mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-11-19T15:00:21.040708+00:00
This commit is contained in:
parent
7a2059dc5a
commit
65ea59b623
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-12627",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-05-04T03:15:10.917",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:0.6.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6541E0DD-B74E-4532-A28A-37F35F082F3A"
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:0.6.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B2AE5A3-A014-46A6-9582-F1A294C6B7A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-25964",
|
||||
"sourceIdentifier": "vulnerabilitylab@mend.io",
|
||||
"published": "2021-10-04T15:15:07.310",
|
||||
"lastModified": "2021-10-08T16:54:25.847",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,10 +115,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.6.0",
|
||||
"versionEndExcluding": "0.6.12",
|
||||
"matchCriteriaId": "6FF6EA1D-D6C6-4A33-877E-F29514871A6D"
|
||||
"matchCriteriaId": "CC8E66D2-7321-46E4-81CC-097EA0A8794F"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-25965",
|
||||
"sourceIdentifier": "vulnerabilitylab@mend.io",
|
||||
"published": "2021-11-16T10:15:06.947",
|
||||
"lastModified": "2021-11-17T17:57:34.253",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,10 +115,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.6.0",
|
||||
"versionEndIncluding": "0.6.13",
|
||||
"matchCriteriaId": "F0824626-B1BE-45B8-AF97-491AAFA36FB3"
|
||||
"matchCriteriaId": "703730EE-5EE8-479D-97A3-E1EC55A75369"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-4164",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-01-17T13:15:08.193",
|
||||
"lastModified": "2022-01-22T03:47:47.437",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,9 +107,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.15",
|
||||
"matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB"
|
||||
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-4170",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-01-16T21:15:07.900",
|
||||
"lastModified": "2022-01-22T03:12:41.697",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,9 +107,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.15",
|
||||
"matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB"
|
||||
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-4171",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-01-17T10:15:07.857",
|
||||
"lastModified": "2022-01-24T18:36:32.673",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.15",
|
||||
"matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB"
|
||||
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0273",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-01-30T14:15:07.597",
|
||||
"lastModified": "2022-03-17T16:11:35.453",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.16",
|
||||
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
|
||||
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0339",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-01-30T14:15:07.877",
|
||||
"lastModified": "2022-03-17T16:16:56.813",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.16",
|
||||
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
|
||||
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0352",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-01-28T22:15:15.327",
|
||||
"lastModified": "2022-03-15T16:08:51.150",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.16",
|
||||
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
|
||||
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0405",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-04-03T19:15:07.817",
|
||||
"lastModified": "2022-04-11T16:07:31.907",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,9 +107,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.16",
|
||||
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
|
||||
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0406",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-04-03T19:15:07.880",
|
||||
"lastModified": "2022-04-09T15:52:49.447",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.16",
|
||||
"matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91"
|
||||
"matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0766",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-03-07T07:15:07.257",
|
||||
"lastModified": "2022-03-11T17:08:58.820",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.17",
|
||||
"matchCriteriaId": "FFC250B3-EA6A-45C9-8CE4-1456B205320E"
|
||||
"matchCriteriaId": "E43AE325-09EA-47E5-878F-360B5C90F01D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0767",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-03-07T07:15:07.463",
|
||||
"lastModified": "2022-03-14T13:13:13.093",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.17",
|
||||
"matchCriteriaId": "FFC250B3-EA6A-45C9-8CE4-1456B205320E"
|
||||
"matchCriteriaId": "E43AE325-09EA-47E5-878F-360B5C90F01D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0939",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-04-04T10:15:08.477",
|
||||
"lastModified": "2022-04-11T17:30:29.703",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,9 +107,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.18",
|
||||
"matchCriteriaId": "A4296881-9A6D-4E56-A33D-CB8A280F949D"
|
||||
"matchCriteriaId": "6AC00DC5-E71A-41B8-9728-374A14EE4458"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0990",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-04-04T18:15:07.817",
|
||||
"lastModified": "2022-04-12T09:24:40.387",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,9 +107,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.18",
|
||||
"matchCriteriaId": "A4296881-9A6D-4E56-A33D-CB8A280F949D"
|
||||
"matchCriteriaId": "6AC00DC5-E71A-41B8-9728-374A14EE4458"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-1884",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-11-15T11:15:07.803",
|
||||
"lastModified": "2024-11-15T20:35:02.693",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-19T14:47:48.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -63,8 +83,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,10 +103,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.12.7",
