Auto-Update: 2025-01-03T17:00:20.860601+00:00

This commit is contained in:
cad-safe-bot 2025-01-03 17:03:49 +00:00
parent 8931b55289
commit 3f8d5a7be2
42 changed files with 2153 additions and 146 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31635",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-13T17:15:12.567",
"lastModified": "2024-11-21T07:04:53.830",
"lastModified": "2025-01-03T15:15:06.873",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-367"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31636",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-13T17:15:12.640",
"lastModified": "2024-11-21T07:04:54.760",
"lastModified": "2025-01-03T15:15:08.580",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-367"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1323",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-12T18:15:09.910",
"lastModified": "2024-11-21T07:38:55.407",
"lastModified": "2025-01-03T15:15:09.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.143",
"lastModified": "2024-11-21T08:07:26.823",
"lastModified": "2025-01-03T16:15:23.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34616",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.190",
"lastModified": "2024-11-21T08:07:26.973",
"lastModified": "2025-01-03T16:15:24.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34617",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.233",
"lastModified": "2024-11-21T08:07:27.120",
"lastModified": "2025-01-03T16:15:24.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34620",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.277",
"lastModified": "2024-11-21T08:07:27.273",
"lastModified": "2025-01-03T16:15:24.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34623",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.317",
"lastModified": "2024-11-21T08:07:27.437",
"lastModified": "2025-01-03T16:15:25.113",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34755",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.660",
"lastModified": "2024-11-21T08:07:34.057",
"lastModified": "2025-01-03T16:15:25.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34756",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.707",
"lastModified": "2024-11-21T08:07:34.217",
"lastModified": "2025-01-03T16:15:25.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34823",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.750",
"lastModified": "2024-11-21T08:07:35.497",
"lastModified": "2025-01-03T16:15:25.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34824",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.790",
"lastModified": "2024-11-21T08:07:35.637",
"lastModified": "2025-01-03T15:15:09.623",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34865",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.837",
"lastModified": "2024-11-21T08:07:39.150",
"lastModified": "2025-01-03T15:15:09.823",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34867",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T16:15:20.277",
"lastModified": "2024-11-21T08:07:39.293",
"lastModified": "2025-01-03T15:15:10.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40478",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:20.650",
"lastModified": "2024-11-21T08:19:33.637",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-03T16:34:16.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,76 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.10.94",
"matchCriteriaId": "94C6B573-5355-47EE-A262-E15AE88F8DDB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40479",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:20.813",
"lastModified": "2024-11-21T08:19:33.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-03T16:35:43.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,76 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.9.92",
"matchCriteriaId": "9E718D58-EC6B-4500-AEE5-D3B6D6E8B06B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40480",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:15:20.987",
"lastModified": "2024-11-21T08:19:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-03T16:36:16.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,76 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.9.92",
"matchCriteriaId": "9E718D58-EC6B-4500-AEE5-D3B6D6E8B06B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51634",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T20:15:06.050",
"lastModified": "2024-11-22T20:15:06.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:40:16.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,50 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139",
"source": "zdi-disclosures@trendmicro.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.12.100_hotfix",
"matchCriteriaId": "37B657C4-72ED-4484-92DC-561EF7D8FB73"
}
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-583/",
"source": "zdi-disclosures@trendmicro.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-583/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51635",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T20:15:06.167",
"lastModified": "2024-11-22T20:15:06.167",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:40:28.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,62 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.12.100_hotfix",
"matchCriteriaId": "37B657C4-72ED-4484-92DC-561EF7D8FB73"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-584/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27295",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-01T16:15:46.227",
"lastModified": "2024-11-21T09:04:16.080",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T15:57:16.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-706"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.8.3",
