Auto-Update: 2025-01-08T05:00:27.615062+00:00

This commit is contained in:
cad-safe-bot 2025-01-08 05:03:51 +00:00
parent 3bbe40b652
commit 6f4391dc48
35 changed files with 1993 additions and 25 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-52953",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:07.990",
"lastModified": "2025-01-08T03:15:07.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability in the Medialibrary module\nImpact: Successful exploitation of this vulnerability will affect integrity and confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-52954",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.130",
"lastModified": "2025-01-08T03:15:08.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper permission control in the Gallery module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-701"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-52955",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.263",
"lastModified": "2025-01-08T03:15:08.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper authentication in the ANS system service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11816",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T04:15:06.380",
"lastModified": "2025-01-08T04:15:06.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Remote Code Execution in version 3.0.11. This is due to a missing capability check on the 'wpext_handle_snippet_update' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute code on the server providing an admin has created at least one code snippet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wpextended/trunk/includes/modules/core_extensions/wpext_snippets/wpext_snippets.php#L705",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3213331%40wpextended&new=3213331%40wpextended&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3ce53e5-8666-4227-83d3-58f35db0ce68?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11916",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T04:15:06.537",
"lastModified": "2025-01-08T04:15:06.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to import and activate arbitrary code snippets along with"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3213331%40wpextended&new=3213331%40wpextended&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/747d7649-bdf5-46d0-a496-59cb7eac77ac?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12112",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T04:15:06.683",
"lastModified": "2025-01-08T04:15:06.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy Form Builder \u2013 WordPress plugin form builder: contact form, survey form, payment form, and custom form builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter of the 'add_form_Emsfb' AJAX action in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping and missing authorization checks. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3215764/easy-form-builder/trunk/includes/admin/class-Emsfb-create.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a71e72dd-574c-41fc-a000-7a4cf658f3d7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12521",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T04:15:06.827",
"lastModified": "2025-01-08T04:15:06.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Slotti Ajanvaraus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slotti-embed-ga' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3218204%40slotti-ajanvaraus&new=3218204%40slotti-ajanvaraus&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d95ec4b-0cbc-49c6-821e-7050d8045159?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12713",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T04:15:06.967",