|
||||
"matchCriteriaId": "DE99FDD7-1B59-4533-B5FA-F946D0C95630"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2525",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-15T13:15:44.940",
|
||||
"lastModified": "2023-04-24T18:50:21.427",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -78,9 +78,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.20",
|
||||
"matchCriteriaId": "D18AE1BC-0C3E-42C4-8DFF-2CFCE44AF39D"
|
||||
"matchCriteriaId": "4CFCBA02-FCF2-4465-85CC-2A0E784C49D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-30765",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-16T02:15:06.827",
|
||||
"lastModified": "2022-05-24T18:58:57.977",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:0.6.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE3DE8BF-324A-450B-B4C0-9D9FEED78D6E"
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:0.6.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFC2D2B1-9DCA-4F48-8385-0EB880737944"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0109",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-11-15T11:15:08.097",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-19T14:44:24.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,14 +73,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/1899ffb2-ce1e-4dc0-af96-972612190f6e",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:usememos:memos:0.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F8AADD-D194-452F-8BF1-75FE8F32A062"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/1899ffb2-ce1e-4dc0-af96-972612190f6e",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0737",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-11-15T11:15:08.363",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-19T14:43:04.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,14 +73,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/4ba20fe7-4061-4dfb-ab2f-ecaf110641a5",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wallabag:wallabag:2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB6D0FA5-9278-432C-B42F-4FFC71B0EB27"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/4ba20fe7-4061-4dfb-ab2f-ecaf110641a5",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2106",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-15T14:15:07.760",
|
||||
"lastModified": "2023-04-25T16:29:34.127",
|
||||
"lastModified": "2024-11-19T13:55:30.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -78,9 +78,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.20",
|
||||
"matchCriteriaId": "D18AE1BC-0C3E-42C4-8DFF-2CFCE44AF39D"
|
||||
"matchCriteriaId": "4CFCBA02-FCF2-4465-85CC-2A0E784C49D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47124",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-04T21:15:33.850",
|
||||
"lastModified": "2023-12-07T21:01:24.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-19T14:15:16.660",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -153,11 +153,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "ttps://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
"url": "https://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-102xx/CVE-2024-10204.json
Normal file
60
CVE-2024/CVE-2024-102xx/CVE-2024-10204.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10204",
|
||||
"sourceIdentifier": "3DS.Information-Security@3ds.com",
|
||||
"published": "2024-11-19T14:15:16.940",
|
||||
"lastModified": "2024-11-19T14:15:16.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap-based Buffer Overflow and Uninitialized Variable vulnerabilities exist in the X_B and SAT file reading procedure in eDrawings from Release SOLIDWORKS 2024 through Release SOLIDWORKS 2025. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted X_B or SAT file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-457"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.3ds.com/vulnerability/advisories",
|
||||
"source": "3DS.Information-Security@3ds.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10924",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-15T04:15:03.613",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-19T14:15:17.187",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -68,6 +68,10 @@
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3188431/really-simple-ssl",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5d05ad-1a7a-43d2-bbbf-597e975446be?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
|
76
CVE-2024/CVE-2024-110xx/CVE-2024-11075.json
Normal file
76
CVE-2024/CVE-2024-110xx/CVE-2024-11075.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-11075",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2024-11-19T14:15:17.340",
|
||||
"lastModified": "2024-11-19T14:15:17.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11159",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-13T14:15:15.330",
|
||||
"lastModified": "2024-11-13T17:01:16.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-19T14:56:37.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,88 @@
|
||||
"value": "El uso de contenido remoto en mensajes cifrados con OpenPGP puede provocar la divulgaci\u00f3n de texto plano. Esta vulnerabilidad afecta a Thunderbird < 128.4.3 y Thunderbird < 132.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925929",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-61/",
|
||||
"source": "security@mozilla.org"
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-62/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.4.3",
|
||||
"matchCriteriaId": "AFC5B426-F05D-4BC9-B70B-2B219990C5A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "129.0",
|
||||
"versionEndExcluding": "132.0.1",
|
||||
"matchCriteriaId": "7662AA1E-5DBA-4BFC-9127-48EAA8AFE5C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925929",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-61/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-62/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-111xx/CVE-2024-11198.json
Normal file
68
CVE-2024/CVE-2024-111xx/CVE-2024-11198.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-11198",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-19T13:15:04.157",
