Auto-Update: 2024-12-26T15:00:19.871411+00:00

This commit is contained in:
cad-safe-bot 2024-12-26 15:03:42 +00:00
parent b184f1eec7
commit 5981efc205
15 changed files with 812 additions and 69 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36504",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-14T00:15:10.423",
"lastModified": "2024-11-21T08:09:50.650",
"vulnStatus": "Modified",
"lastModified": "2024-12-26T14:58:30.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bbsetheme:bbs-e-popup:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:bbsetheme:bbs_e-popup:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.4.5",
"matchCriteriaId": "87853EFE-5C2A-4DD1-8CBE-8B1900C21BFB"
"matchCriteriaId": "DE2912A8-C351-483F-A5FF-423458EE4AB2"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1014",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-29T14:15:09.437",
"lastModified": "2024-11-21T08:49:35.903",
"vulnStatus": "Modified",
"lastModified": "2024-12-26T14:47:20.980",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -102,8 +102,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E"
"criteria": "cpe:2.3:h:se-elektronic:e-ddc3.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B4F64C-D42B-4066-A729-E759847AC2E5"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1015",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-29T14:15:09.657",
"lastModified": "2024-11-21T08:49:36.047",
"vulnStatus": "Modified",
"lastModified": "2024-12-26T14:47:20.980",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -102,8 +102,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E"
"criteria": "cpe:2.3:h:se-elektronic:e-ddc3.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B4F64C-D42B-4066-A729-E759847AC2E5"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12951",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T13:15:05.667",
"lastModified": "2024-12-26T13:15:05.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /add_personal_details.php. The manipulation of the argument profile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289314",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289314",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468644",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2024-12952",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T13:15:06.727",
"lastModified": "2024-12-26T13:15:06.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in melMass comfy_mtb up to 0.1.4. Affected by this vulnerability is the function run_command of the file comfy_mtb/endpoint.py of the component Dependency Handler. The manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named d6e004cce2c32f8e48b868e66b89f82da4887dc3. It is recommended to apply a patch to fix this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/melMass/comfy_mtb/commit/d6e004cce2c32f8e48b868e66b89f82da4887dc3",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/melMass/comfy_mtb/issues/224",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2552664778",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2553432365",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289315",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289315",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468683",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12953",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T14:15:05.147",
