Auto-Update: 2025-01-01T00:55:25.658222+00:00

This commit is contained in:
cad-safe-bot 2025-01-01 00:58:49 +00:00
parent 347c2a4df2
commit 6c2c156a89
88 changed files with 1818 additions and 324 deletions

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-13085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T23:15:07.440",
"lastModified": "2024-12-31T23:15:07.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Land Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289838",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289838",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.472196",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21675",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:07.193",
"lastModified": "2025-01-01T00:15:07.193",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21679",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:07.267",
"lastModified": "2025-01-01T00:15:07.267",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -2,307 +2,15 @@
"id": "CVE-2024-21683",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-05-21T23:15:07.923",
"lastModified": "2024-11-21T08:54:51.293",
"vulnStatus": "Modified",
"lastModified": "2025-01-01T00:15:07.317",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.\n\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.\u00a0\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html\n\nYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.\n\nThis vulnerability was found internally."
},
{
"lang": "es",
"value": "Esta vulnerabilidad RCE (ejecuci\u00f3n remota de c\u00f3digo) de alta gravedad se introdujo en la versi\u00f3n 5.2 de Confluence Data Center and Server. Esta vulnerabilidad RCE (ejecuci\u00f3n remota de c\u00f3digo), con una puntuaci\u00f3n CVSS de 8,3, permite a un atacante autenticado ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y no requiere interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas especificadas. Consulte las notas de la versi\u00f3n https://confluence.atlassian.com/doc/confluence-release-notes-327.html Puede descargar la \u00faltima versi\u00f3n de Confluence Data Center and Server desde el centro de descargas https://www.atlassian.com /software/confluence/descargar-archivos. Esta vulnerabilidad se encontr\u00f3 internamente."
"value": "Rejected reason: This CVE's publication may have been a false positive or a mistake. As a result, we have rejected this record."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "7.19.0",
"versionEndExcluding": "7.19.22",
"matchCriteriaId": "B3441F45-4865-406E-B65D-00B3D3F62854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.20.0",
"versionEndIncluding": "7.20.3",
"matchCriteriaId": "CA11366E-1323-4E23-BC48-98E5A278ACBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.4",
"matchCriteriaId": "3E04D444-3EB1-4738-B7E2-5B7AE2E5E362"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.1.4",
"matchCriteriaId": "1F0C549F-BE94-4E69-AD21-7472364DCDEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndIncluding": "8.2.3",
"matchCriteriaId": "0850948D-AE6D-4DCA-9BA0-9980E6BFC202"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndIncluding": "8.3.4",
"matchCriteriaId": "63D5B3B0-7F7E-49B6-8C2D-FF4D824A9315"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.5",
"matchCriteriaId": "57BDBED4-B502-444B-8C8C-EDC8CD0717F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndExcluding": "8.5.9",
"matchCriteriaId": "3DA35EFC-343E-4672-B25F-3BF347D1569A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.2",
"matchCriteriaId": "A28B7617-2765-4C27-AC74-8C583ABF1977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A3DA1F-C35D-464A-8E01-B2D8F05F85A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1147BC2D-633D-40BB-8303-53D5FE8CB0FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F13F5EE-7BAE-4F46-ACDD-65155EF457F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3AFB1065-37A0-49ED-BA0A-F2F01797F45A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9CDEDBB-0657-4391-BF76-44E2B8011004"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "7.19.0",
"versionEndExcluding": "7.19.22",
"matchCriteriaId": "3119D0A7-6270-4F16-AA5E-D6B36310BB34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.20.0",
"versionEndIncluding": "7.20.3",
"matchCriteriaId": "72EB6154-9A86-4A14-A341-D357D9FCB0DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.4",
"matchCriteriaId": "ACE3F2DE-01CD-4CBC-B8F5-86ACCA6DC62A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.1.4",
"matchCriteriaId": "8201C848-0F3F-42B3-9430-A628CFC96B1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndIncluding": "8.2.3",
"matchCriteriaId": "4451E75A-00F4-4AC2-BE18-CCB1471B88BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndIncluding": "8.3.4",
"matchCriteriaId": "D5FF2B9F-070E-458F-BD17-20A4ECBEAD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.5",
"matchCriteriaId": "71CE6EAD-724D-49C4-BE5A-C45884C1F237"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndExcluding": "8.5.9",
"matchCriteriaId": "E64FAC9F-2E03-496D-B1FA-01DE40473675"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.2",
"matchCriteriaId": "BA046009-AC63-4DF2-90E0-38873BD4614E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB0C806-A61F-4238-BE92-25FD9B771EFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1245106-DD17-410F-963D-6877C19ED65D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4F9DEA9-BBB4-4205-9557-CAD0184DA3F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7228BE60-B856-4C52-B7A5-014D1768CD33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:confluence_server:8.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3381AD0-F839-4AEC-9D90-EB78F271BD4C"
}
]
}
]
}
],
"references": [
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1387867145",
"source": "security@atlassian.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://jira.atlassian.com/browse/CONFSERVER-95832",
"source": "security@atlassian.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1387867145",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://jira.atlassian.com/browse/CONFSERVER-95832",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://packetstormsecurity.com/files/179507",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21688",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.373",
"lastModified": "2025-01-01T00:15:36.373",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21691",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.447",
"lastModified": "2025-01-01T00:15:36.447",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21692",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.510",
"lastModified": "2025-01-01T00:15:36.510",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21693",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.583",
"lastModified": "2025-01-01T00:15:36.583",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21694",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.647",
"lastModified": "2025-01-01T00:15:36.647",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21695",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.713",
"lastModified": "2025-01-01T00:15:36.713",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21696",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.777",
"lastModified": "2025-01-01T00:15:36.777",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21701",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.843",
"lastModified": "2025-01-01T00:15:36.843",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21702",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.917",
"lastModified": "2025-01-01T00:15:36.917",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21704",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:36.987",
"lastModified": "2025-01-01T00:15:36.987",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21705",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.073",
"lastModified": "2025-01-01T00:15:37.073",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21708",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.137",
"lastModified": "2025-01-01T00:15:37.137",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21709",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.207",
"lastModified": "2025-01-01T00:15:37.207",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21710",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.270",
"lastModified": "2025-01-01T00:15:37.270",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21711",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.330",
"lastModified": "2025-01-01T00:15:37.330",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21712",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.400",
"lastModified": "2025-01-01T00:15:37.400",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21713",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.460",
"lastModified": "2025-01-01T00:15:37.460",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21714",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.527",
"lastModified": "2025-01-01T00:15:37.527",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21715",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.613",
"lastModified": "2025-01-01T00:15:37.613",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21716",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.667",
