Auto-Update: 2025-01-27T17:00:41.178643+00:00

This commit is contained in:
cad-safe-bot 2025-01-27 17:04:07 +00:00
parent 78cf515df9
commit 76544d586c
73 changed files with 4879 additions and 308 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47183", "id": "CVE-2021-47183",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-10T19:15:47.287", "published": "2024-04-10T19:15:47.287",
"lastModified": "2024-11-21T06:35:34.553", "lastModified": "2025-01-27T15:03:17.013",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,23 +15,88 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se soluciona el procesamiento de enlace inactivo para abordar la desreferencia de puntero NULL Si una transici\u00f3n de enlace inactivo FC mientras hay PLOGI pendientes para direcciones conocidas de Fabric, las solicitudes ABTS pendientes pueden resultar en una desreferencia de puntero NULL. Las solicitudes de descarga del controlador pueden bloquearse con mensajes de registro \"2878\" repetidos. El procesamiento de enlace inactivo da como resultado solicitudes ABTS para solicitudes ELS pendientes. Los WQE de cancelaci\u00f3n se env\u00edan para los ELS antes de que el controlador haya establecido el estado del enlace en inactivo. Por lo tanto, el controlador env\u00eda la cancelaci\u00f3n con la expectativa de que se env\u00ede una ABTS en el cable. La solicitud de cancelaci\u00f3n se detiene esperando que se active el enlace. En algunas condiciones, el controlador puede completar autom\u00e1ticamente los ELS, por lo que si el enlace se activa, las finalizaciones de cancelaci\u00f3n pueden hacer referencia a una estructura no v\u00e1lida. Se soluciona asegur\u00e1ndose de que la cancelaci\u00f3n establezca el indicador para evitar el tr\u00e1fico de enlace si se emite debido a condiciones en las que el enlace fall\u00f3." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se soluciona el procesamiento de enlace inactivo para abordar la desreferencia de puntero NULL Si una transici\u00f3n de enlace inactivo FC mientras hay PLOGI pendientes para direcciones conocidas de Fabric, las solicitudes ABTS pendientes pueden resultar en una desreferencia de puntero NULL. Las solicitudes de descarga del controlador pueden bloquearse con mensajes de registro \"2878\" repetidos. El procesamiento de enlace inactivo da como resultado solicitudes ABTS para solicitudes ELS pendientes. Los WQE de cancelaci\u00f3n se env\u00edan para los ELS antes de que el controlador haya establecido el estado del enlace en inactivo. Por lo tanto, el controlador env\u00eda la cancelaci\u00f3n con la expectativa de que se env\u00ede una ABTS en el cable. La solicitud de cancelaci\u00f3n se detiene esperando que se active el enlace. En algunas condiciones, el controlador puede completar autom\u00e1ticamente los ELS, por lo que si el enlace se activa, las finalizaciones de cancelaci\u00f3n pueden hacer referencia a una estructura no v\u00e1lida. Se soluciona asegur\u00e1ndose de que la cancelaci\u00f3n establezca el indicador para evitar el tr\u00e1fico de enlace si se emite debido a condiciones en las que el enlace fall\u00f3."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.5",
"matchCriteriaId": "B2845F69-264B-45BD-B7E7-D12B24338382"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6", "url": "https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a", "url": "https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6", "url": "https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a", "url": "https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35888", "id": "CVE-2023-35888",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-20T14:15:08.183", "published": "2024-03-20T14:15:08.183",
"lastModified": "2024-11-21T08:08:55.497", "lastModified": "2025-01-27T15:18:19.737",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
} }
] ]
}, },
@ -49,24 +69,63 @@
"value": "CWE-311" "value": "CWE-311"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A0412C4E-CCDF-4DAE-88B2-1D006F696ED7"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258375", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258375",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.ibm.com/support/pages/node/7144228", "url": "https://www.ibm.com/support/pages/node/7144228",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258375", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258375",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.ibm.com/support/pages/node/7144228", "url": "https://www.ibm.com/support/pages/node/7144228",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-47159",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-27T16:15:29.593",
"lastModified": "2025-01-27T16:15:29.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to enumerate usernames due to an observable discrepancy in request responses."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176083",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-52292",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-27T16:15:29.767",
"lastModified": "2025-01-27T16:15:29.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176079",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52646", "id": "CVE-2023-52646",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-26T13:15:46.453", "published": "2024-04-26T13:15:46.453",
"lastModified": "2024-11-21T08:40:16.687", "lastModified": "2025-01-27T15:09:48.333",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,63 +15,234 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: aio: corrige mremap despu\u00e9s de la bifurcaci\u00f3n null-deref Commit e4a0d3e720e7 (\"aio: Make it posible reasignar el anillo aio\") introdujo un null-deref si se llama a mremap en un mapeo aio antiguo despu\u00e9s de la bifurcaci\u00f3n como mm->ioctx_table se establecer\u00e1 en NULL. [jmoyer@redhat.com: soluciona el problema de 80 columnas]" "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: aio: corrige mremap despu\u00e9s de la bifurcaci\u00f3n null-deref Commit e4a0d3e720e7 (\"aio: Make it posible reasignar el anillo aio\") introdujo un null-deref si se llama a mremap en un mapeo aio antiguo despu\u00e9s de la bifurcaci\u00f3n como mm->ioctx_table se establecer\u00e1 en NULL. [jmoyer@redhat.com: soluciona el problema de 80 columnas]"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.14.306",
"matchCriteriaId": "5265EE87-658B-4C39-8539-7587327F4439"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.273",
"matchCriteriaId": "FC86F278-A337-4A8A-A7BB-758898345802"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.232",
"matchCriteriaId": "9C6E0696-3702-4B0C-A102-2753BDC8C3D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.169",
"matchCriteriaId": "D8E6784B-A00F-47F0-882B-7209E1F374B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.95",
"matchCriteriaId": "8508F80E-8588-4976-A2BA-7A2D85018C4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.13",
"matchCriteriaId": "CE354BE6-0C0F-47EB-AD8A-1433F041AC20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D34127CC-68F5-4703-A5F6-5006F803E4AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*",
"matchCriteriaId": "4AB8D555-648E-4F2F-98BD-3E7F45BD12A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C64BDD9D-C663-4E75-AE06-356EDC392B82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*",
"matchCriteriaId": "26544390-88E4-41CA-98BF-7BB1E9D4E243"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1", "url": "https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2", "url": "https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95", "url": "https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1", "url": "https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d", "url": "https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f", "url": "https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22", "url": "https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1", "url": "https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2", "url": "https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95", "url": "https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1", "url": "https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d", "url": "https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f", "url": "https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22", "url": "https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10360", "id": "CVE-2024-10360",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-10-29T11:15:03.797", "published": "2024-10-29T11:15:03.797",
"lastModified": "2024-10-29T14:34:04.427", "lastModified": "2025-01-27T15:19:13.047",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,16 +49,50 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.6",
"matchCriteriaId": "C1A8351E-C1BD-45F0-BD3E-1F611E9822A6"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3176341/move-addons", "url": "https://plugins.trac.wordpress.org/changeset/3176341/move-addons",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eafe73b4-b492-45c7-adca-d9a3042144b4?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eafe73b4-b492-45c7-adca-d9a3042144b4?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12774", "id": "CVE-2024-12774",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-27T06:15:22.860", "published": "2025-01-27T06:15:22.860",
"lastModified": "2025-01-27T06:15:22.860", "lastModified": "2025-01-27T15:15:09.803",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -11,7 +11,30 @@
"value": "The Altra Side Menu WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary menu via a CSRF attack" "value": "The Altra Side Menu WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary menu via a CSRF attack"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/8decbef5-f106-488b-925c-42b3b280460a/", "url": "https://wpscan.com/vulnerability/8decbef5-f106-488b-925c-42b3b280460a/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2131", "id": "CVE-2024-2131",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-23T02:15:47.300", "published": "2024-03-23T02:15:47.300",
"lastModified": "2024-11-21T09:09:05.730", "lastModified": "2025-01-27T15:20:06.373",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,25 +36,87 @@
}, },
"exploitabilityScore": 3.1, "exploitabilityScore": 3.1,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.0",
"matchCriteriaId": "6189F804-2AA9-427A-9ADE-B53C2C65D877"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048903%40move-addons&new=3048903%40move-addons&sfp_email=&sfph_mail=", "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048903%40move-addons&new=3048903%40move-addons&sfp_email=&sfph_mail=",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048903%40move-addons&new=3048903%40move-addons&sfp_email=&sfph_mail=", "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048903%40move-addons&new=3048903%40move-addons&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-22316",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-27T16:15:30.637",
"lastModified": "2025-01-27T16:15:30.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to perform unauthorized actions to another user's data due to improper access controls."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176083",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2255", "id": "CVE-2024-2255",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-20T04:15:10.840", "published": "2024-03-20T04:15:10.840",
"lastModified": "2024-11-21T09:09:21.510", "lastModified": "2025-01-27T15:26:09.810",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,33 +36,101 @@
}, },
"exploitabilityScore": 3.1, "exploitabilityScore": 3.1,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.5.3",
"matchCriteriaId": "A8DE6632-2C11-41D3-8D51-53F973A1743A"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.5.2/blocks/TableOfContents.php#L120", "url": "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.5.2/blocks/TableOfContents.php#L120",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3053199/essential-blocks/trunk/blocks/TableOfContents.php", "url": "https://plugins.trac.wordpress.org/changeset/3053199/essential-blocks/trunk/blocks/TableOfContents.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.5.2/blocks/TableOfContents.php#L120", "url": "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.5.2/blocks/TableOfContents.php#L120",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3053199/essential-blocks/trunk/blocks/TableOfContents.php", "url": "https://plugins.trac.wordpress.org/changeset/3053199/essential-blocks/trunk/blocks/TableOfContents.php",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2558", "id": "CVE-2024-2558",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T09:15:07.253", "published": "2024-03-17T09:15:07.253",
"lastModified": "2024-11-21T09:10:00.450", "lastModified": "2025-01-27T16:56:47.900",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,32 +94,93 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.257057", "url": "https://vuldb.com/?ctiid.257057",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.257057", "url": "https://vuldb.com/?id.257057",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.257057", "url": "https://vuldb.com/?ctiid.257057",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.257057", "url": "https://vuldb.com/?id.257057",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2559", "id": "CVE-2024-2559",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T10:15:06.923", "published": "2024-03-17T10:15:06.923",
"lastModified": "2024-11-21T09:10:00.610", "lastModified": "2025-01-27T16:50:41.160",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -76,30 +96,81 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.257058", "url": "https://vuldb.com/?ctiid.257058",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.257058", "url": "https://vuldb.com/?id.257058",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.257058", "url": "https://vuldb.com/?ctiid.257058",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.257058", "url": "https://vuldb.com/?id.257058",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26863", "id": "CVE-2024-26863",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.100", "published": "2024-04-17T11:15:09.100",
"lastModified": "2024-11-21T09:03:14.533", "lastModified": "2025-01-27T15:05:39.390",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,87 +15,265 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: hsr: corrigi\u00f3 el acceso a valores uninit en hsr_get_node() KMSAN inform\u00f3 el siguiente problema de acceso a valores uninit [1]: ============== ======================================= ERROR: KMSAN: valor uninit en hsr_get_node+0xa2e /0xa40 net/hsr/hsr_framereg.c:246 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 fill_frame_info net/hsr/hsr_forward.c:577 [en l\u00ednea] hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c :615 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223 __netdev_start_xmit include/linux/netdevice.h:4940 [en l\u00ednea] netdev_start_xmit include/linux/netdevice.h:4954 [en l\u00ednea] xmit_one net/core/dev.c :3548 [en l\u00ednea] dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice.h:3134 [en l\u00ednea] paquete_xmit+0x9c/ 0x6b0 net/packet/af_packet.c:276 paquete_snd net/packet/af_packet.c:3087 [en l\u00ednea] paquete_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg neto /socket.c:745 [en l\u00ednea] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] __x64_sys_sendto+0x125/0x1c0 socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit se cre\u00f3 en slab_post_alloc_hook+0x129/ 0xa70 mm/slab.h: 768 slab_alloc_node mm/slub.c: 3478 [inline] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c: 3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c: 560 __b.biloc. 740 net/core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 paquete_alloc_skb net/packet/af_packet.c:2936 [en l\u00ednea] paquete_snd net/packet/af_packet.c:3030 [en l\u00ednea] paquete_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea ] __sock_sendmsg net/socket.c:745 [en l\u00ednea] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] x125/ 0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 17/11/2023 ============== ======================================== Si el campo ID de tipo de paquete en el encabezado Ethernet es ETH_P_PRP o ETH_P_HSR, pero no va seguido de una etiqueta HSR, hsr_get_skb_sequence_nr() lee un valor no v\u00e1lido como un n\u00famero de secuencia. Esto causa el problema anterior. Este parche soluciona el problema al devolver NULL si el encabezado Ethernet no va seguido de una etiqueta HSR." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: hsr: corrigi\u00f3 el acceso a valores uninit en hsr_get_node() KMSAN inform\u00f3 el siguiente problema de acceso a valores uninit [1]: ============== ======================================= ERROR: KMSAN: valor uninit en hsr_get_node+0xa2e /0xa40 net/hsr/hsr_framereg.c:246 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 fill_frame_info net/hsr/hsr_forward.c:577 [en l\u00ednea] hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c :615 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223 __netdev_start_xmit include/linux/netdevice.h:4940 [en l\u00ednea] netdev_start_xmit include/linux/netdevice.h:4954 [en l\u00ednea] xmit_one net/core/dev.c :3548 [en l\u00ednea] dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice.h:3134 [en l\u00ednea] paquete_xmit+0x9c/ 0x6b0 net/packet/af_packet.c:276 paquete_snd net/packet/af_packet.c:3087 [en l\u00ednea] paquete_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg neto /socket.c:745 [en l\u00ednea] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] __x64_sys_sendto+0x125/0x1c0 socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit se cre\u00f3 en slab_post_alloc_hook+0x129/ 0xa70 mm/slab.h: 768 slab_alloc_node mm/slub.c: 3478 [inline] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c: 3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c: 560 __b.biloc. 740 net/core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 paquete_alloc_skb net/packet/af_packet.c:2936 [en l\u00ednea] paquete_snd net/packet/af_packet.c:3030 [en l\u00ednea] paquete_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea ] __sock_sendmsg net/socket.c:745 [en l\u00ednea] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] x125/ 0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 17/11/2023 ============== ======================================== Si el campo ID de tipo de paquete en el encabezado Ethernet es ETH_P_PRP o ETH_P_HSR, pero no va seguido de una etiqueta HSR, hsr_get_skb_sequence_nr() lee un valor no v\u00e1lido como un n\u00famero de secuencia. Esto causa el problema anterior. Este parche soluciona el problema al devolver NULL si el encabezado Ethernet no va seguido de una etiqueta HSR."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "4.19.311",
"matchCriteriaId": "C74CBB27-D006-49E7-95E9-B9636C39B956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.273",
"matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.214",
"matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.153",
"matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.83",
"matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.23",
"matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.11",
"matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.2",
"matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209", "url": "https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122", "url": "https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862", "url": "https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a", "url": "https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428", "url": "https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e", "url": "https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949", "url": "https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6", "url": "https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c", "url": "https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209", "url": "https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122", "url": "https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862", "url": "https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a", "url": "https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428", "url": "https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e", "url": "https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949", "url": "https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6", "url": "https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c", "url": "https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26866", "id": "CVE-2024-26866",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.253", "published": "2024-04-17T11:15:09.253",
"lastModified": "2024-11-21T09:03:15.000", "lastModified": "2025-01-27T15:08:19.563",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: lpspi: evita el posible use-after-free en probe() fsl_lpspi_probe() est\u00e1 asignando/eliminando memoria manualmente con spi_alloc_host()/spi_alloc_target(), pero usa devm_spi_register_controller() . En caso de error despu\u00e9s de la \u00faltima llamada, la memoria se liberar\u00e1 expl\u00edcitamente en la funci\u00f3n de sonda mediante la llamada a spi_controller_put(), pero la administraci\u00f3n \"devm\" externa a probe() la utilizar\u00e1 despu\u00e9s (spi_unregister_controller() <- devm_spi_unregister() a continuaci\u00f3n). No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000070... Rastreo de llamadas: kernfs_find_ns kernfs_find_and_get_ns sysfs_remove_group sysfs_remove_groups device_remove_attrs device_del spi_unregister_controller devm_spi_unregister release_nodes devres_release _todos realmente_probe driver_probe_device __device_attach_driver bus_for_each_drv __device_attach dispositivo_initial_probe bus_probe_device deferred_probe_work_func proceso_one_work trabajador_hilo kthread ret_from_fork" "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: lpspi: evita el posible use-after-free en probe() fsl_lpspi_probe() est\u00e1 asignando/eliminando memoria manualmente con spi_alloc_host()/spi_alloc_target(), pero usa devm_spi_register_controller() . En caso de error despu\u00e9s de la \u00faltima llamada, la memoria se liberar\u00e1 expl\u00edcitamente en la funci\u00f3n de sonda mediante la llamada a spi_controller_put(), pero la administraci\u00f3n \"devm\" externa a probe() la utilizar\u00e1 despu\u00e9s (spi_unregister_controller() <- devm_spi_unregister() a continuaci\u00f3n). No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000070... Rastreo de llamadas: kernfs_find_ns kernfs_find_and_get_ns sysfs_remove_group sysfs_remove_groups device_remove_attrs device_del spi_unregister_controller devm_spi_unregister release_nodes devres_release _todos realmente_probe driver_probe_device __device_attach_driver bus_for_each_drv __device_attach dispositivo_initial_probe bus_probe_device deferred_probe_work_func proceso_one_work trabajador_hilo kthread ret_from_fork"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "6.6.23",
"matchCriteriaId": "A2D8AF06-BD2B-4408-99B0-5EE4CF1A092B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.11",
"matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.2",
"matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f", "url": "https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861", "url": "https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68", "url": "https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea", "url": "https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f", "url": "https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861", "url": "https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68", "url": "https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea", "url": "https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26879", "id": "CVE-2024-26879",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:09.913", "published": "2024-04-17T11:15:09.913",
