mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 18:30:48 +00:00
Auto-Update: 2025-01-01T00:55:25.658222+00:00
This commit is contained in:
parent
347c2a4df2
commit
6c2c156a89
141
CVE-2024/CVE-2024-130xx/CVE-2024-13085.json
Normal file
141
CVE-2024/CVE-2024-130xx/CVE-2024-13085.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-13085",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-31T23:15:07.440",
|
||||
"lastModified": "2024-12-31T23:15:07.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Land Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289838",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289838",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.472196",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21675.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21675.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21675",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:07.193",
|
||||
"lastModified": "2025-01-01T00:15:07.193",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21679.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21679.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21679",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:07.267",
|
||||
"lastModified": "2025-01-01T00:15:07.267",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,307 +2,15 @@
|
||||
"id": "CVE-2024-21683",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-05-21T23:15:07.923",
|
||||
"lastModified": "2024-11-21T08:54:51.293",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-01-01T00:15:07.317",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.\n\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.\u00a0\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html\n\nYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.\n\nThis vulnerability was found internally."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Esta vulnerabilidad RCE (ejecuci\u00f3n remota de c\u00f3digo) de alta gravedad se introdujo en la versi\u00f3n 5.2 de Confluence Data Center and Server. Esta vulnerabilidad RCE (ejecuci\u00f3n remota de c\u00f3digo), con una puntuaci\u00f3n CVSS de 8,3, permite a un atacante autenticado ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y no requiere interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas especificadas. Consulte las notas de la versi\u00f3n https://confluence.atlassian.com/doc/confluence-release-notes-327.html Puede descargar la \u00faltima versi\u00f3n de Confluence Data Center and Server desde el centro de descargas https://www.atlassian.com /software/confluence/descargar-archivos. Esta vulnerabilidad se encontr\u00f3 internamente."
|
||||
"value": "Rejected reason: This CVE's publication may have been a false positive or a mistake. As a result, we have rejected this record."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "7.19.0",
|
||||
"versionEndExcluding": "7.19.22",
|
||||
"matchCriteriaId": "B3441F45-4865-406E-B65D-00B3D3F62854"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.20.0",
|
||||
"versionEndIncluding": "7.20.3",
|
||||
"matchCriteriaId": "CA11366E-1323-4E23-BC48-98E5A278ACBC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.4",
|
||||
"matchCriteriaId": "3E04D444-3EB1-4738-B7E2-5B7AE2E5E362"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndIncluding": "8.1.4",
|
||||
"matchCriteriaId": "1F0C549F-BE94-4E69-AD21-7472364DCDEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndIncluding": "8.2.3",
|
||||
"matchCriteriaId": "0850948D-AE6D-4DCA-9BA0-9980E6BFC202"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndIncluding": "8.3.4",
|
||||
"matchCriteriaId": "63D5B3B0-7F7E-49B6-8C2D-FF4D824A9315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.5",
|
||||
"matchCriteriaId": "57BDBED4-B502-444B-8C8C-EDC8CD0717F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "8.5.0",
|
||||
"versionEndExcluding": "8.5.9",
|
||||
"matchCriteriaId": "3DA35EFC-343E-4672-B25F-3BF347D1569A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.6.0",
|
||||
"versionEndIncluding": "8.6.2",
|
||||
"matchCriteriaId": "A28B7617-2765-4C27-AC74-8C583ABF1977"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0A3DA1F-C35D-464A-8E01-B2D8F05F85A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1147BC2D-633D-40BB-8303-53D5FE8CB0FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F13F5EE-7BAE-4F46-ACDD-65155EF457F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AFB1065-37A0-49ED-BA0A-F2F01797F45A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9CDEDBB-0657-4391-BF76-44E2B8011004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "7.19.0",
|
||||
"versionEndExcluding": "7.19.22",
|
||||
"matchCriteriaId": "3119D0A7-6270-4F16-AA5E-D6B36310BB34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.20.0",
|
||||
"versionEndIncluding": "7.20.3",
|
||||
"matchCriteriaId": "72EB6154-9A86-4A14-A341-D357D9FCB0DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.4",
|
||||
"matchCriteriaId": "ACE3F2DE-01CD-4CBC-B8F5-86ACCA6DC62A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndIncluding": "8.1.4",
|
||||
"matchCriteriaId": "8201C848-0F3F-42B3-9430-A628CFC96B1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndIncluding": "8.2.3",
|
||||
"matchCriteriaId": "4451E75A-00F4-4AC2-BE18-CCB1471B88BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndIncluding": "8.3.4",
|
||||
"matchCriteriaId": "D5FF2B9F-070E-458F-BD17-20A4ECBEAD72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.5",
|
||||
"matchCriteriaId": "71CE6EAD-724D-49C4-BE5A-C45884C1F237"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "8.5.0",
|
||||
"versionEndExcluding": "8.5.9",
|
||||
"matchCriteriaId": "E64FAC9F-2E03-496D-B1FA-01DE40473675"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.6.0",
|
||||
"versionEndIncluding": "8.6.2",
|
||||
"matchCriteriaId": "BA046009-AC63-4DF2-90E0-38873BD4614E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABB0C806-A61F-4238-BE92-25FD9B771EFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1245106-DD17-410F-963D-6877C19ED65D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4F9DEA9-BBB4-4205-9557-CAD0184DA3F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7228BE60-B856-4C52-B7A5-014D1768CD33"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3381AD0-F839-4AEC-9D90-EB78F271BD4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1387867145",
|
||||
"source": "security@atlassian.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/CONFSERVER-95832",
|
||||
"source": "security@atlassian.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1387867145",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/CONFSERVER-95832",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/179507",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21688.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21688.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21688",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.373",
|
||||
"lastModified": "2025-01-01T00:15:36.373",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21691.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21691.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21691",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.447",
|
||||
"lastModified": "2025-01-01T00:15:36.447",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21692.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21692.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21692",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.510",
|
||||
"lastModified": "2025-01-01T00:15:36.510",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21693.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21693.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21693",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.583",
|
||||
"lastModified": "2025-01-01T00:15:36.583",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21694.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21694.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21694",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.647",
|
||||
"lastModified": "2025-01-01T00:15:36.647",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21695.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21695.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21695",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.713",
|
||||
"lastModified": "2025-01-01T00:15:36.713",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-216xx/CVE-2024-21696.json
Normal file
16
CVE-2024/CVE-2024-216xx/CVE-2024-21696.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21696",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.777",
|
||||
"lastModified": "2025-01-01T00:15:36.777",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21701.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21701.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21701",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.843",
|
||||
"lastModified": "2025-01-01T00:15:36.843",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21702.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21702.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21702",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.917",
|
||||
"lastModified": "2025-01-01T00:15:36.917",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21704.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21704.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21704",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:36.987",
|
||||
"lastModified": "2025-01-01T00:15:36.987",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21705.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21705.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21705",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.073",
|
||||
"lastModified": "2025-01-01T00:15:37.073",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21708.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21708.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21708",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.137",
|
||||
"lastModified": "2025-01-01T00:15:37.137",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21709.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21709.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21709",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.207",
|
||||
"lastModified": "2025-01-01T00:15:37.207",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21710.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21710.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21710",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.270",
|
||||
"lastModified": "2025-01-01T00:15:37.270",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21711.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21711.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21711",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.330",
|
||||
"lastModified": "2025-01-01T00:15:37.330",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21712.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21712.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21712",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.400",
|
||||
"lastModified": "2025-01-01T00:15:37.400",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21713.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21713.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21713",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.460",
|
||||
"lastModified": "2025-01-01T00:15:37.460",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21714.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21714.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21714",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.527",
|
||||
"lastModified": "2025-01-01T00:15:37.527",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21715.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21715.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21715",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.613",
|
||||
"lastModified": "2025-01-01T00:15:37.613",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21716.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21716.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21716",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.667",
|
||||
"lastModified": "2025-01-01T00:15:37.667",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21717.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21717.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21717",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.733",
|
||||
"lastModified": "2025-01-01T00:15:37.733",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21718.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21718.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21718",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.800",
|
||||
"lastModified": "2025-01-01T00:15:37.800",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21719.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21719.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21719",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.870",
|
||||
"lastModified": "2025-01-01T00:15:37.870",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21720.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21720.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21720",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.927",
|
||||
"lastModified": "2025-01-01T00:15:37.927",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-217xx/CVE-2024-21721.json
Normal file
16
CVE-2024/CVE-2024-217xx/CVE-2024-21721.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-21721",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:37.987",
|
||||
"lastModified": "2025-01-01T00:15:37.987",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23389.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23389.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23389",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.047",
|
||||