"lastModified": "2025-01-01T00:15:37.667",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21717",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.733",
"lastModified": "2025-01-01T00:15:37.733",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21718",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.800",
"lastModified": "2025-01-01T00:15:37.800",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21719",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.870",
"lastModified": "2025-01-01T00:15:37.870",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21720",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.927",
"lastModified": "2025-01-01T00:15:37.927",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-21721",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:37.987",
"lastModified": "2025-01-01T00:15:37.987",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23389",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.047",
"lastModified": "2025-01-01T00:15:38.047",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23390",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.103",
"lastModified": "2025-01-01T00:15:38.103",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23391",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.163",
"lastModified": "2025-01-01T00:15:38.163",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23392",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.227",
"lastModified": "2025-01-01T00:15:38.227",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23393",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.290",
"lastModified": "2025-01-01T00:15:38.290",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23394",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.350",
"lastModified": "2025-01-01T00:15:38.350",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23395",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.420",
"lastModified": "2025-01-01T00:15:38.420",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23396",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.490",
"lastModified": "2025-01-01T00:15:38.490",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23397",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.550",
"lastModified": "2025-01-01T00:15:38.550",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23398",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.607",
"lastModified": "2025-01-01T00:15:38.607",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23399",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.680",
"lastModified": "2025-01-01T00:15:38.680",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23400",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.750",
"lastModified": "2025-01-01T00:15:38.750",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23401",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.817",
"lastModified": "2025-01-01T00:15:38.817",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23402",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.883",
"lastModified": "2025-01-01T00:15:38.883",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23403",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:38.947",
"lastModified": "2025-01-01T00:15:38.947",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23404",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.007",
"lastModified": "2025-01-01T00:15:39.007",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23405",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.087",
"lastModified": "2025-01-01T00:15:39.087",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23406",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.160",
"lastModified": "2025-01-01T00:15:39.160",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23407",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.213",
"lastModified": "2025-01-01T00:15:39.213",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23408",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.287",
"lastModified": "2025-01-01T00:15:39.287",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23409",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.353",
"lastModified": "2025-01-01T00:15:39.353",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23410",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.410",
"lastModified": "2025-01-01T00:15:39.410",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23411",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.470",
"lastModified": "2025-01-01T00:15:39.470",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23412",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.533",
"lastModified": "2025-01-01T00:15:39.533",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23413",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.597",
"lastModified": "2025-01-01T00:15:39.597",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23414",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.653",
"lastModified": "2025-01-01T00:15:39.653",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23415",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.720",
"lastModified": "2025-01-01T00:15:39.720",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23416",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.783",
"lastModified": "2025-01-01T00:15:39.783",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23417",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.850",
"lastModified": "2025-01-01T00:15:39.850",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23418",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.910",
"lastModified": "2025-01-01T00:15:39.910",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23419",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:39.970",
"lastModified": "2025-01-01T00:15:39.970",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23420",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.037",
"lastModified": "2025-01-01T00:15:40.037",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23421",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.100",
"lastModified": "2025-01-01T00:15:40.100",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23422",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.163",
"lastModified": "2025-01-01T00:15:40.163",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23423",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.227",
"lastModified": "2025-01-01T00:15:40.227",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23424",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.293",
"lastModified": "2025-01-01T00:15:40.293",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23425",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.350",
"lastModified": "2025-01-01T00:15:40.350",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23426",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.417",
"lastModified": "2025-01-01T00:15:40.417",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23427",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.477",
"lastModified": "2025-01-01T00:15:40.477",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23428",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.543",
"lastModified": "2025-01-01T00:15:40.543",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23429",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.607",
"lastModified": "2025-01-01T00:15:40.607",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23430",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.670",
"lastModified": "2025-01-01T00:15:40.670",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23431",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.727",
"lastModified": "2025-01-01T00:15:40.727",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23432",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.793",
"lastModified": "2025-01-01T00:15:40.793",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23433",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.857",
"lastModified": "2025-01-01T00:15:40.857",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23434",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.917",
"lastModified": "2025-01-01T00:15:40.917",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23435",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:40.990",
"lastModified": "2025-01-01T00:15:40.990",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23436",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:41.060",
"lastModified": "2025-01-01T00:15:41.060",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23437",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:41.123",
"lastModified": "2025-01-01T00:15:41.123",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-23438",
"sourceIdentifier": "security@atlassian.com",
"published": "2025-01-01T00:15:41.193",
"lastModified": "2025-01-01T00:15:41.193",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38183",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-09-17T19:15:25.737",
"lastModified": "2024-09-25T19:59:13.653",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-31T23:15:20.933",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link."
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network."
