Auto-Update: 2024-11-19T15:00:21.040708+00:00

This commit is contained in:
cad-safe-bot 2024-11-19 15:03:23 +00:00
parent 7a2059dc5a
commit 65ea59b623
38 changed files with 922 additions and 144 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-12627",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-05-04T03:15:10.917",
"lastModified": "2021-07-21T11:39:23.747",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6541E0DD-B74E-4532-A28A-37F35F082F3A"
"criteria": "cpe:2.3:a:janeczku:calibre-web:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2AE5A3-A014-46A6-9582-F1A294C6B7A6"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25964",
"sourceIdentifier": "vulnerabilitylab@mend.io",
"published": "2021-10-04T15:15:07.310",
"lastModified": "2021-10-08T16:54:25.847",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -115,10 +115,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.0",
"versionEndExcluding": "0.6.12",
"matchCriteriaId": "6FF6EA1D-D6C6-4A33-877E-F29514871A6D"
"matchCriteriaId": "CC8E66D2-7321-46E4-81CC-097EA0A8794F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25965",
"sourceIdentifier": "vulnerabilitylab@mend.io",
"published": "2021-11-16T10:15:06.947",
"lastModified": "2021-11-17T17:57:34.253",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -115,10 +115,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.0",
"versionEndIncluding": "0.6.13",
"matchCriteriaId": "F0824626-B1BE-45B8-AF97-491AAFA36FB3"
"matchCriteriaId": "703730EE-5EE8-479D-97A3-E1EC55A75369"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4164",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-01-17T13:15:08.193",
"lastModified": "2022-01-22T03:47:47.437",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -107,9 +107,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.15",
"matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB"
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4170",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-01-16T21:15:07.900",
"lastModified": "2022-01-22T03:12:41.697",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -107,9 +107,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.15",
"matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB"
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4171",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-01-17T10:15:07.857",
"lastModified": "2022-01-24T18:36:32.673",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.15",
"matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB"
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0273",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-01-30T14:15:07.597",
"lastModified": "2022-03-17T16:11:35.453",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.16",
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0339",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-01-30T14:15:07.877",
"lastModified": "2022-03-17T16:16:56.813",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.16",
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0352",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-01-28T22:15:15.327",
"lastModified": "2022-03-15T16:08:51.150",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.16",
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0405",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-03T19:15:07.817",
"lastModified": "2022-04-11T16:07:31.907",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -107,9 +107,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.16",
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0406",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-03T19:15:07.880",
"lastModified": "2022-04-09T15:52:49.447",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.16",
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0766",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-03-07T07:15:07.257",
"lastModified": "2022-03-11T17:08:58.820",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.17",
"matchCriteriaId": "FFC250B3-EA6A-45C9-8CE4-1456B205320E"
"matchCriteriaId": "E43AE325-09EA-47E5-878F-360B5C90F01D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0767",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-03-07T07:15:07.463",
"lastModified": "2022-03-14T13:13:13.093",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -117,9 +117,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.17",
"matchCriteriaId": "FFC250B3-EA6A-45C9-8CE4-1456B205320E"
"matchCriteriaId": "E43AE325-09EA-47E5-878F-360B5C90F01D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0939",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-04T10:15:08.477",
"lastModified": "2022-04-11T17:30:29.703",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -107,9 +107,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.18",
"matchCriteriaId": "A4296881-9A6D-4E56-A33D-CB8A280F949D"
"matchCriteriaId": "6AC00DC5-E71A-41B8-9728-374A14EE4458"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0990",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-04T18:15:07.817",
"lastModified": "2022-04-12T09:24:40.387",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -107,9 +107,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.18",
"matchCriteriaId": "A4296881-9A6D-4E56-A33D-CB8A280F949D"
"matchCriteriaId": "6AC00DC5-E71A-41B8-9728-374A14EE4458"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1884",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:07.803",
"lastModified": "2024-11-15T20:35:02.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T14:47:48.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -63,8 +83,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,10 +103,44 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://huntr.com/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b",
