11-21T08:07:35.777000 CVE-2023-34829,0,0,90606f64ce5b5ca9675100d75480645a14da247f5a747da7b09b465e80b3a21f,2024-11-21T08:07:35.777000
CVE-2023-34830,0,0,a4fcb275f043fb8ed2760ef0bd7f458229c234d132492bbd6c8d154694ebfb22,2024-11-21T08:07:35.940000 CVE-2023-34830,0,0,a4fcb275f043fb8ed2760ef0bd7f458229c234d132492bbd6c8d154694ebfb22,2024-11-21T08:07:35.940000
CVE-2023-34831,0,0,0dcb3a46cbe2d1b958427e2d399be90a2edc8708839e27e80c4adebbfcb7ba62,2024-11-21T08:07:36.087000 CVE-2023-34831,0,0,0dcb3a46cbe2d1b958427e2d399be90a2edc8708839e27e80c4adebbfcb7ba62,2024-11-21T08:07:36.087000
@ -227048,8 +227048,8 @@ CVE-2023-34853,0,0,70feac653c1a3e0280c311147207cd3241715d41c2d589d538290c8ad5f44
CVE-2023-34855,0,0,ed2d4fafbe7f3e29b520e4c4e02dbbd89bcceb1278797c9db1a2814214086320,2024-11-21T08:07:38.867000 CVE-2023-34855,0,0,ed2d4fafbe7f3e29b520e4c4e02dbbd89bcceb1278797c9db1a2814214086320,2024-11-21T08:07:38.867000
CVE-2023-34856,0,0,5b8cbe97230089400a96eadea80d38522d82601855a90172d3f4628f04896660,2024-11-21T08:07:39.013000 CVE-2023-34856,0,0,5b8cbe97230089400a96eadea80d38522d82601855a90172d3f4628f04896660,2024-11-21T08:07:39.013000
CVE-2023-3486,0,0,abc053f556d927ed652b30757a723149ae17401e97e606b2df27c18fb326369a,2024-11-21T08:17:22.333000 CVE-2023-3486,0,0,abc053f556d927ed652b30757a723149ae17401e97e606b2df27c18fb326369a,2024-11-21T08:17:22.333000
CVE-2023-34865,0,0,c5a5fb874ce2aca447fcacc736978473bcea77b22d754d7a55731face24ecb5e,2024-11-21T08:07:39.150000 CVE-2023-34865,0,1,5664f741f50b9dd84d8a823d0d45aa717e7a771e4cd4c434cbd609e47dd230ad,2025-01-03T15:15:09.823000
CVE-2023-34867,0,0,fe24c20d7c1400fa4fc3d53aa855c72d12d25069dbe88a5f89cead66f6917ea6,2024-11-21T08:07:39.293000 CVE-2023-34867,0,1,d872eacd3a79936a24114ea3f5fbae16c925f5515098c538dbc7bbd6daf03d28,2025-01-03T15:15:10.020000
CVE-2023-34868,0,0,92b0ec0383014e453bbf7417e099295cbbcdf2d44918f01cec01543a8b0ae35a,2025-01-02T21:15:09.110000 CVE-2023-34868,0,0,92b0ec0383014e453bbf7417e099295cbbcdf2d44918f01cec01543a8b0ae35a,2025-01-02T21:15:09.110000
CVE-2023-34869,0,0,2d9adb7a5a83bdfd361e6c52dc28b0a603bcbf433dad33be958254b4792bb51a,2024-11-21T08:07:39.570000 CVE-2023-34869,0,0,2d9adb7a5a83bdfd361e6c52dc28b0a603bcbf433dad33be958254b4792bb51a,2024-11-21T08:07:39.570000
CVE-2023-3487,0,0,68f2d9850e4a5ab0061c1ce04bf451bb9af48b3d5b3f3bf94ac9eddc3348a24e,2024-11-21T08:17:22.477000 CVE-2023-3487,0,0,68f2d9850e4a5ab0061c1ce04bf451bb9af48b3d5b3f3bf94ac9eddc3348a24e,2024-11-21T08:17:22.477000
@ -231383,10 +231383,10 @@ CVE-2023-40474,0,0,8bcf31ee98703f6fc473b5b6ae72ea5932cd0d7a0edeb156d4f8a182ea3c7
CVE-2023-40475,0,0,e7d21de9d238e03b562bffb12dea4211af06c007f197e91c21580975c3001720,2024-12-17T15:36:49.790000 CVE-2023-40475,0,0,e7d21de9d238e03b562bffb12dea4211af06c007f197e91c21580975c3001720,2024-12-17T15:36:49.790000
CVE-2023-40476,0,0,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000 CVE-2023-40476,0,0,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000
CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000 CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000
CVE-2023-40478,0,0,a3fb7798a48b05b31de5b2b5faa9c0ac4380209160291014ad3f81dcf8ebbb85,2024-11-21T08:19:33.637000 CVE-2023-40478,0,1,97084c2b4ef249d0552a8d03d3aeb2ad91f2711483ab5979ff3e9704d86b18e3,2025-01-03T16:34:16.067000
CVE-2023-40479,0,0,9449a8cd9cba1b475b9fcd0125f9e3c6bfe2290a23a474f03f0ce92e2999e00c,2024-11-21T08:19:33.773000 CVE-2023-40479,0,1,7f0b7df65d67216fffb5ab0177cffb527f0d01bdb735f0d704cd884d3711bd7a,2025-01-03T16:35:43.653000