"lastModified": "2024-11-21T09:03:16.793", "lastModified": "2025-01-27T15:12:45.210",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,55 +15,173 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: clk: meson: Agregar relojes faltantes a axg_clk_regmaps Faltaban algunos relojes en axg_clk_regmaps, lo que provoc\u00f3 p\u00e1nico en el kernel durante cat /sys/kernel/debug/clk/clk_summary [ 57.349402] No se puede manejar Kernel Null Pointer Derferencia en la direcci\u00f3n virtual 0000000000000001FC ... [57.430002] PState: 6000000005 (NZCV DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE = -) [57.436900] PC: RegMap_read+0x1c/0x888 [57.44060608] CLK_REGMAP_GATE_IS_Enabled+0x3c/0xb0 [57.445611] SP: FFFFF800082F1B690 [57.448888] x29: ffff800082f1b690 x28: 0000000000000000000000000000808080B9A70 [57. 000000000007 x25: 000000000000000016 X24: 000000000000000000 [57.463033] X23: FFFF800080E8B488 X22: 000000000000000015 X21: FFFFFF00000E7E7000 [57.470106] X20: FFFF00000400EC00 X19: 000000000000000000 X18: FFFFFFFFFFFFFFF [57.477178] x17: 00000000000000000000000016: 000000000000000000 X15: FFFFFFFF0000042A3000 [57.484251] X14 2fec x12: 000000000005F5E100 [57.491323] x11: ABCC77118461CEFD x10: 0000000000000020 X9: FFFF8000805E4B24 [57.498396] x8: FFFF0000028063C0 X7: FFFF800082F1B710 X6: FFFF800082F1B710 [57.505468] x5: 0000000000ffffd0 x4: ffffff800082f1b6e0 x3: 00000000001000 [57.512541] 0000000000012C x0: 000000000000000000 [57.519615] Traza de llamada: [57.522030] regMap_read+0x1c/0x88 [57.525393] clk_regmap_gate_is_enabled+ 0x3c/0xb0 [ 57.530050] clk_core_is_enabled+0x44/0x120 [ 57.534190] clk_summary_show_subtree+0x154/0x2f0 [ 57.538847] clk_summary_show_subtree+0x220/0x2f0 [ 57.543505 ] clk_summary_show_subtree+0x220/0x2f0 [ 57.548162] clk_summary_show_subtree+0x220/0x2f0 [ 57.552820] clk_summary_show_subtree+0x220/ 0x2f0 [ 57.557477] clk_summary_show_subtree+0x220/0x2f0 [ 57.562135] clk_summary_show_subtree+0x220/0x2f0 [ 57.566792] clk_summary_show_subtree+0x220/0x2f0 [ 57.571450] cl k_summary_show+0x84/0xb8 [ 57.575245] seq_read_iter+0x1bc/0x4b8 [ 57.578954] seq_read+0x8c/0xd0 [ 57.582059] full_proxy_read+0x68/0xc8 [ 57.585767] vfs_read+0xb0/0x268 [ 57.588959] ksys_read+0x70/0x108 [ 57.592236] __arm64_sys_read+0x24/0x38 [ 57.59 6031] invoke_syscall+0x50/0x128 [ 57.599740] el0_svc_common.constprop.0+0x48/ 0xf8 [ 57.604397] do_el0_svc+0x28/0x40 [ 57.607675] el0_svc+0x34/0xb8 [ 57.610694] el0t_64_sync_handler+0x13c/0x158 [ 57.615006] /0x198 [ 57.618635] C\u00f3digo: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00) [ 57.624668] -- -[ seguimiento final 0000000000000000 ]--- [jbrunet: agregar etiqueta de correcciones faltantes]" "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: clk: meson: Agregar relojes faltantes a axg_clk_regmaps Faltaban algunos relojes en axg_clk_regmaps, lo que provoc\u00f3 p\u00e1nico en el kernel durante cat /sys/kernel/debug/clk/clk_summary [ 57.349402] No se puede manejar Kernel Null Pointer Derferencia en la direcci\u00f3n virtual 0000000000000001FC ... [57.430002] PState: 6000000005 (NZCV DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE = -) [57.436900] PC: RegMap_read+0x1c/0x888 [57.44060608] CLK_REGMAP_GATE_IS_Enabled+0x3c/0xb0 [57.445611] SP: FFFFF800082F1B690 [57.448888] x29: ffff800082f1b690 x28: 0000000000000000000000000000808080B9A70 [57. 000000000007 x25: 000000000000000016 X24: 000000000000000000 [57.463033] X23: FFFF800080E8B488 X22: 000000000000000015 X21: FFFFFF00000E7E7000 [57.470106] X20: FFFF00000400EC00 X19: 000000000000000000 X18: FFFFFFFFFFFFFFF [57.477178] x17: 00000000000000000000000016: 000000000000000000 X15: FFFFFFFF0000042A3000 [57.484251] X14 2fec x12: 000000000005F5E100 [57.491323] x11: ABCC77118461CEFD x10: 0000000000000020 X9: FFFF8000805E4B24 [57.498396] x8: FFFF0000028063C0 X7: FFFF800082F1B710 X6: FFFF800082F1B710 [57.505468] x5: 0000000000ffffd0 x4: ffffff800082f1b6e0 x3: 00000000001000 [57.512541] 0000000000012C x0: 000000000000000000 [57.519615] Traza de llamada: [57.522030] regMap_read+0x1c/0x88 [57.525393] clk_regmap_gate_is_enabled+ 0x3c/0xb0 [ 57.530050] clk_core_is_enabled+0x44/0x120 [ 57.534190] clk_summary_show_subtree+0x154/0x2f0 [ 57.538847] clk_summary_show_subtree+0x220/0x2f0 [ 57.543505 ] clk_summary_show_subtree+0x220/0x2f0 [ 57.548162] clk_summary_show_subtree+0x220/0x2f0 [ 57.552820] clk_summary_show_subtree+0x220/ 0x2f0 [ 57.557477] clk_summary_show_subtree+0x220/0x2f0 [ 57.562135] clk_summary_show_subtree+0x220/0x2f0 [ 57.566792] clk_summary_show_subtree+0x220/0x2f0 [ 57.571450] cl k_summary_show+0x84/0xb8 [ 57.575245] seq_read_iter+0x1bc/0x4b8 [ 57.578954] seq_read+0x8c/0xd0 [ 57.582059] full_proxy_read+0x68/0xc8 [ 57.585767] vfs_read+0xb0/0x268 [ 57.588959] ksys_read+0x70/0x108 [ 57.592236] __arm64_sys_read+0x24/0x38 [ 57.59 6031] invoke_syscall+0x50/0x128 [ 57.599740] el0_svc_common.constprop.0+0x48/ 0xf8 [ 57.604397] do_el0_svc+0x28/0x40 [ 57.607675] el0_svc+0x34/0xb8 [ 57.610694] el0t_64_sync_handler+0x13c/0x158 [ 57.615006] /0x198 [ 57.618635] C\u00f3digo: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00) [ 57.624668] -- -[ seguimiento final 0000000000000000 ]--- [jbrunet: agregar etiqueta de correcciones faltantes]"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.153",
"matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.83",
"matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.23",
"matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.11",
"matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.2",
"matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7", "url": "https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202", "url": "https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8", "url": "https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84", "url": "https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10", "url": "https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418", "url": "https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7", "url": "https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202", "url": "https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8", "url": "https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84", "url": "https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10", "url": "https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418", "url": "https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26893", "id": "CVE-2024-26893",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:10.577", "published": "2024-04-17T11:15:10.577",
"lastModified": "2024-11-21T09:03:19.143", "lastModified": "2025-01-27T15:14:28.090",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,47 +15,152 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: arm_scmi: Correcci\u00f3n de doble liberaci\u00f3n en la ruta de limpieza del transporte SMC Cuando el c\u00f3digo SCMI gen\u00e9rico destruye un canal, llama a la funci\u00f3n de devoluci\u00f3n de llamada chan_free, definida por cada transporte. Dado que varios protocolos pueden compartir el mismo miembro transport_info, es posible que chan_free() desee limpiar el mismo miembro varias veces dentro de la implementaci\u00f3n de transporte SCMI determinada. En este caso se trata de transporte SMC. Esto dar\u00e1 lugar a una desreferencia del puntero NULL la segunda vez: | scmi_protocol scmi_dev.1: Canal TX en modo de sondeo habilitado - prot_id:16 | firmware arm-scmi: scmi: Notificaciones SCMI: n\u00facleo habilitado. | firmware arm-scmi: scmi: no se puede comunicar con SCMI | No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 | Informaci\u00f3n de cancelaci\u00f3n de memoria: | ESR = 0x0000000096000004 | EC = 0x25: DABT (EL actual), IL = 32 bits | CONJUNTO = 0, FnV = 0 | EA = 0, S1PTW = 0 | FSC = 0x04: error de traducci\u00f3n de nivel 0 | Informaci\u00f3n de cancelaci\u00f3n de datos: | ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 | CM = 0, WnR = 0, TnD = 0, Acceso a etiquetas = 0 | GCS = 0, Superposici\u00f3n = 0, DirtyBit = 0, Xs = 0 | pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000881ef8000 | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000 | Error interno: Ups: 0000000096000004 [#1] SMP ANTICIPADO | M\u00f3dulos enlazados en: | CPU: 4 PID: 1 Comunicaciones: swapper/0 No contaminado 6.7.0-rc2-00124-g455ef3d016c9-dirty #793 | Nombre del hardware: FVP Base RevC (DT) | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) | ordenador personal: smc_chan_free+0x3c/0x6c | lr: smc_chan_free+0x3c/0x6c | Rastreo de llamadas: | smc_chan_free+0x3c/0x6c | idr_for_each+0x68/0xf8 | scmi_cleanup_channels.isra.0+0x2c/0x58 | scmi_probe+0x434/0x734 | sonda_plataforma+0x68/0xd8 | realmente_probe+0x110/0x27c | __driver_probe_device+0x78/0x12c | dispositivo_sonda_controlador+0x3c/0x118 | __driver_attach+0x74/0x128 | bus_for_each_dev+0x78/0xe0 | driver_attach+0x24/0x30 | bus_add_driver+0xe4/0x1e8 | registro_controlador+0x60/0x128 | __platform_driver_register+0x28/0x34 | scmi_driver_init+0x84/0xc0 | do_one_initcall+0x78/0x33c | kernel_init_freeable+0x2b8/0x51c | kernel_init+0x24/0x130 | ret_from_fork+0x10/0x20 | C\u00f3digo: f0004701 910a0021 aa1403e5 97b91c70 (b9400280) | ---[ end trace 0000000000000000 ]--- Simplemente verifique que el puntero de estructura sea NULL antes de intentar acceder a sus miembros, para evitar esta situaci\u00f3n. Esto se encontr\u00f3 cuando un transporte realmente no funciona (por ejemplo, sin servicio SMC), las rutinas de la sonda intentan limpiarse y provocan un bloqueo." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: arm_scmi: Correcci\u00f3n de doble liberaci\u00f3n en la ruta de limpieza del transporte SMC Cuando el c\u00f3digo SCMI gen\u00e9rico destruye un canal, llama a la funci\u00f3n de devoluci\u00f3n de llamada chan_free, definida por cada transporte. Dado que varios protocolos pueden compartir el mismo miembro transport_info, es posible que chan_free() desee limpiar el mismo miembro varias veces dentro de la implementaci\u00f3n de transporte SCMI determinada. En este caso se trata de transporte SMC. Esto dar\u00e1 lugar a una desreferencia del puntero NULL la segunda vez: | scmi_protocol scmi_dev.1: Canal TX en modo de sondeo habilitado - prot_id:16 | firmware arm-scmi: scmi: Notificaciones SCMI: n\u00facleo habilitado. | firmware arm-scmi: scmi: no se puede comunicar con SCMI | No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 | Informaci\u00f3n de cancelaci\u00f3n de memoria: | ESR = 0x0000000096000004 | EC = 0x25: DABT (EL actual), IL = 32 bits | CONJUNTO = 0, FnV = 0 | EA = 0, S1PTW = 0 | FSC = 0x04: error de traducci\u00f3n de nivel 0 | Informaci\u00f3n de cancelaci\u00f3n de datos: | ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 | CM = 0, WnR = 0, TnD = 0, Acceso a etiquetas = 0 | GCS = 0, Superposici\u00f3n = 0, DirtyBit = 0, Xs = 0 | pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000881ef8000 | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000 | Error interno: Ups: 0000000096000004 [#1] SMP ANTICIPADO | M\u00f3dulos enlazados en: | CPU: 4 PID: 1 Comunicaciones: swapper/0 No contaminado 6.7.0-rc2-00124-g455ef3d016c9-dirty #793 | Nombre del hardware: FVP Base RevC (DT) | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) | ordenador personal: smc_chan_free+0x3c/0x6c | lr: smc_chan_free+0x3c/0x6c | Rastreo de llamadas: | smc_chan_free+0x3c/0x6c | idr_for_each+0x68/0xf8 | scmi_cleanup_channels.isra.0+0x2c/0x58 | scmi_probe+0x434/0x734 | sonda_plataforma+0x68/0xd8 | realmente_probe+0x110/0x27c | __driver_probe_device+0x78/0x12c | dispositivo_sonda_controlador+0x3c/0x118 | __driver_attach+0x74/0x128 | bus_for_each_dev+0x78/0xe0 | driver_attach+0x24/0x30 | bus_add_driver+0xe4/0x1e8 | registro_controlador+0x60/0x128 | __platform_driver_register+0x28/0x34 | scmi_driver_init+0x84/0xc0 | do_one_initcall+0x78/0x33c | kernel_init_freeable+0x2b8/0x51c | kernel_init+0x24/0x130 | ret_from_fork+0x10/0x20 | C\u00f3digo: f0004701 910a0021 aa1403e5 97b91c70 (b9400280) | ---[ end trace 0000000000000000 ]--- Simplemente verifique que el puntero de estructura sea NULL antes de intentar acceder a sus miembros, para evitar esta situaci\u00f3n. Esto se encontr\u00f3 cuando un transporte realmente no funciona (por ejemplo, sin servicio SMC), las rutinas de la sonda intentan limpiarse y provocan un bloqueo."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "6.1.83",
"matchCriteriaId": "E8D30B4C-D66E-4ECB-8103-8CD9DFE724AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.23",
"matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.11",
"matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.2",
"matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4", "url": "https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c", "url": "https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773", "url": "https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d", "url": "https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd", "url": "https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4", "url": "https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c", "url": "https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773", "url": "https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d", "url": "https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd", "url": "https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29101", "id": "CVE-2024-29101",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-19T16:15:12.330", "published": "2024-03-19T16:15:12.330",
"lastModified": "2024-11-21T09:07:33.363", "lastModified": "2025-01-27T16:21:01.500",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 3.7 "impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -51,14 +71,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "9CBBC8A3-6BF3-40E0-B7D7-117D6AACC714"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29106", "id": "CVE-2024-29106",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-19T16:15:14.853", "published": "2024-03-19T16:15:14.853",
"lastModified": "2024-11-21T09:07:34.030", "lastModified": "2025-01-27T16:11:23.087",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 3.7 "impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -51,14 +71,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.10.16",
"matchCriteriaId": "BB3B5CCF-3888-48D7-A872-E183BD7A9A4D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-16-cross-site-scripting-xss-vulnerability-2?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-16-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-16-cross-site-scripting-xss-vulnerability-2?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-16-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29920", "id": "CVE-2024-29920",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T08:15:39.137", "published": "2024-03-27T08:15:39.137",
"lastModified": "2024-11-21T09:08:37.313", "lastModified": "2025-01-27T15:20:38.483",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 3.7 "impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -51,14 +71,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.0",
"matchCriteriaId": "6189F804-2AA9-427A-9ADE-B53C2C65D877"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34562", "id": "CVE-2024-34562",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.193", "published": "2024-05-08T11:15:24.193",
"lastModified": "2024-11-21T09:18:56.500", "lastModified": "2025-01-27T15:20:56.620",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 3.7 "impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -51,14 +71,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.1",
"matchCriteriaId": "9BD4EB49-8A6E-4A9A-986C-4172C39A5AF0"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37527",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-27T16:15:30.840",
"lastModified": "2025-01-27T16:15:30.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7171880",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-38320",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-27T16:15:30.973",
"lastModified": "2025-01-27T16:15:30.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Protect for Virtual Environments: Data Protection for VMware\u00a0and Storage Protect Backup-Archive Client 8.1.0.0 through 8.1.23.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7173462",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7173465",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38325",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-27T16:15:31.117",
"lastModified": "2025-01-27T16:15:31.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd CLI \n\ncould allow a remote attacker to obtain sensitive information, caused by sending network requests over an insecure channel. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7168640",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3879", "id": "CVE-2024-3879",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T19:15:08.133", "published": "2024-04-16T19:15:08.133",
"lastModified": "2024-11-21T09:30:37.120", "lastModified": "2025-01-27T16:24:40.757",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,40 +94,111 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*",
"matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260913", "url": "https://vuldb.com/?ctiid.260913",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260913", "url": "https://vuldb.com/?id.260913",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312822", "url": "https://vuldb.com/?submit.312822",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260913", "url": "https://vuldb.com/?ctiid.260913",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260913", "url": "https://vuldb.com/?id.260913",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312822", "url": "https://vuldb.com/?submit.312822",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3880", "id": "CVE-2024-3880",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T19:15:08.357", "published": "2024-04-16T19:15:08.357",
"lastModified": "2024-11-21T09:30:37.263", "lastModified": "2025-01-27T16:24:26.973",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -76,38 +96,99 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*",
"matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260914", "url": "https://vuldb.com/?ctiid.260914",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260914", "url": "https://vuldb.com/?id.260914",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312823", "url": "https://vuldb.com/?submit.312823",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260914", "url": "https://vuldb.com/?ctiid.260914",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260914", "url": "https://vuldb.com/?id.260914",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312823", "url": "https://vuldb.com/?submit.312823",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3881", "id": "CVE-2024-3881",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T20:15:10.280", "published": "2024-04-16T20:15:10.280",
"lastModified": "2024-11-21T09:30:37.407", "lastModified": "2025-01-27T16:25:02.423",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,40 +94,111 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*",
"matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260915", "url": "https://vuldb.com/?ctiid.260915",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260915", "url": "https://vuldb.com/?id.260915",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312824", "url": "https://vuldb.com/?submit.312824",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260915", "url": "https://vuldb.com/?ctiid.260915",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260915", "url": "https://vuldb.com/?id.260915",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312824", "url": "https://vuldb.com/?submit.312824",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3882", "id": "CVE-2024-3882",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-16T20:15:10.523", "published": "2024-04-16T20:15:10.523",
"lastModified": "2024-11-21T09:30:37.540", "lastModified": "2025-01-27T16:24:52.420",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,40 +94,111 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*",
"matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260916", "url": "https://vuldb.com/?ctiid.260916",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260916", "url": "https://vuldb.com/?id.260916",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312825", "url": "https://vuldb.com/?submit.312825",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.260916", "url": "https://vuldb.com/?ctiid.260916",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.260916", "url": "https://vuldb.com/?id.260916",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.312825", "url": "https://vuldb.com/?submit.312825",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4111", "id": "CVE-2024-4111",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-24T14:15:45.713", "published": "2024-04-24T14:15:45.713",
"lastModified": "2024-11-21T09:42:12.460", "lastModified": "2025-01-27T16:25:51.970",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,40 +94,111 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.261854", "url": "https://vuldb.com/?ctiid.261854",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.261854", "url": "https://vuldb.com/?id.261854",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.317205", "url": "https://vuldb.com/?submit.317205",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.261854", "url": "https://vuldb.com/?ctiid.261854",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.261854", "url": "https://vuldb.com/?id.261854",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.317205", "url": "https://vuldb.com/?submit.317205",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4112", "id": "CVE-2024-4112",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-24T15:15:48.667", "published": "2024-04-24T15:15:48.667",
"lastModified": "2024-11-21T09:42:12.590", "lastModified": "2025-01-27T16:25:42.507",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,40 +94,111 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.261855", "url": "https://vuldb.com/?ctiid.261855",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.261855", "url": "https://vuldb.com/?id.261855",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.317206", "url": "https://vuldb.com/?submit.317206",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.261855", "url": "https://vuldb.com/?ctiid.261855",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.261855", "url": "https://vuldb.com/?id.261855",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.317206", "url": "https://vuldb.com/?submit.317206",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4114", "id": "CVE-2024-4114",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-24T15:15:49.107", "published": "2024-04-24T15:15:49.107",
"lastModified": "2024-11-21T09:42:12.847", "lastModified": "2025-01-27T16:37:59.997",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -74,40 +94,111 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.261857", "url": "https://vuldb.com/?ctiid.261857",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.261857", "url": "https://vuldb.com/?id.261857",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.317218", "url": "https://vuldb.com/?submit.317218",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md", "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.261857", "url": "https://vuldb.com/?ctiid.261857",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.261857", "url": "https://vuldb.com/?id.261857",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.317218", "url": "https://vuldb.com/?submit.317218",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45598",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-27T16:15:31.267",
"lastModified": "2025-01-27T16:15:31.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50697", "id": "CVE-2024-50697",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:09.253", "published": "2025-01-24T23:15:09.253",
"lastModified": "2025-01-24T23:15:09.253", "lastModified": "2025-01-27T16:15:31.423",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow." "value": "In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow."