"lastModified": "2024-12-26T14:15:05.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected by this issue is some unknown functionality of the file /update_pd_process.php. The manipulation of the argument profile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289316",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289316",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468769",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12954",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T14:15:06.000",
"lastModified": "2024-12-26T14:15:06.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Portfolio Management System MCA 1.0. This affects an unknown part of the file /update_ach.php. The manipulation of the argument ach_certy leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README5.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289317",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289317",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.468772",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-47149",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T13:15:07.007",
"lastModified": "2024-12-26T13:15:07.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47149/",
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-47150",
"sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"published": "2024-12-26T13:15:07.140",
"lastModified": "2024-12-26T13:15:07.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.honor.com/global/security/cve-2024-47150/",
"source": "3836d913-7555-4dd0-a509-f5667fdf5fe4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5444",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-11T06:15:02.830",
"lastModified": "2024-11-21T09:47:41.810",
"vulnStatus": "Modified",
"lastModified": "2024-12-26T14:43:05.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bible_text_project:bible_text:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:mark8barnes:bible_text:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.2",
"matchCriteriaId": "07BE072F-846A-49D1-ABAE-D72BA59AEB87"
"matchCriteriaId": "B9B15D51-F33C-463B-BF9F-856EEF876D43"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5938",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T02:15:02.823",
"lastModified": "2024-11-21T09:48:36.740",
"vulnStatus": "Modified",
"lastModified": "2024-12-26T14:58:47.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:boot_store_project:boot_store:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:thecartpress:boot_store:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.6.4",
"matchCriteriaId": "377BA15D-A5E3-4D99-8D87-1499FEE21871"
"matchCriteriaId": "60F509ED-3D73-40F2-8662-62606A0A7A26"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6777",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T22:15:07.267",
"lastModified": "2024-11-21T09:50:18.620",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-26T14:55:39.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -50,6 +70,16 @@
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -61,22 +91,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "126.0.6478.182",
"matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/345640549",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/345640549",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8481",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T03:15:04.593",
"lastModified": "2024-10-02T17:59:52.013",
"lastModified": "2024-12-26T14:58:41.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blogcoding:special_text_boxes:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:simplelib:special_text_boxes:*:*:*:*:free:wordpress:*:*",
"versionEndIncluding": "6.2.2",
"matchCriteriaId": "90B9CFDE-2767-423D-9FD4-71355C89D99C"
"matchCriteriaId": "155271BD-DB93-42AA-8AF8-5D1CEB297B59"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-26T13:00:20.115447+00:00
2024-12-26T15:00:19.871411+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-26T12:15:07.897000+00:00
2024-12-26T14:58:47.547000+00:00
```
### Last Data Feed Release
@ -33,33 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274711
274717
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `6`
- [CVE-2024-12947](CVE-2024/CVE-2024-129xx/CVE-2024-12947.json) (`2024-12-26T11:15:05.790`)
- [CVE-2024-12948](CVE-2024/CVE-2024-129xx/CVE-2024-12948.json) (`2024-12-26T11:15:07.173`)
- [CVE-2024-12949](CVE-2024/CVE-2024-129xx/CVE-2024-12949.json) (`2024-12-26T12:15:05.997`)
- [CVE-2024-12950](CVE-2024/CVE-2024-129xx/CVE-2024-12950.json) (`2024-12-26T12:15:06.870`)
- [CVE-2024-47148](CVE-2024/CVE-2024-471xx/CVE-2024-47148.json) (`2024-12-26T12:15:07.063`)
- [CVE-2024-47151](CVE-2024/CVE-2024-471xx/CVE-2024-47151.json) (`2024-12-26T11:15:07.387`)
- [CVE-2024-47153](CVE-2024/CVE-2024-471xx/CVE-2024-47153.json) (`2024-12-26T12:15:07.183`)
- [CVE-2024-47154](CVE-2024/CVE-2024-471xx/CVE-2024-47154.json) (`2024-12-26T12:15:07.303`)
- [CVE-2024-47155](CVE-2024/CVE-2024-471xx/CVE-2024-47155.json) (`2024-12-26T12:15:07.433`)
- [CVE-2024-47156](CVE-2024/CVE-2024-471xx/CVE-2024-47156.json) (`2024-12-26T11:15:07.517`)
- [CVE-2024-47157](CVE-2024/CVE-2024-471xx/CVE-2024-47157.json) (`2024-12-26T12:15:07.547`)
- [CVE-2024-8992](CVE-2024/CVE-2024-89xx/CVE-2024-8992.json) (`2024-12-26T12:15:07.660`)
- [CVE-2024-8993](CVE-2024/CVE-2024-89xx/CVE-2024-8993.json) (`2024-12-26T12:15:07.783`)
- [CVE-2024-8994](CVE-2024/CVE-2024-89xx/CVE-2024-8994.json) (`2024-12-26T12:15:07.897`)
- [CVE-2024-12951](CVE-2024/CVE-2024-129xx/CVE-2024-12951.json) (`2024-12-26T13:15:05.667`)
- [CVE-2024-12952](CVE-2024/CVE-2024-129xx/CVE-2024-12952.json) (`2024-12-26T13:15:06.727`)
- [CVE-2024-12953](CVE-2024/CVE-2024-129xx/CVE-2024-12953.json) (`2024-12-26T14:15:05.147`)
- [CVE-2024-12954](CVE-2024/CVE-2024-129xx/CVE-2024-12954.json) (`2024-12-26T14:15:06.000`)
- [CVE-2024-47149](CVE-2024/CVE-2024-471xx/CVE-2024-47149.json) (`2024-12-26T13:15:07.007`)
- [CVE-2024-47150](CVE-2024/CVE-2024-471xx/CVE-2024-47150.json) (`2024-12-26T13:15:07.140`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `7`
- [CVE-2023-36504](CVE-2023/CVE-2023-365xx/CVE-2023-36504.json) (`2024-12-26T14:58:30.100`)
- [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-12-26T14:47:20.980`)
- [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-12-26T14:47:20.980`)