"lastModified": "2025-01-01T00:15:38.047",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23390.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23390.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23390",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.103",
|
||||
"lastModified": "2025-01-01T00:15:38.103",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23391.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23391.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23391",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.163",
|
||||
"lastModified": "2025-01-01T00:15:38.163",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23392.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23392.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23392",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.227",
|
||||
"lastModified": "2025-01-01T00:15:38.227",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23393.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23393.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23393",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.290",
|
||||
"lastModified": "2025-01-01T00:15:38.290",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23394.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23394.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23394",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.350",
|
||||
"lastModified": "2025-01-01T00:15:38.350",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23395.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23395.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23395",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.420",
|
||||
"lastModified": "2025-01-01T00:15:38.420",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23396.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23396.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23396",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.490",
|
||||
"lastModified": "2025-01-01T00:15:38.490",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23397.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23397.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23397",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.550",
|
||||
"lastModified": "2025-01-01T00:15:38.550",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23398.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23398.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23398",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.607",
|
||||
"lastModified": "2025-01-01T00:15:38.607",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-233xx/CVE-2024-23399.json
Normal file
16
CVE-2024/CVE-2024-233xx/CVE-2024-23399.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23399",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.680",
|
||||
"lastModified": "2025-01-01T00:15:38.680",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23400.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23400.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23400",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.750",
|
||||
"lastModified": "2025-01-01T00:15:38.750",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23401.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23401.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23401",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.817",
|
||||
"lastModified": "2025-01-01T00:15:38.817",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23402.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23402.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23402",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.883",
|
||||
"lastModified": "2025-01-01T00:15:38.883",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23403.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23403.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23403",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:38.947",
|
||||
"lastModified": "2025-01-01T00:15:38.947",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23404.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23404.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23404",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.007",
|
||||
"lastModified": "2025-01-01T00:15:39.007",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23405.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23405.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23405",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.087",
|
||||
"lastModified": "2025-01-01T00:15:39.087",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23406.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23406.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23406",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.160",
|
||||
"lastModified": "2025-01-01T00:15:39.160",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23407.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23407.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23407",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.213",
|
||||
"lastModified": "2025-01-01T00:15:39.213",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23408.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23408.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23408",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.287",
|
||||
"lastModified": "2025-01-01T00:15:39.287",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23409.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23409.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23409",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.353",
|
||||
"lastModified": "2025-01-01T00:15:39.353",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23410.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23410.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23410",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.410",
|
||||
"lastModified": "2025-01-01T00:15:39.410",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23411.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23411.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23411",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.470",
|
||||
"lastModified": "2025-01-01T00:15:39.470",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23412.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23412.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23412",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.533",
|
||||
"lastModified": "2025-01-01T00:15:39.533",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23413.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23413.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23413",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.597",
|
||||
"lastModified": "2025-01-01T00:15:39.597",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23414.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23414.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23414",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.653",
|
||||
"lastModified": "2025-01-01T00:15:39.653",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23415.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23415.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23415",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.720",
|
||||
"lastModified": "2025-01-01T00:15:39.720",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23416.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23416.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23416",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.783",
|
||||
"lastModified": "2025-01-01T00:15:39.783",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23417.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23417.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23417",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.850",
|
||||
"lastModified": "2025-01-01T00:15:39.850",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23418.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23418.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23418",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.910",
|
||||
"lastModified": "2025-01-01T00:15:39.910",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23419.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23419.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23419",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:39.970",
|
||||
"lastModified": "2025-01-01T00:15:39.970",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23420.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23420.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23420",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.037",
|
||||
"lastModified": "2025-01-01T00:15:40.037",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23421.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23421.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23421",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.100",
|
||||
"lastModified": "2025-01-01T00:15:40.100",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23422.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23422.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23422",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.163",
|
||||
"lastModified": "2025-01-01T00:15:40.163",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23423.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23423.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23423",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.227",
|
||||
"lastModified": "2025-01-01T00:15:40.227",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23424.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23424.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23424",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.293",
|
||||
"lastModified": "2025-01-01T00:15:40.293",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23425.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23425.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23425",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.350",
|
||||
"lastModified": "2025-01-01T00:15:40.350",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23426.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23426.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23426",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.417",
|
||||
"lastModified": "2025-01-01T00:15:40.417",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23427.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23427.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23427",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.477",
|
||||
"lastModified": "2025-01-01T00:15:40.477",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23428.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23428.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23428",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.543",
|
||||
"lastModified": "2025-01-01T00:15:40.543",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23429.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23429.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23429",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.607",
|
||||
"lastModified": "2025-01-01T00:15:40.607",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23430.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23430.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23430",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.670",
|
||||
"lastModified": "2025-01-01T00:15:40.670",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23431.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23431.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23431",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.727",
|
||||
"lastModified": "2025-01-01T00:15:40.727",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23432.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23432.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23432",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.793",
|
||||
"lastModified": "2025-01-01T00:15:40.793",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23433.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23433.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23433",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.857",
|
||||
"lastModified": "2025-01-01T00:15:40.857",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23434.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23434.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23434",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.917",
|
||||
"lastModified": "2025-01-01T00:15:40.917",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23435.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23435.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23435",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:40.990",
|
||||
"lastModified": "2025-01-01T00:15:40.990",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23436.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23436.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23436",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:41.060",
|
||||
"lastModified": "2025-01-01T00:15:41.060",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23437.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23437.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23437",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:41.123",
|
||||
"lastModified": "2025-01-01T00:15:41.123",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-234xx/CVE-2024-23438.json
Normal file
16
CVE-2024/CVE-2024-234xx/CVE-2024-23438.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-23438",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2025-01-01T00:15:41.193",
|
||||
"lastModified": "2025-01-01T00:15:41.193",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38183",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-17T19:15:25.737",
|
||||
"lastModified": "2024-09-25T19:59:13.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-31T23:15:20.933",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link."
