Auto-Update: 2025-01-10T17:00:19.672506+00:00

This commit is contained in:
cad-safe-bot 2025-01-10 17:03:44 +00:00
parent 46d82ed44b
commit 9c9fa26cd5
74 changed files with 6597 additions and 272 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33287",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.583",
"lastModified": "2024-11-21T08:05:20.330",
"lastModified": "2025-01-10T16:15:26.393",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33485",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T13:15:09.637",
"lastModified": "2024-11-21T08:05:38.000",
"lastModified": "2025-01-10T16:15:26.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33507",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T13:15:09.880",
"lastModified": "2024-11-21T08:05:39.220",
"lastModified": "2025-01-10T16:15:26.803",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33508",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T13:15:09.960",
"lastModified": "2024-11-21T08:05:39.370",
"lastModified": "2025-01-10T16:15:26.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33509",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T13:15:10.220",
"lastModified": "2024-11-21T08:05:39.520",
"lastModified": "2025-01-10T16:15:27.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33627",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.423",
"lastModified": "2024-11-21T08:05:46.667",
"lastModified": "2025-01-10T15:15:08.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33628",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.470",
"lastModified": "2024-11-21T08:05:46.803",
"lastModified": "2025-01-10T16:15:27.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33629",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.520",
"lastModified": "2024-11-21T08:05:46.937",
"lastModified": "2025-01-10T16:15:27.567",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33631",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.607",
"lastModified": "2024-11-21T08:05:47.223",
"lastModified": "2025-01-10T16:15:27.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33632",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.650",
"lastModified": "2024-11-21T08:05:47.360",
"lastModified": "2025-01-10T16:15:27.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33633",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.690",
"lastModified": "2024-11-21T08:05:47.503",
"lastModified": "2025-01-10T16:15:28.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33634",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.733",
"lastModified": "2024-11-21T08:05:47.640",
"lastModified": "2025-01-10T15:15:10.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33635",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.780",
"lastModified": "2024-11-21T08:05:47.780",
"lastModified": "2025-01-10T15:15:10.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33636",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.820",
"lastModified": "2024-11-21T08:05:47.930",
"lastModified": "2025-01-10T15:15:10.753",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33637",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.877",
"lastModified": "2024-11-21T08:05:48.090",
"lastModified": "2025-01-10T15:15:10.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33638",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.923",
"lastModified": "2024-11-21T08:05:48.253",
"lastModified": "2025-01-10T15:15:11.200",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33639",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:09.967",
"lastModified": "2024-11-21T08:05:48.390",
"lastModified": "2025-01-10T15:15:11.423",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33640",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:10.010",
"lastModified": "2024-11-21T08:05:48.540",
"lastModified": "2025-01-10T15:15:11.637",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33641",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:10.050",
"lastModified": "2024-11-21T08:05:48.690",
"lastModified": "2025-01-10T15:15:11.847",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33642",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:10.097",
"lastModified": "2024-11-21T08:05:48.833",
"lastModified": "2025-01-10T15:15:12.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33643",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T21:15:10.137",
"lastModified": "2024-11-21T08:05:48.980",
"lastModified": "2025-01-10T15:15:12.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33718",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T19:15:26.997",
"lastModified": "2024-11-21T08:05:53.770",
"lastModified": "2025-01-10T15:15:12.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-401"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33722",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T19:15:27.090",
"lastModified": "2024-11-21T08:05:54.217",
"lastModified": "2025-01-10T15:15:12.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33730",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.630",
"lastModified": "2024-11-21T08:05:54.510",
"lastModified": "2025-01-10T15:15:13.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-319"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33732",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.677",
"lastModified": "2024-11-21T08:05:54.810",
"lastModified": "2025-01-10T15:15:13.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33735",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.720",
"lastModified": "2024-11-21T08:05:55.260",
"lastModified": "2025-01-10T15:15:13.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33736",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T13:15:10.270",
"lastModified": "2024-11-21T08:05:55.420",
"lastModified": "2025-01-10T15:15:13.960",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34257",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.860",
"lastModified": "2024-11-21T08:06:52.500",
"lastModified": "2025-01-10T15:15:14.193",
"vulnStatus": "Modified",
"cveTags": [
{
@ -39,6 +39,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,20 +2,80 @@
"id": "CVE-2023-35685",
"sourceIdentifier": "security@android.com",
"published": "2025-01-08T18:15:15.033",
"lastModified": "2025-01-08T18:15:15.033",
"vulnStatus": "Received",
"lastModified": "2025-01-10T15:30:48.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemIntMapPages of devicemem_server.c, there is a possible physical\u00a0page uaf due to a logic error in the code. This could lead to local\u00a0escalation of privilege in the kernel with no additional execution\u00a0privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En DevmemIntMapPages de devicemem_server.c, existe una posible p\u00e1gina f\u00edsica uaf debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://issuetracker.google.com/issues/42420027",
"source": "security@android.com"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://issuetracker.google.com/issues/42420027",
"source": "security@android.com",
"tags": [
"Exploit",
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0550",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-02-28T05:15:08.770",
"lastModified": "2024-11-21T08:46:51.127",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-10T15:22:26.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,22 +73,58 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/mintplex-labs/anything-llm/commit/e1dcd5ded010b03abd6aa32d1bf0668a48e38e17",
"source": "security@huntr.dev"
},
"nodes": [
{
"url": "https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6",
"source": "security@huntr.dev"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/mintplex-labs/anything-llm/commit/e1dcd5ded010b03abd6aa32d1bf0668a48e38e17",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0",
"matchCriteriaId": "0D667E32-5A5C-479C-BB81-47F3BCA38C13"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mintplex-labs/anything-llm/commit/e1dcd5ded010b03abd6aa32d1bf0668a48e38e17",
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6",
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mintplex-labs/anything-llm/commit/e1dcd5ded010b03abd6aa32d1bf0668a48e38e17",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-13288",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T21:15:26.220",
"lastModified": "2025-01-09T21:15:26.220",
"lastModified": "2025-01-10T15:15:14.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Drupal Monster Menus allows Object Injection.This issue affects Monster Menus: from 0.0.0 before 9.3.4, from 9.4.0 before 9.4.2."
