mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-26T15:00:19.871411+00:00
This commit is contained in:
parent
b184f1eec7
commit
5981efc205
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36504",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-14T00:15:10.423",
|
||||
"lastModified": "2024-11-21T08:09:50.650",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-12-26T14:58:30.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bbsetheme:bbs-e-popup:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:bbsetheme:bbs_e-popup:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.4.5",
|
||||
"matchCriteriaId": "87853EFE-5C2A-4DD1-8CBE-8B1900C21BFB"
|
||||
"matchCriteriaId": "DE2912A8-C351-483F-A5FF-423458EE4AB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1014",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-01-29T14:15:09.437",
|
||||
"lastModified": "2024-11-21T08:49:35.903",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-12-26T14:47:20.980",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -102,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E"
|
||||
"criteria": "cpe:2.3:h:se-elektronic:e-ddc3.3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22B4F64C-D42B-4066-A729-E759847AC2E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1015",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-01-29T14:15:09.657",
|
||||
"lastModified": "2024-11-21T08:49:36.047",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-12-26T14:47:20.980",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -102,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E"
|
||||
"criteria": "cpe:2.3:h:se-elektronic:e-ddc3.3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22B4F64C-D42B-4066-A729-E759847AC2E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
145
CVE-2024/CVE-2024-129xx/CVE-2024-12951.json
Normal file
145
CVE-2024/CVE-2024-129xx/CVE-2024-12951.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-12951",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-26T13:15:05.667",
|
||||
"lastModified": "2024-12-26T13:15:05.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /add_personal_details.php. The manipulation of the argument profile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README3.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289314",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289314",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.468644",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
153
CVE-2024/CVE-2024-129xx/CVE-2024-12952.json
Normal file
153
CVE-2024/CVE-2024-129xx/CVE-2024-12952.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2024-12952",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-26T13:15:06.727",
|
||||
"lastModified": "2024-12-26T13:15:06.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in melMass comfy_mtb up to 0.1.4. Affected by this vulnerability is the function run_command of the file comfy_mtb/endpoint.py of the component Dependency Handler. The manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named d6e004cce2c32f8e48b868e66b89f82da4887dc3. It is recommended to apply a patch to fix this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/melMass/comfy_mtb/commit/d6e004cce2c32f8e48b868e66b89f82da4887dc3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/melMass/comfy_mtb/issues/224",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2552664778",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2553432365",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289315",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289315",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.468683",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-129xx/CVE-2024-12953.json