"matchCriteriaId": "A159A530-7A69-4C0E-AB88-AB8C74036DE4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27296",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-01T16:15:46.413",
"lastModified": "2024-11-21T09:04:16.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:14:03.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,24 +69,64 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.8.3",
"matchCriteriaId": "A159A530-7A69-4C0E-AB88-AB8C74036DE4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28238",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.297",
"lastModified": "2024-11-21T09:06:04.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:14:55.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
}
]
},
@ -53,16 +73,50 @@
"value": "CWE-598"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.10.0",
"matchCriteriaId": "1A284199-40D8-4833-A273-84ED86C5A82E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28239",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T21:15:59.513",
"lastModified": "2024-11-21T09:06:04.327",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:17:32.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,32 +69,80 @@
"value": "CWE-601"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.10.0",
"matchCriteriaId": "1A284199-40D8-4833-A273-84ED86C5A82E"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34708",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:39:31.083",
"lastModified": "2024-11-21T09:19:14.427",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:19:08.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
@ -49,24 +69,68 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.11.0",
"matchCriteriaId": "EE19D15A-1ADB-4207-8730-3EC25C39DE58"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34709",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:39:31.547",
"lastModified": "2024-11-21T09:19:14.557",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:20:01.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-613"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.11.0",
"matchCriteriaId": "EE19D15A-1ADB-4207-8730-3EC25C39DE58"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36128",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-03T15:15:09.547",
"lastModified": "2024-11-21T09:21:40.603",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:24:06.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-754"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.11.2",
"matchCriteriaId": "21D40FEA-DB7C-4E7F-80B2-D703E2271BAA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39895",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T17:15:11.980",
"lastModified": "2024-11-21T09:28:31.113",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:29:09.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-400"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.12.0",
"matchCriteriaId": "A7FA42AF-B23C-44DD-A402-9382A4E30AF0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39896",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T18:15:08.383",
"lastModified": "2024-11-21T09:28:31.230",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:30:43.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.13.0",
"matchCriteriaId": "1C808521-9592-4730-A53F-CCBA4486C092"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41780",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-03T15:15:10.367",
"lastModified": "2025-01-03T15:15:10.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could \n\ncould allow a physical user to obtain sensitive information due to not masking passwords during entry."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7180119",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47822",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-08T18:15:31.170",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-03T16:31:38.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.6,
"impactScore": 3.6
}
]
},
@ -51,10 +71,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-vw58-ph65-6rxp",
"source": "security-advisories@github.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "10.13.2",
"matchCriteriaId": "995104A5-7032-4BC1-9E90-ABE8E13DC287"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-vw58-ph65-6rxp",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48814",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T15:15:10.570",
"lastModified": "2025-01-03T15:15:10.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Silverpeas 6.4.1 allows a remote attacker to obtain sensitive information via the ViewType parameter of the findbywhereclause function"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/SubZ3r0-0x01/7150f7cbc3b7d810adb221cae3d08fc8",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Silverpeas/Silverpeas-Components/pull/859",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Silverpeas/Silverpeas-Core/pull/1353",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-55078",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T15:15:10.697",
"lastModified": "2025-01-03T15:15:10.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/summerxxoo/8a0c9905feda6e192c10b860888afd26",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/summerxxoo/VulnPoc/blob/main/WukongCRM-11.0-JAVA%20-File%20upload%20across%20directories.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-55507",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T16:15:26.027",
"lastModified": "2025-01-03T16:15:26.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in CodeAstro Complaint Management System v.1.0 allows a remote attacker to escalate privileges via the delete_e.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55507.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-5591",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-03T15:15:10.813",