},
{
"lang": "es",
"value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Drupal Monster Menus permite la inyecci\u00f3n de objetos. Este problema afecta a Monster Menus: desde 0.0.0 antes de 9.3.4, desde 9.4.0 antes de 9.4.2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "mlhess@drupal.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20659",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:05.220",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-10T15:26:59.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,97 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.5011",
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.5011",
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3260",
"matchCriteriaId": "68801079-35D1-4489-A0AE-DA780FF4F9BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4317",
"matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4317",
"matchCriteriaId": "BB1732A1-CE96-4F6A-BA6D-E67CD42C486D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.2033",
"matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2762",
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1189",
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20659",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23493",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-02-29T08:15:47.380",
"lastModified": "2024-11-21T08:57:49.490",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-10T15:34:43.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,79 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.1.9",
"matchCriteriaId": "EEF3AB70-F893-4C93-B1A6-C6B82F2C1816"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.2.5",
"matchCriteriaId": "068FD4E8-B93A-42CE-8F90-F81D66F7FB89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4.0",
"versionEndExcluding": "9.4.2",
"matchCriteriaId": "9B3CC387-1591-408A-A136-9B5B4C921223"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:9.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "8F679A96-8EB0-4D6B-81A0-48A7CB5E955F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:9.3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8532CAD6-E40C-4D3B-8323-3F20DB433B7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:9.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "680A0F36-FDCB-4BFC-A853-B23DF4605DF3"
}
]
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
"source": "responsibledisclosure@mattermost.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mattermost.com/security-updates",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24988",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-02-29T08:15:47.640",
"lastModified": "2024-11-21T09:00:05.530",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-10T15:38:05.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,64 @@
"value": "CWE-400"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.1.8",
"matchCriteriaId": "8BEDF730-8343-4F71-9C8B-0FAEF0BC7248"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.1.5",
"matchCriteriaId": "B5A5F372-12BE-4A46-864C-BEEB37339927"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndExcluding": "9.2.4",
"matchCriteriaId": "7869A30E-31F8-4BCD-99F1-B0296E44D6D0"
}
]
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
"source": "responsibledisclosure@mattermost.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mattermost.com/security-updates",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-25371",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T16:15:28.387",
"lastModified": "2025-01-10T16:15:28.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gramine before a390e33e16ed374a40de2344562a937f289be2e1 suffers from an Interface vulnerability due to mismatching SW signals vs HW exceptions."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ahoi-attacks/sigy/blob/main/pocs/gramine/cve.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/gramineproject/gramine/commit/a390e33e16ed374a40de2344562a937f289be2e1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28186",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-12T20:15:08.503",
"lastModified": "2024-11-21T09:05:59.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T15:01:40.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-532"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.124",
"matchCriteriaId": "9ED5EBAE-A7D6-40EC-AD9B-A295E74603F9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-helpdesk/freescout/commit/33639a89554998dcac645613130a27ac7872605e",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-7wcq-2qmv-mvcm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/commit/33639a89554998dcac645613130a27ac7872605e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-7wcq-2qmv-mvcm",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29184",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:08.203",
"lastModified": "2024-11-21T09:07:44.997",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T15:06:59.540",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.128",
"matchCriteriaId": "C1CDF67D-DA8A-4C38-B082-2A146DD3B03D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-fffc-phh8-5h4v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-fffc-phh8-5h4v",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29185",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-22T17:15:08.440",
"lastModified": "2024-11-21T09:07:45.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T15:03:50.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.128",
"matchCriteriaId": "C1CDF67D-DA8A-4C38-B082-2A146DD3B03D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-7p9x-ch4c-vqj9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-7p9x-ch4c-vqj9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-29970",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T16:15:28.513",
"lastModified": "2025-01-10T16:15:28.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fortanix Enclave OS 3.36.1941-EM has an interface vulnerability that leads to state corruption via injected signals."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ahoi-attacks/sigy/blob/main/pocs/enclaveos/cve.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.fortanix.com/hc/en-us/sections/360012461751-Enclave-OS",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-29971",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T16:15:28.630",
"lastModified": "2025-01-10T16:15:28.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Scontain SCONE 5.8.0 has an interface vulnerability that leads to state corruption via injected signals."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ahoi-attacks/sigy/blob/main/pocs/scone/cve.md",
"source": "cve@mitre.org"
},
{
"url": "https://scontain.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30092",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:05.513",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-10T15:24:32.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -53,12 +73,109 @@
"value": "CWE-829"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20796",
"matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7428",
"matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.5011",
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.5011",
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.4317",
"matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.4317",
"matchCriteriaId": "BB1732A1-CE96-4F6A-BA6D-E67CD42C486D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.2033",
"matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7428",
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2762",
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1189",
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30092",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-33059",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-01-06T11:15:08.470",
"lastModified": "2025-01-06T11:15:08.470",
"vulnStatus": "Received",
"lastModified": "2025-01-10T16:53:02.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing frame command IOCTL calls."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de memoria durante el procesamiento de llamadas IOCTL de comandos de marco."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -47,10 +71,448 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html",
"source": "product-security@qualcomm.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863BA6B8-5F2D-4D97-BBBE-EAD5B35AB3AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0344CF-A15E-4734-852F-9553E780644B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA40FA0B-F9F1-48D4-B68A-ECD7241A5F39"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B00530E-070B-4832-AFF0-535D4A1A6F85"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28D14A7F-F116-416B-A359-32D395F706D4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B67D19B-E1B0-41A2-B122-FBA6D797F3C8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html",
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-33061",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-01-06T11:15:08.617",
"lastModified": "2025-01-06T11:15:08.617",
"vulnStatus": "Received",
"lastModified": "2025-01-10T16:49:42.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while processing IOCTL call made for releasing a trusted VM process release or opening a channel without initializing the process."