Normal file
145
CVE-2024/CVE-2024-129xx/CVE-2024-12953.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-12953",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-26T14:15:05.147",
|
||||
"lastModified": "2024-12-26T14:15:05.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected by this issue is some unknown functionality of the file /update_pd_process.php. The manipulation of the argument profile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289316",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289316",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.468769",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-129xx/CVE-2024-12954.json
Normal file
145
CVE-2024/CVE-2024-129xx/CVE-2024-12954.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-12954",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-26T14:15:06.000",
|
||||
"lastModified": "2024-12-26T14:15:06.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Portfolio Management System MCA 1.0. This affects an unknown part of the file /update_ach.php. The manipulation of the argument ach_certy leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289317",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289317",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.468772",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-471xx/CVE-2024-47149.json
Normal file
44
CVE-2024/CVE-2024-471xx/CVE-2024-47149.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-47149",
|
||||
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
|
||||
"published": "2024-12-26T13:15:07.007",
|
||||
"lastModified": "2024-12-26T13:15:07.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.honor.com/global/security/cve-2024-47149/",
|
||||
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-471xx/CVE-2024-47150.json
Normal file
44
CVE-2024/CVE-2024-471xx/CVE-2024-47150.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-47150",
|
||||
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
|
||||
"published": "2024-12-26T13:15:07.140",
|
||||
"lastModified": "2024-12-26T13:15:07.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.honor.com/global/security/cve-2024-47150/",
|
||||
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5444",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-11T06:15:02.830",
|
||||
"lastModified": "2024-11-21T09:47:41.810",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-12-26T14:43:05.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bible_text_project:bible_text:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:mark8barnes:bible_text:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.2",
|
||||
"matchCriteriaId": "07BE072F-846A-49D1-ABAE-D72BA59AEB87"
|
||||
"matchCriteriaId": "B9B15D51-F33C-463B-BF9F-856EEF876D43"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5938",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T02:15:02.823",
|
||||
"lastModified": "2024-11-21T09:48:36.740",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-12-26T14:58:47.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:boot_store_project:boot_store:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:thecartpress:boot_store:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.6.4",
|
||||
"matchCriteriaId": "377BA15D-A5E3-4D99-8D87-1499FEE21871"
|
||||