"lastModified": "2025-01-08T04:15:06.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SureForms \u2013 Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.2 via the handle_export_form() function due to a missing capability check. This makes it possible for unauthenticated attackers to export data from password protected, private, or draft posts that they should not have access to."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3215338/sureforms/tags/1.2.3/inc/export.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/412d5fa7-08fc-402a-bcac-b2dff87de861?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47239",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-01-08T03:15:08.413",
"lastModified": "2025-01-08T03:15:08.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.0 contain an uncontrolled resource consumption vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000269590/dsa-2024-480-security-update-for-dell-powerscale-onefs-security-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-47934",
"sourceIdentifier": "3ad20294-822c-4ebc-9301-f9a7cf62d46e",
"published": "2025-01-08T03:15:08.550",
"lastModified": "2025-01-08T03:15:08.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the management service.\nThis issue affects Portable Inspector: through 1.0.0; Portable Inspector Pro Edition: through 1.0.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "3ad20294-822c-4ebc-9301-f9a7cf62d46e",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "3ad20294-822c-4ebc-9301-f9a7cf62d46e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "3ad20294-822c-4ebc-9301-f9a7cf62d46e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.txone.com/psirt/advisories/cve-2024-47934/",
"source": "3ad20294-822c-4ebc-9301-f9a7cf62d46e"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54120",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.707",
"lastModified": "2025-01-08T03:15:08.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition vulnerability in the distributed notification module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54121",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.120",
"lastModified": "2025-01-08T04:15:07.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Startup control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56437",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.840",
"lastModified": "2025-01-08T03:15:08.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of input parameters not being verified in the widget framework module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56438",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.970",
"lastModified": "2025-01-08T03:15:08.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper memory address protection in the HUKS module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-840"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56439",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.113",
"lastModified": "2025-01-08T03:15:09.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access control vulnerability in the identity authentication module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56440",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.240",
"lastModified": "2025-01-08T03:15:09.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permission control vulnerability in the Connectivity module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56441",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.373",
"lastModified": "2025-01-08T03:15:09.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition vulnerability in the Bastet module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56442",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.510",
"lastModified": "2025-01-08T03:15:09.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of native APIs not being implemented in the NFC service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-227"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56443",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.640",