},
{
"lang": "es",
"value": "En SunGrow WiNet-SV200.001.00.P027 y versiones anteriores, al descifrar mensajes MQTT, el c\u00f3digo que analiza campos TLV espec\u00edficos no tiene suficientes comprobaciones de los l\u00edmites. Esto puede provocar un desbordamiento del b\u00fafer basado en la pila."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961", "url": "https://en.sungrowpower.com/security-notice-detail-2/5961",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57590",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-27T15:15:11.463",
"lastModified": "2025-01-27T15:15:11.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface \"ntp_sync.cgi\",which allows remote attackers to execute arbitrary commands via parameter \"ntp_server\" passed to the \"ntp_sync.cgi\" binary through a POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/tew632/ntp_sync.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-57595",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-27T15:15:11.580",
"lastModified": "2025-01-27T16:15:31.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter \"wps_pin\" passed to the apc_client_pin.cgi binary through a POST request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23529",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:11.813",
"lastModified": "2025-01-27T15:15:11.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Blokhaus Minterpress allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Minterpress: from n/a through 1.0.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/minterpress/vulnerability/wordpress-minterpress-plugin-1-0-5-arbitrary-content-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23531",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:11.963",
"lastModified": "2025-01-27T15:15:11.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David F. Carr RSVPMaker Volunteer Roles allows Reflected XSS. This issue affects RSVPMaker Volunteer Roles: from n/a through 1.5.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rsvpmaker-volunteer-roles/vulnerability/wordpress-rsvpmaker-volunteer-roles-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23574",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:12.123",
"lastModified": "2025-01-27T15:15:12.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jonathan Lau CubePM allows Reflected XSS. This issue affects CubePM: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/cubepm/vulnerability/wordpress-cubepm-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23656",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:12.267",
"lastModified": "2025-01-27T15:15:12.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Saul Morales Pacheco Donate visa allows Stored XSS. This issue affects Donate visa: from n/a through 1.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/donate-visa/vulnerability/wordpress-donate-visa-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23669",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:12.423",
"lastModified": "2025-01-27T15:15:12.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nurul Amin, Mohammad Saiful Islam WP Smart Tooltip allows Stored XSS. This issue affects WP Smart Tooltip: from n/a through 1.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-smart-tool-tip/vulnerability/wordpress-wp-smart-tooltip-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23752",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:12.570",
"lastModified": "2025-01-27T15:15:12.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CGD Arrange Terms allows Reflected XSS. This issue affects CGD Arrange Terms: from n/a through 1.1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/shopp-arrange/vulnerability/wordpress-cgd-arrange-terms-plugin-1-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23754",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:12.727",
"lastModified": "2025-01-27T15:15:12.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ulrich Sossou The Loops allows Reflected XSS. This issue affects The Loops: from n/a through 1.0.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/the-loops/vulnerability/wordpress-the-loops-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23756",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:12.877",
"lastModified": "2025-01-27T15:15:12.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivan Chernyakov LawPress \u2013 Law Firm Website Management allows Reflected XSS. This issue affects LawPress \u2013 Law Firm Website Management: from n/a through 1.4.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/lawpress/vulnerability/wordpress-lawpress-plugin-1-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23849",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:13.087",
"lastModified": "2025-01-27T15:15:13.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Benjamin Piwowarski PAPERCITE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PAPERCITE: from n/a through 0.5.18."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/papercite/vulnerability/wordpress-papercite-plugin-0-5-18-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23982",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:13.247",
"lastModified": "2025-01-27T15:15:13.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Marian Kanev Cab fare calculator allows Stored XSS. This issue affects Cab fare calculator: from n/a through 1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/cab-fare-calculator/vulnerability/wordpress-fare-calculator-plugin-1-1-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24537",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:13.440",
"lastModified": "2025-01-27T15:15:13.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in The Events Calendar The Events Calendar allows Cross Site Request Forgery. This issue affects The Events Calendar: from n/a through 6.7.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/the-events-calendar/vulnerability/wordpress-the-events-calendar-plugin-6-7-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24538",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:13.607",
"lastModified": "2025-01-27T15:15:13.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in slaFFik BuddyPress Groups Extras allows Cross Site Request Forgery. This issue affects BuddyPress Groups Extras: from n/a through 3.6.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/buddypress-groups-extras/vulnerability/wordpress-buddypress-groups-extras-plugin-3-6-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24540",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:13.753",
"lastModified": "2025-01-27T15:15:13.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd allows Cross Site Request Forgery. This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through 6.18.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/coming-soon/vulnerability/wordpress-website-builder-by-seedprod-plugin-6-18-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24590",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:13.947",
"lastModified": "2025-01-27T15:15:13.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Haptiq picu \u2013 Online Photo Proofing Gallery allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects picu \u2013 Online Photo Proofing Gallery: from n/a through 2.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/picu/vulnerability/wordpress-picu-online-photo-proofing-gallery-plugin-2-4-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24593",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:14.090",
"lastModified": "2025-01-27T15:15:14.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge allows Reflected XSS. This issue affects Edwiser Bridge: from n/a through 3.0.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/edwiser-bridge/vulnerability/wordpress-edwiser-bridge-plugin-3-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24600",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:14.233",
"lastModified": "2025-01-27T15:15:14.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in David F. Carr RSVPMarker . This issue affects RSVPMarker : from n/a through 11.4.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rsvpmaker/vulnerability/wordpress-rsvpmaker-plugin-11-4-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24603",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:14.437",
"lastModified": "2025-01-27T15:15:14.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in UkrSolution Print Barcode Labels for your WooCommerce products/orders. This issue affects Print Barcode Labels for your WooCommerce products/orders: from n/a through 3.4.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/a4-barcode-generator/vulnerability/wordpress-print-labels-with-barcodes-create-price-tags-product-labels-order-labels-for-woocommerce-plugin-3-4-10-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24606",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:14.587",
"lastModified": "2025-01-27T15:15:14.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Sprout Invoices Client Invoicing by Sprout Invoices allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Client Invoicing by Sprout Invoices: from n/a through 20.8.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/sprout-invoices/vulnerability/wordpress-client-invoicing-by-sprout-invoices-easy-estimates-and-invoices-for-wordpress-plugin-20-8-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24626",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:14.777",
"lastModified": "2025-01-27T15:15:14.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Music Store allows Reflected XSS. This issue affects Music Store: from n/a through 1.1.19."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/music-store/vulnerability/wordpress-music-store-wordpress-ecommerce-plugin-1-1-19-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24628",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:14.923",
"lastModified": "2025-01-27T15:15:14.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in BestWebSoft Google Captcha allows Identity Spoofing. This issue affects Google Captcha: from n/a through 1.78."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/google-captcha/vulnerability/wordpress-recaptcha-by-bestwebsoft-plugin-1-78-captcha-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24653",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:15.070",
"lastModified": "2025-01-27T15:15:15.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound Admin and Site Enhancements (ASE) Pro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Admin and Site Enhancements (ASE) Pro: from n/a through 7.6.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/admin-site-enhancements-pro/vulnerability/wordpress-admin-and-site-enhancements-ase-pro-plugin-7-6-1-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24662",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:15.227",
"lastModified": "2025-01-27T15:15:15.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound LearnDash LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LearnDash LMS: from n/a through 4.20.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/sfwd-lms/vulnerability/wordpress-learndash-lms-plugin-4-20-0-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24665",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:15.427",
"lastModified": "2025-01-27T15:15:15.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Small Package Quotes \u2013 Unishippers Edition allows SQL Injection. This issue affects Small Package Quotes \u2013 Unishippers Edition: from n/a through 2.4.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/small-package-quotes-unishippers-edition/vulnerability/wordpress-small-package-quotes-plugin-2-4-8-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24667",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:15.563",
"lastModified": "2025-01-27T15:15:15.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Small Package Quotes \u2013 Worldwide Express Edition allows SQL Injection. This issue affects Small Package Quotes \u2013 Worldwide Express Edition: from n/a through 5.2.17."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/small-package-quotes-wwe-edition/vulnerability/wordpress-small-package-quotes-plugin-5-2-17-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24671",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:15.703",
"lastModified": "2025-01-27T15:15:15.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Object Injection. This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 4.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/save-as-pdf-by-pdfcrowd/vulnerability/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-4-4-0-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24680",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:15.863",
"lastModified": "2025-01-27T15:15:15.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WpMultiStoreLocator WP Multi Store Locator allows Reflected XSS. This issue affects WP Multi Store Locator: from n/a through 2.4.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-multi-store-locator/vulnerability/wordpress-wp-multi-store-locator-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24689",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.073",
"lastModified": "2025-01-27T15:15:16.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-538"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/import-users-from-csv-with-meta/vulnerability/wordpress-import-and-export-users-and-customers-plugin-1-27-12-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24708",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.230",
"lastModified": "2025-01-27T15:15:16.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks WP Dynamics CRM for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms allows Reflected XSS. This issue affects WP Dynamics CRM for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through 1.1.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/cf7-dynamics-crm/vulnerability/wordpress-wp-dynamics-crm-plugin-1-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24734",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.390",
"lastModified": "2025-01-27T15:15:16.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CodeSolz Better Find and Replace allows Privilege Escalation. This issue affects Better Find and Replace: from n/a through 1.6.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/real-time-auto-find-and-replace/vulnerability/wordpress-better-find-and-replace-plugin-1-6-7-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24740",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.537",
"lastModified": "2025-01-27T15:15:16.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in ThimPress LearnPress. This issue affects LearnPress: from n/a through 4.2.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/learnpress/vulnerability/wordpress-learnpress-plugin-4-2-7-1-open-redirection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24741",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.680",
"lastModified": "2025-01-27T15:15:16.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in KB Support KB Support. This issue affects KB Support: from n/a through 1.6.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/kb-support/vulnerability/wordpress-kb-support-plugin-1-6-7-open-redirection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24742",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.830",
"lastModified": "2025-01-27T15:15:16.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Go Maps (formerly WP Google Maps) WP Go Maps. This issue affects WP Go Maps: from n/a through 9.0.40."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-google-maps/vulnerability/wordpress-wp-google-maps-plugin-9-0-40-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24743",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:16.977",
"lastModified": "2025-01-27T15:15:16.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor. This issue affects RomethemeKit For Elementor: from n/a through 1.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rometheme-for-elementor/vulnerability/wordpress-romethemekit-for-elementor-plugin-1-5-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:17.117",
"lastModified": "2025-01-27T15:15:17.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound Bridge Core. This issue affects Bridge Core: from n/a through 3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/bridge-core/vulnerability/wordpress-bridge-core-plugin-3-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24747",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:17.253",
"lastModified": "2025-01-27T15:15:17.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Houzez.co Houzez. This issue affects Houzez: from n/a through 3.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-theme-3-4-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24782",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-27T15:15:17.450",