"matchCriteriaId": "60F509ED-3D73-40F2-8662-62606A0A7A26"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6777",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-07-16T22:15:07.267",
|
||||
"lastModified": "2024-11-21T09:50:18.620",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-26T14:55:39.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -50,6 +70,16 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -61,22 +91,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "126.0.6478.182",
|
||||
"matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/345640549",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/345640549",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8481",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.593",
|
||||
"lastModified": "2024-10-02T17:59:52.013",
|
||||
"lastModified": "2024-12-26T14:58:41.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:blogcoding:special_text_boxes:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:simplelib:special_text_boxes:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndIncluding": "6.2.2",
|
||||
"matchCriteriaId": "90B9CFDE-2767-423D-9FD4-71355C89D99C"
|
||||
"matchCriteriaId": "155271BD-DB93-42AA-8AF8-5D1CEB297B59"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-26T13:00:20.115447+00:00
|
||||
2024-12-26T15:00:19.871411+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-26T12:15:07.897000+00:00
|
||||
2024-12-26T14:58:47.547000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274711
|
||||
274717
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-12947](CVE-2024/CVE-2024-129xx/CVE-2024-12947.json) (`2024-12-26T11:15:05.790`)
|
||||
- [CVE-2024-12948](CVE-2024/CVE-2024-129xx/CVE-2024-12948.json) (`2024-12-26T11:15:07.173`)
|
||||
- [CVE-2024-12949](CVE-2024/CVE-2024-129xx/CVE-2024-12949.json) (`2024-12-26T12:15:05.997`)
|
||||
- [CVE-2024-12950](CVE-2024/CVE-2024-129xx/CVE-2024-12950.json) (`2024-12-26T12:15:06.870`)
|
||||
- [CVE-2024-47148](CVE-2024/CVE-2024-471xx/CVE-2024-47148.json) (`2024-12-26T12:15:07.063`)
|
||||
- [CVE-2024-47151](CVE-2024/CVE-2024-471xx/CVE-2024-47151.json) (`2024-12-26T11:15:07.387`)
|
||||
- [CVE-2024-47153](CVE-2024/CVE-2024-471xx/CVE-2024-47153.json) (`2024-12-26T12:15:07.183`)
|
||||
- [CVE-2024-47154](CVE-2024/CVE-2024-471xx/CVE-2024-47154.json) (`2024-12-26T12:15:07.303`)
|
||||
- [CVE-2024-47155](CVE-2024/CVE-2024-471xx/CVE-2024-47155.json) (`2024-12-26T12:15:07.433`)
|
||||
- [CVE-2024-47156](CVE-2024/CVE-2024-471xx/CVE-2024-47156.json) (`2024-12-26T11:15:07.517`)
|
||||
- [CVE-2024-47157](CVE-2024/CVE-2024-471xx/CVE-2024-47157.json) (`2024-12-26T12:15:07.547`)
|
||||
- [CVE-2024-8992](CVE-2024/CVE-2024-89xx/CVE-2024-8992.json) (`2024-12-26T12:15:07.660`)
|
||||
- [CVE-2024-8993](CVE-2024/CVE-2024-89xx/CVE-2024-8993.json) (`2024-12-26T12:15:07.783`)
|
||||
- [CVE-2024-8994](CVE-2024/CVE-2024-89xx/CVE-2024-8994.json) (`2024-12-26T12:15:07.897`)
|
||||
- [CVE-2024-12951](CVE-2024/CVE-2024-129xx/CVE-2024-12951.json) (`2024-12-26T13:15:05.667`)
|
||||
- [CVE-2024-12952](CVE-2024/CVE-2024-129xx/CVE-2024-12952.json) (`2024-12-26T13:15:06.727`)
|
||||
- [CVE-2024-12953](CVE-2024/CVE-2024-129xx/CVE-2024-12953.json) (`2024-12-26T14:15:05.147`)
|
||||
- [CVE-2024-12954](CVE-2024/CVE-2024-129xx/CVE-2024-12954.json) (`2024-12-26T14:15:06.000`)
|
||||
- [CVE-2024-47149](CVE-2024/CVE-2024-471xx/CVE-2024-47149.json) (`2024-12-26T13:15:07.007`)
|
||||
- [CVE-2024-47150](CVE-2024/CVE-2024-471xx/CVE-2024-47150.json) (`2024-12-26T13:15:07.140`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2023-36504](CVE-2023/CVE-2023-365xx/CVE-2023-36504.json) (`2024-12-26T14:58:30.100`)