"lastModified": "2025-01-08T03:15:09.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56444",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.790",
"lastModified": "2025-01-08T03:15:09.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56445",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:09.920",
"lastModified": "2025-01-08T03:15:09.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Instruction authentication bypass vulnerability in the Findnetwork module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56446",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:10.063",
"lastModified": "2025-01-08T03:15:10.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of variables not being initialized in the notification module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56447",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:10.190",
"lastModified": "2025-01-08T03:15:10.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper permission control in the window management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56448",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.257",
"lastModified": "2025-01-08T04:15:07.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper access control in the home screen widget module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56449",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.390",
"lastModified": "2025-01-08T04:15:07.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation vulnerability in the Account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-840"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56450",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.520",
"lastModified": "2025-01-08T04:15:07.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in the component driver module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56451",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.653",
"lastModified": "2025-01-08T04:15:07.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow vulnerability during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-680"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56452",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.780",
"lastModified": "2025-01-08T04:15:07.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56453",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:07.907",
"lastModified": "2025-01-08T04:15:07.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56454",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:08.040",
"lastModified": "2025-01-08T04:15:08.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56455",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:08.160",
"lastModified": "2025-01-08T04:15:08.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56456",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T04:15:08.280",
"lastModified": "2025-01-08T04:15:08.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-21603",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-01-08T04:15:08.407",
"lastModified": "2025-01-08T04:15:08.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in MZK-DP300N firmware versions 1.05 and earlier. If an attacker logs in to the affected product and manipulates the device settings, an arbitrary script may be executed on the logged-in user's web browser when accessing a crafted URL."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN57428125/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.planex.co.jp/support/download/mzk-dp300n/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-08T03:00:20.856595+00:00
2025-01-08T05:00:27.615062+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-08T02:15:25.603000+00:00
2025-01-08T04:15:08.407000+00:00