"lastModified": "2025-01-27T15:15:17.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpWax Post Grid, Slider & Carousel Ultimate allows PHP Local File Inclusion. This issue affects Post Grid, Slider & Carousel Ultimate: from n/a through 1.6.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-grid-carousel-ultimate/vulnerability/wordpress-post-grid-slider-carousel-ultimate-with-shortcode-gutenberg-block-elementor-widget-plugin-1-6-10-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2025-24783",
"sourceIdentifier": "security@apache.org",
"published": "2025-01-27T15:15:17.610",
"lastModified": "2025-01-27T15:15:17.610",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "security@apache.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon.\n\nThis issue affects Apache Cocoon: all versions.\n\nWhen a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have been sufficiently unpredictable, and an attacker could use this to guess continuation ids and look up continuations they should not have had access to.\n\nAs a mitigation, you may enable the \"session-bound-continuations\" option to make sure continuations are not shared across sessions.\n\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-335"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/pk86jp5cvn41432op8wv1k8p14mp27nz",
"source": "security@apache.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-01-27T15:00:20.341465+00:00 2025-01-27T17:00:41.178643+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-01-27T14:59:26.887000+00:00 2025-01-27T16:56:47.900000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,50 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
279038 279084
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `12` Recently added CVEs: `46`
- [CVE-2022-4975](CVE-2022/CVE-2022-49xx/CVE-2022-4975.json) (`2025-01-27T14:15:27.210`) - [CVE-2025-24540](CVE-2025/CVE-2025-245xx/CVE-2025-24540.json) (`2025-01-27T15:15:13.753`)
- [CVE-2024-11348](CVE-2024/CVE-2024-113xx/CVE-2024-11348.json) (`2025-01-27T14:15:27.973`) - [CVE-2025-24590](CVE-2025/CVE-2025-245xx/CVE-2025-24590.json) (`2025-01-27T15:15:13.947`)
- [CVE-2025-22513](CVE-2025/CVE-2025-225xx/CVE-2025-22513.json) (`2025-01-27T14:15:28.233`) - [CVE-2025-24593](CVE-2025/CVE-2025-245xx/CVE-2025-24593.json) (`2025-01-27T15:15:14.090`)
- [CVE-2025-23457](CVE-2025/CVE-2025-234xx/CVE-2025-23457.json) (`2025-01-27T14:15:28.373`) - [CVE-2025-24600](CVE-2025/CVE-2025-246xx/CVE-2025-24600.json) (`2025-01-27T15:15:14.233`)
- [CVE-2025-23792](CVE-2025/CVE-2025-237xx/CVE-2025-23792.json) (`2025-01-27T14:15:28.510`) - [CVE-2025-24603](CVE-2025/CVE-2025-246xx/CVE-2025-24603.json) (`2025-01-27T15:15:14.437`)
- [CVE-2025-24533](CVE-2025/CVE-2025-245xx/CVE-2025-24533.json) (`2025-01-27T14:15:28.653`) - [CVE-2025-24606](CVE-2025/CVE-2025-246xx/CVE-2025-24606.json) (`2025-01-27T15:15:14.587`)
- [CVE-2025-24584](CVE-2025/CVE-2025-245xx/CVE-2025-24584.json) (`2025-01-27T14:15:28.797`) - [CVE-2025-24626](CVE-2025/CVE-2025-246xx/CVE-2025-24626.json) (`2025-01-27T15:15:14.777`)
- [CVE-2025-24601](CVE-2025/CVE-2025-246xx/CVE-2025-24601.json) (`2025-01-27T14:15:28.927`) - [CVE-2025-24628](CVE-2025/CVE-2025-246xx/CVE-2025-24628.json) (`2025-01-27T15:15:14.923`)
- [CVE-2025-24612](CVE-2025/CVE-2025-246xx/CVE-2025-24612.json) (`2025-01-27T14:15:29.063`) - [CVE-2025-24653](CVE-2025/CVE-2025-246xx/CVE-2025-24653.json) (`2025-01-27T15:15:15.070`)
- [CVE-2025-24664](CVE-2025/CVE-2025-246xx/CVE-2025-24664.json) (`2025-01-27T14:15:29.197`) - [CVE-2025-24662](CVE-2025/CVE-2025-246xx/CVE-2025-24662.json) (`2025-01-27T15:15:15.227`)
- [CVE-2025-24685](CVE-2025/CVE-2025-246xx/CVE-2025-24685.json) (`2025-01-27T14:15:29.333`) - [CVE-2025-24665](CVE-2025/CVE-2025-246xx/CVE-2025-24665.json) (`2025-01-27T15:15:15.427`)
- [CVE-2025-24754](CVE-2025/CVE-2025-247xx/CVE-2025-24754.json) (`2025-01-27T14:15:29.477`) - [CVE-2025-24667](CVE-2025/CVE-2025-246xx/CVE-2025-24667.json) (`2025-01-27T15:15:15.563`)
- [CVE-2025-24671](CVE-2025/CVE-2025-246xx/CVE-2025-24671.json) (`2025-01-27T15:15:15.703`)
- [CVE-2025-24680](CVE-2025/CVE-2025-246xx/CVE-2025-24680.json) (`2025-01-27T15:15:15.863`)
- [CVE-2025-24689](CVE-2025/CVE-2025-246xx/CVE-2025-24689.json) (`2025-01-27T15:15:16.073`)
- [CVE-2025-24708](CVE-2025/CVE-2025-247xx/CVE-2025-24708.json) (`2025-01-27T15:15:16.230`)
- [CVE-2025-24734](CVE-2025/CVE-2025-247xx/CVE-2025-24734.json) (`2025-01-27T15:15:16.390`)
- [CVE-2025-24740](CVE-2025/CVE-2025-247xx/CVE-2025-24740.json) (`2025-01-27T15:15:16.537`)
- [CVE-2025-24741](CVE-2025/CVE-2025-247xx/CVE-2025-24741.json) (`2025-01-27T15:15:16.680`)
- [CVE-2025-24742](CVE-2025/CVE-2025-247xx/CVE-2025-24742.json) (`2025-01-27T15:15:16.830`)
- [CVE-2025-24743](CVE-2025/CVE-2025-247xx/CVE-2025-24743.json) (`2025-01-27T15:15:16.977`)
- [CVE-2025-24744](CVE-2025/CVE-2025-247xx/CVE-2025-24744.json) (`2025-01-27T15:15:17.117`)
- [CVE-2025-24747](CVE-2025/CVE-2025-247xx/CVE-2025-24747.json) (`2025-01-27T15:15:17.253`)
- [CVE-2025-24782](CVE-2025/CVE-2025-247xx/CVE-2025-24782.json) (`2025-01-27T15:15:17.450`)
- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-27T15:15:17.610`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `19` Recently modified CVEs: `25`
- [CVE-2023-37029](CVE-2023/CVE-2023-370xx/CVE-2023-37029.json) (`2025-01-27T14:39:48.927`) - [CVE-2021-47183](CVE-2021/CVE-2021-471xx/CVE-2021-47183.json) (`2025-01-27T15:03:17.013`)
- [CVE-2023-37030](CVE-2023/CVE-2023-370xx/CVE-2023-37030.json) (`2025-01-27T14:34:58.587`) - [CVE-2023-35888](CVE-2023/CVE-2023-358xx/CVE-2023-35888.json) (`2025-01-27T15:18:19.737`)
- [CVE-2023-37031](CVE-2023/CVE-2023-370xx/CVE-2023-37031.json) (`2025-01-27T14:32:16.700`) - [CVE-2023-52646](CVE-2023/CVE-2023-526xx/CVE-2023-52646.json) (`2025-01-27T15:09:48.333`)
- [CVE-2023-37032](CVE-2023/CVE-2023-370xx/CVE-2023-37032.json) (`2025-01-27T14:34:38.477`) - [CVE-2024-10360](CVE-2024/CVE-2024-103xx/CVE-2024-10360.json) (`2025-01-27T15:19:13.047`)
- [CVE-2023-37033](CVE-2023/CVE-2023-370xx/CVE-2023-37033.json) (`2025-01-27T14:32:02.720`) - [CVE-2024-12774](CVE-2024/CVE-2024-127xx/CVE-2024-12774.json) (`2025-01-27T15:15:09.803`)
- [CVE-2023-37034](CVE-2023/CVE-2023-370xx/CVE-2023-37034.json) (`2025-01-27T14:34:20.203`) - [CVE-2024-2131](CVE-2024/CVE-2024-21xx/CVE-2024-2131.json) (`2025-01-27T15:20:06.373`)
- [CVE-2023-37036](CVE-2023/CVE-2023-370xx/CVE-2023-37036.json) (`2025-01-27T14:31:51.503`) - [CVE-2024-2255](CVE-2024/CVE-2024-22xx/CVE-2024-2255.json) (`2025-01-27T15:26:09.810`)
- [CVE-2023-37037](CVE-2023/CVE-2023-370xx/CVE-2023-37037.json) (`2025-01-27T14:34:03.640`) - [CVE-2024-2558](CVE-2024/CVE-2024-25xx/CVE-2024-2558.json) (`2025-01-27T16:56:47.900`)
- [CVE-2023-37038](CVE-2023/CVE-2023-370xx/CVE-2023-37038.json) (`2025-01-27T14:31:33.687`) - [CVE-2024-2559](CVE-2024/CVE-2024-25xx/CVE-2024-2559.json) (`2025-01-27T16:50:41.160`)
- [CVE-2024-24416](CVE-2024/CVE-2024-244xx/CVE-2024-24416.json) (`2025-01-27T14:33:50.793`) - [CVE-2024-26863](CVE-2024/CVE-2024-268xx/CVE-2024-26863.json) (`2025-01-27T15:05:39.390`)
- [CVE-2024-24417](CVE-2024/CVE-2024-244xx/CVE-2024-24417.json) (`2025-01-27T14:30:53.340`) - [CVE-2024-26866](CVE-2024/CVE-2024-268xx/CVE-2024-26866.json) (`2025-01-27T15:08:19.563`)
- [CVE-2024-24418](CVE-2024/CVE-2024-244xx/CVE-2024-24418.json) (`2025-01-27T14:33:26.093`) - [CVE-2024-26879](CVE-2024/CVE-2024-268xx/CVE-2024-26879.json) (`2025-01-27T15:12:45.210`)
- [CVE-2024-24419](CVE-2024/CVE-2024-244xx/CVE-2024-24419.json) (`2025-01-27T14:29:49.253`) - [CVE-2024-26893](CVE-2024/CVE-2024-268xx/CVE-2024-26893.json) (`2025-01-27T15:14:28.090`)
- [CVE-2024-24422](CVE-2024/CVE-2024-244xx/CVE-2024-24422.json) (`2025-01-27T14:32:56.950`) - [CVE-2024-29101](CVE-2024/CVE-2024-291xx/CVE-2024-29101.json) (`2025-01-27T16:21:01.500`)
- [CVE-2024-24423](CVE-2024/CVE-2024-244xx/CVE-2024-24423.json) (`2025-01-27T14:39:57.160`) - [CVE-2024-29106](CVE-2024/CVE-2024-291xx/CVE-2024-29106.json) (`2025-01-27T16:11:23.087`)
- [CVE-2024-26649](CVE-2024/CVE-2024-266xx/CVE-2024-26649.json) (`2025-01-27T14:50:35.380`) - [CVE-2024-29920](CVE-2024/CVE-2024-299xx/CVE-2024-29920.json) (`2025-01-27T15:20:38.483`)
- [CVE-2024-26770](CVE-2024/CVE-2024-267xx/CVE-2024-26770.json) (`2025-01-27T14:58:19.130`) - [CVE-2024-34562](CVE-2024/CVE-2024-345xx/CVE-2024-34562.json) (`2025-01-27T15:20:56.620`)
- [CVE-2024-26771](CVE-2024/CVE-2024-267xx/CVE-2024-26771.json) (`2025-01-27T14:59:26.887`) - [CVE-2024-3879](CVE-2024/CVE-2024-38xx/CVE-2024-3879.json) (`2025-01-27T16:24:40.757`)
- [CVE-2024-56012](CVE-2024/CVE-2024-560xx/CVE-2024-56012.json) (`2025-01-27T14:15:28.123`) - [CVE-2024-3880](CVE-2024/CVE-2024-38xx/CVE-2024-3880.json) (`2025-01-27T16:24:26.973`)
- [CVE-2024-3881](CVE-2024/CVE-2024-38xx/CVE-2024-3881.json) (`2025-01-27T16:25:02.423`)
- [CVE-2024-3882](CVE-2024/CVE-2024-38xx/CVE-2024-3882.json) (`2025-01-27T16:24:52.420`)
- [CVE-2024-4111](CVE-2024/CVE-2024-41xx/CVE-2024-4111.json) (`2025-01-27T16:25:51.970`)
- [CVE-2024-4112](CVE-2024/CVE-2024-41xx/CVE-2024-4112.json) (`2025-01-27T16:25:42.507`)
- [CVE-2024-4114](CVE-2024/CVE-2024-41xx/CVE-2024-4114.json) (`2025-01-27T16:37:59.997`)
- [CVE-2024-50697](CVE-2024/CVE-2024-506xx/CVE-2024-50697.json) (`2025-01-27T16:15:31.423`)
## Download and Usage ## Download and Usage

View File

@ -187405,7 +187405,7 @@ CVE-2021-47179,0,0,a8b6b384d1d3dd4500e62419e8055586dec0b9099243b3a6cfff7cfb16fe0
CVE-2021-47180,0,0,04d7ef49a6dbe27745e9ac88054127415a124aa60051eed7e0cd4e5e824fa8ec,2025-01-07T17:17:24.333000 CVE-2021-47180,0,0,04d7ef49a6dbe27745e9ac88054127415a124aa60051eed7e0cd4e5e824fa8ec,2025-01-07T17:17:24.333000
CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000 CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000
CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000 CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000
CVE-2021-47183,0,0,a9bb398532188a17f9d9e7e29a9240ceb3bcc107d2c5780a8514f84cafb3d1b7,2024-11-21T06:35:34.553000 CVE-2021-47183,0,1,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000
CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000 CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000
CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000 CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000
CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f266c2,2024-11-21T06:35:35.017000 CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f266c2,2024-11-21T06:35:35.017000
@ -213152,7 +213152,7 @@ CVE-2022-4971,0,0,8284339847d56a982dc79d79b0900fdcef988337c6504d3d0fb43eff5f9bcb
CVE-2022-4972,0,0,dd0bba328c6c263b4470904688c48aab55242d31bd9c6ea9c0560b0bf0ebaa74,2024-10-30T16:34:55.117000 CVE-2022-4972,0,0,dd0bba328c6c263b4470904688c48aab55242d31bd9c6ea9c0560b0bf0ebaa74,2024-10-30T16:34:55.117000
CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000 CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000
CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000 CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000
CVE-2022-4975,1,1,01b913d27018a4d1ce8e2ab1ba4724f4889aeeacd0fc1868c7495ed6a4688be3,2025-01-27T14:15:27.210000 CVE-2022-4975,0,0,01b913d27018a4d1ce8e2ab1ba4724f4889aeeacd0fc1868c7495ed6a4688be3,2025-01-27T14:15:27.210000
CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000 CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000
CVE-2023-0002,0,0,d4360529168fea353efb6226181fd2ab0e85944e3049df689718cf07491ef7ac,2024-11-21T07:36:22.187000 CVE-2023-0002,0,0,d4360529168fea353efb6226181fd2ab0e85944e3049df689718cf07491ef7ac,2024-11-21T07:36:22.187000
CVE-2023-0003,0,0,ce4e4eb40c2c38c502dbf8359644cc1e23facd857372a9d601cc7545a4ea8d79,2024-11-21T07:36:22.303000 CVE-2023-0003,0,0,ce4e4eb40c2c38c502dbf8359644cc1e23facd857372a9d601cc7545a4ea8d79,2024-11-21T07:36:22.303000
@ -227738,7 +227738,7 @@ CVE-2023-35883,0,0,1e723e1a6d59575047eab3ce3444e746ff2622c5d1776b171d1151a445f40
CVE-2023-35884,0,0,18c3d22c18d47b7a585cf213aa70ca7b99505e03785725084d5822812652b215,2024-11-21T08:08:55.010000 CVE-2023-35884,0,0,18c3d22c18d47b7a585cf213aa70ca7b99505e03785725084d5822812652b215,2024-11-21T08:08:55.010000
CVE-2023-35885,0,0,9ca1f5f1779561172eaee3069b6e3eec6f3050b1039f21143b0b68665e5754fb,2024-12-09T19:15:11.947000 CVE-2023-35885,0,0,9ca1f5f1779561172eaee3069b6e3eec6f3050b1039f21143b0b68665e5754fb,2024-12-09T19:15:11.947000
CVE-2023-35887,0,0,76a5831afd9a0cf68a148a72ecedb4d9f74013a2c1d65482318d9531cedc3be8,2024-11-21T08:08:55.333000 CVE-2023-35887,0,0,76a5831afd9a0cf68a148a72ecedb4d9f74013a2c1d65482318d9531cedc3be8,2024-11-21T08:08:55.333000
CVE-2023-35888,0,0,725560018e0ddb8a5b9947afa13a1ec3a43e86e36f132dc3b9b8225336c6d97f,2024-11-21T08:08:55.497000 CVE-2023-35888,0,1,9fdf7c421ec865773f38e3f577a45d6831a6864d4758ea608686063dbfc76618,2025-01-27T15:18:19.737000
CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3bd7,2024-11-21T08:17:36.953000 CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3bd7,2024-11-21T08:17:36.953000
CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000 CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000
CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000 CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000
@ -228661,17 +228661,17 @@ CVE-2023-37025,0,0,33bc7b812664e9275c3bfb23b6d53cbfefd4368ab864d63e6acddf0e1a53b
CVE-2023-37026,0,0,61e46660d78cf955ae84e8e6591d596e7e87156504936378555fdb48a5003b9e,2025-01-23T18:15:28.537000 CVE-2023-37026,0,0,61e46660d78cf955ae84e8e6591d596e7e87156504936378555fdb48a5003b9e,2025-01-23T18:15:28.537000
CVE-2023-37027,0,0,91beb5dd340a2ca54c55e25ee0aabe436b43c2179e0c9e4ab7d35730b3f91707,2025-01-23T16:15:32.543000 CVE-2023-37027,0,0,91beb5dd340a2ca54c55e25ee0aabe436b43c2179e0c9e4ab7d35730b3f91707,2025-01-23T16:15:32.543000
CVE-2023-37028,0,0,b17f27dec429070f83800c68afdc54fd88a66eb2c6dd49083c00e6201303a0bc,2025-01-23T16:15:32.740000 CVE-2023-37028,0,0,b17f27dec429070f83800c68afdc54fd88a66eb2c6dd49083c00e6201303a0bc,2025-01-23T16:15:32.740000
CVE-2023-37029,0,1,20555aa0e429f62fcc758a828ad1093a7dcae95378abc0a82b9d5583c33dcd36,2025-01-27T14:39:48.927000 CVE-2023-37029,0,0,20555aa0e429f62fcc758a828ad1093a7dcae95378abc0a82b9d5583c33dcd36,2025-01-27T14:39:48.927000
CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000 CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000
CVE-2023-37030,0,1,ffd423437931da3f61709e7a52b13f2770c749e8b8eb74ad736dfe43de31f387,2025-01-27T14:34:58.587000 CVE-2023-37030,0,0,ffd423437931da3f61709e7a52b13f2770c749e8b8eb74ad736dfe43de31f387,2025-01-27T14:34:58.587000
CVE-2023-37031,0,1,e8ab243977e63a8e590eea1f8ec81d5d047e2e8868f118818cec508973bf6af9,2025-01-27T14:32:16.700000 CVE-2023-37031,0,0,e8ab243977e63a8e590eea1f8ec81d5d047e2e8868f118818cec508973bf6af9,2025-01-27T14:32:16.700000
CVE-2023-37032,0,1,5ad5854209ece94eaefd571bfe9fb7d29882c03d07c47b94431e45066c701607,2025-01-27T14:34:38.477000 CVE-2023-37032,0,0,5ad5854209ece94eaefd571bfe9fb7d29882c03d07c47b94431e45066c701607,2025-01-27T14:34:38.477000
CVE-2023-37033,0,1,dc471a3f90ee681f4e541c9b0d14ad2cd5bafa94cc3dc0a6856c1b045ab6de79,2025-01-27T14:32:02.720000 CVE-2023-37033,0,0,dc471a3f90ee681f4e541c9b0d14ad2cd5bafa94cc3dc0a6856c1b045ab6de79,2025-01-27T14:32:02.720000
CVE-2023-37034,0,1,8c53f3fc39a069e03584f421459c37984f763ff3f2e4e9b763d3f6824b901e1b,2025-01-27T14:34:20.203000 CVE-2023-37034,0,0,8c53f3fc39a069e03584f421459c37984f763ff3f2e4e9b763d3f6824b901e1b,2025-01-27T14:34:20.203000
CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000 CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000
CVE-2023-37036,0,1,bc8e5e291a081bc83ea2bcbafe55176071db892d59f45f20f6615d6eb6ba20f9,2025-01-27T14:31:51.503000 CVE-2023-37036,0,0,bc8e5e291a081bc83ea2bcbafe55176071db892d59f45f20f6615d6eb6ba20f9,2025-01-27T14:31:51.503000
CVE-2023-37037,0,1,ada1ead2e05e72ba7c6cf67857b9a467082f615f6ba935c182ee06e846aac5b0,2025-01-27T14:34:03.640000 CVE-2023-37037,0,0,ada1ead2e05e72ba7c6cf67857b9a467082f615f6ba935c182ee06e846aac5b0,2025-01-27T14:34:03.640000
CVE-2023-37038,0,1,7e9858f574c7fc017c07e62fc3c38abe51d3e596d105426e9cde8f97462154fa,2025-01-27T14:31:33.687000 CVE-2023-37038,0,0,7e9858f574c7fc017c07e62fc3c38abe51d3e596d105426e9cde8f97462154fa,2025-01-27T14:31:33.687000
CVE-2023-37039,0,0,bf7173be26c9eefb93ad0d8cd495290d0105438946c02d85f951912b90a93493,2025-01-23T15:15:10.443000 CVE-2023-37039,0,0,bf7173be26c9eefb93ad0d8cd495290d0105438946c02d85f951912b90a93493,2025-01-23T15:15:10.443000
CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000 CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000
CVE-2023-37049,0,0,a50fac4cd820db018d62b9574142c1c91225888e27f635ecbb9c39f9da56db63,2024-11-21T08:11:00.767000 CVE-2023-37049,0,0,a50fac4cd820db018d62b9574142c1c91225888e27f635ecbb9c39f9da56db63,2024-11-21T08:11:00.767000
@ -236317,6 +236317,7 @@ CVE-2023-47148,0,0,125c9b6eff45b4c4f4e98898ffc8939f83bab8e9e7741dc73fd5013c70708
CVE-2023-47150,0,0,39b8e6e38790365133c91f98743cb6362cd9f47470d0fb8b0febb10399d2b26f,2024-11-21T08:29:52.247000 CVE-2023-47150,0,0,39b8e6e38790365133c91f98743cb6362cd9f47470d0fb8b0febb10399d2b26f,2024-11-21T08:29:52.247000