CVE-2023-4048,0,0,bd3c0a6a74e525a4188379c0cec4f9ff604ba7beed0f7d9138ffb0338be5ac41,2024-11-21T08:34:17.790000 CVE-2023-4048,0,0,bd3c0a6a74e525a4188379c0cec4f9ff604ba7beed0f7d9138ffb0338be5ac41,2024-11-21T08:34:17.790000
CVE-2023-40480,0,0,4efee1a79cc821ccb88a4d78aeea1a295eedd1c2d0323ded2d957c890b5c67ce,2024-11-21T08:19:33.900000 CVE-2023-40480,0,1,10ebc4f3bccbb6d1037d383855dd023033f7196e7c20e5b3471953d956cf0fca,2025-01-03T16:36:16.097000
CVE-2023-40481,0,0,fa8348a8b2829056d88eb01d408fdfa5a81faedfe3b8561775d453f6e46e33e8,2024-11-21T08:19:34.030000 CVE-2023-40481,0,0,fa8348a8b2829056d88eb01d408fdfa5a81faedfe3b8561775d453f6e46e33e8,2024-11-21T08:19:34.030000
CVE-2023-40482,0,0,6d046a3f66aee61e3b8e7abbf764cf14bb2baba7448ec56eaf8a254e6b52060a,2024-11-21T08:19:34.160000 CVE-2023-40482,0,0,6d046a3f66aee61e3b8e7abbf764cf14bb2baba7448ec56eaf8a254e6b52060a,2024-11-21T08:19:34.160000
CVE-2023-40483,0,0,3dd7719458b277c585be7d5acd46a05a3c44952981433bf675cb5f2efb0c0617,2024-11-21T08:19:34.293000 CVE-2023-40483,0,0,3dd7719458b277c585be7d5acd46a05a3c44952981433bf675cb5f2efb0c0617,2024-11-21T08:19:34.293000
@ -239340,8 +239340,8 @@ CVE-2023-5163,0,0,cf3b8b5134b9c3abc6194368c1f49f0d1625e7f19df09276fa37ea2ce1e8ae
CVE-2023-51630,0,0,e515bb953de02671803c7419ad4aba130c7fe90ffc243cec72816fb33885b191,2024-11-21T08:38:31.540000 CVE-2023-51630,0,0,e515bb953de02671803c7419ad4aba130c7fe90ffc243cec72816fb33885b191,2024-11-21T08:38:31.540000
CVE-2023-51631,0,0,63990fafd7619988fcb9ea55cb59056aa18a7251357c83485d91833b03bb94e5,2024-11-21T08:38:31.683000 CVE-2023-51631,0,0,63990fafd7619988fcb9ea55cb59056aa18a7251357c83485d91833b03bb94e5,2024-11-21T08:38:31.683000
CVE-2023-51633,0,0,5bad642ed926588fb216d042d3401b2bfb81ffae216f273e0c12fbfc0d81c0ae,2024-11-25T14:09:45.733000 CVE-2023-51633,0,0,5bad642ed926588fb216d042d3401b2bfb81ffae216f273e0c12fbfc0d81c0ae,2024-11-25T14:09:45.733000
CVE-2023-51634,0,0,27883d7e67092228d6aa2a406db34a5289535f972d6c3891bb3d4750bd14fe53,2024-11-22T20:15:06.050000 CVE-2023-51634,0,1,24101bc2264cc1d448351081d51aca13350b240728cd6ffe57bce0b6bf8722d1,2025-01-03T16:40:16.203000
CVE-2023-51635,0,0,58843e2cdd5a771a346cf4631dd15324cb9015f9b2e410b01bdd1c9022bea973,2024-11-22T20:15:06.167000 CVE-2023-51635,0,1,ee4330766282efd840c60d0e4f3a92ff9e46233947ba1ea3659971c9610fc910,2025-01-03T16:40:28
CVE-2023-51636,0,0,064e8a3fd5ea55d58d985476470cd6b3909b601adaac084b871f121b88b13dd9,2024-11-21T08:38:31.923000 CVE-2023-51636,0,0,064e8a3fd5ea55d58d985476470cd6b3909b601adaac084b871f121b88b13dd9,2024-11-21T08:38:31.923000
CVE-2023-51637,0,0,29910b96acccc169a530531b3226da84a2d56d602569491908f5d6d939690c9d,2024-11-21T08:38:32.047000 CVE-2023-51637,0,0,29910b96acccc169a530531b3226da84a2d56d602569491908f5d6d939690c9d,2024-11-21T08:38:32.047000
CVE-2023-51638,0,0,c47880b226fd2bb90e8785fb684e320705afc8c0487e8ff5fc296835b0d1191b,2024-11-22T20:15:06.283000 CVE-2023-51638,0,0,c47880b226fd2bb90e8785fb684e320705afc8c0487e8ff5fc296835b0d1191b,2024-11-22T20:15:06.283000
@ -245174,7 +245174,7 @@ CVE-2024-12687,0,0,db582e783ba07ea03e34c560f3ce0d9a75e73c080a0914e89215bff58a3d2
CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000
CVE-2024-12692,0,0,1d91106e54d6f85d8fe7f405f127892c0e24f0eae3c87f0ec8b1a814419d86e2,2024-12-18T22:15:05.730000 CVE-2024-12692,0,0,1d91106e54d6f85d8fe7f405f127892c0e24f0eae3c87f0ec8b1a814419d86e2,2024-12-18T22:15:05.730000