"lastModified": "2025-01-03T15:15:10.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7180120",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-56320",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.180",
"lastModified": "2025-01-03T16:15:26.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions prior to 24.5.0 are vulnerable to admin privilege escalation due to improper authorization of access to the admin \"Configuration XML\" UI feature, and its associated API. A malicious insider/existing authenticated GoCD user with an existing GoCD user account could abuse this vulnerability to access information intended only for GoCD admins, or to escalate their privileges to that of a GoCD admin in a persistent manner. it is not possible for this vulnerability to be abused prior to authentication/login. The issue is fixed in GoCD 24.5.0. GoCD users who are not able to immediate upgrade can mitigate this issue by using a reverse proxy, WAF or similar to externally block access paths with a `/go/rails/` prefix. Blocking this route causes no loss of functionality. If it is not possible to upgrade or block the above route, consider reducing the GoCD user base to more trusted set of users, including temporarily disabling use of plugins such as the guest-login-plugin, which allow limited anonymous access as a regular user account."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/68b598b97bd283a5a85e20d018d69fe86acf4165",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-346h-q594-rj8j",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-56321",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.340",
"lastModified": "2025-01-03T16:15:26.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions 18.9.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse the backup configuration \"post-backup script\" feature to potentially execute arbitrary scripts on the hosting server or container as GoCD's user, rather than pre-configured scripts. In practice the impact of this vulnerability is limited, as in most configurations a user who can log into the GoCD UI as an admin also has host administration permissions for the host/container that GoCD runs on, in order to manage artifact storage and other service-level configuration options. Additionally, since a GoCD admin has ability to configure and schedule pipelines tasks on all GoCD agents available to the server, the fundamental functionality of GoCD allows co-ordinated task execution similar to that of post-backup-scripts. However in restricted environments where the host administration is separated from the role of a GoCD admin, this may be unexpected. The issue is fixed in GoCD 24.5.0. Post-backup scripts can no longer be executed from within certain sensitive locations on the GoCD server. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/631f315d17fcb73f310eee6c881974c9b55ca9f0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-7jr3-gh3w-vjxq",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-56322",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.480",
"lastModified": "2025-01-03T16:15:26.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions 16.7.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse a hidden/unused configuration repository (pipelines as code) feature to allow XML External Entity (XXE) injection on the GoCD Server which will be executed when GoCD periodically scans configuration repositories for pipeline updates, or is triggered by an administrator or config repo admin. In practice the impact of this vulnerability is limited, in most cases without combining with another vulnerability, as only GoCD (super) admins have the ability to abuse this vulnerability. Typically a malicious GoCD admin can cause much larger damage than that they can do with XXE injection. The issue is fixed in GoCD 24.5.0. As a workaround, prevent external access from the GoCD server to arbitrary locations using some kind of environment egress control."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-8xwx-hf68-8xq7",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-56324",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.643",
"lastModified": "2025-01-03T16:15:26.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GoCD is a continuous deliver server. GoCD versions prior to 24.4.0 can allow GoCD \"group admins\" to abuse ability to edit the raw XML configuration for groups they administer to trigger XML External Entity (XXE) injection on the GoCD server. Theoretically, the XXE vulnerability can result in additional attacks such as SSRF, information disclosure from the GoCD server, and directory traversal, although these additional attacks have not been explicitly demonstrated as exploitable. This issue is fixed in GoCD 24.5.0. Some workarounds are available. One may temporarily block access to `/go/*/pipelines/snippet` routes from an external reverse proxy or WAF if one's \"group admin\" users do not need the functionality to edit the XML of pipelines directly (rather than using the UI, or using a configuration repository). One may also prevent external access from one's GoCD server to arbitrary locations using some kind of environment egress control."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/releases/tag/24.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gocd/gocd/security/advisories/GHSA-3w9f-fgr5-5g78",
"source": "security-advisories@github.com"
},
{
"url": "https://www.gocd.org/releases/#24-5-0",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-56408",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-03T16:15:26.773",
"lastModified": "2025-01-03T16:15:26.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have is no sanitization in the `/vendor/phpoffice/phpspreadsheet/samples/Engineering/Convert-Online.php` file, which leads to the possibility of a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-03T02:15:07.870",
"lastModified": "2025-01-03T02:15:07.870",