```
### Last Data Feed Release
@ -33,29 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
276216
276249
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `33`
- [CVE-2024-40679](CVE-2024/CVE-2024-406xx/CVE-2024-40679.json) (`2025-01-08T01:15:06.953`)
- [CVE-2024-50603](CVE-2024/CVE-2024-506xx/CVE-2024-50603.json) (`2025-01-08T01:15:07.127`)
- [CVE-2024-55355](CVE-2024/CVE-2024-553xx/CVE-2024-55355.json) (`2025-01-08T01:15:07.297`)
- [CVE-2024-55356](CVE-2024/CVE-2024-553xx/CVE-2024-55356.json) (`2025-01-08T01:15:07.370`)
- [CVE-2024-56434](CVE-2024/CVE-2024-564xx/CVE-2024-56434.json) (`2025-01-08T02:15:25.330`)
- [CVE-2024-56435](CVE-2024/CVE-2024-564xx/CVE-2024-56435.json) (`2025-01-08T02:15:25.487`)
- [CVE-2024-56436](CVE-2024/CVE-2024-564xx/CVE-2024-56436.json) (`2025-01-08T02:15:25.603`)
- [CVE-2024-47239](CVE-2024/CVE-2024-472xx/CVE-2024-47239.json) (`2025-01-08T03:15:08.413`)
- [CVE-2024-47934](CVE-2024/CVE-2024-479xx/CVE-2024-47934.json) (`2025-01-08T03:15:08.550`)
- [CVE-2024-54120](CVE-2024/CVE-2024-541xx/CVE-2024-54120.json) (`2025-01-08T03:15:08.707`)
- [CVE-2024-54121](CVE-2024/CVE-2024-541xx/CVE-2024-54121.json) (`2025-01-08T04:15:07.120`)
- [CVE-2024-56437](CVE-2024/CVE-2024-564xx/CVE-2024-56437.json) (`2025-01-08T03:15:08.840`)
- [CVE-2024-56438](CVE-2024/CVE-2024-564xx/CVE-2024-56438.json) (`2025-01-08T03:15:08.970`)
- [CVE-2024-56439](CVE-2024/CVE-2024-564xx/CVE-2024-56439.json) (`2025-01-08T03:15:09.113`)
- [CVE-2024-56440](CVE-2024/CVE-2024-564xx/CVE-2024-56440.json) (`2025-01-08T03:15:09.240`)
- [CVE-2024-56441](CVE-2024/CVE-2024-564xx/CVE-2024-56441.json) (`2025-01-08T03:15:09.373`)
- [CVE-2024-56442](CVE-2024/CVE-2024-564xx/CVE-2024-56442.json) (`2025-01-08T03:15:09.510`)
- [CVE-2024-56443](CVE-2024/CVE-2024-564xx/CVE-2024-56443.json) (`2025-01-08T03:15:09.640`)
- [CVE-2024-56444](CVE-2024/CVE-2024-564xx/CVE-2024-56444.json) (`2025-01-08T03:15:09.790`)
- [CVE-2024-56445](CVE-2024/CVE-2024-564xx/CVE-2024-56445.json) (`2025-01-08T03:15:09.920`)
- [CVE-2024-56446](CVE-2024/CVE-2024-564xx/CVE-2024-56446.json) (`2025-01-08T03:15:10.063`)
- [CVE-2024-56447](CVE-2024/CVE-2024-564xx/CVE-2024-56447.json) (`2025-01-08T03:15:10.190`)
- [CVE-2024-56448](CVE-2024/CVE-2024-564xx/CVE-2024-56448.json) (`2025-01-08T04:15:07.257`)
- [CVE-2024-56449](CVE-2024/CVE-2024-564xx/CVE-2024-56449.json) (`2025-01-08T04:15:07.390`)
- [CVE-2024-56450](CVE-2024/CVE-2024-564xx/CVE-2024-56450.json) (`2025-01-08T04:15:07.520`)
- [CVE-2024-56451](CVE-2024/CVE-2024-564xx/CVE-2024-56451.json) (`2025-01-08T04:15:07.653`)
- [CVE-2024-56452](CVE-2024/CVE-2024-564xx/CVE-2024-56452.json) (`2025-01-08T04:15:07.780`)
- [CVE-2024-56453](CVE-2024/CVE-2024-564xx/CVE-2024-56453.json) (`2025-01-08T04:15:07.907`)
- [CVE-2024-56454](CVE-2024/CVE-2024-564xx/CVE-2024-56454.json) (`2025-01-08T04:15:08.040`)
- [CVE-2024-56455](CVE-2024/CVE-2024-564xx/CVE-2024-56455.json) (`2025-01-08T04:15:08.160`)
- [CVE-2024-56456](CVE-2024/CVE-2024-564xx/CVE-2024-56456.json) (`2025-01-08T04:15:08.280`)
- [CVE-2025-21603](CVE-2025/CVE-2025-216xx/CVE-2025-21603.json) (`2025-01-08T04:15:08.407`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
- [CVE-2020-2883](CVE-2020/CVE-2020-28xx/CVE-2020-2883.json) (`2025-01-08T02:00:01.937`)
- [CVE-2024-41713](CVE-2024/CVE-2024-417xx/CVE-2024-41713.json) (`2025-01-08T02:00:01.937`)
- [CVE-2024-55550](CVE-2024/CVE-2024-555xx/CVE-2024-55550.json) (`2025-01-08T02:00:01.937`)
## Download and Usage

View File

@ -157265,7 +157265,7 @@ CVE-2020-2879,0,0,159f6a71d4b8664572c45b74abf5fce8b242bc159343b93eee81e94063e415
CVE-2020-2880,0,0,755715c6671780e66fae7131af813fc14164993191bc1afa9efadfe70d6a1267,2024-11-21T05:26:31.717000
CVE-2020-2881,0,0,d8703a6afda3c646d90c908e204ced3076e81c72d7f033ca214af638e7fcf388,2024-11-21T05:26:31.867000