|
||||
- [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-12-26T14:47:20.980`)
|
||||
- [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-12-26T14:47:20.980`)
|
||||
- [CVE-2024-5444](CVE-2024/CVE-2024-54xx/CVE-2024-5444.json) (`2024-12-26T14:43:05.523`)
|
||||
- [CVE-2024-5938](CVE-2024/CVE-2024-59xx/CVE-2024-5938.json) (`2024-12-26T14:58:47.547`)
|
||||
- [CVE-2024-6777](CVE-2024/CVE-2024-67xx/CVE-2024-6777.json) (`2024-12-26T14:55:39.437`)
|
||||
- [CVE-2024-8481](CVE-2024/CVE-2024-84xx/CVE-2024-8481.json) (`2024-12-26T14:58:41.757`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
48
_state.csv
48
_state.csv
@ -228096,7 +228096,7 @@ CVE-2023-3650,0,0,59d67f695ce0a439c91aa9aca8211e7840329c605fbc79a1b81cd1ce6873fd
|
||||
CVE-2023-36501,0,0,c5fd1d48310551e06c32858d3409f4b3bb81cd7bf054db0d3372ef926c25dfa2,2024-11-21T08:09:50.330000
|
||||
CVE-2023-36502,0,0,e9d4311f7e63b9210af8c1a166cb719dc6be2e97fafa60cc1a82e40b1b54f98c,2024-11-21T08:09:50.440000
|
||||
CVE-2023-36503,0,0,fcdad8415d080aa47a84afac77e8960e774a0ec452ae2f7f9d9cac880e3ce051,2024-11-21T08:09:50.547000
|
||||
CVE-2023-36504,0,0,38d29e3b0aec985e8f36baa2ea2618633d84dd3f61744291efedd92faec10795,2024-11-21T08:09:50.650000
|
||||
CVE-2023-36504,0,1,b5bae85a56b80cc82ee2f0e40cb8a5ddeda98713155429cf430d437601a3fe5d,2024-12-26T14:58:30.100000
|
||||
CVE-2023-36505,0,0,5363f501da8bfc66e09637cdf5abf2bec037ea092c52ae679457d719d6a84707,2024-11-21T08:09:50.763000
|
||||
CVE-2023-36506,0,0,6af22016e284031d53b3ef3f11af4b1bf92676c075b4e08e2aebb1352de367b9,2024-12-13T15:15:16.450000
|
||||
CVE-2023-36507,0,0,860d90b5f40d8a7bffdd9335fefbba3d2a2e252c703ad45f15814d2a2853d7b9,2024-11-21T08:09:50.870000
|
||||
@ -243172,14 +243172,14 @@ CVE-2024-10136,0,0,1687e7cebd4edca0b737a65982fb9c424de87cc15acb38175a53b82a71807
|
||||
CVE-2024-10137,0,0,f8f7215d3ce93e92144f6efe5a55c5ac5044b5c034241100e379f4163f66dd21,2024-10-22T14:17:31.527000
|
||||
CVE-2024-10138,0,0,b55d0a2514636d98877966409f2919e65547e4eeafd1d900c75d88c763738105,2024-10-22T14:16:51.547000
|
||||
CVE-2024-10139,0,0,a46ec81f772febd4a2634b4660ef65a5595694d8d1440f2dfd233785d6da934c,2024-10-22T14:18:12.087000
|
||||
CVE-2024-1014,0,0,6f3a34ef48fded0d655d415b80816ce08c7906ef586c175776f9a862ce8cfa93,2024-11-21T08:49:35.903000
|
||||
CVE-2024-1014,0,1,3b68d16ac7b67593d321fe9ae9e77edfd7762ecf7bffc2a9653df88b5ebfc53b,2024-12-26T14:47:20.980000
|
||||
CVE-2024-10140,0,0,5c8d3582a9e1cf69741010665609bb47843d809bedccb1b62254ed0f178666e0,2024-10-22T14:19:08.420000
|
||||
CVE-2024-10141,0,0,9f480f5e4cde435173bb5b248bf28ae1efa97ee859e6fa4ed20730ab18f55365,2024-10-23T20:27:09.370000
|
||||
CVE-2024-10142,0,0,b21f3b0b970a8f035562ca65d7166416ad40a1b3d1b0f2ed6d773f0caf719d22,2024-10-22T18:11:20.450000
|
||||
CVE-2024-10146,0,0,5e07a63dc9cb998c12f2ef5f735047cdc411acb65308532570ff1ef11f2b6ae8,2024-11-15T13:58:08.913000
|
||||
CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb9ca,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000
|
||||
CVE-2024-1015,0,0,fd7055f7b5c31d9bcec53e167b13da75da7f80d9ecd8b3a992c86ee9373ded49,2024-11-21T08:49:36.047000
|
||||
CVE-2024-1015,0,1,f5106ef87a8ce490640958ad18e87b170d3461b5088dc4b1c5335fd41b68ef46,2024-12-26T14:47:20.980000
|
||||
CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000
|
||||
CVE-2024-10153,0,0,205337601504c6a6060c88aa213139cbdb5096813b7204f786c736b1a09bbbe9,2024-10-22T14:45:04.670000
|
||||