"lastModified": "2025-01-03T15:15:11.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /user/add_cart.php. La manipulaci\u00f3n del argumento id/qty provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.473347",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-03T15:00:25.495310+00:00
2025-01-03T17:00:20.860601+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-03T14:53:06.053000+00:00
2025-01-03T16:40:28+00:00
```
### Last Data Feed Release
@ -33,26 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
275644
275654
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `10`
- [CVE-2024-41780](CVE-2024/CVE-2024-417xx/CVE-2024-41780.json) (`2025-01-03T15:15:10.367`)
- [CVE-2024-48814](CVE-2024/CVE-2024-488xx/CVE-2024-48814.json) (`2025-01-03T15:15:10.570`)
- [CVE-2024-55078](CVE-2024/CVE-2024-550xx/CVE-2024-55078.json) (`2025-01-03T15:15:10.697`)
- [CVE-2024-55507](CVE-2024/CVE-2024-555xx/CVE-2024-55507.json) (`2025-01-03T16:15:26.027`)
- [CVE-2024-5591](CVE-2024/CVE-2024-55xx/CVE-2024-5591.json) (`2025-01-03T15:15:10.813`)
- [CVE-2024-56320](CVE-2024/CVE-2024-563xx/CVE-2024-56320.json) (`2025-01-03T16:15:26.180`)
- [CVE-2024-56321](CVE-2024/CVE-2024-563xx/CVE-2024-56321.json) (`2025-01-03T16:15:26.340`)
- [CVE-2024-56322](CVE-2024/CVE-2024-563xx/CVE-2024-56322.json) (`2025-01-03T16:15:26.480`)
- [CVE-2024-56324](CVE-2024/CVE-2024-563xx/CVE-2024-56324.json) (`2025-01-03T16:15:26.643`)
- [CVE-2024-56408](CVE-2024/CVE-2024-564xx/CVE-2024-56408.json) (`2025-01-03T16:15:26.773`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `30`
- [CVE-2021-43783](CVE-2021/CVE-2021-437xx/CVE-2021-43783.json) (`2025-01-03T14:52:50.143`)
- [CVE-2024-12694](CVE-2024/CVE-2024-126xx/CVE-2024-12694.json) (`2025-01-03T14:15:23.560`)
- [CVE-2024-12798](CVE-2024/CVE-2024-127xx/CVE-2024-12798.json) (`2025-01-03T14:15:24.370`)
- [CVE-2024-12801](CVE-2024/CVE-2024-128xx/CVE-2024-12801.json) (`2025-01-03T14:15:24.500`)
- [CVE-2024-45815](CVE-2024/CVE-2024-458xx/CVE-2024-45815.json) (`2025-01-03T14:53:06.053`)
- [CVE-2024-45816](CVE-2024/CVE-2024-458xx/CVE-2024-45816.json) (`2025-01-03T14:52:37.133`)
- [CVE-2024-46976](CVE-2024/CVE-2024-469xx/CVE-2024-46976.json) (`2025-01-03T14:52:32.863`)
- [CVE-2023-34617](CVE-2023/CVE-2023-346xx/CVE-2023-34617.json) (`2025-01-03T16:15:24.740`)
- [CVE-2023-34620](CVE-2023/CVE-2023-346xx/CVE-2023-34620.json) (`2025-01-03T16:15:24.927`)
- [CVE-2023-34623](CVE-2023/CVE-2023-346xx/CVE-2023-34623.json) (`2025-01-03T16:15:25.113`)
- [CVE-2023-34755](CVE-2023/CVE-2023-347xx/CVE-2023-34755.json) (`2025-01-03T16:15:25.290`)
- [CVE-2023-34756](CVE-2023/CVE-2023-347xx/CVE-2023-34756.json) (`2025-01-03T16:15:25.463`)
- [CVE-2023-34823](CVE-2023/CVE-2023-348xx/CVE-2023-34823.json) (`2025-01-03T16:15:25.640`)
- [CVE-2023-34824](CVE-2023/CVE-2023-348xx/CVE-2023-34824.json) (`2025-01-03T15:15:09.623`)
- [CVE-2023-34865](CVE-2023/CVE-2023-348xx/CVE-2023-34865.json) (`2025-01-03T15:15:09.823`)
- [CVE-2023-34867](CVE-2023/CVE-2023-348xx/CVE-2023-34867.json) (`2025-01-03T15:15:10.020`)
- [CVE-2023-40478](CVE-2023/CVE-2023-404xx/CVE-2023-40478.json) (`2025-01-03T16:34:16.067`)
- [CVE-2023-40479](CVE-2023/CVE-2023-404xx/CVE-2023-40479.json) (`2025-01-03T16:35:43.653`)
- [CVE-2023-40480](CVE-2023/CVE-2023-404xx/CVE-2023-40480.json) (`2025-01-03T16:36:16.097`)
- [CVE-2023-51634](CVE-2023/CVE-2023-516xx/CVE-2023-51634.json) (`2025-01-03T16:40:16.203`)
- [CVE-2023-51635](CVE-2023/CVE-2023-516xx/CVE-2023-51635.json) (`2025-01-03T16:40:28.000`)
- [CVE-2024-27295](CVE-2024/CVE-2024-272xx/CVE-2024-27295.json) (`2025-01-03T15:57:16.817`)
- [CVE-2024-27296](CVE-2024/CVE-2024-272xx/CVE-2024-27296.json) (`2025-01-03T16:14:03.593`)
- [CVE-2024-28238](CVE-2024/CVE-2024-282xx/CVE-2024-28238.json) (`2025-01-03T16:14:55.823`)
- [CVE-2024-28239](CVE-2024/CVE-2024-282xx/CVE-2024-28239.json) (`2025-01-03T16:17:32.100`)
- [CVE-2024-34708](CVE-2024/CVE-2024-347xx/CVE-2024-34708.json) (`2025-01-03T16:19:08.750`)
- [CVE-2024-34709](CVE-2024/CVE-2024-347xx/CVE-2024-34709.json) (`2025-01-03T16:20:01.927`)
- [CVE-2024-36128](CVE-2024/CVE-2024-361xx/CVE-2024-36128.json) (`2025-01-03T16:24:06.250`)
- [CVE-2024-39895](CVE-2024/CVE-2024-398xx/CVE-2024-39895.json) (`2025-01-03T16:29:09.890`)
- [CVE-2024-39896](CVE-2024/CVE-2024-398xx/CVE-2024-39896.json) (`2025-01-03T16:30:43.367`)
- [CVE-2024-47822](CVE-2024/CVE-2024-478xx/CVE-2024-47822.json) (`2025-01-03T16:31:38.163`)
- [CVE-2025-0176](CVE-2025/CVE-2025-01xx/CVE-2025-0176.json) (`2025-01-03T15:15:11.360`)
## Download and Usage

View File

@ -184990,7 +184990,7 @@ CVE-2021-4378,0,0,74f6da3f33a7c118184c27d64759b3d770af0bc53ab336b374ba189ff85f99
CVE-2021-43780,0,0,1bfa3db9d94130ef24b2593e757aaf7121510a117571de0bff270a0cdd24ad47,2024-11-21T06:29:46.333000
CVE-2021-43781,0,0,83b5431bdd3e4f24307a6d5be3002e7c44252557aa22d5c0f2a1b6fa8d139a40,2024-11-21T06:29:46.457000
CVE-2021-43782,0,0,7c4869e5fc20cf7eb07405a14f392311fc327dfc5d31aef4373794d140731cb3,2024-11-21T06:29:46.593000
CVE-2021-43783,0,1,23825690a236bdc2dd01fb30b9e53324e3e4b3ac6341e2bba6525b48b94186df,2025-01-03T14:52:50.143000
CVE-2021-43783,0,0,23825690a236bdc2dd01fb30b9e53324e3e4b3ac6341e2bba6525b48b94186df,2025-01-03T14:52:50.143000
CVE-2021-43784,0,0,073ec769af326eddbd549dfc99ec29559882aff8249bd3d38a6dc118a67136cf,2024-11-21T06:29:46.873000
CVE-2021-43785,0,0,75d1cca129ea42ebb4fc89f19485476d7d4a2f72e66bec77a999aa5e33d0e46a,2024-11-21T06:29:47.030000
CVE-2021-43786,0,0,ae7238f3759020b8217e66fa8ae738ef36819e2d7b2254a6da7ac805cc1ab6b8,2024-11-21T06:29:47.163000
@ -199832,8 +199832,8 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95
CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000
CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000
CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000
CVE-2022-31635,0,0,9fa1f7b2e398fb6b2c51f0cd924bed5570d7cfcb9e6000cb2f71c0fecd954d44,2024-11-21T07:04:53.830000