CVE-2024-12693,0,0,4219fa495406cba63408dc60d8d04c757d304855f4c2222ea40cc821cfe89cc2,2024-12-18T22:15:06.293000 CVE-2024-12693,0,0,4219fa495406cba63408dc60d8d04c757d304855f4c2222ea40cc821cfe89cc2,2024-12-18T22:15:06.293000
CVE-2024-12694,0,1,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000 CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000
CVE-2024-12695,0,0,4ca306137a37a04c18e8f4bd689ebfa86a34c8059c690369657387f43989e7dc,2024-12-18T22:15:06.523000 CVE-2024-12695,0,0,4ca306137a37a04c18e8f4bd689ebfa86a34c8059c690369657387f43989e7dc,2024-12-18T22:15:06.523000
CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000 CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000
CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000 CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000
@ -245215,8 +245215,8 @@ CVE-2024-12791,0,0,00e274fb2644dd0737fedef7f600b72a2d7c4a341721b9f72cd4a6ccf93a5
CVE-2024-12792,0,0,9ff314747d32c9ea3d838ab15483ae4445fd607f5e8ea594662271d73f2273aa,2024-12-19T18:15:08.900000 CVE-2024-12792,0,0,9ff314747d32c9ea3d838ab15483ae4445fd607f5e8ea594662271d73f2273aa,2024-12-19T18:15:08.900000
CVE-2024-12793,0,0,e8bee7f66d85bfcf3f10183c2d9dfa3d7688defa0d4131b4b123d19eadde9daf,2024-12-19T18:15:09.403000 CVE-2024-12793,0,0,e8bee7f66d85bfcf3f10183c2d9dfa3d7688defa0d4131b4b123d19eadde9daf,2024-12-19T18:15:09.403000
CVE-2024-12794,0,0,e3e22485049a6ee1730ef3f5b425634ab9957dffabfae691eb4315bcd5eacfae,2024-12-19T18:15:09.963000 CVE-2024-12794,0,0,e3e22485049a6ee1730ef3f5b425634ab9957dffabfae691eb4315bcd5eacfae,2024-12-19T18:15:09.963000
CVE-2024-12798,0,1,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,1,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12828,0,0,28c200a13b14baa13804e935d3333b64f6d1e673d0788df4553ec7bcec7ebadb,2024-12-30T17:15:07.717000 CVE-2024-12828,0,0,28c200a13b14baa13804e935d3333b64f6d1e673d0788df4553ec7bcec7ebadb,2024-12-30T17:15:07.717000
@ -251803,8 +251803,8 @@ CVE-2024-27290,0,0,e6351e36fccf78750391be14824a1927d7d886c71914a08afcab3c0676cfe
CVE-2024-27291,0,0,a17901c720fa960198c0b15c85cdc3abb819356f307d51b08722f19c95d7a841,2024-11-21T09:04:15.700000 CVE-2024-27291,0,0,a17901c720fa960198c0b15c85cdc3abb819356f307d51b08722f19c95d7a841,2024-11-21T09:04:15.700000
CVE-2024-27292,0,0,0985bf46a0f580555a70e94b95028857bb5056e62cd8bc4114703d5e8c1fcfe6,2024-11-21T09:04:15.823000 CVE-2024-27292,0,0,0985bf46a0f580555a70e94b95028857bb5056e62cd8bc4114703d5e8c1fcfe6,2024-11-21T09:04:15.823000
CVE-2024-27294,0,0,6a08d12fccf8590c3ca84aea628a228836385e94246afbcc476ee85ad0c8233f,2024-11-21T09:04:15.950000 CVE-2024-27294,0,0,6a08d12fccf8590c3ca84aea628a228836385e94246afbcc476ee85ad0c8233f,2024-11-21T09:04:15.950000
CVE-2024-27295,0,0,60e38510c316500920e803e76acf06f06073392f7916f0308afe2d923b6ae60f,2024-11-21T09:04:16.080000 CVE-2024-27295,0,1,62b63c8181e69fdf30bf5e9ea58e339ce340673603d1ccec39c0824328ff8081,2025-01-03T15:57:16.817000
CVE-2024-27296,0,0,a328b88bcbe71085033fdbf82b578b4fb4ef026c9720719e3d87bb6875f937f9,2024-11-21T09:04:16.197000 CVE-2024-27296,0,1,bc7f110c759f40dab70b917dec22fad4a370b676b33c49ffc610915e7181e1a5,2025-01-03T16:14:03.593000
CVE-2024-27297,0,0,0f08fd661388c47fad3b951d015108d74fd35f9d302b8c4a28976eae1f793c8b,2024-11-21T09:04:16.323000 CVE-2024-27297,0,0,0f08fd661388c47fad3b951d015108d74fd35f9d302b8c4a28976eae1f793c8b,2024-11-21T09:04:16.323000