|
||||
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -29,19 +29,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-38202",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-08T02:15:38.180",
|
||||
"lastModified": "2024-10-16T02:15:05.713",
|
||||
"lastModified": "2024-12-31T23:15:23.697",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. **Note:**Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any further updates regarding mitigations for this vulnerability, this CVE will be updated and customers will be notified. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert if an update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. **Note:**Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202"
|
||||
"value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any further updates regarding mitigations for this vulnerability, this CVE will be updated and customers will be notified. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert if an update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any further... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
|
56
CVE-2024/CVE-2024-560xx/CVE-2024-56020.json
Normal file
56
CVE-2024/CVE-2024-560xx/CVE-2024-56020.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56020",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-01T00:15:57.060",
|
||||
"lastModified": "2025-01-01T00:15:57.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mario Di Pasquale SvegliaT Buttons allows Stored XSS.This issue affects SvegliaT Buttons: from n/a through 1.3.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/svegliat-buttons/vulnerability/wordpress-svegliat-buttons-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-560xx/CVE-2024-56021.json
Normal file
56
CVE-2024/CVE-2024-560xx/CVE-2024-56021.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56021",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-01T00:15:57.210",
|
||||
"lastModified": "2025-01-01T00:15:57.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ibnuyahya Category Post Shortcode allows Stored XSS.This issue affects Category Post Shortcode: from n/a through 2.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/category-post-shortcode/vulnerability/wordpress-category-post-shortcode-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-560xx/CVE-2024-56062.json
Normal file
56
CVE-2024/CVE-2024-560xx/CVE-2024-56062.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56062",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-31T23:15:41.237",
|
||||
"lastModified": "2024-12-31T23:15:41.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Royal Royal Elementor Addons allows Stored XSS.This issue affects Royal Elementor Addons: from n/a through 1.3.987."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-and-templates-plugin-1-3-987-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-560xx/CVE-2024-56063.json
Normal file
56
CVE-2024/CVE-2024-560xx/CVE-2024-56063.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56063",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-31T23:15:41.393",
|
||||
"lastModified": "2024-12-31T23:15:41.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor allows Stored XSS.This issue affects Essential Addons for Elementor: from n/a through 6.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/essential-addons-for-elementor-lite/vulnerability/wordpress-essential-addons-for-elementor-plugin-6-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-568xx/CVE-2024-56803.json
Normal file
82
CVE-2024/CVE-2024-568xx/CVE-2024-56803.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-56803",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-31T23:15:41.553",
|
||||
"lastModified": "2024-12-31T23:15:41.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ghostty is a cross-platform terminal emulator. Ghostty, as allowed by default in 1.0.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. This attack requires an attacker to send malicious escape sequences followed by convincing the user to physically press the \"enter\" key. Fixed in Ghostty v1.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ghostty-org/ghostty/pull/3908",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ghostty-org/ghostty/security/advisories/GHSA-5hcq-3j4q-4v6p",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
42
README.md
42
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-31T23:00:20.046391+00:00
|
||||
2025-01-01T00:55:25.658222+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-31T22:15:07.783000+00:00