- [CVE-2024-5444](CVE-2024/CVE-2024-54xx/CVE-2024-5444.json) (`2024-12-26T14:43:05.523`)
- [CVE-2024-5938](CVE-2024/CVE-2024-59xx/CVE-2024-5938.json) (`2024-12-26T14:58:47.547`)
- [CVE-2024-6777](CVE-2024/CVE-2024-67xx/CVE-2024-6777.json) (`2024-12-26T14:55:39.437`)
- [CVE-2024-8481](CVE-2024/CVE-2024-84xx/CVE-2024-8481.json) (`2024-12-26T14:58:41.757`)
## Download and Usage

View File

@ -228096,7 +228096,7 @@ CVE-2023-3650,0,0,59d67f695ce0a439c91aa9aca8211e7840329c605fbc79a1b81cd1ce6873fd
CVE-2023-36501,0,0,c5fd1d48310551e06c32858d3409f4b3bb81cd7bf054db0d3372ef926c25dfa2,2024-11-21T08:09:50.330000
CVE-2023-36502,0,0,e9d4311f7e63b9210af8c1a166cb719dc6be2e97fafa60cc1a82e40b1b54f98c,2024-11-21T08:09:50.440000
CVE-2023-36503,0,0,fcdad8415d080aa47a84afac77e8960e774a0ec452ae2f7f9d9cac880e3ce051,2024-11-21T08:09:50.547000
CVE-2023-36504,0,0,38d29e3b0aec985e8f36baa2ea2618633d84dd3f61744291efedd92faec10795,2024-11-21T08:09:50.650000
CVE-2023-36504,0,1,b5bae85a56b80cc82ee2f0e40cb8a5ddeda98713155429cf430d437601a3fe5d,2024-12-26T14:58:30.100000
CVE-2023-36505,0,0,5363f501da8bfc66e09637cdf5abf2bec037ea092c52ae679457d719d6a84707,2024-11-21T08:09:50.763000
CVE-2023-36506,0,0,6af22016e284031d53b3ef3f11af4b1bf92676c075b4e08e2aebb1352de367b9,2024-12-13T15:15:16.450000
CVE-2023-36507,0,0,860d90b5f40d8a7bffdd9335fefbba3d2a2e252c703ad45f15814d2a2853d7b9,2024-11-21T08:09:50.870000
@ -243172,14 +243172,14 @@ CVE-2024-10136,0,0,1687e7cebd4edca0b737a65982fb9c424de87cc15acb38175a53b82a71807
CVE-2024-10137,0,0,f8f7215d3ce93e92144f6efe5a55c5ac5044b5c034241100e379f4163f66dd21,2024-10-22T14:17:31.527000
CVE-2024-10138,0,0,b55d0a2514636d98877966409f2919e65547e4eeafd1d900c75d88c763738105,2024-10-22T14:16:51.547000
CVE-2024-10139,0,0,a46ec81f772febd4a2634b4660ef65a5595694d8d1440f2dfd233785d6da934c,2024-10-22T14:18:12.087000
CVE-2024-1014,0,0,6f3a34ef48fded0d655d415b80816ce08c7906ef586c175776f9a862ce8cfa93,2024-11-21T08:49:35.903000
CVE-2024-1014,0,1,3b68d16ac7b67593d321fe9ae9e77edfd7762ecf7bffc2a9653df88b5ebfc53b,2024-12-26T14:47:20.980000
CVE-2024-10140,0,0,5c8d3582a9e1cf69741010665609bb47843d809bedccb1b62254ed0f178666e0,2024-10-22T14:19:08.420000
CVE-2024-10141,0,0,9f480f5e4cde435173bb5b248bf28ae1efa97ee859e6fa4ed20730ab18f55365,2024-10-23T20:27:09.370000
CVE-2024-10142,0,0,b21f3b0b970a8f035562ca65d7166416ad40a1b3d1b0f2ed6d773f0caf719d22,2024-10-22T18:11:20.450000
CVE-2024-10146,0,0,5e07a63dc9cb998c12f2ef5f735047cdc411acb65308532570ff1ef11f2b6ae8,2024-11-15T13:58:08.913000
CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb9ca,2024-11-18T17:11:17.393000
CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000
CVE-2024-1015,0,0,fd7055f7b5c31d9bcec53e167b13da75da7f80d9ecd8b3a992c86ee9373ded49,2024-11-21T08:49:36.047000
CVE-2024-1015,0,1,f5106ef87a8ce490640958ad18e87b170d3461b5088dc4b1c5335fd41b68ef46,2024-12-26T14:47:20.980000
CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000
CVE-2024-10153,0,0,205337601504c6a6060c88aa213139cbdb5096813b7204f786c736b1a09bbbe9,2024-10-22T14:45:04.670000
CVE-2024-10154,0,0,8bc22a596ba6d08db60619a5118141d0b00a385670008138b09554e9c573f4a2,2024-10-22T14:44:47.807000
@ -245149,11 +245149,15 @@ CVE-2024-12943,0,0,0e0352c3cdfb6c94c92b061e0c57fc94486d90b8be968f83a37598213c129