CVE-2020-2882,0,0,56281f604f68c8cb8007b683409f6bf0b9dc197e22c23f38d21d24837fbc725a,2024-11-21T05:26:32.043000
CVE-2020-2883,0,1,88c5788bc56bff379cf7d50f4c217da1bf682b578f8e2678a0e24a705ffb18fe,2025-01-08T02:00:01.937000
CVE-2020-2883,0,0,88c5788bc56bff379cf7d50f4c217da1bf682b578f8e2678a0e24a705ffb18fe,2025-01-08T02:00:01.937000
CVE-2020-28838,0,0,d6d5e87f010e669310e50bfdbf8c2e2ff39fdaef0cbe0828a57a541051490af8,2024-11-21T05:23:10.513000
CVE-2020-2884,0,0,1ef1b5d3492120e009bd2f21e686c7eccae82fc79921954bc4c6d4bfd41b609d,2024-11-21T05:26:32.357000
CVE-2020-28840,0,0,c665f50c066c5bb29584327db8e412ee4a36cd5790faf198b79b41b62e5deff4,2024-11-21T05:23:10.657000
@ -240466,6 +240466,9 @@ CVE-2023-52949,0,0,2dc054c34618db3270acf55c911e73637f6c82cdce362693cea11e6d1c410
CVE-2023-5295,0,0,2b5ab72da232f5f5a3ac2b39e98a9c8864bc1570b0eb638a3035ee2c7b09129a,2024-11-21T08:41:28.337000
CVE-2023-52950,0,0,8a52d8bd2da07af53f402b62fdad2a9f6414f85db952ad75359b2aa5d8923041,2024-10-02T15:26:33.837000
CVE-2023-52952,0,0,566ca32b1444148f195c331ac2a9ad38ecb816c7a11faec5b059440b5ddf4458,2024-10-10T12:56:30.817000
CVE-2023-52953,1,1,e1fe82dbeff07c63f91cde88d8bbeaf3d5760ac7b3a83291b65f6e8b0d59afac,2025-01-08T03:15:07.990000
CVE-2023-52954,1,1,bcb792097cb2f2d41b36daaee7771d588bec6667b8b689c81d15a6653608b107,2025-01-08T03:15:08.130000
CVE-2023-52955,1,1,ed1eedf087384e816453468f1a3473e44bf70cc851989a6de9f632fd211109f6,2025-01-08T03:15:08.263000
CVE-2023-5296,0,0,b04d4fbd343c2e856b8ac0aee32ec4da2662cf244be6db174bfbc8064e9c4681,2024-11-21T08:41:28.453000
CVE-2023-5297,0,0,de1f61d8e4cdd3b9b3c94e1a593ca1d09a649ba1f11645b247141deb55a46d5b,2024-11-21T08:41:28.590000
CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000
@ -244723,6 +244726,7 @@ CVE-2024-11811,0,0,de10a3ae4822973dd993404053b9029fe9aac56c38d9c3c2b8c2699bef5d0
CVE-2024-11812,0,0,df32cc25c5bb5c5dcc725bf487d9704dded6625df8d19e9336934b5d64e1e261,2024-12-20T07:15:11.373000
CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000
CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000
CVE-2024-11816,1,1,44a8365b70415c54e1c2796c79be1d73f9ddd09db3f5e6b7378fefb8ad6935db,2025-01-08T04:15:06.380000
CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000
CVE-2024-11818,0,0,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000
CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000
@ -244803,6 +244807,7 @@ CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d
CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000
CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5907,2024-12-18T12:15:08.950000
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
CVE-2024-11916,1,1,ebf505af531198d809ed1e93c1d8be8e129094835bb0f050a7490a11374346ee,2025-01-08T04:15:06.537000
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
CVE-2024-1192,0,0,6a3cef60785336a18d7ecf43232ad25f29b7ccd29fd6e48cd70df8d015114e42,2024-11-21T08:50:00.287000
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
@ -244933,6 +244938,7 @@ CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a30
CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000
CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000
CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000
CVE-2024-12112,1,1,cb0f7873248fd4a1fa61695f98ef1eefe20e324e4ad567998bdfa3d468a39f02,2025-01-08T04:15:06.683000
CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000
CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000
CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000
@ -245212,6 +245218,7 @@ CVE-2024-12516,0,0,e41b8f7326a1ff9d5fbcf49901d9bff7bf07cbba6980171c82a8cc823c6f0
CVE-2024-12517,0,0,4d330b1d19e40313cc9a81f9b8784c01c801f44b6fb4859786e4a9a0d1f904a4,2024-12-14T05:15:11.453000
CVE-2024-12518,0,0,e836e2bda2de8df1c322fb96b28c258a6308fb3f7a0cbb3b5a146ac83d3fa431,2024-12-24T05:15:06.827000
CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000