CVE-2024-27298,0,0,fec5a39b802dd251f2972424edfe42a5be7f6a4ad28011a2651a8684a41ac677,2024-11-21T09:04:16.450000 CVE-2024-27298,0,0,fec5a39b802dd251f2972424edfe42a5be7f6a4ad28011a2651a8684a41ac677,2024-11-21T09:04:16.450000
CVE-2024-27299,0,0,58b851c72842f2e8403fc03c6554402704bf7407ab46f5c07daac470110fd702,2024-11-21T09:04:16.593000 CVE-2024-27299,0,0,58b851c72842f2e8403fc03c6554402704bf7407ab46f5c07daac470110fd702,2024-11-21T09:04:16.593000
@ -252558,8 +252558,8 @@ CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b1152748
CVE-2024-28235,0,0,cdc7503ef9eef57590419e704ccd1f07cf4d641ea4c724f1352a9dd9c4d7e4be,2024-11-21T09:06:03.783000 CVE-2024-28235,0,0,cdc7503ef9eef57590419e704ccd1f07cf4d641ea4c724f1352a9dd9c4d7e4be,2024-11-21T09:06:03.783000
CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000 CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000
CVE-2024-28237,0,0,569dada874e3f7581ae75d30d37e9e64307f64b42ac921c76927978c59e7d5a6,2024-11-21T09:06:04.057000 CVE-2024-28237,0,0,569dada874e3f7581ae75d30d37e9e64307f64b42ac921c76927978c59e7d5a6,2024-11-21T09:06:04.057000
CVE-2024-28238,0,0,6e650c4d2b7375c8a7f19bd73b04a31568d3018d7ee0ecbb6f8a5fe2be122555,2024-11-21T09:06:04.200000 CVE-2024-28238,0,1,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000
CVE-2024-28239,0,0,fd52520639c751eaf3695f415d5a8dfa2e482fd2b9084c68458cf9d0a756a07b,2024-11-21T09:06:04.327000 CVE-2024-28239,0,1,cad2389eb8ad3f3fc89b4de0deaf45f55e8417efae42f10b632472f86525ee21,2025-01-03T16:17:32.100000
CVE-2024-2824,0,0,f1bf8222502fdfe6970d6bec7f9f262cc2a23adafeaf181a033793e1be015aa2,2024-11-21T09:10:36.917000 CVE-2024-2824,0,0,f1bf8222502fdfe6970d6bec7f9f262cc2a23adafeaf181a033793e1be015aa2,2024-11-21T09:10:36.917000
CVE-2024-28240,0,0,1d428d023bd48128545dba37f6f90872853fbc7c073165d7f1b0ca929b5b270b,2024-11-21T09:06:04.470000 CVE-2024-28240,0,0,1d428d023bd48128545dba37f6f90872853fbc7c073165d7f1b0ca929b5b270b,2024-11-21T09:06:04.470000
CVE-2024-28241,0,0,af70a7a3f1c8ad453a7e703a202ae77314c98f684c8e610de8ea1d5439e1f740,2024-11-21T09:06:04.617000 CVE-2024-28241,0,0,af70a7a3f1c8ad453a7e703a202ae77314c98f684c8e610de8ea1d5439e1f740,2024-11-21T09:06:04.617000
@ -257315,8 +257315,8 @@ CVE-2024-34703,0,0,5892a518a91e3752956cd9b6773c4db7f64bf352c43d71d21b6eb4d07eca8
CVE-2024-34704,0,0,c4fe39355e2bf7bb9aae1e6e451bfcdbc010f8bb176eebca13f8fa686688ca5a,2024-11-21T09:19:13.967000 CVE-2024-34704,0,0,c4fe39355e2bf7bb9aae1e6e451bfcdbc010f8bb176eebca13f8fa686688ca5a,2024-11-21T09:19:13.967000
CVE-2024-34706,0,0,d0c3791947d477e90819454bb760b27da6fb369a2903ff66dea2de1ef14409aa,2024-11-21T09:19:14.113000 CVE-2024-34706,0,0,d0c3791947d477e90819454bb760b27da6fb369a2903ff66dea2de1ef14409aa,2024-11-21T09:19:14.113000
CVE-2024-34707,0,0,8117b5f46b7d87d017dd6d7af57dbcd9505bc5384d9d51272ef358098cb11bbd,2024-11-21T09:19:14.290000 CVE-2024-34707,0,0,8117b5f46b7d87d017dd6d7af57dbcd9505bc5384d9d51272ef358098cb11bbd,2024-11-21T09:19:14.290000
CVE-2024-34708,0,0,cd3a7288cd62e4cc6a1bc94640c2efee00db13f65360a5f0c1d87f912d94d5ce,2024-11-21T09:19:14.427000 CVE-2024-34708,0,1,b6103d931f8db49de80394f3b0543e5df8df422ea783f294484fc137bbb2ff8a,2025-01-03T16:19:08.750000
CVE-2024-34709,0,0,a81b19cf13c295f8ac7f0d7d64f2aeda1727b93f3121fe3107116480aa43652e,2024-11-21T09:19:14.557000 CVE-2024-34709,0,1,4dd1030c3fb3e8cc330f2849a60862b197aa7ed76d8cc6aef7b0c90fdf00b844,2025-01-03T16:20:01.927000
CVE-2024-3471,0,0,983339385380d7e0fe02d202e79ae08c00f0de07eaad5185ebf307859c8224f9,2024-11-21T09:29:40.350000 CVE-2024-3471,0,0,983339385380d7e0fe02d202e79ae08c00f0de07eaad5185ebf307859c8224f9,2024-11-21T09:29:40.350000