CVE-2024-12944,0,0,94ac533f69831e0792eddb5df819ea87ca6f4e8141ed76c926ecab8ac06efc51,2024-12-26T09:15:07.030000
CVE-2024-12945,0,0,6a75b3c16371295f70d4017ebe5efbf29d0cac38a65db0a501645e045cb67e8e,2024-12-26T10:15:05.527000
CVE-2024-12946,0,0,400d236b9f0cab3ccac13b217edebb50440dfd55bfcf1455987e627b6887d888,2024-12-26T10:15:05.777000
CVE-2024-12947,1,1,a403450fa2bbc578a8fcf83d306b673ae1cf0b372f48568ef42b885bfb717aa4,2024-12-26T11:15:05.790000
CVE-2024-12948,1,1,9ed039ff2046d0bd52c0232ea595bbbab01c59fd1089b82b348419f43d74c4c7,2024-12-26T11:15:07.173000
CVE-2024-12949,1,1,86d3ebeba0868e6b562019ec87488552d967c5cd5ccaf8d01f425a8fe584af62,2024-12-26T12:15:05.997000
CVE-2024-12947,0,0,a403450fa2bbc578a8fcf83d306b673ae1cf0b372f48568ef42b885bfb717aa4,2024-12-26T11:15:05.790000
CVE-2024-12948,0,0,9ed039ff2046d0bd52c0232ea595bbbab01c59fd1089b82b348419f43d74c4c7,2024-12-26T11:15:07.173000
CVE-2024-12949,0,0,86d3ebeba0868e6b562019ec87488552d967c5cd5ccaf8d01f425a8fe584af62,2024-12-26T12:15:05.997000
CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000
CVE-2024-12950,1,1,ca4cbf7c69d996ce2bfd33f152e0fb62d216c9cea2edc40017131b89bad1e400,2024-12-26T12:15:06.870000
CVE-2024-12950,0,0,ca4cbf7c69d996ce2bfd33f152e0fb62d216c9cea2edc40017131b89bad1e400,2024-12-26T12:15:06.870000
CVE-2024-12951,1,1,414b8ef6fdf35b84093358683da5afb7b3382068e7e9f8acbda999d479d1d854,2024-12-26T13:15:05.667000
CVE-2024-12952,1,1,b880f28fe687c0b824a45422a445e9df755a70364b015764cba902b8758181d7,2024-12-26T13:15:06.727000
CVE-2024-12953,1,1,23709a5786c8f99b782e8a710a7efbea47345eeaaafeae1249bc1f849023a0b7,2024-12-26T14:15:05.147000
CVE-2024-12954,1,1,8f39e5ac10e6fd830a15460b7aaac36438e362dedf7ea84356195659fff033f9,2024-12-26T14:15:06
CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000
CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000
CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000
@ -265763,14 +265767,16 @@ CVE-2024-4714,0,0,0d524d117aabf03780c7be3f44074976485dfc4d101c0f965f441387c1ce48
CVE-2024-47142,0,0,3b160aeed892b3de0fae2f0bd942190d42286dfc37500bd913fc0a3b0770ad8c,2024-11-22T02:15:21.280000
CVE-2024-47145,0,0,060f9bb9a43b25110359917405fc9bc4bfa91006f8a71471b803c37bd9f0df18,2024-09-26T18:42:33.550000
CVE-2024-47146,0,0,4c1ec2fd77a55fc12a380140e8b75abce8b99c7554038e5bb49a8e56f7893728,2024-12-10T19:45:51.023000
CVE-2024-47148,1,1,b2b201e492cb219881350a4ee656b7e0714f48f06b1efeb7497e58f4cfc34dd3,2024-12-26T12:15:07.063000
CVE-2024-47148,0,0,b2b201e492cb219881350a4ee656b7e0714f48f06b1efeb7497e58f4cfc34dd3,2024-12-26T12:15:07.063000
CVE-2024-47149,1,1,777275743f5865f3be6f0f8246f16b564657bd5cc036e3b2daa732b3eb5c4d7d,2024-12-26T13:15:07.007000
CVE-2024-4715,0,0,cfdee50dbf680b557a3c5935dd446958982a7767348e746e1514b6a87d45fd32,2024-11-21T09:43:26.243000
CVE-2024-47151,1,1,32ffda1955b6441bb63553c91b7088d99e558c2a2a144674b8b411a9369261be,2024-12-26T11:15:07.387000
CVE-2024-47153,1,1,3c9ddb156d4838ab4dd50ad2be03036f905c4748cf151f06b44931abbf5374c8,2024-12-26T12:15:07.183000
CVE-2024-47154,1,1,91109d991ba96e992fa2e33be15597c37ea7cea8c8a483406508c60a9929a172,2024-12-26T12:15:07.303000
CVE-2024-47155,1,1,6e65506a0eb90f835c2c554e3bfb26aa486643f08e76807e5aa35a34c35f9533,2024-12-26T12:15:07.433000