CVE-2024-12521,1,1,2dfc767456ed3b436c8094393a38b7cdd77f0a32468d17a99274b9a7d3db5dce,2025-01-08T04:15:06.827000
CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000
CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000
CVE-2024-12528,0,0,b542d57e01c0c48ad9564b0890e0d12d29edb2156a8c53246e86bf7139add551,2025-01-07T04:15:08.543000
@ -245320,6 +245327,7 @@ CVE-2024-12701,0,0,093eca66809c85a1226724feb10b7be584059ad49ddb4511295af9293417b
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821657,2024-12-24T05:15:07.193000
CVE-2024-12711,0,0,af63df0fc664529f876fb1b7e42d9f7f11e38264d63e374c64c561e006838c50,2025-01-07T12:15:24.503000
CVE-2024-12713,1,1,e6c175f4b410ded191dec5f6f687c64efe390496ffa1b50119935b0d26dfb4ad,2025-01-08T04:15:06.967000
CVE-2024-12719,0,0,f1c1e2dd855d248bd97d2bae5f7baeccac20810feec3cd62c70cf667fd59aed5,2025-01-07T10:15:07.323000
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
CVE-2024-12721,0,0,602b63fd821f3e12d745be832faac963714770e5a5cf419d7f91dc50f0276cf3,2024-12-21T07:15:09.793000
@ -261845,7 +261853,7 @@ CVE-2024-40661,0,0,e9311a0488c8beb4857508062f47da62f4761ca246a30ea7974cdfed13174
CVE-2024-40662,0,0,f930fc5956328b9ceaccc04df86a895546984aaffbdfff03287ccf231f34c2aa,2024-12-17T19:07:42.750000
CVE-2024-4067,0,0,06cf73941215eebfb58b3f7712c48b8f71a364f025c4b7e91b6494998e5c5a95,2024-11-21T09:42:07.587000
CVE-2024-40671,0,0,4520d06fdb2a855ee77cf9a82325fd4ddc6fdfedc3ecf68cb89582eb0d5cc2c7,2024-12-17T19:30:29.457000
CVE-2024-40679,1,1,7e2b7f16cea587d095fd718a563459c7a4d4b149876dc71826344826c1a87f3e,2025-01-08T01:15:06.953000
CVE-2024-40679,0,0,7e2b7f16cea587d095fd718a563459c7a4d4b149876dc71826344826c1a87f3e,2025-01-08T01:15:06.953000
CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73a3,2024-11-21T09:42:07.710000
CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000
CVE-2024-40681,0,0,2b5a5c013480bd5cc87a564fe6701f318e09e1cde3fb5250634972a9f9aebf6b,2024-10-31T17:15:13.143000
@ -262587,7 +262595,7 @@ CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eaf
CVE-2024-41710,0,0,837dd028ed039442f3fba358e71963b23cd81e157e2fc72a4188e4393c3eab4e,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000
CVE-2024-41713,0,1,f05006500b2d6243e390637dd4206bd2f31cdc92718966be33b57f33d8f79295,2025-01-08T02:00:01.937000
CVE-2024-41713,0,0,f05006500b2d6243e390637dd4206bd2f31cdc92718966be33b57f33d8f79295,2025-01-08T02:00:01.937000
CVE-2024-41714,0,0,194b12585502057ff43eb474c8822c4bfff8557ec724eea446f51fa6890f4643,2024-10-23T15:12:34.673000
CVE-2024-41715,0,0,2b361ed47bf6f81c6f17e8f44a6337c83a629e946281f8818c6e5fb6899097f4,2024-10-17T17:15:11.530000
CVE-2024-41716,0,0,ab9b276c3da529c12bb40ef0d240bdb9954f1f4c86c22f5ce809e71a30285125,2024-09-13T19:53:47.723000
@ -266476,6 +266484,7 @@ CVE-2024-47226,0,0,6a25a0d071ab5701a47d882acebc80a4d8b5fc68de099ea62782be7804f42
CVE-2024-47227,0,0,6f3ab8e4530635c45675163a95fcca820448d6a59b97a7e312ec08fa6e1adb85,2024-09-27T16:37:44.143000
CVE-2024-4723,0,0,4af091203745bd84c430d86c99d3eb1a1bbf42d9cd7d7cc786b00931c8615cb4,2024-11-21T09:43:27.393000
CVE-2024-47238,0,0,991ba9ead429ebc60cff80896403b8dada014219662ed81ab5b7c16db20b7ff0,2024-12-12T18:15:25.250000
CVE-2024-47239,1,1,23694eaed33e97d6ea23d2c88972feb6555614c727521309731b03ea9988ee68,2025-01-08T03:15:08.413000
CVE-2024-4724,0,0,cfaff446ce857d4884ca5d5aa97ad803d1f94867ae84d40ef51da0f69b75c51d,2024-11-21T09:43:27.537000
CVE-2024-47240,0,0,92a5dec476dd087df4961145c909b905b6c005bf5a596b1ea14c96642acb150c,2024-10-22T15:28:55.637000
CVE-2024-47241,0,0,b0d6175169ec2eb1b3cefb7c95304da9c64f618bd3ffbb076b6917f1b435ff01,2024-12-13T14:37:10.467000
@ -267090,6 +267099,7 @@ CVE-2024-47924,0,0,5e9fdcc1d6f6368ecfcd2003d54cc5c9ae067e5e908a91cef46fb2536076e
CVE-2024-47925,0,0,e85657cf2064d6c6e6af79febd3acfb5604d99d861da18ed64400f723839f9de,2024-12-30T10:15:07.233000
CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861dde,2024-12-30T10:15:07.380000