},
{
"lang": "es",
@ -29,19 +29,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-38202",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-08-08T02:15:38.180",
"lastModified": "2024-10-16T02:15:05.713",
"lastModified": "2024-12-31T23:15:23.697",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. **Note:**Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any further updates regarding mitigations for this vulnerability, this CVE will be updated and customers will be notified. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert if an update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. **Note:**Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202"
"value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any further updates regarding mitigations for this vulnerability, this CVE will be updated and customers will be notified. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert if an update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.\nIf there are any further... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202"
},
{
"lang": "es",
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56020",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-01T00:15:57.060",
"lastModified": "2025-01-01T00:15:57.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mario Di Pasquale SvegliaT Buttons allows Stored XSS.This issue affects SvegliaT Buttons: from n/a through 1.3.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/svegliat-buttons/vulnerability/wordpress-svegliat-buttons-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56021",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-01T00:15:57.210",
"lastModified": "2025-01-01T00:15:57.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ibnuyahya Category Post Shortcode allows Stored XSS.This issue affects Category Post Shortcode: from n/a through 2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/category-post-shortcode/vulnerability/wordpress-category-post-shortcode-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56062",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T23:15:41.237",
"lastModified": "2024-12-31T23:15:41.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Royal Royal Elementor Addons allows Stored XSS.This issue affects Royal Elementor Addons: from n/a through 1.3.987."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-and-templates-plugin-1-3-987-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56063",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T23:15:41.393",
"lastModified": "2024-12-31T23:15:41.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Addons for Elementor allows Stored XSS.This issue affects Essential Addons for Elementor: from n/a through 6.0.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/essential-addons-for-elementor-lite/vulnerability/wordpress-essential-addons-for-elementor-plugin-6-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-56803",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-31T23:15:41.553",
"lastModified": "2024-12-31T23:15:41.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ghostty is a cross-platform terminal emulator. Ghostty, as allowed by default in 1.0.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. This attack requires an attacker to send malicious escape sequences followed by convincing the user to physically press the \"enter\" key. Fixed in Ghostty v1.0.1."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/ghostty-org/ghostty/pull/3908",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ghostty-org/ghostty/security/advisories/GHSA-5hcq-3j4q-4v6p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-31T23:00:20.046391+00:00
2025-01-01T00:55:25.658222+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-31T22:15:07.783000+00:00
2025-01-01T00:15:57.210000+00:00
```
### Last Data Feed Release
@ -33,23 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
275301
275384
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `83`
- [CVE-2024-13081](CVE-2024/CVE-2024-130xx/CVE-2024-13081.json) (`2024-12-31T21:15:07.670`)
- [CVE-2024-13082](CVE-2024/CVE-2024-130xx/CVE-2024-13082.json) (`2024-12-31T21:15:08.730`)