|
||||
"lastModified": "2024-11-19T13:15:04.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The GD Rating System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018extra_class\u2019 parameter in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/gd-rating-system/tags/3.6.1/d4plib/plugin/d4p.shortcodes.php#L63",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3189622/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/gd-rating-system/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66cad18d-a433-47f1-9cb6-c619c8717a0d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-112xx/CVE-2024-11224.json
Normal file
68
CVE-2024/CVE-2024-112xx/CVE-2024-11224.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-11224",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-19T13:15:04.423",
|
||||
"lastModified": "2024-11-19T13:15:04.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Parallax Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018position\u2019 parameter in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/parallax-image/tags/1.9/assets/shortcode.php#L156",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3189649/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/parallax-image/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56e5f7c9-ad22-43b3-9bfe-0eea1f8040d3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21538",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-11-08T05:15:06.453",
|
||||
"lastModified": "2024-11-08T19:01:03.880",
|
||||
"lastModified": "2024-11-19T14:15:17.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -64,6 +64,10 @@
|
||||
"url": "https://github.com/moxystudio/node-cross-spawn/pull/160",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230",
|
||||
"source": "report@snyk.io"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23715",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-13T18:15:20.080",
|
||||
"lastModified": "2024-11-15T14:00:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-19T14:03:09.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,66 @@
|
||||
"value": "En PMRWritePMPageList de pmr.c, existe una posible escritura fuera de los l\u00edmites debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-11-01",
|
||||
"source": "security@android.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-11-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44206",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-10-24T17:15:16.620",
|
||||
"lastModified": "2024-10-29T21:35:15.080",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-11-19T13:47:18.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51758",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-07T18:15:17.787",
|
||||
"lastModified": "2024-11-08T19:01:03.880",
|
||||
"lastModified": "2024-11-19T14:15:17.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,10 +22,10 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
@ -55,8 +55,8 @@
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
],
|
||||
|
21
CVE-2024/CVE-2024-526xx/CVE-2024-52675.json
Normal file
21
CVE-2024/CVE-2024-526xx/CVE-2024-52675.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-52675",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-19T13:15:04.700",
|
||||
"lastModified": "2024-11-19T13:15:04.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SourceCodester Sentiment Based Movie Rating System 1.0 is vulnerable to SQL Injection in /msrps/movies.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xubeining/Cve_report/blob/main/Sourcecodester-SQLi-Sentiment-Based-Moive-Rating.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-527xx/CVE-2024-52711.json
Normal file
21
CVE-2024/CVE-2024-527xx/CVE-2024-52711.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-52711",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-19T14:15:18.207",
|
||||
"lastModified": "2024-11-19T14:15:18.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CLan-nad/CVE/blob/main/D-Link/ip_position_asp/1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-97xx/CVE-2024-9777.json
Normal file
72
CVE-2024/CVE-2024-97xx/CVE-2024-9777.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-9777",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-19T13:15:04.850",
|
||||
"lastModified": "2024-11-19T13:15:04.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ashe theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.243. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/ashe/2.242/functions.php#L101",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/ashe/2.242/functions.php#L112",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset/248853/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/themes/ashe/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce6c2f36-9eed-482f-9201-8d26e8c5c369?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-98xx/CVE-2024-9830.json
Normal file
72
CVE-2024/CVE-2024-98xx/CVE-2024-9830.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-9830",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-19T13:15:05.107",
|
||||
"lastModified": "2024-11-19T13:15:05.107",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bard theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.216. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/bard/2.216/functions.php#L109",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/bard/2.216/functions.php#L98",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset/248854/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/themes/bard/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9aff1e5b-2f16-43d0-b75a-c07e59a9c15f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-19T13:00:19.355303+00:00
|
||||
2024-11-19T15:00:21.040708+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-19T12:15:16.497000+00:00
|
||||
2024-11-19T14:56:37.800000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
270311
|
||||
270319
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-11036](CVE-2024/CVE-2024-110xx/CVE-2024-11036.json) (`2024-11-19T11:15:04.343`)
|
||||
- [CVE-2024-11038](CVE-2024/CVE-2024-110xx/CVE-2024-11038.json) (`2024-11-19T11:15:05.683`)
|