|
||||
2025-01-01T00:15:57.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
275301
|
||||
275384
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `83`
|
||||
|
||||
- [CVE-2024-13081](CVE-2024/CVE-2024-130xx/CVE-2024-13081.json) (`2024-12-31T21:15:07.670`)
|
||||
- [CVE-2024-13082](CVE-2024/CVE-2024-130xx/CVE-2024-13082.json) (`2024-12-31T21:15:08.730`)
|
||||
- [CVE-2024-13083](CVE-2024/CVE-2024-130xx/CVE-2024-13083.json) (`2024-12-31T22:15:07.167`)
|
||||
- [CVE-2024-13084](CVE-2024/CVE-2024-130xx/CVE-2024-13084.json) (`2024-12-31T22:15:07.783`)
|
||||
- [CVE-2024-23419](CVE-2024/CVE-2024-234xx/CVE-2024-23419.json) (`2025-01-01T00:15:39.970`)
|
||||
- [CVE-2024-23420](CVE-2024/CVE-2024-234xx/CVE-2024-23420.json) (`2025-01-01T00:15:40.037`)
|
||||
- [CVE-2024-23421](CVE-2024/CVE-2024-234xx/CVE-2024-23421.json) (`2025-01-01T00:15:40.100`)
|
||||
- [CVE-2024-23422](CVE-2024/CVE-2024-234xx/CVE-2024-23422.json) (`2025-01-01T00:15:40.163`)
|
||||
- [CVE-2024-23423](CVE-2024/CVE-2024-234xx/CVE-2024-23423.json) (`2025-01-01T00:15:40.227`)
|
||||
- [CVE-2024-23424](CVE-2024/CVE-2024-234xx/CVE-2024-23424.json) (`2025-01-01T00:15:40.293`)
|
||||
- [CVE-2024-23425](CVE-2024/CVE-2024-234xx/CVE-2024-23425.json) (`2025-01-01T00:15:40.350`)
|
||||
- [CVE-2024-23426](CVE-2024/CVE-2024-234xx/CVE-2024-23426.json) (`2025-01-01T00:15:40.417`)
|
||||
- [CVE-2024-23427](CVE-2024/CVE-2024-234xx/CVE-2024-23427.json) (`2025-01-01T00:15:40.477`)
|
||||
- [CVE-2024-23428](CVE-2024/CVE-2024-234xx/CVE-2024-23428.json) (`2025-01-01T00:15:40.543`)
|
||||
- [CVE-2024-23429](CVE-2024/CVE-2024-234xx/CVE-2024-23429.json) (`2025-01-01T00:15:40.607`)
|
||||
- [CVE-2024-23430](CVE-2024/CVE-2024-234xx/CVE-2024-23430.json) (`2025-01-01T00:15:40.670`)
|
||||
- [CVE-2024-23431](CVE-2024/CVE-2024-234xx/CVE-2024-23431.json) (`2025-01-01T00:15:40.727`)
|
||||
- [CVE-2024-23432](CVE-2024/CVE-2024-234xx/CVE-2024-23432.json) (`2025-01-01T00:15:40.793`)
|
||||
- [CVE-2024-23433](CVE-2024/CVE-2024-234xx/CVE-2024-23433.json) (`2025-01-01T00:15:40.857`)
|
||||
- [CVE-2024-23434](CVE-2024/CVE-2024-234xx/CVE-2024-23434.json) (`2025-01-01T00:15:40.917`)
|
||||
- [CVE-2024-23435](CVE-2024/CVE-2024-234xx/CVE-2024-23435.json) (`2025-01-01T00:15:40.990`)
|
||||
- [CVE-2024-23436](CVE-2024/CVE-2024-234xx/CVE-2024-23436.json) (`2025-01-01T00:15:41.060`)
|
||||
- [CVE-2024-23437](CVE-2024/CVE-2024-234xx/CVE-2024-23437.json) (`2025-01-01T00:15:41.123`)
|
||||
- [CVE-2024-23438](CVE-2024/CVE-2024-234xx/CVE-2024-23438.json) (`2025-01-01T00:15:41.193`)
|
||||
- [CVE-2024-56020](CVE-2024/CVE-2024-560xx/CVE-2024-56020.json) (`2025-01-01T00:15:57.060`)
|
||||
- [CVE-2024-56021](CVE-2024/CVE-2024-560xx/CVE-2024-56021.json) (`2025-01-01T00:15:57.210`)
|
||||
- [CVE-2024-56062](CVE-2024/CVE-2024-560xx/CVE-2024-56062.json) (`2024-12-31T23:15:41.237`)
|
||||
- [CVE-2024-56063](CVE-2024/CVE-2024-560xx/CVE-2024-56063.json) (`2024-12-31T23:15:41.393`)
|
||||
- [CVE-2024-56803](CVE-2024/CVE-2024-568xx/CVE-2024-56803.json) (`2024-12-31T23:15:41.553`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2024-21683](CVE-2024/CVE-2024-216xx/CVE-2024-21683.json) (`2025-01-01T00:15:07.317`)
|
||||
- [CVE-2024-38183](CVE-2024/CVE-2024-381xx/CVE-2024-38183.json) (`2024-12-31T23:15:20.933`)
|
||||
- [CVE-2024-38202](CVE-2024/CVE-2024-382xx/CVE-2024-38202.json) (`2024-12-31T23:15:23.697`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
97
_state.csv
97
_state.csv
@ -245320,10 +245320,11 @@ CVE-2024-13078,0,0,9e028faec5365401f0cf9572afcae1b9e304d87dc89cd7ae1fcfa6308a238
|
||||
CVE-2024-13079,0,0,acf30d8920277f2af488bd54bc3752ac651419dda31c1f7b38d1ebf5d869b523,2024-12-31T20:15:27.937000
|
||||
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
|
||||
CVE-2024-13080,0,0,0509f1f522b9304178178b5ff53d51a2e0295a82c91bc35e1cf9e87ffe20c47a,2024-12-31T20:15:28.157000
|
||||
CVE-2024-13081,1,1,ceca02acef2bbcbe3ed625923129b3882453a2ef359d25ef033989a46d74b94d,2024-12-31T21:15:07.670000
|
||||
CVE-2024-13082,1,1,935bc4b8b5713642f988a7a3b1f24d34b18d112774ae29252c55fd303ca821d8,2024-12-31T21:15:08.730000
|
||||
CVE-2024-13083,1,1,1a047accd8c6bf62a0e13b2217d254aaf7132e2a90bd9a91eb1e045a017329d8,2024-12-31T22:15:07.167000
|
||||
CVE-2024-13084,1,1,e559e62a7f68da441035efccf01422348f99fa312e9708064911a59d65bf1249,2024-12-31T22:15:07.783000
|
||||
CVE-2024-13081,0,0,ceca02acef2bbcbe3ed625923129b3882453a2ef359d25ef033989a46d74b94d,2024-12-31T21:15:07.670000
|
||||
CVE-2024-13082,0,0,935bc4b8b5713642f988a7a3b1f24d34b18d112774ae29252c55fd303ca821d8,2024-12-31T21:15:08.730000