- [CVE-2024-13083](CVE-2024/CVE-2024-130xx/CVE-2024-13083.json) (`2024-12-31T22:15:07.167`)
- [CVE-2024-13084](CVE-2024/CVE-2024-130xx/CVE-2024-13084.json) (`2024-12-31T22:15:07.783`)
- [CVE-2024-23419](CVE-2024/CVE-2024-234xx/CVE-2024-23419.json) (`2025-01-01T00:15:39.970`)
- [CVE-2024-23420](CVE-2024/CVE-2024-234xx/CVE-2024-23420.json) (`2025-01-01T00:15:40.037`)
- [CVE-2024-23421](CVE-2024/CVE-2024-234xx/CVE-2024-23421.json) (`2025-01-01T00:15:40.100`)
- [CVE-2024-23422](CVE-2024/CVE-2024-234xx/CVE-2024-23422.json) (`2025-01-01T00:15:40.163`)
- [CVE-2024-23423](CVE-2024/CVE-2024-234xx/CVE-2024-23423.json) (`2025-01-01T00:15:40.227`)
- [CVE-2024-23424](CVE-2024/CVE-2024-234xx/CVE-2024-23424.json) (`2025-01-01T00:15:40.293`)
- [CVE-2024-23425](CVE-2024/CVE-2024-234xx/CVE-2024-23425.json) (`2025-01-01T00:15:40.350`)
- [CVE-2024-23426](CVE-2024/CVE-2024-234xx/CVE-2024-23426.json) (`2025-01-01T00:15:40.417`)
- [CVE-2024-23427](CVE-2024/CVE-2024-234xx/CVE-2024-23427.json) (`2025-01-01T00:15:40.477`)
- [CVE-2024-23428](CVE-2024/CVE-2024-234xx/CVE-2024-23428.json) (`2025-01-01T00:15:40.543`)
- [CVE-2024-23429](CVE-2024/CVE-2024-234xx/CVE-2024-23429.json) (`2025-01-01T00:15:40.607`)
- [CVE-2024-23430](CVE-2024/CVE-2024-234xx/CVE-2024-23430.json) (`2025-01-01T00:15:40.670`)
- [CVE-2024-23431](CVE-2024/CVE-2024-234xx/CVE-2024-23431.json) (`2025-01-01T00:15:40.727`)
- [CVE-2024-23432](CVE-2024/CVE-2024-234xx/CVE-2024-23432.json) (`2025-01-01T00:15:40.793`)
- [CVE-2024-23433](CVE-2024/CVE-2024-234xx/CVE-2024-23433.json) (`2025-01-01T00:15:40.857`)
- [CVE-2024-23434](CVE-2024/CVE-2024-234xx/CVE-2024-23434.json) (`2025-01-01T00:15:40.917`)
- [CVE-2024-23435](CVE-2024/CVE-2024-234xx/CVE-2024-23435.json) (`2025-01-01T00:15:40.990`)
- [CVE-2024-23436](CVE-2024/CVE-2024-234xx/CVE-2024-23436.json) (`2025-01-01T00:15:41.060`)
- [CVE-2024-23437](CVE-2024/CVE-2024-234xx/CVE-2024-23437.json) (`2025-01-01T00:15:41.123`)
- [CVE-2024-23438](CVE-2024/CVE-2024-234xx/CVE-2024-23438.json) (`2025-01-01T00:15:41.193`)
- [CVE-2024-56020](CVE-2024/CVE-2024-560xx/CVE-2024-56020.json) (`2025-01-01T00:15:57.060`)
- [CVE-2024-56021](CVE-2024/CVE-2024-560xx/CVE-2024-56021.json) (`2025-01-01T00:15:57.210`)
- [CVE-2024-56062](CVE-2024/CVE-2024-560xx/CVE-2024-56062.json) (`2024-12-31T23:15:41.237`)
- [CVE-2024-56063](CVE-2024/CVE-2024-560xx/CVE-2024-56063.json) (`2024-12-31T23:15:41.393`)
- [CVE-2024-56803](CVE-2024/CVE-2024-568xx/CVE-2024-56803.json) (`2024-12-31T23:15:41.553`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `3`
- [CVE-2024-21683](CVE-2024/CVE-2024-216xx/CVE-2024-21683.json) (`2025-01-01T00:15:07.317`)
- [CVE-2024-38183](CVE-2024/CVE-2024-381xx/CVE-2024-38183.json) (`2024-12-31T23:15:20.933`)
- [CVE-2024-38202](CVE-2024/CVE-2024-382xx/CVE-2024-38202.json) (`2024-12-31T23:15:23.697`)
## Download and Usage

View File

@ -245320,10 +245320,11 @@ CVE-2024-13078,0,0,9e028faec5365401f0cf9572afcae1b9e304d87dc89cd7ae1fcfa6308a238
CVE-2024-13079,0,0,acf30d8920277f2af488bd54bc3752ac651419dda31c1f7b38d1ebf5d869b523,2024-12-31T20:15:27.937000
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
CVE-2024-13080,0,0,0509f1f522b9304178178b5ff53d51a2e0295a82c91bc35e1cf9e87ffe20c47a,2024-12-31T20:15:28.157000
CVE-2024-13081,1,1,ceca02acef2bbcbe3ed625923129b3882453a2ef359d25ef033989a46d74b94d,2024-12-31T21:15:07.670000
CVE-2024-13082,1,1,935bc4b8b5713642f988a7a3b1f24d34b18d112774ae29252c55fd303ca821d8,2024-12-31T21:15:08.730000
CVE-2024-13083,1,1,1a047accd8c6bf62a0e13b2217d254aaf7132e2a90bd9a91eb1e045a017329d8,2024-12-31T22:15:07.167000
CVE-2024-13084,1,1,e559e62a7f68da441035efccf01422348f99fa312e9708064911a59d65bf1249,2024-12-31T22:15:07.783000
CVE-2024-13081,0,0,ceca02acef2bbcbe3ed625923129b3882453a2ef359d25ef033989a46d74b94d,2024-12-31T21:15:07.670000
CVE-2024-13082,0,0,935bc4b8b5713642f988a7a3b1f24d34b18d112774ae29252c55fd303ca821d8,2024-12-31T21:15:08.730000
CVE-2024-13083,0,0,1a047accd8c6bf62a0e13b2217d254aaf7132e2a90bd9a91eb1e045a017329d8,2024-12-31T22:15:07.167000
CVE-2024-13084,0,0,e559e62a7f68da441035efccf01422348f99fa312e9708064911a59d65bf1249,2024-12-31T22:15:07.783000