"source": "security@huntr.dev"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.12.7",
"matchCriteriaId": "DE99FDD7-1B59-4533-B5FA-F946D0C95630"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b",
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2525",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-04-15T13:15:44.940",
"lastModified": "2023-04-24T18:50:21.427",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -78,9 +78,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.20",
"matchCriteriaId": "D18AE1BC-0C3E-42C4-8DFF-2CFCE44AF39D"
"matchCriteriaId": "4CFCBA02-FCF2-4465-85CC-2A0E784C49D3"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-30765",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-16T02:15:06.827",
"lastModified": "2022-05-24T18:58:57.977",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:0.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3DE8BF-324A-450B-B4C0-9D9FEED78D6E"
"criteria": "cpe:2.3:a:janeczku:calibre-web:0.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC2D2B1-9DCA-4F48-8385-0EB880737944"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0109",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:08.097",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T14:44:24.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c",
"source": "security@huntr.dev"
},
"nodes": [
{
"url": "https://huntr.com/bounties/1899ffb2-ce1e-4dc0-af96-972612190f6e",
"source": "security@huntr.dev"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usememos:memos:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02F8AADD-D194-452F-8BF1-75FE8F32A062"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c",
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/1899ffb2-ce1e-4dc0-af96-972612190f6e",
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0737",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:08.363",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T14:43:04.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc",
"source": "security@huntr.dev"
},
"nodes": [
{
"url": "https://huntr.com/bounties/4ba20fe7-4061-4dfb-ab2f-ecaf110641a5",
"source": "security@huntr.dev"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wallabag:wallabag:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6D0FA5-9278-432C-B42F-4FFC71B0EB27"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc",
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/4ba20fe7-4061-4dfb-ab2f-ecaf110641a5",
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2106",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-04-15T14:15:07.760",
"lastModified": "2023-04-25T16:29:34.127",
"lastModified": "2024-11-19T13:55:30.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -78,9 +78,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.20",
"matchCriteriaId": "D18AE1BC-0C3E-42C4-8DFF-2CFCE44AF39D"
"matchCriteriaId": "4CFCBA02-FCF2-4465-85CC-2A0E784C49D3"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47124",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-04T21:15:33.850",
"lastModified": "2023-12-07T21:01:24.967",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-19T14:15:16.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -153,11 +153,8 @@
]
},
{
"url": "ttps://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/",
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
"url": "https://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10204",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-11-19T14:15:16.940",
"lastModified": "2024-11-19T14:15:16.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based Buffer Overflow and Uninitialized Variable vulnerabilities exist in the X_B and SAT file reading procedure in eDrawings from Release SOLIDWORKS 2024 through Release SOLIDWORKS 2025. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted X_B or SAT file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10924",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-15T04:15:03.613",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T14:15:17.187",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -68,6 +68,10 @@
"url": "https://plugins.trac.wordpress.org/changeset/3188431/really-simple-ssl",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5d05ad-1a7a-43d2-bbbf-597e975446be?source=cve",
"source": "security@wordfence.com"

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2024-11075",
"sourceIdentifier": "psirt@sick.de",
"published": "2024-11-19T14:15:17.340",
"lastModified": "2024-11-19T14:15:17.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
"source": "psirt@sick.de"
},
{
"url": "https://sick.com/psirt",
"source": "psirt@sick.de"
},
{
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
"source": "psirt@sick.de"
},
{
"url": "https://www.first.org/cvss/calculator/3.1",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.json",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.pdf",
"source": "psirt@sick.de"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11159",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-13T14:15:15.330",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T14:56:37.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "El uso de contenido remoto en mensajes cifrados con OpenPGP puede provocar la divulgaci\u00f3n de texto plano. Esta vulnerabilidad afecta a Thunderbird < 128.4.3 y Thunderbird < 132.0.1."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925929",