CVE-2023-47152,0,0,bcba57c6075b792d7c6cdc81b94418e9d986179abba79b9d2e8692a11a4bbb29,2024-11-21T08:29:52.370000 CVE-2023-47152,0,0,bcba57c6075b792d7c6cdc81b94418e9d986179abba79b9d2e8692a11a4bbb29,2024-11-21T08:29:52.370000
CVE-2023-47158,0,0,15f414bea2d2a1a9e4cade4c1576622ce6f6cb87ae101e48296a2d9c0094ad10,2024-11-21T08:29:52.553000 CVE-2023-47158,0,0,15f414bea2d2a1a9e4cade4c1576622ce6f6cb87ae101e48296a2d9c0094ad10,2024-11-21T08:29:52.553000
CVE-2023-47159,1,1,37f2ba17452479059eca821b413951e8e971d7b14b3e1155d6ec2d0c5f4889c9,2025-01-27T16:15:29.593000
CVE-2023-4716,0,0,181493a0bc47d8b6179e4d7c992bfdb6e0ed0566be00ad76cc7e801ee98290ea,2024-11-21T08:35:49.137000 CVE-2023-4716,0,0,181493a0bc47d8b6179e4d7c992bfdb6e0ed0566be00ad76cc7e801ee98290ea,2024-11-21T08:35:49.137000
CVE-2023-47161,0,0,daeccb22b0ce16ed468a02cafa5602752c58c890bfe9c6e91d73aa4a0cf9b4c8,2024-11-21T08:29:52.717000 CVE-2023-47161,0,0,daeccb22b0ce16ed468a02cafa5602752c58c890bfe9c6e91d73aa4a0cf9b4c8,2024-11-21T08:29:52.717000
CVE-2023-47162,0,0,9399a8bd268b1083de4daf0bf90d8f0edb5f56b653ea68cb53c8ecf2c4beeb7e,2024-11-21T08:29:52.850000 CVE-2023-47162,0,0,9399a8bd268b1083de4daf0bf90d8f0edb5f56b653ea68cb53c8ecf2c4beeb7e,2024-11-21T08:29:52.850000
@ -239957,6 +239958,7 @@ CVE-2023-52289,0,0,e6a2e54dd3a1c3f4b065cdeb7cba7713e3add3ea64ff3d39a79ca5e040c82
CVE-2023-5229,0,0,18bbb0701fdfc1eb961720131b947089c1dc194f24cd377eeba5cbe489702c68,2024-11-21T08:41:20.133000 CVE-2023-5229,0,0,18bbb0701fdfc1eb961720131b947089c1dc194f24cd377eeba5cbe489702c68,2024-11-21T08:41:20.133000
CVE-2023-52290,0,0,f81c1307f271823fe5b2fc9b059a6b49b0b523729ebd16ad87ea28109735272c,2024-11-21T08:39:31.530000 CVE-2023-52290,0,0,f81c1307f271823fe5b2fc9b059a6b49b0b523729ebd16ad87ea28109735272c,2024-11-21T08:39:31.530000
CVE-2023-52291,0,0,07bfceb67ee5ea6051410ea49ad7e6a77499d49c5dc75e901a99178dd8db6d04,2024-11-21T08:39:31.723000 CVE-2023-52291,0,0,07bfceb67ee5ea6051410ea49ad7e6a77499d49c5dc75e901a99178dd8db6d04,2024-11-21T08:39:31.723000
CVE-2023-52292,1,1,2888e8494b0d9dd8bcc835fa59297d8aa982fd13c5ac80d35d687e079ba17ad6,2025-01-27T16:15:29.767000
CVE-2023-52296,0,0,f37bbfb20e2925224d0b3b1045f2a31ac4df06590656ad39807523ee035f1e98,2024-11-21T08:39:31.927000 CVE-2023-52296,0,0,f37bbfb20e2925224d0b3b1045f2a31ac4df06590656ad39807523ee035f1e98,2024-11-21T08:39:31.927000
CVE-2023-5230,0,0,3cf502703ae5b648f307f80b76738bfea8747ada0db2366c9923cb7b273a080e,2024-11-21T08:41:20.240000 CVE-2023-5230,0,0,3cf502703ae5b648f307f80b76738bfea8747ada0db2366c9923cb7b273a080e,2024-11-21T08:41:20.240000
CVE-2023-52302,0,0,3df11091ed3603d6054aae0b4f32b2cddf705616c93df1718ba0a0c79d96053f,2024-11-21T08:39:32.043000 CVE-2023-52302,0,0,3df11091ed3603d6054aae0b4f32b2cddf705616c93df1718ba0a0c79d96053f,2024-11-21T08:39:32.043000
@ -240298,7 +240300,7 @@ CVE-2023-52642,0,0,05d60fedf578d1ba56385f5513e46bbdf0600669e68de5121a528e674c343
CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000 CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000
CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000 CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000
CVE-2023-52645,0,0,b7243e0650448847f32080e14db91cf203d54c57d7b28acbe818fbd2b13c53f4,2024-11-21T08:40:16.490000 CVE-2023-52645,0,0,b7243e0650448847f32080e14db91cf203d54c57d7b28acbe818fbd2b13c53f4,2024-11-21T08:40:16.490000
CVE-2023-52646,0,0,eaf388e3abe85a3c7ccf557c92f94f7e76ed266a116245f38a3cdb551dfcdb03,2024-11-21T08:40:16.687000 CVE-2023-52646,0,1,6ecde45ea86cb44e0829ef3156f414dfbbcea27ea88c5d6fcb6314e4210af497,2025-01-27T15:09:48.333000
CVE-2023-52647,0,0,e2976bef8bc92e0adeadd89937440a86e758817f278db22054eaa69f951695d6,2024-11-21T08:40:16.850000 CVE-2023-52647,0,0,e2976bef8bc92e0adeadd89937440a86e758817f278db22054eaa69f951695d6,2024-11-21T08:40:16.850000
CVE-2023-52648,0,0,bf327e16fd314087311880b9907320568dc951df7031e7a2a98e2b4c960ed3dc,2024-11-21T08:40:16.977000 CVE-2023-52648,0,0,bf327e16fd314087311880b9907320568dc951df7031e7a2a98e2b4c960ed3dc,2024-11-21T08:40:16.977000
CVE-2023-52649,0,0,a99e2d150671082fa4d3c37d35f0947b0eb528b79f37ab81343c41664ce0ad3a,2024-12-23T19:14:57.980000 CVE-2023-52649,0,0,a99e2d150671082fa4d3c37d35f0947b0eb528b79f37ab81343c41664ce0ad3a,2024-12-23T19:14:57.980000
@ -243627,7 +243629,7 @@ CVE-2024-10355,0,0,edd144d42239514a5040e45977c91b9661e0e5e1ef732ff2d1a515e8bda77
CVE-2024-10356,0,0,c3e482948a6c3b0414b5e4eefd2b603eabb27c390a3ec36c480e9a647e34cbb6,2024-12-17T13:15:17.520000 CVE-2024-10356,0,0,c3e482948a6c3b0414b5e4eefd2b603eabb27c390a3ec36c480e9a647e34cbb6,2024-12-17T13:15:17.520000
CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000
CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000
CVE-2024-10360,0,0,613c38c9ab1a87b22c3be425e755ef4037b6e0ecdbe0afd2f4ea1f631e7f920c,2024-10-29T14:34:04.427000 CVE-2024-10360,0,1,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000
CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000 CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000
CVE-2024-10367,0,0,047cdf86e80e6b3edd3a8f103515455deeb9cc4fb024de212789283fdbccd2cb,2024-11-01T12:57:03.417000 CVE-2024-10367,0,0,047cdf86e80e6b3edd3a8f103515455deeb9cc4fb024de212789283fdbccd2cb,2024-11-01T12:57:03.417000
CVE-2024-10368,0,0,1229bdc9c63256465d1d199349299fe27e9ef0d56f2669e496ca7acd06a3962b,2024-10-30T16:46:30.783000 CVE-2024-10368,0,0,1229bdc9c63256465d1d199349299fe27e9ef0d56f2669e496ca7acd06a3962b,2024-10-30T16:46:30.783000
@ -244484,7 +244486,7 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f
CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000
CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000
CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000
CVE-2024-11348,1,1,b73533c28283ab7bf818da7c7790d575d089f2c941bc36e98c95c674c09fcc6b,2025-01-27T14:15:27.973000 CVE-2024-11348,0,0,b73533c28283ab7bf818da7c7790d575d089f2c941bc36e98c95c674c09fcc6b,2025-01-27T14:15:27.973000
CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000 CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000
CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000
CVE-2024-11350,0,0,8bb38c60aa0db48736d4dedc1ca25ec56ff9a53397f36b2b728e85c0405da224,2025-01-08T09:15:06.460000 CVE-2024-11350,0,0,8bb38c60aa0db48736d4dedc1ca25ec56ff9a53397f36b2b728e85c0405da224,2025-01-08T09:15:06.460000
@ -245684,7 +245686,7 @@ CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
CVE-2024-12773,0,0,b7dc1716c8eea97c30add684f80026b79afc5415bfe8900c9ca4108d7f69e8bc,2025-01-27T06:15:22.747000 CVE-2024-12773,0,0,b7dc1716c8eea97c30add684f80026b79afc5415bfe8900c9ca4108d7f69e8bc,2025-01-27T06:15:22.747000
CVE-2024-12774,0,0,e0f6dffb1a6ec85cff997d86a5a989037a6bf59382fb0ac7a62e7d0a034a7dc7,2025-01-27T06:15:22.860000 CVE-2024-12774,0,1,831f06cba5c40ca0ae40312b61d66a0fcc179465b4ec30109a7e37db55ec771b,2025-01-27T15:15:09.803000
CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000
CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000
CVE-2024-12782,0,0,a220a59df3c04cfe812d51b3c5d226e092dd063fd83863ac7ea9515a10725c6a,2024-12-27T08:15:04.917000 CVE-2024-12782,0,0,a220a59df3c04cfe812d51b3c5d226e092dd063fd83863ac7ea9515a10725c6a,2024-12-27T08:15:04.917000
@ -247980,7 +247982,7 @@ CVE-2024-21306,0,0,2a370a0aee5d92bbbe454d1fdf5ed058cd5c6c363a0e02cdc4a816823a09f
CVE-2024-21307,0,0,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000 CVE-2024-21307,0,0,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000
CVE-2024-21308,0,0,f6a379d41c4cd5133050a31bdc4ca5e24f06dd737032839685d9ee434bfbe4a1,2025-01-15T22:44:09.030000 CVE-2024-21308,0,0,f6a379d41c4cd5133050a31bdc4ca5e24f06dd737032839685d9ee434bfbe4a1,2025-01-15T22:44:09.030000
CVE-2024-21309,0,0,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000 CVE-2024-21309,0,0,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000
CVE-2024-2131,0,0,b1b07f83cc4815619d8a340f7f607f09dab71b73ec5b8e6029c7eae4cf12e8ca,2024-11-21T09:09:05.730000 CVE-2024-2131,0,1,70dc621cd4bbc2ffd43873ae60c48379095e55f2d69c7b86131d4107abb5914f,2025-01-27T15:20:06.373000
CVE-2024-21310,0,0,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000 CVE-2024-21310,0,0,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000
CVE-2024-21311,0,0,4d6ad1816d0e66f3c61e7cdb92c11956c9e3c55be6ee8b7971fca359d0bb88cd,2024-11-21T08:54:04.860000 CVE-2024-21311,0,0,4d6ad1816d0e66f3c61e7cdb92c11956c9e3c55be6ee8b7971fca359d0bb88cd,2024-11-21T08:54:04.860000
CVE-2024-21312,0,0,6bf7a111a639274be7bd1d96a6200472536c850ea46f2604e81064d0b20c2d44,2024-11-21T08:54:05.020000 CVE-2024-21312,0,0,6bf7a111a639274be7bd1d96a6200472536c850ea46f2604e81064d0b20c2d44,2024-11-21T08:54:05.020000
@ -248910,6 +248912,7 @@ CVE-2024-22310,0,0,dd859d6b306e0c9874ff3f33a829690f44f8dffe8aedd8ff6cd5b1b571687
CVE-2024-22311,0,0,3a63d6bee662ba0a6f15b807c0947fe7a1e5a2631da80da5e7333d664c69e682,2024-11-21T08:56:02.480000 CVE-2024-22311,0,0,3a63d6bee662ba0a6f15b807c0947fe7a1e5a2631da80da5e7333d664c69e682,2024-11-21T08:56:02.480000
CVE-2024-22312,0,0,2d6d3b890becb8a03981f799e8b5044e1f347c4412e0821c61a022cf4e163ae7,2024-11-21T08:56:02.603000 CVE-2024-22312,0,0,2d6d3b890becb8a03981f799e8b5044e1f347c4412e0821c61a022cf4e163ae7,2024-11-21T08:56:02.603000
CVE-2024-22313,0,0,ddd1d33bfc1b5af1520350c2c7005426db2b2a5d727ff982649017ed5b9c287c,2024-11-21T08:56:02.770000 CVE-2024-22313,0,0,ddd1d33bfc1b5af1520350c2c7005426db2b2a5d727ff982649017ed5b9c287c,2024-11-21T08:56:02.770000
CVE-2024-22316,1,1,dc085e3ed5915890c6053d11530b220073d391856575fdc4da02f3d18c8018a9,2025-01-27T16:15:30.637000
CVE-2024-22317,0,0,b3b9afe087a314d2d9a2da4cfb50d8e65a45b5deac79991b6f88cbee779b8b65,2024-11-21T08:56:02.910000 CVE-2024-22317,0,0,b3b9afe087a314d2d9a2da4cfb50d8e65a45b5deac79991b6f88cbee779b8b65,2024-11-21T08:56:02.910000
CVE-2024-22318,0,0,aa4fd17a016da578c4e40f8bf867f49d73509a0efd564d0d9ff3a305b818b22d,2024-11-21T08:56:03.063000 CVE-2024-22318,0,0,aa4fd17a016da578c4e40f8bf867f49d73509a0efd564d0d9ff3a305b818b22d,2024-11-21T08:56:03.063000
CVE-2024-22319,0,0,94c8971dc172b8316a6a132bdd3732cbb8e1ee1ea0d1539ebe9e0956f604ec80,2024-11-21T08:56:03.247000 CVE-2024-22319,0,0,94c8971dc172b8316a6a132bdd3732cbb8e1ee1ea0d1539ebe9e0956f604ec80,2024-11-21T08:56:03.247000
@ -249084,7 +249087,7 @@ CVE-2024-22546,0,0,997003eeabd55afd13ddbeebe6550d7262d8869e557416789e584a9094c3b
CVE-2024-22547,0,0,0133090a54f8606cef07626b9e620f96367b93c79f99ca3bc075b2ce0712def3,2024-11-21T08:56:26.220000 CVE-2024-22547,0,0,0133090a54f8606cef07626b9e620f96367b93c79f99ca3bc075b2ce0712def3,2024-11-21T08:56:26.220000
CVE-2024-22548,0,0,3bddf409ca88fc0749d327d45cb0d00ca337c1ce8636699dfaa665651c15c3fd,2024-11-21T08:56:26.440000 CVE-2024-22548,0,0,3bddf409ca88fc0749d327d45cb0d00ca337c1ce8636699dfaa665651c15c3fd,2024-11-21T08:56:26.440000
CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000 CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000
CVE-2024-2255,0,0,7820304244a223107853443023ed595b897a7355c9c95b4533f87af6dc37cb6e,2024-11-21T09:09:21.510000 CVE-2024-2255,0,1,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000
CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000 CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000
CVE-2024-22551,0,0,1e93c60dd52f09f6cd2dcd56d4a711553385c5433699e8ae1f44fe69a35bc9ed,2024-11-21T08:56:26.960000 CVE-2024-22551,0,0,1e93c60dd52f09f6cd2dcd56d4a711553385c5433699e8ae1f44fe69a35bc9ed,2024-11-21T08:56:26.960000
CVE-2024-22559,0,0,36d8d40d85cf4ef45bc2b02dbe49188c093e02a56b7d30ed2946edd5a0d6608f,2024-11-21T08:56:27.107000 CVE-2024-22559,0,0,36d8d40d85cf4ef45bc2b02dbe49188c093e02a56b7d30ed2946edd5a0d6608f,2024-11-21T08:56:27.107000
@ -250316,15 +250319,15 @@ CVE-2024-24403,0,0,9dfd8d2383a51e07b61f370007222fc6207ac481d048277e8f500a7d8b0ad
CVE-2024-24407,0,0,9854b2123d3cb61fbea945bc5c28ab7e9c5e67ad8f91d9c6262853438f2d5551,2024-11-21T08:59:15.243000 CVE-2024-24407,0,0,9854b2123d3cb61fbea945bc5c28ab7e9c5e67ad8f91d9c6262853438f2d5551,2024-11-21T08:59:15.243000
CVE-2024-24409,0,0,2b5b94cb6623257f634c08bd886ff97512dff9af22f16e80107479043a99a530,2024-11-13T20:35:44.963000 CVE-2024-24409,0,0,2b5b94cb6623257f634c08bd886ff97512dff9af22f16e80107479043a99a530,2024-11-13T20:35:44.963000
CVE-2024-2441,0,0,f3d49cbdbc9b254da53d38040e54aa2ae2b37be0aa445ff971a41eaad48ea6ab,2024-11-21T09:09:45.583000 CVE-2024-2441,0,0,f3d49cbdbc9b254da53d38040e54aa2ae2b37be0aa445ff971a41eaad48ea6ab,2024-11-21T09:09:45.583000
CVE-2024-24416,0,1,da33c517cb74def6e1fcfef7dbd868e89c0da524a1124be507323f34f2efd14d,2025-01-27T14:33:50.793000 CVE-2024-24416,0,0,da33c517cb74def6e1fcfef7dbd868e89c0da524a1124be507323f34f2efd14d,2025-01-27T14:33:50.793000
CVE-2024-24417,0,1,d81037acb56b281f2b4c1d5b873f54e5a7074ba7899c1dfbb0274d0b6a1546d9,2025-01-27T14:30:53.340000 CVE-2024-24417,0,0,d81037acb56b281f2b4c1d5b873f54e5a7074ba7899c1dfbb0274d0b6a1546d9,2025-01-27T14:30:53.340000
CVE-2024-24418,0,1,0fab44bc995f2600bbdc82f28c7dc2e3288d8f362a140d73d148b542ddb96a4b,2025-01-27T14:33:26.093000 CVE-2024-24418,0,0,0fab44bc995f2600bbdc82f28c7dc2e3288d8f362a140d73d148b542ddb96a4b,2025-01-27T14:33:26.093000
CVE-2024-24419,0,1,56700223a0e086671686b9de5764f46c672029a2fc4dcca4bbdefc834b3e45ac,2025-01-27T14:29:49.253000 CVE-2024-24419,0,0,56700223a0e086671686b9de5764f46c672029a2fc4dcca4bbdefc834b3e45ac,2025-01-27T14:29:49.253000
CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000 CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000
CVE-2024-24420,0,0,5a5bc176c375a6ae3c1f1f1aaa7fa8c118b011f44384ef34091460eeed674d90,2025-01-23T16:15:34.687000 CVE-2024-24420,0,0,5a5bc176c375a6ae3c1f1f1aaa7fa8c118b011f44384ef34091460eeed674d90,2025-01-23T16:15:34.687000
CVE-2024-24421,0,0,fa164804ff284d241187d08b344fa9d54b6fd94cc28a5540cb8e981223f48d19,2025-01-23T16:15:34.883000 CVE-2024-24421,0,0,fa164804ff284d241187d08b344fa9d54b6fd94cc28a5540cb8e981223f48d19,2025-01-23T16:15:34.883000
CVE-2024-24422,0,1,f3f0534a786051b37c144f7151af796ef19b19e57f0ade091855b0a4335b14fc,2025-01-27T14:32:56.950000 CVE-2024-24422,0,0,f3f0534a786051b37c144f7151af796ef19b19e57f0ade091855b0a4335b14fc,2025-01-27T14:32:56.950000
CVE-2024-24423,0,1,4332048877011f69640a5632437597c26d366dfe8d490ac2bd8c4fd3daef6485,2025-01-27T14:39:57.160000 CVE-2024-24423,0,0,4332048877011f69640a5632437597c26d366dfe8d490ac2bd8c4fd3daef6485,2025-01-27T14:39:57.160000
CVE-2024-24424,0,0,512c38d36e5aa9c9f79f68e96ae95b4f93b2be8c28966f0070415d2ad484813e,2025-01-23T16:15:35.453000 CVE-2024-24424,0,0,512c38d36e5aa9c9f79f68e96ae95b4f93b2be8c28966f0070415d2ad484813e,2025-01-23T16:15:35.453000
CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000
CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000
@ -251118,13 +251121,13 @@ CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e
CVE-2024-25576,0,0,95b8b2fe29c3b8fa31fbe37491add9737a675d1ce27c7ad5d9b93d6c253067d8,2024-09-06T20:17:14.003000 CVE-2024-25576,0,0,95b8b2fe29c3b8fa31fbe37491add9737a675d1ce27c7ad5d9b93d6c253067d8,2024-09-06T20:17:14.003000
CVE-2024-25578,0,0,cd7bc684525a22b1c5771942ff4ae262fdc7036bf854cdb96ec3e2374a3eeb34,2024-11-21T09:01:01.047000 CVE-2024-25578,0,0,cd7bc684525a22b1c5771942ff4ae262fdc7036bf854cdb96ec3e2374a3eeb34,2024-11-21T09:01:01.047000
CVE-2024-25579,0,0,53dc5740ced037e66b1a2ba8c7a85647afdc0321b2de6a97263699799a9bccc1,2024-11-26T08:15:04.400000 CVE-2024-25579,0,0,53dc5740ced037e66b1a2ba8c7a85647afdc0321b2de6a97263699799a9bccc1,2024-11-26T08:15:04.400000
CVE-2024-2558,0,0,4c290bc425a5a167cdd2127e86122f516379dfb57df269146f8c6f2f4c616487,2024-11-21T09:10:00.450000 CVE-2024-2558,0,1,02ce2f2a64668ffe21ec4c1d0315a119eeef07446a2ef7cf12a8781dc0fd14f3,2025-01-27T16:56:47.900000
CVE-2024-25580,0,0,c4b0afd79a1474589c375c8ffabbee3d018fad8e4c0933a7f12523ed1f4b9156,2024-11-21T09:01:01.400000 CVE-2024-25580,0,0,c4b0afd79a1474589c375c8ffabbee3d018fad8e4c0933a7f12523ed1f4b9156,2024-11-21T09:01:01.400000
CVE-2024-25581,0,0,d9cf41000e40894e1e57e66e69bd839bdf75b2cba10804a3bcb1ccd687a5175f,2024-11-21T09:01:01.620000 CVE-2024-25581,0,0,d9cf41000e40894e1e57e66e69bd839bdf75b2cba10804a3bcb1ccd687a5175f,2024-11-21T09:01:01.620000
CVE-2024-25582,0,0,14689a0079cb9d91c28249ad9323f9afd0c6579c6fd0dfae82c9052534820133,2024-08-19T12:59:59.177000 CVE-2024-25582,0,0,14689a0079cb9d91c28249ad9323f9afd0c6579c6fd0dfae82c9052534820133,2024-08-19T12:59:59.177000
CVE-2024-25583,0,0,ca939b3dad6e6f74b1ff49a658bdf716ccdd446c737a5cdf17f568d1249b9dd1,2024-11-21T09:01:01.823000 CVE-2024-25583,0,0,ca939b3dad6e6f74b1ff49a658bdf716ccdd446c737a5cdf17f568d1249b9dd1,2024-11-21T09:01:01.823000
CVE-2024-25584,0,0,7a4aedd8c8bd4a4f6cf57e5a5b34fefd3a570c6f165ab147cc791809cd369790,2024-09-06T16:46:26.830000 CVE-2024-25584,0,0,7a4aedd8c8bd4a4f6cf57e5a5b34fefd3a570c6f165ab147cc791809cd369790,2024-09-06T16:46:26.830000
CVE-2024-2559,0,0,125d50d052f7ba4d30e7ac796be0d551aa5c6a8224db7ab8c7c361c5513d8486,2024-11-21T09:10:00.610000 CVE-2024-2559,0,1,a52abdb9dee7a2b9cf97549fffda288e9bd244b1c049b8886c2cb84eff671485,2025-01-27T16:50:41.160000
CVE-2024-25590,0,0,8d02885f747c962ae03bad6ccc691cb5a7f3c754a0055c180ff7ee84094108bf,2024-11-21T09:01:02.033000 CVE-2024-25590,0,0,8d02885f747c962ae03bad6ccc691cb5a7f3c754a0055c180ff7ee84094108bf,2024-11-21T09:01:02.033000
CVE-2024-25591,0,0,fa8458e4721010bc4a3e953326e37e290e504ea9adf2514e3f0f84525f97c3df,2024-11-21T09:01:02.157000 CVE-2024-25591,0,0,fa8458e4721010bc4a3e953326e37e290e504ea9adf2514e3f0f84525f97c3df,2024-11-21T09:01:02.157000