CVE-2024-10154,0,0,8bc22a596ba6d08db60619a5118141d0b00a385670008138b09554e9c573f4a2,2024-10-22T14:44:47.807000
|
||||
@ -245149,11 +245149,15 @@ CVE-2024-12943,0,0,0e0352c3cdfb6c94c92b061e0c57fc94486d90b8be968f83a37598213c129
|
||||
CVE-2024-12944,0,0,94ac533f69831e0792eddb5df819ea87ca6f4e8141ed76c926ecab8ac06efc51,2024-12-26T09:15:07.030000
|
||||
CVE-2024-12945,0,0,6a75b3c16371295f70d4017ebe5efbf29d0cac38a65db0a501645e045cb67e8e,2024-12-26T10:15:05.527000
|
||||
CVE-2024-12946,0,0,400d236b9f0cab3ccac13b217edebb50440dfd55bfcf1455987e627b6887d888,2024-12-26T10:15:05.777000
|
||||
CVE-2024-12947,1,1,a403450fa2bbc578a8fcf83d306b673ae1cf0b372f48568ef42b885bfb717aa4,2024-12-26T11:15:05.790000
|
||||
CVE-2024-12948,1,1,9ed039ff2046d0bd52c0232ea595bbbab01c59fd1089b82b348419f43d74c4c7,2024-12-26T11:15:07.173000
|
||||
CVE-2024-12949,1,1,86d3ebeba0868e6b562019ec87488552d967c5cd5ccaf8d01f425a8fe584af62,2024-12-26T12:15:05.997000
|
||||
CVE-2024-12947,0,0,a403450fa2bbc578a8fcf83d306b673ae1cf0b372f48568ef42b885bfb717aa4,2024-12-26T11:15:05.790000
|
||||
CVE-2024-12948,0,0,9ed039ff2046d0bd52c0232ea595bbbab01c59fd1089b82b348419f43d74c4c7,2024-12-26T11:15:07.173000
|
||||
CVE-2024-12949,0,0,86d3ebeba0868e6b562019ec87488552d967c5cd5ccaf8d01f425a8fe584af62,2024-12-26T12:15:05.997000
|
||||
CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000
|
||||
CVE-2024-12950,1,1,ca4cbf7c69d996ce2bfd33f152e0fb62d216c9cea2edc40017131b89bad1e400,2024-12-26T12:15:06.870000
|
||||
CVE-2024-12950,0,0,ca4cbf7c69d996ce2bfd33f152e0fb62d216c9cea2edc40017131b89bad1e400,2024-12-26T12:15:06.870000
|
||||
CVE-2024-12951,1,1,414b8ef6fdf35b84093358683da5afb7b3382068e7e9f8acbda999d479d1d854,2024-12-26T13:15:05.667000
|
||||
CVE-2024-12952,1,1,b880f28fe687c0b824a45422a445e9df755a70364b015764cba902b8758181d7,2024-12-26T13:15:06.727000
|
||||
CVE-2024-12953,1,1,23709a5786c8f99b782e8a710a7efbea47345eeaaafeae1249bc1f849023a0b7,2024-12-26T14:15:05.147000
|
||||
CVE-2024-12954,1,1,8f39e5ac10e6fd830a15460b7aaac36438e362dedf7ea84356195659fff033f9,2024-12-26T14:15:06
|
||||
CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000
|
||||
CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000
|
||||
CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000
|
||||
@ -265763,14 +265767,16 @@ CVE-2024-4714,0,0,0d524d117aabf03780c7be3f44074976485dfc4d101c0f965f441387c1ce48
|
||||
CVE-2024-47142,0,0,3b160aeed892b3de0fae2f0bd942190d42286dfc37500bd913fc0a3b0770ad8c,2024-11-22T02:15:21.280000
|
||||
CVE-2024-47145,0,0,060f9bb9a43b25110359917405fc9bc4bfa91006f8a71471b803c37bd9f0df18,2024-09-26T18:42:33.550000
|
||||
CVE-2024-47146,0,0,4c1ec2fd77a55fc12a380140e8b75abce8b99c7554038e5bb49a8e56f7893728,2024-12-10T19:45:51.023000
|
||||
CVE-2024-47148,1,1,b2b201e492cb219881350a4ee656b7e0714f48f06b1efeb7497e58f4cfc34dd3,2024-12-26T12:15:07.063000
|
||||
CVE-2024-47148,0,0,b2b201e492cb219881350a4ee656b7e0714f48f06b1efeb7497e58f4cfc34dd3,2024-12-26T12:15:07.063000
|
||||
CVE-2024-47149,1,1,777275743f5865f3be6f0f8246f16b564657bd5cc036e3b2daa732b3eb5c4d7d,2024-12-26T13:15:07.007000
|
||||
CVE-2024-4715,0,0,cfdee50dbf680b557a3c5935dd446958982a7767348e746e1514b6a87d45fd32,2024-11-21T09:43:26.243000
|
||||
CVE-2024-47151,1,1,32ffda1955b6441bb63553c91b7088d99e558c2a2a144674b8b411a9369261be,2024-12-26T11:15:07.387000
|
||||
CVE-2024-47153,1,1,3c9ddb156d4838ab4dd50ad2be03036f905c4748cf151f06b44931abbf5374c8,2024-12-26T12:15:07.183000
|
||||
CVE-2024-47154,1,1,91109d991ba96e992fa2e33be15597c37ea7cea8c8a483406508c60a9929a172,2024-12-26T12:15:07.303000
|
||||