CVE-2024-47156,1,1,129b4d08361f8cc9a55f077783887ffdf655fece2a1580fba2b541389971a541,2024-12-26T11:15:07.517000
CVE-2024-47157,1,1,ac92958500bb1c8504ede364fb0734e8d324168e5026a932d89c148f0239dca6,2024-12-26T12:15:07.547000
CVE-2024-47150,1,1,d34bb8def30ddd1e10efd6b15266d2eac0ad62d8addf9f44a21ce79578e09f5e,2024-12-26T13:15:07.140000
CVE-2024-47151,0,0,32ffda1955b6441bb63553c91b7088d99e558c2a2a144674b8b411a9369261be,2024-12-26T11:15:07.387000
CVE-2024-47153,0,0,3c9ddb156d4838ab4dd50ad2be03036f905c4748cf151f06b44931abbf5374c8,2024-12-26T12:15:07.183000
CVE-2024-47154,0,0,91109d991ba96e992fa2e33be15597c37ea7cea8c8a483406508c60a9929a172,2024-12-26T12:15:07.303000
CVE-2024-47155,0,0,6e65506a0eb90f835c2c554e3bfb26aa486643f08e76807e5aa35a34c35f9533,2024-12-26T12:15:07.433000
CVE-2024-47156,0,0,129b4d08361f8cc9a55f077783887ffdf655fece2a1580fba2b541389971a541,2024-12-26T11:15:07.517000
CVE-2024-47157,0,0,ac92958500bb1c8504ede364fb0734e8d324168e5026a932d89c148f0239dca6,2024-12-26T12:15:07.547000
CVE-2024-47158,0,0,b0c240c01999f96b32d54a0c5d41b1284741ebcdb34e1f30df025b02e60124f4,2024-11-06T17:10:03.857000
CVE-2024-47159,0,0,dc6f344db4381cf6189daa37a80d59a488ca43c446da4d79e165921cf750d139,2024-09-24T18:09:50.877000
CVE-2024-4716,0,0,1b3bc70b6559a322c14d4188be000e8930d586f2680c7df71f292bb133ecff27,2024-11-21T09:43:26.380000
@ -270541,7 +270547,7 @@ CVE-2024-54436,0,0,50f2aaadb8a1ae9384ae60f68026e46bd3f9598cfdbd34eb21f00698325fc
CVE-2024-54437,0,0,16f6ccd347b342a49e1da88c1694aefeff9e893cc31cb4a150a5024ef58f3acc,2024-12-16T15:15:22.570000
CVE-2024-54438,0,0,833db86282c8f87abecab539c28e79528e3843a7acd46c3598d439c688dae985,2024-12-16T15:15:22.713000
CVE-2024-54439,0,0,8084e70e603ce1752cdcbfd728997a090db24c24cb39c5fcf7404f93404060f4,2024-12-16T15:15:22.843000
CVE-2024-5444,0,0,d122b54e471150af4b6bf3b5aac169a49909a5e1c30b12ec4d263232852abd0e,2024-11-21T09:47:41.810000
CVE-2024-5444,0,1,36f69048d386cbeda368abf26513717dd8b8ca822b22f9fe60a170ecb8b494bc,2024-12-26T14:43:05.523000
CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697387,2024-12-16T15:15:22.987000
CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000
CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000
@ -271286,7 +271292,7 @@ CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b
CVE-2024-5935,0,0,33de45cd0a9dbec9c09be2dfcdd626110c8d1494b4e9b3daff11fb78fd2ccee2,2024-11-21T09:48:36.403000
CVE-2024-5936,0,0,d33e3654fbe2f8d1101b64d197a41ff3f425b0d6a2e0640a9a89b19935133a92,2024-11-21T09:48:36.527000
CVE-2024-5937,0,0,2ef9817ef948574c57ede2754d552b256d02d4486235fa2fd7b5314353636fc5,2024-11-21T09:48:36.637000
CVE-2024-5938,0,0,afe5ef80ab959845fa9a7181860ded0b65b714e0b094d64006819cf77249b889,2024-11-21T09:48:36.740000
CVE-2024-5938,0,1,ca56ac1750495779a8b37a0ec018b68bc2fd21cbfeb20098d1d5f998ac6da3bc,2024-12-26T14:58:47.547000
CVE-2024-5939,0,0,318b3e9b499ff5b450323efa05eed5a91b82903815ef8ad200d027e36bed2ddb,2024-08-26T18:12:14.250000
CVE-2024-5940,0,0,00419b45dbaebd6c3f7bbb471b92b7dfc3e08de501bf62a1ac5f1d8f54145970,2024-08-26T18:14:14.083000
CVE-2024-5941,0,0,50b9cff2552a6f01b7b5069a5b5d20c0dc58c3654f086afba5659848e809333c,2024-08-26T18:14:39.290000
@ -272039,7 +272045,7 @@ CVE-2024-6773,0,0,b721cdb596ff1541ba1bb8d07e42929150e9ff33565e159ea3e892fe17579f