CVE-2024-25592,0,0,c51d707636e64d3c59c6e49a5717983c2ff2b616a397ba175409796652173f8b,2025-01-23T19:32:59.350000 CVE-2024-25592,0,0,c51d707636e64d3c59c6e49a5717983c2ff2b616a397ba175409796652173f8b,2025-01-23T19:32:59.350000
@ -251926,7 +251929,7 @@ CVE-2024-26645,0,0,bdee23b950a8dff0fe3120bc636185265634a180ed90c1f8f21f6b1361aee
CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995753,2024-11-21T09:02:45.490000 CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995753,2024-11-21T09:02:45.490000
CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000 CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000
CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000 CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000
CVE-2024-26649,0,1,affc58726c4d9b6522d6bde29012b9a628801f04a98430ddf530cfc9d83cbf05,2025-01-27T14:50:35.380000 CVE-2024-26649,0,0,affc58726c4d9b6522d6bde29012b9a628801f04a98430ddf530cfc9d83cbf05,2025-01-27T14:50:35.380000
CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000 CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000 CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000
@ -252060,8 +252063,8 @@ CVE-2024-26767,0,0,e4a372ff53fbe10d1d76dcedc9f9b1e20359a57170473ffbbac7226ab5aeb
CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000 CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000
CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000 CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000
CVE-2024-2677,0,0,26dcb9af2819d0d0588d926fb3dd41c7ea730a94b3629b44404ab4750d5cc55c,2024-11-21T09:10:16.287000 CVE-2024-2677,0,0,26dcb9af2819d0d0588d926fb3dd41c7ea730a94b3629b44404ab4750d5cc55c,2024-11-21T09:10:16.287000
CVE-2024-26770,0,1,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000 CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000
CVE-2024-26771,0,1,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000 CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000 CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000
CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000 CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000
CVE-2024-26774,0,0,e1b47f609864ec2bf2c985b00a1f42e9a22977ef025fa7997c7afa306e1199e8,2024-11-21T09:03:02.507000 CVE-2024-26774,0,0,e1b47f609864ec2bf2c985b00a1f42e9a22977ef025fa7997c7afa306e1199e8,2024-11-21T09:03:02.507000
@ -252162,10 +252165,10 @@ CVE-2024-2686,0,0,fec0f14b6d657e98130580c8bcb63b2672efadf690146c9437f8751fa56e7f
CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000 CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000
CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000 CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000
CVE-2024-26862,0,0,94216787489441c2b38672b60a8ef4910c5138aedfb248664baddac7173ed4ec,2024-11-21T09:03:14.403000 CVE-2024-26862,0,0,94216787489441c2b38672b60a8ef4910c5138aedfb248664baddac7173ed4ec,2024-11-21T09:03:14.403000
CVE-2024-26863,0,0,a1c14b17ce135228a17199be1615c6fc84242883495a3d51c54f59d25f8a4c3a,2024-11-21T09:03:14.533000 CVE-2024-26863,0,1,78c2119d6f80f4b28c4729d61ca4bc7c89001a1792d2bf795929ec1734e40dc8,2025-01-27T15:05:39.390000
CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000 CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000
CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000 CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000
CVE-2024-26866,0,0,44df02b3ff709e7d797fe24d95c0f49c8eecceb31154798d532826eb61c68d7c,2024-11-21T09:03:15 CVE-2024-26866,0,1,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e2191a,2025-01-27T15:08:19.563000
CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000 CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000
CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000 CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000
CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000 CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000
@ -252179,7 +252182,7 @@ CVE-2024-26875,0,0,94239f41f42b905c954bc6edc97b0cf15f6dec0d8fdfb2fd1b19e8e24e9c8
CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f2d4,2024-11-21T09:03:16.380000 CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f2d4,2024-11-21T09:03:16.380000
CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000 CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000
CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000 CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000
CVE-2024-26879,0,0,dc370a9579629bfc3c9d316d1724c887ec484f6ade9c1976583f08dbcecc8983,2024-11-21T09:03:16.793000 CVE-2024-26879,0,1,50ff069537c649739dc4e54aaf76e53263911635458780c341afcdd614bc45bb,2025-01-27T15:12:45.210000
CVE-2024-2688,0,0,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc992,2025-01-07T17:17:38.673000 CVE-2024-2688,0,0,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc992,2025-01-07T17:17:38.673000
CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000 CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000
CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000 CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000
@ -252195,7 +252198,7 @@ CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc9
CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000
CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000 CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000
CVE-2024-26892,0,0,dff3724f39f4f7d27824ec776eef6bd6154cf578f200db90d4aaf7ae8dcb96a7,2025-01-14T14:34:50.407000 CVE-2024-26892,0,0,dff3724f39f4f7d27824ec776eef6bd6154cf578f200db90d4aaf7ae8dcb96a7,2025-01-14T14:34:50.407000
CVE-2024-26893,0,0,a32b93693aea02e2d2b15b97f491f25df71cab99d38e3b872b8f185bf53bc45a,2024-11-21T09:03:19.143000 CVE-2024-26893,0,1,e4bf7717acd3051131184678ae9316b9694bedab35a35205f2cd9fa955761ef6,2025-01-27T15:14:28.090000
CVE-2024-26894,0,0,a0a3505846084c5b38d2ae3c10f78c77094fefe62fef76a336ba2b60789b1f16,2024-11-21T09:03:19.273000 CVE-2024-26894,0,0,a0a3505846084c5b38d2ae3c10f78c77094fefe62fef76a336ba2b60789b1f16,2024-11-21T09:03:19.273000
CVE-2024-26895,0,0,c7dae02178f516d4283340a4f7cce896c92a3602b8fb81a9ffba367ad09ef0ce,2025-01-14T14:33:40.417000 CVE-2024-26895,0,0,c7dae02178f516d4283340a4f7cce896c92a3602b8fb81a9ffba367ad09ef0ce,2025-01-14T14:33:40.417000
CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c484,2024-11-21T09:03:19.633000 CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c484,2024-11-21T09:03:19.633000
@ -253915,12 +253918,12 @@ CVE-2024-29098,0,0,9b1008b83cbe94703d043bfdf5904f8bef4f3123ac6a8137d811039c2b1c4
CVE-2024-29099,0,0,57f43cd8f74c6e6cf95b7da1e8708cfbdd3bc617c2558dc4505d3cb2cde59023,2024-11-21T09:07:33.100000 CVE-2024-29099,0,0,57f43cd8f74c6e6cf95b7da1e8708cfbdd3bc617c2558dc4505d3cb2cde59023,2024-11-21T09:07:33.100000
CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000 CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000
CVE-2024-29100,0,0,4b4ea50e8b1a5f3add3c62cc09873ccb1c0bad3dcfd266a73de4fe697a412abf,2024-11-21T09:07:33.233000 CVE-2024-29100,0,0,4b4ea50e8b1a5f3add3c62cc09873ccb1c0bad3dcfd266a73de4fe697a412abf,2024-11-21T09:07:33.233000
CVE-2024-29101,0,0,4c53f37d823edfb3c9fd2b1e626679ebce47a1566475ce9408f13527f7202b51,2024-11-21T09:07:33.363000 CVE-2024-29101,0,1,3e1f7a72e6c54872472cb6493d5562d1ab4eb10c553370d58053a928dd03f787,2025-01-27T16:21:01.500000
CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000 CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000
CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000 CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000
CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000 CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000
CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000 CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000
CVE-2024-29106,0,0,5358d902cefa6be44c0ee6c2d2f511319af57f2f7012640f44e3f1013fa1cdc1,2024-11-21T09:07:34.030000 CVE-2024-29106,0,1,5a400ac8943d75afdda2010adfe40fe98b71565a3f87da2e7f1bf30416ae4ab8,2025-01-27T16:11:23.087000
CVE-2024-29107,0,0,575a378e14d23427f30e92b1c894a1fb54c90fb958b2d4efde6fff0a505f35f7,2024-11-21T09:07:34.160000 CVE-2024-29107,0,0,575a378e14d23427f30e92b1c894a1fb54c90fb958b2d4efde6fff0a505f35f7,2024-11-21T09:07:34.160000
CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000
CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000 CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000
@ -254411,7 +254414,7 @@ CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a
CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000 CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000
CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000
CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000 CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000
CVE-2024-29920,0,0,581a8a03ba9787c287fbcaaf180ab7a4e4a61be263962bb7b2b47bcd0dad3d9f,2024-11-21T09:08:37.313000 CVE-2024-29920,0,1,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000
CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000 CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000
CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000
CVE-2024-29923,0,0,8225650ead409b8f85369357d44055c6eaddbde5fe28dbef52825bbb60efcf72,2024-11-21T09:08:37.677000 CVE-2024-29923,0,0,8225650ead409b8f85369357d44055c6eaddbde5fe28dbef52825bbb60efcf72,2024-11-21T09:08:37.677000
@ -257993,7 +257996,7 @@ CVE-2024-34559,0,0,add1f51454556128ecef0e724a3bc62f9a607a7086d3443048f323f79f5a3
CVE-2024-3456,0,0,666f10caf8d4abc2c878e20fa7643e23a4280263bd59ca1aee750ef6bdda76a6,2024-11-21T09:29:38.203000 CVE-2024-3456,0,0,666f10caf8d4abc2c878e20fa7643e23a4280263bd59ca1aee750ef6bdda76a6,2024-11-21T09:29:38.203000
CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000 CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000
CVE-2024-34561,0,0,94a3a4a32680e52abd396f991fa3f3091d097ef31d868ad3111ea0a4b4409a56,2024-11-21T09:18:56.363000 CVE-2024-34561,0,0,94a3a4a32680e52abd396f991fa3f3091d097ef31d868ad3111ea0a4b4409a56,2024-11-21T09:18:56.363000
CVE-2024-34562,0,0,50df53f6e1c6c5425184cd1540cca4bcd667f9efb7b62abe55cc5756349a20a3,2024-11-21T09:18:56.500000 CVE-2024-34562,0,1,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b687b4,2025-01-27T15:20:56.620000
CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000 CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000
CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000 CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000
CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000 CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000
@ -260373,6 +260376,7 @@ CVE-2024-37520,0,0,c2601772804e1cfee195894ab6b7cf60b06b0ebb1999f0d1b12743ce6abf1
CVE-2024-37521,0,0,94bcfda156f2b0afbf34ae65d204fdf89b55e41cfa34ea7594fd744cf1c838af,2024-11-21T09:23:59.870000 CVE-2024-37521,0,0,94bcfda156f2b0afbf34ae65d204fdf89b55e41cfa34ea7594fd744cf1c838af,2024-11-21T09:23:59.870000
CVE-2024-37522,0,0,3295cd978c20643eaff8d6fc73318ce6121ff0f18fc4f60672eec9a4623d1a39,2024-11-21T09:24:00.330000 CVE-2024-37522,0,0,3295cd978c20643eaff8d6fc73318ce6121ff0f18fc4f60672eec9a4623d1a39,2024-11-21T09:24:00.330000
CVE-2024-37523,0,0,4a58bbd7feffbbcd6d15592605f20e33ff3174176d45dec67c359454fa9e0b47,2024-11-21T09:24:00.747000 CVE-2024-37523,0,0,4a58bbd7feffbbcd6d15592605f20e33ff3174176d45dec67c359454fa9e0b47,2024-11-21T09:24:00.747000
CVE-2024-37527,1,1,a5af77d7b6365e6adc04f6e4c32c4fce6880d7fd833ee45fe5914d4fb64fb502,2025-01-27T16:15:30.840000
CVE-2024-37528,0,0,0e5038324fe3b6f9799a31c377c6705ebf03b5d5e405d251a1f9d9fdb58c17c2,2024-11-21T09:24:00.887000 CVE-2024-37528,0,0,0e5038324fe3b6f9799a31c377c6705ebf03b5d5e405d251a1f9d9fdb58c17c2,2024-11-21T09:24:00.887000
CVE-2024-37529,0,0,acfccbcbfe6dfb16aecab8f7e844483580e6eb70a780b71713524bc635ce4565,2024-08-23T18:55:48.257000 CVE-2024-37529,0,0,acfccbcbfe6dfb16aecab8f7e844483580e6eb70a780b71713524bc635ce4565,2024-08-23T18:55:48.257000
CVE-2024-3753,0,0,3b84e54e67f6139460e801ecfefc293595c2c267d83aaee816ff9139d106a385,2024-11-21T09:30:19.350000 CVE-2024-3753,0,0,3b84e54e67f6139460e801ecfefc293595c2c267d83aaee816ff9139d106a385,2024-11-21T09:30:19.350000
@ -260993,9 +260997,11 @@ CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713
CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000 CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000
CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000 CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000
CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000 CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000
CVE-2024-38320,1,1,15afdcbb12e8e8819a29ca7abd828d95a5b9e03b0e5d65c0530ebfff7e3b43cd,2025-01-27T16:15:30.973000
CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000 CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000
CVE-2024-38322,0,0,8e573827e3fa52cf97ec6d2ef345cd31ae55ff6b4c10220d85ef83b3ce3ac344,2024-11-21T09:25:22.520000 CVE-2024-38322,0,0,8e573827e3fa52cf97ec6d2ef345cd31ae55ff6b4c10220d85ef83b3ce3ac344,2024-11-21T09:25:22.520000
CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57812,2024-09-30T14:10:18.597000 CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57812,2024-09-30T14:10:18.597000
CVE-2024-38325,1,1,ce10677b3048ca308690463488aea61fbd24bbabcd1603adb726b781a7cad432,2025-01-27T16:15:31.117000
CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000 CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000
CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000 CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000
CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000 CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000
@ -261447,7 +261453,7 @@ CVE-2024-38786,0,0,a3945d26053fac2588fcb2b904e0a138f2d9f54dc61623305952d8af8bf01
CVE-2024-38787,0,0,ce7fa025b58714f14aacaeb7eb2f416bc7734c686cf55df8ca8a5a341cb30431,2024-08-13T12:58:25.437000 CVE-2024-38787,0,0,ce7fa025b58714f14aacaeb7eb2f416bc7734c686cf55df8ca8a5a341cb30431,2024-08-13T12:58:25.437000
CVE-2024-38788,0,0,3b35408d3a24d65f413e2071d9e6ff186341b76a67f561c74fad26cddceb0418,2024-11-21T09:26:49.940000 CVE-2024-38788,0,0,3b35408d3a24d65f413e2071d9e6ff186341b76a67f561c74fad26cddceb0418,2024-11-21T09:26:49.940000
CVE-2024-38789,0,0,616de834d0980fad84dd5d262c2a5a5c3ff6ad2da413d7a0377141b71b3dbc26,2025-01-02T12:15:23.633000 CVE-2024-38789,0,0,616de834d0980fad84dd5d262c2a5a5c3ff6ad2da413d7a0377141b71b3dbc26,2025-01-02T12:15:23.633000
CVE-2024-3879,0,0,b3f62511bfdc726f0a4ad7ec2b72e4d548f75fa34f76b9097220affff929e03e,2024-11-21T09:30:37.120000 CVE-2024-3879,0,1,074bc3e4972b3513101e0e678069b78f6c106732c850ff6e35dd0948fcaffd97,2025-01-27T16:24:40.757000
CVE-2024-38790,0,0,405d212e30fbe17293eda7c0b0455d1fb06eb6a3f764318aeaba7963c03a8eb1,2025-01-02T12:15:23.763000 CVE-2024-38790,0,0,405d212e30fbe17293eda7c0b0455d1fb06eb6a3f764318aeaba7963c03a8eb1,2025-01-02T12:15:23.763000
CVE-2024-38791,0,0,7eb8f94e68bf3536fdb2800ab03bca013d555a84b835d5cdd5aafe7b3cf9aade,2024-08-02T12:59:43.990000 CVE-2024-38791,0,0,7eb8f94e68bf3536fdb2800ab03bca013d555a84b835d5cdd5aafe7b3cf9aade,2024-08-02T12:59:43.990000
CVE-2024-38792,0,0,e62ad1d58d17db35f23147b02103d010f9465e0c2ed86e9d15a60072344a696f,2024-11-01T20:24:53.730000 CVE-2024-38792,0,0,e62ad1d58d17db35f23147b02103d010f9465e0c2ed86e9d15a60072344a696f,2024-11-01T20:24:53.730000
@ -261455,12 +261461,12 @@ CVE-2024-38793,0,0,3abb4fadd98983f9c8a3f71f42811284ca10c92d1b43b534ec7aa2558a41a
CVE-2024-38794,0,0,0e611d7d55b2e6c94eee9312ed11241297f8a473362db39470b8ea85723f38b2,2024-11-01T20:24:53.730000 CVE-2024-38794,0,0,0e611d7d55b2e6c94eee9312ed11241297f8a473362db39470b8ea85723f38b2,2024-11-01T20:24:53.730000
CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c999501ae,2024-08-30T16:31:03.887000 CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c999501ae,2024-08-30T16:31:03.887000
CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000 CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000
CVE-2024-3880,0,0,05ad02535029fe300c22028f294905db3effcae3d9f6a9c08e2e8efe572ad3c1,2024-11-21T09:30:37.263000 CVE-2024-3880,0,1,0eca95febe9a4060aec92e25865874329486aff06b8e962d558db43d39fb2b5e,2025-01-27T16:24:26.973000
CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000 CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000
CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000 CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000
CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000 CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000
CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000 CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000
CVE-2024-3881,0,0,1c9f85fd80cca491c38bc78c8ef5005187e956d6680406848ed713e292f20d1d,2024-11-21T09:30:37.407000 CVE-2024-3881,0,1,38ab6d7d284c0ca3e6b9161a425cbc55ade2a75172ea4255ce3e799638ef4528,2025-01-27T16:25:02.423000
CVE-2024-38810,0,0,5eca7ced7ced269f1d8b6c6c4298e21e756532564a3f32db8863a6f0cdf6c0d5,2024-08-20T15:44:20.567000 CVE-2024-38810,0,0,5eca7ced7ced269f1d8b6c6c4298e21e756532564a3f32db8863a6f0cdf6c0d5,2024-08-20T15:44:20.567000