CVE-2024-34710,0,0,05f4e9fcad99d59c221e6b73e2dd714053cd2db6f98c9291777c51b4e036ca01,2024-11-21T09:19:14.687000 CVE-2024-34710,0,0,05f4e9fcad99d59c221e6b73e2dd714053cd2db6f98c9291777c51b4e036ca01,2024-11-21T09:19:14.687000
CVE-2024-34712,0,0,cf5b325ebd7ddae90933e1bc277473f4d6cae9ff57c40754d15ebf6965ef4770,2024-11-21T09:19:14.830000 CVE-2024-34712,0,0,cf5b325ebd7ddae90933e1bc277473f4d6cae9ff57c40754d15ebf6965ef4770,2024-11-21T09:19:14.830000
@ -258373,7 +258373,7 @@ CVE-2024-36122,0,0,c2aeae4cdd255ad31a0a91d4f75c2d56ebaea85629207dfb3b6b08cdce139
CVE-2024-36123,0,0,45e0c155f62186c64c46952b4328748c9e767854861074a71eec439ec1778037,2024-11-21T09:21:40.213000 CVE-2024-36123,0,0,45e0c155f62186c64c46952b4328748c9e767854861074a71eec439ec1778037,2024-11-21T09:21:40.213000
CVE-2024-36124,0,0,b2f1b33ef0b5e93fc83acbb1a2fbe3de1cc6cf9ae5da7ecc83042baff09f6425,2024-11-21T09:21:40.357000 CVE-2024-36124,0,0,b2f1b33ef0b5e93fc83acbb1a2fbe3de1cc6cf9ae5da7ecc83042baff09f6425,2024-11-21T09:21:40.357000
CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000 CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000
CVE-2024-36128,0,0,56a86cf8f6e8c0bb29093c33c603e0d166b756f9a18b43276348c2f1af75adbc,2024-11-21T09:21:40.603000 CVE-2024-36128,0,1,64d86fd38de118293b58a480f45da6320c6fd14e64e3f37e62e29a7a0f9d73bd,2025-01-03T16:24:06.250000
CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000 CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000
CVE-2024-3613,0,0,8c49e72e9406a68c2f73faacb5db14b0130a295cac3973946f145897d312d626,2024-11-21T09:29:59.410000 CVE-2024-3613,0,0,8c49e72e9406a68c2f73faacb5db14b0130a295cac3973946f145897d312d626,2024-11-21T09:29:59.410000
CVE-2024-36130,0,0,9bd62fb5b4532bcabdec214127241940c2a7b957ead8f80f15dfd2bb2b6b6945,2024-10-24T20:35:06.217000 CVE-2024-36130,0,0,9bd62fb5b4532bcabdec214127241940c2a7b957ead8f80f15dfd2bb2b6b6945,2024-10-24T20:35:06.217000
@ -261346,8 +261346,8 @@ CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93c
CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000 CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000
CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000 CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000 CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000
CVE-2024-39895,0,0,79b1682b2f59bb18a7dc4840f62c81c284b66c27bf648fc0d51dea0701c04f04,2024-11-21T09:28:31.113000 CVE-2024-39895,0,1,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed78d,2025-01-03T16:29:09.890000
CVE-2024-39896,0,0,a2699ea7e6d0ebc9a7291dc8637f19cb8c4cd9d16df7555a08584d611fd39290,2024-11-21T09:28:31.230000 CVE-2024-39896,0,1,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000
CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000 CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000
CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000 CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000
CVE-2024-3990,0,0,880b625fb9042da3fa8f1d060a369624b509717179c95e3562e8f2ac6af76111,2024-11-21T09:30:51.623000 CVE-2024-3990,0,0,880b625fb9042da3fa8f1d060a369624b509717179c95e3562e8f2ac6af76111,2024-11-21T09:30:51.623000
@ -262433,6 +262433,7 @@ CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1b
CVE-2024-41776,0,0,645561281eaec0c17a46e435f182a12ad35f1dabfbd0f0ddaced797c0e2c28f4,2024-12-11T03:24:19.023000 CVE-2024-41776,0,0,645561281eaec0c17a46e435f182a12ad35f1dabfbd0f0ddaced797c0e2c28f4,2024-12-11T03:24:19.023000
CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22e8b,2024-12-11T03:22:46.490000 CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22e8b,2024-12-11T03:22:46.490000
CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000 CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000
CVE-2024-41780,1,1,5cdde677a719d9513a4aa8726b309126fd892ae2e7e61ab0cc3b4e0038c719ce,2025-01-03T15:15:10.367000
CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000 CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000
CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000
CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000 CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000
@ -265409,8 +265410,8 @@ CVE-2024-45810,0,0,c349eedcf860e10c9363a6ba6fcea9627aa86b33877b6f7be1e36f4038c07
CVE-2024-45811,0,0,1e79f7126b54eaa8fec54f9508c1b481812afbc5e26f24245c6580ec2237a2bc,2024-09-20T12:30:51.220000 CVE-2024-45811,0,0,1e79f7126b54eaa8fec54f9508c1b481812afbc5e26f24245c6580ec2237a2bc,2024-09-20T12:30:51.220000
CVE-2024-45812,0,0,56a8eda09dbd313ab53b41c9890a71e59f376714797337ccb7daa71061b1b6f0,2024-09-20T12:30:51.220000 CVE-2024-45812,0,0,56a8eda09dbd313ab53b41c9890a71e59f376714797337ccb7daa71061b1b6f0,2024-09-20T12:30:51.220000
CVE-2024-45813,0,0,619ea264c0f4bf8105d5e60e8f340f4fd92c635a69072623ce613a02ad4402cc,2024-09-20T12:30:17.483000 CVE-2024-45813,0,0,619ea264c0f4bf8105d5e60e8f340f4fd92c635a69072623ce613a02ad4402cc,2024-09-20T12:30:17.483000
CVE-2024-45815,0,1,ee196dcedd236f2a24a6575a459a3aa300bd5e5292e7f61ddb47fe94cf48cd22,2025-01-03T14:53:06.053000 CVE-2024-45815,0,0,ee196dcedd236f2a24a6575a459a3aa300bd5e5292e7f61ddb47fe94cf48cd22,2025-01-03T14:53:06.053000
CVE-2024-45816,0,1,fe9275b3c6dcb1da65c8ac58dbf5fd1b8ab3ee806ae9c3cfcae7aa57e5724fab,2025-01-03T14:52:37.133000 CVE-2024-45816,0,0,fe9275b3c6dcb1da65c8ac58dbf5fd1b8ab3ee806ae9c3cfcae7aa57e5724fab,2025-01-03T14:52:37.133000
CVE-2024-45817,0,0,04338584e0c7a05d71a1be8997c9492e340dee2b5e7a9715004e750a41578782,2024-11-21T09:38:08.627000 CVE-2024-45817,0,0,04338584e0c7a05d71a1be8997c9492e340dee2b5e7a9715004e750a41578782,2024-11-21T09:38:08.627000
CVE-2024-45818,0,0,5cedc682ef3f5d9445ff8b080f0381ba193ffd5453fd7d81f8a4faf06c5fa624,2024-12-31T19:15:46.603000 CVE-2024-45818,0,0,5cedc682ef3f5d9445ff8b080f0381ba193ffd5453fd7d81f8a4faf06c5fa624,2024-12-31T19:15:46.603000
CVE-2024-45819,0,0,353a2de2c0eb71c70aa8fbb379f318bdfabc7180522e3350c949c90462cc13ca,2024-12-31T19:15:46.797000 CVE-2024-45819,0,0,353a2de2c0eb71c70aa8fbb379f318bdfabc7180522e3350c949c90462cc13ca,2024-12-31T19:15:46.797000
@ -266038,7 +266039,7 @@ CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9e
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
CVE-2024-46972,0,0,0e34573fc20dd373f66d1b8ed3f8cb5899ffa098578c43ffb6dff5bb8ae5f7ed,2024-12-28T05:15:08.497000 CVE-2024-46972,0,0,0e34573fc20dd373f66d1b8ed3f8cb5899ffa098578c43ffb6dff5bb8ae5f7ed,2024-12-28T05:15:08.497000
CVE-2024-46973,0,0,5b1148979504edc8c412112d196fc9eb688dbc46ad7acc2c72e50589e8a1c99b,2024-12-28T17:15:07.420000 CVE-2024-46973,0,0,5b1148979504edc8c412112d196fc9eb688dbc46ad7acc2c72e50589e8a1c99b,2024-12-28T17:15:07.420000
CVE-2024-46976,0,1,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000 CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000
CVE-2024-46979,0,0,490db2a65c2e0ed655ace5926e805008e6332771442746f4b78cb7ccfb47c4d8,2024-09-20T12:30:17.483000 CVE-2024-46979,0,0,490db2a65c2e0ed655ace5926e805008e6332771442746f4b78cb7ccfb47c4d8,2024-09-20T12:30:17.483000