||||
- [CVE-2024-11194](CVE-2024/CVE-2024-111xx/CVE-2024-11194.json) (`2024-11-19T12:15:16.497`)
|
||||
- [CVE-2024-11195](CVE-2024/CVE-2024-111xx/CVE-2024-11195.json) (`2024-11-19T11:15:05.930`)
|
||||
- [CVE-2024-10204](CVE-2024/CVE-2024-102xx/CVE-2024-10204.json) (`2024-11-19T14:15:16.940`)
|
||||
- [CVE-2024-11075](CVE-2024/CVE-2024-110xx/CVE-2024-11075.json) (`2024-11-19T14:15:17.340`)
|
||||
- [CVE-2024-11198](CVE-2024/CVE-2024-111xx/CVE-2024-11198.json) (`2024-11-19T13:15:04.157`)
|
||||
- [CVE-2024-11224](CVE-2024/CVE-2024-112xx/CVE-2024-11224.json) (`2024-11-19T13:15:04.423`)
|
||||
- [CVE-2024-52675](CVE-2024/CVE-2024-526xx/CVE-2024-52675.json) (`2024-11-19T13:15:04.700`)
|
||||
- [CVE-2024-52711](CVE-2024/CVE-2024-527xx/CVE-2024-52711.json) (`2024-11-19T14:15:18.207`)
|
||||
- [CVE-2024-9777](CVE-2024/CVE-2024-97xx/CVE-2024-9777.json) (`2024-11-19T13:15:04.850`)
|
||||
- [CVE-2024-9830](CVE-2024/CVE-2024-98xx/CVE-2024-9830.json) (`2024-11-19T13:15:05.107`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `28`
|
||||
|
||||
- [CVE-2024-31141](CVE-2024/CVE-2024-311xx/CVE-2024-31141.json) (`2024-11-19T09:15:03.860`)
|
||||
- [CVE-2021-4164](CVE-2021/CVE-2021-41xx/CVE-2021-4164.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2021-4170](CVE-2021/CVE-2021-41xx/CVE-2021-4170.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2021-4171](CVE-2021/CVE-2021-41xx/CVE-2021-4171.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0273](CVE-2022/CVE-2022-02xx/CVE-2022-0273.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0339](CVE-2022/CVE-2022-03xx/CVE-2022-0339.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0352](CVE-2022/CVE-2022-03xx/CVE-2022-0352.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0405](CVE-2022/CVE-2022-04xx/CVE-2022-0405.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0406](CVE-2022/CVE-2022-04xx/CVE-2022-0406.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0766](CVE-2022/CVE-2022-07xx/CVE-2022-0766.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0767](CVE-2022/CVE-2022-07xx/CVE-2022-0767.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0939](CVE-2022/CVE-2022-09xx/CVE-2022-0939.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-0990](CVE-2022/CVE-2022-09xx/CVE-2022-0990.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-1884](CVE-2022/CVE-2022-18xx/CVE-2022-1884.json) (`2024-11-19T14:47:48.443`)
|
||||
- [CVE-2022-2525](CVE-2022/CVE-2022-25xx/CVE-2022-2525.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2022-30765](CVE-2022/CVE-2022-307xx/CVE-2022-30765.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2023-0109](CVE-2023/CVE-2023-01xx/CVE-2023-0109.json) (`2024-11-19T14:44:24.977`)
|
||||
- [CVE-2023-0737](CVE-2023/CVE-2023-07xx/CVE-2023-0737.json) (`2024-11-19T14:43:04.257`)
|
||||
- [CVE-2023-2106](CVE-2023/CVE-2023-21xx/CVE-2023-2106.json) (`2024-11-19T13:55:30.697`)
|
||||
- [CVE-2023-47124](CVE-2023/CVE-2023-471xx/CVE-2023-47124.json) (`2024-11-19T14:15:16.660`)
|
||||
- [CVE-2024-10924](CVE-2024/CVE-2024-109xx/CVE-2024-10924.json) (`2024-11-19T14:15:17.187`)
|
||||
- [CVE-2024-11159](CVE-2024/CVE-2024-111xx/CVE-2024-11159.json) (`2024-11-19T14:56:37.800`)
|
||||
- [CVE-2024-21538](CVE-2024/CVE-2024-215xx/CVE-2024-21538.json) (`2024-11-19T14:15:17.627`)
|
||||
- [CVE-2024-23715](CVE-2024/CVE-2024-237xx/CVE-2024-23715.json) (`2024-11-19T14:03:09.400`)
|
||||
- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-11-19T13:47:18.787`)
|
||||
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-19T14:15:17.763`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
74
_state.csv
74
_state.csv
@ -147540,7 +147540,7 @@ CVE-2020-12621,0,0,8ce7e90cf5d38925e940068a7ae81f0e149cc8eb6774d0a2c1c7e217670dc
|
||||
CVE-2020-12624,0,0,8a0fc770343fdc04bd996cf45f0ff8eee77a483d3005ca548b79b2bbdd4878fd,2021-07-21T11:39:23.747000
|
||||
CVE-2020-12625,0,0,ba670072932e2f84ce8a6ee211183dd0aafd451a1d585c003e4b8f0ee8b0710c,2022-09-02T15:42:45.577000
|
||||
CVE-2020-12626,0,0,ef4ab069cdfdd918b1dfdbdff6dc1e10a89ec07b516956413a5df9b27f4d80a5,2022-09-02T15:42:13.713000
|
||||
CVE-2020-12627,0,0,4fda3009492ad546c4d5a3562ffd500cda465cebf90e0a13cff7e8abbd887f5f,2021-07-21T11:39:23.747000
|
||||
CVE-2020-12627,0,1,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000
|
||||
CVE-2020-12629,0,0,6302c256329ddcf42ee813098eb846d57616b48336546370f0e8d1971103bb7c,2020-05-06T20:44:34.660000
|
||||
CVE-2020-1263,0,0,9a370617ef73138b079100cfabf08396db758880aa61ac1612d7dd94a8f958b0,2021-07-21T11:39:23.747000
|
||||
CVE-2020-12635,0,0,20c8e4b2f600aed040904c974ad6e679133a1f04f71dd085db50281f95159af7,2024-02-14T01:17:43.863000
|
||||
@ -171654,8 +171654,8 @@ CVE-2021-25960,0,0,8966318153632386e613d3da07433d0898ebe541ac0542fbd833b88414c9a
|
||||
CVE-2021-25961,0,0,22b470ce8b666ea20e5d0cab6ff8f13de084ad6910d45348aef26ed926ddac00,2021-10-07T17:05:48.717000
|
||||
CVE-2021-25962,0,0,935f7ba91aea9f19056fdc881199025fe86ee6e75a7a00550a994ee72bbc4ce8,2021-10-06T20:30:01.977000
|
||||
CVE-2021-25963,0,0,eef6fbaad1cf210ebcdcb4dde111b82ed2ae28fe021f79460bcb208f56e7438b,2021-10-07T03:02:46.987000
|
||||
CVE-2021-25964,0,0,1105f4248cfe8217637ea2f1e32fbc092427b3108c6f28f4c181ae24b17795e6,2021-10-08T16:54:25.847000
|
||||
CVE-2021-25965,0,0,bdfca22f9f9fd49ade05743667632f9667f3b4bda35d1c7e3625d94a0907a2c8,2021-11-17T17:57:34.253000
|
||||
CVE-2021-25964,0,1,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000
|
||||
CVE-2021-25965,0,1,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000
|
||||
CVE-2021-25966,0,0,6631aa3daac52e584c6ac4608617627ea90e46497039ab1b233e796a5197021e,2022-02-25T16:10:26.793000
|
||||
CVE-2021-25967,0,0,4ab84532fd7ed4fc14ba083adea1ce2392a7e866ae5f01e12da82d39bc860ffa,2021-12-02T18:59:55.443000
|
||||
CVE-2021-25968,0,0,182c7f567a0aaa94a30caeae3513295d58f799b9efd65c2c904f1dab7bc4d009,2021-10-21T23:39:03.337000
|
||||
@ -183333,7 +183333,7 @@ CVE-2021-41636,0,0,63eecb7b37c7497bc2d0e66fda0c87c3bb39b2ae9ef4daaf774dfdae2e15c
|
||||
CVE-2021-41637,0,0,3e7106415adaddf34c5f560098cc1181920e94facbddb201ad017dee908edb96,2022-07-01T16:48:40.010000
|
||||
CVE-2021-41638,0,0,613e6d48da7577b6a41011f792da0d6bf850458d5b4d0fcad9ddc862b5e440cb,2022-07-01T16:54:44.490000
|
||||