CVE-2024-4793,0,0,a6ca6dc2e5c47daa16d59954e19a82bf00c36bb6db82d6b1c1e23c1f1df319c1,2024-11-21T09:43:37.463000
CVE-2024-47934,1,1,28f170d97bf8bc919dd16011660985c27c58b2ee0f6825b207bfb4f2474336ca,2025-01-08T03:15:08.550000
CVE-2024-47939,0,0,56807ff489784cf4fadb2e00da7b797597c1ced2e2c98f8bd3c06e8fe447a672,2024-11-01T12:57:03.417000
CVE-2024-4794,0,0,c8bbe767ad72c9235212e11271c46c761e04d6a9b46861dabd15f61ddf88f000,2024-11-21T09:43:37.600000
CVE-2024-47940,0,0,13d7c32b7f73c4e4fb7631fb34c565a5b9a53b3818e0802f4a7c760b1b5809b8,2024-11-13T23:14:54.567000
@ -268956,7 +268966,7 @@ CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4
CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000
CVE-2024-50603,1,1,b35246cd3f373780f0f033d9f431a8a5a217d06e4ba9f10d63eb2890ee470fe0,2025-01-08T01:15:07.127000
CVE-2024-50603,0,0,b35246cd3f373780f0f033d9f431a8a5a217d06e4ba9f10d63eb2890ee470fe0,2025-01-08T01:15:07.127000
CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000
CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000
CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000
@ -271058,6 +271068,8 @@ CVE-2024-54117,0,0,cd3dd10e2689d8474911355b4c987c7aca3170647fbf603148daa14ddf57f
CVE-2024-54118,0,0,3d5435da91a32a7bf2206da2f7e289c3ed3a80b3e8f9d704d669dbbeea24a3de,2024-12-13T02:15:04.770000
CVE-2024-54119,0,0,c564f426bd6c3ff144a6efc33d8f9108f1a4f189ec08fe238127728df8985549,2024-12-12T13:15:11.350000
CVE-2024-5412,0,0,c89822b010e86cbcf24c047ef6717bc07af2215177f02665c5af47a090ff2c1c,2024-09-06T18:07:43.940000
CVE-2024-54120,1,1,786ad7d9500cc596cdc6340d10698901d47ea837e1c9333675429fd2a9e8bc20,2025-01-08T03:15:08.707000
CVE-2024-54121,1,1,6667f39fda970714924f385bd27e9bc01290212b8081fd74a39d4c4dd9ffd3a2,2025-01-08T04:15:07.120000
CVE-2024-54122,0,0,c9cc980b3351d1ad4e813b4d0be69a2d2218f2903532625dbe9f37c9343c547e,2024-12-12T13:15:11.527000
CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000
@ -271564,8 +271576,8 @@ CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1
CVE-2024-55341,0,0,32b88ffcace04987952e76982ddb2fabb1fdef0b8350ead9c1b3cbef3f8f04c7,2024-12-20T20:15:23.343000
CVE-2024-55342,0,0,c1006192a9d35507b8ad981a4c836150dcbcd1afe702b76f0696b97fbea16a5c,2024-12-20T20:15:23.660000
CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5ee3,2024-11-21T09:47:53.090000
CVE-2024-55355,1,1,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369fc4,2025-01-08T01:15:07.297000
CVE-2024-55356,1,1,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369fc4,2025-01-08T01:15:07.297000
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000
CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000
@ -271619,7 +271631,7 @@ CVE-2024-55546,0,0,942b232afb25307bd1bbb9171d407a64efb6124e7535155a6616308769a30
CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85aff3d,2024-12-10T20:15:21.527000
CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
CVE-2024-55550,0,1,71cbbcfcfe1002b90648f485bb22c8eb6a36214983bc2f1aafbd7f4f45c4222d,2025-01-08T02:00:01.937000
CVE-2024-55550,0,0,71cbbcfcfe1002b90648f485bb22c8eb6a36214983bc2f1aafbd7f4f45c4222d,2025-01-08T02:00:01.937000
CVE-2024-55553,0,0,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
CVE-2024-55555,0,0,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000
@ -272039,11 +272051,31 @@ CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f87
CVE-2024-56430,0,0,0262ea105dbec15a8d2974aa338fd319cfb88d949549b9f7b495f5427178dfce,2024-12-26T20:15:23.447000
CVE-2024-56431,0,0,5aa653764fe24dfd87678f336b5b1cc07c0f854ae90d756ecc10c6203bee6e8b,2024-12-31T19:15:47.847000
CVE-2024-56433,0,0,41933bdf4cf50f4b61b9a39102f868e297a293e10ec834a2eac62b7879bed51f,2024-12-26T09:15:07.267000
CVE-2024-56434,1,1,df370ba2edbff780f02a9b4d24ed6dfab102277cd844bcf38c1ddf684fd08974,2025-01-08T02:15:25.330000