"source": "security@mozilla.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-61/",
"source": "security@mozilla.org"
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-62/",
"source": "security@mozilla.org"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionEndExcluding": "128.4.3",
"matchCriteriaId": "AFC5B426-F05D-4BC9-B70B-2B219990C5A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionStartIncluding": "129.0",
"versionEndExcluding": "132.0.1",
"matchCriteriaId": "7662AA1E-5DBA-4BFC-9127-48EAA8AFE5C0"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925929",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-61/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-62/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11198",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-19T13:15:04.157",
"lastModified": "2024-11-19T13:15:04.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GD Rating System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018extra_class\u2019 parameter in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/gd-rating-system/tags/3.6.1/d4plib/plugin/d4p.shortcodes.php#L63",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3189622/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/gd-rating-system/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66cad18d-a433-47f1-9cb6-c619c8717a0d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11224",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-19T13:15:04.423",
"lastModified": "2024-11-19T13:15:04.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Parallax Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018position\u2019 parameter in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/parallax-image/tags/1.9/assets/shortcode.php#L156",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3189649/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/parallax-image/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56e5f7c9-ad22-43b3-9bfe-0eea1f8040d3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21538",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-08T05:15:06.453",
"lastModified": "2024-11-08T19:01:03.880",
"lastModified": "2024-11-19T14:15:17.627",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -64,6 +64,10 @@
"url": "https://github.com/moxystudio/node-cross-spawn/pull/160",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230",
"source": "report@snyk.io"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23715",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:20.080",
"lastModified": "2024-11-15T14:00:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T14:03:09.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,66 @@
"value": "En PMRWritePMPageList de pmr.c, existe una posible escritura fuera de los l\u00edmites debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44206",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-24T17:15:16.620",
"lastModified": "2024-10-29T21:35:15.080",
"vulnStatus": "Modified",
"lastModified": "2024-11-19T13:47:18.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
"exploitabilityScore": 3.9,
"impactScore": 4.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51758",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-07T18:15:17.787",
"lastModified": "2024-11-08T19:01:03.880",
"lastModified": "2024-11-19T14:15:17.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,10 +22,10 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "LOW",
@ -55,8 +55,8 @@
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"baseScore": 2.3,
"baseSeverity": "LOW"
}
}
],

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-52675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T13:15:04.700",
"lastModified": "2024-11-19T13:15:04.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SourceCodester Sentiment Based Movie Rating System 1.0 is vulnerable to SQL Injection in /msrps/movies.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xubeining/Cve_report/blob/main/Sourcecodester-SQLi-Sentiment-Based-Moive-Rating.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-52711",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T14:15:18.207",
"lastModified": "2024-11-19T14:15:18.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/CLan-nad/CVE/blob/main/D-Link/ip_position_asp/1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-9777",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-19T13:15:04.850",
"lastModified": "2024-11-19T13:15:04.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ashe theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.243. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://themes.trac.wordpress.org/browser/ashe/2.242/functions.php#L101",
"source": "security@wordfence.com"
},
{
"url": "https://themes.trac.wordpress.org/browser/ashe/2.242/functions.php#L112",
"source": "security@wordfence.com"
},
{
"url": "https://themes.trac.wordpress.org/changeset/248853/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/themes/ashe/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce6c2f36-9eed-482f-9201-8d26e8c5c369?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-9830",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-19T13:15:05.107",
"lastModified": "2024-11-19T13:15:05.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Bard theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.216. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://themes.trac.wordpress.org/browser/bard/2.216/functions.php#L109",
"source": "security@wordfence.com"
},
{
"url": "https://themes.trac.wordpress.org/browser/bard/2.216/functions.php#L98",
"source": "security@wordfence.com"
},
{