CVE-2024-6774,0,0,f2c65b7a19fe6cc63dfa08b4e4aee9ed96bcfe29384e0bfcb382a7326674290b,2024-11-21T09:50:18.100000
CVE-2024-6775,0,0,59aff284b990ac5949297db1ecbeeb7dfa61a29748cdcf7ab9843b427302ed69,2024-11-21T09:50:18.273000
CVE-2024-6776,0,0,33be44e38058cd7ddcf4e51267528970811e1d75df7b3019a5389194b8f70b19,2024-11-21T09:50:18.447000
CVE-2024-6777,0,0,0506222761965cbf53f7d57e71b6fc3e2720b9de9190346bf62aa7975239f495,2024-11-21T09:50:18.620000
CVE-2024-6777,0,1,043fbce92e733c3dc4ffda017908d058956bd68e3286cb190e277117396f8b7f,2024-12-26T14:55:39.437000
CVE-2024-6778,0,0,54facbee55d2061ebcca96c6d5abeaff15d259809b812dea7e9b8558ee133bdb,2024-11-21T09:50:18.790000
CVE-2024-6779,0,0,371ba97cacc400735eb2bef0b73f4416d7b4718268423923ed7c983e39a36751,2024-11-21T09:50:18.973000
CVE-2024-6780,0,0,4db2765824e08317655513c06e959ab5619d487ccfa2efc1d7c86120a66859df,2024-11-21T09:50:19.137000
@ -273485,7 +273491,7 @@ CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaec
CVE-2024-8478,0,0,484f2c68e6e7a76a908ae4220aa78a61277af4da3d4158c47b9f9bfdd22b29a6,2024-09-26T15:53:44.297000
CVE-2024-8479,0,0,7f607ab6226df6cc30f72675a0a7928628cd9dd405d303e55b9ea75b85e4f01b,2024-09-27T16:12:10.427000
CVE-2024-8480,0,0,a3222d51b9b3bc8d7bc3a958018f5a48e92863fd740c6e5bbb78fa8f0df0cf21,2024-09-26T18:13:58.470000
CVE-2024-8481,0,0,499723ebde9a380067cf1ffb8f583f5b990c77b3412cbf0fa311d8b86707705c,2024-10-02T17:59:52.013000
CVE-2024-8481,0,1,e96492f313c7b1441b72002a9c604dad6321f6a135632489e9b86411985da7a0,2024-12-26T14:58:41.757000
CVE-2024-8482,0,0,57ce7318b7ddf832f81e12c73f97b2d6a83ff16fd2ddddc2f2363683908d13f3,2024-10-10T12:56:30.817000
CVE-2024-8483,0,0,5195ba758d6242bcccf2c248e56be79d4b9654410f6f169122c92d0c6b15f217,2024-10-02T16:42:30.347000
CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d74,2024-10-02T17:44:13.687000
@ -273910,9 +273916,9 @@ CVE-2024-8987,0,0,79ba228dec5ca0fbae93e303f34dbdd56a4716dc6d9e552cfa2102ec47e7c1
CVE-2024-8989,0,0,357992e2ce66eee3f7c953860741894a33603e2d489573cb57a026d2c2a2d1e9,2024-10-04T13:51:25.567000
CVE-2024-8990,0,0,3370c28f297fd80b172f4e292abaacd02f3a1c4a8cb79acb64f1c13bbbbfa3d6,2024-10-04T13:51:25.567000
CVE-2024-8991,0,0,b6a63b7dc29d31f5a9e8816722bd5be42812012697196ec8caabd5b43893932f,2024-10-04T18:56:30.583000
CVE-2024-8992,1,1,dffd7ef09720d7bfd16807fb500f024a6a06ab4a3d5dd17e2497a1a1c340a56d,2024-12-26T12:15:07.660000
CVE-2024-8993,1,1,48776a82a24ff3f8336cfadd851bfc7f8ebbbb910491da12819b1db33e69afb4,2024-12-26T12:15:07.783000
CVE-2024-8994,1,1,06ece939091150688bf8c7cedf3349a4de0c1d940628f5635dc7703ed52ca211,2024-12-26T12:15:07.897000
CVE-2024-8992,0,0,dffd7ef09720d7bfd16807fb500f024a6a06ab4a3d5dd17e2497a1a1c340a56d,2024-12-26T12:15:07.660000
CVE-2024-8993,0,0,48776a82a24ff3f8336cfadd851bfc7f8ebbbb910491da12819b1db33e69afb4,2024-12-26T12:15:07.783000
CVE-2024-8994,0,0,06ece939091150688bf8c7cedf3349a4de0c1d940628f5635dc7703ed52ca211,2024-12-26T12:15:07.897000
CVE-2024-8996,0,0,cd0b990817d2076a00b5e7fddb7f69f718917b5a243671e20171ba3b0c170ebd,2024-10-01T19:16:02.793000
CVE-2024-9001,0,0,0872fd49b5b6a794c95c6b45ab7ebb22635740627417ff87596d735c1ddbcba9,2024-09-24T16:14:30.190000
CVE-2024-9002,0,0,07bab80a5647df4577409503b6679799b5fed9b76f517f2c308405ac5c2a7ffe,2024-10-15T12:58:51.050000

Can't render this file because it is too large.