},
{
"lang": "es",
"value": "Divulgaci\u00f3n de informaci\u00f3n durante el procesamiento de una llamada IOCTL realizada para liberar un proceso de VM confiable o abrir un canal sin inicializar el proceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
@ -32,25 +36,304 @@
},
"exploitabilityScore": 2.5,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34697",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:39:27.240",
"lastModified": "2024-11-21T09:19:13.150",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T15:13:34.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-74"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.139",
"matchCriteriaId": "36F4D0DA-CB9B-441B-B2AA-0115316837EF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-helpdesk/freescout/commit/99a4b4b4e153c82e273e549b9efbf6db4a2d8328",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-985r-6qfc-hg8m",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/commit/99a4b4b4e153c82e273e549b9efbf6db4a2d8328",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-985r-6qfc-hg8m",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34698",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T15:39:27.840",
"lastModified": "2024-11-21T09:19:13.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T15:11:33.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
@ -49,24 +69,66 @@
"value": "CWE-1321"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.139",
"matchCriteriaId": "36F4D0DA-CB9B-441B-B2AA-0115316837EF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-helpdesk/freescout/commit/2614514bc6d6c4ad563202a1c9cae5a97b195cc5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-rx6j-4c33-9h3r",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/commit/2614514bc6d6c4ad563202a1c9cae5a97b195cc5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/freescout-helpdesk/freescout/security/advisories/GHSA-rx6j-4c33-9h3r",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37900",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-31T16:15:03.440",
"lastModified": "2024-09-06T21:06:34.223",
"lastModified": "2025-01-10T16:54:03.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -116,13 +116,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xwiki:xwiki:4.2:milestone-3:*:*:*:*:*:*",
"matchCriteriaId": "751D922E-D7EA-46B0-AA5D-167B9D26E72E"
"criteria": "cpe:2.3:a:xwiki:xwiki:4.2:milestone3:*:*:*:*:*:*",
"matchCriteriaId": "BC907C33-432E-4153-B1A2-9B8BF9167E1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xwiki:xwiki:16.0:rc-1:*:*:*:*:*:*",
"matchCriteriaId": "1EA34C40-11DC-4CE9-AB3F-E3A873883CFE"
"criteria": "cpe:2.3:a:xwiki:xwiki:16.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B1CD131A-4CDE-4465-BA81-77A93AFF784B"
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-43063",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2025-01-06T11:15:08.930",
"lastModified": "2025-01-06T11:15:08.930",
"vulnStatus": "Received",
"lastModified": "2025-01-10T15:37:33.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "information disclosure while invoking the mailbox read API."
},
{
"lang": "es",
"value": "Divulgaci\u00f3n de informaci\u00f3n al invocar la API de lectura del buz\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
@ -32,25 +36,519 @@
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43468",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:09.537",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-10T15:07:46.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,52 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:configuration_manager:2303:*:*:*:*:*:*:*",
"matchCriteriaId": "2D631A6F-47B8-439B-8BC1-37A4208AAA43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:configuration_manager:2309:*:*:*:*:*:*:*",
"matchCriteriaId": "BE12B253-02C8-4B72-B1F9-51E4D6CC9BF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:configuration_manager:2403:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD2CA89-CFB1-469A-8905-AC5325D34109"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4404",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-14T06:15:12.987",
"lastModified": "2024-11-21T09:42:46.560",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T16:48:29.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "3.6.3",
"matchCriteriaId": "24FC80C6-13D4-41E1-8D95-275A045A775A"
}
]
}
]
}
],
"references": [
{
"url": "https://wpmet.com/plugin/elementskit/roadmaps/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6417269d-3d49-4f33-b92a-5aacb052bab0?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wpmet.com/plugin/elementskit/roadmaps/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6417269d-3d49-4f33-b92a-5aacb052bab0?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46210",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T16:15:28.757",
"lastModified": "2025-01-10T16:15:28.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the MediaPool module of Redaxo CMS v5.17.1 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/h4ckr4v3n/26eaa57d94f749b597ede8b404c234df",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/h4ckr4v3n/research_redaxo_5_17_1.git",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-50807",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T16:15:28.883",
"lastModified": "2025-01-10T16:15:28.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trippo Responsive Filemanager 9.14.0 is vulnerable to Cross Site Scripting (XSS) via file upload using the svg and pdf extensions."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/HackShiv/4254db89214913867aa8dd5c1ec09b7e",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2024-51072",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T16:15:33.603",
"lastModified": "2024-11-26T18:15:19.603",
"lastModified": "2025-01-10T15:15:15.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to cause a Denial of Service (DoS) via ECU reset UDS service."