"url": "https://themes.trac.wordpress.org/changeset/248854/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/themes/bard/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9aff1e5b-2f16-43d0-b75a-c07e59a9c15f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-19T13:00:19.355303+00:00
2024-11-19T15:00:21.040708+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-19T12:15:16.497000+00:00
2024-11-19T14:56:37.800000+00:00
```
### Last Data Feed Release
@ -33,24 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
270311
270319
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `8`
- [CVE-2024-11036](CVE-2024/CVE-2024-110xx/CVE-2024-11036.json) (`2024-11-19T11:15:04.343`)
- [CVE-2024-11038](CVE-2024/CVE-2024-110xx/CVE-2024-11038.json) (`2024-11-19T11:15:05.683`)
- [CVE-2024-11194](CVE-2024/CVE-2024-111xx/CVE-2024-11194.json) (`2024-11-19T12:15:16.497`)
- [CVE-2024-11195](CVE-2024/CVE-2024-111xx/CVE-2024-11195.json) (`2024-11-19T11:15:05.930`)
- [CVE-2024-10204](CVE-2024/CVE-2024-102xx/CVE-2024-10204.json) (`2024-11-19T14:15:16.940`)
- [CVE-2024-11075](CVE-2024/CVE-2024-110xx/CVE-2024-11075.json) (`2024-11-19T14:15:17.340`)
- [CVE-2024-11198](CVE-2024/CVE-2024-111xx/CVE-2024-11198.json) (`2024-11-19T13:15:04.157`)
- [CVE-2024-11224](CVE-2024/CVE-2024-112xx/CVE-2024-11224.json) (`2024-11-19T13:15:04.423`)
- [CVE-2024-52675](CVE-2024/CVE-2024-526xx/CVE-2024-52675.json) (`2024-11-19T13:15:04.700`)
- [CVE-2024-52711](CVE-2024/CVE-2024-527xx/CVE-2024-52711.json) (`2024-11-19T14:15:18.207`)
- [CVE-2024-9777](CVE-2024/CVE-2024-97xx/CVE-2024-9777.json) (`2024-11-19T13:15:04.850`)
- [CVE-2024-9830](CVE-2024/CVE-2024-98xx/CVE-2024-9830.json) (`2024-11-19T13:15:05.107`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `28`
- [CVE-2024-31141](CVE-2024/CVE-2024-311xx/CVE-2024-31141.json) (`2024-11-19T09:15:03.860`)
- [CVE-2021-4164](CVE-2021/CVE-2021-41xx/CVE-2021-4164.json) (`2024-11-19T13:55:30.697`)
- [CVE-2021-4170](CVE-2021/CVE-2021-41xx/CVE-2021-4170.json) (`2024-11-19T13:55:30.697`)
- [CVE-2021-4171](CVE-2021/CVE-2021-41xx/CVE-2021-4171.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0273](CVE-2022/CVE-2022-02xx/CVE-2022-0273.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0339](CVE-2022/CVE-2022-03xx/CVE-2022-0339.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0352](CVE-2022/CVE-2022-03xx/CVE-2022-0352.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0405](CVE-2022/CVE-2022-04xx/CVE-2022-0405.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0406](CVE-2022/CVE-2022-04xx/CVE-2022-0406.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0766](CVE-2022/CVE-2022-07xx/CVE-2022-0766.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0767](CVE-2022/CVE-2022-07xx/CVE-2022-0767.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0939](CVE-2022/CVE-2022-09xx/CVE-2022-0939.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0990](CVE-2022/CVE-2022-09xx/CVE-2022-0990.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-1884](CVE-2022/CVE-2022-18xx/CVE-2022-1884.json) (`2024-11-19T14:47:48.443`)
- [CVE-2022-2525](CVE-2022/CVE-2022-25xx/CVE-2022-2525.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-30765](CVE-2022/CVE-2022-307xx/CVE-2022-30765.json) (`2024-11-19T13:55:30.697`)
- [CVE-2023-0109](CVE-2023/CVE-2023-01xx/CVE-2023-0109.json) (`2024-11-19T14:44:24.977`)
- [CVE-2023-0737](CVE-2023/CVE-2023-07xx/CVE-2023-0737.json) (`2024-11-19T14:43:04.257`)
- [CVE-2023-2106](CVE-2023/CVE-2023-21xx/CVE-2023-2106.json) (`2024-11-19T13:55:30.697`)
- [CVE-2023-47124](CVE-2023/CVE-2023-471xx/CVE-2023-47124.json) (`2024-11-19T14:15:16.660`)
- [CVE-2024-10924](CVE-2024/CVE-2024-109xx/CVE-2024-10924.json) (`2024-11-19T14:15:17.187`)
- [CVE-2024-11159](CVE-2024/CVE-2024-111xx/CVE-2024-11159.json) (`2024-11-19T14:56:37.800`)
- [CVE-2024-21538](CVE-2024/CVE-2024-215xx/CVE-2024-21538.json) (`2024-11-19T14:15:17.627`)
- [CVE-2024-23715](CVE-2024/CVE-2024-237xx/CVE-2024-23715.json) (`2024-11-19T14:03:09.400`)
- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-11-19T13:47:18.787`)
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-19T14:15:17.763`)
## Download and Usage

View File

@ -147540,7 +147540,7 @@ CVE-2020-12621,0,0,8ce7e90cf5d38925e940068a7ae81f0e149cc8eb6774d0a2c1c7e217670dc
CVE-2020-12624,0,0,8a0fc770343fdc04bd996cf45f0ff8eee77a483d3005ca548b79b2bbdd4878fd,2021-07-21T11:39:23.747000
CVE-2020-12625,0,0,ba670072932e2f84ce8a6ee211183dd0aafd451a1d585c003e4b8f0ee8b0710c,2022-09-02T15:42:45.577000
CVE-2020-12626,0,0,ef4ab069cdfdd918b1dfdbdff6dc1e10a89ec07b516956413a5df9b27f4d80a5,2022-09-02T15:42:13.713000
CVE-2020-12627,0,0,4fda3009492ad546c4d5a3562ffd500cda465cebf90e0a13cff7e8abbd887f5f,2021-07-21T11:39:23.747000
CVE-2020-12627,0,1,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000
CVE-2020-12629,0,0,6302c256329ddcf42ee813098eb846d57616b48336546370f0e8d1971103bb7c,2020-05-06T20:44:34.660000
CVE-2020-1263,0,0,9a370617ef73138b079100cfabf08396db758880aa61ac1612d7dd94a8f958b0,2021-07-21T11:39:23.747000
CVE-2020-12635,0,0,20c8e4b2f600aed040904c974ad6e679133a1f04f71dd085db50281f95159af7,2024-02-14T01:17:43.863000
@ -171654,8 +171654,8 @@ CVE-2021-25960,0,0,8966318153632386e613d3da07433d0898ebe541ac0542fbd833b88414c9a
CVE-2021-25961,0,0,22b470ce8b666ea20e5d0cab6ff8f13de084ad6910d45348aef26ed926ddac00,2021-10-07T17:05:48.717000
CVE-2021-25962,0,0,935f7ba91aea9f19056fdc881199025fe86ee6e75a7a00550a994ee72bbc4ce8,2021-10-06T20:30:01.977000
CVE-2021-25963,0,0,eef6fbaad1cf210ebcdcb4dde111b82ed2ae28fe021f79460bcb208f56e7438b,2021-10-07T03:02:46.987000
CVE-2021-25964,0,0,1105f4248cfe8217637ea2f1e32fbc092427b3108c6f28f4c181ae24b17795e6,2021-10-08T16:54:25.847000