CVE-2024-47155,1,1,6e65506a0eb90f835c2c554e3bfb26aa486643f08e76807e5aa35a34c35f9533,2024-12-26T12:15:07.433000
|
||||
CVE-2024-47156,1,1,129b4d08361f8cc9a55f077783887ffdf655fece2a1580fba2b541389971a541,2024-12-26T11:15:07.517000
|
||||
CVE-2024-47157,1,1,ac92958500bb1c8504ede364fb0734e8d324168e5026a932d89c148f0239dca6,2024-12-26T12:15:07.547000
|
||||
CVE-2024-47150,1,1,d34bb8def30ddd1e10efd6b15266d2eac0ad62d8addf9f44a21ce79578e09f5e,2024-12-26T13:15:07.140000
|
||||
CVE-2024-47151,0,0,32ffda1955b6441bb63553c91b7088d99e558c2a2a144674b8b411a9369261be,2024-12-26T11:15:07.387000
|
||||
CVE-2024-47153,0,0,3c9ddb156d4838ab4dd50ad2be03036f905c4748cf151f06b44931abbf5374c8,2024-12-26T12:15:07.183000
|
||||
CVE-2024-47154,0,0,91109d991ba96e992fa2e33be15597c37ea7cea8c8a483406508c60a9929a172,2024-12-26T12:15:07.303000
|
||||
CVE-2024-47155,0,0,6e65506a0eb90f835c2c554e3bfb26aa486643f08e76807e5aa35a34c35f9533,2024-12-26T12:15:07.433000
|
||||
CVE-2024-47156,0,0,129b4d08361f8cc9a55f077783887ffdf655fece2a1580fba2b541389971a541,2024-12-26T11:15:07.517000
|
||||
CVE-2024-47157,0,0,ac92958500bb1c8504ede364fb0734e8d324168e5026a932d89c148f0239dca6,2024-12-26T12:15:07.547000
|
||||
CVE-2024-47158,0,0,b0c240c01999f96b32d54a0c5d41b1284741ebcdb34e1f30df025b02e60124f4,2024-11-06T17:10:03.857000
|
||||
CVE-2024-47159,0,0,dc6f344db4381cf6189daa37a80d59a488ca43c446da4d79e165921cf750d139,2024-09-24T18:09:50.877000
|
||||
CVE-2024-4716,0,0,1b3bc70b6559a322c14d4188be000e8930d586f2680c7df71f292bb133ecff27,2024-11-21T09:43:26.380000
|
||||
@ -270541,7 +270547,7 @@ CVE-2024-54436,0,0,50f2aaadb8a1ae9384ae60f68026e46bd3f9598cfdbd34eb21f00698325fc
|
||||
CVE-2024-54437,0,0,16f6ccd347b342a49e1da88c1694aefeff9e893cc31cb4a150a5024ef58f3acc,2024-12-16T15:15:22.570000
|
||||
CVE-2024-54438,0,0,833db86282c8f87abecab539c28e79528e3843a7acd46c3598d439c688dae985,2024-12-16T15:15:22.713000
|
||||
CVE-2024-54439,0,0,8084e70e603ce1752cdcbfd728997a090db24c24cb39c5fcf7404f93404060f4,2024-12-16T15:15:22.843000
|
||||
CVE-2024-5444,0,0,d122b54e471150af4b6bf3b5aac169a49909a5e1c30b12ec4d263232852abd0e,2024-11-21T09:47:41.810000
|
||||
CVE-2024-5444,0,1,36f69048d386cbeda368abf26513717dd8b8ca822b22f9fe60a170ecb8b494bc,2024-12-26T14:43:05.523000
|
||||
CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697387,2024-12-16T15:15:22.987000
|
||||
CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000
|
||||
CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000
|
||||
@ -271286,7 +271292,7 @@ CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b
|
||||
CVE-2024-5935,0,0,33de45cd0a9dbec9c09be2dfcdd626110c8d1494b4e9b3daff11fb78fd2ccee2,2024-11-21T09:48:36.403000
|
||||
CVE-2024-5936,0,0,d33e3654fbe2f8d1101b64d197a41ff3f425b0d6a2e0640a9a89b19935133a92,2024-11-21T09:48:36.527000
|
||||
CVE-2024-5937,0,0,2ef9817ef948574c57ede2754d552b256d02d4486235fa2fd7b5314353636fc5,2024-11-21T09:48:36.637000
|
||||
CVE-2024-5938,0,0,afe5ef80ab959845fa9a7181860ded0b65b714e0b094d64006819cf77249b889,2024-11-21T09:48:36.740000
|
||||
CVE-2024-5938,0,1,ca56ac1750495779a8b37a0ec018b68bc2fd21cbfeb20098d1d5f998ac6da3bc,2024-12-26T14:58:47.547000
|
||||
CVE-2024-5939,0,0,318b3e9b499ff5b450323efa05eed5a91b82903815ef8ad200d027e36bed2ddb,2024-08-26T18:12:14.250000
|
||||
CVE-2024-5940,0,0,00419b45dbaebd6c3f7bbb471b92b7dfc3e08de501bf62a1ac5f1d8f54145970,2024-08-26T18:14:14.083000
|
||||
CVE-2024-5941,0,0,50b9cff2552a6f01b7b5069a5b5d20c0dc58c3654f086afba5659848e809333c,2024-08-26T18:14:39.290000
|
||||
@ -272039,7 +272045,7 @@ CVE-2024-6773,0,0,b721cdb596ff1541ba1bb8d07e42929150e9ff33565e159ea3e892fe17579f
