mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-17T23:00:22.094238+00:00
This commit is contained in:
parent
7508f34b15
commit
4bbf161fef
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-1642",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-08-15T00:59:00.110",
|
||||
"lastModified": "2024-11-21T02:25:50.630",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:14:52.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-1769",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-08-15T00:59:01.467",
|
||||
"lastModified": "2024-11-21T02:26:05.500",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:31:06.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2387",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-07-14T22:59:08.103",
|
||||
"lastModified": "2024-11-21T02:27:19.600",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:42:17.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2419",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-07-14T21:59:33.283",
|
||||
"lastModified": "2024-11-21T02:27:21.957",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:39:50.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2424",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-07-14T21:59:35.987",
|
||||
"lastModified": "2024-11-21T02:27:22.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:42:06.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2425",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-07-14T21:59:36.813",
|
||||
"lastModified": "2024-11-21T02:27:22.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:42:13.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2502",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-08-19T10:59:00.090",
|
||||
"lastModified": "2024-11-21T02:27:30.230",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:36:28.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2545",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-09-09T00:59:52.190",
|
||||
"lastModified": "2024-11-21T02:27:34.900",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:36:34.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2546",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-09-09T00:59:53.207",
|
||||
"lastModified": "2024-11-21T02:27:35.020",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T21:36:42.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40633",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-02T23:15:10.090",
|
||||
"lastModified": "2024-11-21T07:21:45.110",
|
||||
"lastModified": "2025-01-17T22:15:26.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41696",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-21T23:15:12.167",
|
||||
"lastModified": "2024-11-21T07:23:40.160",
|
||||
"lastModified": "2025-01-17T22:15:26.413",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43512",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-21T23:15:12.277",
|
||||
"lastModified": "2024-11-21T07:26:40.087",
|
||||
"lastModified": "2025-01-17T22:15:26.590",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45121",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-21T23:15:12.333",
|
||||
"lastModified": "2024-11-21T07:28:48.153",
|
||||
"lastModified": "2025-01-17T22:15:26.757",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45468",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-21T23:15:12.400",
|
||||
"lastModified": "2024-11-21T07:29:18.210",
|
||||
"lastModified": "2025-01-17T22:15:26.927",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46300",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-21T23:15:12.563",
|
||||
"lastModified": "2024-11-21T07:30:20.273",
|
||||
"lastModified": "2025-01-17T22:15:27.093",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46732",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-01-18T00:15:12.357",
|
||||
"lastModified": "2024-11-21T07:30:59.237",
|
||||
"lastModified": "2025-01-17T22:15:27.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,9 +36,41 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0621",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-09T22:15:51.597",
|
||||
"lastModified": "2024-11-21T07:37:30.100",
|
||||
"lastModified": "2025-01-17T22:15:27.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0622",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-09T22:15:51.667",
|
||||
"lastModified": "2024-11-21T07:37:30.190",
|
||||
"lastModified": "2025-01-17T22:15:27.613",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0623",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-09T22:15:51.737",
|
||||
"lastModified": "2024-11-21T07:37:30.280",
|
||||
"lastModified": "2025-01-17T22:15:27.790",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25953",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.317",
|
||||
"lastModified": "2024-11-21T07:50:30.607",
|
||||
"lastModified": "2025-01-17T22:15:27.970",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31752",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T20:15:09.993",
|
||||
"lastModified": "2024-11-21T08:02:14.377",
|
||||
"lastModified": "2025-01-17T21:15:08.807",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
60
CVE-2023/CVE-2023-507xx/CVE-2023-50738.json
Normal file
60
CVE-2023/CVE-2023-507xx/CVE-2023-50738.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-50738",
|
||||
"sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853",
|
||||
"published": "2025-01-17T21:15:09.660",
|
||||
"lastModified": "2025-01-17T22:15:28.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A\u00a0new feature to prevent Firmware downgrades was recently added to some Lexmark products. A method to \noverride this downgrade protection has been identified."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "7bc73191-a2b6-4c63-9918-753964601853",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "7bc73191-a2b6-4c63-9918-753964601853",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-354"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1328"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
|
||||
"source": "7bc73191-a2b6-4c63-9918-753964601853"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,43 @@
|
||||
"id": "CVE-2024-12613",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-16T10:15:07.633",
|
||||
"lastModified": "2025-01-16T10:15:07.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T22:17:16.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb->prefix value in several AJAX fuctions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " El complemento Passwords Manager para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del valor $wpdb->prefix en varias funciones AJAX en todas las versiones hasta la 1.4.8 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -47,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hirewebxperts:passwords_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.1",
|
||||
"matchCriteriaId": "C097552E-4BE1-42EC-BFA6-B0CA75E11B5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dec38992-a69f-4ccd-a23b-4dd1639897c3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2024-12614",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-16T10:15:08.023",
|
||||
"lastModified": "2025-01-16T10:15:08.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T22:17:15.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Passwords Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pms_save_setting' and 'post_new_pass' AJAX actions in all versions up to, and including, 1.4.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins settings and add passwords."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Passwords Manager para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en las acciones AJAX 'pms_save_setting' y 'post_new_pass' en todas las versiones hasta la 1.4.8 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n de los complementos y agreguen contrase\u00f1as."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -32,33 +36,90 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hirewebxperts:passwords_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.1",
|
||||
"matchCriteriaId": "C097552E-4BE1-42EC-BFA6-B0CA75E11B5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-settings-ajax-action.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/898c5554-fd02-47a2-a1f9-1c488cfab57e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,43 @@
|
||||
"id": "CVE-2024-12615",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-16T10:15:08.380",
|
||||
"lastModified": "2025-01-16T10:15:08.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T22:17:11.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb->prefix value in several AJAX actions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " El complemento Passwords Manager para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del valor $wpdb->prefix en varias acciones AJAX en todas las versiones hasta la 1.4.8 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -47,22 +71,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hirewebxperts:passwords_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.1",
|
||||
"matchCriteriaId": "C097552E-4BE1-42EC-BFA6-B0CA75E11B5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/admin-page/addon/csv-export/index.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-categories-ajax-action.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8397d5-6637-4faa-be1f-9cf52c25be9b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3907",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-17T11:15:12.160",
|
||||
"lastModified": "2024-11-21T09:30:40.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T21:21:37.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,40 +94,111 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:ac500_firmware:2.0.1.9\\(1307\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F0EEFAB-B3B0-4C10-A712-7A35F5FD076E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64192A8B-CC65-44EC-942B-CC16AADF0D69"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261143",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261143",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.313802",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261143",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261143",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.313802",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3908",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-17T12:15:07.633",
|
||||
"lastModified": "2024-11-21T09:30:40.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T21:16:07.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:ac500_firmware:2.0.1.9\\(1307\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F0EEFAB-B3B0-4C10-A712-7A35F5FD076E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64192A8B-CC65-44EC-942B-CC16AADF0D69"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261144",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261144",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.313803",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261144",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.261144",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.313803",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-4350",
|
||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"published": "2024-08-12T13:38:36.460",
|
||||
"lastModified": "2024-08-30T18:18:37.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-01-17T22:15:28.360",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, m3dium for\u00a0reporting."
|
||||
"value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v4 score of 5.1 with vector https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N\u00a0Thanks, m3dium for\u00a0reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -22,11 +22,11 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-4353",
|
||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"published": "2024-08-01T19:15:52.313",
|
||||
"lastModified": "2024-12-16T19:08:05.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-01-17T22:15:28.510",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in the generate dashboard board\ninstance functionality. The Name input field does not check the input sufficiently letting a rogue administrator have the capability to inject malicious\nJavaScript code. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4 score of 1.8 with a vector of CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N\u00a0Concrete versions below 9 are not affected by this vulnerability. Thanks fhAnso for reporting."
|
||||
"value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in the generate dashboard board\ninstance functionality. The Name input field does not check the input sufficiently letting a rogue administrator have the capability to inject malicious\nJavaScript code. The Concrete CMS security team gave this vulnerability\u00a0a CVSS v4 score of 4.6 with a vector of CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Concrete versions below 9 are not affected by this vulnerability.Thanks fhAnso for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -22,11 +22,11 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.8,
|
||||
"baseSeverity": "LOW",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-52870",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-17T20:15:28.527",
|
||||
"lastModified": "2025-01-17T20:15:28.527",
|
||||
"lastModified": "2025-01-17T22:15:28.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Teradata Vantage Editor 1.0.1 is mostly intended for SQL database access and docs.teradata.com access, but provides unintended functionality (including Chromium Developer Tools) that can result in a client user accessing arbitrary remote websites."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-909"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chrismanson.com/CVE/cve-2024-52870.html",
|
||||
|
@ -2,20 +2,79 @@
|
||||
"id": "CVE-2024-53407",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T23:15:09.263",
|
||||
"lastModified": "2025-01-15T23:15:09.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T22:51:40.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Phiewer 4.1.0, a dylib injection leads to Command Execution which allow attackers to inject dylib file potentially leading to remote control and unauthorized access to sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " En Phiewer 4.1.0, una inyecci\u00f3n de dylib conduce a la ejecuci\u00f3n de comandos que permite a los atacantes inyectar un archivo dylib, lo que potencialmente conduce al control remoto y al acceso no autorizado a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phiewer:phiewer:4.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1109E4C8-1611-41F2-840E-E1215BE99E15"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SyFi/CVE-2024-53407",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,92 @@
|
||||
"id": "CVE-2024-55503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T23:15:09.390",
|
||||
"lastModified": "2025-01-15T23:15:09.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T22:51:48.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in termius before v.9.9.0 allows a local attacker to execute arbitrary code via a crafted script to the DYLD_INSERT_LIBRARIES component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Un problema en termius anterior a v.9.9.0 permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el componente DYLD_INSERT_LIBRARIES."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:termius:termius:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.9.0",
|
||||
"matchCriteriaId": "DECF23CD-3363-4741-803C-3FCB85514E5B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SyFi/CVE-2024-55503",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57030",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-17T20:15:28.667",
|
||||
"lastModified": "2025-01-17T20:15:28.667",
|
||||
"lastModified": "2025-01-17T21:15:09.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Wegia < 3.2.0 is vulnerable to Cross Site Scripting (XSS) in /geral/documentos_funcionario.php via the id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57030",
|
||||
|
25
CVE-2024/CVE-2024-570xx/CVE-2024-57033.json
Normal file
25
CVE-2024/CVE-2024-570xx/CVE-2024-57033.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57033",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-17T21:15:09.980",
|
||||