CVE-2021-25965,0,0,bdfca22f9f9fd49ade05743667632f9667f3b4bda35d1c7e3625d94a0907a2c8,2021-11-17T17:57:34.253000
CVE-2021-25964,0,1,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000
CVE-2021-25965,0,1,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000
CVE-2021-25966,0,0,6631aa3daac52e584c6ac4608617627ea90e46497039ab1b233e796a5197021e,2022-02-25T16:10:26.793000
CVE-2021-25967,0,0,4ab84532fd7ed4fc14ba083adea1ce2392a7e866ae5f01e12da82d39bc860ffa,2021-12-02T18:59:55.443000
CVE-2021-25968,0,0,182c7f567a0aaa94a30caeae3513295d58f799b9efd65c2c904f1dab7bc4d009,2021-10-21T23:39:03.337000
@ -183333,7 +183333,7 @@ CVE-2021-41636,0,0,63eecb7b37c7497bc2d0e66fda0c87c3bb39b2ae9ef4daaf774dfdae2e15c
CVE-2021-41637,0,0,3e7106415adaddf34c5f560098cc1181920e94facbddb201ad017dee908edb96,2022-07-01T16:48:40.010000
CVE-2021-41638,0,0,613e6d48da7577b6a41011f792da0d6bf850458d5b4d0fcad9ddc862b5e440cb,2022-07-01T16:54:44.490000
CVE-2021-41639,0,0,e4459c0cc2a18f37534ab8228cfd8beba9d057a0a4566969f9e85d8579ad29e7,2022-07-01T16:54:56.413000
CVE-2021-4164,0,0,26181d4e06fb35e672b10f10964a70aba9447fc6088db27bea77bead96157982,2022-01-22T03:47:47.437000
CVE-2021-4164,0,1,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000
CVE-2021-41641,0,0,471e4e684c15a020d266300f4f064d2429fafbadc4766e60775831b2cf58f0b5,2022-06-21T14:47:44.067000
CVE-2021-41643,0,0,e459bb9b3ae61ce1c0c6d285d271ea229748355da335583ec31fcdddf509d6f3,2021-11-02T19:39:02.490000
CVE-2021-41644,0,0,9865dd6292c1189e24150efd40a621f72aa038c9804a6547447118cc86d16ed2,2021-11-02T18:49:45.500000
@ -183373,8 +183373,8 @@ CVE-2021-41694,0,0,f50452abd758a90efb8659fe89ef0455f4d267a5131c762b8f8e62ab5bbf1
CVE-2021-41695,0,0,dd9e067ec3b53cda9f935034e15232d6d5e79f62a053b26d0f77f6909e4ac1ef,2021-12-14T15:36:10.400000
CVE-2021-41696,0,0,8e34760fd4621f0aa12fba1e5efd349f7fa4de5d0772846e528bcb8650f3de63,2021-12-14T15:30:11.617000
CVE-2021-41697,0,0,33b358b7127382c3f55513ad663c443b6239f7d67ea40b4e900a1c92ef4cc59d,2021-12-14T15:14:33.733000
CVE-2021-4170,0,0,37cbcdb61a8ee5f3ba710bd39dc849d34109ce80f3874799c94ebc63d0ba55e0,2022-01-22T03:12:41.697000
CVE-2021-4171,0,0,7e081fd412650ca1bfd9c672a45b8fcebeb6f3472d43f59bc36a90f173d45e33,2022-01-24T18:36:32.673000
CVE-2021-4170,0,1,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000
CVE-2021-4171,0,1,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000
CVE-2021-41714,0,0,fc9e637af1a0036f13895530a7345d717282538ded5aaa19ffc08da024090e87,2022-06-03T14:15:01.887000
CVE-2021-41715,0,0,e54eedea66b5b1eee4cce4189c84d7d77fe6adbb9ea079fcd98fdaf28b2809e3,2022-04-14T20:28:35.890000
CVE-2021-41716,0,0,cadf2b7de621cc4d3a3a955adc24a880843a6c905295b60f449a49d359880f71,2021-12-08T14:48:53.020000
@ -187846,7 +187846,7 @@ CVE-2022-0269,0,0,0b042406ed722bed4f08f80b4f00c84357c8cea0b40b051befc2509217a3a6
CVE-2022-0270,0,0,547484ec0a42fe3acfc13bd179336b2c7cf9e5bfa133be62f505695ac6b594fe,2023-07-21T16:53:18.197000
CVE-2022-0271,0,0,b9998bff8556a3e9dd78071b57144ad5eb927440f09838acadc201638d9c53a4,2022-04-15T17:54:39.720000
CVE-2022-0272,0,0,ba39c601e8f8ad770ec51471a81d25ffe2f0563ea1a0215aed7e5549b2ba80bc,2022-04-28T18:40:19.163000
CVE-2022-0273,0,0,a2c9906b46f54a3fc5103c11411b957a7faa0137e90e264c1c237a108e5927ac,2022-03-17T16:11:35.453000
CVE-2022-0273,0,1,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000
CVE-2022-0274,0,0,5b464b8245e5321eeea5cde4c0986f9d63275f8e971c1a66b7e4500348e1edc6,2022-01-25T14:48:16.997000
CVE-2022-0277,0,0,54014335e700fab8a415cb3d21845a08a975de96657a8cbd1df94a58e34845ed,2023-06-29T08:15:09.807000
CVE-2022-0278,0,0,bbe12ed35bb88da2486e8c13a6baaafb99e94fb880ba9c3fdbf3c9d24bfb016a,2022-01-26T03:22:09.423000
@ -187906,7 +187906,7 @@ CVE-2022-0335,0,0,c87f7140ccb139e3761172aa2f563e4109797f37ee8bf08d3125bcc7f75ad6
CVE-2022-0336,0,0,307b1c206992ca977db64c933e94fd941cf38b8332fd987ef4968a8aafac3993,2023-09-17T09:15:10.277000
CVE-2022-0337,0,0,75762347a627388711d1f024fb68d21bc655a56ca3208dec8afc0cf007c526e8,2023-01-09T19:17:54.197000
CVE-2022-0338,0,0,2606c9f2afde98ccb459d99f4a20258712105b5775cab8d092cb1216a49083f9,2023-08-02T09:15:11.420000
CVE-2022-0339,0,0,1b98dbf84cebdb5dbd8174a419b58a38b961d56cad735966547a2ec684491256,2022-03-17T16:16:56.813000
CVE-2022-0339,0,1,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000
CVE-2022-0341,0,0,6bc29c60602591923783e75b9647c6eedf344c6d18b4537b8c917185e44cb4b4,2022-03-18T18:00:28.817000
CVE-2022-0342,0,0,192c7e727dc228b67703fcbfa825f1994bc25fe903e9046ec3ccd660229b0664,2022-04-04T17:27:58.343000
CVE-2022-0343,0,0,9b4662c7106d8ca9b502a9d147c3d0debb4425324b85f0dcc86bf35395bea467,2022-04-07T16:31:33.783000
@ -187918,7 +187918,7 @@ CVE-2022-0348,0,0,41d5c28d0d1ab089ac68d1912e05f4337627e5cea9fba44ca38c395f8d8254
CVE-2022-0349,0,0,068d099492481419d374d2003ba2aab3b7d6988afb1cc3a820cd310c5c5be982,2022-03-11T20:44:24.327000
CVE-2022-0350,0,0,4d2f2dd515eed464ce450a16a96b9a4c6b0b857965f9f86d554d1100c638b80f,2023-03-07T22:40:44.473000
CVE-2022-0351,0,0,d8c1cca7ff8811855948a48757571f7f9926e2f30bbcb8ecf722b183b33e26f4,2022-11-09T19:20:23.007000
CVE-2022-0352,0,0,d655b88d16f1b100cb6807b99936916e268559477432619c05721d420e8f62b3,2022-03-15T16:08:51.150000
CVE-2022-0352,0,1,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000
CVE-2022-0353,0,0,1bde6ae86e109805348b0fe8a1ea22f783b296f97417591fd534964877f7a921,2023-10-30T18:18:25.037000
CVE-2022-0354,0,0,08d2a7b0ab08e8bc6919039c3edf04df57c0887581b95ac3307601a9b6d27779,2023-08-08T14:22:24.967000
CVE-2022-0355,0,0,6f40eae045470357a76ef57564a0e59b6ca2e456718480f7cb2332766b81d912,2023-08-02T09:15:11.547000
@ -187970,8 +187970,8 @@ CVE-2022-0401,0,0,fd0c1ff73b88c5d9692a05caa80d58d887c8a37e7f114a6685c34c493b8913