@ -266774,7 +266775,7 @@ CVE-2024-47819,0,0,1a39bf32e7c6b82a650954a5b0900e95e1d66c96c1e4e5b23991d0f535e5e
CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000 CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000
CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000 CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000
CVE-2024-47821,0,0,1ad5cc98b31fb97413a2af4b0b825f5fc2f8d897ba91f4430ae5ce2de36ae65e,2024-10-28T13:58:09.230000 CVE-2024-47821,0,0,1ad5cc98b31fb97413a2af4b0b825f5fc2f8d897ba91f4430ae5ce2de36ae65e,2024-10-28T13:58:09.230000
CVE-2024-47822,0,0,1c2a4ddb47d48e476a8d0de9eecc87b2f94c41cf32f5a5cb4227c426f23ec246,2024-10-10T12:56:30.817000 CVE-2024-47822,0,1,112867ef61321fd31839857c8845308750c840249de62ae63bdb48f078a1ee72,2025-01-03T16:31:38.163000
CVE-2024-47823,0,0,336ac507480a6e31bc670e3eea63dd6c12b526e914a6141258cfa4b3d9c44b55,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,336ac507480a6e31bc670e3eea63dd6c12b526e914a6141258cfa4b3d9c44b55,2024-10-10T12:56:30.817000
CVE-2024-47824,0,0,97bf5a27d2397e0f0377b54caf7f6a92074070c7778d6b1d1355aecbed8e7f6b,2024-11-21T17:15:17.650000 CVE-2024-47824,0,0,97bf5a27d2397e0f0377b54caf7f6a92074070c7778d6b1d1355aecbed8e7f6b,2024-11-21T17:15:17.650000
CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000
@ -267231,6 +267232,7 @@ CVE-2024-48807,0,0,a763796bbe84709db2996b18e1ed107315b165fb8245eca95257cb100e859
CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000
CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000
CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000
CVE-2024-48814,1,1,a57915293639cd2f22fd5536bfef2016bbd90a552c63261df4228ec0f44a246e,2025-01-03T15:15:10.570000
CVE-2024-4882,0,0,415f96cc42f39d5a62242781ac68568d1b60333c23c5a2a5227f986f314b970a,2024-11-21T09:43:47.037000 CVE-2024-4882,0,0,415f96cc42f39d5a62242781ac68568d1b60333c23c5a2a5227f986f314b970a,2024-11-21T09:43:47.037000
CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000 CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000
CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000 CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000
@ -271239,6 +271241,7 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f
CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000
CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000
CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000
CVE-2024-55078,1,1,46727a306da0a5074789ceec48cc91a7cb0ca2cd0e29ed08f6dbed84909b6912,2025-01-03T15:15:10.697000
CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000
CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000 CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000
CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000 CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000
@ -271306,6 +271309,7 @@ CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e87
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000 CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
CVE-2024-55507,1,1,3410e0d0b3845a0cd40aba36f83a7ea891bcac62004b332bbef076c18ad78726,2025-01-03T16:15:26.027000
CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000 CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000 CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000
@ -271406,6 +271410,7 @@ CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db8