CVE-2021-41639,0,0,e4459c0cc2a18f37534ab8228cfd8beba9d057a0a4566969f9e85d8579ad29e7,2022-07-01T16:54:56.413000
|
||||
CVE-2021-4164,0,0,26181d4e06fb35e672b10f10964a70aba9447fc6088db27bea77bead96157982,2022-01-22T03:47:47.437000
|
||||
CVE-2021-4164,0,1,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000
|
||||
CVE-2021-41641,0,0,471e4e684c15a020d266300f4f064d2429fafbadc4766e60775831b2cf58f0b5,2022-06-21T14:47:44.067000
|
||||
CVE-2021-41643,0,0,e459bb9b3ae61ce1c0c6d285d271ea229748355da335583ec31fcdddf509d6f3,2021-11-02T19:39:02.490000
|
||||
CVE-2021-41644,0,0,9865dd6292c1189e24150efd40a621f72aa038c9804a6547447118cc86d16ed2,2021-11-02T18:49:45.500000
|
||||
@ -183373,8 +183373,8 @@ CVE-2021-41694,0,0,f50452abd758a90efb8659fe89ef0455f4d267a5131c762b8f8e62ab5bbf1
|
||||
CVE-2021-41695,0,0,dd9e067ec3b53cda9f935034e15232d6d5e79f62a053b26d0f77f6909e4ac1ef,2021-12-14T15:36:10.400000
|
||||
CVE-2021-41696,0,0,8e34760fd4621f0aa12fba1e5efd349f7fa4de5d0772846e528bcb8650f3de63,2021-12-14T15:30:11.617000
|
||||
CVE-2021-41697,0,0,33b358b7127382c3f55513ad663c443b6239f7d67ea40b4e900a1c92ef4cc59d,2021-12-14T15:14:33.733000
|
||||
CVE-2021-4170,0,0,37cbcdb61a8ee5f3ba710bd39dc849d34109ce80f3874799c94ebc63d0ba55e0,2022-01-22T03:12:41.697000
|
||||
CVE-2021-4171,0,0,7e081fd412650ca1bfd9c672a45b8fcebeb6f3472d43f59bc36a90f173d45e33,2022-01-24T18:36:32.673000
|
||||
CVE-2021-4170,0,1,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000
|
||||
CVE-2021-4171,0,1,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000
|
||||
CVE-2021-41714,0,0,fc9e637af1a0036f13895530a7345d717282538ded5aaa19ffc08da024090e87,2022-06-03T14:15:01.887000
|
||||
CVE-2021-41715,0,0,e54eedea66b5b1eee4cce4189c84d7d77fe6adbb9ea079fcd98fdaf28b2809e3,2022-04-14T20:28:35.890000
|
||||
CVE-2021-41716,0,0,cadf2b7de621cc4d3a3a955adc24a880843a6c905295b60f449a49d359880f71,2021-12-08T14:48:53.020000
|
||||
@ -187846,7 +187846,7 @@ CVE-2022-0269,0,0,0b042406ed722bed4f08f80b4f00c84357c8cea0b40b051befc2509217a3a6
|
||||
CVE-2022-0270,0,0,547484ec0a42fe3acfc13bd179336b2c7cf9e5bfa133be62f505695ac6b594fe,2023-07-21T16:53:18.197000
|
||||
CVE-2022-0271,0,0,b9998bff8556a3e9dd78071b57144ad5eb927440f09838acadc201638d9c53a4,2022-04-15T17:54:39.720000
|
||||
CVE-2022-0272,0,0,ba39c601e8f8ad770ec51471a81d25ffe2f0563ea1a0215aed7e5549b2ba80bc,2022-04-28T18:40:19.163000
|
||||
CVE-2022-0273,0,0,a2c9906b46f54a3fc5103c11411b957a7faa0137e90e264c1c237a108e5927ac,2022-03-17T16:11:35.453000
|
||||
CVE-2022-0273,0,1,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0274,0,0,5b464b8245e5321eeea5cde4c0986f9d63275f8e971c1a66b7e4500348e1edc6,2022-01-25T14:48:16.997000
|
||||
CVE-2022-0277,0,0,54014335e700fab8a415cb3d21845a08a975de96657a8cbd1df94a58e34845ed,2023-06-29T08:15:09.807000
|
||||
CVE-2022-0278,0,0,bbe12ed35bb88da2486e8c13a6baaafb99e94fb880ba9c3fdbf3c9d24bfb016a,2022-01-26T03:22:09.423000
|
||||
@ -187906,7 +187906,7 @@ CVE-2022-0335,0,0,c87f7140ccb139e3761172aa2f563e4109797f37ee8bf08d3125bcc7f75ad6
|
||||
CVE-2022-0336,0,0,307b1c206992ca977db64c933e94fd941cf38b8332fd987ef4968a8aafac3993,2023-09-17T09:15:10.277000
|
||||
CVE-2022-0337,0,0,75762347a627388711d1f024fb68d21bc655a56ca3208dec8afc0cf007c526e8,2023-01-09T19:17:54.197000
|
||||
CVE-2022-0338,0,0,2606c9f2afde98ccb459d99f4a20258712105b5775cab8d092cb1216a49083f9,2023-08-02T09:15:11.420000
|
||||
CVE-2022-0339,0,0,1b98dbf84cebdb5dbd8174a419b58a38b961d56cad735966547a2ec684491256,2022-03-17T16:16:56.813000
|
||||
CVE-2022-0339,0,1,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0341,0,0,6bc29c60602591923783e75b9647c6eedf344c6d18b4537b8c917185e44cb4b4,2022-03-18T18:00:28.817000
|
||||
CVE-2022-0342,0,0,192c7e727dc228b67703fcbfa825f1994bc25fe903e9046ec3ccd660229b0664,2022-04-04T17:27:58.343000
|
||||
CVE-2022-0343,0,0,9b4662c7106d8ca9b502a9d147c3d0debb4425324b85f0dcc86bf35395bea467,2022-04-07T16:31:33.783000
|
||||
@ -187918,7 +187918,7 @@ CVE-2022-0348,0,0,41d5c28d0d1ab089ac68d1912e05f4337627e5cea9fba44ca38c395f8d8254
|
||||
CVE-2022-0349,0,0,068d099492481419d374d2003ba2aab3b7d6988afb1cc3a820cd310c5c5be982,2022-03-11T20:44:24.327000
|
||||
CVE-2022-0350,0,0,4d2f2dd515eed464ce450a16a96b9a4c6b0b857965f9f86d554d1100c638b80f,2023-03-07T22:40:44.473000
|
||||
CVE-2022-0351,0,0,d8c1cca7ff8811855948a48757571f7f9926e2f30bbcb8ecf722b183b33e26f4,2022-11-09T19:20:23.007000
|
||||
CVE-2022-0352,0,0,d655b88d16f1b100cb6807b99936916e268559477432619c05721d420e8f62b3,2022-03-15T16:08:51.150000
|
||||
CVE-2022-0352,0,1,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0353,0,0,1bde6ae86e109805348b0fe8a1ea22f783b296f97417591fd534964877f7a921,2023-10-30T18:18:25.037000
|
||||
CVE-2022-0354,0,0,08d2a7b0ab08e8bc6919039c3edf04df57c0887581b95ac3307601a9b6d27779,2023-08-08T14:22:24.967000
|
||||
CVE-2022-0355,0,0,6f40eae045470357a76ef57564a0e59b6ca2e456718480f7cb2332766b81d912,2023-08-02T09:15:11.547000
|
||||
@ -187970,8 +187970,8 @@ CVE-2022-0401,0,0,fd0c1ff73b88c5d9692a05caa80d58d887c8a37e7f114a6685c34c493b8913
|
||||
CVE-2022-0402,0,0,92f9b155923211e2ceee2d42d296863f6f1f38af6d18510a65170addd06c966c,2024-01-22T21:01:52.430000
|
||||
CVE-2022-0403,0,0,54d3a8e21af141a32e192ed41de5542c8ee2cafce593d7553180addfbe7d22f5,2022-04-11T16:16:43.773000
|
||||
CVE-2022-0404,0,0,298dccd25c1952207280414f8bd7e0b22fde3e98e64d2fb17b1031e8a652b119,2023-11-07T03:41:14.680000
|
||||
CVE-2022-0405,0,0,444a4f2026f3bc69b25c29380ab5e2bf9b910cd7c2c312cf9ef76016a1a95299,2022-04-11T16:07:31.907000
|
||||
CVE-2022-0406,0,0,a441ef815a14d749ca2d58b6be22dd9608fe0be8eb3d1dfb9d29d838cf9c4f3a,2022-04-09T15:52:49.447000
|
||||
CVE-2022-0405,0,1,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0406,0,1,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0407,0,0,0155b2a87f71b0b7fb0916580421bf8b007742dea3e03201cc1d9b516db1f9a1,2022-08-26T17:35:22.767000
|
||||
CVE-2022-0408,0,0,c5724b74e67f805cb7cef848135fd972bd1216e01e032e5ee72fd927b68010c6,2023-11-07T03:41:15.057000
|
||||
CVE-2022-0409,0,0,bdddcb1bc9179f07dc0a4ae2adcd12204cfc01caa1f9bd597938d2e20a4a0885,2022-03-01T01:57:03.397000
|
||||
@ -188319,8 +188319,8 @@ CVE-2022-0762,0,0,92ae39eefd66ea7cbc32a8686599ec741c84b55a252f147df8d414c0e43894
|
||||
CVE-2022-0763,0,0,d8fa3da7528e8203bd3a9ef37cccbd85be752760dc10937953f39359a9f93d3b,2022-03-08T17:25:17.980000