CVE-2024-38811,0,0,e90c16a207e5ff636d7114e5326f61042c05eb2d83b5698a9b4fa38a3dcbf1d3,2024-09-17T13:33:32.957000 CVE-2024-38811,0,0,e90c16a207e5ff636d7114e5326f61042c05eb2d83b5698a9b4fa38a3dcbf1d3,2024-09-17T13:33:32.957000
CVE-2024-38812,0,0,2e704a7e06ecb019d5085676217a7390700a3558f717063ea75069351632bd32,2024-11-22T02:00:03.353000 CVE-2024-38812,0,0,2e704a7e06ecb019d5085676217a7390700a3558f717063ea75069351632bd32,2024-11-22T02:00:03.353000
@ -261471,7 +261477,7 @@ CVE-2024-38816,0,0,65fd0cf5f0fe6505681fcc328b56e581fddf781c33094976bd261108a87a0
CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000 CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000
CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000
CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000 CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000
CVE-2024-3882,0,0,d37dc3616c740393b4e1b16d38d2bd3ccee2a1af91c97d5fbd3f6f75e095d7d6,2024-11-21T09:30:37.540000 CVE-2024-3882,0,1,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000
CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000 CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000
@ -262993,7 +262999,7 @@ CVE-2024-41098,0,0,338154d5c432c0e0ee0395715fa8ca7d8a8d003c58d81c84bc992eb663406
CVE-2024-41107,0,0,83c6526fdfb6ef6dff929ade85ab9b522a180ab80000abd63dbedca479d8d331,2024-11-21T09:32:14.700000 CVE-2024-41107,0,0,83c6526fdfb6ef6dff929ade85ab9b522a180ab80000abd63dbedca479d8d331,2024-11-21T09:32:14.700000
CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000 CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000
CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000 CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000
CVE-2024-4111,0,0,05616bf67c156f4fc952ef18ecc9f259bcee60477f33c814a7d583c91a7ba5d0,2024-11-21T09:42:12.460000 CVE-2024-4111,0,1,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000
CVE-2024-41110,0,0,0828a9e37b792ec7f9f315cd5176ea4a8f587e66960bc38baf07e1b9b29654d9,2024-11-21T09:32:15.160000 CVE-2024-41110,0,0,0828a9e37b792ec7f9f315cd5176ea4a8f587e66960bc38baf07e1b9b29654d9,2024-11-21T09:32:15.160000
CVE-2024-41111,0,0,665f20b9d755c6c7bb267dbd73a6180909ddc5c8215f76600ab07bc7c5da96d6,2024-11-21T09:32:15.313000 CVE-2024-41111,0,0,665f20b9d755c6c7bb267dbd73a6180909ddc5c8215f76600ab07bc7c5da96d6,2024-11-21T09:32:15.313000
CVE-2024-41112,0,0,bc8e5f69dde8d72eb450e345c435e85ed4a2143be127dbff47fbc17d72bf816d,2024-11-21T09:32:15.440000 CVE-2024-41112,0,0,bc8e5f69dde8d72eb450e345c435e85ed4a2143be127dbff47fbc17d72bf816d,2024-11-21T09:32:15.440000
@ -263004,7 +263010,7 @@ CVE-2024-41116,0,0,5546a46444bccb9de9544b6f3ce4d5e22554446a9d23dd1fc02569af6f6fd
CVE-2024-41117,0,0,4748a235c3c4962c29c365cb725994bf3ffbdf2e4973cf7b4d29cf72eb877f3c,2024-11-21T09:32:16.157000 CVE-2024-41117,0,0,4748a235c3c4962c29c365cb725994bf3ffbdf2e4973cf7b4d29cf72eb877f3c,2024-11-21T09:32:16.157000
CVE-2024-41118,0,0,1c22d307e0d598e43676928b7e223a48ef13b5d81b0bf18408bb144799d21861,2024-11-21T09:32:16.303000 CVE-2024-41118,0,0,1c22d307e0d598e43676928b7e223a48ef13b5d81b0bf18408bb144799d21861,2024-11-21T09:32:16.303000
CVE-2024-41119,0,0,789ab2836440cdadc06d40217aae0baed51674d6118b6b91c971322c275e3367,2024-11-21T09:32:16.440000 CVE-2024-41119,0,0,789ab2836440cdadc06d40217aae0baed51674d6118b6b91c971322c275e3367,2024-11-21T09:32:16.440000
CVE-2024-4112,0,0,9bc0f5f209106fb82ffabf66b4775078e13784b0401056688ab8694af415cd98,2024-11-21T09:42:12.590000 CVE-2024-4112,0,1,a6db2571a66ef7484d96c8eb2232de2ae1b7c9704f52b5c6cd3ce5a6d5c86a9b,2025-01-27T16:25:42.507000
CVE-2024-41120,0,0,5b938dd69bd2492a246908a754283ba6e9688c03153ff57c918b4a00a2e575dd,2024-11-21T09:32:16.570000 CVE-2024-41120,0,0,5b938dd69bd2492a246908a754283ba6e9688c03153ff57c918b4a00a2e575dd,2024-11-21T09:32:16.570000
CVE-2024-41121,0,0,374711efd90f8bef888fc0a990e1377a432545303c0f660f4c0aa92e85f6e951,2024-11-21T09:32:16.693000 CVE-2024-41121,0,0,374711efd90f8bef888fc0a990e1377a432545303c0f660f4c0aa92e85f6e951,2024-11-21T09:32:16.693000
CVE-2024-41122,0,0,45d752aacfa539a5e009f40936a14e6a360821e6c83ae104526079fdf4e09c41,2024-11-21T09:32:16.823000 CVE-2024-41122,0,0,45d752aacfa539a5e009f40936a14e6a360821e6c83ae104526079fdf4e09c41,2024-11-21T09:32:16.823000
@ -263025,7 +263031,7 @@ CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16
CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000 CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000
CVE-2024-41138,0,0,2f7a818785ef2934dbddd109df6f3e2783aff9964fe63637e4cf14a1f84cecd7,2024-12-18T23:15:07.813000 CVE-2024-41138,0,0,2f7a818785ef2934dbddd109df6f3e2783aff9964fe63637e4cf14a1f84cecd7,2024-12-18T23:15:07.813000
CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000 CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000
CVE-2024-4114,0,0,bffdfff59b8e8c1973fa293ec179ba5ad5b6804845f0d8c3580b8b465845a4ff,2024-11-21T09:42:12.847000 CVE-2024-4114,0,1,df47c128dd44e8de848f43cd2e4eaabcbab418e785226a36dd24dff1b6e661e3,2025-01-27T16:37:59.997000
CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000 CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000
CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000 CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000
CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000 CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000
@ -266316,6 +266322,7 @@ CVE-2024-45594,0,0,651cebc99a25a678ed80943347c1bd3bdd4d373d64b9fb0bdc90402f17bb7
CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000 CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000
CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000 CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000
CVE-2024-45597,0,0,087955741b4733da11a2028fe8eb3cfea1534628f3b702c7289ba61a14f82b2a,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,087955741b4733da11a2028fe8eb3cfea1534628f3b702c7289ba61a14f82b2a,2024-09-11T16:26:11.920000
CVE-2024-45598,1,1,4d894788c00da99f7580f72608a2c6769987481b92858fed7e5a8d000297de2b,2025-01-27T16:15:31.267000
CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000 CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000
CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000 CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000
CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000 CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000
@ -269949,7 +269956,7 @@ CVE-2024-50690,0,0,9d5fa667da25b907f6a8d87ed87c65d16d14dce5412c7abd336edf942643f
CVE-2024-50692,0,0,fec59c437336f571adcbf83fec674e931b40d1cf7b23eb876e2a61aa2f9cabfc,2025-01-24T23:15:08.893000 CVE-2024-50692,0,0,fec59c437336f571adcbf83fec674e931b40d1cf7b23eb876e2a61aa2f9cabfc,2025-01-24T23:15:08.893000
CVE-2024-50694,0,0,c4a29afb99bd1e874c60e1d69672eac5fd9e1fe06d6cb9ed86352c05fa98a55f,2025-01-24T23:15:09 CVE-2024-50694,0,0,c4a29afb99bd1e874c60e1d69672eac5fd9e1fe06d6cb9ed86352c05fa98a55f,2025-01-24T23:15:09
CVE-2024-50695,0,0,ba9592191562dd4b73b0b9f3dc66267a4d0aae1cf21634e627c788fb039c6890,2025-01-24T23:15:09.130000 CVE-2024-50695,0,0,ba9592191562dd4b73b0b9f3dc66267a4d0aae1cf21634e627c788fb039c6890,2025-01-24T23:15:09.130000
CVE-2024-50697,0,0,44480bba42848065bf0e807d881b5cf04b331a1ddf64b6d62fd6405bd648f176,2025-01-24T23:15:09.253000 CVE-2024-50697,0,1,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000
CVE-2024-50698,0,0,df6c508ce768af8f3e964c09d1903f787ab399323d7035e459e6e13ed4e33c03,2025-01-24T23:15:09.380000 CVE-2024-50698,0,0,df6c508ce768af8f3e964c09d1903f787ab399323d7035e459e6e13ed4e33c03,2025-01-24T23:15:09.380000
CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000 CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000
CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000
@ -272891,7 +272898,7 @@ CVE-2024-56009,0,0,96f071c94111451d291e37d056df8453fec397f0dfaf0daf702005d50f48a
CVE-2024-5601,0,0,acbfc7658ae08d87e0393a42bceb6ed0cbea62f439f049ccb260c38457891d44,2024-11-21T09:47:59.930000 CVE-2024-5601,0,0,acbfc7658ae08d87e0393a42bceb6ed0cbea62f439f049ccb260c38457891d44,2024-11-21T09:47:59.930000
CVE-2024-56010,0,0,abfee7a614fa30718c572403d14ed9d8aaf5c96a3a3d6be2d2210bb3eb57e7a4,2024-12-18T12:15:11.790000 CVE-2024-56010,0,0,abfee7a614fa30718c572403d14ed9d8aaf5c96a3a3d6be2d2210bb3eb57e7a4,2024-12-18T12:15:11.790000
CVE-2024-56011,0,0,df80f8d7d3163fed1af288dc48d84f051092d97eab0b32a7296de9bf9805f102,2024-12-16T15:15:27.803000 CVE-2024-56011,0,0,df80f8d7d3163fed1af288dc48d84f051092d97eab0b32a7296de9bf9805f102,2024-12-16T15:15:27.803000
CVE-2024-56012,0,1,bfb40795940ae36cb9510bf7d47d48ddfa2c9c4aa4920024a77866ab0c924df6,2025-01-27T14:15:28.123000 CVE-2024-56012,0,0,bfb40795940ae36cb9510bf7d47d48ddfa2c9c4aa4920024a77866ab0c924df6,2025-01-27T14:15:28.123000
CVE-2024-56013,0,0,66afe1219cf5092e0bf59ef7fb7049edb9487332252559e650d10503ecabda2b,2024-12-16T15:15:28.090000 CVE-2024-56013,0,0,66afe1219cf5092e0bf59ef7fb7049edb9487332252559e650d10503ecabda2b,2024-12-16T15:15:28.090000
CVE-2024-56014,0,0,81e2006f49a53a95301038d6b1cd19a62b2179e0709f0e1b07273452a175a95f,2025-01-02T13:15:07.803000 CVE-2024-56014,0,0,81e2006f49a53a95301038d6b1cd19a62b2179e0709f0e1b07273452a175a95f,2025-01-02T13:15:07.803000
CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c217d,2024-12-16T15:15:28.230000 CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c217d,2024-12-16T15:15:28.230000
@ -273675,6 +273682,8 @@ CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad
CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000
CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
CVE-2024-57590,1,1,46c496c435b48512be9b0e1fd5d874cd6c907680662c52962d0f94c9a9940fe0,2025-01-27T15:15:11.463000
CVE-2024-57595,1,1,e945c5b3578d3dde99010919578995e95b82ad320cb57326cf2ce4ca0414d822,2025-01-27T16:15:31.613000
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
CVE-2024-57611,0,0,e23c6948d65a5243c368ddb9d20386aa125c64c82a7a8dbb52b2d18c0c979c46,2025-01-16T16:15:33.893000 CVE-2024-57611,0,0,e23c6948d65a5243c368ddb9d20386aa125c64c82a7a8dbb52b2d18c0c979c46,2025-01-16T16:15:33.893000
@ -278247,7 +278256,7 @@ CVE-2025-22508,0,0,5d8664a0aa0edd6273a6b83a3d209997381a4764cb066100315f48a722d20
CVE-2025-22510,0,0,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000 CVE-2025-22510,0,0,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000
CVE-2025-22511,0,0,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000 CVE-2025-22511,0,0,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000
CVE-2025-22512,0,0,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000 CVE-2025-22512,0,0,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000
CVE-2025-22513,1,1,fe7ab0ce96f60a89f7ead483aca4cb5a9f1ed3cf3c8f6ac9594d0ec36f1ced8b,2025-01-27T14:15:28.233000 CVE-2025-22513,0,0,fe7ab0ce96f60a89f7ead483aca4cb5a9f1ed3cf3c8f6ac9594d0ec36f1ced8b,2025-01-27T14:15:28.233000
CVE-2025-22514,0,0,d3fea3865cb0e9cbdd48ba69178aff5ea61ee16cb9d92ed1522341dc3c9564eb,2025-01-13T14:15:11.290000 CVE-2025-22514,0,0,d3fea3865cb0e9cbdd48ba69178aff5ea61ee16cb9d92ed1522341dc3c9564eb,2025-01-13T14:15:11.290000
CVE-2025-22515,0,0,51b7aadc030c956d2c5358cbbea157a89fe0c8781c0772024e256d945eaf061c,2025-01-07T16:15:46.497000 CVE-2025-22515,0,0,51b7aadc030c956d2c5358cbbea157a89fe0c8781c0772024e256d945eaf061c,2025-01-07T16:15:46.497000
CVE-2025-22516,0,0,1e00a835018f3d8a5a2146e73ca06f663e6b5f20899e52befe5b59b682de3f14,2025-01-07T16:15:46.653000 CVE-2025-22516,0,0,1e00a835018f3d8a5a2146e73ca06f663e6b5f20899e52befe5b59b682de3f14,2025-01-07T16:15:46.653000
@ -278559,7 +278568,7 @@ CVE-2025-23453,0,0,559af2b40776602b954faf6eb051d0ee733c24375fc61f4efde0fb69b8546
CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda747b,2025-01-21T18:15:16.223000 CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda747b,2025-01-21T18:15:16.223000
CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000 CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000
CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000 CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000
CVE-2025-23457,1,1,6e057ab08bb741e89a0ffea7e8dea8985eae05b6f9cc096c88b14b8f2cead473,2025-01-27T14:15:28.373000 CVE-2025-23457,0,0,6e057ab08bb741e89a0ffea7e8dea8985eae05b6f9cc096c88b14b8f2cead473,2025-01-27T14:15:28.373000
CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000 CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000
CVE-2025-23462,0,0,1cbda40c7b026a7751435703bbbcd0136a0f74272df54465e1461cee90b3e6e0,2025-01-22T15:15:15.800000 CVE-2025-23462,0,0,1cbda40c7b026a7751435703bbbcd0136a0f74272df54465e1461cee90b3e6e0,2025-01-22T15:15:15.800000
CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000
@ -278590,7 +278599,9 @@ CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4
CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000
CVE-2025-23522,0,0,98ad48d238b58e05014b495e757593673327270f911d4e0eb6b8c40c96dd710a,2025-01-24T11:15:10.290000 CVE-2025-23522,0,0,98ad48d238b58e05014b495e757593673327270f911d4e0eb6b8c40c96dd710a,2025-01-24T11:15:10.290000
CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000
CVE-2025-23529,1,1,7c49e2722b714953d08192912f197c560ce62c5bae83cb8ae69a000dd9552fd3,2025-01-27T15:15:11.813000
CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000 CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000
CVE-2025-23531,1,1,4670c6590086f49674e69b2116a3ddfd10459247a34dc78c173fd8ffc6170555,2025-01-27T15:15:11.963000
CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000 CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000
CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000
CVE-2025-23535,0,0,3d511b60f3f593e8a9f930b9c1bcde4706da165ad4e13c65d31e0f22e6a2e21e,2025-01-22T15:15:17.290000 CVE-2025-23535,0,0,3d511b60f3f593e8a9f930b9c1bcde4706da165ad4e13c65d31e0f22e6a2e21e,2025-01-22T15:15:17.290000
@ -278612,6 +278623,7 @@ CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27
CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000
CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000
CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000
CVE-2025-23574,1,1,bbc9c25cbfc7104d2eddf794ebf5301264245f038b4d9e44b0ed37c1cdde53c5,2025-01-27T15:15:12.123000
CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000 CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000
CVE-2025-23578,0,0,06d6355f414f82fbd5bf55726a97e1bfcad56da2ed33fa8e52f7f055aa010983,2025-01-22T15:15:17.687000 CVE-2025-23578,0,0,06d6355f414f82fbd5bf55726a97e1bfcad56da2ed33fa8e52f7f055aa010983,2025-01-22T15:15:17.687000
CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000 CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000
@ -278653,12 +278665,14 @@ CVE-2025-23643,0,0,3da60483c0db5a8dc05580f03d199bb8be013bf0c2d67c3cf934aac37d8d4
CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000
CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000
CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000
CVE-2025-23656,1,1,34623765832494c9f427e32362d335e8212fabaf06c59b8b508619e471edee33,2025-01-27T15:15:12.267000
CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000 CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000
CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000 CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000
CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000 CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000
CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000 CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000
CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000
CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000
CVE-2025-23669,1,1,9d3b37ccadd2ee69ebcf7dda5f5c3274138874e1b048df0c9bf6fb374b103459,2025-01-27T15:15:12.423000
CVE-2025-23672,0,0,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000 CVE-2025-23672,0,0,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000
CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000 CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000
CVE-2025-23674,0,0,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000 CVE-2025-23674,0,0,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000
@ -278712,6 +278726,9 @@ CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827
CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000
CVE-2025-23746,0,0,01c9493c9d9f35137d949e9259b4b92a38e781d34f3f66cad8da83d524975422,2025-01-22T15:15:22.783000 CVE-2025-23746,0,0,01c9493c9d9f35137d949e9259b4b92a38e781d34f3f66cad8da83d524975422,2025-01-22T15:15:22.783000
CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000 CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000
CVE-2025-23752,1,1,c4a79df1175fc8304cc7d0bc1439213a7f94dd9651e5758ccfd85de4caf11e24,2025-01-27T15:15:12.570000
CVE-2025-23754,1,1,21c71491dc1049f80bc2b3d0ef81d089692e692ff20a4894b4b54787667340c8,2025-01-27T15:15:12.727000
CVE-2025-23756,1,1,b189fbbb2b658c767f0f6a4b533dbbc808056809be370f040f7098f77febf47e,2025-01-27T15:15:12.877000
CVE-2025-23758,0,0,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000 CVE-2025-23758,0,0,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000
CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000 CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000
CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000