CVE-2024-13085,1,1,b371abc8e4b783221836f4d3bb4132d91bacc513d5b9c3566d195e8a4416bf80,2024-12-31T23:15:07.440000
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000
CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb1764821,2024-11-21T08:50:17.897000
@ -247469,24 +247470,51 @@ CVE-2024-21671,0,0,bab9c5847716f4525e60877ea2fb01ab4946a07602b86b8f570933fd03838
CVE-2024-21672,0,0,51a06dda9515277bb731cecfefa5dee0c892c9fbbbf5458d3df601c20fce3fe6,2024-11-21T08:54:50.480000
CVE-2024-21673,0,0,5386f3f2c2fa5608e4337b427600a7f7550c9a783b6835c57637521e3c38e3ae,2024-11-21T08:54:50.613000
CVE-2024-21674,0,0,f39a3f923353961478c76c0c23bc6ddef3aca571421fbf8b0854074283374e7d,2024-11-21T08:54:50.740000
CVE-2024-21675,1,1,6538c81fd77ee7ef3434b476843ec466c1e70ac0dd0540cdae914ba927668538,2025-01-01T00:15:07.193000
CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc610b,2024-04-18T17:15:48.620000
CVE-2024-21677,0,0,eba5049340c0ab4142bcbe491686ce4ed70569bafeab697ee4759197e78b6fc4,2024-11-21T08:54:50.897000
CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000
CVE-2024-21679,1,1,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000
CVE-2024-2168,0,0,c02254fd453fd438a6064b8fb092c5540a1ebcef3a158b83520fcf4262210538,2024-11-21T09:09:10.260000
CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000
CVE-2024-21683,0,0,481d4972dab0e0c5c1ffeba8492c07e76169e69a6bea3184aa46855e3c55b9ee,2024-11-21T08:54:51.293000
CVE-2024-21683,0,1,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
CVE-2024-21685,0,0,468e5359f34e3d02010595cd81cb836ca13ba9284b6d0dfad4c9b0f50c1369c0,2024-11-21T08:54:51.630000
CVE-2024-21686,0,0,41d6e7e724426cd3bc1c6c19cd94c24a97ca79c91c452675ab61f17f3945a581,2024-11-21T08:54:51.750000
CVE-2024-21687,0,0,17598b7556472ad0a7cb6bb3720bbbc218bae6b01e497b2f4b50268975b74616,2024-11-21T08:54:51.880000
CVE-2024-21688,1,1,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000
CVE-2024-21689,0,0,1ade07fe1c3e21e598fba3f258fad5dc343a968dd476652377c79c984e954246,2024-08-20T15:44:20.567000
CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000
CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000
CVE-2024-21691,1,1,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000
CVE-2024-21692,1,1,945a72c84016455a798f697f3e1e53ff2f6e3ddf62252f0504a4b3cde4e76f5a,2025-01-01T00:15:36.510000
CVE-2024-21693,1,1,43e66eac8661ee0b7c627ad39e20ed045ab08d5570e01832b1c201cc4eb1742e,2025-01-01T00:15:36.583000
CVE-2024-21694,1,1,b0013f6ef6f097d442a069b9d4508547a1a28c6401d748b357b2239478333564,2025-01-01T00:15:36.647000
CVE-2024-21695,1,1,680012792329aa4b9cccfbff59cbebe926613fc882e471ece7f2a7d32612816c,2025-01-01T00:15:36.713000
CVE-2024-21696,1,1,1ef0bd30ef6be0da10201c9293e00d4c5c81817fba128f3ffd2aa9776f13a860,2025-01-01T00:15:36.777000
CVE-2024-21697,0,0,c3c13b97cbef88a930d65e1f398ee9d8dde15dc5b9d6d334499f7c5241994b10,2024-11-19T21:56:45.533000
CVE-2024-2170,0,0,7b2aafcaa24cbfeb2ca17a2993a6292253730d9a203d8e5a53eb820fd90585ef,2024-11-21T09:09:10.590000
CVE-2024-21701,1,1,bd6f205454b187d1105b8d28faf67a2bb6004d9d8801ed4174eb2b818dcf1b19,2025-01-01T00:15:36.843000
CVE-2024-21702,1,1,a385b193ee208515857968679e6609169f813392b55c6e333b40093c3cdc7a00,2025-01-01T00:15:36.917000
CVE-2024-21703,0,0,ce13cd634e34b80b7061abb30075f90cbbd239379b70c586223f3ec116cfea3f,2024-11-27T18:15:08.720000
CVE-2024-21704,1,1,33b24f564031373cf7bf470943ac5fdaef982a95c5dd669934c18d35e8316ce9,2025-01-01T00:15:36.987000
CVE-2024-21705,1,1,05d076abbca27b416a236e3c02c7a1931d089f66b987571bec1cdc91ad1dcc31,2025-01-01T00:15:37.073000
CVE-2024-21708,1,1,5dcf5ce49b70aa2cd7ed34ac0a1ada1e38a5cf4fd2025ace66a46d2c8c3156f0,2025-01-01T00:15:37.137000
CVE-2024-21709,1,1,3deeebd0d80bdf75aa56ddffbc3d31b4f0b9cfd4befeb77b72e8cf430b7a18ae,2025-01-01T00:15:37.207000
CVE-2024-2171,0,0,78441c6894508e0fa50e59e69dc3dc63fdf9d032ccdeb3883a60ea1bb89a37eb,2024-11-21T09:09:10.717000
CVE-2024-21710,1,1,5ed55ca499be71535e5f19b1420f4600e86d67a4a87bd749d0376a65647d66bd,2025-01-01T00:15:37.270000
CVE-2024-21711,1,1,5fafdd59dcc4510c6476cff2e0f75cfa6797ca62efc953429eba874c46cbb25d,2025-01-01T00:15:37.330000
CVE-2024-21712,1,1,8ac93509c5813df5e431bd29194879c9d159442e6f8735db1e652e3424955095,2025-01-01T00:15:37.400000