|
||||
CVE-2022-0764,0,0,343066202ab53f2821e9e5df90301b5dd58745b58610e9036f49df289f6d59d2,2023-07-21T17:13:18.700000
|
||||
CVE-2022-0765,0,0,f45389e2abd373ef50c4b2eaf76af5c989711ff021560b421d272973fd1993b0,2022-04-27T00:07:20.813000
|
||||
CVE-2022-0766,0,0,b2ccd107a9d1daab9412c94c8371dbafadae12bb91fd3c16030da56c47874ee7,2022-03-11T17:08:58.820000
|
||||
CVE-2022-0767,0,0,c7d6b46f0a32842a8f32b42cac5e239b9b7a650e21a18f0420d715066c6ca00e,2022-03-14T13:13:13.093000
|
||||
CVE-2022-0766,0,1,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0767,0,1,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0768,0,0,7413d50a96f5047476d4044fe93ebaaab8948f5b8b6e5644533ed04e60d94495,2022-03-08T17:34:05.377000
|
||||
CVE-2022-0769,0,0,186d87009c3299115358ed003347610f261ff2fff63be099b887bf8e21eab2ea,2022-05-04T13:59:27.377000
|
||||
CVE-2022-0770,0,0,2b2c8df5ef6f7c812d46374c4465bb9d474ff8112a462c85978629ead78fc435,2022-04-04T18:55:52.103000
|
||||
@ -188485,7 +188485,7 @@ CVE-2022-0935,0,0,4937ede48adff99b8a82685ce1c47ab995cfa52213926d00546e0ed28661fc
|
||||
CVE-2022-0936,0,0,5e1301a868c51f32d9b1d38c3bd9d5c4e7b252e5c9034d5c170399428a55d018,2022-04-14T20:39:32.157000
|
||||
CVE-2022-0937,0,0,6ebd398e67ed3e0577049a7473f2e9b69a1755b2dd70b6e7cd0177ef47d0ed36,2022-03-18T18:14:39.940000
|
||||
CVE-2022-0938,0,0,53311bc36c380c526ea038cf13a8d2ff3d90835a99184a433f43babd3148fad1,2022-03-18T18:09:18.637000
|
||||
CVE-2022-0939,0,0,c2915debcf9880de4772fa9e967b96a57b2ee44227ae14b7c60081df92bbbc68,2022-04-11T17:30:29.703000
|
||||
CVE-2022-0939,0,1,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0940,0,0,70c545df86ee91c07e5f16b8db56ecfe025f705cbd301d61814768bd18a46665,2022-03-18T17:58:19.337000
|
||||
CVE-2022-0941,0,0,ac156d3ea26d89f38610a523301b2336456b75734150d52009650c143803332b,2022-03-18T17:37:51.753000
|
||||
CVE-2022-0942,0,0,dec36e5bdc2646c8ba8c9b40004d57a13bf18d262c0580e836243465cf2f3bee,2022-03-22T18:06:16.860000
|
||||
@ -188536,7 +188536,7 @@ CVE-2022-0986,0,0,1f3d8cfe5b4034f8cb2379ef060f1b0fce7bd502c6c6229913f30a0e5af318
|
||||
CVE-2022-0987,0,0,f2c42d4d9f95e9749a4c445c80a51b63228a99080839ef62a18bb9765a5a0f2b,2022-07-09T02:16:41.140000
|
||||
CVE-2022-0988,0,0,f1199d2b132d579bf0e13054467a88fb08e72497869a87789662b30278c0d972,2022-04-01T12:24:18.417000
|
||||
CVE-2022-0989,0,0,7454afdecfc72b7e4a57bd0f5cbdf02a26a78ca6613e027ac6b4e5823196793c,2022-04-15T20:22:57.330000
|
||||
CVE-2022-0990,0,0,221d6abbba16c22be53064dc133896bd80598ba0ff53cf9f7b9a238da1f84bb3,2022-04-12T09:24:40.387000
|
||||
CVE-2022-0990,0,1,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000
|
||||
CVE-2022-0991,0,0,8ca24c514df2eadfc1666ca1ace95d3168a9e969f9b3fcbe0a2a99e49de31694,2022-03-28T18:54:03.633000
|
||||
CVE-2022-0992,0,0,6fd70fc3b7474ab91729ad584c70484a0877149adc006c6f9bd7347bb2357681,2023-11-07T03:41:41.573000
|
||||
CVE-2022-0993,0,0,78c1b936011bd648dc08da3df4bfe29b3fe82fd44846684d5bf8f67b8b826931,2024-01-11T09:15:43.237000
|
||||
@ -189401,7 +189401,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0
|
||||
CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000
|
||||
CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000
|
||||
CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000
|
||||
CVE-2022-1884,0,0,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000
|
||||
CVE-2022-1884,0,1,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000
|
||||
CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000
|
||||
CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000
|
||||
CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000
|
||||
@ -194407,7 +194407,7 @@ CVE-2022-25246,0,0,470d73336081fafe2504c5ae930c1bc5c3b04d6c1d5bca8e82a1ca62a276c
|
||||
CVE-2022-25247,0,0,f1828753959f3a8ddb7cef9c2b17b9ebe6e005ad9804df2524e5e91b5305ed43,2022-03-28T13:25:59.947000
|
||||
CVE-2022-25248,0,0,1e003ed9c345c86a0ae7342705f6b5b76c7a524c725fb9f26e480a2de2ce199c,2022-03-28T13:27:40.890000
|
||||
CVE-2022-25249,0,0,5096787f68913f3af8deec7d28059622eee59c935f342d23008ba2d1adcdb681,2022-03-28T13:29:31.777000
|
||||
CVE-2022-2525,0,0,210cce692d9a912425d2e96ebcf9a983eeacf6087702bc018f6146cd0ff7680f,2023-04-24T18:50:21.427000
|
||||
CVE-2022-2525,0,1,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000
|
||||
CVE-2022-25250,0,0,70256af592b9c49051cb696e3e98b6b318b6b9bd7c026c62389ebc173f763a81,2022-03-28T13:29:56.907000
|
||||
CVE-2022-25251,0,0,30aa9f042433ef7f24b6a381a3a50cfd25bc3a4fa4c2ee4d2a94c9598ed3cb9e,2022-03-28T13:30:39.300000
|
||||
CVE-2022-25252,0,0,40a835ffc450f4499e9c229b3d3a44e165cbb918e6082351e6d9edd95f09ca0d,2022-03-28T13:32:35.907000
|
||||
@ -198901,7 +198901,7 @@ CVE-2022-30759,0,0,bd8543e5a8b11fb4636241908ba990e450528de2ca3ce6a2cc2c2e92c529e
|
||||
CVE-2022-3076,0,0,04a5db7a7c3a6c41fc8643ca8ef27e8b694c85120ab617b9e4549a6d82fe6ea6,2022-09-27T04:37:44.793000
|
||||
CVE-2022-30760,0,0,33981d8f48d80e2e251879e187507ead15290cf13fe04528ee7cc8601a8463a9,2022-06-17T19:57:09.527000
|
||||
CVE-2022-30763,0,0,99c247d1a877e52090357101b5b4001a96c949c6e441faf9185997c22c969e91,2022-10-12T15:32:50.077000
|
||||
CVE-2022-30765,0,0,761225e6da5f713d9c25f52dab8c0b338789eb157822a77f4fba5e290157ab62,2022-05-24T18:58:57.977000
|
||||
CVE-2022-30765,0,1,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000
|
||||
CVE-2022-30767,0,0,4775e6dfb882ca3a196625f46d2186ce01f414513db4c144b862289f8c58d6a5,2023-11-07T03:47:24.783000
|
||||
CVE-2022-30768,0,0,19753dea6aeae531834932bdbe525a85c3a36862042bf97e7f1ddd6d4e4b3d91,2023-11-07T03:47:24.853000
|
||||
CVE-2022-30769,0,0,15fa8cc9f9e5fd9012a9ab8a52b506ef029d295e9d752a237cf87b7e4f8050e9,2023-11-07T03:47:24.913000
|
||||
@ -212973,7 +212973,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf
|
||||
CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000
|
||||
CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000
|
||||
CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000
|
||||
CVE-2023-0109,0,0,6abc61d95fd57ef73d1f6ec7554842d23df16b10a4dd404e5111c256f31d1109,2024-11-15T13:58:08.913000
|
||||
CVE-2023-0109,0,1,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000
|
||||
CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000
|
||||
CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000
|
||||
CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000
|
||||
@ -213577,7 +213577,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5
|
||||
CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000
|
||||
CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000
|
||||
CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000
|
||||
CVE-2023-0737,0,0,3bb780fc0a538b18d6fde6ba59591151c98c891a49485224230137e3bdf6af31,2024-11-15T13:58:08.913000
|
||||
CVE-2023-0737,0,1,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000
|
||||
CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000
|
||||
CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000
|
||||
CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000
|
||||
@ -215621,7 +215621,7 @@ CVE-2023-21056,0,0,995fad705f650ff3eaf185ebe882d06b6e4d09c0956a6bcd2bfea6b654417
|
||||
CVE-2023-21057,0,0,3d44097c3c200f0b17f1879819349cdc18de4e2156ff8226812a4d0777ba6c61,2023-03-30T16:50:36.527000
|
||||
CVE-2023-21058,0,0,48052587152b716354e8911d9a2a29e6d938c8f474058afbe6f8a5041cd7974a,2023-03-29T15:05:03.910000
|
||||
CVE-2023-21059,0,0,8db890a27c915f00d6fed020c9f8a480e62ed6ce4dac0ac01a34a7dce78a02ec,2023-03-29T18:44:14.857000
|
||||
CVE-2023-2106,0,0,2530ef97ea626e7a8a410e3ebe02b05225ce70661228e6f830656179c6360092,2023-04-25T16:29:34.127000
|
||||
CVE-2023-2106,0,1,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000
|
||||
CVE-2023-21060,0,0,031442d7f4ea5b6ae0e29837a4bbaed861fbcc303822a358b5dc59a5149bb3dd,2023-03-29T18:43:53.737000
|
||||
CVE-2023-21061,0,0,6490da526ed7065eccbcc696f9f962795cc2b014c6d53d64a6adbd94120f5d18,2023-03-29T15:04:11.227000
|
||||
CVE-2023-21062,0,0,40c76e318792cc0f78ca458ad4e9dad427e83b5b91f7684d0d6fa2943a6292e0,2023-03-31T12:58:57.567000
|
||||
@ -235651,7 +235651,7 @@ CVE-2023-47120,0,0,6e5cf7aa1dce9f494a0c860253344a3950368bcf8ff7b583963ba86c8e76d
|
||||
CVE-2023-47121,0,0,8ef00758c3dec2ac6ff6b649dadab0f948ffb4a5bbb58a181a1e6c7b3ef58d87,2023-11-17T20:20:26.137000
|
||||
CVE-2023-47122,0,0,a9df5fa9c0e8414d44cffae9c5acb48e2a1801978cf6443f04f6610b9193b585,2023-11-16T17:50:16.327000
|
||||
CVE-2023-47123,0,0,8d361c371341412b84dc54774df576d9fe69de84d066d55765bb32cbb6494159,2024-04-15T19:12:25.887000
|
||||
CVE-2023-47124,0,0,b24bfc9411e27420309cadfb6fbd310b685b721e9bde2692896514b4cea70e13,2023-12-07T21:01:24.967000
|
||||
CVE-2023-47124,0,1,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000
|
||||
CVE-2023-47125,0,0,9a2f9293b1bb6384f4c490717940892ab731bd46d8233a43c41e51a52ebe67c3,2023-11-21T02:58:51.787000
|
||||
CVE-2023-47126,0,0,d7db4dfe43677893f510f67d44655eb1bfaaec58afed097e3332356dc994ae85,2023-11-21T03:01:46.133000
|
||||
CVE-2023-47127,0,0,3b142b710453a1850b566c196150901604dda76b0ed8a77543fe3542a15724c1,2023-11-21T03:05:46.807000
|
||||
@ -242688,6 +242688,7 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430
|
||||
CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
|
||||
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
|
||||
CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10204,1,1,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000
|
||||
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
|
||||
CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000
|
||||
CVE-2024-10217,0,0,eb6516ec82f77e9f107386542d4ffb8464a3e61001620c55c2f842dbfbb03b5d,2024-11-13T17:01:16.850000
|
||||
@ -243134,7 +243135,7 @@ CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f32574438
|
||||
CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000
|
||||
CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000
|
||||
CVE-2024-10924,0,0,81893a916d56c17bfaebe03737efc603a4394519bc7d6f05195e83e8e85b1166,2024-11-15T13:58:08.913000
|
||||
CVE-2024-10924,0,1,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
|
||||
CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
|
||||
@ -243197,8 +243198,8 @@ CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc05
|
||||
CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000
|
||||
CVE-2024-11028,0,0,a5fce876a39d3e00d472044131a8d336932258a82ff3a02e40bb7ab1cc37c8ff,2024-11-13T17:01:16.850000
|
||||
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
||||
CVE-2024-11036,1,1,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
|
||||
CVE-2024-11038,1,1,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
|
||||
CVE-2024-11036,0,0,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
|
||||
CVE-2024-11038,0,0,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
|
||||
CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000
|
||||
CVE-2024-11046,0,0,dae70e42607845033c6b3a286ac389c98e26c8cde81bdbf229658639db4fd302,2024-11-13T21:01:01.540000
|
||||
CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b0984875d6,2024-11-13T20:56:10.463000
|
||||
@ -243227,6 +243228,7 @@ CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe
|
||||
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11073,0,0,ef922d07a39eeb6c1fcac9a877724098fbbee23a8a49829a797889d4fd66dae6,2024-11-18T17:21:19.557000
|
||||
CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000
|
||||
CVE-2024-11075,1,1,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000
|
||||
CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
|
||||
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
|
||||
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
|
||||
@ -243271,7 +243273,7 @@ CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8
|
||||
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
|
||||
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
|
||||
CVE-2024-11150,0,0,3e3c713e3eaad09aa014087e1c0cf6ec0a3f52a733d6f796982bf46a36311d42,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11159,0,0,acc315ccca82d4dda8527171d6a7ed0296dd6177834223afd6bc1a7bd47506e8,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11159,0,1,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
|
||||
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
||||
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
||||
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
|
||||
@ -243281,8 +243283,9 @@ CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62f