CVE-2022-31636,0,0,3dde94b5af6733fb77f8357055347d897ee2984f52a5eb2f297bff7574e2bcce,2024-11-21T07:04:54.760000
CVE-2022-31635,0,1,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000
CVE-2022-31636,0,1,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000
CVE-2022-31637,0,0,7e118aefb900f1b8771bfb03c3f88a05095e573d84c8f798deca45c7a537e9d6,2024-11-21T07:04:55.353000
CVE-2022-31638,0,0,2059d84d26545dd04336453f64b35e323c5ddc67e0fdd01032a49e7d96e0e32b,2024-11-21T07:04:55.950000
CVE-2022-31639,0,0,2db9867db165c9710bd5f24a4058d245249a75be5ab8aab9a798192b24a8bc65,2024-11-21T07:04:56.547000
@ -214374,7 +214374,7 @@ CVE-2023-1319,0,0,b368dbf8ee7ea09a72a801be40a1f8e95308556cc4f9a243194f9c5ced6a57
CVE-2023-1320,0,0,a1b35f71aa2c62d9c7c6e39c28e5aa6fb59975fffcfd2bebdd707399549f1c48,2024-11-21T07:38:55.037000
CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3bcd,2024-11-21T07:38:55.153000
CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000
CVE-2023-1323,0,0,d4cda04501884a75dcd9305573a74ca92050af41895470a71604635c3260a819,2024-11-21T07:38:55.407000
CVE-2023-1323,0,1,982823bb59d32330f0a13e86fef0c7d44c0b9e06b6c23575f1cffc35d2f30647,2025-01-03T15:15:09.330000
CVE-2023-1324,0,0,8df1f393b710a69755021078a93585fd0e089e9aa03e35b99d882a23f469d2a3,2024-11-21T07:38:55.520000
CVE-2023-1325,0,0,0959d70918885d472cdc91efc9bd6dc4dd3a4b413a8c9a9ff5d155b9a97a3461,2024-11-21T07:38:55.627000
CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000
@ -226948,12 +226948,12 @@ CVE-2023-34611,0,0,687b023253523d6e78594d20204e464b5b48f1822b7ada6e96002f20770ef
CVE-2023-34612,0,0,d9562c519a29403cbf5df3cdef7fae0d47649a05b55ea20c1399dcd942ad2eab,2024-11-21T08:07:26.347000
CVE-2023-34613,0,0,0980ba4370da51c40e36e15c7829f03ca9eb6219138e5fca5c693b4dcbe6d730,2024-11-21T08:07:26.520000
CVE-2023-34614,0,0,cfc5c897e7b775196b47d21236ed0a510f788fe6f12193dfb910a564a3234725,2024-11-21T08:07:26.670000
CVE-2023-34615,0,0,d0a1cdc98d7a33162618a17d005e7e5661243581da307e00efcedbd2769c575c,2024-11-21T08:07:26.823000
CVE-2023-34616,0,0,8c3efff83061b386f95199185e7ff2006ee844f861264c96eeeed3285d91dfbd,2024-11-21T08:07:26.973000
CVE-2023-34617,0,0,a406025411886c1efd2a867f88854d9e4ee21cd3c016dd803806fbabafdb6dd6,2024-11-21T08:07:27.120000
CVE-2023-34615,0,1,c7f7a620070310271ec68b0c4f6b84fdb07c3e4647f34669639a2792700ad451,2025-01-03T16:15:23.910000
CVE-2023-34616,0,1,3f8ab3b615eb5e2615351002ea9e99bf37d3130f5b0111bf2e24904c92119046,2025-01-03T16:15:24.527000
CVE-2023-34617,0,1,7ca29ae5a0478a1651698f89316d2d918e35d5e4adefb7a7c7cbf3fdd95d9f86,2025-01-03T16:15:24.740000
CVE-2023-3462,0,0,4177db0cffdc2613ba002ba4d01507ab8e47e6dfa38809c372fa791238948542,2024-11-21T08:17:19.147000
CVE-2023-34620,0,0,41e40bf172b6b1fa36d26fee77ee204f20fc5b943a5f298e29cf527a932b1805,2024-11-21T08:07:27.273000
CVE-2023-34623,0,0,4803c558369a990f0e334156c10be25674dec139081968ff4ee6791af549c44c,2024-11-21T08:07:27.437000
CVE-2023-34620,0,1,98a0155672d14828973b2182db5672affa676d339ad8cd7b89db373949a38754,2025-01-03T16:15:24.927000
CVE-2023-34623,0,1,f8df0f0e9dde144d4b6f6069842c529376e77c80103dc857feeebe365f1193f0,2025-01-03T16:15:25.113000
CVE-2023-34624,0,0,ccb6b9c3240373aba7f518b106fb079f69bf4f22dad6c2d7f2ea4f5936bf3118,2024-11-21T08:07:27.583000
CVE-2023-34625,0,0,6c4b73c7e9e48fa3c20aa62115f9bf66d09a0cd82510154a4c28d19d705d3e2c,2024-11-21T08:07:27.740000
CVE-2023-34626,0,0,593591497027e767148eea3cc4f048b12753ab18a7094ecfb88edc2a0c3ef2b2,2024-11-21T08:07:27.927000
@ -227007,8 +227007,8 @@ CVE-2023-34751,0,0,8682934644407bc06186deb0a81834cf5b8a5790b0dce10df459f9b510d0b
CVE-2023-34752,0,0,615bea58318106ba6ad4032c7d4aa234fe3427b6716a974f8b74ffb6f76a0dde,2025-01-02T20:16:02.933000
CVE-2023-34753,0,0,b5cfd78eed4154500a7bc8867dbf749fd6af8b5c24d367aeff1fa2fc7eeeea27,2025-01-02T20:16:03.177000
CVE-2023-34754,0,0,12d97e4f9a13202971d428941c83713e5b8a6fa712854e15428501cc4f423d61,2025-01-02T20:16:03.420000
CVE-2023-34755,0,0,ad9d976aebf6a13a4d8d5e030a5115982976ae2d5d58da0b6a7b2f2c1e146936,2024-11-21T08:07:34.057000
CVE-2023-34756,0,0,073e07a7dff5c7ec8f546bc2d03a122938a7c9838ebc4eee7cf13f8662c523cd,2024-11-21T08:07:34.217000
CVE-2023-34755,0,1,43bac1549910ba2f6b627492786c57aa3a6957cd30d83bcc27bb7ddef8551b02,2025-01-03T16:15:25.290000
CVE-2023-34756,0,1,0e4bfc03184a4dfa953cf99cf05978f022073f98c83d01a9ba68e5cbfa001d63,2025-01-03T16:15:25.463000
CVE-2023-34758,0,0,0f68d6687c3ddce1fe46cc75662a62eeb29c0ad98d09a62e8cfac50bfc6c2c85,2024-11-21T08:07:34.370000
CVE-2023-3476,0,0,40618b39925a8749af57b51f48be9f8a0417a1d39f925ba493f541ee61e68c0b,2024-11-21T08:17:21.123000
CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000
@ -227022,8 +227022,8 @@ CVE-2023-34798,0,0,6cb910bdabdb3563f84fc57831ebcda7ba4c5ee7c3dd75bac8c3c8a80deff
CVE-2023-34800,0,0,84bba67803e1bbd4ca8cc01710d354e93f725db60979993fa12a34f73c09acc2,2024-12-16T20:15:07.120000
CVE-2023-3481,0,0,b2741aa0f42f156d4fee2c27ab01bac08a1a34d5e3aebc870718d36773e447a7,2024-11-21T08:17:21.767000
CVE-2023-3482,0,0,4f17c87c8ca4abd9150a3bc0ff1634cb2b99e8f7558db4292a90748d3f170833,2024-11-21T08:17:21.910000
CVE-2023-34823,0,0,40513740fed68e8e66396debac889f6fe387d9792eb250b68461072643b7caab,2024-11-21T08:07:35.497000
CVE-2023-34824,0,0,e4d073d174f9fdc33a97086b24703d80ff2edaad6b0b9ee4e4e1f3e2c5b3ef9d,2024-11-21T08:07:35.637000
CVE-2023-34823,0,1,1e9de38f8e622ec4466d8c92c24cb606d3f2863d1045f144021cdfe4dda4d37a,2025-01-03T16:15:25.640000
CVE-2023-34824,0,1,8e4fa292c32a57ed3992fa7f05ed57c4210704d4df81723ebb6147791e46bd6b,2025-01-03T15:15:09.623000
CVE-2023-34829,0,0,90606f64ce5b5ca9675100d75480645a14da247f5a747da7b09b465e80b3a21f,2024-11-21T08:07:35.777000
CVE-2023-34830,0,0,a4fcb275f043fb8ed2760ef0bd7f458229c234d132492bbd6c8d154694ebfb22,2024-11-21T08:07:35.940000
CVE-2023-34831,0,0,0dcb3a46cbe2d1b958427e2d399be90a2edc8708839e27e80c4adebbfcb7ba62,2024-11-21T08:07:36.087000