CVE-2022-0402,0,0,92f9b155923211e2ceee2d42d296863f6f1f38af6d18510a65170addd06c966c,2024-01-22T21:01:52.430000
CVE-2022-0403,0,0,54d3a8e21af141a32e192ed41de5542c8ee2cafce593d7553180addfbe7d22f5,2022-04-11T16:16:43.773000
CVE-2022-0404,0,0,298dccd25c1952207280414f8bd7e0b22fde3e98e64d2fb17b1031e8a652b119,2023-11-07T03:41:14.680000
CVE-2022-0405,0,0,444a4f2026f3bc69b25c29380ab5e2bf9b910cd7c2c312cf9ef76016a1a95299,2022-04-11T16:07:31.907000
CVE-2022-0406,0,0,a441ef815a14d749ca2d58b6be22dd9608fe0be8eb3d1dfb9d29d838cf9c4f3a,2022-04-09T15:52:49.447000
CVE-2022-0405,0,1,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000
CVE-2022-0406,0,1,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000
CVE-2022-0407,0,0,0155b2a87f71b0b7fb0916580421bf8b007742dea3e03201cc1d9b516db1f9a1,2022-08-26T17:35:22.767000
CVE-2022-0408,0,0,c5724b74e67f805cb7cef848135fd972bd1216e01e032e5ee72fd927b68010c6,2023-11-07T03:41:15.057000
CVE-2022-0409,0,0,bdddcb1bc9179f07dc0a4ae2adcd12204cfc01caa1f9bd597938d2e20a4a0885,2022-03-01T01:57:03.397000
@ -188319,8 +188319,8 @@ CVE-2022-0762,0,0,92ae39eefd66ea7cbc32a8686599ec741c84b55a252f147df8d414c0e43894
CVE-2022-0763,0,0,d8fa3da7528e8203bd3a9ef37cccbd85be752760dc10937953f39359a9f93d3b,2022-03-08T17:25:17.980000
CVE-2022-0764,0,0,343066202ab53f2821e9e5df90301b5dd58745b58610e9036f49df289f6d59d2,2023-07-21T17:13:18.700000
CVE-2022-0765,0,0,f45389e2abd373ef50c4b2eaf76af5c989711ff021560b421d272973fd1993b0,2022-04-27T00:07:20.813000
CVE-2022-0766,0,0,b2ccd107a9d1daab9412c94c8371dbafadae12bb91fd3c16030da56c47874ee7,2022-03-11T17:08:58.820000
CVE-2022-0767,0,0,c7d6b46f0a32842a8f32b42cac5e239b9b7a650e21a18f0420d715066c6ca00e,2022-03-14T13:13:13.093000
CVE-2022-0766,0,1,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000
CVE-2022-0767,0,1,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000
CVE-2022-0768,0,0,7413d50a96f5047476d4044fe93ebaaab8948f5b8b6e5644533ed04e60d94495,2022-03-08T17:34:05.377000
CVE-2022-0769,0,0,186d87009c3299115358ed003347610f261ff2fff63be099b887bf8e21eab2ea,2022-05-04T13:59:27.377000
CVE-2022-0770,0,0,2b2c8df5ef6f7c812d46374c4465bb9d474ff8112a462c85978629ead78fc435,2022-04-04T18:55:52.103000
@ -188485,7 +188485,7 @@ CVE-2022-0935,0,0,4937ede48adff99b8a82685ce1c47ab995cfa52213926d00546e0ed28661fc
CVE-2022-0936,0,0,5e1301a868c51f32d9b1d38c3bd9d5c4e7b252e5c9034d5c170399428a55d018,2022-04-14T20:39:32.157000
CVE-2022-0937,0,0,6ebd398e67ed3e0577049a7473f2e9b69a1755b2dd70b6e7cd0177ef47d0ed36,2022-03-18T18:14:39.940000
CVE-2022-0938,0,0,53311bc36c380c526ea038cf13a8d2ff3d90835a99184a433f43babd3148fad1,2022-03-18T18:09:18.637000
CVE-2022-0939,0,0,c2915debcf9880de4772fa9e967b96a57b2ee44227ae14b7c60081df92bbbc68,2022-04-11T17:30:29.703000
CVE-2022-0939,0,1,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000
CVE-2022-0940,0,0,70c545df86ee91c07e5f16b8db56ecfe025f705cbd301d61814768bd18a46665,2022-03-18T17:58:19.337000
CVE-2022-0941,0,0,ac156d3ea26d89f38610a523301b2336456b75734150d52009650c143803332b,2022-03-18T17:37:51.753000
CVE-2022-0942,0,0,dec36e5bdc2646c8ba8c9b40004d57a13bf18d262c0580e836243465cf2f3bee,2022-03-22T18:06:16.860000
@ -188536,7 +188536,7 @@ CVE-2022-0986,0,0,1f3d8cfe5b4034f8cb2379ef060f1b0fce7bd502c6c6229913f30a0e5af318
CVE-2022-0987,0,0,f2c42d4d9f95e9749a4c445c80a51b63228a99080839ef62a18bb9765a5a0f2b,2022-07-09T02:16:41.140000
CVE-2022-0988,0,0,f1199d2b132d579bf0e13054467a88fb08e72497869a87789662b30278c0d972,2022-04-01T12:24:18.417000
CVE-2022-0989,0,0,7454afdecfc72b7e4a57bd0f5cbdf02a26a78ca6613e027ac6b4e5823196793c,2022-04-15T20:22:57.330000
CVE-2022-0990,0,0,221d6abbba16c22be53064dc133896bd80598ba0ff53cf9f7b9a238da1f84bb3,2022-04-12T09:24:40.387000
CVE-2022-0990,0,1,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000
CVE-2022-0991,0,0,8ca24c514df2eadfc1666ca1ace95d3168a9e969f9b3fcbe0a2a99e49de31694,2022-03-28T18:54:03.633000
CVE-2022-0992,0,0,6fd70fc3b7474ab91729ad584c70484a0877149adc006c6f9bd7347bb2357681,2023-11-07T03:41:41.573000
CVE-2022-0993,0,0,78c1b936011bd648dc08da3df4bfe29b3fe82fd44846684d5bf8f67b8b826931,2024-01-11T09:15:43.237000
@ -189401,7 +189401,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0
CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000
CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000
CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000
CVE-2022-1884,0,0,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000
CVE-2022-1884,0,1,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000
CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000
CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000
CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000
@ -194407,7 +194407,7 @@ CVE-2022-25246,0,0,470d73336081fafe2504c5ae930c1bc5c3b04d6c1d5bca8e82a1ca62a276c
CVE-2022-25247,0,0,f1828753959f3a8ddb7cef9c2b17b9ebe6e005ad9804df2524e5e91b5305ed43,2022-03-28T13:25:59.947000
CVE-2022-25248,0,0,1e003ed9c345c86a0ae7342705f6b5b76c7a524c725fb9f26e480a2de2ce199c,2022-03-28T13:27:40.890000
CVE-2022-25249,0,0,5096787f68913f3af8deec7d28059622eee59c935f342d23008ba2d1adcdb681,2022-03-28T13:29:31.777000
CVE-2022-2525,0,0,210cce692d9a912425d2e96ebcf9a983eeacf6087702bc018f6146cd0ff7680f,2023-04-24T18:50:21.427000
CVE-2022-2525,0,1,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000
CVE-2022-25250,0,0,70256af592b9c49051cb696e3e98b6b318b6b9bd7c026c62389ebc173f763a81,2022-03-28T13:29:56.907000
CVE-2022-25251,0,0,30aa9f042433ef7f24b6a381a3a50cfd25bc3a4fa4c2ee4d2a94c9598ed3cb9e,2022-03-28T13:30:39.300000
CVE-2022-25252,0,0,40a835ffc450f4499e9c229b3d3a44e165cbb918e6082351e6d9edd95f09ca0d,2022-03-28T13:32:35.907000
@ -198901,7 +198901,7 @@ CVE-2022-30759,0,0,bd8543e5a8b11fb4636241908ba990e450528de2ca3ce6a2cc2c2e92c529e