|
||||
CVE-2024-13083,0,0,1a047accd8c6bf62a0e13b2217d254aaf7132e2a90bd9a91eb1e045a017329d8,2024-12-31T22:15:07.167000
|
||||
CVE-2024-13084,0,0,e559e62a7f68da441035efccf01422348f99fa312e9708064911a59d65bf1249,2024-12-31T22:15:07.783000
|
||||
CVE-2024-13085,1,1,b371abc8e4b783221836f4d3bb4132d91bacc513d5b9c3566d195e8a4416bf80,2024-12-31T23:15:07.440000
|
||||
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
|
||||
CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000
|
||||
CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb1764821,2024-11-21T08:50:17.897000
|
||||
@ -247469,24 +247470,51 @@ CVE-2024-21671,0,0,bab9c5847716f4525e60877ea2fb01ab4946a07602b86b8f570933fd03838
|
||||
CVE-2024-21672,0,0,51a06dda9515277bb731cecfefa5dee0c892c9fbbbf5458d3df601c20fce3fe6,2024-11-21T08:54:50.480000
|
||||
CVE-2024-21673,0,0,5386f3f2c2fa5608e4337b427600a7f7550c9a783b6835c57637521e3c38e3ae,2024-11-21T08:54:50.613000
|
||||
CVE-2024-21674,0,0,f39a3f923353961478c76c0c23bc6ddef3aca571421fbf8b0854074283374e7d,2024-11-21T08:54:50.740000
|
||||
CVE-2024-21675,1,1,6538c81fd77ee7ef3434b476843ec466c1e70ac0dd0540cdae914ba927668538,2025-01-01T00:15:07.193000
|
||||
CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc610b,2024-04-18T17:15:48.620000
|
||||
CVE-2024-21677,0,0,eba5049340c0ab4142bcbe491686ce4ed70569bafeab697ee4759197e78b6fc4,2024-11-21T08:54:50.897000
|
||||
CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000
|
||||
CVE-2024-21679,1,1,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000
|
||||
CVE-2024-2168,0,0,c02254fd453fd438a6064b8fb092c5540a1ebcef3a158b83520fcf4262210538,2024-11-21T09:09:10.260000
|
||||
CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000
|
||||
CVE-2024-21683,0,0,481d4972dab0e0c5c1ffeba8492c07e76169e69a6bea3184aa46855e3c55b9ee,2024-11-21T08:54:51.293000
|
||||
CVE-2024-21683,0,1,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000
|
||||
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
|
||||
CVE-2024-21685,0,0,468e5359f34e3d02010595cd81cb836ca13ba9284b6d0dfad4c9b0f50c1369c0,2024-11-21T08:54:51.630000
|
||||
CVE-2024-21686,0,0,41d6e7e724426cd3bc1c6c19cd94c24a97ca79c91c452675ab61f17f3945a581,2024-11-21T08:54:51.750000
|
||||
CVE-2024-21687,0,0,17598b7556472ad0a7cb6bb3720bbbc218bae6b01e497b2f4b50268975b74616,2024-11-21T08:54:51.880000
|
||||
CVE-2024-21688,1,1,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000
|
||||
CVE-2024-21689,0,0,1ade07fe1c3e21e598fba3f258fad5dc343a968dd476652377c79c984e954246,2024-08-20T15:44:20.567000
|
||||
CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000
|
||||
CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000
|
||||
CVE-2024-21691,1,1,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000
|
||||
CVE-2024-21692,1,1,945a72c84016455a798f697f3e1e53ff2f6e3ddf62252f0504a4b3cde4e76f5a,2025-01-01T00:15:36.510000
|
||||
CVE-2024-21693,1,1,43e66eac8661ee0b7c627ad39e20ed045ab08d5570e01832b1c201cc4eb1742e,2025-01-01T00:15:36.583000
|
||||
CVE-2024-21694,1,1,b0013f6ef6f097d442a069b9d4508547a1a28c6401d748b357b2239478333564,2025-01-01T00:15:36.647000
|
||||
CVE-2024-21695,1,1,680012792329aa4b9cccfbff59cbebe926613fc882e471ece7f2a7d32612816c,2025-01-01T00:15:36.713000
|
||||
CVE-2024-21696,1,1,1ef0bd30ef6be0da10201c9293e00d4c5c81817fba128f3ffd2aa9776f13a860,2025-01-01T00:15:36.777000
|
||||
CVE-2024-21697,0,0,c3c13b97cbef88a930d65e1f398ee9d8dde15dc5b9d6d334499f7c5241994b10,2024-11-19T21:56:45.533000
|
||||
CVE-2024-2170,0,0,7b2aafcaa24cbfeb2ca17a2993a6292253730d9a203d8e5a53eb820fd90585ef,2024-11-21T09:09:10.590000
|
||||
CVE-2024-21701,1,1,bd6f205454b187d1105b8d28faf67a2bb6004d9d8801ed4174eb2b818dcf1b19,2025-01-01T00:15:36.843000
|
||||
CVE-2024-21702,1,1,a385b193ee208515857968679e6609169f813392b55c6e333b40093c3cdc7a00,2025-01-01T00:15:36.917000
|
||||
CVE-2024-21703,0,0,ce13cd634e34b80b7061abb30075f90cbbd239379b70c586223f3ec116cfea3f,2024-11-27T18:15:08.720000
|
||||
CVE-2024-21704,1,1,33b24f564031373cf7bf470943ac5fdaef982a95c5dd669934c18d35e8316ce9,2025-01-01T00:15:36.987000
|
||||
CVE-2024-21705,1,1,05d076abbca27b416a236e3c02c7a1931d089f66b987571bec1cdc91ad1dcc31,2025-01-01T00:15:37.073000
|
||||
CVE-2024-21708,1,1,5dcf5ce49b70aa2cd7ed34ac0a1ada1e38a5cf4fd2025ace66a46d2c8c3156f0,2025-01-01T00:15:37.137000
|
||||
CVE-2024-21709,1,1,3deeebd0d80bdf75aa56ddffbc3d31b4f0b9cfd4befeb77b72e8cf430b7a18ae,2025-01-01T00:15:37.207000
|
||||
CVE-2024-2171,0,0,78441c6894508e0fa50e59e69dc3dc63fdf9d032ccdeb3883a60ea1bb89a37eb,2024-11-21T09:09:10.717000
|
||||