"value": "An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to cause a Denial of Service (DoS) via ECU reset UDS service. NOTE: this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the ECUReset specification does not allow a manufacturer to require SecurityAccess and Authentication."
},
{
"lang": "es",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-51229",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-09T22:15:29.027",
"lastModified": "2025-01-09T22:15:29.027",
"vulnStatus": "Received",
"lastModified": "2025-01-10T16:15:29.010",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in LinZhaoguan pb-cms v.2.0 allows a remote attacker to execute arbitrary code via the theme management function."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting en LinZhaoguan pb-cms v.2.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de administraci\u00f3n de temas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/LinZhaoguan/pb-cms/issues/IAYHUP",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-52896",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-19T17:15:09.797",
"lastModified": "2024-12-19T17:15:09.797",
"lastModified": "2025-01-10T15:15:15.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM MQ Appliance 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD web console could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned."
"value": "IBM MQ 9.2 LTS, 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD web console could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned."
},
{
"lang": "es",
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -53,7 +53,7 @@
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178244",
"url": "https://www.ibm.com/support/pages/node/7179152",
"source": "psirt@us.ibm.com"
}
]

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-52897",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-19T18:15:23.357",
"lastModified": "2024-12-19T18:15:23.357",
"lastModified": "2025-01-10T15:15:15.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS\u00a0web console could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned."
"value": "IBM MQ 9.2 LTS, 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD web console could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned."
},
{
"lang": "es",
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -53,7 +53,7 @@
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178086",
"url": "https://www.ibm.com/support/pages/node/7179151",
"source": "psirt@us.ibm.com"
}
]

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54761",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-09T20:15:38.990",
"lastModified": "2025-01-09T22:15:29.233",
"vulnStatus": "Received",
"lastModified": "2025-01-10T16:15:29.163",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BigAnt Office Messenger 5.6.06 is vulnerable to SQL Injection via the 'dev_code' parameter."
},
{
"lang": "es",
"value": "BigAnt Office Messenger 5.6.06 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'dev_code'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/nscan9/a31982c90ab40a8e00373bf15efbf52a",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54762",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-09T20:15:39.140",
"lastModified": "2025-01-09T20:15:39.140",
"vulnStatus": "Received",
"lastModified": "2025-01-10T16:15:29.337",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruoyi v.4.7.9 and before contains an authenticated SQL injection vulnerability. This is because the filterKeyword method does not completely filter SQL injection keywords, resulting in the risk of SQL injection."
},
{
"lang": "es",
"value": "Ruoyi v.4.7.9 y versiones anteriores contienen una vulnerabilidad de inyecci\u00f3n SQL autenticada. Esto se debe a que el m\u00e9todo filterKeyword no filtra por completo las palabras clave de inyecci\u00f3n SQL, lo que genera el riesgo de inyecci\u00f3n SQL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yangzongzhuan/RuoYi/",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-56511",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:29.510",
"lastModified": "2025-01-10T16:15:29.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DataEase is an open source data visualization analysis tool. Prior to 2.10.4, there is a flaw in the authentication in the io.dataease.auth.filter.TokenFilter class, which can be bypassed and cause the risk of unauthorized access. In the io.dataease.auth.filter.TokenFilter class, \u201drequest.getRequestURI\u201c is used to obtain the request URL, and it is passed to the \"WhitelistUtils.match\" method to determine whether the URL request is an interface that does not require authentication. The \"match\" method filters semicolons, but this is not enough. When users set \"server.servlet.context-path\" when deploying products, there is still a risk of being bypassed, which can be bypassed by any whitelist prefix /geo/../context-path/. The vulnerability has been fixed in v2.10.4."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-289"