CVE-2024-21713,1,1,580b74e6a0f891c330723b5cf5fc0459a363e74a769575e8e120f0f3e4f87eb6,2025-01-01T00:15:37.460000
CVE-2024-21714,1,1,0bca6dce808e1b064e4da632da1e96cf99d9576c87022dd311e71650d0578305,2025-01-01T00:15:37.527000
CVE-2024-21715,1,1,893e999835dfca2060f358c73d0a07fb89d5d78d70bb3de8680ae64a70f269d8,2025-01-01T00:15:37.613000
CVE-2024-21716,1,1,18566df615f4cf6473f84f8dd2e835f7ae399f6f57540967d70564f0cc4ecd52,2025-01-01T00:15:37.667000
CVE-2024-21717,1,1,c1597ecc8d5e89d566fe90cc7ae57e93db7d0856680c906c98ea377d5acc2539,2025-01-01T00:15:37.733000
CVE-2024-21718,1,1,83b6552aa5b1b2138f4440fffd60c1a146364ce6de2c18c6d0b5236c88ecc525,2025-01-01T00:15:37.800000
CVE-2024-21719,1,1,9c44e12e1d76733d3feed8e181f5b47ac15ebb214263488ee83326a519e428e1,2025-01-01T00:15:37.870000
CVE-2024-2172,0,0,78f159870a3b1f4b7457cf7bb76f1b6382fde68fdd2a41bb4435297ebe3c18e0,2024-11-21T09:09:10.853000
CVE-2024-21720,1,1,fb67e72ba582adcc0c5e5d3a9e98cab75db5f6134d2b15bd6a10b63688338923,2025-01-01T00:15:37.927000
CVE-2024-21721,1,1,6410e381c95c472dc089a2773dc0abc68f1f222dbf9d3db9afe0135917afba85,2025-01-01T00:15:37.987000
CVE-2024-21722,0,0,5f530469128a41bfa0dd5b7a458e5346dd38dd76f502f71a2747a4c0d39652bb,2024-11-21T08:54:52.290000
CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
CVE-2024-21724,0,0,71ab50eedb3eaae0cf010b41547c1ab496cb8a61984051a476dd3c8a05ae25c7,2024-11-21T08:54:52.573000
@ -248678,11 +248706,61 @@ CVE-2024-23385,0,0,33e783b9a0ba6654217dba1cda0c01b3221783ad9759ab571e305b032f234
CVE-2024-23386,0,0,a7685861d3b56f97f0034695e8270bc3c8543ef05deaff79f9997b472988abe7,2024-11-07T19:54:23.047000
CVE-2024-23387,0,0,1b53231df06e7a2d9934d39ab746c9b238609b530843b990a50d92f2690c35d9,2024-11-21T08:57:42.283000
CVE-2024-23388,0,0,1337a0df1f3253f3e8955607179c908109edef648b6bcdbe60ad3ab856f5e39b,2024-11-21T08:57:42.427000
CVE-2024-23389,1,1,1d11e622c776e9a9a50ca0ae0018ba529c3fbce33040947ad969922ea6b2982c,2025-01-01T00:15:38.047000
CVE-2024-2339,0,0,33602ccd8fd6e5bda5b99ca9b5d587372d0a208dfbb701184c2fa5266a00522d,2024-11-21T09:09:32.830000
CVE-2024-23390,1,1,db7b254e783f1a147fc80864fc99a15ca5acacf835209b6aaca8df2c453ce819,2025-01-01T00:15:38.103000
CVE-2024-23391,1,1,d233b84b01e1aed370cebf4f94e7d7c7bd9fc32c12aa7bd1bb5ee4154c23fae6,2025-01-01T00:15:38.163000
CVE-2024-23392,1,1,feba15e5d554b5934fc8ee6e31d652ff25fcc1f2cb877bf245257f721d2e11d7,2025-01-01T00:15:38.227000
CVE-2024-23393,1,1,3637b0b4ab63587c4c39270a1993b936bcea35ed700326c8fdbece1b1bc46070,2025-01-01T00:15:38.290000
CVE-2024-23394,1,1,fb4bfb058eb3f081d3908f250a172122ff1f3e20476bb61e91d6c2a31bfd20a2,2025-01-01T00:15:38.350000
CVE-2024-23395,1,1,f07003671df6ef78b3ed1d3bc54984d929e748574eaed82234c228c4c05b15a7,2025-01-01T00:15:38.420000
CVE-2024-23396,1,1,3046ceaa908b73ab3dd595a52812030977739472b3a7f09aa9cadd5541ac43b6,2025-01-01T00:15:38.490000
CVE-2024-23397,1,1,2eb6252aeb61730c91465d754058b0008522b815ef66ad269db9e54267928aab,2025-01-01T00:15:38.550000
CVE-2024-23398,1,1,e88f9120927e9476413a926fb0b918880c7a2e031519af4bc9d0d9ceed8976f4,2025-01-01T00:15:38.607000
CVE-2024-23399,1,1,c5d39a21b30070b8372e260c55ce2bfb8562f41128ebd4c9761d8d6a1c092e11,2025-01-01T00:15:38.680000
CVE-2024-2340,0,0,c5b40e0d2f54f8d895ab78d87ae8ef170b0cb883382e17c6998adcc28c738df7,2024-11-21T09:09:32.950000
CVE-2024-23400,1,1,c1c7fa9b24fc72031a84aaf751be0aa1d9207bcf72c8a5c077cb22cda9fc6a14,2025-01-01T00:15:38.750000
CVE-2024-23401,1,1,cf1e976858104bf7b85d5a96467fa5fdef66034253393db849eb3f4d24501cf2,2025-01-01T00:15:38.817000
CVE-2024-23402,1,1,8a47257cf8cf9bbe4ed1fcfa3fa826a35a1d95d9519082619e4e0d6a9abd64b2,2025-01-01T00:15:38.883000
CVE-2024-23403,1,1,d8835bf2fe96fa1a233bac68ccdd3b86048322f118b7400cf4daf5f21a3fad6a,2025-01-01T00:15:38.947000
CVE-2024-23404,1,1,110ed6f031eb96cdf27acf98ccde258bc769cd57bb61632cc652c143fc5ac570,2025-01-01T00:15:39.007000
CVE-2024-23405,1,1,6e2c37806aa98b079db7a7e21b26522f962152e884e654b214e1fcf91289305a,2025-01-01T00:15:39.087000
CVE-2024-23406,1,1,6632d70cf63187e2d5db68b8be533d52d2a71c1a6a8bf883615c716b65dee480,2025-01-01T00:15:39.160000
CVE-2024-23407,1,1,e54b27f95f95e8b8a99f18855702286c4e1a12b5b3c3ddb6618856497b7f8530,2025-01-01T00:15:39.213000