@ -227048,8 +227048,8 @@ CVE-2023-34853,0,0,70feac653c1a3e0280c311147207cd3241715d41c2d589d538290c8ad5f44
CVE-2023-34855,0,0,ed2d4fafbe7f3e29b520e4c4e02dbbd89bcceb1278797c9db1a2814214086320,2024-11-21T08:07:38.867000
CVE-2023-34856,0,0,5b8cbe97230089400a96eadea80d38522d82601855a90172d3f4628f04896660,2024-11-21T08:07:39.013000
CVE-2023-3486,0,0,abc053f556d927ed652b30757a723149ae17401e97e606b2df27c18fb326369a,2024-11-21T08:17:22.333000
CVE-2023-34865,0,0,c5a5fb874ce2aca447fcacc736978473bcea77b22d754d7a55731face24ecb5e,2024-11-21T08:07:39.150000
CVE-2023-34867,0,0,fe24c20d7c1400fa4fc3d53aa855c72d12d25069dbe88a5f89cead66f6917ea6,2024-11-21T08:07:39.293000
CVE-2023-34865,0,1,5664f741f50b9dd84d8a823d0d45aa717e7a771e4cd4c434cbd609e47dd230ad,2025-01-03T15:15:09.823000
CVE-2023-34867,0,1,d872eacd3a79936a24114ea3f5fbae16c925f5515098c538dbc7bbd6daf03d28,2025-01-03T15:15:10.020000
CVE-2023-34868,0,0,92b0ec0383014e453bbf7417e099295cbbcdf2d44918f01cec01543a8b0ae35a,2025-01-02T21:15:09.110000
CVE-2023-34869,0,0,2d9adb7a5a83bdfd361e6c52dc28b0a603bcbf433dad33be958254b4792bb51a,2024-11-21T08:07:39.570000
CVE-2023-3487,0,0,68f2d9850e4a5ab0061c1ce04bf451bb9af48b3d5b3f3bf94ac9eddc3348a24e,2024-11-21T08:17:22.477000
@ -231383,10 +231383,10 @@ CVE-2023-40474,0,0,8bcf31ee98703f6fc473b5b6ae72ea5932cd0d7a0edeb156d4f8a182ea3c7
CVE-2023-40475,0,0,e7d21de9d238e03b562bffb12dea4211af06c007f197e91c21580975c3001720,2024-12-17T15:36:49.790000
CVE-2023-40476,0,0,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000
CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000
CVE-2023-40478,0,0,a3fb7798a48b05b31de5b2b5faa9c0ac4380209160291014ad3f81dcf8ebbb85,2024-11-21T08:19:33.637000
CVE-2023-40479,0,0,9449a8cd9cba1b475b9fcd0125f9e3c6bfe2290a23a474f03f0ce92e2999e00c,2024-11-21T08:19:33.773000
CVE-2023-40478,0,1,97084c2b4ef249d0552a8d03d3aeb2ad91f2711483ab5979ff3e9704d86b18e3,2025-01-03T16:34:16.067000
CVE-2023-40479,0,1,7f0b7df65d67216fffb5ab0177cffb527f0d01bdb735f0d704cd884d3711bd7a,2025-01-03T16:35:43.653000
CVE-2023-4048,0,0,bd3c0a6a74e525a4188379c0cec4f9ff604ba7beed0f7d9138ffb0338be5ac41,2024-11-21T08:34:17.790000
CVE-2023-40480,0,0,4efee1a79cc821ccb88a4d78aeea1a295eedd1c2d0323ded2d957c890b5c67ce,2024-11-21T08:19:33.900000
CVE-2023-40480,0,1,10ebc4f3bccbb6d1037d383855dd023033f7196e7c20e5b3471953d956cf0fca,2025-01-03T16:36:16.097000
CVE-2023-40481,0,0,fa8348a8b2829056d88eb01d408fdfa5a81faedfe3b8561775d453f6e46e33e8,2024-11-21T08:19:34.030000
CVE-2023-40482,0,0,6d046a3f66aee61e3b8e7abbf764cf14bb2baba7448ec56eaf8a254e6b52060a,2024-11-21T08:19:34.160000
CVE-2023-40483,0,0,3dd7719458b277c585be7d5acd46a05a3c44952981433bf675cb5f2efb0c0617,2024-11-21T08:19:34.293000
@ -239340,8 +239340,8 @@ CVE-2023-5163,0,0,cf3b8b5134b9c3abc6194368c1f49f0d1625e7f19df09276fa37ea2ce1e8ae
CVE-2023-51630,0,0,e515bb953de02671803c7419ad4aba130c7fe90ffc243cec72816fb33885b191,2024-11-21T08:38:31.540000
CVE-2023-51631,0,0,63990fafd7619988fcb9ea55cb59056aa18a7251357c83485d91833b03bb94e5,2024-11-21T08:38:31.683000
CVE-2023-51633,0,0,5bad642ed926588fb216d042d3401b2bfb81ffae216f273e0c12fbfc0d81c0ae,2024-11-25T14:09:45.733000
CVE-2023-51634,0,0,27883d7e67092228d6aa2a406db34a5289535f972d6c3891bb3d4750bd14fe53,2024-11-22T20:15:06.050000
CVE-2023-51635,0,0,58843e2cdd5a771a346cf4631dd15324cb9015f9b2e410b01bdd1c9022bea973,2024-11-22T20:15:06.167000
CVE-2023-51634,0,1,24101bc2264cc1d448351081d51aca13350b240728cd6ffe57bce0b6bf8722d1,2025-01-03T16:40:16.203000
CVE-2023-51635,0,1,ee4330766282efd840c60d0e4f3a92ff9e46233947ba1ea3659971c9610fc910,2025-01-03T16:40:28
CVE-2023-51636,0,0,064e8a3fd5ea55d58d985476470cd6b3909b601adaac084b871f121b88b13dd9,2024-11-21T08:38:31.923000
CVE-2023-51637,0,0,29910b96acccc169a530531b3226da84a2d56d602569491908f5d6d939690c9d,2024-11-21T08:38:32.047000
CVE-2023-51638,0,0,c47880b226fd2bb90e8785fb684e320705afc8c0487e8ff5fc296835b0d1191b,2024-11-22T20:15:06.283000
@ -245174,7 +245174,7 @@ CVE-2024-12687,0,0,db582e783ba07ea03e34c560f3ce0d9a75e73c080a0914e89215bff58a3d2
CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000
CVE-2024-12692,0,0,1d91106e54d6f85d8fe7f405f127892c0e24f0eae3c87f0ec8b1a814419d86e2,2024-12-18T22:15:05.730000
CVE-2024-12693,0,0,4219fa495406cba63408dc60d8d04c757d304855f4c2222ea40cc821cfe89cc2,2024-12-18T22:15:06.293000
CVE-2024-12694,0,1,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000
CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000
CVE-2024-12695,0,0,4ca306137a37a04c18e8f4bd689ebfa86a34c8059c690369657387f43989e7dc,2024-12-18T22:15:06.523000
CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000
CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000
@ -245215,8 +245215,8 @@ CVE-2024-12791,0,0,00e274fb2644dd0737fedef7f600b72a2d7c4a341721b9f72cd4a6ccf93a5
CVE-2024-12792,0,0,9ff314747d32c9ea3d838ab15483ae4445fd607f5e8ea594662271d73f2273aa,2024-12-19T18:15:08.900000
CVE-2024-12793,0,0,e8bee7f66d85bfcf3f10183c2d9dfa3d7688defa0d4131b4b123d19eadde9daf,2024-12-19T18:15:09.403000
CVE-2024-12794,0,0,e3e22485049a6ee1730ef3f5b425634ab9957dffabfae691eb4315bcd5eacfae,2024-12-19T18:15:09.963000
CVE-2024-12798,0,1,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,1,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12828,0,0,28c200a13b14baa13804e935d3333b64f6d1e673d0788df4553ec7bcec7ebadb,2024-12-30T17:15:07.717000
@ -251803,8 +251803,8 @@ CVE-2024-27290,0,0,e6351e36fccf78750391be14824a1927d7d886c71914a08afcab3c0676cfe
CVE-2024-27291,0,0,a17901c720fa960198c0b15c85cdc3abb819356f307d51b08722f19c95d7a841,2024-11-21T09:04:15.700000
CVE-2024-27292,0,0,0985bf46a0f580555a70e94b95028857bb5056e62cd8bc4114703d5e8c1fcfe6,2024-11-21T09:04:15.823000
CVE-2024-27294,0,0,6a08d12fccf8590c3ca84aea628a228836385e94246afbcc476ee85ad0c8233f,2024-11-21T09:04:15.950000
CVE-2024-27295,0,0,60e38510c316500920e803e76acf06f06073392f7916f0308afe2d923b6ae60f,2024-11-21T09:04:16.080000
CVE-2024-27296,0,0,a328b88bcbe71085033fdbf82b578b4fb4ef026c9720719e3d87bb6875f937f9,2024-11-21T09:04:16.197000