"lastModified": "2025-01-17T21:15:09.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA < 3.2.0 is vulnerable to Cross Site Scripting (XSS) via the dados_addInfo parameter of documentos_funcionario.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57033",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wegia.org/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-570xx/CVE-2024-57035.json
Normal file
25
CVE-2024/CVE-2024-570xx/CVE-2024-57035.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57035",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-17T21:15:10.100",
|
||||
"lastModified": "2025-01-17T21:15:10.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nilsonLazarin/WeGIA/issues/827",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57035",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-572xx/CVE-2024-57252.json
Normal file
60
CVE-2024/CVE-2024-572xx/CVE-2024-57252.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-57252",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-17T21:15:10.217",
|
||||
"lastModified": "2025-01-17T22:15:28.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OtCMS <=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/J-0k3r/CVE-2024-57252",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/J-0k3r/some/blob/main/ssrf.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57372",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-17T20:15:29.447",
|
||||
"lastModified": "2025-01-17T20:15:29.447",
|
||||
"lastModified": "2025-01-17T22:15:28.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Cross Site Scripting vulnerability in InformationPush master version allows a remote attacker to obtain sensitive information via the title, time and msg parameters"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kaixin1995",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-7512",
|
||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"published": "2024-08-12T13:38:43.590",
|
||||
"lastModified": "2024-08-30T18:19:01.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-01-17T21:15:10.317",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in Board instances. A rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 1.8 with vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Versions below 9 are not affected. Thanks, m3dium for reporting."
|
||||
"value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in Board instances. A rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.6 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Versions below 9 are not affected. Thanks, m3dium for reporting. (CNA updated AC score to L based on CVSS 4.0 documentation)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -22,11 +22,11 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.8,
|
||||
"baseSeverity": "LOW",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-8291",
|
||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"published": "2024-09-25T01:15:46.193",
|
||||
"lastModified": "2024-09-30T15:59:11.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-01-17T22:15:29.107",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color.\u00a0 A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N \u00a0Thanks,\u00a0 Alexey Solovyev for reporting."
|
||||
"value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color.\u00a0 A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 5.1 with vector https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N.\u00a0Thanks,\u00a0 Alexey Solovyev for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -22,11 +22,11 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-0533",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T18:15:31.577",
|
||||
"lastModified": "2025-01-17T18:15:31.577",
|
||||
"lastModified": "2025-01-17T21:15:10.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.479119",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/onupset/CVE/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-0534",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T19:15:28.777",
|
||||
"lastModified": "2025-01-17T19:15:28.777",
|
||||
"lastModified": "2025-01-17T21:15:10.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.479128",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/onupset/CVE/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-05xx/CVE-2025-0538.json
Normal file
145
CVE-2025/CVE-2025-05xx/CVE-2025-0538.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-0538",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T21:15:10.847",
|
||||
"lastModified": "2025-01-17T21:15:10.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in code-projects Tourism Management System 1.0. Affected is an unknown function of the file /admin/manage-pages.php. The manipulation of the argument pgedetails leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aaryan-11-x/My-CVEs/blob/main/Stored%20XSS%20-%20Code-Projects%20Tourism%20Management%20System%201.0.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.292422",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.292422",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.479895",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-05xx/CVE-2025-0540.json
Normal file
145
CVE-2025/CVE-2025-05xx/CVE-2025-0540.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-0540",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T21:15:11.037",
|
||||
"lastModified": "2025-01-17T21:15:11.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/magic2353112890/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.292432",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.292432",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.480063",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-05xx/CVE-2025-0541.json
Normal file
141
CVE-2025/CVE-2025-05xx/CVE-2025-0541.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-0541",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T22:15:29.337",
|
||||
"lastModified": "2025-01-17T22:15:29.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nbeisss/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.292433",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.292433",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.480220",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21399",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-01-17T20:15:46.117",
|
||||
"lastModified": "2025-01-17T20:15:46.117",
|
||||
"lastModified": "2025-01-17T21:15:11.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-273"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399",
|
||||
|
82
CVE-2025/CVE-2025-216xx/CVE-2025-21606.json
Normal file
82
CVE-2025/CVE-2025-216xx/CVE-2025-21606.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-21606",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T21:15:11.420",
|
||||
"lastModified": "2025-01-17T21:15:11.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user\u2019s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/exelban/stats/commit/c10759f7a186efdd82ddd818dae2ac1f853691fc",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/exelban/stats/security/advisories/GHSA-qwhf-px96-7f6v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-230xx/CVE-2025-23039.json
Normal file
56
CVE-2025/CVE-2025-230xx/CVE-2025-23039.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23039",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T21:15:11.560",
|
||||
"lastModified": "2025-01-17T21:15:11.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Caido is a web security auditing toolkit. A Cross-Site Scripting (XSS) vulnerability was identified in Caido v0.45.0 due to improper sanitization in the URL decoding tooltip of HTTP request and response editors. This issue could allow an attacker to execute arbitrary scripts, potentially leading to the theft of sensitive information. This issue has been addressed in version 0.45.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caido/caido/security/advisories/GHSA-3mfw-fhfp-mgrv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-232xx/CVE-2025-23202.json
Normal file
82
CVE-2025/CVE-2025-232xx/CVE-2025-23202.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-23202",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T21:15:11.713",
|
||||
"lastModified": "2025-01-17T21:15:11.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/devycreates/Bible-Module/commit/5b783855fc3285be2da8639c97ac37af28f8c55a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/devycreates/Bible-Module/security/advisories/GHSA-cm7w-99v2-prrq",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-232xx/CVE-2025-23205.json
Normal file
90
CVE-2025/CVE-2025-232xx/CVE-2025-23205.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-23205",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T21:15:11.850",
|
||||
"lastModified": "2025-01-17T21:15:11.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "nbgrader is a system for assigning and grading notebooks. Enabling frame-ancestors: 'self' grants any JupyterHub user the ability to extract formgrader content by sending malicious links to users with access to formgrader, at least when using the default JupyterHub configuration of `enable_subdomains = False`. #1915 disables a protection which would allow user Alice to craft a page embedding formgrader in an IFrame. If Bob visits that page, his credentials will be sent and the formgrader page loaded. Because Alice's page is on the same Origin as the formgrader iframe, Javasript on Alice's page has _full access_ to the contents of the page served by formgrader using Bob's credentials. This issue has been addressed in release 0.9.5 and all users are advised to upgrade. Users unable to upgrade may disable `frame-ancestors: self`, or enable per-user and per-service subdomains with `JupyterHub.enable_subdomains = True` (then even if embedding in an IFrame is allowed, the host page does not have access to the contents of the frame)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jupyter/nbgrader/commit/73e137511ac1dc02e95790d4fd6d4d88dab42325",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jupyter/nbgrader/pull/1915",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jupyter/nbgrader/security/advisories/GHSA-fcr8-4r9f-r66m",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jupyterhub.readthedocs.io/en/stable/explanation/websecurity.html#:~:text=frame-ancestors",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-232xx/CVE-2025-23206.json
Normal file
86
CVE-2025/CVE-2025-232xx/CVE-2025-23206.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-23206",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T21:15:12.003",
|
||||
"lastModified": "2025-01-17T21:15:12.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current `tls.connect` method will always set `rejectUnauthorized: false` which is a potential security concern. CDK should follow the best practice and set `rejectUnauthorized: true`. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in `cdk.context.json` or `cdk.json`. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts#L34",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aws/aws-cdk/issues/32920",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aws/aws-cdk/security/advisories/GHSA-v4mq-x674-ff73",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-232xx/CVE-2025-23207.json
Normal file
60
CVE-2025/CVE-2025-232xx/CVE-2025-23207.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23207",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T22:15:29.523",
|
||||
"lastModified": "2025-01-17T22:15:29.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "KaTeX is a fast, easy-to-use JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions with `renderToString` could encounter malicious input using `\\htmlData` that runs arbitrary JavaScript, or generate invalid HTML. Users are advised to upgrade to KaTeX v0.16.21 to remove this vulnerability. Users unable to upgrade should avoid use of or turn off the `trust` option, or set it to forbid `\\htmlData` commands, forbid inputs containing the substring `\"\\\\htmlData\"` and sanitize HTML output from KaTeX."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KaTeX/KaTeX/commit/ff289955e81aab89086eef09254cbf88573d415c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/KaTeX/KaTeX/security/advisories/GHSA-cg87-wmx4-v546",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
88
README.md
88
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-17T21:00:27.243000+00:00
|
||||
2025-01-17T23:00:22.094238+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-17T21:00:00.330000+00:00
|
||||
2025-01-17T22:51:48.330000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,59 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
277985
|
||||
277998
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-13026](CVE-2024/CVE-2024-130xx/CVE-2024-13026.json) (`2025-01-17T20:15:27.600`)
|
||||
- [CVE-2024-52870](CVE-2024/CVE-2024-528xx/CVE-2024-52870.json) (`2025-01-17T20:15:28.527`)
|
||||
- [CVE-2024-57030](CVE-2024/CVE-2024-570xx/CVE-2024-57030.json) (`2025-01-17T20:15:28.667`)
|
||||
- [CVE-2024-57031](CVE-2024/CVE-2024-570xx/CVE-2024-57031.json) (`2025-01-17T20:15:28.790`)
|
||||
- [CVE-2024-57032](CVE-2024/CVE-2024-570xx/CVE-2024-57032.json) (`2025-01-17T20:15:28.910`)
|
||||
- [CVE-2024-57034](CVE-2024/CVE-2024-570xx/CVE-2024-57034.json) (`2025-01-17T20:15:29.020`)
|
||||
- [CVE-2024-57369](CVE-2024/CVE-2024-573xx/CVE-2024-57369.json) (`2025-01-17T20:15:29.140`)
|
||||
- [CVE-2024-57370](CVE-2024/CVE-2024-573xx/CVE-2024-57370.json) (`2025-01-17T20:15:29.303`)
|
||||
- [CVE-2024-57372](CVE-2024/CVE-2024-573xx/CVE-2024-57372.json) (`2025-01-17T20:15:29.447`)
|
||||
- [CVE-2025-0534](CVE-2025/CVE-2025-05xx/CVE-2025-0534.json) (`2025-01-17T19:15:28.777`)
|
||||
- [CVE-2025-0535](CVE-2025/CVE-2025-05xx/CVE-2025-0535.json) (`2025-01-17T19:15:28.990`)
|
||||
- [CVE-2025-0536](CVE-2025/CVE-2025-05xx/CVE-2025-0536.json) (`2025-01-17T20:15:29.583`)
|
||||
- [CVE-2025-0537](CVE-2025/CVE-2025-05xx/CVE-2025-0537.json) (`2025-01-17T20:15:29.767`)
|
||||
- [CVE-2025-21185](CVE-2025/CVE-2025-211xx/CVE-2025-21185.json) (`2025-01-17T20:15:30.227`)
|
||||
- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-01-17T20:15:46.117`)
|
||||
- [CVE-2023-50738](CVE-2023/CVE-2023-507xx/CVE-2023-50738.json) (`2025-01-17T21:15:09.660`)
|
||||
- [CVE-2024-57033](CVE-2024/CVE-2024-570xx/CVE-2024-57033.json) (`2025-01-17T21:15:09.980`)
|
||||
- [CVE-2024-57035](CVE-2024/CVE-2024-570xx/CVE-2024-57035.json) (`2025-01-17T21:15:10.100`)
|
||||
- [CVE-2024-57252](CVE-2024/CVE-2024-572xx/CVE-2024-57252.json) (`2025-01-17T21:15:10.217`)
|
||||
- [CVE-2025-0538](CVE-2025/CVE-2025-05xx/CVE-2025-0538.json) (`2025-01-17T21:15:10.847`)
|
||||
- [CVE-2025-0540](CVE-2025/CVE-2025-05xx/CVE-2025-0540.json) (`2025-01-17T21:15:11.037`)
|
||||
- [CVE-2025-0541](CVE-2025/CVE-2025-05xx/CVE-2025-0541.json) (`2025-01-17T22:15:29.337`)
|
||||
- [CVE-2025-21606](CVE-2025/CVE-2025-216xx/CVE-2025-21606.json) (`2025-01-17T21:15:11.420`)
|
||||
- [CVE-2025-23039](CVE-2025/CVE-2025-230xx/CVE-2025-23039.json) (`2025-01-17T21:15:11.560`)
|
||||
- [CVE-2025-23202](CVE-2025/CVE-2025-232xx/CVE-2025-23202.json) (`2025-01-17T21:15:11.713`)
|
||||
- [CVE-2025-23205](CVE-2025/CVE-2025-232xx/CVE-2025-23205.json) (`2025-01-17T21:15:11.850`)
|
||||
- [CVE-2025-23206](CVE-2025/CVE-2025-232xx/CVE-2025-23206.json) (`2025-01-17T21:15:12.003`)
|
||||
- [CVE-2025-23207](CVE-2025/CVE-2025-232xx/CVE-2025-23207.json) (`2025-01-17T22:15:29.523`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `78`
|
||||
Recently modified CVEs: `38`
|
||||
|
||||
- [CVE-2024-29415](CVE-2024/CVE-2024-294xx/CVE-2024-29415.json) (`2025-01-17T20:15:27.950`)
|
||||
- [CVE-2024-31343](CVE-2024/CVE-2024-313xx/CVE-2024-31343.json) (`2025-01-17T19:32:04.977`)
|
||||
- [CVE-2024-3136](CVE-2024/CVE-2024-31xx/CVE-2024-3136.json) (`2025-01-17T19:21:25.430`)
|
||||
- [CVE-2024-32118](CVE-2024/CVE-2024-321xx/CVE-2024-32118.json) (`2025-01-17T20:42:17.053`)
|
||||
- [CVE-2024-33510](CVE-2024/CVE-2024-335xx/CVE-2024-33510.json) (`2025-01-17T20:35:31.247`)
|
||||
- [CVE-2024-35274](CVE-2024/CVE-2024-352xx/CVE-2024-35274.json) (`2025-01-17T20:29:43.327`)
|
||||
- [CVE-2024-38807](CVE-2024/CVE-2024-388xx/CVE-2024-38807.json) (`2025-01-17T20:15:28.130`)
|
||||
- [CVE-2024-39908](CVE-2024/CVE-2024-399xx/CVE-2024-39908.json) (`2025-01-17T20:15:28.250`)
|
||||
- [CVE-2024-41946](CVE-2024/CVE-2024-419xx/CVE-2024-41946.json) (`2025-01-17T20:15:28.380`)