CVE-2024-23408,1,1,8869056e91b99bceac4adb484bb24bc8dd9c9f436cc5088f317d8b038f75f01a,2025-01-01T00:15:39.287000
CVE-2024-23409,1,1,cc1cb3dfe5bb70f718153978ad3925f2626ffa6968c32e5d9d9a40bd7f076780,2025-01-01T00:15:39.353000
CVE-2024-2341,0,0,27a8f5765cebc5ea370b34d6397b8dd45fa3b6ccad0be41b03ef456e1274f9f1,2024-11-21T09:09:33.090000
CVE-2024-23410,1,1,5045f508c9d245b3fd8d60012e1a58df0137c84c6e169586f2239396bed0a1ec,2025-01-01T00:15:39.410000
CVE-2024-23411,1,1,888f4db91a9816eb333443152b669ba8a17e49794eb6f6d5965f7ecd74a461d0,2025-01-01T00:15:39.470000
CVE-2024-23412,1,1,550760e96400b77f6a315acb5c566be08f9642548ff6d18e15331565b7095268,2025-01-01T00:15:39.533000
CVE-2024-23413,1,1,ed62e897ac260ecb800df1513bac064afab2e9492453ae27e4fd9a9b0d93a35e,2025-01-01T00:15:39.597000
CVE-2024-23414,1,1,3b892e647283ed611c8e1a8b968fa60a5d23ac57014ea693cfa9ab06a3dd8f6f,2025-01-01T00:15:39.653000
CVE-2024-23415,1,1,7c695d6ebd7e3f522c34f36d57ccd6636f80232a17e5aac7dc9d1bb05f46b61c,2025-01-01T00:15:39.720000
CVE-2024-23416,1,1,c26b1d059b352cfba2580ba9de4f2d9a7e2afa996413289605a061816c11e836,2025-01-01T00:15:39.783000
CVE-2024-23417,1,1,36a492d9bd4eb7bdaa571a950db8097ba7140fbbd8786f7d94eb400d6f61698f,2025-01-01T00:15:39.850000
CVE-2024-23418,1,1,b9a0039ce552f8561e56e92c3c42626636761c919712584962a0d55673bea1d2,2025-01-01T00:15:39.910000
CVE-2024-23419,1,1,6b5f4a05a471454df189ec43a000b6c92041cdac5504094ad6bd23f4be53e903,2025-01-01T00:15:39.970000
CVE-2024-2342,0,0,2686d0d764b1cef6f46e8b8e7c1dd7ada4af34ce4c3fa49f721c6ef7016f045f,2024-11-21T09:09:33.223000
CVE-2024-23420,1,1,69afeb8db87b287a36d94b45bf19289154879c0b6414d14de6a7bb4afcc332b8,2025-01-01T00:15:40.037000
CVE-2024-23421,1,1,f6d475246274171fe2909ecd3714348684ae173bc256a02c767ef1fe49b09f4f,2025-01-01T00:15:40.100000
CVE-2024-23422,1,1,a6c4af7b91dae3c549126d461b022109b184bfd297970d0c36c6382149f2e3c0,2025-01-01T00:15:40.163000
CVE-2024-23423,1,1,399c8792e372c4e5a07810a439cf314c65b4b0e7722e4e56dc24c73cf383d81c,2025-01-01T00:15:40.227000
CVE-2024-23424,1,1,a67c40ed3d7205dca9ee99309d736d6bbfd0807a118834f7e1ff74e1ee3fb1c2,2025-01-01T00:15:40.293000
CVE-2024-23425,1,1,56898569659283c584f60a6e1ba5799267c9e8051a0bc94f0dcda30933f2f075,2025-01-01T00:15:40.350000
CVE-2024-23426,1,1,d362a9499347a86c4013fac201077c7ee926840fd2665d5bd58a1b143e7c736c,2025-01-01T00:15:40.417000
CVE-2024-23427,1,1,bf9b1ce4e8b60e120c9e8e79d50f5779ff56e34b8f6868aa7ac1516304982bf6,2025-01-01T00:15:40.477000
CVE-2024-23428,1,1,1e9ea1eb7ad430366e0f2732ebcc64571734d8c263746bcfd871d9b25c72630d,2025-01-01T00:15:40.543000
CVE-2024-23429,1,1,e8e828161cd5e2b7ef2fd65d37b548c14b34c00fffe254c543f5ebc5a00c341c,2025-01-01T00:15:40.607000
CVE-2024-2343,0,0,ff9964481c43aa0f18599732f44e073db21b70998c79c5208b453b3e6a942b69,2024-11-21T09:09:33.350000
CVE-2024-23430,1,1,b245320d91535cd01f34459b21c02446d04b827eaf02e28147a3b5a9e4f699c7,2025-01-01T00:15:40.670000
CVE-2024-23431,1,1,d346c1ded25732c69b97411ec7e1a91f0fc1b1aacd8003918d973866cdc97754,2025-01-01T00:15:40.727000
CVE-2024-23432,1,1,4b0a62a7fc9b3de8555667118dad22468af386a34ff7b0bb5a5bd51c103c206e,2025-01-01T00:15:40.793000
CVE-2024-23433,1,1,53bd37151db2e695764913f4c7a06167094f5aaced2bfe999b397e23d289f02f,2025-01-01T00:15:40.857000
CVE-2024-23434,1,1,a8eebeab430b0299cd849809826b1eabf63c62b64d6621b30013dec2287722be,2025-01-01T00:15:40.917000
CVE-2024-23435,1,1,afcaa5560c73fd09e2a01b71929f974d6128f9942ef979b74e171b34bc32f2e2,2025-01-01T00:15:40.990000
CVE-2024-23436,1,1,9d9890cc0e8eeed8d7dd79c449db082fdc01a1f3d4ea5ad8de13ee326f8db5fe,2025-01-01T00:15:41.060000
CVE-2024-23437,1,1,ee59c2e2cfc2b4d6eacc2bf7304883418405daaab31f4e25a07db9ec41632f27,2025-01-01T00:15:41.123000
CVE-2024-23438,1,1,50f99bb945243dd3c3cd80675c0b4365c294d8ebe7ea659e8646fea5bb3cf596,2025-01-01T00:15:41.193000
CVE-2024-23439,0,0,12968241395f8c73c9a4599762d2ea068ebcf9c238e4c0c3dc52111a494628b8,2024-11-21T08:57:42.570000
CVE-2024-2344,0,0,191d4ce8901aaea2affe1de5155f92284a44b0b797f92fd23b5def93ffb6dfd0,2024-11-21T09:09:33.480000
CVE-2024-23440,0,0,c1247ebedbe63be2da6e8eb2d9998e0c3b32e6d26a94360aa7e651f4c01afead,2024-11-21T08:57:42.717000