|
||||
CVE-2024-11182,0,0,43e4e2251d845a1f0d31bd2b62102b26d7d278b2b068b2f8e9e82735945af2ae,2024-11-18T15:35:03.553000
|
||||
CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000
|
||||
CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000
|
||||
CVE-2024-11194,1,1,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
|
||||
CVE-2024-11195,1,1,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
|
||||
CVE-2024-11194,0,0,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
|
||||
CVE-2024-11195,0,0,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
|
||||
CVE-2024-11198,1,1,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000
|
||||
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
|
||||
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
|
||||
@ -243297,6 +243300,7 @@ CVE-2024-11214,0,0,0aa99902e65dc6c03e1ca05b11000c9116be8bf762f91cf55a9d960757e4b
|
||||
CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000
|
||||
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
|
||||
CVE-2024-11224,1,1,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000
|
||||
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11237,0,0,14e448a6a8c58bda6358b06dade390c2a1921b884cc94a3ba12fc6ad79696644,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11238,0,0,5db87c5bb65e54461cba31fd593252a458b17b662806ea71f4893354fc62157d,2024-11-15T13:58:08.913000
|
||||
@ -245520,7 +245524,7 @@ CVE-2024-21534,0,0,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc
|
||||
CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000
|
||||
CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000
|
||||
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
|
||||
CVE-2024-21538,0,0,e8cdab9c6756d7f91f4358b51c5fdc4acd8293095dfa14f99a5a2ff2dfe3d783,2024-11-08T19:01:03.880000
|
||||
CVE-2024-21538,0,1,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000
|
||||
CVE-2024-21539,0,0,dfd9359e0c564c537268368db999f7713955785d7a4a9df91fee71b6b45e0530,2024-11-19T05:15:16.453000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000
|
||||
@ -247070,7 +247074,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
|
||||
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||
CVE-2024-23715,0,0,be9ca32355354e8e866a9cc5f9269e48161aa8200c02ba6e7048918c9ef2bdb8,2024-11-15T14:00:09.720000
|
||||
CVE-2024-23715,0,1,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
|
||||
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||
@ -252495,7 +252499,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b
|
||||
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
|
||||
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31141,0,1,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000
|
||||
CVE-2024-31141,0,0,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000
|
||||
CVE-2024-31142,0,0,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000
|
||||
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
|
||||
CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000
|
||||
@ -262010,7 +262014,7 @@ CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd
|
||||
CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000
|
||||
CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000
|
||||
CVE-2024-44205,0,0,89e79a6b18bf86e5c6fe07ffb754b6a30f0a4b722301be4dfe77863fc3ec3818,2024-11-05T22:35:09.383000
|
||||
CVE-2024-44206,0,0,cce809798797c4f27f98da648a0cb34cc37e85900206791dd0f0bb97bf5465c4,2024-10-29T21:35:15.080000
|
||||
CVE-2024-44206,0,1,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000
|
||||
CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000
|
||||
CVE-2024-44208,0,0,4d7aa9405d343d17597bfad70ff83a926fbd31054b5ebc02d6d462dcb9f00027,2024-10-30T19:35:18.340000
|
||||
CVE-2024-44213,0,0,c6cff758bc03ecbfd99946547b6f803038e23fd3515589348ba94d44f5467231,2024-10-30T19:35:19.187000
|
||||
@ -266282,7 +266286,7 @@ CVE-2024-51754,0,0,7bb02b0dadfa6351503359aa64d9360522f7dd1d2e17f399adc659a202b69
|
||||
CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882a03,2024-11-08T19:01:25.633000
|
||||
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
|
||||
CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000
|
||||
CVE-2024-51758,0,0,f380eb8d34567367d647061664429271d9307b0015af8f1ccfbeb527fa9b8011,2024-11-08T19:01:03.880000
|
||||
CVE-2024-51758,0,1,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000
|
||||
CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000
|
||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||
CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000
|
||||
@ -266593,10 +266597,12 @@ CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b2976
|
||||
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
|
||||
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
|
||||
CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
|
||||
CVE-2024-52675,1,1,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000
|
||||
CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
|
||||
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
|
||||
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
|
||||
CVE-2024-52711,1,1,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000
|
||||
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
||||
@ -270135,6 +270141,7 @@ CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da64
|
||||
CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000
|
||||
CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9777,1,1,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000
|
||||
CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000
|
||||
CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000
|
||||
@ -270180,6 +270187,7 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379
|
||||
CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000
|
||||
CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000
|
||||
CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
|
||||
CVE-2024-9830,1,1,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000
|
||||
CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000
|
||||
CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000
|
||||
CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user