|
||||
- [CVE-2024-47906](CVE-2024/CVE-2024-479xx/CVE-2024-47906.json) (`2025-01-17T20:27:14.100`)
|
||||
- [CVE-2024-7571](CVE-2024/CVE-2024-75xx/CVE-2024-7571.json) (`2025-01-17T19:45:37.847`)
|
||||
- [CVE-2024-8495](CVE-2024/CVE-2024-84xx/CVE-2024-8495.json) (`2025-01-17T20:04:56.517`)
|
||||
- [CVE-2024-8539](CVE-2024/CVE-2024-85xx/CVE-2024-8539.json) (`2025-01-17T20:02:50.283`)
|
||||
- [CVE-2024-9420](CVE-2024/CVE-2024-94xx/CVE-2024-9420.json) (`2025-01-17T20:29:36.007`)
|
||||
- [CVE-2024-9842](CVE-2024/CVE-2024-98xx/CVE-2024-9842.json) (`2025-01-17T19:55:48.957`)
|
||||
- [CVE-2024-9843](CVE-2024/CVE-2024-98xx/CVE-2024-9843.json) (`2025-01-17T20:00:21.843`)
|
||||
- [CVE-2024-9844](CVE-2024/CVE-2024-98xx/CVE-2024-9844.json) (`2025-01-17T19:37:13.830`)
|
||||
- [CVE-2025-21128](CVE-2025/CVE-2025-211xx/CVE-2025-21128.json) (`2025-01-17T20:37:35.437`)
|
||||
- [CVE-2025-21129](CVE-2025/CVE-2025-211xx/CVE-2025-21129.json) (`2025-01-17T20:37:33.603`)
|
||||
- [CVE-2025-21130](CVE-2025/CVE-2025-211xx/CVE-2025-21130.json) (`2025-01-17T20:37:32.137`)
|
||||
- [CVE-2025-21131](CVE-2025/CVE-2025-211xx/CVE-2025-21131.json) (`2025-01-17T20:37:30.750`)
|
||||
- [CVE-2025-21132](CVE-2025/CVE-2025-211xx/CVE-2025-21132.json) (`2025-01-17T20:37:29.347`)
|
||||
- [CVE-2025-21360](CVE-2025/CVE-2025-213xx/CVE-2025-21360.json) (`2025-01-17T20:40:22.527`)
|
||||
- [CVE-2025-21361](CVE-2025/CVE-2025-213xx/CVE-2025-21361.json) (`2025-01-17T20:39:49.017`)
|
||||
- [CVE-2025-21362](CVE-2025/CVE-2025-213xx/CVE-2025-21362.json) (`2025-01-17T20:38:30.560`)
|
||||
- [CVE-2022-45468](CVE-2022/CVE-2022-454xx/CVE-2022-45468.json) (`2025-01-17T22:15:26.927`)
|
||||
- [CVE-2022-46300](CVE-2022/CVE-2022-463xx/CVE-2022-46300.json) (`2025-01-17T22:15:27.093`)
|
||||
- [CVE-2022-46732](CVE-2022/CVE-2022-467xx/CVE-2022-46732.json) (`2025-01-17T22:15:27.260`)
|
||||
- [CVE-2023-0621](CVE-2023/CVE-2023-06xx/CVE-2023-0621.json) (`2025-01-17T22:15:27.440`)
|
||||
- [CVE-2023-0622](CVE-2023/CVE-2023-06xx/CVE-2023-0622.json) (`2025-01-17T22:15:27.613`)
|
||||
- [CVE-2023-0623](CVE-2023/CVE-2023-06xx/CVE-2023-0623.json) (`2025-01-17T22:15:27.790`)
|
||||
- [CVE-2023-25953](CVE-2023/CVE-2023-259xx/CVE-2023-25953.json) (`2025-01-17T22:15:27.970`)
|
||||
- [CVE-2023-31752](CVE-2023/CVE-2023-317xx/CVE-2023-31752.json) (`2025-01-17T21:15:08.807`)
|
||||
- [CVE-2024-12613](CVE-2024/CVE-2024-126xx/CVE-2024-12613.json) (`2025-01-17T22:17:16.967`)
|
||||
- [CVE-2024-12614](CVE-2024/CVE-2024-126xx/CVE-2024-12614.json) (`2025-01-17T22:17:15.190`)
|
||||
- [CVE-2024-12615](CVE-2024/CVE-2024-126xx/CVE-2024-12615.json) (`2025-01-17T22:17:11.650`)
|
||||
- [CVE-2024-3907](CVE-2024/CVE-2024-39xx/CVE-2024-3907.json) (`2025-01-17T21:21:37.327`)
|
||||
- [CVE-2024-3908](CVE-2024/CVE-2024-39xx/CVE-2024-3908.json) (`2025-01-17T21:16:07.327`)
|
||||
- [CVE-2024-4350](CVE-2024/CVE-2024-43xx/CVE-2024-4350.json) (`2025-01-17T22:15:28.360`)
|
||||
- [CVE-2024-4353](CVE-2024/CVE-2024-43xx/CVE-2024-4353.json) (`2025-01-17T22:15:28.510`)
|
||||
- [CVE-2024-52870](CVE-2024/CVE-2024-528xx/CVE-2024-52870.json) (`2025-01-17T22:15:28.663`)
|
||||
- [CVE-2024-53407](CVE-2024/CVE-2024-534xx/CVE-2024-53407.json) (`2025-01-17T22:51:40.307`)
|
||||
- [CVE-2024-55503](CVE-2024/CVE-2024-555xx/CVE-2024-55503.json) (`2025-01-17T22:51:48.330`)
|
||||
- [CVE-2024-57030](CVE-2024/CVE-2024-570xx/CVE-2024-57030.json) (`2025-01-17T21:15:09.823`)
|
||||
- [CVE-2024-57372](CVE-2024/CVE-2024-573xx/CVE-2024-57372.json) (`2025-01-17T22:15:28.957`)
|
||||
- [CVE-2024-7512](CVE-2024/CVE-2024-75xx/CVE-2024-7512.json) (`2025-01-17T21:15:10.317`)
|
||||
- [CVE-2024-8291](CVE-2024/CVE-2024-82xx/CVE-2024-8291.json) (`2025-01-17T22:15:29.107`)
|
||||
- [CVE-2025-0533](CVE-2025/CVE-2025-05xx/CVE-2025-0533.json) (`2025-01-17T21:15:10.487`)
|
||||
- [CVE-2025-0534](CVE-2025/CVE-2025-05xx/CVE-2025-0534.json) (`2025-01-17T21:15:10.650`)
|
||||
- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-01-17T21:15:11.283`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
265
_state.csv
265
_state.csv
@ -75129,7 +75129,7 @@ CVE-2015-1638,0,0,daef968245a5d8fd79d931ce1ffd08b3f2e1d88478095e206dc2c85022015b
|
||||
CVE-2015-1639,0,0,34505230ce09a0015f32d75857dbd4437155d53d3a8d301d593db632ff0e6063,2024-11-21T02:25:50.263000
|
||||
CVE-2015-1640,0,0,801ae17082793204d46bf77801ffd5de8c9c829afdb3530ebef3b0a19f191653,2024-11-21T02:25:50.390000
|
||||
CVE-2015-1641,0,0,913c22d7558bea0c75255e58334088a59285fdd02f3ed9c077433b0f9afc207b,2024-11-21T02:25:50.510000
|
||||
CVE-2015-1642,0,0,a3421e4cd449d71f7c3a1c75a980c15fe55af2cf8fbe29700f0c83431d2aa42b,2024-11-21T02:25:50.630000
|
||||
CVE-2015-1642,0,1,b5d348ae611a85e11931653f7b298a9616d66bc5043315babd122859ce2b9c21,2025-01-17T21:14:52.883000
|
||||
CVE-2015-1643,0,0,35965b865ae4a0fe7d80f230f483ebd1ed4164b7f19a9ddda1fca4ecbbcd5c1a,2024-11-21T02:25:50.753000
|
||||
CVE-2015-1644,0,0,a460657ddeb2cebbe863b19e4913930868d68bdff8abc83394f5f8a8c15788d1,2024-11-21T02:25:50.873000
|
||||
CVE-2015-1645,0,0,8cb7107b2c6b144164ea8cd42a107617cf9ba3326c21773f955c39867f026fb0,2024-11-21T02:25:51
|
||||
@ -75256,7 +75256,7 @@ CVE-2015-1765,0,0,0d81fef387f6776b306a0f185e451445a82c0c192c017cbc6dafd4e9c6a26d
|
||||
CVE-2015-1766,0,0,3f00a70e44f7fa95c26bd5cb8bcf5b39076875377af9edefc257bc0d9d230c4e,2024-11-21T02:26:05.143000
|
||||
CVE-2015-1767,0,0,292b1f56789470d2933eef9d582c7832d8d18f0b3d4658197d1dc427c079f87e,2024-11-21T02:26:05.267000
|
||||
CVE-2015-1768,0,0,b2fc6680ee97b1d0858e4bb59d759f45ec5d75cf1c3839c62cbe9f26046551ab,2024-11-21T02:26:05.380000
|
||||
CVE-2015-1769,0,0,db98a0ac6833ae3a48d3fd41229998e7725ce44ee22cf071cbe89684ba60e316,2024-11-21T02:26:05.500000
|
||||
CVE-2015-1769,0,1,ea69303f8701c35ee0a2a8320ac522e3920ce265bfacdbf4b362a7bb2f942bc1,2025-01-17T21:31:06.387000
|
||||
CVE-2015-1770,0,0,ac4dd844443bdb2d660ee56ae351b4e74e4c7f4d429bf19d57edadd471942ebc,2024-11-21T02:26:05.623000
|
||||
CVE-2015-1771,0,0,a44961f133acd00d46d9847eec99f2955a76b6125ced31ae1d283f363776ed0c,2024-11-21T02:26:05.747000
|
||||
CVE-2015-1772,0,0,26826297cb83f5add3d9515dbab903d2b96da4af06792c133c24c3386ce750e3,2024-11-21T02:26:05.867000
|
||||
@ -75814,7 +75814,7 @@ CVE-2015-2383,0,0,a9938b2adce7669516c2e0d39317dc0111ddc799392a2288a121b4c97bcb18
|
||||
CVE-2015-2384,0,0,c005a1114405680728845c33908cb8345dd0509075de61a36d774e48ef902957,2024-11-21T02:27:19.390000
|
||||
CVE-2015-2385,0,0,c6474a36cdfd195c898272ea95d2f5984e4a286c610bacf18f5bb29cced83610,2024-11-21T02:27:19.483000
|
||||
CVE-2015-2386,0,0,bae2348f361a88c43c8cd62e8685d637aa0a62bf3183e8e3997963f368278b04,2023-11-07T02:25:14.977000
|
||||
CVE-2015-2387,0,0,389e8a7ce620f6dbbe4e9b25d521022b0f7fb140b1c6d5cc08a2875f6b659938,2024-11-21T02:27:19.600000
|
||||
CVE-2015-2387,0,1,3edbc4ef0ef44f7ced40337f34b294221f1ab02727159f140feaa776febb011e,2025-01-17T21:42:17.533000
|
||||
CVE-2015-2388,0,0,a38382093b6e2e011f3b4300de3903f63f6f757652b136252d7fe5ae97e976fd,2024-11-21T02:27:19.713000
|
||||
CVE-2015-2389,0,0,f256a84c6f2df57029f53974a3c1ba2ca8bd4beb8ed7e8acc6172d03c5fdada2,2024-11-21T02:27:19.817000
|
||||
CVE-2015-2390,0,0,bffb4fcc4a36dbabee27b5da6eedec72cd11c7d3ee37c8899d62eec144fd1f40,2024-11-21T02:27:19.920000
|
||||
@ -75846,14 +75846,14 @@ CVE-2015-2415,0,0,7512055095e6c9148a8e1d7f9bfe0464477371b6d2bb084a1f6ac532f8805f
|
||||
CVE-2015-2416,0,0,0b31ed452077b4b8d973eaf2946d322fefbc298dc4d1c78999b738ba9c906663,2024-11-21T02:27:21.647000
|
||||
CVE-2015-2417,0,0,588f596db008224ab03afbd73ad0659a1c1a976d9e9aaa4fd43b3b34bc7a5615,2024-11-21T02:27:21.753000
|
||||
CVE-2015-2418,0,0,dc1aee9b99bd6f9b84cd1406c22e3a310d0fb56f22106fc826eaf0a031c759bc,2024-11-21T02:27:21.853000
|
||||
CVE-2015-2419,0,0,8daafa99cb2294f97f995a91c888b231ec53bfb07d2e408d956b5f9b70b3e8e5,2024-11-21T02:27:21.957000
|
||||
CVE-2015-2419,0,1,bd517559cfd784a354ab85b9e21fe6b0bba68af89e3e71d34b33ff83b13bd0c6,2025-01-17T21:39:50.700000
|
||||
CVE-2015-2420,0,0,6cd9292688b9c4caad3ef00795f216de2ea230a683201d7a9b3ca0838bbc87d0,2024-11-21T02:27:22.063000
|
||||
CVE-2015-2421,0,0,527a453b8446f5bfa81f7d5c60d49a63a5df609d371d6eafcdba71c7d77fc1f5,2024-11-21T02:27:22.170000
|
||||
CVE-2015-2422,0,0,1c9f4482bc96767226f4aa227fa39b9799d0cca0ea3edee3d19f9cb162e7ab53,2024-11-21T02:27:22.280000
|
||||
CVE-2015-2423,0,0,42d5bd8c456c579663bd230e11c052dc6af4b7225a1931ab55e41c0bc8c19eae,2024-11-21T02:27:22.383000
|
||||
CVE-2015-2424,0,0,9ae78885f86f4e2d9b56004384ce84c9755f220085e52e4249dd5849959383e2,2024-11-21T02:27:22.517000
|
||||
CVE-2015-2425,0,0,b34d20362bfba815c4005956e855cfc07b174653b7e61b1244f3b6701148cabb,2024-11-21T02:27:22.633000
|
||||
CVE-2015-2426,0,1,72ea76bed8868889f055e199d17c2feb7247c30abf4f8c963d7c3c48580ae770,2025-01-17T20:23:27.523000
|
||||
CVE-2015-2424,0,1,86ea4eb5d4fe7477377c15eea20cce9f232b36340a9d7c6d14074aec45565f9e,2025-01-17T21:42:06.810000
|
||||
CVE-2015-2425,0,1,897c7957a8854933128306aa5ee23f8ae1c56365274b89e5eaf174a22f4e41a9,2025-01-17T21:42:13.630000
|
||||
CVE-2015-2426,0,0,72ea76bed8868889f055e199d17c2feb7247c30abf4f8c963d7c3c48580ae770,2025-01-17T20:23:27.523000
|
||||
CVE-2015-2427,0,0,55abc32dc641b1459ddff4dad2a062e6486deafbfb28dde2091ea8dd3b588f4e,2024-11-21T02:27:22.863000
|
||||
CVE-2015-2428,0,0,c3fed403027608df7c604e96f1cf1d9d58f8b077ac33ed1fac80d48d4de5efae,2024-11-21T02:27:22.963000
|
||||
CVE-2015-2429,0,0,6be635d2208a9a1c248aca11d3c39004b6116c618774c2e9a60c137855ab2935,2024-11-21T02:27:23.077000
|
||||
@ -75929,7 +75929,7 @@ CVE-2015-2498,0,0,202cbbf2c14229e42623ba9128bdc51ccc3a1902c2c354f8f3cede5a9184b5
|
||||
CVE-2015-2499,0,0,70e8036036c71a6de7081ff692ff0e4a3549e9bd108e6c7bca9e2608a7a3b604,2024-11-21T02:27:29.900000
|
||||
CVE-2015-2500,0,0,496ff078b783b269b965c0dd26ab28dfcb36e7af0def9d2fdb2b5bf345bfe394,2024-11-21T02:27:30.020000
|
||||
CVE-2015-2501,0,0,774a00ebcdd2619b1e941d592326a64fd3994a8c6df23a03fe342a89e0eac333,2024-11-21T02:27:30.123000
|
||||
CVE-2015-2502,0,0,9acff03600d4228999ad3c87e88105973ae06f4e5be92405eb6dd94388a9304f,2024-11-21T02:27:30.230000
|
||||
CVE-2015-2502,0,1,3c3eb6f250479458660abd40657b90a15c303f4757461d7df8931503888d6e24,2025-01-17T21:36:28.900000
|
||||
CVE-2015-2503,0,0,7e8500b80856a7799d677bc4d2caf972dea8e91c4ba249bc08c8754fe59623c4,2024-11-21T02:27:30.357000
|
||||
CVE-2015-2504,0,0,2d91468948eb80c794f9274ec20d44d15c583164dac8ea9bf906f3ef46ee9088,2024-11-21T02:27:30.480000
|
||||
CVE-2015-2505,0,0,e00dc56f0c8441e1a169b1e41e377b5a1a5f5ff1585811e95a57d965627ad58f,2024-11-21T02:27:30.587000
|
||||
@ -75972,8 +75972,8 @@ CVE-2015-2541,0,0,b4ad359df8ea3d6ce59de1ec9aea5fc3f9b5a7972b8730a22c8a33204924b5
|
||||
CVE-2015-2542,0,0,e858356d88869dfc32fc0a5db3f8ff2e6c58c20d9b80f3e051aa3022452eec21,2024-11-21T02:27:34.567000
|
||||
CVE-2015-2543,0,0,d2981f278e391c30162d239a8c90ece25d994ee78f79bc50898095faf6471efc,2024-11-21T02:27:34.680000
|
||||
CVE-2015-2544,0,0,4e5b0730ad2054e505576a69c1345f1cb6192323f7c2e99a172295e5997e6f06,2024-11-21T02:27:34.787000
|
||||
CVE-2015-2545,0,0,90e359775dc9879bca8b59826c0a14a2a4faf8bbb4d47054783f5ab46c2c6a60,2024-11-21T02:27:34.900000
|
||||
CVE-2015-2546,0,0,0ec1ea2a09c717603d7abf368114f33e354b1246512e92e5c00485274890ada1,2024-11-21T02:27:35.020000
|
||||
CVE-2015-2545,0,1,ef820c6faf95db393ebc31f5daf1b8c7ec3c1957c443974d478a53b0fccbd742,2025-01-17T21:36:34.027000
|
||||
CVE-2015-2546,0,1,d50a898920dfa7d46fd02f67918e109efe147136ee9f751dc4827a0b1a91e8da,2025-01-17T21:36:42.523000
|
||||
CVE-2015-2547,0,0,71327887aaaf05c12c1ea748b54de15f5859e1d66eadec6ddd3af104078d9d44,2023-11-07T02:25:22.523000
|
||||
CVE-2015-2548,0,0,479e31aacc15b060afbe8ad07e34024eff90df53ca8ea1778dba1c3ec3a3391a,2024-11-21T02:27:35.150000
|
||||
CVE-2015-2549,0,0,0611df9998e7a8096b95492e11ed27891d3ba1b63b496f542cd355dc6b2f94f5,2024-11-21T02:27:35.267000
|
||||
@ -181498,7 +181498,7 @@ CVE-2021-39176,0,0,2e3aead9ddd0b82b89926b6a20fd914969b178169fe642b78c215589ebc0f
|
||||
CVE-2021-39177,0,0,94621f65be7365339566e701b063302230769a53f23d4c2a33dc46068aacc51f,2024-11-21T06:18:48.060000
|
||||
CVE-2021-39178,0,0,46da173937ffd2a6580777e8dbae9e5be56ecd9a133d4aba6be686af97883ec2,2024-11-21T06:18:48.217000
|
||||
CVE-2021-39179,0,0,672ec5401735fc18b84933f2a306cfabbeb7a7ee6c7bf4f54e7242157b1a725b,2024-11-21T06:18:48.367000
|
||||
CVE-2021-3918,0,1,0c75c618fba6a4b816bf8c046a9a04c22dada1d9743e213ac614cbdf1ae5afe6,2025-01-17T20:15:26.073000
|
||||
CVE-2021-3918,0,0,0c75c618fba6a4b816bf8c046a9a04c22dada1d9743e213ac614cbdf1ae5afe6,2025-01-17T20:15:26.073000
|
||||
CVE-2021-39180,0,0,c645e58cee4b609a57409f03eb7666998e18efe29cd42facfb16d72ad079e1e6,2024-11-21T06:18:48.587000
|
||||
CVE-2021-39181,0,0,6ea853949c3c45c0050c591197e804812653e58aaf24989b0476e638140790d6,2024-11-21T06:18:49.193000
|
||||
CVE-2021-39182,0,0,36a7c52fd4a3b7880bbe227b743f81fd4242f9537ed0c611bf72c8f848ba42a7,2024-11-21T06:18:49.347000
|
||||
@ -206768,7 +206768,7 @@ CVE-2022-4063,0,0,81990d17f14d70663f3d859eb917b837f3cc25942c932f3802b4b252a1457f
|
||||
CVE-2022-40630,0,0,27154720c2f65a9ab1d7019a7dadebdd723234d03a6892aa623e3115ce42f115,2024-11-21T07:21:44.650000
|
||||
CVE-2022-40631,0,0,1cab6f89a0a16f36a479b0c66c7e6f586ade7ff36056e79a6272fdb7189a508e,2024-11-21T07:21:44.787000
|
||||
CVE-2022-40632,0,0,2db3276ec5e3ad600471c995b66de2baf9eb225871fa1306467dcfee1424a2c3,2024-11-21T07:21:44.977000
|
||||
CVE-2022-40633,0,0,55c0c021ebe321a2fa80cfebfc913809dae9d2f504a40c436274a621f55d27b5,2024-11-21T07:21:45.110000
|
||||
CVE-2022-40633,0,1,c1e8b5f398c405df71dc5e5293998d79054f0beb9da018fe45dc88cf6ebc5c3a,2025-01-17T22:15:26.210000
|
||||
CVE-2022-40634,0,0,38e73191b340ae880c43ffc1a71c771641cd1db97131702e009b02e78fbf6063,2024-11-21T07:21:45.237000
|
||||
CVE-2022-40635,0,0,79645a22302ac74ff2ef0daeef470b4d7704a51db2984faa3b3a81a3387529fd,2024-11-21T07:21:45.373000
|
||||
CVE-2022-40636,0,0,669a0366b9b0cf27d6e87ea4373e444b8994970975e188a2d8e62d9fd5b1ce52,2024-11-21T07:21:45.500000
|
||||
@ -207685,7 +207685,7 @@ CVE-2022-41692,0,0,d4ab23325d5f41e82bc4dd7738a81423c579d427a3f673f7325145296e27c
|
||||
CVE-2022-41693,0,0,1ddc4eb21ce7bfebe983bb7fa66dd722ebfa2560e816379852fe95aa76c98c9f,2024-11-21T07:23:39.740000
|
||||
CVE-2022-41694,0,0,13fea11f525189752ace5a4bd2aac59370a7b0a673ae13da1c1ef8114f9588a5,2024-11-21T07:23:39.873000
|
||||
CVE-2022-41695,0,0,9210d7bdad136f8916cc7b644c1a8ef7b74250ed8b3b825964784975abb4a6ca,2024-11-21T07:23:40.010000
|
||||
CVE-2022-41696,0,0,5ba5b25260ee83a10fda4f6de3114e2b05d0930f35e9a899b6db13937beb2e33,2024-11-21T07:23:40.160000
|
||||
CVE-2022-41696,0,1,6d315c1bca8c494e799721b13367283fb488038fdffd54e8a0c57585dc214967,2025-01-17T22:15:26.413000
|
||||
CVE-2022-41697,0,0,f00b141234f72886b17f4c01f4b33545cf7804193e1c401581c723d7666b2f9f,2024-11-21T07:23:40.287000
|
||||
CVE-2022-41698,0,0,702b3b5691f0e4832af2d18d9487073faa8cda8765d70b6d1fabe5bbc59a6e66,2024-11-21T07:23:40.407000
|
||||
CVE-2022-41699,0,0,506f1b14eef7ebb06f69aacc950ebc30837a9c960b333b7d62da43f205c68a11,2024-11-21T07:23:40.563000
|
||||
@ -209096,7 +209096,7 @@ CVE-2022-43507,0,0,9c1debc9f0fe5c55da3e74eb8438f93cbd01cdb83cf018c1efa9d548449db
|
||||
CVE-2022-43508,0,0,213518e35a0e980f7d63f0d455efe9a02a14cb788bbf513c85a37af3167f8a8d,2024-11-21T07:26:39.793000
|
||||
CVE-2022-43509,0,0,f260041112e062a3483cff6f41e7cb0b1f8d36ad9f2271cfe5b7b911c9bc754c,2024-11-21T07:26:39.947000
|
||||
CVE-2022-4351,0,0,fcbf305de217537de8f4077247a910e2400e62ba6c5930fb198a467af04d483e,2024-11-21T07:35:06.730000
|
||||
CVE-2022-43512,0,0,467827d7c58df7526ab2c5f0bcfecacc7f18778ffa2fba092f2edeaad333dedc,2024-11-21T07:26:40.087000
|
||||
CVE-2022-43512,0,1,a51c1f5fb7aa2e5ea971d01f6eed927bb609fdb0ad336bf75c9df0d95a0863f7,2025-01-17T22:15:26.590000
|
||||
CVE-2022-43513,0,0,50feb12093b3a60914e372d15f8441f150941ec3b05597671ccb94a16ec4c825,2024-11-21T07:26:40.527000
|
||||
CVE-2022-43514,0,0,77a047eef85fe88e54f789aab1387c41aaa5885c650fc2d0d427366404bc9b7c,2024-11-21T07:26:40.713000
|
||||
CVE-2022-43515,0,0,f254c9d4fff6c25998f11bfca5e5dfdfe9dbad86928d34a26d287c4ee40bfd0d,2024-11-21T07:26:40.877000
|
||||
@ -210207,7 +210207,7 @@ CVE-2022-45115,0,0,b15d64a0b05f59c19ad4082d608529767652d2eddc0f428e43e33a312668e
|
||||
CVE-2022-45118,0,0,a9a37fd5cd5086c5e6c8dd42feacdfc297afebe03af70ecc6cdefd6a62262e4b,2024-11-21T07:28:48.013000
|
||||
CVE-2022-45119,0,0,0ec7cea9a64a43b4cafb16ef188454c0780dac63007898e6ccf76bdd44cdd11e,2023-11-07T03:54:35.800000
|
||||
CVE-2022-4512,0,0,94f4aee10d868a090ee99610058e7773ab635340a3bfdad3d4ff380bdc153990,2024-11-21T07:35:24.663000
|
||||
CVE-2022-45121,0,0,266a7b238104005ad0aa6a4034aa972eb5790f6bff64d3b5e0183d9fa22c6ccc,2024-11-21T07:28:48.153000
|