}
]
}
],
"references": [
{
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-9f69-p73j-m73x",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56716",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-29T09:15:06.777",
"lastModified": "2025-01-09T16:16:23.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-10T15:52:00.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,146 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netdevsim: evitar entradas incorrectas del usuario en nsim_dev_health_break_write() Si se proporciona un recuento cero o uno grande, el kernel puede bloquearse."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/470c5ecbac2f19b1cdee2a6ce8d5650c3295c94b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/81bdfcd6e6a998e219c9dd49ec7291c2e0594bbc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/8e9ef6bdf71bf25f4735e0230ce1919de8985835",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/b3a6daaf7cfb2de37b89fd7a5a2ad4ea9aa3e181",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d10321be26ff9e9e912697e9e8448099654ff561",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee76746387f6233bdfa93d7406990f923641568f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.233",
"matchCriteriaId": "44569A17-FE4C-4BE3-9C0C-74AC54C7B51B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.176",
"matchCriteriaId": "DDBD8FC6-2357-4347-BFA1-B4A4A3039F35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.122",
"matchCriteriaId": "3B06AD1C-E7B3-4B24-A884-D3BE92CC042F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.68",
"matchCriteriaId": "74BA9823-CCED-4B24-815D-B82543954BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.7",
"matchCriteriaId": "811AC89A-14AC-49FA-9B54-E99526F1CA47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/470c5ecbac2f19b1cdee2a6ce8d5650c3295c94b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/81bdfcd6e6a998e219c9dd49ec7291c2e0594bbc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e9ef6bdf71bf25f4735e0230ce1919de8985835",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b3a6daaf7cfb2de37b89fd7a5a2ad4ea9aa3e181",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d10321be26ff9e9e912697e9e8448099654ff561",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ee76746387f6233bdfa93d7406990f923641568f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57686",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T14:15:29.140",
"lastModified": "2025-01-10T14:15:29.140",
"lastModified": "2025-01-10T15:15:16.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"pagetitle\" parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/Reflected%20Cross%20Site%20Scripting.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57687",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T14:15:29.280",
"lastModified": "2025-01-10T14:15:29.280",
"vulnStatus": "Received",
"lastModified": "2025-01-10T16:15:29.670",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"Cookie\" GET request parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/Command%20Injection.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57822",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T13:15:09.917",
"lastModified": "2025-01-10T14:15:29.407",
"lastModified": "2025-01-10T15:15:16.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "https://github.com/pedrib/PoC/blob/master/fuzzing/raptor-fuzz.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pedrib/PoC/blob/master/fuzzing/raptor-fuzz.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,118 @@
{
"id": "CVE-2025-22152",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:29.910",
"lastModified": "2025-01-10T16:15:29.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Atheos is a self-hosted browser-based cloud IDE. Prior to v600, the $path and $target parameters are not properly validated across multiple components, allowing an attacker to read, modify, or execute arbitrary files on the server. These vulnerabilities can be exploited through various attack vectors present in multiple PHP files. This vulnerability is fixed in v600."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Atheos/Atheos/security/advisories/GHSA-rgjm-6p59-537v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,110 @@
{
"id": "CVE-2025-22596",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:30.143",