CVE-2022-3076,0,0,04a5db7a7c3a6c41fc8643ca8ef27e8b694c85120ab617b9e4549a6d82fe6ea6,2022-09-27T04:37:44.793000
CVE-2022-30760,0,0,33981d8f48d80e2e251879e187507ead15290cf13fe04528ee7cc8601a8463a9,2022-06-17T19:57:09.527000
CVE-2022-30763,0,0,99c247d1a877e52090357101b5b4001a96c949c6e441faf9185997c22c969e91,2022-10-12T15:32:50.077000
CVE-2022-30765,0,0,761225e6da5f713d9c25f52dab8c0b338789eb157822a77f4fba5e290157ab62,2022-05-24T18:58:57.977000
CVE-2022-30765,0,1,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000
CVE-2022-30767,0,0,4775e6dfb882ca3a196625f46d2186ce01f414513db4c144b862289f8c58d6a5,2023-11-07T03:47:24.783000
CVE-2022-30768,0,0,19753dea6aeae531834932bdbe525a85c3a36862042bf97e7f1ddd6d4e4b3d91,2023-11-07T03:47:24.853000
CVE-2022-30769,0,0,15fa8cc9f9e5fd9012a9ab8a52b506ef029d295e9d752a237cf87b7e4f8050e9,2023-11-07T03:47:24.913000
@ -212973,7 +212973,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf
CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000
CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000
CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000
CVE-2023-0109,0,0,6abc61d95fd57ef73d1f6ec7554842d23df16b10a4dd404e5111c256f31d1109,2024-11-15T13:58:08.913000
CVE-2023-0109,0,1,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000
CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000
CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000
CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000
@ -213577,7 +213577,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5
CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000
CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000
CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000
CVE-2023-0737,0,0,3bb780fc0a538b18d6fde6ba59591151c98c891a49485224230137e3bdf6af31,2024-11-15T13:58:08.913000
CVE-2023-0737,0,1,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000
CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000
CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000
CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000
@ -215621,7 +215621,7 @@ CVE-2023-21056,0,0,995fad705f650ff3eaf185ebe882d06b6e4d09c0956a6bcd2bfea6b654417
CVE-2023-21057,0,0,3d44097c3c200f0b17f1879819349cdc18de4e2156ff8226812a4d0777ba6c61,2023-03-30T16:50:36.527000
CVE-2023-21058,0,0,48052587152b716354e8911d9a2a29e6d938c8f474058afbe6f8a5041cd7974a,2023-03-29T15:05:03.910000
CVE-2023-21059,0,0,8db890a27c915f00d6fed020c9f8a480e62ed6ce4dac0ac01a34a7dce78a02ec,2023-03-29T18:44:14.857000
CVE-2023-2106,0,0,2530ef97ea626e7a8a410e3ebe02b05225ce70661228e6f830656179c6360092,2023-04-25T16:29:34.127000
CVE-2023-2106,0,1,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000
CVE-2023-21060,0,0,031442d7f4ea5b6ae0e29837a4bbaed861fbcc303822a358b5dc59a5149bb3dd,2023-03-29T18:43:53.737000
CVE-2023-21061,0,0,6490da526ed7065eccbcc696f9f962795cc2b014c6d53d64a6adbd94120f5d18,2023-03-29T15:04:11.227000
CVE-2023-21062,0,0,40c76e318792cc0f78ca458ad4e9dad427e83b5b91f7684d0d6fa2943a6292e0,2023-03-31T12:58:57.567000
@ -235651,7 +235651,7 @@ CVE-2023-47120,0,0,6e5cf7aa1dce9f494a0c860253344a3950368bcf8ff7b583963ba86c8e76d
CVE-2023-47121,0,0,8ef00758c3dec2ac6ff6b649dadab0f948ffb4a5bbb58a181a1e6c7b3ef58d87,2023-11-17T20:20:26.137000
CVE-2023-47122,0,0,a9df5fa9c0e8414d44cffae9c5acb48e2a1801978cf6443f04f6610b9193b585,2023-11-16T17:50:16.327000
CVE-2023-47123,0,0,8d361c371341412b84dc54774df576d9fe69de84d066d55765bb32cbb6494159,2024-04-15T19:12:25.887000
CVE-2023-47124,0,0,b24bfc9411e27420309cadfb6fbd310b685b721e9bde2692896514b4cea70e13,2023-12-07T21:01:24.967000
CVE-2023-47124,0,1,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000
CVE-2023-47125,0,0,9a2f9293b1bb6384f4c490717940892ab731bd46d8233a43c41e51a52ebe67c3,2023-11-21T02:58:51.787000
CVE-2023-47126,0,0,d7db4dfe43677893f510f67d44655eb1bfaaec58afed097e3332356dc994ae85,2023-11-21T03:01:46.133000
CVE-2023-47127,0,0,3b142b710453a1850b566c196150901604dda76b0ed8a77543fe3542a15724c1,2023-11-21T03:05:46.807000
@ -242688,6 +242688,7 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430
CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000
CVE-2024-10204,1,1,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000
CVE-2024-10217,0,0,eb6516ec82f77e9f107386542d4ffb8464a3e61001620c55c2f842dbfbb03b5d,2024-11-13T17:01:16.850000
@ -243134,7 +243135,7 @@ CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f32574438
CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000
CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000
CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000
CVE-2024-10924,0,0,81893a916d56c17bfaebe03737efc603a4394519bc7d6f05195e83e8e85b1166,2024-11-15T13:58:08.913000
CVE-2024-10924,0,1,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
@ -243197,8 +243198,8 @@ CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc05
CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000
CVE-2024-11028,0,0,a5fce876a39d3e00d472044131a8d336932258a82ff3a02e40bb7ab1cc37c8ff,2024-11-13T17:01:16.850000
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
CVE-2024-11036,1,1,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
CVE-2024-11038,1,1,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
CVE-2024-11036,0,0,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
CVE-2024-11038,0,0,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000
CVE-2024-11046,0,0,dae70e42607845033c6b3a286ac389c98e26c8cde81bdbf229658639db4fd302,2024-11-13T21:01:01.540000
CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b0984875d6,2024-11-13T20:56:10.463000
@ -243227,6 +243228,7 @@ CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