||||
CVE-2022-45121,0,1,ac622b3511eb295f7f4e0eb9513dae84100e20f05272d373782e415cf8984486,2025-01-17T22:15:26.757000
|
||||
CVE-2022-45122,0,0,a46ab503159417a5ef3d2adf3c698b6e1c34052f45e5ad949a5e65a3681145a7,2024-11-21T07:28:48.260000
|
||||
CVE-2022-45124,0,0,b28668f1937ec5406e93724f618a9f68a8d78ab6816045d3f38c01ada228bf40,2024-11-21T07:28:48.373000
|
||||
CVE-2022-45126,0,0,7d352c26524a4eab8e0c8c6be0b4eda27a8cd071f5717323b95140dec8c66d6f,2024-11-21T07:28:48.500000
|
||||
@ -210464,7 +210464,7 @@ CVE-2022-4546,0,0,298620c799a1f3c6297dbd8923c6d7863e99176e5edfd833b05c371e1b6c05
|
||||
CVE-2022-45460,0,0,e43406d3c3e1b140b6943f963232aa87efb306e6a0fc75f54d71b33a3dea4569,2024-11-21T07:29:17.817000
|
||||
CVE-2022-45461,0,0,56f2b787c69deca86bd3b5d6242a910782e4836cc155b584a001e8e770eb3c65,2024-11-21T07:29:17.963000
|
||||
CVE-2022-45462,0,0,32a35c19ff603662093585c37e6728cd478d853de03e2f1a86a26cb05e496a4b,2024-11-21T07:29:18.100000
|
||||
CVE-2022-45468,0,0,6e22f205abd2675fc49c4dd6cb74b1def2231a6acd6a710354409bddf6d81ff8,2024-11-21T07:29:18.210000
|
||||
CVE-2022-45468,0,1,fa1867cc9af6053d2ec73a891320c6f662470812ba37fca8f9f416f66f1702e4,2025-01-17T22:15:26.927000
|
||||
CVE-2022-45469,0,0,10bf55fb9ce7b61a18b792fad66711157265be7d37c9751a18b547b87ea10df4,2024-11-21T07:29:18.303000
|
||||
CVE-2022-4547,0,0,51ee15e64287577a8049b1f42132b37d58fea2f22fa687791795f3c930f6d263,2024-11-21T07:35:27.947000
|
||||
CVE-2022-45470,0,0,7a0272577430809ad451c7cc2786bf7c96e8f498b5c4453652c56de828914865,2024-11-21T07:29:18.417000
|
||||
@ -211019,7 +211019,7 @@ CVE-2022-4628,0,0,af23e6e9e565780759bdf59d3b766a635ad57b4fb21c2728e54741b055019c
|
||||
CVE-2022-46280,0,0,abeb67f7e3dd286f90e79c3e35df9e3bf3b9629711af7006bc94b23dc65a2e27,2024-11-21T07:30:18.347000
|
||||
CVE-2022-46282,0,0,9c36d4ca9968a01130382cc6e2a7ddac6b9b823837d34fe0c53147dc3f4f259b,2024-11-21T07:30:18.477000
|
||||
CVE-2022-46285,0,0,aa9498ffc3f606f2ebf9c85686190d94cc96fd79334ec854f8b7fb58c6f566c8,2024-11-21T07:30:18.587000
|
||||
CVE-2022-46286,0,1,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000
|
||||
CVE-2022-46286,0,0,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000
|
||||
CVE-2022-46287,0,0,797a4cd550a55f760e45973c53ef155fb1f9ed748b322d3cdec94808ffcf1039,2024-11-21T07:30:18.830000
|
||||
CVE-2022-46288,0,0,7480c39c861fc7d58b6b32d83d68b02f45625585e631468efb23cfe6477ab3b0,2024-11-21T07:30:18.957000
|
||||
CVE-2022-46289,0,0,68fe438812fa3dc83afea63191a2a290a06c3e87ab7c9255e9ab7bbfd73b0b2b,2024-11-21T07:30:19.077000
|
||||
@ -211033,7 +211033,7 @@ CVE-2022-46295,0,0,1475cdfdf832c05ff1f7e5f2873d5130a33d18d4af49153ac50dd53604674
|
||||
CVE-2022-46298,0,0,81ecb0503a158126ac020b654cf720846310525e0e27480c8543970f686e57da,2024-11-21T07:30:19.993000
|
||||
CVE-2022-46299,0,0,ff1e6a2ba860be014cd4aea8e10fc3dcd3ae06dcc03ea8be80dbc20ea84aabb6,2024-11-21T07:30:20.133000
|
||||
CVE-2022-4630,0,0,1f7a479f36a53b238712e3f77f246b555a3e4d1c422f55a47b284b3a44d71efc,2024-11-21T07:35:37.843000
|
||||
CVE-2022-46300,0,0,5b86ca9d8d8c0f42139886e468061925d654c04361a080fd7c837026af6bb8e9,2024-11-21T07:30:20.273000
|
||||
CVE-2022-46300,0,1,987e6e8c1a1c4bdb3c02ef95f9cb79147d2c45360c4f2b52425b215f3c199d2f,2025-01-17T22:15:27.093000
|
||||
CVE-2022-46301,0,0,a7425d855a626c1b2a1d46573da6d9c68678c556b5eba390077458e29f6bf52d,2024-11-21T07:30:20.393000
|
||||
CVE-2022-46302,0,0,6adfe7ccfbd5e9bdb19474982e8602306db7158978e8b33aba4fe4d22ec580b0,2024-11-21T07:30:20.527000
|
||||
CVE-2022-46303,0,0,cc6804fd19995000674841f108652842954ef2981cc6218c6a98837004d0279c,2024-11-21T07:30:20.673000
|
||||
@ -211357,7 +211357,7 @@ CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac
|
||||
CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000
|
||||
CVE-2022-46728,0,0,3a822acf6167275765f764ac260bc9302405662dfcb2879d04efd07d46f8ff04,2023-11-07T03:55:51.883000
|
||||
CVE-2022-4673,0,0,ae81b2d3725dffbb1142722b47d0f8c8c70b094a6f67b615dbce927873432382,2024-11-21T07:35:42.640000
|
||||
CVE-2022-46732,0,0,0ef206a36781119a6ccf5c9d69295d30ed2e91e67ebcd85201aa6e5f4cb275e8,2024-11-21T07:30:59.237000
|
||||
CVE-2022-46732,0,1,9b6803bda51c38cdf9bb5d0cc1148f6b00114f3012d00faf6d32a6a27eeaf0d6,2025-01-17T22:15:27.260000
|
||||
CVE-2022-46733,0,0,dab6a16ba7aa13baea3e43ae318c71e03ced958ebc4b4f9863afc731ab25e4c2,2024-11-21T07:30:59.350000
|
||||
CVE-2022-46738,0,0,2bc8d3136674cbb74669d235a37a0dadd4f4f38eb64d7bbc723615e5d78bd0d6,2024-11-21T07:30:59.470000
|
||||
CVE-2022-4674,0,0,862e8bd2930ad0406eb37b5a5972b8f3d6437e29a1be0060b6860a9f39c31ed5,2024-11-21T07:35:42.747000
|
||||
@ -213168,7 +213168,7 @@ CVE-2023-0045,0,0,704c91fccb5b28af66e8c86e56e1fc3c00e24836d4ccf8b0cb3c414ef15e16
|
||||
CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000
|
||||
CVE-2023-0047,0,0,0f6f54604438936498314b186c9ccd6c0fbbc8e12d0f984b6b0c58ce4eb80ee5,2023-11-07T03:59:30.533000
|
||||
CVE-2023-0048,0,0,b291f54384bd541745864236ed994833e5e1baf706d05fdc783803ca006c2979,2024-11-21T07:36:27.420000
|
||||
CVE-2023-0049,0,1,bc8ff9f1805475042b8cc58a828cdcc6a3248eea7cf0c0a2a1cf44c94a1eae21,2025-01-17T20:15:26.260000
|
||||
CVE-2023-0049,0,0,bc8ff9f1805475042b8cc58a828cdcc6a3248eea7cf0c0a2a1cf44c94a1eae21,2025-01-17T20:15:26.260000
|
||||
CVE-2023-0050,0,0,70e74b9b8208384d9dcc342ce6c842472dff7944ce13c6af2a0e40d946f1bad8,2024-11-21T07:36:27.650000
|
||||
CVE-2023-0051,0,0,b3736b0c92d0c83ca9692b48df63f81280eb185360d47b3e152bbd17075ac98b,2024-11-21T07:36:27.763000
|
||||
CVE-2023-0052,0,0,2e6b156356f96952fd4e942ed201144d57623fa780d29644abbe2fcabff76c7d,2024-11-21T07:36:27.887000
|
||||
@ -213719,9 +213719,9 @@ CVE-2023-0617,0,0,691cc18bb8bdbd989d0ff33cb4f5f372eb4b04c5e44de3164da8290f4a638d
|
||||
CVE-2023-0618,0,0,775826c71f1996e7cb60426b950decb11d90a801edfb5e45db1856141eb943d9,2024-11-21T07:37:29.760000
|
||||
CVE-2023-0619,0,0,5722e52aa72b08165b4166b3b9b6859b19c0331870b8aeb3e79b2b7004003a03,2024-11-21T07:37:29.880000
|
||||
CVE-2023-0620,0,0,a5515d5c7090dff005472db945dd0702898706a494973ef909a2290deb6fed78,2024-11-21T07:37:29.983000
|
||||
CVE-2023-0621,0,0,aea4c5e5f6b151a1d1e194e82b84b63001c0a20c6134793765c7eb84d6e5fb38,2024-11-21T07:37:30.100000
|
||||
CVE-2023-0622,0,0,8011473c07fb27b652bae2c3dd79f8294a3782c694d53de3536f7767213fdfe6,2024-11-21T07:37:30.190000
|
||||
CVE-2023-0623,0,0,596ebc85b5e5b9abfa142d234ffa378d4897fca425a60bdff27b9bccfdec446d,2024-11-21T07:37:30.280000
|
||||
CVE-2023-0621,0,1,357536594b0dba3db9d46cabe10b3eaf600ab9b92a901f2c561741cd080a7a23,2025-01-17T22:15:27.440000
|
||||
CVE-2023-0622,0,1,eba408c9fc4b879e8e2d3f31f1bdf7016481e47405c9cbc09350a43ba0297e47,2025-01-17T22:15:27.613000
|
||||
CVE-2023-0623,0,1,bb06b621ab29fca2a5d0de54c848579ce397fdb383a791d7039fbd6e8eba0dc2,2025-01-17T22:15:27.790000
|
||||
CVE-2023-0624,0,0,eaf3ca96b523453f69ed50c1e3d6e02b21e9481d5e9740644bb572068c03671c,2024-11-21T07:37:30.367000
|
||||
CVE-2023-0625,0,0,3c17b1eb2fded0e36723950e50b80b46fd91e13ea45ab8676337a9333caa4f21,2024-11-21T07:37:30.457000
|
||||
CVE-2023-0626,0,0,66b454a1f2a64e228f8638b52590a60150b0e68a5bac4c60006842b880b3daea,2024-11-21T07:37:30.583000
|
||||
@ -220064,7 +220064,7 @@ CVE-2023-2595,0,0,03162bc5022fbbb42d9d2a4432deae69e87f6292466a73e282c58b39efeab8
|
||||
CVE-2023-25950,0,0,9c4446fe06b1b9cd133d12ed0f382469d8b479b1999ff643029f47b9ee324f95,2024-11-21T07:50:30.227000
|
||||
CVE-2023-25951,0,0,cbe311b60154417e1ee241796aa378a0815122f3e435f42cc5ade363ec34de6f,2024-11-21T07:50:30.337000
|
||||
CVE-2023-25952,0,0,9ce32dc72cc6827cb9c76e0645289aad0b1e5278d4796296e6e8d037d949982e,2024-11-21T07:50:30.477000
|
||||
CVE-2023-25953,0,0,331af0d8559ae571ed576fc6e0762d8d129d8872af8a94b22161f8ae7ad1034a,2024-11-21T07:50:30.607000
|
||||
CVE-2023-25953,0,1,4927a5577d3d58cba6f2f8ed4b68e0d60bafedb819690a56ff0cf60666a6cdcf,2025-01-17T22:15:27.970000
|
||||
CVE-2023-25954,0,0,a390ff11f2215f142ba09a417106c386bc0a05ab482e20604002e6383878d74c,2024-11-21T07:50:30.743000
|
||||
CVE-2023-25955,0,0,a5674fef30cfd50e0f69ca26585ceee9624b2e16aac77484f6a586723321bd18,2024-11-21T07:50:30.860000
|
||||
CVE-2023-25956,0,0,e1e9a1328ab2a7147ff0accc99e5a12b6f8d948f953b9b04d76482155f876e12,2024-11-21T07:50:30.970000
|
||||
@ -221567,9 +221567,9 @@ CVE-2023-2792,0,0,fef13f732773d0e431073564ea7df3b9b2f07f8206a8b84cf0ecccbd55e32b
|
||||
CVE-2023-27920,0,0,9d81864437507c8b8a361728c9a02b9737429af055acb54d59da6c86619da664,2024-11-21T07:53:42.113000
|
||||
CVE-2023-27921,0,0,0085c6f81f0b41ea4c17a31a5a9e61d59be8e76b29f5ff83e41d87884f7ef722,2024-11-21T07:53:42.243000
|
||||
CVE-2023-27922,0,0,ac0158270331d35cb0b6ab82df6120fd3e141fc0060add4828d4a13f54eea95f,2024-11-21T07:53:42.360000
|
||||
CVE-2023-27923,0,1,dfc2af0be88940f681e2754002453c6d1a65077412d9597e5c65f3d7a904f33f,2025-01-17T19:15:26.870000
|
||||
CVE-2023-27925,0,1,d2d5f164a571dc49cd31a6f0b6b6032d3bf875ef3eb1471e532be0eba1903b26,2025-01-17T19:15:27.060000
|
||||
CVE-2023-27926,0,1,452e0fe0b991a0da2a8be11c47cd2297b20bbb72a6e0c2fbc9f597f1f456616b,2025-01-17T19:15:27.213000
|
||||
CVE-2023-27923,0,0,dfc2af0be88940f681e2754002453c6d1a65077412d9597e5c65f3d7a904f33f,2025-01-17T19:15:26.870000
|
||||
CVE-2023-27925,0,0,d2d5f164a571dc49cd31a6f0b6b6032d3bf875ef3eb1471e532be0eba1903b26,2025-01-17T19:15:27.060000
|
||||
CVE-2023-27926,0,0,452e0fe0b991a0da2a8be11c47cd2297b20bbb72a6e0c2fbc9f597f1f456616b,2025-01-17T19:15:27.213000
|
||||
CVE-2023-27927,0,0,abacbdd0b9fa3d33f6de3eefe2559fb0a8687912f1ba95b656a8359d9c1e54ba,2025-01-17T18:15:21.080000
|
||||
CVE-2023-27928,0,0,88bb21c18c03cb2a32e94eba7299b570726c57a8fc6e8495f81a0709e9ed14bd,2024-11-21T07:53:42.930000
|
||||
CVE-2023-27929,0,0,a091d899039ed37bf23b8240da36d5ddf0facff2f164c1c59d32fc6ea55eb1e2,2024-11-21T07:53:43.113000
|
||||
@ -222006,7 +222006,7 @@ CVE-2023-28362,0,0,27177a8d408082bb8174e3277015cbad3f5c47547c0db03786e552334779b
|
||||
CVE-2023-28364,0,0,b8e69a33d67631d2c3d239f1c01280f5576d4f6621054c060df4f07489827dbc,2024-11-21T07:54:55.643000
|
||||
CVE-2023-28365,0,0,4859f30e6a1c91c44b3748aad21832f67bb60327910ad2139bb1ab931e722eee,2024-12-12T18:54:11.327000
|
||||
CVE-2023-28366,0,0,960802829fc443cdad65c26e57c943b97bd525d1c3e69a293aaac3644999e79b,2024-11-21T07:54:55.887000
|
||||
CVE-2023-28367,0,1,ea542543ae5e959ac9dd6964b8c5f27f5841b12efe8c4d64b461fc5cfcaa014c,2025-01-17T19:15:27.370000
|
||||
CVE-2023-28367,0,0,ea542543ae5e959ac9dd6964b8c5f27f5841b12efe8c4d64b461fc5cfcaa014c,2025-01-17T19:15:27.370000
|
||||
CVE-2023-28368,0,0,36f7dd98387b40400855f4cffb9250bac7b1a05259b6ebff4e7caf81b76ab285,2024-11-21T07:54:56.150000
|
||||
CVE-2023-28369,0,0,815c110e1ebcd6e549e22f4e285aba8d19a651b9d972e72a40643fc9d8cd7614,2024-11-21T07:54:56.247000
|
||||
CVE-2023-2837,0,0,ac2b220952bcea1d0717efa8546becfc7608c322c6c4219716a62813de1b4fcb,2024-11-21T07:59:23.307000
|
||||
@ -222032,11 +222032,11 @@ CVE-2023-28387,0,0,f9b7d4deb7119122d0725dd3c3f5ae24a7033492e3de0c64d04b1908eb139
|
||||
CVE-2023-28388,0,0,c6e3f76c7146a4a5420346e6b4abc4c602b810d24302c2c2bc9194a7fb16021c,2024-11-21T07:54:58.410000
|
||||
CVE-2023-28389,0,0,bff9d3c68a6d345a4e7511aeb7a5417443617d3f28ef7e3b6626b492a82cad7f,2024-11-21T07:54:58.520000
|
||||
CVE-2023-2839,0,0,af48c4f8dd5100e3db5e7ada1d63714675a34143bc1c04b0e4d3e83c9108abbd,2024-11-21T07:59:23.553000
|
||||
CVE-2023-28390,0,1,c85aed1822e6c646b3274670df5bf41d2bf4e7a5359b7c9a5347420b02a587bf,2025-01-17T19:15:27.540000
|
||||
CVE-2023-28390,0,0,c85aed1822e6c646b3274670df5bf41d2bf4e7a5359b7c9a5347420b02a587bf,2025-01-17T19:15:27.540000
|
||||
CVE-2023-28391,0,0,96b2e987a61ff1f4717e8853a32fe94900b25df323f3d5fdc9e3209fa1732e3a,2024-11-21T07:54:58.733000
|
||||
CVE-2023-28392,0,1,83a0a4651bcdf30b2f49f0699cf09751b91bd0a6cee1a4c54ac295fcf4f78f63,2025-01-17T19:15:27.707000
|
||||
CVE-2023-28392,0,0,83a0a4651bcdf30b2f49f0699cf09751b91bd0a6cee1a4c54ac295fcf4f78f63,2025-01-17T19:15:27.707000
|
||||
CVE-2023-28393,0,0,b9d1947879606ab8cdca8a7d536ab0d1decf3db81b719c9bdde0ae5d346ca7dc,2024-11-21T07:54:58.997000
|
||||
CVE-2023-28394,0,1,100f1bc5bc8d03e63b963636191abcd9b52f1d706680b9bdf6e07c40f68b7850,2025-01-17T19:15:27.887000
|
||||
CVE-2023-28394,0,0,100f1bc5bc8d03e63b963636191abcd9b52f1d706680b9bdf6e07c40f68b7850,2025-01-17T19:15:27.887000
|
||||
CVE-2023-28395,0,0,904bec410c3c41ff86abb1cb882c22a23ba059a83aab1c32f70cd670c88b4dae,2024-11-21T07:54:59.197000
|
||||
CVE-2023-28396,0,0,c36f2c0b4c21b1edb34a4b96e04dcd198cdad10534665759b7da80f1c87657fa,2024-11-21T07:54:59.300000
|
||||
CVE-2023-28397,0,0,4bff9ed10c02507982d7b9dab6671245255794a218efdc6bf229f1abb97481c6,2024-11-21T07:54:59.407000
|
||||
@ -222050,7 +222050,7 @@ CVE-2023-28404,0,0,8cba623eb88a12f1ff1c663d93cba5426a2b008fd2ff25ef48ad773dee273
|
||||
CVE-2023-28405,0,0,eb07a7c8bb3f0a504569a93d84e1a79e2aba3c46584783ae4f7cb3c9a6d9ae7c,2024-11-21T07:55:00.133000
|
||||
CVE-2023-28406,0,0,551653fb8dc6910553ae3a28d97b601eb1c980f7dcbaa1b5e098debe28505262,2024-11-21T07:55:00.243000
|
||||
CVE-2023-28407,0,0,199205300f4f0e14a26b03c1c8f7c07f60c835a3558153d1547344007813055e,2024-11-21T07:55:00.380000
|
||||
CVE-2023-28408,0,1,62e24e047076cef91429bde7ba9f00808a813e368271a169e7e2ee6573bf088c,2025-01-17T19:15:28.050000
|
||||
CVE-2023-28408,0,0,62e24e047076cef91429bde7ba9f00808a813e368271a169e7e2ee6573bf088c,2025-01-17T19:15:28.050000
|
||||
CVE-2023-28409,0,0,05ef2028d153b92b090be4ae3fc5be09764f1611b8ab1280c421e9eac3952df6,2024-11-21T07:55:00.603000
|
||||
CVE-2023-2841,0,0,65e0123fc1c15f5180846b067709d76a1cfee713e1fec37f8cb236ae2ab617ba,2024-11-21T07:59:23.790000
|
||||
CVE-2023-28410,0,0,115b868a646d0d217870b219c7e1a1d30d699f9bf5975c779a55555499229b77,2024-11-21T07:55:00.717000
|
||||
@ -223303,7 +223303,7 @@ CVE-2023-29915,0,0,0ce0397192842c252b846962bced464e60694e0efb915231157cc6a2f5bb3
|
||||
CVE-2023-29916,0,0,32e47b0c304e58029efd0b2bd53fdd0cc99d8d2784e9816056bd8fec28f9a672,2024-11-21T07:57:38.333000
|
||||
CVE-2023-29917,0,0,d7eeba389a9e9d9b829727bd8bbc8d886d26f6b82767446d62c5c9991ac5d688,2024-11-21T07:57:38.463000
|
||||
CVE-2023-29918,0,0,89129b543c3bddd14909f8b651edea6b66467446dd0bc3a51cf2d047e1388bb9,2024-11-21T07:57:38.590000
|
||||
CVE-2023-29919,0,1,534b6a0e578a3fd9502e76366d66ebb50860789124d34973be718a270ba8a952,2025-01-17T19:15:28.213000
|
||||
CVE-2023-29919,0,0,534b6a0e578a3fd9502e76366d66ebb50860789124d34973be718a270ba8a952,2025-01-17T19:15:28.213000
|
||||
CVE-2023-2992,0,0,81c4ed0720a0b4f1ca1bbf98c6c15a905ea91d77d082061cdcae83daa76516dc,2024-11-21T07:59:42.850000
|
||||
CVE-2023-29921,0,0,749acecf71319cfdc6ee74f8f9f25062b01436064aa3dc9392f88eda69f282fe,2024-11-21T07:57:38.890000
|
||||
CVE-2023-29922,0,0,3431d33c974e0688dae8cb539aef6212beb8727f19b682746cf9f9893095fcf7,2024-11-21T07:57:39.787000
|
||||
@ -223532,7 +223532,7 @@ CVE-2023-30376,0,0,20f2a963d7ad818e28318f87f648c34436fcee292966134144cff81cb1dff
|
||||
CVE-2023-30378,0,0,e15838630934f93860865d8658f43cb9c208f4c246ef06ba53c6edc2fd205f53,2024-11-21T08:00:06.600000
|
||||
CVE-2023-3038,0,0,f94e5be791b5988f81c55513fb4e21975b5d007bb4a0dbf128136e9d14133ae6,2024-11-21T08:16:17.920000
|
||||
CVE-2023-30380,0,0,696b31ac7ccfb98c41c59846013679362be1517b6f600fde9be15e8086b53a35,2024-11-21T08:00:06.750000
|
||||
CVE-2023-30382,0,1,8b5439e9e1c0731e2487a576225ed7d67ba20cf2f5a7cd23dc6fc8a77464507c,2025-01-17T19:15:28.400000
|
||||
CVE-2023-30382,0,0,8b5439e9e1c0731e2487a576225ed7d67ba20cf2f5a7cd23dc6fc8a77464507c,2025-01-17T19:15:28.400000
|
||||
CVE-2023-30383,0,0,632e1374b9fd95787063cd692106c1c920d5f7661a2dc03e359ce31ed1d1138a,2024-11-21T08:00:07.040000
|
||||
CVE-2023-3039,0,0,5fb1117a3c974bb5675369e9814fd755e9c2c006e24e1faf7e2d4e7dfc8e49b6,2024-11-21T08:16:18.053000
|
||||
CVE-2023-30394,0,0,0029c2f10bc315baa8071d1799ca0506df08206db7f66c6b9f0205ee7b2e5992,2024-11-21T08:00:07.210000
|
||||
@ -224584,15 +224584,15 @@ CVE-2023-31746,0,0,3a8aaaa50147d3d114e7254fa8029831eb539b8eeed897297373531d4ecfd
|
||||
CVE-2023-31747,0,0,e1f12a48eff45f6219f0ac7382e90c9f6cd09a4192724e614d84764897076af4,2024-11-21T08:02:14.103000
|
||||
CVE-2023-31748,0,0,0f540337304e36e00c3f95780de455af527831695e1251ae1c5fbb139d2d59fc,2024-11-21T08:02:14.240000
|
||||
CVE-2023-3175,0,0,fab3b543d5ff15291ae9f767c9d5983231c0dacf478e930dd2c194f4b56209b7,2024-11-21T08:16:37.620000
|
||||
CVE-2023-31752,0,0,e1a2f383f3389c63e10edb1a5bd9cba3d47f2f35829bffd00c98f70ee3dde98d,2024-11-21T08:02:14.377000
|
||||
CVE-2023-31752,0,1,ee474beb03744c87e92450427a948c8f94a94bd80f470a494135a528877b360b,2025-01-17T21:15:08.807000
|
||||
CVE-2023-31753,0,0,a01c8f63450a5be58d34e8da69864a94437251cbf65819aebace014d90f577ce,2024-11-21T08:02:14.520000
|
||||
CVE-2023-31754,0,0,0c75682a0bd4eb45a7c37937ec25b5f4de7d53f92879d6007ad582a59d0a5de5,2024-11-21T08:02:14.660000