CVE-2024-21710,1,1,5ed55ca499be71535e5f19b1420f4600e86d67a4a87bd749d0376a65647d66bd,2025-01-01T00:15:37.270000
|
||||
CVE-2024-21711,1,1,5fafdd59dcc4510c6476cff2e0f75cfa6797ca62efc953429eba874c46cbb25d,2025-01-01T00:15:37.330000
|
||||
CVE-2024-21712,1,1,8ac93509c5813df5e431bd29194879c9d159442e6f8735db1e652e3424955095,2025-01-01T00:15:37.400000
|
||||
CVE-2024-21713,1,1,580b74e6a0f891c330723b5cf5fc0459a363e74a769575e8e120f0f3e4f87eb6,2025-01-01T00:15:37.460000
|
||||
CVE-2024-21714,1,1,0bca6dce808e1b064e4da632da1e96cf99d9576c87022dd311e71650d0578305,2025-01-01T00:15:37.527000
|
||||
CVE-2024-21715,1,1,893e999835dfca2060f358c73d0a07fb89d5d78d70bb3de8680ae64a70f269d8,2025-01-01T00:15:37.613000
|
||||
CVE-2024-21716,1,1,18566df615f4cf6473f84f8dd2e835f7ae399f6f57540967d70564f0cc4ecd52,2025-01-01T00:15:37.667000
|
||||
CVE-2024-21717,1,1,c1597ecc8d5e89d566fe90cc7ae57e93db7d0856680c906c98ea377d5acc2539,2025-01-01T00:15:37.733000
|
||||
CVE-2024-21718,1,1,83b6552aa5b1b2138f4440fffd60c1a146364ce6de2c18c6d0b5236c88ecc525,2025-01-01T00:15:37.800000
|
||||
CVE-2024-21719,1,1,9c44e12e1d76733d3feed8e181f5b47ac15ebb214263488ee83326a519e428e1,2025-01-01T00:15:37.870000
|
||||
CVE-2024-2172,0,0,78f159870a3b1f4b7457cf7bb76f1b6382fde68fdd2a41bb4435297ebe3c18e0,2024-11-21T09:09:10.853000
|
||||
CVE-2024-21720,1,1,fb67e72ba582adcc0c5e5d3a9e98cab75db5f6134d2b15bd6a10b63688338923,2025-01-01T00:15:37.927000
|
||||
CVE-2024-21721,1,1,6410e381c95c472dc089a2773dc0abc68f1f222dbf9d3db9afe0135917afba85,2025-01-01T00:15:37.987000
|
||||
CVE-2024-21722,0,0,5f530469128a41bfa0dd5b7a458e5346dd38dd76f502f71a2747a4c0d39652bb,2024-11-21T08:54:52.290000
|
||||
CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
|
||||
CVE-2024-21724,0,0,71ab50eedb3eaae0cf010b41547c1ab496cb8a61984051a476dd3c8a05ae25c7,2024-11-21T08:54:52.573000
|
||||
@ -248678,11 +248706,61 @@ CVE-2024-23385,0,0,33e783b9a0ba6654217dba1cda0c01b3221783ad9759ab571e305b032f234
|
||||
CVE-2024-23386,0,0,a7685861d3b56f97f0034695e8270bc3c8543ef05deaff79f9997b472988abe7,2024-11-07T19:54:23.047000
|
||||
CVE-2024-23387,0,0,1b53231df06e7a2d9934d39ab746c9b238609b530843b990a50d92f2690c35d9,2024-11-21T08:57:42.283000
|
||||
CVE-2024-23388,0,0,1337a0df1f3253f3e8955607179c908109edef648b6bcdbe60ad3ab856f5e39b,2024-11-21T08:57:42.427000
|
||||
CVE-2024-23389,1,1,1d11e622c776e9a9a50ca0ae0018ba529c3fbce33040947ad969922ea6b2982c,2025-01-01T00:15:38.047000
|
||||
CVE-2024-2339,0,0,33602ccd8fd6e5bda5b99ca9b5d587372d0a208dfbb701184c2fa5266a00522d,2024-11-21T09:09:32.830000
|
||||
CVE-2024-23390,1,1,db7b254e783f1a147fc80864fc99a15ca5acacf835209b6aaca8df2c453ce819,2025-01-01T00:15:38.103000
|
||||
CVE-2024-23391,1,1,d233b84b01e1aed370cebf4f94e7d7c7bd9fc32c12aa7bd1bb5ee4154c23fae6,2025-01-01T00:15:38.163000
|
||||
CVE-2024-23392,1,1,feba15e5d554b5934fc8ee6e31d652ff25fcc1f2cb877bf245257f721d2e11d7,2025-01-01T00:15:38.227000
|
||||
CVE-2024-23393,1,1,3637b0b4ab63587c4c39270a1993b936bcea35ed700326c8fdbece1b1bc46070,2025-01-01T00:15:38.290000
|
||||
CVE-2024-23394,1,1,fb4bfb058eb3f081d3908f250a172122ff1f3e20476bb61e91d6c2a31bfd20a2,2025-01-01T00:15:38.350000
|
||||
CVE-2024-23395,1,1,f07003671df6ef78b3ed1d3bc54984d929e748574eaed82234c228c4c05b15a7,2025-01-01T00:15:38.420000
|
||||
CVE-2024-23396,1,1,3046ceaa908b73ab3dd595a52812030977739472b3a7f09aa9cadd5541ac43b6,2025-01-01T00:15:38.490000
|
||||
CVE-2024-23397,1,1,2eb6252aeb61730c91465d754058b0008522b815ef66ad269db9e54267928aab,2025-01-01T00:15:38.550000
|
||||
CVE-2024-23398,1,1,e88f9120927e9476413a926fb0b918880c7a2e031519af4bc9d0d9ceed8976f4,2025-01-01T00:15:38.607000
|
||||
CVE-2024-23399,1,1,c5d39a21b30070b8372e260c55ce2bfb8562f41128ebd4c9761d8d6a1c092e11,2025-01-01T00:15:38.680000
|
||||
CVE-2024-2340,0,0,c5b40e0d2f54f8d895ab78d87ae8ef170b0cb883382e17c6998adcc28c738df7,2024-11-21T09:09:32.950000
|
||||
CVE-2024-23400,1,1,c1c7fa9b24fc72031a84aaf751be0aa1d9207bcf72c8a5c077cb22cda9fc6a14,2025-01-01T00:15:38.750000
|
||||
CVE-2024-23401,1,1,cf1e976858104bf7b85d5a96467fa5fdef66034253393db849eb3f4d24501cf2,2025-01-01T00:15:38.817000
|
||||
CVE-2024-23402,1,1,8a47257cf8cf9bbe4ed1fcfa3fa826a35a1d95d9519082619e4e0d6a9abd64b2,2025-01-01T00:15:38.883000
|
||||
CVE-2024-23403,1,1,d8835bf2fe96fa1a233bac68ccdd3b86048322f118b7400cf4daf5f21a3fad6a,2025-01-01T00:15:38.947000
|
||||
CVE-2024-23404,1,1,110ed6f031eb96cdf27acf98ccde258bc769cd57bb61632cc652c143fc5ac570,2025-01-01T00:15:39.007000
|
||||
CVE-2024-23405,1,1,6e2c37806aa98b079db7a7e21b26522f962152e884e654b214e1fcf91289305a,2025-01-01T00:15:39.087000
|
||||
CVE-2024-23406,1,1,6632d70cf63187e2d5db68b8be533d52d2a71c1a6a8bf883615c716b65dee480,2025-01-01T00:15:39.160000