"lastModified": "2025-01-10T16:15:30.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the modulos_visiveis.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jcj3-gqj3-rrvm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-22597",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:30.343",
"lastModified": "2025-01-10T16:15:30.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the CobrancaController.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mgj3-g922-2r9v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-22598",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:30.540",
"lastModified": "2025-01-10T16:15:30.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the cadastrarSocio.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9x2j-pw3h-p53f",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,110 @@
{
"id": "CVE-2025-22599",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:30.737",
"lastModified": "2025-01-10T16:15:30.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the home.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8354-6cxw-7g8c",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,110 @@
{
"id": "CVE-2025-22600",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:30.940",
"lastModified": "2025-01-10T16:15:30.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the avulso parameter. This vulnerability is fixed in 3.2.8."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-v856-wjh3-4rhg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-22946",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T15:15:16.710",
"lastModified": "2025-01-10T15:15:16.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda ac9 v1.0 firmware v15.03.05.19 contains a stack overflow vulnerability in /goform/SetOnlineDevName, which may lead to remote arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://noisy-caravel-a9a.notion.site/Tenda_AC9V1-0_V15-03-05-19_formSetDeviceName_sprintf_bof-16f898c94eac8057afcbceb63fda7d24",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-22949",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T16:15:31.137",
"lastModified": "2025-01-10T16:15:31.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda ac9 v1.0 firmware v15.03.05.19 is vulnerable to command injection in /goform/SetSambaCfg, which may lead to remote arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://noisy-caravel-a9a.notion.site/Tenda_AC9V1-0_V15-03-05-19_formSetSambaConf_doSystemCmd_CI-16f898c94eac80d5801bdaf777ac2b27",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23022",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T15:15:16.967",
"lastModified": "2025-01-10T16:15:31.250",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeType 2.8.1 has a signed integer overflow in cf2_doFlex in cff/cf2intrp.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://gitlab.freedesktop.org/freetype/freetype/-/issues/1312",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-10T15:00:48.015580+00:00
2025-01-10T17:00:19.672506+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-10T14:59:49.673000+00:00
2025-01-10T16:54:03.820000+00:00
```
### Last Data Feed Release
@ -33,49 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
276625
276640
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `15`
- [CVE-2024-41787](CVE-2024/CVE-2024-417xx/CVE-2024-41787.json) (`2025-01-10T14:15:28.947`)
- [CVE-2024-57686](CVE-2024/CVE-2024-576xx/CVE-2024-57686.json) (`2025-01-10T14:15:29.140`)
- [CVE-2024-57687](CVE-2024/CVE-2024-576xx/CVE-2024-57687.json) (`2025-01-10T14:15:29.280`)
- [CVE-2024-57822](CVE-2024/CVE-2024-578xx/CVE-2024-57822.json) (`2025-01-10T13:15:09.917`)
- [CVE-2024-57823](CVE-2024/CVE-2024-578xx/CVE-2024-57823.json) (`2025-01-10T13:15:10.113`)
- [CVE-2024-25371](CVE-2024/CVE-2024-253xx/CVE-2024-25371.json) (`2025-01-10T16:15:28.387`)
- [CVE-2024-29970](CVE-2024/CVE-2024-299xx/CVE-2024-29970.json) (`2025-01-10T16:15:28.513`)
- [CVE-2024-29971](CVE-2024/CVE-2024-299xx/CVE-2024-29971.json) (`2025-01-10T16:15:28.630`)
- [CVE-2024-46210](CVE-2024/CVE-2024-462xx/CVE-2024-46210.json) (`2025-01-10T16:15:28.757`)
- [CVE-2024-50807](CVE-2024/CVE-2024-508xx/CVE-2024-50807.json) (`2025-01-10T16:15:28.883`)
- [CVE-2024-56511](CVE-2024/CVE-2024-565xx/CVE-2024-56511.json) (`2025-01-10T16:15:29.510`)
- [CVE-2025-22152](CVE-2025/CVE-2025-221xx/CVE-2025-22152.json) (`2025-01-10T16:15:29.910`)
- [CVE-2025-22596](CVE-2025/CVE-2025-225xx/CVE-2025-22596.json) (`2025-01-10T16:15:30.143`)
- [CVE-2025-22597](CVE-2025/CVE-2025-225xx/CVE-2025-22597.json) (`2025-01-10T16:15:30.343`)
- [CVE-2025-22598](CVE-2025/CVE-2025-225xx/CVE-2025-22598.json) (`2025-01-10T16:15:30.540`)
- [CVE-2025-22599](CVE-2025/CVE-2025-225xx/CVE-2025-22599.json) (`2025-01-10T16:15:30.737`)
- [CVE-2025-22600](CVE-2025/CVE-2025-226xx/CVE-2025-22600.json) (`2025-01-10T16:15:30.940`)