|
||||
CVE-2023-31756,0,0,a73045134a3b14e8af18c4165a123a126150c38b75bd32af45321f00329ed5e7,2024-11-21T08:02:14.800000
|
||||
CVE-2023-31757,0,0,a3655ce676061948f6e1e9354c86685d8c6417d4af6e4a07d846fcff2816711c,2024-11-21T08:02:14.930000
|
||||
CVE-2023-31759,0,1,b0fdfe74673c1bb53629cd8431c9e03d5ae487967b83f76eb186d827312a2e58,2025-01-17T20:15:26.417000
|
||||
CVE-2023-31759,0,0,b0fdfe74673c1bb53629cd8431c9e03d5ae487967b83f76eb186d827312a2e58,2025-01-17T20:15:26.417000
|
||||
CVE-2023-3176,0,0,999fe1ea7317073fe2b31bb323d98a6f29f6d8081642f27e32d077db6c6b4e5e,2024-11-21T08:16:37.740000
|
||||
CVE-2023-31761,0,1,c57341aba924ff1aff3fc07fbbcb36e447d1450125869ef758718f7cb2a2f5d5,2025-01-17T20:15:26.607000
|
||||
CVE-2023-31762,0,1,532d0e70760fe217951cfb4965d85bd3fc3a6855eabc78cfef04cbef357982d3,2025-01-17T20:15:26.797000
|
||||
CVE-2023-31761,0,0,c57341aba924ff1aff3fc07fbbcb36e447d1450125869ef758718f7cb2a2f5d5,2025-01-17T20:15:26.607000
|
||||
CVE-2023-31762,0,0,532d0e70760fe217951cfb4965d85bd3fc3a6855eabc78cfef04cbef357982d3,2025-01-17T20:15:26.797000
|
||||
CVE-2023-31763,0,0,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c13d2,2025-01-17T18:15:22.763000
|
||||
CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000
|
||||
CVE-2023-31779,0,0,57d1dd015d41bdb7a16d9d6f14cf7992f409481c534697d1fe2caa03c46dac25,2024-11-21T08:02:15.617000
|
||||
@ -232539,7 +232539,7 @@ CVE-2023-41909,0,0,fe47e0627e6e0587df197cb6248e0465a6c5ef9d1c0f8ba2337ec5ef31936
|
||||
CVE-2023-4191,0,0,a1f09945fb0d56d83cb9a39e25dcf2c3f3da58585f1ce2f71c0f2f2b554cbd07,2024-11-21T08:34:35.250000
|
||||
CVE-2023-41910,0,0,64f3a8df0aec898c615375b8ab396e9af1e460f91ed84851a241df6ad1989111,2024-11-21T08:21:54.133000
|
||||
CVE-2023-41911,0,0,b1e24ed70c01d41beb1625b3453221caf7529f5117e55e253bd79147bbb3624b,2024-11-21T08:21:54.283000
|
||||
CVE-2023-41913,0,1,8eccfcb64e4092467b7f3d1e49bbd1c87302ec056e35e181db8ae9f9b277ca0a,2025-01-17T20:15:26.993000
|
||||
CVE-2023-41913,0,0,8eccfcb64e4092467b7f3d1e49bbd1c87302ec056e35e181db8ae9f9b277ca0a,2025-01-17T20:15:26.993000
|
||||
CVE-2023-41914,0,0,629446d372d0abedb1ad82be6b117795a171e478179fae12418e0936509ae8ed,2024-11-21T08:21:54.603000
|
||||
CVE-2023-41915,0,0,824124f069fd425cbfdde77de3fd5ef411f29d7d8677c33e5d479880df876a7d,2024-11-21T08:21:54.753000
|
||||
CVE-2023-41916,0,0,8508e363940b50927c9cfffce701c64baac0318125b1f297ea1090b10a3d39fc,2024-11-21T08:21:54.947000
|
||||
@ -233191,8 +233191,8 @@ CVE-2023-42780,0,0,cdd093383de8ac80b2dd603c4cd8b5fb12111fdfaea151dda39675c869053
|
||||
CVE-2023-42781,0,0,e6266811e943f5b3219ef0407d2b4114a945fd77347810cc844cb61ed53dc644,2024-11-21T08:23:08.683000
|
||||
CVE-2023-42782,0,0,da0c83cbed17a04613b39ce2336362e43c1e910e28a92e71a36daf2e58e858be,2024-11-21T08:23:08.817000
|
||||
CVE-2023-42783,0,0,98b628fd4937ef156152a20479ae772c8ff5e58950f81df1627766b6fb5ac59b,2024-11-21T08:23:08.960000
|
||||
CVE-2023-42785,0,1,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000
|
||||
CVE-2023-42786,0,1,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000
|
||||
CVE-2023-42785,0,0,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000
|
||||
CVE-2023-42786,0,0,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000
|
||||
CVE-2023-42787,0,0,9495dbf34a13c743d9a5e135b36546505b91d005fdd69c84cafbd04056c07414,2024-11-21T08:23:09.100000
|
||||
CVE-2023-42788,0,0,0c30b35d8520306a2f83f71d70c6e59375e6c5852cdeb5813f843ade4b3abedb,2024-11-21T08:23:09.237000
|
||||
CVE-2023-42789,0,0,eebbac5c484c3f93b2be647e7bb4c1bcdda0e75aa8868e3a113ae482b9f36f7e,2024-11-21T08:23:09.387000
|
||||
@ -238756,6 +238756,7 @@ CVE-2023-50734,0,0,2aab95fd5c588a3dc97b1bd0a6b2f20bfd2911d8fb04a876cbd8fcebb2dd7
|
||||
CVE-2023-50735,0,0,4f96b135e945b5004f8ce6581b61e59142e00708b1dc6f868a054e729d12e204,2024-11-21T08:37:14.423000
|
||||
CVE-2023-50736,0,0,5bcd601c09b61694b00e59d37ca8d9fc78245869949bc1916a3889b4eccad37c,2024-11-21T08:37:14.603000
|
||||
CVE-2023-50737,0,0,2bae2fb365dc9f4ed02a348f748b5179e20f499009864d44daab198cff17a8d2,2024-11-21T08:37:14.780000
|
||||
CVE-2023-50738,1,1,71aa9283b563ec923ff9cc7ef837204e01cd197d5ac11b19caa3497cc58614eb,2025-01-17T22:15:28.167000
|
||||
CVE-2023-5074,0,0,a5fd6d88eec362223e3b4064e6992870a2bdcd5526e9e7c259a1985148840ea2,2024-11-21T08:41:00.840000
|
||||
CVE-2023-50740,0,0,3525405993410ebfa59c0e2c13f4f85218736bc8538411d8d86d3e99bcb5ebdc,2024-11-21T08:37:14.957000
|
||||
CVE-2023-50743,0,0,25f6602c5a61a6d7f3ce7f009407eeeb62215a68ef3b38bc4c354b94bd825007,2024-11-21T08:37:15.150000
|
||||
@ -239973,7 +239974,7 @@ CVE-2023-52430,0,0,3e605ecbbfa5bc25bd6ba3bdae218b6daf7fb6b7ef5cd1295da5e98a82987
|
||||
CVE-2023-52431,0,0,3b65e75012502361f350313609372b5ca7987ca043856cb876f1200aaf866296,2024-11-21T08:39:44.607000
|
||||
CVE-2023-52432,0,0,af6bbc3ba2085044bc35aab3722a76fe65601a751067cd007d5e003c2a8af490,2024-11-21T08:39:44.843000
|
||||
CVE-2023-52433,0,0,1ccd9225647e705e6c1a54a035b252c92f397c783c91b93e0a2f9e347d0ccaf8,2024-11-21T08:39:44.963000
|
||||
CVE-2023-52434,0,1,e52e54cf2796f0eefaf0d192c649076f5b46d3101eff0e65efe71ce7f7375dfb,2025-01-17T20:15:27.203000
|
||||
CVE-2023-52434,0,0,e52e54cf2796f0eefaf0d192c649076f5b46d3101eff0e65efe71ce7f7375dfb,2025-01-17T20:15:27.203000
|
||||
CVE-2023-52435,0,0,4511ddd5fc96777a4d1f57c09b94f2c6faa283be3bbe7bed342b3e7847c5ee92,2024-11-21T08:39:45.323000
|
||||
CVE-2023-52436,0,0,a1d6ae97e0519eaf28cd31921dc5d9066b5d3c0d9e7a62cba2649db5d3a51484,2024-11-21T08:39:45.483000
|
||||
CVE-2023-52437,0,0,42872141987ae74e64d2ed167d955818bd8792275db5df08a84277dbded74cb3,2024-02-22T13:15:08.020000
|
||||
@ -242857,7 +242858,7 @@ CVE-2024-0584,0,0,6d20f8338a23d66c740dd2ada9b9c1d3225d737f562208348d092c3e9d9874
|
||||
CVE-2024-0585,0,0,940b680c34ad121dfa69b25eb22e69053bc2430cad3c0f48e3188936c0ea546d,2024-11-21T08:46:56.887000
|
||||
CVE-2024-0586,0,0,483c6d27ef26d2b65fcaea8ba03f9ffda3e17eabeb80e6d97e4f5eea0e29ae61,2024-11-21T08:46:57.010000
|
||||
CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc91821b,2024-11-21T08:46:57.137000
|
||||
CVE-2024-0588,0,1,6f8550ff909ae4c7da15a920587063371148ea1a9a4ef35a0da365c3198c11a3,2025-01-17T19:25:52.137000
|
||||
CVE-2024-0588,0,0,6f8550ff909ae4c7da15a920587063371148ea1a9a4ef35a0da365c3198c11a3,2025-01-17T19:25:52.137000
|
||||
CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000
|
||||
CVE-2024-0590,0,0,de2ecff39d8bb7ecc0e43dccf38abeb5bc3d8547e89ecead319caf442de4085d,2024-11-21T08:46:57.473000
|
||||
CVE-2024-0591,0,0,98f524326e7fc7678fbc5044c03d1eca3ded8bb9446a3be7808261fe30cea397,2024-11-21T08:46:57.577000
|
||||
@ -242950,7 +242951,7 @@ CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd241728
|
||||
CVE-2024-0687,0,0,d93998c18d64bf210c2a399ddf1aafa937567f61265f0453c37e7cb6ae0fcbfb,2024-11-21T08:47:08.990000
|
||||
CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000
|
||||
CVE-2024-0689,0,0,f6eb3eb2e29fe7f683bb7540f0e85632c4df022fb0391601d5707221e43a0076,2024-11-21T08:47:09.223000
|
||||
CVE-2024-0690,0,1,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000
|
||||
CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000
|
||||
CVE-2024-0691,0,0,a50f23db7013613682b7784287817142b53493a2be1ac349b95c9f4a363c01f3,2024-11-21T08:47:09.507000
|
||||
CVE-2024-0692,0,0,7c106171b188dbfb79ab576be16610df86db06442a5256cd303ae65c0208be17,2024-11-21T08:47:09.630000
|
||||
CVE-2024-0693,0,0,f7c97d1f9175fe3f5ed316e5c461bd1f136f08d48c2edf3c1956c86a334e4bbb,2024-11-21T08:47:09.750000
|
||||
@ -243963,11 +243964,11 @@ CVE-2024-10845,0,0,931b9473d8b3acaeed75a4b2f9ecbf4fef9f369e659ecb3385eb6146d4936
|
||||
CVE-2024-10848,0,0,7f61f0b085abc016c8998a0cf5b48d8ec8995f00d20acc55868e83ab5fdbbc8f,2024-12-05T10:31:39.120000
|
||||
CVE-2024-10849,0,0,4d7b3a7dc2e3927a966dcad144508a97f5cd8dc242ff6022b96218bb7cdf6329,2024-12-06T09:15:05.350000
|
||||
CVE-2024-1085,0,0,7c8525867b2d9a7f82bb7c58a74cd9cc5d38a56649870114c80343a2ce238539,2024-11-21T08:49:45.880000
|
||||
CVE-2024-10850,0,1,3ee32c584b6a724590d5c35947a6d9faf6699b12da9ac0bec63764664297cd20,2025-01-17T20:25:39.717000
|
||||
CVE-2024-10851,0,1,b9719cb3375ad6837d88d3a8dce4e3f2101af4d2bc9d4e1158f357654c88b57a,2025-01-17T20:19:49.767000
|
||||
CVE-2024-10850,0,0,3ee32c584b6a724590d5c35947a6d9faf6699b12da9ac0bec63764664297cd20,2025-01-17T20:25:39.717000
|
||||
CVE-2024-10851,0,0,b9719cb3375ad6837d88d3a8dce4e3f2101af4d2bc9d4e1158f357654c88b57a,2025-01-17T20:19:49.767000
|
||||
CVE-2024-10852,0,0,88fb8de98b83210c82faaa8e1b095564877022a37a1a43fabad4deb9c385a053,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10853,0,1,ce3a77067be5283eae2eb787cf1349282af756283dbf12ae12e3dd3a959d3a36,2025-01-17T20:17:28.650000
|
||||
CVE-2024-10854,0,1,1d21778617e5698cc4a6fe694898eba8adf5884ebfaaf494a56d944972925458,2025-01-17T20:16:10.667000
|
||||
CVE-2024-10853,0,0,ce3a77067be5283eae2eb787cf1349282af756283dbf12ae12e3dd3a959d3a36,2025-01-17T20:17:28.650000
|
||||
CVE-2024-10854,0,0,1d21778617e5698cc4a6fe694898eba8adf5884ebfaaf494a56d944972925458,2025-01-17T20:16:10.667000
|
||||
CVE-2024-10855,0,0,ae24b9251832889f0ab5093466f5bbce4d7ad6d8dd4bf7a8321d2155c2606591,2024-11-26T20:34:02.857000
|
||||
CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6150,2024-12-24T11:15:07.260000
|
||||
CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000
|
||||
@ -244088,9 +244089,9 @@ CVE-2024-1100,0,0,06d4324d0991a4d3753bde5966a9b264dffaf09b28ecc31d28a9b56fac7549
|
||||
CVE-2024-11000,0,0,a38dc4ca4277a8132ad2903c6c182b631811d1505019b5b41baf3535595f105f,2024-11-13T01:05:49.643000
|
||||
CVE-2024-11002,0,0,540046c3a7a5e2c208fbfda3876432629143ca7cdae67f847887a838d1bc9e67,2024-11-26T07:15:05.413000
|
||||
CVE-2024-11003,0,0,a783ec5f16b410f220d004ec7b834ae4a4b65091c9d3bd08888ea586385d6942,2024-12-03T14:15:19.800000
|
||||
CVE-2024-11004,0,1,37c1d7c2f1ef184a998491b68427a7f9e99e8afc6b534f3bc130eb0bd2b02663,2025-01-17T20:05:17.653000
|
||||
CVE-2024-11005,0,1,fa8080dd6a39ae983dd91a0245d004a410872839033c117908c796f6ebe0bef1,2025-01-17T20:23:26.140000
|
||||
CVE-2024-11006,0,1,5c4a40f976629354d970d466e03d90ddfcc056a711f9bc6e5c571798db0e1e41,2025-01-17T20:23:23.497000
|
||||
CVE-2024-11004,0,0,37c1d7c2f1ef184a998491b68427a7f9e99e8afc6b534f3bc130eb0bd2b02663,2025-01-17T20:05:17.653000
|
||||
CVE-2024-11005,0,0,fa8080dd6a39ae983dd91a0245d004a410872839033c117908c796f6ebe0bef1,2025-01-17T20:23:26.140000
|
||||
CVE-2024-11006,0,0,5c4a40f976629354d970d466e03d90ddfcc056a711f9bc6e5c571798db0e1e41,2025-01-17T20:23:23.497000
|
||||
CVE-2024-11007,0,0,62a2e0757d628f20a5e5c0dd4a347b28f717af7d2afebfa5668d63b84e88b9e1,2024-11-22T17:15:07.010000
|
||||
CVE-2024-11008,0,0,f77f5c0af0d83a13a0666741ffaf97ab51cf85c369755c809be24c29ec4e42eb,2024-12-11T11:15:04.947000
|
||||
CVE-2024-11009,0,0,f480d27ee8261f76524c7f6e635dd05967cd1bee3828280624cb8a929fc9e083,2024-11-27T12:15:19.383000
|
||||
@ -244309,8 +244310,8 @@ CVE-2024-11263,0,0,cc23e994a38bc31df951aa6a58125fc0f0777c81e47c57f81b464948cdbf2
|
||||
CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000
|
||||
CVE-2024-11268,0,0,65d234ad05896fe7713da8af2e2cfd7055c2e949b8bf81d6b5e68616c5bf2258,2024-12-09T18:15:22.120000
|
||||
CVE-2024-1127,0,0,64ca0bb18ea16b2fd1f9f1c90b4e9efdaa03cabe0d526d98a06239671c9cf287,2025-01-15T18:22:10.127000
|
||||
CVE-2024-11270,0,1,f913b393ed1680b42f1ef0da4b22b8b795701c7c65dc154e477c74e712bf5f69,2025-01-17T20:56:14.373000
|
||||
CVE-2024-11271,0,1,6f64f81c0050f88212781d232ab52df3dc26095a2c8e61b8de7b71e76dbe7021,2025-01-17T20:49:14.347000
|
||||
CVE-2024-11270,0,0,f913b393ed1680b42f1ef0da4b22b8b795701c7c65dc154e477c74e712bf5f69,2025-01-17T20:56:14.373000
|
||||
CVE-2024-11271,0,0,6f64f81c0050f88212781d232ab52df3dc26095a2c8e61b8de7b71e76dbe7021,2025-01-17T20:49:14.347000
|
||||
CVE-2024-11274,0,0,d1342831a6abeef5bb3515b5ff94eee0e3fe5805367e12756f20bd1f3e6994e5,2024-12-12T12:15:22.267000
|
||||
CVE-2024-11275,0,0,d867fdb3089eb487aba710ee3a783df90afa48402af791b20254c6cf6b05da5e,2024-12-13T09:15:04.887000
|
||||
CVE-2024-11276,0,0,812b69192092bc16930f9ab3876c16990ac594a09aff786923cf483c78cda3e7,2024-12-06T09:15:05.827000
|
||||
@ -244637,12 +244638,12 @@ CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2c
|
||||
CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000
|
||||
CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000
|
||||
CVE-2024-11632,0,0,de73f7ca209ed3887af097dcd8d60cda4bdd27816f354a861b8ba50b3a9bc56a,2024-11-25T16:50:43.257000
|
||||
CVE-2024-11633,0,1,68efe6d50a10738071cbd51ec1cbc8813b80c80199253ca588c6b5fdecb7bcf2,2025-01-17T19:35:05.380000
|
||||
CVE-2024-11634,0,1,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580535,2025-01-17T19:32:48.327000
|
||||
CVE-2024-11633,0,0,68efe6d50a10738071cbd51ec1cbc8813b80c80199253ca588c6b5fdecb7bcf2,2025-01-17T19:35:05.380000
|
||||
CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580535,2025-01-17T19:32:48.327000
|
||||
CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000
|
||||
CVE-2024-11636,0,0,0b6d42fa0d5704cd6ac079216da1bb6972215c21c5e47338513c0632cc826b2e,2025-01-13T15:15:07.560000
|
||||
CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000
|
||||
CVE-2024-11639,0,1,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000
|
||||
CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000
|
||||
CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000
|
||||
CVE-2024-11642,0,0,e083dfd7b8388b09206f810c50ef0061b39601a9804b6746591b0dd89f756ab4,2025-01-09T11:15:10.187000
|
||||
CVE-2024-11643,0,0,ae78ce4f54b48c77ffb4df12d001ddabc5e672affe5a377c6c988d0deb6a52af,2024-12-04T16:15:24.177000
|
||||
@ -244776,8 +244777,8 @@ CVE-2024-11768,0,0,d1dc5256960dbb7c1872ab2eee741d8ee6a82b0e95e8bd4589e5dba11cf58
|
||||
CVE-2024-11769,0,0,7c09ce15e3c33c67c82c4f8389595c27e00e07d607e16c4d909baefd0cbdfd8b,2024-12-04T08:15:06.680000
|
||||
CVE-2024-1177,0,0,50204f0e1e82280f8898460ad80abf26f09df69c8b4bae2f8e7f259925f88097,2024-11-21T08:49:58.233000
|
||||
CVE-2024-11770,0,0,811fe48f54a597d0d878563d5e3c6ae267f413b42e3fcfc7383af1a6019b7d76,2024-12-14T05:15:07.627000
|
||||
CVE-2024-11772,0,1,b31e7eab1d3591b26e66c024fb786d86ba840ba76e4420f4d7e4a7cf301cac00,2025-01-17T19:40:52.337000
|
||||
CVE-2024-11773,0,1,4b3745f64612448355fff5a57f3da9fcc76fa6199f1570739cf6dd2889fe60fa,2025-01-17T19:41:50.450000
|
||||
CVE-2024-11772,0,0,b31e7eab1d3591b26e66c024fb786d86ba840ba76e4420f4d7e4a7cf301cac00,2025-01-17T19:40:52.337000
|
||||
CVE-2024-11773,0,0,4b3745f64612448355fff5a57f3da9fcc76fa6199f1570739cf6dd2889fe60fa,2025-01-17T19:41:50.450000
|
||||
CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a46b,2024-12-20T07:15:10.393000
|
||||
CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9dd8,2024-12-20T07:15:10.597000
|
||||
CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000
|
||||
@ -244822,7 +244823,7 @@ CVE-2024-11812,0,0,df32cc25c5bb5c5dcc725bf487d9704dded6625df8d19e9336934b5d64e1e
|
||||
CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000
|
||||
CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000
|
||||
CVE-2024-11815,0,0,69d47446f06da0442c4119d1d5b0771fdfaa9c1fcc2c009fd2bb7f3fcd33e23a,2025-01-09T11:15:10.770000
|
||||
CVE-2024-11816,0,1,c811b77570eeef53a9aa738dc451541502abd64f4c51291f237dbf96aa0dea91,2025-01-17T21:00:00.330000
|
||||
CVE-2024-11816,0,0,c811b77570eeef53a9aa738dc451541502abd64f4c51291f237dbf96aa0dea91,2025-01-17T21:00:00.330000
|
||||
CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000
|
||||
CVE-2024-11818,0,0,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000
|
||||
CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000
|
||||
@ -244913,7 +244914,7 @@ CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db680
|
||||
CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5907,2024-12-18T12:15:08.950000
|
||||
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
|
||||
CVE-2024-11915,0,0,dc3ca0c1970f54dc4a5ca94d3cc15a32b71532a500815bf83b22c0157a62de2b,2025-01-11T08:15:24.680000
|
||||
CVE-2024-11916,0,1,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000
|
||||
CVE-2024-11916,0,0,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000
|
||||
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
|
||||
CVE-2024-1192,0,0,4521fc6ae268791ebd6da2ad80ce9552b7ae38c5833cb5098776b1906357f9a0,2025-01-08T14:35:22.633000
|
||||
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
|
||||
@ -245444,9 +245445,9 @@ CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74
|
||||
CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000
|
||||
CVE-2024-12606,0,0,22dbeb9ccb7de3748ffcb5a9742ed9efae0d34cb977177faf680cf3e4f662ce5,2025-01-10T04:15:19.667000
|
||||
CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000
|
||||
CVE-2024-12613,0,0,17ef13e8555c69068e4fa02b53cb81098153e1f551058b907c691c77374dc1a6,2025-01-16T10:15:07.633000
|
||||
CVE-2024-12614,0,0,e571b4e4491487f2f9e819ccc16fae6c0ac59e6cfb7ed30e8d5046638d60453c,2025-01-16T10:15:08.023000
|
||||
CVE-2024-12615,0,0,bf0a4dcec7d9520733542eb42362ef30d25c98232bfadbee356ba2a388d2079e,2025-01-16T10:15:08.380000
|
||||
CVE-2024-12613,0,1,7dd856ce73c7c9a995010e01aad16c5eee77060b0b2db6bbab6d0cdb4cee95e9,2025-01-17T22:17:16.967000
|
||||
CVE-2024-12614,0,1,85c73f48edb54993612da38f79df29849481d1d0bbf1a99bc0613daba18ae317,2025-01-17T22:17:15.190000
|
||||
CVE-2024-12615,0,1,6e994a8d3113ca6f9de4c4e061e53b865bfdcf07b29aa5840c39b6ffd2b32fac,2025-01-17T22:17:11.650000
|
||||
CVE-2024-12616,0,0,77a54d2c4fc323087210e2a6a22bc6796e40cd4e337b416a96bae19b39d4476a,2025-01-09T11:15:14.970000
|
||||
CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000
|
||||
CVE-2024-12618,0,0,9a78b540470b044696728715f2dbde7ff3f05b2e5efee894087a680363f0dace,2025-01-09T11:15:15.193000
|
||||
@ -245593,7 +245594,7 @@ CVE-2024-12848,0,0,95ac60390486f7accc1a4c21b3c339a643ce34c81e0e6f7a88c7c7253bce5
|
||||
CVE-2024-12849,0,0,3437660a93e3ba43e7759c6102f16953543e1a3c3d091452a24c483dbd6bd5de,2025-01-07T06:15:17.607000
|
||||
CVE-2024-1285,0,0,6f25c863c73c3b70a1777f6b7ea15f17f9158b6669df8af6e4411802154a74d9,2025-01-08T17:13:54.647000
|
||||
CVE-2024-12850,0,0,075205b205303999a6a29790d3e10f6b915eaaea804fbc90dec0f08e9b7ce1f4,2024-12-24T10:15:06.033000
|
||||
CVE-2024-12851,0,1,739e2bee0532c97834ac7b49f8423e4644c5e740b4838d9d7c66421a1853e33a,2025-01-17T20:47:22.757000
|
||||
CVE-2024-12851,0,0,739e2bee0532c97834ac7b49f8423e4644c5e740b4838d9d7c66421a1853e33a,2025-01-17T20:47:22.757000
|
||||
CVE-2024-12852,0,0,956342645c2c9c3b82a820b6a59451a9a24604b5dbbad73965c12b7f863032fc,2025-01-08T07:15:27.250000
|
||||
CVE-2024-12853,0,0,41257905fe1b8024a4b0abaa09fe8324bc7a9ba4b9ffaf1cfe293b8b9bbd7a08,2025-01-08T10:15:06.903000
|
||||
CVE-2024-12854,0,0,69236f9eafc0f2c7414eefa82874add13ee2f0264bbd1b7a7471ee6aa8d8128f,2025-01-08T10:15:07.120000
|
||||
@ -245730,7 +245731,7 @@ CVE-2024-13022,0,0,90bb63d1bc90626e0499ce8896752c6e5ed50822b829721b8cf1b7b0080af
|
||||
CVE-2024-13023,0,0,d029eb35c9bdf0045e63a954d82e8162ce974ac9ca1940b6ad8d92005bea27e7,2024-12-29T21:15:06.020000
|
||||
CVE-2024-13024,0,0,2d443fd15bbce33c05ab26d4fb4c87b3a41715b85dfb24d19e706acdb51ba0ef,2024-12-29T21:15:06.220000
|
||||
CVE-2024-13025,0,0,49213aeccb84de269a6cda473f64c9cd212034f3fe128e40066ff20ce3282b78,2024-12-30T18:15:09.273000
|
||||
CVE-2024-13026,1,1,82a449cf89ff406cec5c1a223488a6ac04dd2d898424ead123b337ba8c82ad89,2025-01-17T20:15:27.600000
|
||||
CVE-2024-13026,0,0,82a449cf89ff406cec5c1a223488a6ac04dd2d898424ead123b337ba8c82ad89,2025-01-17T20:15:27.600000
|
||||
CVE-2024-13028,0,0,fa93211a2bdb9a3d16a1438985d05a65ae11871db310d3e60efe2083e10fb468,2024-12-29T23:15:06.030000
|
||||
CVE-2024-13029,0,0,3645cd09171242525298fe881249dfcae0b5fc3148bc05a911d0c24263b4be86,2024-12-30T00:15:04.837000
|
||||
CVE-2024-1303,0,0,922ad92b627c1129d744b1f80cb5c88d28598a22649a8dddf52c9956281bb86f,2024-11-21T08:50:16.593000
|
||||
@ -246002,7 +246003,7 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166
|
||||
CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000
|
||||
CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000
|
||||
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
|
||||
CVE-2024-1358,0,1,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
|
||||
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
|
||||
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
|
||||
CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000
|
||||
CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000
|
||||
@ -246035,9 +246036,9 @@ CVE-2024-1387,0,0,2c2f906637a61e38d38a9b0ca47ff4dc68c131d6fabb5f801315dfb2710ce0
|
||||
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
|
||||
CVE-2024-1389,0,0,5873690e0845507df8953cc4f63b4ccd0c40998cbb5a2b9d552ef1fc675e0a5e,2024-11-21T08:50:28.477000
|
||||
CVE-2024-1390,0,0,37b0dff04be1b8b0f2a887698f2eb84de50a3b7e7acefe6e7e54550c938a7935,2024-11-21T08:50:28.600000
|
||||
CVE-2024-1391,0,1,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||
CVE-2024-1392,0,1,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
CVE-2024-1393,0,1,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
|
||||
CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000
|
||||
CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000
|
||||
@ -246066,7 +246067,7 @@ CVE-2024-1418,0,0,22561da6c61f825effad6710d5e038f72164164027714334fbeb98ec73fee7
|
||||
CVE-2024-1419,0,0,42ab1fc2d6ab9ca492a38fb437634f1d4cac86970a1dc12ed30b178360f9c764,2024-11-21T08:50:32.870000
|
||||
CVE-2024-1420,0,0,87cbde692a44b30138e5311554a8fe03ab6752ef419e674117c5a1abadbc52bd,2024-02-12T15:15:07.733000
|
||||
CVE-2024-1421,0,0,0e761ebddf75c548cf7dd6af07abf9548a53b36a5b8589a388f6af75094a73b3,2024-11-21T08:50:33.003000
|
||||
CVE-2024-1422,0,1,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000
|
||||
CVE-2024-1422,0,0,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000
|
||||
CVE-2024-1423,0,0,cf9424b269ea30f1f1f93fb8aca6f7020e19a4ef0b7ad3a1dcf8f2e9317f1810,2024-02-27T15:15:07.460000
|
||||
CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a41,2024-11-21T08:50:33.260000
|
||||
CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000
|
||||
@ -246515,7 +246516,7 @@ CVE-2024-1899,0,0,40fb5e76195a966ed2f9c2f9f806f40458f96148e21a41dc2acf991f4cece8
|
||||
CVE-2024-1900,0,0,f881fab7684a20d971b8a8aa44c738635846f8721e30624ba500440528156b1c,2024-11-21T08:51:33.443000
|
||||
CVE-2024-1901,0,0,7c912c9d925cface47b3667a73bd4854a08825c4b20741b5a200d0c51e0913f0,2024-11-21T08:51:33.640000
|
||||
CVE-2024-1902,0,0,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000
|
||||
CVE-2024-1904,0,1,3fb619cb9530adc2f228f4cf1f926fd91d0755f05f626abfed13b0242d8ac681,2025-01-17T19:22:36.853000
|
||||
CVE-2024-1904,0,0,3fb619cb9530adc2f228f4cf1f926fd91d0755f05f626abfed13b0242d8ac681,2025-01-17T19:22:36.853000
|
||||
CVE-2024-1905,0,0,9438b0be2531bbc1baec0a545feda53b61cecb9096148dc315dd330c5967f3c0,2024-11-21T08:51:34.117000
|
||||
CVE-2024-1906,0,0,585b2a5ddfa9da688ccc05c3adce2c6e116818c5e5c9fa6b8b8e48d0db1d5628,2025-01-07T14:34:56.787000
|
||||
CVE-2024-1907,0,0,54b36b562379da23fdf0e9559b6c1372c4bc0a1e4af6c39ddfeaf398b35ceab8,2025-01-07T14:34:27.417000
|
||||
@ -246596,7 +246597,7 @@ CVE-2024-1986,0,0,9a8f0eee78ceace023fbaae1731849068919c7cb8b85b99d980679ab3b4a94
|
||||
CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000
|
||||
CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000
|
||||
CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000
|
||||
CVE-2024-1990,0,1,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000
|
||||
CVE-2024-1990,0,0,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000
|
||||
CVE-2024-1991,0,0,3f483f3ae7b7a904e68a16f960d0742fa77cd9a15dddb9bd88a60a002c10365a,2024-11-21T08:51:45.033000
|
||||
CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000
|
||||
CVE-2024-1993,0,0,010d59aa4d31f8f60f42634d27cfbdf469d8f3f88be31616056c1b25e622a672,2024-11-21T08:51:45.183000
|
||||
@ -246957,7 +246958,7 @@ CVE-2024-20416,0,0,273ee00425f01d60b03c693c8cbc646195093da5a971d2cedee90941275bc
|
||||
CVE-2024-20417,0,0,8d6689b774b826299be686eb353fb8c6a46665a0574bf3b92cad6c4181365066,2024-08-22T12:48:02.790000
|
||||
CVE-2024-20418,0,0,78e92fa90165573b2bf91db19398fd27b2d59cbe1df9f9973b1fe6c910c833d8,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20419,0,0,b7a07e52e55ec37dcedd038a63d58760cf8d25f8aeb5d5655fd15240f80b5276,2024-11-21T08:52:35.887000
|
||||
CVE-2024-2042,0,1,08e54f8cbf88478a6dc057bcb8ac9f29d00de3bbfb904223d2b0e22660927020,2025-01-17T19:57:25.747000
|
||||
CVE-2024-2042,0,0,08e54f8cbf88478a6dc057bcb8ac9f29d00de3bbfb904223d2b0e22660927020,2025-01-17T19:57:25.747000
|
||||
CVE-2024-20420,0,0,83b9e03d7a71760da83231fa0a3cc89531489fdb524ac42b99087108afa4413f,2024-10-31T14:35:05.980000
|
||||
CVE-2024-20421,0,0,41945c40188e5bea99a955c2e7ed6ffca996a7aa12b6b996aa91405a9cae04fe,2024-10-31T14:35:06.853000
|
||||
CVE-2024-20424,0,0,aa090d93f13e6508c14839062b8468dcc526f2531d5d6053b9aca3b7c672acf5,2024-11-01T18:07:44.057000
|
||||
@ -247862,7 +247863,7 @@ CVE-2024-21405,0,0,3e6dea45078ef40ec2e5cc252eeb8e66344281f8f13d2c5561347a4506294
|
||||
CVE-2024-21406,0,0,c3c5e6f5abd31ba504c5e779a20922c9520fef7dad2cf137662a3736daac3074,2024-11-21T08:54:17.750000
|
||||
CVE-2024-21407,0,0,61ca144d76c93aa5467e49bd9c2efd72d906e8b334691cc56a48356a7e8e1044,2024-11-21T08:54:17.900000
|
||||
CVE-2024-21408,0,0,a6229327b01f5c72f23988c3a60a0a48d9605f36b6855597610f5db381fdcfcb,2024-11-21T08:54:18.060000
|
||||
CVE-2024-21409,0,1,1c7d183cf8153f501da98ff2724d60d58255ee684a46f298519b0e98a61d9285,2025-01-17T20:15:27.787000
|
||||
CVE-2024-21409,0,0,1c7d183cf8153f501da98ff2724d60d58255ee684a46f298519b0e98a61d9285,2025-01-17T20:15:27.787000
|
||||
CVE-2024-2141,0,0,e25edc3e366c33121ab88f864948d943b2cc55f959cde5bf1ebbabb3fc09fbe8,2024-11-21T09:09:07.003000
|
||||
CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000
|
||||
CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000
|
||||
@ -248080,7 +248081,7 @@ CVE-2024-21637,0,0,1140ba166277eae389c521b36c0621316eb6057fc838a547a74c3d24196ab
|
||||
CVE-2024-21638,0,0,0f4b6119a82ba5623983a2b749ce9df1d0c594b7e3d3bb8f84381915080f5040,2024-11-21T08:54:46.663000
|
||||
CVE-2024-21639,0,0,5276ce2d1a6f7b6f75781a1f3dc058d7ecaf22f670ec18133c7f7d3a65b3bddf,2024-11-21T08:54:46.790000
|
||||
CVE-2024-21640,0,0,d1f2f6f27ac6ed2f5703893479d90d543efb6655c01092ab7d45d8a3b99269c5,2024-11-21T08:54:46.913000
|
||||
CVE-2024-21641,0,1,db050d79964c69ce96e1eb1aac883318fa1a8cab751a50d091175bb753f0f1a9,2025-01-17T19:15:28.590000
|
||||
CVE-2024-21641,0,0,db050d79964c69ce96e1eb1aac883318fa1a8cab751a50d091175bb753f0f1a9,2025-01-17T19:15:28.590000
|
||||
CVE-2024-21642,0,0,de70a6bfa950a627ab65c75fa7dad1a3416dbc3fb8ff08d3dde22e7f5d32b06e,2024-11-21T08:54:47.160000
|
||||
CVE-2024-21643,0,0,32fdcb45a95ed76c8eb6f74a98faf450c608a66c40d280a4146a4ece6b7d89c7,2024-11-21T08:54:47.280000
|
||||
CVE-2024-21644,0,0,cb8e43fb0db69ebecec7d4b37165179645cedf9336385f238216782049be95e2,2024-11-21T08:54:47.407000
|
||||
@ -248776,7 +248777,7 @@ CVE-2024-22416,0,0,ce5a0d6e72a6db893e55bf13b4a84406e9dde4fefaa4a731b34365d5bd9fa
|
||||
CVE-2024-22417,0,0,a6b201629695816fff1bfd926d3044da5ae33025799cda6e08350c8b2f9a32c5,2024-11-21T08:56:14.690000
|
||||
CVE-2024-22418,0,0,9967051e7be6dca739557da2248e47213dc367d3971baec1a01bb8d0fd807a65,2024-11-21T08:56:14.857000
|
||||
CVE-2024-22419,0,0,905426a4394067aa7259c60f5a063467a09e54d19e7b59fae0c1424d42e6ec45,2024-11-21T08:56:15.020000
|
||||
CVE-2024-2242,0,1,875bde67f4e55e9edc704b7e69f21e4fad6e457089626b8d7b7f847232aa7536,2025-01-17T19:57:07.283000
|
||||
CVE-2024-2242,0,0,875bde67f4e55e9edc704b7e69f21e4fad6e457089626b8d7b7f847232aa7536,2025-01-17T19:57:07.283000
|
||||
CVE-2024-22420,0,0,024696f5e1270d1cdc81730d5d8a64dd81a093512a259d92223067db5a445130,2024-11-21T08:56:15.203000
|
||||
CVE-2024-22421,0,0,68ad10dfed72f3aca3738f68707fe94c502fe15e2d9ab9159832423762e11d44,2024-11-21T08:56:15.343000
|
||||
CVE-2024-22422,0,0,370a9051f3f2c4021b8468e74ec0889a82957024baf94c98a6d7fbfbc647291b,2024-11-21T08:56:15.487000
|
||||
@ -250756,7 +250757,7 @@ CVE-2024-25385,0,0,59ac22d49f2fad863547dec5a90c0c7a9b9f0475e0a1175434939147054ba
|
||||
CVE-2024-25386,0,0,56406e6fb98d0483e199e75526abcdd166cb1bbc8af5cb6a4a3846bb8e4462df,2024-11-21T09:00:42.437000
|
||||
CVE-2024-25388,0,0,d6e57a4ae8cf2758cb02e2bff996a06728f2a007c0c76d23c807db1db9644ae1,2024-11-21T09:00:42.660000
|
||||
CVE-2024-25389,0,0,c2b0698b0bd4f31a02466ca55b61acffcf8581a14c7d0397412e907bbbf1dd53,2024-11-21T09:00:42.890000
|
||||
CVE-2024-2539,0,1,1f5228a0fa2e0ca11e6e938126a0ec773f063beb0985a4005450b333ad9ae338,2025-01-17T19:20:18.470000
|
||||
CVE-2024-2539,0,0,1f5228a0fa2e0ca11e6e938126a0ec773f063beb0985a4005450b333ad9ae338,2025-01-17T19:20:18.470000
|
||||
CVE-2024-25390,0,0,c77040aacef696841b7e7aa474cba96c21df04aaf3673ec4e97d2f452d4f0584,2024-11-21T09:00:43.123000
|
||||
CVE-2024-25391,0,0,da9cb877ec1c28c6b122310a0eb79d771f3c52280b5b2b78b017d9345e03ec37,2024-11-21T09:00:43.340000
|
||||
CVE-2024-25392,0,0,11d51bf11eeeceb6ace20ccc3cd98a5983b38266eb598b75f0b4a9733ad17238,2024-11-21T09:00:43.550000
|
||||
@ -251592,7 +251593,7 @@ CVE-2024-2654,0,0,856aaf05d41c60ee2c85d4fc3321f895fbd088078df5e99f877e9b71221f4e
|
||||
CVE-2024-26540,0,0,5970c3a2d028ecebe91244fa68ea154ff04c44c8c8a65c7d51e6549924364887,2024-11-21T09:02:32.843000
|
||||
CVE-2024-26542,0,0,005342b86fb12fcb5776ff8acf0dbdaf45e957519ff7c276f4bd35750e623b36,2024-11-21T09:02:33.060000
|
||||
CVE-2024-26548,0,0,52535dde3cb49a827020d0dd3b0109d887b5f1701428dae937ca95f7c0db795b,2024-11-21T09:02:33.270000
|
||||
CVE-2024-2655,0,1,0feab97c289640bf500dd7527d61858533072964c9502239802f5c822f5470cc,2025-01-17T19:18:36.207000
|
||||
CVE-2024-2655,0,0,0feab97c289640bf500dd7527d61858533072964c9502239802f5c822f5470cc,2025-01-17T19:18:36.207000
|
||||
CVE-2024-26557,0,0,5030fca45521e6854401bf94aaafb7cf9024afdf103c06b91e5b7a83eb21bc1f,2024-11-21T09:02:33.473000
|
||||
CVE-2024-26559,0,0,77579a317422b2517728ee5978bc7ec2f8eaf2102b599e2c765a82e7b784719f,2024-11-21T09:02:33.640000
|
||||
CVE-2024-2656,0,0,8da716d6d289821d1b7475ad4430d9bb42beb8c3503e9dc5c8fa548d820bbebb,2024-11-21T09:10:13.570000
|
||||
@ -253861,7 +253862,7 @@ CVE-2024-29402,0,0,823440ced7da8e7d0a8b3af16f5a511cd429be38a31d64a72a1bb56686617
|
||||
CVE-2024-29404,0,0,8e0768ffa0e6271c10ef5a904f790cba861a6a3d32897c4a1e9132b2e0d48d5c,2024-12-13T14:15:21.740000
|
||||
CVE-2024-2941,0,0,3e71967aa0c4cbd6af2eecc6a53b210ed6ca835a6b57f301721a578e1f34e48d,2024-11-21T09:10:53.607000
|
||||
CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000
|
||||
CVE-2024-29415,0,1,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000
|
||||
CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000
|
||||
CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000
|
||||
CVE-2024-29419,0,0,2f3442ac6427a352cbbf9021272e009750360630cf456587e3262353974b9774,2024-11-21T09:08:01.520000
|
||||
CVE-2024-2942,0,0,c582b913b7e1aa03026ab0af4662fd77534dacff2215aab90e4e0f0fc5a28b07,2024-11-21T09:10:53.753000
|
||||
@ -255347,7 +255348,7 @@ CVE-2024-3134,0,0,8a39e4855d8d63cdafc0fb55b2b72495acc977f724df3a600d17eda7fe3bd2
|
||||
CVE-2024-31340,0,0,f846f9b41d1a7e3c60094da310944043379c35e273ee8f0fc6224f053f25016a,2024-11-21T09:13:19.617000
|
||||
CVE-2024-31341,0,0,b00d5886f7319c7cb32664ac877d125dd0889e61e4e3be95f0b8debdfd5f0dc5,2024-11-21T09:13:19.800000
|
||||
CVE-2024-31342,0,0,3f71a443075939346a164f889b5a1a10f44b0ffaada2af8a01d689a2b56757ae,2024-11-21T09:13:19.920000
|
||||
CVE-2024-31343,0,1,598bbc47f9055360a3856282f4b242ab5d2455d01aade215092c65730c33f807,2025-01-17T19:32:04.977000
|
||||
CVE-2024-31343,0,0,598bbc47f9055360a3856282f4b242ab5d2455d01aade215092c65730c33f807,2025-01-17T19:32:04.977000
|
||||
CVE-2024-31344,0,0,f083ab481feb1cfc3b74439afbde7e0804b226a14a90fe3c8d35a052df10131f,2024-11-21T09:13:20.173000
|
||||
CVE-2024-31345,0,0,14c52f9c3da5bdb90298c2b06fd58a68d1c79361ab0ea506debd4e9a43a476d3,2024-11-21T09:13:20.283000
|
||||
CVE-2024-31346,0,0,b972a4a46a8f82aecb8e6a911642668b9c99df971421a9cdb94fecde63fc42f7,2024-11-21T09:13:20.400000
|
||||
@ -255365,7 +255366,7 @@ CVE-2024-31356,0,0,61572d342d52a9f95b7f14ff954e86c998c7bae2cb6a9ab1b28b0b15e7946
|
||||
CVE-2024-31357,0,0,f0dabc113a60563e313c65ba34e72da05a3c68eb061735faa5c177e277cb6a87,2024-11-21T09:13:21.723000
|
||||
CVE-2024-31358,0,0,24f1b391e8c0073bd1720f4c9942be2b90dce97d5f6e3136e7a4f22304df3577,2024-11-21T09:13:21.850000
|
||||
CVE-2024-31359,0,0,b4a393ddc5be024e5127a716cac6d76c0dd542b36e97ecca2fcdaddfb152f530,2024-11-21T09:13:21.970000
|
||||
CVE-2024-3136,0,1,9e02aa4992302fe344595ff868f246169a934bd46e1b7ca8d370f5725a800866,2025-01-17T19:21:25.430000
|
||||
CVE-2024-3136,0,0,9e02aa4992302fe344595ff868f246169a934bd46e1b7ca8d370f5725a800866,2025-01-17T19:21:25.430000
|
||||
CVE-2024-31360,0,0,8cb5e974db070725c801d7c826083d98c0c6e0dc164cd395ec990085232931bc,2024-11-21T09:13:22.097000
|
||||
CVE-2024-31361,0,0,cd57a3ba85fbda740068fecaf7c25781b9ceeb2fe9afb57e7e9c1192b5574512,2024-11-21T09:13:22.220000
|
||||
CVE-2024-31362,0,0,e1e383b1b6021174784187d582f1cdfeb1828d1a7981c4a748eecb139f1930a5,2024-11-21T09:13:22.327000
|
||||
@ -255902,7 +255903,7 @@ CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b
|
||||
CVE-2024-32115,0,0,3c8a228f0b573fc5544521748051d92562cca7b9375133f8f23d502a90fd21ac,2025-01-14T15:15:15.387000