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000 CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000 CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
CVE-2024-5591,1,1,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000
CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000 CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000
CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000 CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
@ -271651,6 +271656,10 @@ CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b1
CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000
CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000 CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
CVE-2024-56320,1,1,bae4446e4245d0b06b53d8f40efab1d5a9f50a9a859ae46e9d1241e41ddbb40e,2025-01-03T16:15:26.180000
CVE-2024-56321,1,1,e95cf21efdba501f429d99a45fef811d64afd3a69e9525f6a52b713e8fd6614d,2025-01-03T16:15:26.340000
CVE-2024-56322,1,1,7ccae66170f5f9483185f36964e22a15902abb27bc7b07488fa188b4ebf1414e,2025-01-03T16:15:26.480000
CVE-2024-56324,1,1,106f735083ffc8e3eaea10fa2f5c6734dba5457eeab47e6c2031359baf5b4e42,2025-01-03T16:15:26.643000
CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000 CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000
CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000 CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000
CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9acc,2024-12-20T20:15:23.987000 CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9acc,2024-12-20T20:15:23.987000
@ -271686,6 +271695,7 @@ CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020b
CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000 CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000
CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000
CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000
CVE-2024-56408,1,1,f0cdaa44b57f476b1b653c1dc57ebd44815b6ab51d9702e1be87b001e3637937,2025-01-03T16:15:26.773000
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000 CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000
CVE-2024-56414,0,0,b4af03f514aa1e91d591d44d03066c9da0634ab7a11c7f36aef3d99223087fa5,2025-01-02T16:15:08.693000 CVE-2024-56414,0,0,b4af03f514aa1e91d591d44d03066c9da0634ab7a11c7f36aef3d99223087fa5,2025-01-02T16:15:08.693000
@ -275640,6 +275650,6 @@ CVE-2025-0172,0,0,52d8e9b23781f72db93517107fba3a4dacce2fa0b9c1933202d67ec972e26c
CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000 CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000
CVE-2025-0174,0,0,9d66653b35dce22a5e13bcd4d218f8b859e23f7e6e6c85f7fc84bbc507e489f5,2025-01-03T02:15:07.480000 CVE-2025-0174,0,0,9d66653b35dce22a5e13bcd4d218f8b859e23f7e6e6c85f7fc84bbc507e489f5,2025-01-03T02:15:07.480000
CVE-2025-0175,0,0,ac95c9697b04739d886090fb337a8da173389b48ecd5972d04d24955935380d8,2025-01-03T02:15:07.680000 CVE-2025-0175,0,0,ac95c9697b04739d886090fb337a8da173389b48ecd5972d04d24955935380d8,2025-01-03T02:15:07.680000
CVE-2025-0176,0,0,2a22ffa81ac729c3387660dd6a8fe5bfa9ef0ae8a6a4a9c7a653c15c3464b03c,2025-01-03T02:15:07.870000 CVE-2025-0176,0,1,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e68191b,2025-01-03T15:15:11.360000
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000
CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000 CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000

Can't render this file because it is too large.