- [CVE-2025-22946](CVE-2025/CVE-2025-229xx/CVE-2025-22946.json) (`2025-01-10T15:15:16.710`)
- [CVE-2025-22949](CVE-2025/CVE-2025-229xx/CVE-2025-22949.json) (`2025-01-10T16:15:31.137`)
- [CVE-2025-23022](CVE-2025/CVE-2025-230xx/CVE-2025-23022.json) (`2025-01-10T15:15:16.967`)
### CVEs modified in the last Commit
Recently modified CVEs: `28`
Recently modified CVEs: `57`
- [CVE-2024-10006](CVE-2024/CVE-2024-100xx/CVE-2024-10006.json) (`2025-01-10T13:15:08.440`)
- [CVE-2024-10086](CVE-2024/CVE-2024-100xx/CVE-2024-10086.json) (`2025-01-10T13:15:08.623`)
- [CVE-2024-10979](CVE-2024/CVE-2024-109xx/CVE-2024-10979.json) (`2025-01-10T13:15:08.790`)
- [CVE-2024-13130](CVE-2024/CVE-2024-131xx/CVE-2024-13130.json) (`2025-01-10T14:15:27.740`)
- [CVE-2024-13131](CVE-2024/CVE-2024-131xx/CVE-2024-13131.json) (`2025-01-10T14:15:28.793`)
- [CVE-2024-13205](CVE-2024/CVE-2024-132xx/CVE-2024-13205.json) (`2025-01-10T13:15:09.097`)
- [CVE-2024-1626](CVE-2024/CVE-2024-16xx/CVE-2024-1626.json) (`2025-01-10T14:32:09.173`)
- [CVE-2024-1666](CVE-2024/CVE-2024-16xx/CVE-2024-1666.json) (`2025-01-10T14:34:01.473`)
- [CVE-2024-1738](CVE-2024/CVE-2024-17xx/CVE-2024-1738.json) (`2025-01-10T14:35:21.370`)
- [CVE-2024-1740](CVE-2024/CVE-2024-17xx/CVE-2024-1740.json) (`2025-01-10T14:21:52.317`)
- [CVE-2024-1741](CVE-2024/CVE-2024-17xx/CVE-2024-1741.json) (`2025-01-10T14:27:57.287`)
- [CVE-2024-1892](CVE-2024/CVE-2024-18xx/CVE-2024-1892.json) (`2025-01-10T14:49:33.690`)
- [CVE-2024-1902](CVE-2024/CVE-2024-19xx/CVE-2024-1902.json) (`2025-01-10T14:29:55.370`)
- [CVE-2024-1932](CVE-2024/CVE-2024-19xx/CVE-2024-1932.json) (`2025-01-10T14:55:25.830`)
- [CVE-2024-3761](CVE-2024/CVE-2024-37xx/CVE-2024-3761.json) (`2025-01-10T14:36:20.713`)
- [CVE-2024-38819](CVE-2024/CVE-2024-388xx/CVE-2024-38819.json) (`2025-01-10T13:15:09.287`)
- [CVE-2024-39281](CVE-2024/CVE-2024-392xx/CVE-2024-39281.json) (`2025-01-10T13:15:09.467`)
- [CVE-2024-4151](CVE-2024/CVE-2024-41xx/CVE-2024-4151.json) (`2025-01-10T14:38:14.560`)
- [CVE-2024-4154](CVE-2024/CVE-2024-41xx/CVE-2024-4154.json) (`2025-01-10T14:40:50.697`)
- [CVE-2024-43610](CVE-2024/CVE-2024-436xx/CVE-2024-43610.json) (`2025-01-10T14:59:49.673`)
- [CVE-2024-45289](CVE-2024/CVE-2024-452xx/CVE-2024-45289.json) (`2025-01-10T13:15:09.710`)
- [CVE-2024-7417](CVE-2024/CVE-2024-74xx/CVE-2024-7417.json) (`2025-01-10T14:32:16.143`)
- [CVE-2024-7594](CVE-2024/CVE-2024-75xx/CVE-2024-7594.json) (`2025-01-10T13:15:10.303`)
- [CVE-2024-8929](CVE-2024/CVE-2024-89xx/CVE-2024-8929.json) (`2025-01-10T13:15:10.460`)
- [CVE-2024-8932](CVE-2024/CVE-2024-89xx/CVE-2024-8932.json) (`2025-01-10T13:15:10.617`)
- [CVE-2024-23493](CVE-2024/CVE-2024-234xx/CVE-2024-23493.json) (`2025-01-10T15:34:43.287`)
- [CVE-2024-24988](CVE-2024/CVE-2024-249xx/CVE-2024-24988.json) (`2025-01-10T15:38:05.187`)
- [CVE-2024-28186](CVE-2024/CVE-2024-281xx/CVE-2024-28186.json) (`2025-01-10T15:01:40.657`)
- [CVE-2024-29184](CVE-2024/CVE-2024-291xx/CVE-2024-29184.json) (`2025-01-10T15:06:59.540`)
- [CVE-2024-29185](CVE-2024/CVE-2024-291xx/CVE-2024-29185.json) (`2025-01-10T15:03:50.393`)
- [CVE-2024-30092](CVE-2024/CVE-2024-300xx/CVE-2024-30092.json) (`2025-01-10T15:24:32.377`)
- [CVE-2024-33059](CVE-2024/CVE-2024-330xx/CVE-2024-33059.json) (`2025-01-10T16:53:02.590`)
- [CVE-2024-33061](CVE-2024/CVE-2024-330xx/CVE-2024-33061.json) (`2025-01-10T16:49:42.207`)
- [CVE-2024-33067](CVE-2024/CVE-2024-330xx/CVE-2024-33067.json) (`2025-01-10T15:39:01.290`)
- [CVE-2024-34697](CVE-2024/CVE-2024-346xx/CVE-2024-34697.json) (`2025-01-10T15:13:34.317`)
- [CVE-2024-34698](CVE-2024/CVE-2024-346xx/CVE-2024-34698.json) (`2025-01-10T15:11:33.890`)
- [CVE-2024-37900](CVE-2024/CVE-2024-379xx/CVE-2024-37900.json) (`2025-01-10T16:54:03.820`)
- [CVE-2024-43063](CVE-2024/CVE-2024-430xx/CVE-2024-43063.json) (`2025-01-10T15:37:33.340`)
- [CVE-2024-43468](CVE-2024/CVE-2024-434xx/CVE-2024-43468.json) (`2025-01-10T15:07:46.353`)
- [CVE-2024-4404](CVE-2024/CVE-2024-44xx/CVE-2024-4404.json) (`2025-01-10T16:48:29.307`)
- [CVE-2024-51072](CVE-2024/CVE-2024-510xx/CVE-2024-51072.json) (`2025-01-10T15:15:15.173`)
- [CVE-2024-51229](CVE-2024/CVE-2024-512xx/CVE-2024-51229.json) (`2025-01-10T16:15:29.010`)
- [CVE-2024-52896](CVE-2024/CVE-2024-528xx/CVE-2024-52896.json) (`2025-01-10T15:15:15.633`)
- [CVE-2024-52897](CVE-2024/CVE-2024-528xx/CVE-2024-52897.json) (`2025-01-10T15:15:15.777`)
- [CVE-2024-54761](CVE-2024/CVE-2024-547xx/CVE-2024-54761.json) (`2025-01-10T16:15:29.163`)
- [CVE-2024-54762](CVE-2024/CVE-2024-547xx/CVE-2024-54762.json) (`2025-01-10T16:15:29.337`)
- [CVE-2024-56716](CVE-2024/CVE-2024-567xx/CVE-2024-56716.json) (`2025-01-10T15:52:00.177`)
- [CVE-2024-57686](CVE-2024/CVE-2024-576xx/CVE-2024-57686.json) (`2025-01-10T15:15:16.003`)