@ -259763,7 +259841,7 @@ CVE-2024-38179,0,0,2c5a894d01e51edb16258b3bed8449de0a4d319183d8d4f8067eaf441dbf7
CVE-2024-3818,0,0,7d1d39e82ad91d5622119f4ea866721b9898edf8d4385d793aef1e9795c74157,2024-11-21T09:30:27.840000
CVE-2024-38180,0,0,b07cf7c37e4cc39f3a323c4f8c6f585f439885bc86c6f986eeb8ebe4b7d133c5,2024-08-16T19:20:22.853000
CVE-2024-38182,0,0,63c4376a4109b242c6dd9e322aed342594af0df2094c12cf7ce68947c8a5f7cb,2024-08-13T23:15:19.657000
CVE-2024-38183,0,0,d260bb2026a1ffbbe44bd45763ef4d3ca376531eb99c2ab263b99bb975dd7ba6,2024-09-25T19:59:13.653000
CVE-2024-38183,0,1,4fc4c4d894ca7a1786bcb11ba2aa9fdf5a300bd2ad84fc8d48e71857af9b39cf,2024-12-31T23:15:20.933000
CVE-2024-38184,0,0,e536d97ad4fb34bc2f2c9893340299904dd26f224a76d18284f4334452dcf9ba,2024-11-21T09:25:01.623000
CVE-2024-38185,0,0,633d0f3cf1e69ec4e82c422af13d8397043b63fdec59052b2af0c465af26da74,2024-11-21T09:25:01.777000
CVE-2024-38186,0,0,c5f1ff057c9edc15d8e50473ef0bbcf2f5c96bc86872c5239aae142d97fe1959,2024-11-21T09:25:01.937000
@ -259783,7 +259861,7 @@ CVE-2024-38199,0,0,0dd948c0d630ffd11ef973d3897c89b05d0c484012d417092380257ce902c
CVE-2024-3820,0,0,ebb43d41dfb444865db3723891fb2477fb81707e0b52fb92a88385d51705deb7,2024-11-21T09:30:28.087000
CVE-2024-38200,0,0,839a37329b9dc5b6fea2142ae18a060a3d261c6bbc97a2e041619e8b3f1ab4e1,2024-08-13T18:15:29.720000
CVE-2024-38201,0,0,676fe655a4353a209bb0546add80c4c8c162df689ed132825ef07e4dd81037ee,2024-08-15T20:30:00.737000
CVE-2024-38202,0,0,ae34d1c0f19f4bc603f27b2a26463f4154c23a556873d11566827dce2f9181d4,2024-10-16T02:15:05.713000
CVE-2024-38202,0,1,195eb65287559210a264039da59817ffe0c72f680d46dd282a02c3e1dbfbdd08,2024-12-31T23:15:23.697000
CVE-2024-38203,0,0,0eafcc1d547222e148bdef6371b2193d5291aa20762ad6a5cc37713079b5943c,2024-11-18T18:23:07.743000
CVE-2024-38204,0,0,96b18af43450c040d093b118115c7f80a048506b0d9e16a1107f93e550d18d32,2024-11-08T15:34:14.467000
CVE-2024-38206,0,0,426aa1b7abf1f00203c4465aa29dea4cd44aa51806f280b7e455c8f749953a5f,2024-08-14T00:15:08.213000
@ -271204,6 +271282,8 @@ CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c2
CVE-2024-56016,0,0,72352c145c24e5c7235f05940e5baa008585f6941c1f5a0f55cd9079c6cdfebe,2024-12-18T12:15:11.940000
CVE-2024-56017,0,0,712e189d98a2fef52195f7721a474e0e74c8371658ef85b000d5f3fb7476b956,2024-12-16T23:15:06.923000
CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000
CVE-2024-56020,1,1,476ea910e4a1da46b4225d74e2a20edb782c1228a8025cc0b5070e72f7bd5a1c,2025-01-01T00:15:57.060000
CVE-2024-56021,1,1,99781f5083f6468e16fe61404ce769cc146b4eb18990086f06e7d237942f8b02,2025-01-01T00:15:57.210000
CVE-2024-56031,0,0,164d110e676e1c7a453ddbd792f4656e271b4b29a8622a61c1824848da1a39d7,2024-12-31T13:15:07.343000
CVE-2024-56039,0,0,b478b593c841086df3059cb687969d54e2e0fc84360d19ab1d6fab2484be0468,2024-12-31T13:15:07.517000
CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000
@ -271229,6 +271309,8 @@ CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116
CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000
CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000
CVE-2024-56061,0,0,a927c092dd0f95397e0b307c4e1af3e8d5bb91f2a179bdfbffe24b5ff58f5233,2024-12-31T14:15:24.970000
CVE-2024-56062,1,1,a68267c3d9f7064bb59fb4f28588d4e43254c3a9900c31578ce50b1e9a343671,2024-12-31T23:15:41.237000
CVE-2024-56063,1,1,dbf4087854748dcb677e5e6affa02148aa5f27de6a2f943cb60c909e35a2a408,2024-12-31T23:15:41.393000
CVE-2024-56064,0,0,c92953f604dbab61878ff679cbb2e798705688f7ee2ce65f0fa32fe474bb539d,2024-12-31T13:15:08.157000
CVE-2024-56066,0,0,01aedb23e256a17287f4e2685f8a139aa0bf4d7c2cd9e70526b093041a5fc74c,2024-12-31T14:15:25.117000
CVE-2024-56067,0,0,5767ad166f2dc6b99e9b5333bee9e51f87f01f4372cdb6bfa1bf5c9bbf869a41,2024-12-31T13:15:08.323000
@ -271640,6 +271722,7 @@ CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceff
CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
CVE-2024-56802,0,0,da728ab84e76725e7f1ed6578c989f7ec589be40d92bd30231bd6257f075c533,2024-12-31T16:15:28.240000
CVE-2024-56803,1,1,eee3eebec301dd05474bd51393e9516d724e6fb38a0b710fc7c30e1617a14fb2,2024-12-31T23:15:41.553000
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000

Can't render this file because it is too large.