CVE-2024-27295,0,1,62b63c8181e69fdf30bf5e9ea58e339ce340673603d1ccec39c0824328ff8081,2025-01-03T15:57:16.817000
CVE-2024-27296,0,1,bc7f110c759f40dab70b917dec22fad4a370b676b33c49ffc610915e7181e1a5,2025-01-03T16:14:03.593000
CVE-2024-27297,0,0,0f08fd661388c47fad3b951d015108d74fd35f9d302b8c4a28976eae1f793c8b,2024-11-21T09:04:16.323000
CVE-2024-27298,0,0,fec5a39b802dd251f2972424edfe42a5be7f6a4ad28011a2651a8684a41ac677,2024-11-21T09:04:16.450000
CVE-2024-27299,0,0,58b851c72842f2e8403fc03c6554402704bf7407ab46f5c07daac470110fd702,2024-11-21T09:04:16.593000
@ -252558,8 +252558,8 @@ CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b1152748
CVE-2024-28235,0,0,cdc7503ef9eef57590419e704ccd1f07cf4d641ea4c724f1352a9dd9c4d7e4be,2024-11-21T09:06:03.783000
CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000
CVE-2024-28237,0,0,569dada874e3f7581ae75d30d37e9e64307f64b42ac921c76927978c59e7d5a6,2024-11-21T09:06:04.057000
CVE-2024-28238,0,0,6e650c4d2b7375c8a7f19bd73b04a31568d3018d7ee0ecbb6f8a5fe2be122555,2024-11-21T09:06:04.200000
CVE-2024-28239,0,0,fd52520639c751eaf3695f415d5a8dfa2e482fd2b9084c68458cf9d0a756a07b,2024-11-21T09:06:04.327000
CVE-2024-28238,0,1,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000
CVE-2024-28239,0,1,cad2389eb8ad3f3fc89b4de0deaf45f55e8417efae42f10b632472f86525ee21,2025-01-03T16:17:32.100000
CVE-2024-2824,0,0,f1bf8222502fdfe6970d6bec7f9f262cc2a23adafeaf181a033793e1be015aa2,2024-11-21T09:10:36.917000
CVE-2024-28240,0,0,1d428d023bd48128545dba37f6f90872853fbc7c073165d7f1b0ca929b5b270b,2024-11-21T09:06:04.470000
CVE-2024-28241,0,0,af70a7a3f1c8ad453a7e703a202ae77314c98f684c8e610de8ea1d5439e1f740,2024-11-21T09:06:04.617000
@ -257315,8 +257315,8 @@ CVE-2024-34703,0,0,5892a518a91e3752956cd9b6773c4db7f64bf352c43d71d21b6eb4d07eca8
CVE-2024-34704,0,0,c4fe39355e2bf7bb9aae1e6e451bfcdbc010f8bb176eebca13f8fa686688ca5a,2024-11-21T09:19:13.967000
CVE-2024-34706,0,0,d0c3791947d477e90819454bb760b27da6fb369a2903ff66dea2de1ef14409aa,2024-11-21T09:19:14.113000
CVE-2024-34707,0,0,8117b5f46b7d87d017dd6d7af57dbcd9505bc5384d9d51272ef358098cb11bbd,2024-11-21T09:19:14.290000
CVE-2024-34708,0,0,cd3a7288cd62e4cc6a1bc94640c2efee00db13f65360a5f0c1d87f912d94d5ce,2024-11-21T09:19:14.427000
CVE-2024-34709,0,0,a81b19cf13c295f8ac7f0d7d64f2aeda1727b93f3121fe3107116480aa43652e,2024-11-21T09:19:14.557000
CVE-2024-34708,0,1,b6103d931f8db49de80394f3b0543e5df8df422ea783f294484fc137bbb2ff8a,2025-01-03T16:19:08.750000
CVE-2024-34709,0,1,4dd1030c3fb3e8cc330f2849a60862b197aa7ed76d8cc6aef7b0c90fdf00b844,2025-01-03T16:20:01.927000
CVE-2024-3471,0,0,983339385380d7e0fe02d202e79ae08c00f0de07eaad5185ebf307859c8224f9,2024-11-21T09:29:40.350000
CVE-2024-34710,0,0,05f4e9fcad99d59c221e6b73e2dd714053cd2db6f98c9291777c51b4e036ca01,2024-11-21T09:19:14.687000
CVE-2024-34712,0,0,cf5b325ebd7ddae90933e1bc277473f4d6cae9ff57c40754d15ebf6965ef4770,2024-11-21T09:19:14.830000
@ -258373,7 +258373,7 @@ CVE-2024-36122,0,0,c2aeae4cdd255ad31a0a91d4f75c2d56ebaea85629207dfb3b6b08cdce139
CVE-2024-36123,0,0,45e0c155f62186c64c46952b4328748c9e767854861074a71eec439ec1778037,2024-11-21T09:21:40.213000
CVE-2024-36124,0,0,b2f1b33ef0b5e93fc83acbb1a2fbe3de1cc6cf9ae5da7ecc83042baff09f6425,2024-11-21T09:21:40.357000
CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000
CVE-2024-36128,0,0,56a86cf8f6e8c0bb29093c33c603e0d166b756f9a18b43276348c2f1af75adbc,2024-11-21T09:21:40.603000
CVE-2024-36128,0,1,64d86fd38de118293b58a480f45da6320c6fd14e64e3f37e62e29a7a0f9d73bd,2025-01-03T16:24:06.250000
CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000
CVE-2024-3613,0,0,8c49e72e9406a68c2f73faacb5db14b0130a295cac3973946f145897d312d626,2024-11-21T09:29:59.410000
CVE-2024-36130,0,0,9bd62fb5b4532bcabdec214127241940c2a7b957ead8f80f15dfd2bb2b6b6945,2024-10-24T20:35:06.217000
@ -261346,8 +261346,8 @@ CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93c
CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000
CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000
CVE-2024-39895,0,0,79b1682b2f59bb18a7dc4840f62c81c284b66c27bf648fc0d51dea0701c04f04,2024-11-21T09:28:31.113000
CVE-2024-39896,0,0,a2699ea7e6d0ebc9a7291dc8637f19cb8c4cd9d16df7555a08584d611fd39290,2024-11-21T09:28:31.230000
CVE-2024-39895,0,1,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed78d,2025-01-03T16:29:09.890000
CVE-2024-39896,0,1,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000
CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000
CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000
CVE-2024-3990,0,0,880b625fb9042da3fa8f1d060a369624b509717179c95e3562e8f2ac6af76111,2024-11-21T09:30:51.623000
@ -262433,6 +262433,7 @@ CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1b
CVE-2024-41776,0,0,645561281eaec0c17a46e435f182a12ad35f1dabfbd0f0ddaced797c0e2c28f4,2024-12-11T03:24:19.023000
CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22e8b,2024-12-11T03:22:46.490000
CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000
CVE-2024-41780,1,1,5cdde677a719d9513a4aa8726b309126fd892ae2e7e61ab0cc3b4e0038c719ce,2025-01-03T15:15:10.367000
CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000
CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000
CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000
@ -265409,8 +265410,8 @@ CVE-2024-45810,0,0,c349eedcf860e10c9363a6ba6fcea9627aa86b33877b6f7be1e36f4038c07
CVE-2024-45811,0,0,1e79f7126b54eaa8fec54f9508c1b481812afbc5e26f24245c6580ec2237a2bc,2024-09-20T12:30:51.220000
CVE-2024-45812,0,0,56a8eda09dbd313ab53b41c9890a71e59f376714797337ccb7daa71061b1b6f0,2024-09-20T12:30:51.220000
CVE-2024-45813,0,0,619ea264c0f4bf8105d5e60e8f340f4fd92c635a69072623ce613a02ad4402cc,2024-09-20T12:30:17.483000
CVE-2024-45815,0,1,ee196dcedd236f2a24a6575a459a3aa300bd5e5292e7f61ddb47fe94cf48cd22,2025-01-03T14:53:06.053000
CVE-2024-45816,0,1,fe9275b3c6dcb1da65c8ac58dbf5fd1b8ab3ee806ae9c3cfcae7aa57e5724fab,2025-01-03T14:52:37.133000