|
||||
CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000
|
||||
CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000
|
||||
CVE-2024-32118,0,1,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000
|
||||
CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000
|
||||
CVE-2024-32125,0,0,35c62d76638cb3e6e8a0b666fab0d78df4c4a5a2cc2247a2353bf686c3ce91e4,2024-11-21T09:14:30.493000
|
||||
CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000
|
||||
CVE-2024-32127,0,0,dded2ba7f0afc7a4f66304fe4ecc3b2ff22d2370ed0fac28ea97950754f4c2c6,2024-11-21T09:14:30.743000
|
||||
@ -256904,7 +256905,7 @@ CVE-2024-33506,0,0,ebc73da9186542bc574ff2ffa1bd0018ebfe9872b5e96093b78710739d042
|
||||
CVE-2024-33508,0,0,3b76b0d03aba3d39a9333effe55dda5557e5f1c6adb532df7c6b80bfe8c854e4,2024-09-20T19:48:06.197000
|
||||
CVE-2024-33509,0,0,11ba9153d706e68229ce986557f07cc698790121f85f23f3dcb45f7cca9bacc8,2024-11-21T09:17:02.900000
|
||||
CVE-2024-3351,0,0,fdd55a913ea8ca434b668d00d42f466f17e8d7ad8fab0600f36cb4e91885e476,2024-11-21T09:29:26.227000
|
||||
CVE-2024-33510,0,1,41c46c0d1bdff1476309e4ca2fd63171fd38acedd7b65a6422e43ced8af09809,2025-01-17T20:35:31.247000
|
||||
CVE-2024-33510,0,0,41c46c0d1bdff1476309e4ca2fd63171fd38acedd7b65a6422e43ced8af09809,2025-01-17T20:35:31.247000
|
||||
CVE-2024-33511,0,0,526fe159ade6529bd19d0c08778644f889465aaf60097f6c4a4eb6711afe8076,2024-11-21T09:17:03.143000
|
||||
CVE-2024-33512,0,0,4574fb7abf2a92458d61a56576bea04c4638c0bb9b288fef0012c5d9672244e5,2024-11-21T09:17:03.290000
|
||||
CVE-2024-33513,0,0,8a8fc6e4e71d77b3f0c09c008c86b819c457cad410cec5e46bbb67435dedeb95,2024-11-21T09:17:03.413000
|
||||
@ -258253,7 +258254,7 @@ CVE-2024-35270,0,0,54fc0aef882c68b0af36e2a2e87ea567a3f0433770da6d3701c29cb540de6
|
||||
CVE-2024-35271,0,0,53435ea3e84efa467a9bdfc22250170e3299e5610ce3c91fa1af50680f120201,2024-11-21T09:20:03.527000
|
||||
CVE-2024-35272,0,0,7c25fd9425a5925ce7b680ae430dc4c99441fca7143b7504eaba903c26bfba9b,2024-11-21T09:20:03.667000
|
||||
CVE-2024-35273,0,0,9ab858ebb346d630e6bbf8da2157e41f0d8e42e4a4c1d3d1d26beda7fb4bf411,2025-01-14T14:15:29.663000
|
||||
CVE-2024-35274,0,1,b634b8288c0dfdfa69709dbe44a7d735931faaa8485a146c2a3cc42a8a1673b2,2025-01-17T20:29:43.327000
|
||||
CVE-2024-35274,0,0,b634b8288c0dfdfa69709dbe44a7d735931faaa8485a146c2a3cc42a8a1673b2,2025-01-17T20:29:43.327000
|
||||
CVE-2024-35275,0,0,db920a4838b9e37c71b9bc6fd6d2d69f628712cc99e5de16479c022646ccb044,2025-01-14T14:15:29.817000
|
||||
CVE-2024-35276,0,0,4c959b5ba1a33576ed209445d5bbc58fbac65866e46c0631f77c80bdc2461b2f,2025-01-14T14:15:29.973000
|
||||
CVE-2024-35277,0,0,1f41c5934d010de66ad104c6e38cd26c146e0cb4b1b59e8e833cdfbc61bc9a2c,2025-01-14T14:15:30.130000
|
||||
@ -261188,7 +261189,7 @@ CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c99950
|
||||
CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000
|
||||
CVE-2024-3880,0,0,05ad02535029fe300c22028f294905db3effcae3d9f6a9c08e2e8efe572ad3c1,2024-11-21T09:30:37.263000
|
||||
CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000
|
||||
CVE-2024-38807,0,1,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000
|
||||
CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000
|
||||
CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000
|
||||
CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000
|
||||
CVE-2024-3881,0,0,1c9f85fd80cca491c38bc78c8ef5005187e956d6680406848ed713e292f20d1d,2024-11-21T09:30:37.407000
|
||||
@ -261335,10 +261336,10 @@ CVE-2024-3905,0,0,4c80ed85238faf80c10f5a55c3b441f63de24b896b80922a247980fa1e8d8f
|
||||
CVE-2024-3906,0,0,38d5ab7d7295bbfbf8fda50b3a718f84612bcac7a5bf8734ddc0e18ea8e0ca6c,2024-11-21T09:30:40.170000
|
||||
CVE-2024-39063,0,0,1f8e26cf4e98abfdc7b6058f73f534bd52a0245eabab786c5a57812027f6a139,2024-11-21T09:27:10.580000
|
||||
CVE-2024-39069,0,0,df07d5b4e498e68eab0525d09eafd252e5aae6cc734f27b8571431c3959a392e,2024-11-21T09:27:10.793000
|
||||
CVE-2024-3907,0,0,1a0f3fda369fc08d9c55f5d25dfe1ae1c5bf9cb244d8afca8d400cc9c35cbc80,2024-11-21T09:30:40.303000
|
||||
CVE-2024-3907,0,1,d33abb7499d8bdfc0449d1ce0b19211840dd2ba2d6c9eb538b65c815ab9ef15f,2025-01-17T21:21:37.327000
|
||||
CVE-2024-39071,0,0,bcf49297986e31d2062e985568f055f9ac47c400defe91dd2a64b6e8784beffa,2024-11-21T09:27:10.997000
|
||||
CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a476,2024-11-21T09:27:11.203000
|
||||
CVE-2024-3908,0,0,1c733ce2eacb0037fcd287dd4aefa5557907db7b2f29c3e50b378d6cffa40154,2024-11-21T09:30:40.433000
|
||||
CVE-2024-3908,0,1,9ae7a3395f82376068b28a5a66b47db9023d7d608b35c761f458f643cc6e3617,2025-01-17T21:16:07.327000
|
||||
CVE-2024-39081,0,0,29ab3d686e2b6d4ec4a310846650a5756a54f10027b101688be62026057df595,2024-10-01T15:51:30.237000
|
||||
CVE-2024-3909,0,0,7558d94419a80b4787ddbb5aa4ff5bc9036caa4b45c2d36a6cd8f69e85924d21,2024-11-21T09:30:40.570000
|
||||
CVE-2024-39090,0,0,c1fb932b3c7852f6751439bcd02ca4ef3c48bbe1e8476802f1cae84e9705ca59,2024-11-21T09:27:11.500000
|
||||
@ -262016,7 +262017,7 @@ CVE-2024-39904,0,0,c25a670401bfc26df8afcb7510809458f883fcd709af93a20a1029e5f5b91
|
||||
CVE-2024-39905,0,0,d79772b7ab69602842d543f2aa4b14bfae95db33b08992cb0b4a652162ac9ab0,2024-11-21T09:28:32.333000
|
||||
CVE-2024-39906,0,0,8d84350de04535242f8eba72f437fedb14fc0f4312838c85d0cb07a5dd7eabf7,2024-11-21T09:28:32.470000
|
||||
CVE-2024-39907,0,0,edf57fcc33358c073aa915be7687ed4c74053eee07257c0ad5a7a4d29826ac2c,2024-11-21T09:28:32.600000
|
||||
CVE-2024-39908,0,1,a6dcf6760b0b9fadd4df0a6808959b67696a98faed411226ac5f767e57357d30,2025-01-17T20:15:28.250000
|
||||
CVE-2024-39908,0,0,a6dcf6760b0b9fadd4df0a6808959b67696a98faed411226ac5f767e57357d30,2025-01-17T20:15:28.250000
|
||||
CVE-2024-39909,0,0,9d88933c61918df2ab3a46b346780be6fb4993d20f3c89b1a28d0310c14f463f,2024-11-21T09:28:32.873000
|
||||
CVE-2024-3991,0,0,08484fa30be32cf1d03fb643f139be84ebb0c34a79eeb48a7dfe85b33cdb2bd0,2024-11-21T09:30:51.813000
|
||||
CVE-2024-39910,0,0,dbf23b9bd5c1278ce3098904e5fab34d72b7a29e6eab68c3cb0b804733b304d4,2024-09-29T00:33:03.740000
|
||||
@ -263256,7 +263257,7 @@ CVE-2024-41942,0,0,535ebcb4b97c78bedf2f7311ce0f48835e7e8fe72ce0eede852eddf65bfe7
|
||||
CVE-2024-41943,0,0,b401c9597fea52061b292b5edf2ea2b1816277516e1c8124372a15f0d38f4602,2024-11-21T09:33:19.043000
|
||||
CVE-2024-41944,0,0,b81db67673e0a559dd65eb2ed0cfc77ac77482224d4f913fa794d14608de7fbd,2024-11-21T09:33:19.157000
|
||||
CVE-2024-41945,0,0,545083983c906452c705c32959e61f1e138d28b245f7dee7128036882422c3fc,2024-11-21T09:33:19.287000
|
||||
CVE-2024-41946,0,1,ebf7d045a612de7e8a5027be0a47987383beb029532620895ad2ec00ca4eb0bc,2025-01-17T20:15:28.380000
|
||||
CVE-2024-41946,0,0,ebf7d045a612de7e8a5027be0a47987383beb029532620895ad2ec00ca4eb0bc,2025-01-17T20:15:28.380000
|
||||
CVE-2024-41947,0,0,90712920d19210817cb67aa5bcd0865a5a2c6aa7439a01baa7857fbe40516e3f,2024-09-06T20:46:01.477000
|
||||
CVE-2024-41948,0,0,78d1c056fee2c5dcee03b1552ca1ce273973bb0e550a762cd83c60abf036b586,2024-08-09T18:38:47.533000
|
||||
CVE-2024-41949,0,0,ba00371f44252e55246d1a7d2f5fa0dfa7605953cf6a28d48eec18833be56179,2024-08-09T18:32:53.153000
|
||||
@ -264484,7 +264485,7 @@ CVE-2024-43496,0,0,0242182724a163d34b64c27570d48e74fec7fa3a5f31ed50af5812f9b730b
|
||||
CVE-2024-43497,0,0,4bdb08b5512720098aa53f39c82776e46a94d92f13bb4d00fa631640bfc3bf61,2024-10-17T21:15:30.827000
|
||||
CVE-2024-43498,0,0,6823453d1785ee41df601df301c6e3cbcce61135bd27efcd9a921959505dcc3f,2024-11-19T20:01:04.877000
|
||||
CVE-2024-43499,0,0,617c6fff156980c452bf6c4c76a89367a4c75ee7ac3fdaf302e79bd6407a3cbe,2024-11-19T19:59:24.387000
|
||||
CVE-2024-4350,0,0,0ad31aad7d22cd728edc1e8327fa0c37f0d9e5f2114e3890806b3b638b4bd639,2024-08-30T18:18:37.130000
|
||||
CVE-2024-4350,0,1,2a936f9de7c8d535efaa1c3655498f0d6d0ce4a92e8ebb4b6b597f0f26aafd89,2025-01-17T22:15:28.360000
|
||||
CVE-2024-43500,0,0,5e4bf5d707a97d7bfb742090bc769e9ddd0238eb88135f00a956546aaa90a719,2024-10-17T21:01:08.067000
|
||||
CVE-2024-43501,0,0,98f378daa7e7080e336d485a2f2ce640128c09b69b8e9cd5a55d4c6b948536cb,2024-10-17T21:06:07.377000
|
||||
CVE-2024-43502,0,0,a031736eda864dd857ef3d2503e2b864fcbd3df5434b6415a6233eaac1b922e7,2024-10-17T20:58:37.107000
|
||||
@ -264515,7 +264516,7 @@ CVE-2024-43526,0,0,d54f8d3df06e63578ea31a5b5f5a0499f3e25359a79ddf071f80ea9020ddf
|
||||
CVE-2024-43527,0,0,cf43baa77e520ba66e08c4469fab788ecc2cd5afada491e82545c4ff70097831,2024-10-17T18:18:08.877000
|
||||
CVE-2024-43528,0,0,3b7ddee05c3362a1c6c17e49a12b4a951ee30686e6e392e28452d63584be2ccd,2024-10-16T21:47:05.543000
|
||||
CVE-2024-43529,0,0,31731c35d1f6f78789cb51bf5d48475173d7e19ca743804ee36963b47e9d807a,2024-10-16T21:48:07.683000
|
||||
CVE-2024-4353,0,0,b5340d839919aa23c3d0c2526a7112ce3f0b7f2316cd4631ccb03ed28b08ea5b,2024-12-16T19:08:05.467000
|
||||
CVE-2024-4353,0,1,4ffccafc3bf4ca0705afabb86a0c2986583233b5fcf3d09f91b99af57e2570bc,2025-01-17T22:15:28.510000
|
||||
CVE-2024-43530,0,0,35f67c50080a3f5ab2620813a784f901c8c482b8af17231e86829e6b0457ad79,2024-11-19T03:52:28.357000
|
||||
CVE-2024-43532,0,0,140eee66da6b8d85edd0f2673901f2a7c7e0bdac0ab41cbb82dcfca2e573c283,2024-10-16T21:51:34.370000
|
||||
CVE-2024-43533,0,0,14fdffec7e07d6529aba3d90037ad8500f7888787d7e8b9da221ae33348dc78d,2024-10-16T21:48:30.067000
|
||||
@ -267637,7 +267638,7 @@ CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c2
|
||||
CVE-2024-47903,0,0,0c6cef1ca40c315b435460659456fbef42fad928d34e10fedc61c687cf9e7cd1,2024-10-30T15:54:34.647000
|
||||
CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d43d6,2024-10-30T15:39:06.020000
|
||||
CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000
|
||||
CVE-2024-47906,0,1,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000
|
||||
CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000
|
||||
CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000
|
||||
CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000
|
||||
CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000
|
||||
@ -270942,7 +270943,7 @@ CVE-2024-52865,0,0,5d09c59cf2b4fe7df00e6e85adc4b0f685431645dbcb69f48b719d3b7eecb
|
||||
CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000
|
||||
CVE-2024-52869,0,0,e0274197b53af25ceec7228d280f45262bb697201ad58fd74dcd6e7042363fe7,2025-01-08T21:15:12.523000
|
||||
CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000
|
||||
CVE-2024-52870,1,1,2044bb354c0ef18d0d39e7296895a5f738c04920123dc7a4233f523d08e77681,2025-01-17T20:15:28.527000
|
||||
CVE-2024-52870,0,1,285cbf7f66ae06ab6cf0ba5cd4a799e03813969b3816af7fe51a71da5b5b8a42,2025-01-17T22:15:28.663000
|
||||
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
|
||||
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
|
||||
CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000
|
||||
@ -271308,7 +271309,7 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065
|
||||
CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b67a,2024-11-21T09:47:26.997000
|
||||
CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000
|
||||
CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000
|
||||
CVE-2024-53407,0,0,4a55e9f5f4e9c98382c7226d7b0e05d3471728a49b843f19b760e106979f5ffb,2025-01-15T23:15:09.263000
|
||||
CVE-2024-53407,0,1,a9f08a2a8b48dbaa4752120065410e5d3389d13fa41e9ba37732894187dbca00,2025-01-17T22:51:40.307000
|
||||
CVE-2024-5341,0,0,5035641083613f7715a9cc55e9dc02da384db0018776b0363e78acae939d270c,2024-11-21T09:47:27.407000
|
||||
CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000
|
||||
CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000
|
||||
@ -272303,7 +272304,7 @@ CVE-2024-55494,0,0,a1b10176f7d1839512005775c9e7583ed311f893fd691a402dee6bebdd80d
|
||||
CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000
|
||||
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
|
||||
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
||||
CVE-2024-55503,0,0,3178e626ab6aa02cde3a243a7db09cdb3cc0d580d5e6c88eda4e3ee59de8b93c,2025-01-15T23:15:09.390000
|
||||
CVE-2024-55503,0,1,064b1132dd99b0fc79a8dd51ea340f43a83611c4433b6171fe0e3b54bc9f811d,2025-01-17T22:51:48.330000
|
||||
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
|
||||
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
|
||||
CVE-2024-55507,0,0,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000
|
||||
@ -273166,10 +273167,12 @@ CVE-2024-57023,0,0,d41df66e12ee48dea9911b68b69fd3e2dd6413bff89fbe7d5f003eb0363c9
|
||||
CVE-2024-57024,0,0,1beec8a751780ae175322494ef7070044d054f1fa5e0ef48a3b87e0391061ef3,2025-01-15T17:15:18.280000
|
||||
CVE-2024-57025,0,0,ffe0150ee7bafc58fb550b4d8a1a7a0168a0884a7f8c6275ccd41663b84022f7,2025-01-15T17:15:18.377000
|
||||
CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000
|
||||
CVE-2024-57030,1,1,e09a8a5add52558ad8dc576a6d31b3927ba13f9420c4220db450326f4cc891a2,2025-01-17T20:15:28.667000
|
||||
CVE-2024-57031,1,1,4ff5f488d31f759c2a25a0bc73d06eb69144a5d62732bdf899ef3bb385fbb9c9,2025-01-17T20:15:28.790000
|
||||
CVE-2024-57032,1,1,f0c8cdf6b3c394b5e47d51ddbb69c4bd9b1af03bcc3de3e6a67be5cab57d5ba1,2025-01-17T20:15:28.910000
|
||||
CVE-2024-57034,1,1,50df6e932372fb174fa2655a86da7a03168323e2cde159cbd71ecb63a50e56dc,2025-01-17T20:15:29.020000
|
||||
CVE-2024-57030,0,1,e2085dbd261ee8fb49a18a0a03fb91173298ac1c000f3b1b7e66eedd701a1450,2025-01-17T21:15:09.823000
|
||||
CVE-2024-57031,0,0,4ff5f488d31f759c2a25a0bc73d06eb69144a5d62732bdf899ef3bb385fbb9c9,2025-01-17T20:15:28.790000
|
||||
CVE-2024-57032,0,0,f0c8cdf6b3c394b5e47d51ddbb69c4bd9b1af03bcc3de3e6a67be5cab57d5ba1,2025-01-17T20:15:28.910000
|
||||
CVE-2024-57033,1,1,6fc47549a06b46925031c839aeeb554403f3e3a332a3da55b165b2b40d57fd82,2025-01-17T21:15:09.980000
|
||||
CVE-2024-57034,0,0,50df6e932372fb174fa2655a86da7a03168323e2cde159cbd71ecb63a50e56dc,2025-01-17T20:15:29.020000
|
||||
CVE-2024-57035,1,1,052d5b092622afaf4ea0e57f5cee5a1ab42123cd321a83f80b5763b5f382972d,2025-01-17T21:15:10.100000
|
||||
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
|
||||
CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000
|
||||
CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000
|
||||
@ -273204,6 +273207,7 @@ CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c
|
||||
CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000
|
||||
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
|
||||
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
|
||||
CVE-2024-57252,1,1,628dc6b1296f8743687d596afba3a931ec7c07f8b9dd88efd06e94d742bfce54,2025-01-17T22:15:28.817000
|
||||
CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000
|
||||
CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000
|
||||
CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000
|
||||
@ -273215,10 +273219,10 @@ CVE-2024-5733,0,0,08c79914b3b228d8239c5511d15a5ec639094518968ef7bdf362b13a620582
|
||||
CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac34828502652b,2024-11-21T09:48:15.300000
|
||||
CVE-2024-5735,0,0,1aecf1dad861da728b2f9826c6f1c9c383af7e2a97744eeffda3009b167fdae6,2024-11-21T09:48:15.447000
|
||||
CVE-2024-5736,0,0,6b1b18dd72938ab32e71ae9b9c3e5aef903a076b6bda077e482ad25858245f35,2024-11-21T09:48:15.580000
|
||||
CVE-2024-57369,1,1,08768297729630cc31e03f050602de5b90fde20bc72ba089df28838013f0de04,2025-01-17T20:15:29.140000
|
||||
CVE-2024-57369,0,0,08768297729630cc31e03f050602de5b90fde20bc72ba089df28838013f0de04,2025-01-17T20:15:29.140000
|
||||
CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000
|
||||
CVE-2024-57370,1,1,7765e75c31c1bc6246006d57f06cb37946989154ae631d46e5284bdc42f2fbbc,2025-01-17T20:15:29.303000
|
||||
CVE-2024-57372,1,1,91a30a42ebb7ce1420695c8357e3034a19294d83f5a0fb757e229eec32d59c59,2025-01-17T20:15:29.447000
|
||||
CVE-2024-57370,0,0,7765e75c31c1bc6246006d57f06cb37946989154ae631d46e5284bdc42f2fbbc,2025-01-17T20:15:29.303000
|
||||
CVE-2024-57372,0,1,c305f1ff8dee898dc877fd7092322892cec8b12f543ffd49cc6c6aec831bb670,2025-01-17T22:15:28.957000
|
||||
CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000
|
||||
CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000
|
||||
CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000
|
||||
@ -274962,7 +274966,7 @@ CVE-2024-7508,0,0,a7d4299addf15fc74e07e60c708d376762d878236db909cc3b16cc673da8cb
|
||||
CVE-2024-7509,0,0,1d20a01ba25ba429690bc4a3d75ed6316644cb9406cd3eb90a5bb7d5e7873d40,2024-12-03T21:54:37.137000
|
||||
CVE-2024-7510,0,0,45504ac03358aed12f1633b52cd834d55efea8194dbc4d2192df23d30460f213,2024-12-03T21:36:54.357000
|
||||
CVE-2024-7511,0,0,9bf089a5dbb9957d15202d89b865f1149744d0ed4ad1c450b9f46cf07d7d9683,2024-12-03T21:31:50.467000
|
||||
CVE-2024-7512,0,0,cdc52e540a9bdca89bc4ac49ab8f59efe3e561d0b829cba4594b3502381e02df,2024-08-30T18:19:01.187000