CVE-2024-56435,1,1,5c71caeddeac2446874c2c436c688a69576c72ad26579455c536d2bbf1648539,2025-01-08T02:15:25.487000
CVE-2024-56436,1,1,0a86ad198b939c5bcbac7df2188ce519e8ab4ebdabeeaf1641021c0ebec6088c,2025-01-08T02:15:25.603000
CVE-2024-56434,0,0,df370ba2edbff780f02a9b4d24ed6dfab102277cd844bcf38c1ddf684fd08974,2025-01-08T02:15:25.330000
CVE-2024-56435,0,0,5c71caeddeac2446874c2c436c688a69576c72ad26579455c536d2bbf1648539,2025-01-08T02:15:25.487000
CVE-2024-56436,0,0,0a86ad198b939c5bcbac7df2188ce519e8ab4ebdabeeaf1641021c0ebec6088c,2025-01-08T02:15:25.603000
CVE-2024-56437,1,1,5b31a0f3f6172534c24002f2ef0bc1e152e0583015fdfbb0e8ee5ecc56e90035,2025-01-08T03:15:08.840000
CVE-2024-56438,1,1,4e5dc0cdaae7b1a741927f46a8e914a4fe2d3d5fc4c17f7ba8ccf49e9ab0d968,2025-01-08T03:15:08.970000
CVE-2024-56439,1,1,c979f336089e1cb893bcd541d89f54c3a292c739ebd2ec9c3cb2f8601b79a207,2025-01-08T03:15:09.113000
CVE-2024-5644,0,0,160a368b3a7f8d4e53712fad16fb1094662061822d6ba961b4f309a68658057a,2024-11-21T09:48:04.900000
CVE-2024-56440,1,1,16acffa5094bae5ee91010cb372b2993befc3770cda0cab1ec3a9e68dfd02632,2025-01-08T03:15:09.240000
CVE-2024-56441,1,1,1b1e2750d1168970a8fb115780abcb6a33b1d8af48b4dad6a8ff85f0f1ab7ea5,2025-01-08T03:15:09.373000
CVE-2024-56442,1,1,1bd2f376e932cfa6572382d732d00b9322ca048ad30f28356c09ce13a379824b,2025-01-08T03:15:09.510000
CVE-2024-56443,1,1,ad5ad10964b25a50625210d09f93250e2a5f6d4e5c9ac262511c8307843adcf1,2025-01-08T03:15:09.640000
CVE-2024-56444,1,1,49c012e99ab101f036331555d29c4e884ae38a2c2afc0500b2e4a27e29b18744,2025-01-08T03:15:09.790000
CVE-2024-56445,1,1,65a33dd335561249bfaee3cd6aea27972a3353c074ae89a9bf8334d0031c0b44,2025-01-08T03:15:09.920000
CVE-2024-56446,1,1,0a3ded62e8642b86266b5f4280a3e8f15fa4e5a82b716cbc12e764ea6dbf8fbd,2025-01-08T03:15:10.063000
CVE-2024-56447,1,1,f9deaf3781a30cdd1b16e0322dc9f307ec4efcb6eea0eb504fa605f7a22fffea,2025-01-08T03:15:10.190000
CVE-2024-56448,1,1,a6ff180097b24f90f9495c47ed27ed8e30d07b6ce79b516b8a8c36721d5cc0cb,2025-01-08T04:15:07.257000
CVE-2024-56449,1,1,77f91abd48c81d66c65c7789cd0b293b18ad546bce183b22ce11dc4f185b2671,2025-01-08T04:15:07.390000
CVE-2024-5645,0,0,d8c292e5143e4cdbc6691cac923174cc5efea85d55c86c52beb1b8ee7a249593,2024-11-21T09:48:05.083000
CVE-2024-56450,1,1,8d83445fd9394770e4297202ca55c40dec98823a25a951d2d5a66219bd386f9a,2025-01-08T04:15:07.520000
CVE-2024-56451,1,1,16e6eaf2ca9291e79409dbac15288719c15f6c5555c1bd2e9c64ccd230580d92,2025-01-08T04:15:07.653000
CVE-2024-56452,1,1,b0c38b7002f1bfba6ccac1f646aa5f88500320816fba051b881f13c590db0615,2025-01-08T04:15:07.780000
CVE-2024-56453,1,1,4d4b2ff1a4f1fcdd3bf7dacceea672bd5d76f75955a1fa45a2f77b64eae84a91,2025-01-08T04:15:07.907000
CVE-2024-56454,1,1,e22ca21ecac3e36caaabacfe825bf5ca67a04f5ebc374f60466a0be224ae023a,2025-01-08T04:15:08.040000
CVE-2024-56455,1,1,e90b8b2208ee8f43002ad8cfb29e68f48c715d41c996efbde95c096302d4145f,2025-01-08T04:15:08.160000
CVE-2024-56456,1,1,181670951c7672b798e191c0bd690e6d69a1314d4fbdd9140f86a05c5ed276df,2025-01-08T04:15:08.280000
CVE-2024-5646,0,0,c48b41c63e1dae6ddb1f5f69529911450f8300b5322652ac7b1465148b11ea55,2024-11-21T09:48:05.203000
CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000
CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000
@ -276071,6 +276103,7 @@ CVE-2025-0298,0,0,ec923ed4b9b6afa6228d656ddb0c601f5ebbf31d02abf4f38a99c8dda70d2f
CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000
CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000
CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000
CVE-2025-21603,1,1,f1cb8076cfa2b1430d6913a92e2508a980e5695659609b59018d355e4afac2b5,2025-01-08T04:15:08.407000
CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000
CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000
CVE-2025-21610,0,0,803b1c12bbaab2c87bcfc5865cced8b68fa26746eb8c056e6bba01e1200224ac,2025-01-03T17:15:09.290000

Can't render this file because it is too large.