@ -278734,7 +278751,7 @@ CVE-2025-23783,0,0,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cd
CVE-2025-23784,0,0,8c0d6e67f08bcd712d7618a2fdaed5576d6fe4cd62138647e95a874adb22e650,2025-01-22T15:15:23.713000 CVE-2025-23784,0,0,8c0d6e67f08bcd712d7618a2fdaed5576d6fe4cd62138647e95a874adb22e650,2025-01-22T15:15:23.713000
CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000 CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000
CVE-2025-23791,0,0,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000 CVE-2025-23791,0,0,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000
CVE-2025-23792,1,1,aa8a534e57fa1fe04836c78a67c4dc88758c04e35eedcc8b40f2730571b15e2a,2025-01-27T14:15:28.510000 CVE-2025-23792,0,0,aa8a534e57fa1fe04836c78a67c4dc88758c04e35eedcc8b40f2730571b15e2a,2025-01-27T14:15:28.510000
CVE-2025-23793,0,0,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000 CVE-2025-23793,0,0,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000
CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282b72,2025-01-16T21:15:20.397000 CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282b72,2025-01-16T21:15:20.397000
CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000 CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000
@ -278782,6 +278799,7 @@ CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d
CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000
CVE-2025-23846,0,0,114fb14cb9da08075fcfc087aa4768cbe85e21250c7be555b4cbae1d924c3409,2025-01-22T15:15:24.570000 CVE-2025-23846,0,0,114fb14cb9da08075fcfc087aa4768cbe85e21250c7be555b4cbae1d924c3409,2025-01-22T15:15:24.570000
CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000
CVE-2025-23849,1,1,bf70545cda3ebf325b56b2f2693bbb11f9011740b066c0073d88333206143d7b,2025-01-27T15:15:13.087000
CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000
CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000
CVE-2025-23859,0,0,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000 CVE-2025-23859,0,0,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000
@ -278877,6 +278895,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96
CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
CVE-2025-23966,0,0,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000 CVE-2025-23966,0,0,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000
CVE-2025-23982,1,1,7dfe3e48e718999b3739cbfc59b600560c8c7feccf14557bc94cb8c8978377d9,2025-01-27T15:15:13.247000
CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000 CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000
CVE-2025-23992,0,0,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000 CVE-2025-23992,0,0,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000
CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000 CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000
@ -278924,7 +278943,10 @@ CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6
CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000 CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000
CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
CVE-2025-24533,1,1,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000 CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000
CVE-2025-24537,1,1,06c9da6fbc6f8c7d8022c609da167bba6221fe718dd9e4ef9e6a1c0e2d457262,2025-01-27T15:15:13.440000
CVE-2025-24538,1,1,0f8d31f1296887dcb26ac5acc0a368526d03dde9efa05b94d9d3fe598ce981df,2025-01-27T15:15:13.607000
CVE-2025-24540,1,1,cd6ea69ba28b1ebb10b70369bc57bb82429bc2558c0fbb08776f05fe155ad78b,2025-01-27T15:15:13.753000
CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000 CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000
CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000 CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000
CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000 CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000
@ -278943,26 +278965,33 @@ CVE-2025-24578,0,0,9ebad620682ffd1f3787c587a27256d6a506f18cbd8a1ce1d1120fd892563
CVE-2025-24579,0,0,39320e1ca3cff811d077bb02f394492c461e2541554c51a875dd94da458bac42,2025-01-24T18:15:35.090000 CVE-2025-24579,0,0,39320e1ca3cff811d077bb02f394492c461e2541554c51a875dd94da458bac42,2025-01-24T18:15:35.090000
CVE-2025-24580,0,0,ab85777d568cb058beb30f27c69bfb0e37c8ac9491945266f51ef971bad94724,2025-01-24T18:15:35.247000 CVE-2025-24580,0,0,ab85777d568cb058beb30f27c69bfb0e37c8ac9491945266f51ef971bad94724,2025-01-24T18:15:35.247000
CVE-2025-24582,0,0,209ec204e7084e59b84c8b89cb45a02f8bb82fd1340ff31459e78d9843eb29cf,2025-01-24T18:15:35.397000 CVE-2025-24582,0,0,209ec204e7084e59b84c8b89cb45a02f8bb82fd1340ff31459e78d9843eb29cf,2025-01-24T18:15:35.397000
CVE-2025-24584,1,1,ec624d1fe00528a4d78cb393fa88bdd0f3f84e5ff50c15e452e60d5158f27631,2025-01-27T14:15:28.797000 CVE-2025-24584,0,0,ec624d1fe00528a4d78cb393fa88bdd0f3f84e5ff50c15e452e60d5158f27631,2025-01-27T14:15:28.797000
CVE-2025-24585,0,0,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6fc0,2025-01-24T18:15:35.550000 CVE-2025-24585,0,0,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6fc0,2025-01-24T18:15:35.550000
CVE-2025-24587,0,0,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000 CVE-2025-24587,0,0,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000
CVE-2025-24588,0,0,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000 CVE-2025-24588,0,0,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000
CVE-2025-24589,0,0,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000 CVE-2025-24589,0,0,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000
CVE-2025-24590,1,1,580c4727e14b3c72d8f1177bc055b65b534b114c0c672831f103a1a27dfd8f0d,2025-01-27T15:15:13.947000
CVE-2025-24591,0,0,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000 CVE-2025-24591,0,0,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000
CVE-2025-24593,1,1,9c36266dcac20d200a08525d83ae20f675d64d14e2bb734ccd76bf4940d786e2,2025-01-27T15:15:14.090000
CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000 CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000
CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000 CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000
CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000 CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000
CVE-2025-24601,1,1,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000 CVE-2025-24600,1,1,dcdd8cdf482b8e22d2a48b0e2f348d3c7f88226c6331542bf0912f288b741729,2025-01-27T15:15:14.233000
CVE-2025-24601,0,0,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000
CVE-2025-24603,1,1,cc1c8cd1942a1d516a081ea3f5d2c128e09834a700f6e631e4df98b4ec31c06c,2025-01-27T15:15:14.437000
CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000 CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000
CVE-2025-24606,1,1,5a6e3000a389ad1fa9dbb9a960a9755d84ee1b04bf140fb25209a300fb4fcd1a,2025-01-27T15:15:14.587000
CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000 CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000
CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000 CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000
CVE-2025-24612,1,1,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000 CVE-2025-24612,0,0,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000
CVE-2025-24613,0,0,a70c00764d3411f7b1338b628fc12a47b1328b33b9da5afc488f76f92c8b96df,2025-01-24T18:15:37.277000 CVE-2025-24613,0,0,a70c00764d3411f7b1338b628fc12a47b1328b33b9da5afc488f76f92c8b96df,2025-01-24T18:15:37.277000
CVE-2025-24618,0,0,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914cb5,2025-01-24T18:15:37.430000 CVE-2025-24618,0,0,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914cb5,2025-01-24T18:15:37.430000
CVE-2025-24622,0,0,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000 CVE-2025-24622,0,0,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000
CVE-2025-24623,0,0,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000 CVE-2025-24623,0,0,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000
CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000 CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000
CVE-2025-24626,1,1,a470e4da4e034c9f2ab445a591e418acc188dd505508f456d0941bc394263b92,2025-01-27T15:15:14.777000
CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000 CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000
CVE-2025-24628,1,1,921a9ab162d6fedf70ed90c3acec080864c3f2a85c667b57a58565282ba9c543,2025-01-27T15:15:14.923000
CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000 CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000
CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000 CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000
CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000 CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000
@ -278972,25 +279001,32 @@ CVE-2025-24647,0,0,f6ab095caebb935495a3077e569d4af7bedb49dd976f7af33513a1117411a
CVE-2025-24649,0,0,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000 CVE-2025-24649,0,0,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000
CVE-2025-24650,0,0,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000 CVE-2025-24650,0,0,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000
CVE-2025-24652,0,0,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000 CVE-2025-24652,0,0,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000
CVE-2025-24653,1,1,408e86a56d40c8f1c0b312c60889ac307abc053e0e8c018bdc2bca0d36d2d1d5,2025-01-27T15:15:15.070000
CVE-2025-24657,0,0,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000 CVE-2025-24657,0,0,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000
CVE-2025-24658,0,0,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000 CVE-2025-24658,0,0,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000
CVE-2025-24659,0,0,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000 CVE-2025-24659,0,0,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000
CVE-2025-24662,1,1,27878902ec55f4204bcf626ed0428d032df6e4bd607c7cf2341e48b70e6c7048,2025-01-27T15:15:15.227000
CVE-2025-24663,0,0,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000 CVE-2025-24663,0,0,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000
CVE-2025-24664,1,1,e142f1d81388788ba783728cd696a786cdd602c54bb1d2ebfadc69d775ffab0a,2025-01-27T14:15:29.197000 CVE-2025-24664,0,0,e142f1d81388788ba783728cd696a786cdd602c54bb1d2ebfadc69d775ffab0a,2025-01-27T14:15:29.197000
CVE-2025-24665,1,1,81034157e6db7312064705af9ce24a8c0be15161b323b0f7f8171673d558ba8a,2025-01-27T15:15:15.427000
CVE-2025-24666,0,0,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000 CVE-2025-24666,0,0,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000
CVE-2025-24667,1,1,1e0906759416e9f4c0ab78fbcb920dc0c37d792a28a3a9703816635fd9271669,2025-01-27T15:15:15.563000
CVE-2025-24668,0,0,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000 CVE-2025-24668,0,0,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000
CVE-2025-24669,0,0,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000 CVE-2025-24669,0,0,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000
CVE-2025-24671,1,1,80414cb3ee53e07eb9a801fa6bfa16ece239e0582dc4d21928c4c0b694e22f8d,2025-01-27T15:15:15.703000
CVE-2025-24672,0,0,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000 CVE-2025-24672,0,0,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000
CVE-2025-24673,0,0,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000 CVE-2025-24673,0,0,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000
CVE-2025-24674,0,0,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000 CVE-2025-24674,0,0,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000
CVE-2025-24675,0,0,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000 CVE-2025-24675,0,0,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000
CVE-2025-24678,0,0,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000 CVE-2025-24678,0,0,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000
CVE-2025-24679,0,0,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000 CVE-2025-24679,0,0,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000
CVE-2025-24680,1,1,ee92ab35d8ea62f4412a0c5790b423c24efec8268d9bcf8b858ef4c57752a78d,2025-01-27T15:15:15.863000
CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000 CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000
CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000 CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000
CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000 CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000
CVE-2025-24685,1,1,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000 CVE-2025-24685,0,0,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000
CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000 CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000
CVE-2025-24689,1,1,1de513e8e8f691d40e4b3e7d3658a5a290626246a247d5f74e6d4f1c5b396ca3,2025-01-27T15:15:16.073000
CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000 CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000
CVE-2025-24693,0,0,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000 CVE-2025-24693,0,0,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000
CVE-2025-24695,0,0,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000 CVE-2025-24695,0,0,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000
@ -279002,6 +279038,7 @@ CVE-2025-24703,0,0,53afab872f7388167263b805962dd844307667888eb889ce9f196026e4f41
CVE-2025-24704,0,0,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000 CVE-2025-24704,0,0,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000
CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000 CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000
CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000 CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000
CVE-2025-24708,1,1,92ede108f27ffdee04adb376065e31ecf2859fc8c1a57b0e6ab76efd11e64544,2025-01-27T15:15:16.230000
CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000 CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000
CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000 CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000
CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000 CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000
@ -279025,15 +279062,24 @@ CVE-2025-24730,0,0,de57057c50132029cabb407237df8b5f924deea8b827b83bc9ff22cd2540b
CVE-2025-24731,0,0,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000 CVE-2025-24731,0,0,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000
CVE-2025-24732,0,0,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000 CVE-2025-24732,0,0,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000
CVE-2025-24733,0,0,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000 CVE-2025-24733,0,0,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000
CVE-2025-24734,1,1,776dc8fab06354245b63813cb1f46c60a31f47b9db2c0d9d07dc48517820de35,2025-01-27T15:15:16.390000
CVE-2025-24736,0,0,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000 CVE-2025-24736,0,0,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000
CVE-2025-24738,0,0,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000 CVE-2025-24738,0,0,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000
CVE-2025-24739,0,0,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000 CVE-2025-24739,0,0,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000
CVE-2025-24740,1,1,3ed38d5262ac02fff3a663f5f949c11c0cd89a7d54d800c75b45e3c0ffe8fb12,2025-01-27T15:15:16.537000
CVE-2025-24741,1,1,72c065bd1bcd5bc54d46ae78dae1d4290adb8b0339f70c091a76971244cb31f3,2025-01-27T15:15:16.680000
CVE-2025-24742,1,1,fdc8b63c6ff274e5ad2c81e4e78067e07196646ebfce59fa5e30bad60678d76b,2025-01-27T15:15:16.830000
CVE-2025-24743,1,1,41c0ba755259a09bb78d30034dfcceff3f65521049087232d94552c5b5203844,2025-01-27T15:15:16.977000
CVE-2025-24744,1,1,e89d8ff4eca838607435ef9e0329695df1c3d2f7f7da2a6a7138e174e3ce48dc,2025-01-27T15:15:17.117000
CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000 CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000
CVE-2025-24747,1,1,0ef68093fe47b6e703556413c3e771c9fd229228f186762cf3469f52d01e5aa5,2025-01-27T15:15:17.253000
CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000 CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000
CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000 CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000
CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000 CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000
CVE-2025-24754,1,1,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651fae5,2025-01-27T14:15:29.477000 CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651fae5,2025-01-27T14:15:29.477000
CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
CVE-2025-24782,1,1,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000
CVE-2025-24783,1,1,983739b4b6db772062f234d204411da7c6d0f02691f8ac115fc04130ed2519bd,2025-01-27T15:15:17.610000
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000 CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000

Can't render this file because it is too large.