|
||||
CVE-2024-7512,0,1,6e6986c7b9ae27924efa1b771bcbe402501f560cb58148172cc36bd006ab926d,2025-01-17T21:15:10.317000
|
||||
CVE-2024-7513,0,0,a0b177aecfbd2f734939ad8dd9a1241704f6abbdbf43364c61f3c9c8ac7af1f7,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7514,0,0,14ce9dcc3ffed0373a6deaa5aa3e357b4b0f7014d133d7f13dac237fa2f5873a,2024-10-15T12:58:51.050000
|
||||
CVE-2024-7515,0,0,144060b2d32affc4e63578ef1d58b4a89b0be73fa975a25e8bdeb2b20501ddf2,2024-08-15T13:01:10.150000
|
||||
@ -275015,7 +275019,7 @@ CVE-2024-7567,0,0,6fcc07bc770e46ac627a51be07c4648386148d0b824984d20ae9036535f6d5
|
||||
CVE-2024-7568,0,0,2f553130e4eacfc693e995fca0612777f4d890e405998fe269b8e8bc9ce30eac,2024-09-27T00:41:18.483000
|
||||
CVE-2024-7569,0,0,5994c6b63c20456eef57a01a5388108fe6a245760bb402517971f0893da8a4e1,2024-09-06T21:57:23.037000
|
||||
CVE-2024-7570,0,0,4b95c50b05e603fd192a26ba7aeb93b1795ca78a10ab423596f59e19e721c691,2024-09-06T21:59:00.830000
|
||||
CVE-2024-7571,0,1,d18fe4fc5f9d3da0f1009cc412f613bc32f1ea956dc0840e9f2520909cc16ecf,2025-01-17T19:45:37.847000
|
||||
CVE-2024-7571,0,0,d18fe4fc5f9d3da0f1009cc412f613bc32f1ea956dc0840e9f2520909cc16ecf,2025-01-17T19:45:37.847000
|
||||
CVE-2024-7572,0,0,d6a06dc5856037f9439f575c54e48139962b11c091f2a709c1a513d9fb1309c5,2024-12-10T19:15:31.317000
|
||||
CVE-2024-7573,0,0,b682119c0c2e97bcbd91b2c93bf46919696a7eb8e95fa746f7aa6d0673139d3d,2024-08-28T12:57:27.610000
|
||||
CVE-2024-7574,0,0,af702c08dced1e58034991ae3edb1ced31d7e457008281fc7156f6946a0e1bd9,2024-08-12T13:41:36.517000
|
||||
@ -275612,7 +275616,7 @@ CVE-2024-8287,0,0,44aad866f3460bf718be990008b4fca1b1acc226707db3970935711ac18575
|
||||
CVE-2024-8288,0,0,2dbe9e38811e1b4dd40daba68eaba51e92496c00a9c8fcb0f014d8ae6dc0534a,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8289,0,0,9d7300f8940d3398f33784f738c77a2c01537f05398b35ceacb9c8df1f539077,2024-09-05T17:41:58.350000
|
||||
CVE-2024-8290,0,0,5d15203a205ff71e6a186cdf59da5aa3299b33d75ed0d674580f969ba3b8eddb,2024-10-02T18:23:25.890000
|
||||
CVE-2024-8291,0,0,4c7a502b8dcdc7ae37b59ec52570589f381282cc1c90c62ca624f58c30b10e5a,2024-09-30T15:59:11.073000
|
||||
CVE-2024-8291,0,1,1ae4dc05fedd630c1151b869416b4c45162985e2f0c7f613bd6c4c8c04bb0401,2025-01-17T22:15:29.107000
|
||||
CVE-2024-8292,0,0,5b8e8a7b1942b76a866c021acf702acc5b529e4f5401ecaebfc5d28b0fe9ddd2,2024-09-12T12:37:18.380000
|
||||
CVE-2024-8294,0,0,9355f5f1d65d75ae788b4eeb610cbf65ea6d91fb3dd96f7695e8af8d66529a81,2024-08-30T15:38:13.437000
|
||||
CVE-2024-8295,0,0,a34d7d504d9aac6d3f93634a6ef292d08d44f1052fca3c8af7eb1da16cd1590f,2024-08-30T15:37:41.510000
|
||||
@ -275786,7 +275790,7 @@ CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4d
|
||||
CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000
|
||||
CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000
|
||||
CVE-2024-8495,0,1,17397faf6a76a08d8fc13d36960aa09837cfb12c560f1e3c53a500c38b48cbe7,2025-01-17T20:04:56.517000
|
||||
CVE-2024-8495,0,0,17397faf6a76a08d8fc13d36960aa09837cfb12c560f1e3c53a500c38b48cbe7,2025-01-17T20:04:56.517000
|
||||
CVE-2024-8496,0,0,ab865babe0d164049e1365545a634298d8f9eeb65fa574e795c6818555b64d40,2024-12-13T19:42:40.417000
|
||||
CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8499,0,0,2edefd90741d92198f57d70f6a88792184be7286118419ab2da73ea4b4333266,2024-11-08T21:01:13.457000
|
||||
@ -275819,7 +275823,7 @@ CVE-2024-8534,0,0,9508bbdbb90dcab7c3c9618335f28688c58197e5ebea0ff344bbe124b8a349
|
||||
CVE-2024-8535,0,0,9430921b56a98fb793f25bd28deda9111898929b692dbcd6ef2778ea55060c41,2024-11-21T17:15:26.630000
|
||||
CVE-2024-8536,0,0,f58b8cad2a0c4a90556b7c4730ad95a9e86edfd36c5b80cbcf69e920921131cf,2024-10-03T18:16:17.740000
|
||||
CVE-2024-8538,0,0,9b85de2d90f35a6b2ee4405e401f24f5b3cc7b117815da585ee31db85a74f1aa,2024-09-26T16:28:02.990000
|
||||
CVE-2024-8539,0,1,b95b63a69114e86ee4b81290494a4e2a10a7471bf2622ad03aaa6c23d22526fb,2025-01-17T20:02:50.283000
|
||||
CVE-2024-8539,0,0,b95b63a69114e86ee4b81290494a4e2a10a7471bf2622ad03aaa6c23d22526fb,2025-01-17T20:02:50.283000
|
||||
CVE-2024-8540,0,0,c20b714994c4aa7587d38b96cb78eba5da562e7776c062ceec053d693ed236df,2024-12-10T19:15:31.463000
|
||||
CVE-2024-8541,0,0,11f11486e0c328b727b3519cc94f2174fb76a070c646745035cf6e7c2e119162,2024-11-08T15:07:08.400000
|
||||
CVE-2024-8543,0,0,e6cedcbecc2d6bdc12712cbe45b90facb692961eb011612655f2e0245f4a87b3,2024-09-27T16:46:26.243000
|
||||
@ -276543,7 +276547,7 @@ CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae35
|
||||
CVE-2024-9414,0,0,daa11a618576f3dd1bc2a87a2671aa82c6ce206bc2d923313e6d592311bc638a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9417,0,0,216f9ce7a9e770763e40db955a327ba67f06d2e630f73f66eb3add63da2d3dc5,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9419,0,0,75c2ffcece6c8d9641e61b7d83db859a8f0c6a3be035496f4eedc8e263459f13,2024-11-01T12:57:03.417000
|
||||
CVE-2024-9420,0,1,0e84e878b3a1f98289c88b1fb777d3526a495ded70c4b0ad1ee8e42f7524d058,2025-01-17T20:29:36.007000
|
||||
CVE-2024-9420,0,0,0e84e878b3a1f98289c88b1fb777d3526a495ded70c4b0ad1ee8e42f7524d058,2025-01-17T20:29:36.007000
|
||||
CVE-2024-9421,0,0,037ff18a423af7d430246a25c13267312b520381fc2b22b38075ef45225d8825,2024-10-10T20:59:01.600000
|
||||
CVE-2024-9422,0,0,84806a9eed518b06f6d8827496be4f70f3fd277675ce3978a293d23ef572b865,2024-11-22T18:15:18.287000
|
||||
CVE-2024-9423,0,0,ea2ceee1b3bf62e5f678d6840797f5ce1005e985008fd3d6ffca2317e3c41048,2024-10-04T13:50:43.727000
|
||||
@ -276885,9 +276889,9 @@ CVE-2024-9836,0,0,00fe9619a572716e33d038c70d158c90aa86eec43cd0588694b10c90a08bd1
|
||||
CVE-2024-9837,0,0,afe4e527f22e06da82758e417087daa648749cf526ed58128828756f86ec8839,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9839,0,0,57bea8403f5cc48dea698cfdd728b58122c5ab953b09fd7bbfa276adce1153b8,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9841,0,0,c53d88eafada925ed527f104c1b1b1199a9f5255a50ee9eb8941cdbc1ee0bb15,2024-11-13T19:34:26.237000
|
||||
CVE-2024-9842,0,1,73b7cd007d10f6b74ffd8cd6b50292b47cc50d7e962263b6bfd7542be8462f48,2025-01-17T19:55:48.957000
|
||||
CVE-2024-9843,0,1,3f01712625f1edfab25d9be2335cadc8d4f5a03c9e93738f00254824a275f98d,2025-01-17T20:00:21.843000
|
||||
CVE-2024-9844,0,1,f761f39a419d543ed7dd0afc14bfb68da04abe0d0db79b309ef397327e3b394c,2025-01-17T19:37:13.830000
|
||||
CVE-2024-9842,0,0,73b7cd007d10f6b74ffd8cd6b50292b47cc50d7e962263b6bfd7542be8462f48,2025-01-17T19:55:48.957000
|
||||
CVE-2024-9843,0,0,3f01712625f1edfab25d9be2335cadc8d4f5a03c9e93738f00254824a275f98d,2025-01-17T20:00:21.843000
|
||||
CVE-2024-9844,0,0,f761f39a419d543ed7dd0afc14bfb68da04abe0d0db79b309ef397327e3b394c,2025-01-17T19:37:13.830000
|
||||
CVE-2024-9845,0,0,dac1b56b146024cd48eb8cf06bd45e68c3a45cc41706a416eb443467ca7d4d17,2024-12-13T19:44:22.813000
|
||||
CVE-2024-9846,0,0,5a29335b18c23f96eafa12a0012dbfa40c39c1cc47deb5473e372f76f16fe2df,2024-11-06T14:58:04.160000
|
||||
CVE-2024-9848,0,0,148772454ae4a112a7436067b81ee2ac8c78d3a83ad8a189df162c230ac91d15,2024-10-22T16:42:25.867000
|
||||
@ -277207,11 +277211,14 @@ CVE-2025-0529,0,0,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266
|
||||
CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000
|
||||
CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000
|
||||
CVE-2025-0532,0,0,4d92732b352395641e27304ba949a5d746e81750f3574c04f91dc679f65ac49d,2025-01-17T18:15:31.237000
|
||||
CVE-2025-0533,0,0,00c854b2342ff9edb13ef61155d7cae29025b472a6af5e1d39d09a6ad67d9690,2025-01-17T18:15:31.577000
|
||||
CVE-2025-0534,1,1,a3ec127c39fbe4883168380fdd84d2a13f574a22ab79b7102ce42334ec5bc91e,2025-01-17T19:15:28.777000
|
||||
CVE-2025-0535,1,1,23267893be9929c36dee9ccdb2851027f260f2b1e068a3125e11e636a590092d,2025-01-17T19:15:28.990000
|
||||
CVE-2025-0536,1,1,bc38c8ba5af4e7472d7f22d13aed2c6d2fe30298a4c118afbe0638c85b0b1188,2025-01-17T20:15:29.583000
|
||||
CVE-2025-0537,1,1,d2d5f6c3ed1aba0629c7b9914597be74a65e836badbe3287071391416aeb4d55,2025-01-17T20:15:29.767000
|
||||
CVE-2025-0533,0,1,7f9d32a2b8498bdcb13287d845ecf92659d969c766d3960e43e297ee75f74856,2025-01-17T21:15:10.487000
|
||||
CVE-2025-0534,0,1,aa1feda9d93d553c893a821acdcd6e6031ddccdc91780da53a73a7286a0a0e2d,2025-01-17T21:15:10.650000
|
||||
CVE-2025-0535,0,0,23267893be9929c36dee9ccdb2851027f260f2b1e068a3125e11e636a590092d,2025-01-17T19:15:28.990000
|
||||
CVE-2025-0536,0,0,bc38c8ba5af4e7472d7f22d13aed2c6d2fe30298a4c118afbe0638c85b0b1188,2025-01-17T20:15:29.583000
|
||||
CVE-2025-0537,0,0,d2d5f6c3ed1aba0629c7b9914597be74a65e836badbe3287071391416aeb4d55,2025-01-17T20:15:29.767000
|
||||
CVE-2025-0538,1,1,665829c176e139d24899162f51dc3f75a7743136ae8d080cfb4406eda703598f,2025-01-17T21:15:10.847000
|
||||
CVE-2025-0540,1,1,0fe6a3968060e1d9e108f736a24030b6ee6db8d0695d6022f7d1a51c2ca09a50,2025-01-17T21:15:11.037000
|
||||
CVE-2025-0541,1,1,422e97928ac96e00be4b8b72ccf9ce9a6f4a23518705054b1953468a190b5cd0,2025-01-17T22:15:29.337000
|
||||
CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||
CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000
|
||||
@ -277234,11 +277241,11 @@ CVE-2025-21102,0,0,8153781fb244bf502850065fab180d787cadc10df5675c4bfb3f0250244d9
|
||||
CVE-2025-21111,0,0,ac99f23afec6fb5ea7aef333a4f2d14bc0359a06e3db388b0b698b212d2c1078,2025-01-08T18:15:20.157000
|
||||
CVE-2025-21122,0,0,43e018e554d36ad8c27426d45eac54aac7111a0f7fbc00c5faddfbf20d24d353,2025-01-14T19:15:33.070000
|
||||
CVE-2025-21127,0,0,ff3f2190f0b612f83d2bddb73540fbc2cccf294add7d86059214c07a30b1706d,2025-01-14T19:15:33.230000
|
||||
CVE-2025-21128,0,1,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000
|
||||
CVE-2025-21129,0,1,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000
|
||||
CVE-2025-21130,0,1,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000
|
||||
CVE-2025-21131,0,1,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000
|
||||
CVE-2025-21132,0,1,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000
|
||||
CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000
|
||||
CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000
|
||||
CVE-2025-21130,0,0,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000
|
||||
CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000
|
||||
CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000
|
||||
CVE-2025-21133,0,0,f39e797c9e3761662690c0d0c0e02c0c918947858d1f9156eb425e12cd546319,2025-01-14T19:15:34.187000
|
||||
CVE-2025-21134,0,0,c93daea6012e8c7d66590fc258c4a36aadabfb4ef78a3c9c6e5bab6127e3d755,2025-01-16T20:43:02.810000
|
||||
CVE-2025-21135,0,0,c9c3ecb3908293d81f3245af42be596eafeb2d021f670b2a2e192c0c24a4a599,2025-01-14T20:15:30.853000
|
||||
@ -277251,7 +277258,7 @@ CVE-2025-21172,0,0,4f24a61268da184b858f9e77120c20e5fc66016bfbd974b21d25930e48989
|
||||
CVE-2025-21173,0,0,5d58cc1bc98454cc231277f66b132069108794b4784bc70fe1c2f951f9b342b5,2025-01-14T19:15:34.583000
|
||||
CVE-2025-21176,0,0,fa110a0f22c836c12f0cf2ce220d5de18c4ab88ac77aabb721f68f988794d79a,2025-01-14T18:15:30.650000
|
||||
CVE-2025-21178,0,0,1b6a69fe03b4fb3f04715244cc0650d44ad2017e1071e6abf791436e0822e04e,2025-01-14T18:15:30.847000
|
||||
CVE-2025-21185,1,1,1af79d3ef8f65c7dfb2c433d952a1d4f646119e4c304c6d9df90c5fba85cd1b8,2025-01-17T20:15:30.227000
|
||||
CVE-2025-21185,0,0,1af79d3ef8f65c7dfb2c433d952a1d4f646119e4c304c6d9df90c5fba85cd1b8,2025-01-17T20:15:30.227000
|
||||
CVE-2025-21186,0,0,91a8abe2a73ddcfa1782c8e7ce8a598c73ba47e42f61be06b2519fd9c6895eba,2025-01-14T18:15:31.020000
|
||||
CVE-2025-21187,0,0,b9e3dedb73276bf5967898c1d3b393f17bdb00693d151852eac842fd28055fbf,2025-01-14T18:15:31.187000
|
||||
CVE-2025-21189,0,0,4d509212258b8740ea90cead040b9819ec41a61e1c261bb431a52d9cf1d53af4,2025-01-14T18:15:31.377000
|
||||
@ -277383,9 +277390,9 @@ CVE-2025-21348,0,0,b18bc9f42c837973185b37906f0bca18a0077a98d8987a7deac1373ff7183
|
||||
CVE-2025-21354,0,0,67bb15809fb7626348b06f722bdc42095fcef06c14f355f18c2f99bcdd08e1e7,2025-01-15T00:15:43.170000
|
||||
CVE-2025-21356,0,0,26156418338a80fc3382415b36edf58e99a176cdf3ba70297a5f2e24591a5d33,2025-01-14T18:16:01.130000
|
||||
CVE-2025-21357,0,0,48f6f50b58a645314e8c3a670faac4c08145ec6653b367344cbcab3656dfb136,2025-01-14T18:16:01.293000
|
||||
CVE-2025-21360,0,1,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
|
||||
CVE-2025-21361,0,1,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
|
||||
CVE-2025-21362,0,1,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
|
||||
CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
|
||||
CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
|
||||
CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
|
||||
CVE-2025-21363,0,0,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000
|
||||
CVE-2025-21364,0,0,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000
|
||||
CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000
|
||||
@ -277400,7 +277407,7 @@ CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b58
|
||||
CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
|
||||
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
|
||||
CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
|
||||
CVE-2025-21399,1,1,7faea7022a98fa48896e2ecf9653b40b0669c8575634a3a978238790ce9a5d34,2025-01-17T20:15:46.117000
|
||||
CVE-2025-21399,0,1,dd7dd15e0bf28105dde42fe08f9af97913f39e43de69ca54f29cd269a806e542,2025-01-17T21:15:11.283000
|
||||
CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000
|
||||
CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000
|
||||
CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
|
||||
@ -277417,6 +277424,7 @@ CVE-2025-21600,0,0,0511e8e443940a54ef072ec82b613cd606986ba56f640dd75add723416939
|
||||
CVE-2025-21602,0,0,98fe9b608a65f60bdad3939961d20a9c1558362795b914622d82bfabf6cfafaa,2025-01-09T17:15:19.150000
|
||||
CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000
|
||||
CVE-2025-21604,0,0,0ed8064b9182950e530cb7b2f52528d7c551930e7450b1b19d40475d7a199d1b,2025-01-06T16:15:30.927000
|
||||
CVE-2025-21606,1,1,0349594481f2ded846f30215d0cfc0bb438d93beaae4bb599942eb1b2e5cec37,2025-01-17T21:15:11.420000
|
||||
CVE-2025-21607,0,0,1209306172347dde01f13b6689a1616e491e8e2e568e8703f282009eb4f87675,2025-01-15T16:15:34.463000
|
||||
CVE-2025-21609,0,0,3c2fc9da6be905fe106ba75040e21828a0454c46abf195fca7a6951c7de8750f,2025-01-03T17:15:09.147000
|
||||
CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000
|
||||
@ -277745,6 +277753,7 @@ CVE-2025-23035,0,0,15119e210304923b04825a533afb7d64de389165b45e441f65e24ce625e49
|
||||
CVE-2025-23036,0,0,2fb507a6612e29adcef56fa56aa33311d41bce13c8a87d5f9d3d69910ed84b10,2025-01-14T01:15:18.563000
|
||||
CVE-2025-23037,0,0,a1e1381f9e34163ba825239477ba56ff2234c19dc9e437125649d99c36cd92cc,2025-01-14T01:15:18.717000
|
||||
CVE-2025-23038,0,0,1de4cc81179ad5c8416ead223772d5e98b46dd173dbfd59e0eb5993af28ad908,2025-01-14T01:15:18.867000
|
||||
CVE-2025-23039,1,1,0f4c8b18d96f18300eb9751f08f87708b6a9147a90f825f661850c792e0bc10b,2025-01-17T21:15:11.560000
|
||||
CVE-2025-23040,0,0,01c74eb3bbfb2cd1f602a038f7c0e18be82bfb3ffcbee44004a2e80cdc5995d7,2025-01-15T18:15:24.797000
|
||||
CVE-2025-23041,0,0,d87dedc1a7db6bd5664f42801252448bdb5151d09c41aace5826158a53a32d97,2025-01-14T19:15:44.713000
|
||||
CVE-2025-23042,0,0,1110c74e58afce403252b0074fffd93e05f17f43b2190d384fd7a07c01cb5ad5,2025-01-14T19:15:44.863000
|
||||
@ -277774,6 +277783,10 @@ CVE-2025-23198,0,0,38d064f9eeb5dbdc89e5c2cab94de1a30dcf1ab278ad387ee52fa20cdcf4c
|
||||
CVE-2025-23199,0,0,dd0c2d35f6e256939803dab93415f9b547ee1909db113c76af2a7fe5a5e3c989,2025-01-16T23:15:08.567000
|
||||
CVE-2025-23200,0,0,059d55c00b9698c0e7fb0e2a5468e34b0267f568df56955bd779c82b44a99f4d,2025-01-16T23:15:08.720000
|
||||
CVE-2025-23201,0,0,b8e7e9379c2984feb102e6af9826e4aebb2824dc378f94af55ada00bfab366bf,2025-01-16T23:15:08.880000
|
||||
CVE-2025-23202,1,1,ebb9b3c0ec35ea830eb49777cc26a7423c92a02686e756805e9c6768f34595bd,2025-01-17T21:15:11.713000
|
||||
CVE-2025-23205,1,1,5dde18f3e1001012d88c0b2d8c423eb8fb8c3ba6cae70cd1181e6ed64426f77c,2025-01-17T21:15:11.850000
|
||||
CVE-2025-23206,1,1,ea12574764f66c161153bcbbbe1a91d389bf6c6631d0c7b641a3ca1fa029cc28,2025-01-17T21:15:12.003000
|
||||
CVE-2025-23207,1,1,e5de4237889cfabf27065c43b82af396f478aa914ba2d9d161effc65eaba9de4,2025-01-17T22:15:29.523000
|
||||
CVE-2025-23366,0,0,9c322475015bf02d1585352d78c1a1b463f803a5f9fa5af211a6e73349c16f8f,2025-01-14T18:16:06.290000
|
||||
CVE-2025-23423,0,0,b6f59e601cdbaad011f370832d8ff10b7231d5875d4fb9da3b536bb65b8259e8,2025-01-16T20:15:33.573000
|
||||
CVE-2025-23424,0,0,af50c9c9dec5ab1ce79e37d50537a1d0fe21f0f1e703c32c29cd7fa3dc996735,2025-01-16T20:15:33.723000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user