CVE-2024-11073,0,0,ef922d07a39eeb6c1fcac9a877724098fbbee23a8a49829a797889d4fd66dae6,2024-11-18T17:21:19.557000
CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000
CVE-2024-11075,1,1,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000
CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
@ -243271,7 +243273,7 @@ CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
CVE-2024-11150,0,0,3e3c713e3eaad09aa014087e1c0cf6ec0a3f52a733d6f796982bf46a36311d42,2024-11-13T17:01:16.850000
CVE-2024-11159,0,0,acc315ccca82d4dda8527171d6a7ed0296dd6177834223afd6bc1a7bd47506e8,2024-11-13T17:01:16.850000
CVE-2024-11159,0,1,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
@ -243281,8 +243283,9 @@ CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62f
CVE-2024-11182,0,0,43e4e2251d845a1f0d31bd2b62102b26d7d278b2b068b2f8e9e82735945af2ae,2024-11-18T15:35:03.553000
CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000
CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000
CVE-2024-11194,1,1,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
CVE-2024-11195,1,1,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
CVE-2024-11194,0,0,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
CVE-2024-11195,0,0,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
CVE-2024-11198,1,1,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
@ -243297,6 +243300,7 @@ CVE-2024-11214,0,0,0aa99902e65dc6c03e1ca05b11000c9116be8bf762f91cf55a9d960757e4b
CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000
CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
CVE-2024-11224,1,1,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
CVE-2024-11237,0,0,14e448a6a8c58bda6358b06dade390c2a1921b884cc94a3ba12fc6ad79696644,2024-11-15T13:58:08.913000
CVE-2024-11238,0,0,5db87c5bb65e54461cba31fd593252a458b17b662806ea71f4893354fc62157d,2024-11-15T13:58:08.913000
@ -245520,7 +245524,7 @@ CVE-2024-21534,0,0,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc
CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000
CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
CVE-2024-21538,0,0,e8cdab9c6756d7f91f4358b51c5fdc4acd8293095dfa14f99a5a2ff2dfe3d783,2024-11-08T19:01:03.880000
CVE-2024-21538,0,1,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000
CVE-2024-21539,0,0,dfd9359e0c564c537268368db999f7713955785d7a4a9df91fee71b6b45e0530,2024-11-19T05:15:16.453000
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000
@ -247070,7 +247074,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23715,0,0,be9ca32355354e8e866a9cc5f9269e48161aa8200c02ba6e7048918c9ef2bdb8,2024-11-15T14:00:09.720000
CVE-2024-23715,0,1,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
@ -252495,7 +252499,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31141,0,1,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000
CVE-2024-31141,0,0,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000
CVE-2024-31142,0,0,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000
@ -262010,7 +262014,7 @@ CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd
CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000
CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000
CVE-2024-44205,0,0,89e79a6b18bf86e5c6fe07ffb754b6a30f0a4b722301be4dfe77863fc3ec3818,2024-11-05T22:35:09.383000
CVE-2024-44206,0,0,cce809798797c4f27f98da648a0cb34cc37e85900206791dd0f0bb97bf5465c4,2024-10-29T21:35:15.080000
CVE-2024-44206,0,1,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000
CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000
CVE-2024-44208,0,0,4d7aa9405d343d17597bfad70ff83a926fbd31054b5ebc02d6d462dcb9f00027,2024-10-30T19:35:18.340000
CVE-2024-44213,0,0,c6cff758bc03ecbfd99946547b6f803038e23fd3515589348ba94d44f5467231,2024-10-30T19:35:19.187000
@ -266282,7 +266286,7 @@ CVE-2024-51754,0,0,7bb02b0dadfa6351503359aa64d9360522f7dd1d2e17f399adc659a202b69
CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882a03,2024-11-08T19:01:25.633000
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000
CVE-2024-51758,0,0,f380eb8d34567367d647061664429271d9307b0015af8f1ccfbeb527fa9b8011,2024-11-08T19:01:03.880000
CVE-2024-51758,0,1,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000
CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000
@ -266593,10 +266597,12 @@ CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b2976
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
CVE-2024-52675,1,1,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000
CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
CVE-2024-52711,1,1,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
@ -270135,6 +270141,7 @@ CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da64
CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000
CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000
CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000
CVE-2024-9777,1,1,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000
CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000
CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000
CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000
@ -270180,6 +270187,7 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379
CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000
CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000
CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
CVE-2024-9830,1,1,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000
CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000
CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000
CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000

Can't render this file because it is too large.