|
||||
CVE-2024-23407,1,1,e54b27f95f95e8b8a99f18855702286c4e1a12b5b3c3ddb6618856497b7f8530,2025-01-01T00:15:39.213000
|
||||
CVE-2024-23408,1,1,8869056e91b99bceac4adb484bb24bc8dd9c9f436cc5088f317d8b038f75f01a,2025-01-01T00:15:39.287000
|
||||
CVE-2024-23409,1,1,cc1cb3dfe5bb70f718153978ad3925f2626ffa6968c32e5d9d9a40bd7f076780,2025-01-01T00:15:39.353000
|
||||
CVE-2024-2341,0,0,27a8f5765cebc5ea370b34d6397b8dd45fa3b6ccad0be41b03ef456e1274f9f1,2024-11-21T09:09:33.090000
|
||||
CVE-2024-23410,1,1,5045f508c9d245b3fd8d60012e1a58df0137c84c6e169586f2239396bed0a1ec,2025-01-01T00:15:39.410000
|
||||
CVE-2024-23411,1,1,888f4db91a9816eb333443152b669ba8a17e49794eb6f6d5965f7ecd74a461d0,2025-01-01T00:15:39.470000
|
||||
CVE-2024-23412,1,1,550760e96400b77f6a315acb5c566be08f9642548ff6d18e15331565b7095268,2025-01-01T00:15:39.533000
|
||||
CVE-2024-23413,1,1,ed62e897ac260ecb800df1513bac064afab2e9492453ae27e4fd9a9b0d93a35e,2025-01-01T00:15:39.597000
|
||||
CVE-2024-23414,1,1,3b892e647283ed611c8e1a8b968fa60a5d23ac57014ea693cfa9ab06a3dd8f6f,2025-01-01T00:15:39.653000
|
||||
CVE-2024-23415,1,1,7c695d6ebd7e3f522c34f36d57ccd6636f80232a17e5aac7dc9d1bb05f46b61c,2025-01-01T00:15:39.720000
|
||||
CVE-2024-23416,1,1,c26b1d059b352cfba2580ba9de4f2d9a7e2afa996413289605a061816c11e836,2025-01-01T00:15:39.783000
|
||||
CVE-2024-23417,1,1,36a492d9bd4eb7bdaa571a950db8097ba7140fbbd8786f7d94eb400d6f61698f,2025-01-01T00:15:39.850000
|
||||
CVE-2024-23418,1,1,b9a0039ce552f8561e56e92c3c42626636761c919712584962a0d55673bea1d2,2025-01-01T00:15:39.910000
|
||||
CVE-2024-23419,1,1,6b5f4a05a471454df189ec43a000b6c92041cdac5504094ad6bd23f4be53e903,2025-01-01T00:15:39.970000
|
||||
CVE-2024-2342,0,0,2686d0d764b1cef6f46e8b8e7c1dd7ada4af34ce4c3fa49f721c6ef7016f045f,2024-11-21T09:09:33.223000
|
||||
CVE-2024-23420,1,1,69afeb8db87b287a36d94b45bf19289154879c0b6414d14de6a7bb4afcc332b8,2025-01-01T00:15:40.037000
|
||||
CVE-2024-23421,1,1,f6d475246274171fe2909ecd3714348684ae173bc256a02c767ef1fe49b09f4f,2025-01-01T00:15:40.100000
|
||||
CVE-2024-23422,1,1,a6c4af7b91dae3c549126d461b022109b184bfd297970d0c36c6382149f2e3c0,2025-01-01T00:15:40.163000
|
||||
CVE-2024-23423,1,1,399c8792e372c4e5a07810a439cf314c65b4b0e7722e4e56dc24c73cf383d81c,2025-01-01T00:15:40.227000
|
||||
CVE-2024-23424,1,1,a67c40ed3d7205dca9ee99309d736d6bbfd0807a118834f7e1ff74e1ee3fb1c2,2025-01-01T00:15:40.293000
|
||||
CVE-2024-23425,1,1,56898569659283c584f60a6e1ba5799267c9e8051a0bc94f0dcda30933f2f075,2025-01-01T00:15:40.350000
|
||||
CVE-2024-23426,1,1,d362a9499347a86c4013fac201077c7ee926840fd2665d5bd58a1b143e7c736c,2025-01-01T00:15:40.417000
|
||||
CVE-2024-23427,1,1,bf9b1ce4e8b60e120c9e8e79d50f5779ff56e34b8f6868aa7ac1516304982bf6,2025-01-01T00:15:40.477000
|
||||
CVE-2024-23428,1,1,1e9ea1eb7ad430366e0f2732ebcc64571734d8c263746bcfd871d9b25c72630d,2025-01-01T00:15:40.543000
|
||||
CVE-2024-23429,1,1,e8e828161cd5e2b7ef2fd65d37b548c14b34c00fffe254c543f5ebc5a00c341c,2025-01-01T00:15:40.607000
|
||||
CVE-2024-2343,0,0,ff9964481c43aa0f18599732f44e073db21b70998c79c5208b453b3e6a942b69,2024-11-21T09:09:33.350000
|
||||
CVE-2024-23430,1,1,b245320d91535cd01f34459b21c02446d04b827eaf02e28147a3b5a9e4f699c7,2025-01-01T00:15:40.670000
|
||||
CVE-2024-23431,1,1,d346c1ded25732c69b97411ec7e1a91f0fc1b1aacd8003918d973866cdc97754,2025-01-01T00:15:40.727000
|
||||
CVE-2024-23432,1,1,4b0a62a7fc9b3de8555667118dad22468af386a34ff7b0bb5a5bd51c103c206e,2025-01-01T00:15:40.793000
|
||||
CVE-2024-23433,1,1,53bd37151db2e695764913f4c7a06167094f5aaced2bfe999b397e23d289f02f,2025-01-01T00:15:40.857000
|
||||
CVE-2024-23434,1,1,a8eebeab430b0299cd849809826b1eabf63c62b64d6621b30013dec2287722be,2025-01-01T00:15:40.917000
|
||||
CVE-2024-23435,1,1,afcaa5560c73fd09e2a01b71929f974d6128f9942ef979b74e171b34bc32f2e2,2025-01-01T00:15:40.990000
|
||||
CVE-2024-23436,1,1,9d9890cc0e8eeed8d7dd79c449db082fdc01a1f3d4ea5ad8de13ee326f8db5fe,2025-01-01T00:15:41.060000
|
||||
CVE-2024-23437,1,1,ee59c2e2cfc2b4d6eacc2bf7304883418405daaab31f4e25a07db9ec41632f27,2025-01-01T00:15:41.123000
|
||||
CVE-2024-23438,1,1,50f99bb945243dd3c3cd80675c0b4365c294d8ebe7ea659e8646fea5bb3cf596,2025-01-01T00:15:41.193000
|
||||
CVE-2024-23439,0,0,12968241395f8c73c9a4599762d2ea068ebcf9c238e4c0c3dc52111a494628b8,2024-11-21T08:57:42.570000
|
||||
CVE-2024-2344,0,0,191d4ce8901aaea2affe1de5155f92284a44b0b797f92fd23b5def93ffb6dfd0,2024-11-21T09:09:33.480000
|
||||
CVE-2024-23440,0,0,c1247ebedbe63be2da6e8eb2d9998e0c3b32e6d26a94360aa7e651f4c01afead,2024-11-21T08:57:42.717000
|
||||