|
||||
CVE-2024-6774,0,0,f2c65b7a19fe6cc63dfa08b4e4aee9ed96bcfe29384e0bfcb382a7326674290b,2024-11-21T09:50:18.100000
|
||||
CVE-2024-6775,0,0,59aff284b990ac5949297db1ecbeeb7dfa61a29748cdcf7ab9843b427302ed69,2024-11-21T09:50:18.273000
|
||||
CVE-2024-6776,0,0,33be44e38058cd7ddcf4e51267528970811e1d75df7b3019a5389194b8f70b19,2024-11-21T09:50:18.447000
|
||||
CVE-2024-6777,0,0,0506222761965cbf53f7d57e71b6fc3e2720b9de9190346bf62aa7975239f495,2024-11-21T09:50:18.620000
|
||||
CVE-2024-6777,0,1,043fbce92e733c3dc4ffda017908d058956bd68e3286cb190e277117396f8b7f,2024-12-26T14:55:39.437000
|
||||
CVE-2024-6778,0,0,54facbee55d2061ebcca96c6d5abeaff15d259809b812dea7e9b8558ee133bdb,2024-11-21T09:50:18.790000
|
||||
CVE-2024-6779,0,0,371ba97cacc400735eb2bef0b73f4416d7b4718268423923ed7c983e39a36751,2024-11-21T09:50:18.973000
|
||||
CVE-2024-6780,0,0,4db2765824e08317655513c06e959ab5619d487ccfa2efc1d7c86120a66859df,2024-11-21T09:50:19.137000
|
||||
@ -273485,7 +273491,7 @@ CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaec
|
||||
CVE-2024-8478,0,0,484f2c68e6e7a76a908ae4220aa78a61277af4da3d4158c47b9f9bfdd22b29a6,2024-09-26T15:53:44.297000
|
||||
CVE-2024-8479,0,0,7f607ab6226df6cc30f72675a0a7928628cd9dd405d303e55b9ea75b85e4f01b,2024-09-27T16:12:10.427000
|
||||
CVE-2024-8480,0,0,a3222d51b9b3bc8d7bc3a958018f5a48e92863fd740c6e5bbb78fa8f0df0cf21,2024-09-26T18:13:58.470000
|
||||
CVE-2024-8481,0,0,499723ebde9a380067cf1ffb8f583f5b990c77b3412cbf0fa311d8b86707705c,2024-10-02T17:59:52.013000
|
||||
CVE-2024-8481,0,1,e96492f313c7b1441b72002a9c604dad6321f6a135632489e9b86411985da7a0,2024-12-26T14:58:41.757000
|
||||
CVE-2024-8482,0,0,57ce7318b7ddf832f81e12c73f97b2d6a83ff16fd2ddddc2f2363683908d13f3,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8483,0,0,5195ba758d6242bcccf2c248e56be79d4b9654410f6f169122c92d0c6b15f217,2024-10-02T16:42:30.347000
|
||||
CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d74,2024-10-02T17:44:13.687000
|
||||
@ -273910,9 +273916,9 @@ CVE-2024-8987,0,0,79ba228dec5ca0fbae93e303f34dbdd56a4716dc6d9e552cfa2102ec47e7c1
|
||||
CVE-2024-8989,0,0,357992e2ce66eee3f7c953860741894a33603e2d489573cb57a026d2c2a2d1e9,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8990,0,0,3370c28f297fd80b172f4e292abaacd02f3a1c4a8cb79acb64f1c13bbbbfa3d6,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8991,0,0,b6a63b7dc29d31f5a9e8816722bd5be42812012697196ec8caabd5b43893932f,2024-10-04T18:56:30.583000
|
||||
CVE-2024-8992,1,1,dffd7ef09720d7bfd16807fb500f024a6a06ab4a3d5dd17e2497a1a1c340a56d,2024-12-26T12:15:07.660000
|
||||
CVE-2024-8993,1,1,48776a82a24ff3f8336cfadd851bfc7f8ebbbb910491da12819b1db33e69afb4,2024-12-26T12:15:07.783000
|
||||
CVE-2024-8994,1,1,06ece939091150688bf8c7cedf3349a4de0c1d940628f5635dc7703ed52ca211,2024-12-26T12:15:07.897000
|
||||
CVE-2024-8992,0,0,dffd7ef09720d7bfd16807fb500f024a6a06ab4a3d5dd17e2497a1a1c340a56d,2024-12-26T12:15:07.660000
|
||||
CVE-2024-8993,0,0,48776a82a24ff3f8336cfadd851bfc7f8ebbbb910491da12819b1db33e69afb4,2024-12-26T12:15:07.783000
|
||||
CVE-2024-8994,0,0,06ece939091150688bf8c7cedf3349a4de0c1d940628f5635dc7703ed52ca211,2024-12-26T12:15:07.897000
|
||||
CVE-2024-8996,0,0,cd0b990817d2076a00b5e7fddb7f69f718917b5a243671e20171ba3b0c170ebd,2024-10-01T19:16:02.793000
|
||||
CVE-2024-9001,0,0,0872fd49b5b6a794c95c6b45ab7ebb22635740627417ff87596d735c1ddbcba9,2024-09-24T16:14:30.190000
|
||||
CVE-2024-9002,0,0,07bab80a5647df4577409503b6679799b5fed9b76f517f2c308405ac5c2a7ffe,2024-10-15T12:58:51.050000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user