CVE-2024-45815,0,0,ee196dcedd236f2a24a6575a459a3aa300bd5e5292e7f61ddb47fe94cf48cd22,2025-01-03T14:53:06.053000
CVE-2024-45816,0,0,fe9275b3c6dcb1da65c8ac58dbf5fd1b8ab3ee806ae9c3cfcae7aa57e5724fab,2025-01-03T14:52:37.133000
CVE-2024-45817,0,0,04338584e0c7a05d71a1be8997c9492e340dee2b5e7a9715004e750a41578782,2024-11-21T09:38:08.627000
CVE-2024-45818,0,0,5cedc682ef3f5d9445ff8b080f0381ba193ffd5453fd7d81f8a4faf06c5fa624,2024-12-31T19:15:46.603000
CVE-2024-45819,0,0,353a2de2c0eb71c70aa8fbb379f318bdfabc7180522e3350c949c90462cc13ca,2024-12-31T19:15:46.797000
@ -266038,7 +266039,7 @@ CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9e
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
CVE-2024-46972,0,0,0e34573fc20dd373f66d1b8ed3f8cb5899ffa098578c43ffb6dff5bb8ae5f7ed,2024-12-28T05:15:08.497000
CVE-2024-46973,0,0,5b1148979504edc8c412112d196fc9eb688dbc46ad7acc2c72e50589e8a1c99b,2024-12-28T17:15:07.420000
CVE-2024-46976,0,1,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000
CVE-2024-46979,0,0,490db2a65c2e0ed655ace5926e805008e6332771442746f4b78cb7ccfb47c4d8,2024-09-20T12:30:17.483000
@ -266774,7 +266775,7 @@ CVE-2024-47819,0,0,1a39bf32e7c6b82a650954a5b0900e95e1d66c96c1e4e5b23991d0f535e5e
CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000
CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000
CVE-2024-47821,0,0,1ad5cc98b31fb97413a2af4b0b825f5fc2f8d897ba91f4430ae5ce2de36ae65e,2024-10-28T13:58:09.230000
CVE-2024-47822,0,0,1c2a4ddb47d48e476a8d0de9eecc87b2f94c41cf32f5a5cb4227c426f23ec246,2024-10-10T12:56:30.817000
CVE-2024-47822,0,1,112867ef61321fd31839857c8845308750c840249de62ae63bdb48f078a1ee72,2025-01-03T16:31:38.163000
CVE-2024-47823,0,0,336ac507480a6e31bc670e3eea63dd6c12b526e914a6141258cfa4b3d9c44b55,2024-10-10T12:56:30.817000
CVE-2024-47824,0,0,97bf5a27d2397e0f0377b54caf7f6a92074070c7778d6b1d1355aecbed8e7f6b,2024-11-21T17:15:17.650000
CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000
@ -267231,6 +267232,7 @@ CVE-2024-48807,0,0,a763796bbe84709db2996b18e1ed107315b165fb8245eca95257cb100e859
CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000
CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000
CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000
CVE-2024-48814,1,1,a57915293639cd2f22fd5536bfef2016bbd90a552c63261df4228ec0f44a246e,2025-01-03T15:15:10.570000
CVE-2024-4882,0,0,415f96cc42f39d5a62242781ac68568d1b60333c23c5a2a5227f986f314b970a,2024-11-21T09:43:47.037000
CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000
CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000
@ -271239,6 +271241,7 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f
CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000
CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000
CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000
CVE-2024-55078,1,1,46727a306da0a5074789ceec48cc91a7cb0ca2cd0e29ed08f6dbed84909b6912,2025-01-03T15:15:10.697000
CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000
CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000
CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000
@ -271306,6 +271309,7 @@ CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e87
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
CVE-2024-55507,1,1,3410e0d0b3845a0cd40aba36f83a7ea891bcac62004b332bbef076c18ad78726,2025-01-03T16:15:26.027000
CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000
@ -271406,6 +271410,7 @@ CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db8
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
CVE-2024-5591,1,1,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000
CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000
CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
@ -271651,6 +271656,10 @@ CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b1
CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000
CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
CVE-2024-56320,1,1,bae4446e4245d0b06b53d8f40efab1d5a9f50a9a859ae46e9d1241e41ddbb40e,2025-01-03T16:15:26.180000
CVE-2024-56321,1,1,e95cf21efdba501f429d99a45fef811d64afd3a69e9525f6a52b713e8fd6614d,2025-01-03T16:15:26.340000
CVE-2024-56322,1,1,7ccae66170f5f9483185f36964e22a15902abb27bc7b07488fa188b4ebf1414e,2025-01-03T16:15:26.480000
CVE-2024-56324,1,1,106f735083ffc8e3eaea10fa2f5c6734dba5457eeab47e6c2031359baf5b4e42,2025-01-03T16:15:26.643000
CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000
CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000
CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9acc,2024-12-20T20:15:23.987000
@ -271686,6 +271695,7 @@ CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020b
CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000
CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000
CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000
CVE-2024-56408,1,1,f0cdaa44b57f476b1b653c1dc57ebd44815b6ab51d9702e1be87b001e3637937,2025-01-03T16:15:26.773000
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000
CVE-2024-56414,0,0,b4af03f514aa1e91d591d44d03066c9da0634ab7a11c7f36aef3d99223087fa5,2025-01-02T16:15:08.693000
@ -275640,6 +275650,6 @@ CVE-2025-0172,0,0,52d8e9b23781f72db93517107fba3a4dacce2fa0b9c1933202d67ec972e26c
CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000
CVE-2025-0174,0,0,9d66653b35dce22a5e13bcd4d218f8b859e23f7e6e6c85f7fc84bbc507e489f5,2025-01-03T02:15:07.480000
CVE-2025-0175,0,0,ac95c9697b04739d886090fb337a8da173389b48ecd5972d04d24955935380d8,2025-01-03T02:15:07.680000
CVE-2025-0176,0,0,2a22ffa81ac729c3387660dd6a8fe5bfa9ef0ae8a6a4a9c7a653c15c3464b03c,2025-01-03T02:15:07.870000
CVE-2025-0176,0,1,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e68191b,2025-01-03T15:15:11.360000
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000
CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000

Can't render this file because it is too large.