@ -259763,7 +259841,7 @@ CVE-2024-38179,0,0,2c5a894d01e51edb16258b3bed8449de0a4d319183d8d4f8067eaf441dbf7
|
||||
CVE-2024-3818,0,0,7d1d39e82ad91d5622119f4ea866721b9898edf8d4385d793aef1e9795c74157,2024-11-21T09:30:27.840000
|
||||
CVE-2024-38180,0,0,b07cf7c37e4cc39f3a323c4f8c6f585f439885bc86c6f986eeb8ebe4b7d133c5,2024-08-16T19:20:22.853000
|
||||
CVE-2024-38182,0,0,63c4376a4109b242c6dd9e322aed342594af0df2094c12cf7ce68947c8a5f7cb,2024-08-13T23:15:19.657000
|
||||
CVE-2024-38183,0,0,d260bb2026a1ffbbe44bd45763ef4d3ca376531eb99c2ab263b99bb975dd7ba6,2024-09-25T19:59:13.653000
|
||||
CVE-2024-38183,0,1,4fc4c4d894ca7a1786bcb11ba2aa9fdf5a300bd2ad84fc8d48e71857af9b39cf,2024-12-31T23:15:20.933000
|
||||
CVE-2024-38184,0,0,e536d97ad4fb34bc2f2c9893340299904dd26f224a76d18284f4334452dcf9ba,2024-11-21T09:25:01.623000
|
||||
CVE-2024-38185,0,0,633d0f3cf1e69ec4e82c422af13d8397043b63fdec59052b2af0c465af26da74,2024-11-21T09:25:01.777000
|
||||
CVE-2024-38186,0,0,c5f1ff057c9edc15d8e50473ef0bbcf2f5c96bc86872c5239aae142d97fe1959,2024-11-21T09:25:01.937000
|
||||
@ -259783,7 +259861,7 @@ CVE-2024-38199,0,0,0dd948c0d630ffd11ef973d3897c89b05d0c484012d417092380257ce902c
|
||||
CVE-2024-3820,0,0,ebb43d41dfb444865db3723891fb2477fb81707e0b52fb92a88385d51705deb7,2024-11-21T09:30:28.087000
|
||||
CVE-2024-38200,0,0,839a37329b9dc5b6fea2142ae18a060a3d261c6bbc97a2e041619e8b3f1ab4e1,2024-08-13T18:15:29.720000
|
||||
CVE-2024-38201,0,0,676fe655a4353a209bb0546add80c4c8c162df689ed132825ef07e4dd81037ee,2024-08-15T20:30:00.737000
|
||||
CVE-2024-38202,0,0,ae34d1c0f19f4bc603f27b2a26463f4154c23a556873d11566827dce2f9181d4,2024-10-16T02:15:05.713000
|
||||
CVE-2024-38202,0,1,195eb65287559210a264039da59817ffe0c72f680d46dd282a02c3e1dbfbdd08,2024-12-31T23:15:23.697000
|
||||
CVE-2024-38203,0,0,0eafcc1d547222e148bdef6371b2193d5291aa20762ad6a5cc37713079b5943c,2024-11-18T18:23:07.743000
|
||||
CVE-2024-38204,0,0,96b18af43450c040d093b118115c7f80a048506b0d9e16a1107f93e550d18d32,2024-11-08T15:34:14.467000
|
||||
CVE-2024-38206,0,0,426aa1b7abf1f00203c4465aa29dea4cd44aa51806f280b7e455c8f749953a5f,2024-08-14T00:15:08.213000
|
||||
@ -271204,6 +271282,8 @@ CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c2
|
||||
CVE-2024-56016,0,0,72352c145c24e5c7235f05940e5baa008585f6941c1f5a0f55cd9079c6cdfebe,2024-12-18T12:15:11.940000
|
||||
CVE-2024-56017,0,0,712e189d98a2fef52195f7721a474e0e74c8371658ef85b000d5f3fb7476b956,2024-12-16T23:15:06.923000
|
||||
CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000
|
||||
CVE-2024-56020,1,1,476ea910e4a1da46b4225d74e2a20edb782c1228a8025cc0b5070e72f7bd5a1c,2025-01-01T00:15:57.060000
|
||||
CVE-2024-56021,1,1,99781f5083f6468e16fe61404ce769cc146b4eb18990086f06e7d237942f8b02,2025-01-01T00:15:57.210000
|
||||
CVE-2024-56031,0,0,164d110e676e1c7a453ddbd792f4656e271b4b29a8622a61c1824848da1a39d7,2024-12-31T13:15:07.343000
|
||||
CVE-2024-56039,0,0,b478b593c841086df3059cb687969d54e2e0fc84360d19ab1d6fab2484be0468,2024-12-31T13:15:07.517000
|
||||
CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000
|
||||
@ -271229,6 +271309,8 @@ CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116
|
||||
CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000
|
||||
CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000
|
||||
CVE-2024-56061,0,0,a927c092dd0f95397e0b307c4e1af3e8d5bb91f2a179bdfbffe24b5ff58f5233,2024-12-31T14:15:24.970000
|
||||
CVE-2024-56062,1,1,a68267c3d9f7064bb59fb4f28588d4e43254c3a9900c31578ce50b1e9a343671,2024-12-31T23:15:41.237000
|
||||
CVE-2024-56063,1,1,dbf4087854748dcb677e5e6affa02148aa5f27de6a2f943cb60c909e35a2a408,2024-12-31T23:15:41.393000
|
||||
CVE-2024-56064,0,0,c92953f604dbab61878ff679cbb2e798705688f7ee2ce65f0fa32fe474bb539d,2024-12-31T13:15:08.157000
|
||||
CVE-2024-56066,0,0,01aedb23e256a17287f4e2685f8a139aa0bf4d7c2cd9e70526b093041a5fc74c,2024-12-31T14:15:25.117000
|
||||
CVE-2024-56067,0,0,5767ad166f2dc6b99e9b5333bee9e51f87f01f4372cdb6bfa1bf5c9bbf869a41,2024-12-31T13:15:08.323000
|
||||
@ -271640,6 +271722,7 @@ CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceff
|
||||
CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
|
||||
CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
|
||||
CVE-2024-56802,0,0,da728ab84e76725e7f1ed6578c989f7ec589be40d92bd30231bd6257f075c533,2024-12-31T16:15:28.240000
|
||||
CVE-2024-56803,1,1,eee3eebec301dd05474bd51393e9516d724e6fb38a0b710fc7c30e1617a14fb2,2024-12-31T23:15:41.553000
|
||||
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
|
||||
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
|
||||
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user