- [CVE-2024-57687](CVE-2024/CVE-2024-576xx/CVE-2024-57687.json) (`2025-01-10T16:15:29.670`)
- [CVE-2024-57822](CVE-2024/CVE-2024-578xx/CVE-2024-57822.json) (`2025-01-10T15:15:16.337`)
## Download and Usage

View File

@ -185550,7 +185550,7 @@ CVE-2021-44453,0,0,98781018fb7a6ea34a51aaee9c7be9f56f6b423c6fc32a990178e2f1e1ded
CVE-2021-44454,0,0,8cb2942a043a1063ea371b5e6903989f417ce41387aa7165dd0533424127bafa,2024-11-21T06:31:00.850000
CVE-2021-44457,0,0,065f8855dd2e35bb6c605d46446c66573c4d8067a5cfc2f29a95808960209996,2024-12-12T00:48:05.837000
CVE-2021-44458,0,0,6ef09f2079047621cd881186785cea0b72efc0199c412a7e898aecfdfa807fb0,2024-11-21T06:31:01.017000
CVE-2021-4446,0,1,fc600d102e4efffc5b4f3dbfa3240a392aea976863fe29ddd959e229228250d3,2025-01-10T14:46:34.020000
CVE-2021-4446,0,0,fc600d102e4efffc5b4f3dbfa3240a392aea976863fe29ddd959e229228250d3,2025-01-10T14:46:34.020000
CVE-2021-44460,0,0,a69e89211633952e61608b5a9514bf5af38fbb780ec06e9ace0705cfaf6c9f48,2024-11-21T06:31:01.170000
CVE-2021-44461,0,0,acc58e28fdc527e49ddf12b5a8172b5a546a00f1f68f323bd2547a4f3c57aa75,2024-11-21T06:31:01.323000
CVE-2021-44462,0,0,2b52ddb9d5ed6c813d39bc902442cf8a78ae7687d145e0c566feff9614cdd4e4,2024-11-21T06:31:01.483000
@ -185559,7 +185559,7 @@ CVE-2021-44464,0,0,097c2c496a79baf595a839b9658c642899762eb048cae9ff7daaa61f41ab2
CVE-2021-44465,0,0,2e7c16e43dc16f5e918944c49c5b3075b39b6f5cdaefaf9bc224b956e54e0806,2024-11-21T06:31:01.897000
CVE-2021-44466,0,0,ed333b2898add6f907be4eb4d08607833c850890069282b2d73ae7ab66da838e,2024-11-21T06:31:02.027000
CVE-2021-44467,0,0,4b21c2438848e693aa949753921b9ce5a8135153c9e2920a0a253e0914b4fb60,2024-11-21T06:31:02.160000
CVE-2021-4447,0,1,ac542358c220da57afbab953718a4d527010d27f0debd1a59cdb96735db0ca83,2025-01-10T14:39:08.560000
CVE-2021-4447,0,0,ac542358c220da57afbab953718a4d527010d27f0debd1a59cdb96735db0ca83,2025-01-10T14:39:08.560000
CVE-2021-44470,0,0,83253cc75f5908a7f914ec4c588885d8f8248070579be5fa993415103f8820cf,2024-11-21T06:31:02.323000
CVE-2021-44471,0,0,fbe8f0be576e9fac84848df6941d6884997b7ebc6d3ae06822696596faca03f4,2024-11-21T06:31:02.443000
CVE-2021-44476,0,0,1acaa0ab02a1f79e796ee303e966d8d49eb5a25db01a3ee080a5a7fe4d59d5b1,2024-11-21T06:31:02.570000
@ -225955,7 +225955,7 @@ CVE-2023-33282,0,0,b9105cd79bc3fe38b67de1004c426bb3546015ffe36bedcfc063a51cc7e79
CVE-2023-33283,0,0,aa728629f1c9780c7132c3e98fa5e81cf6102cf0d8ded155986326ffa98868c5,2025-01-07T16:15:29.973000
CVE-2023-33284,0,0,db41d8e24bc207a166de9f5ad7b6c86c72497666dab7cc586996e222d3bc20d4,2025-01-07T16:15:30.170000
CVE-2023-33285,0,0,30741f1677c923d9321a174f24cbcfbb45d70b7fa16adbecc164042f72c69993,2024-11-21T08:05:20.157000
CVE-2023-33287,0,0,1725d54a85eb14ed5ed43bcb323871ad9163e79462681a72627cfeea124f1f79,2024-11-21T08:05:20.330000
CVE-2023-33287,0,1,4589690dfbbc05dbf65975779ea5f06e069047b263db7ad14eeef921b27b9778,2025-01-10T16:15:26.393000
CVE-2023-33288,0,0,26838f7327104c1b47d024f5db0a9eb1c2668da883675bbf3c61e6d3c54ee2da,2024-11-21T08:05:20.497000
CVE-2023-33289,0,0,81b9a7ccdd1d1899e2a8c8e51b7a3bb58676862a80f4b492e1bfa278e066f540,2024-12-06T18:15:20.427000
CVE-2023-3329,0,0,3e639db55d9b83618de638ac73b22a875829db310a8f87faef030071a6e573a8,2024-11-21T08:17:01.620000
@ -226072,7 +226072,7 @@ CVE-2023-33479,0,0,ad2508dd8f6e278966b720b990c6f15325e8a2cbe4fe4e3f3725a8373469f
CVE-2023-3348,0,0,a47af7e02df43ebe845240c1cb93abd580419b490a9612e8ff067366036ee768,2024-11-21T08:17:04.407000
CVE-2023-33480,0,0,8735c4ad8b0839589eadd2e75c3be7004d4be924efd7ab1fbdf655275eaee46e,2024-11-21T08:05:37.510000
CVE-2023-33481,0,0,8705d19fdca698a6e5b048becf27a410952af796f4ec27cc89366ac7e25f0de3,2024-11-21T08:05:37.747000
CVE-2023-33485,0,0,770e713888d74e8e5a5c4f1d5966f7ae775a2fd6f4565cb1cf46d11b35253d2f,2024-11-21T08:05:38
CVE-2023-33485,0,1,3e06522b9a77150a4fe7c88f5656758237db3923ff3c4d7481ba1a7d6e0d8994,2025-01-10T16:15:26.603000
CVE-2023-33486,0,0,f78baa6f27f76e35231dbf51622df62a4f581fe3526d2476862b2edfe76e2a2a,2025-01-09T19:15:16.783000
CVE-2023-33487,0,0,d37269ddcabd1968c60193942b9605d66f65fd9ad487e56481d57ec7b3cf81a1,2025-01-09T21:15:23.500000
CVE-2023-3349,0,0,198f0750e28fec680b199f31ee62e51097776525e0e38e70fe1488f90730989a,2024-11-21T08:17:04.560000
@ -226082,9 +226082,9 @@ CVE-2023-33495,0,0,b41da8a24563d7ec6c8b1e481c93b00b01b328f982e2b129df4bb9b0e2fe8
CVE-2023-33496,0,0,3fd0a52821141bf6f5309c19678c375cd3da0df157cfd4491cb9856f63310f2a,2025-01-07T16:15:30.370000
CVE-2023-33498,0,0,379c46b468fd16d5349d5ed08fd815599da430bed83605ed93a8b87d62e95229,2025-01-07T16:15:30.577000
CVE-2023-3350,0,0,c693ece6a6dc8a063084324beeed66e17765ab0612916966eb644715f1b77e3f,2024-11-21T08:17:04.707000
CVE-2023-33507,0,0,8c8de104a836f2a97cd9fdb66854a75143bede63381b0f6428367968cc3647c8,2024-11-21T08:05:39.220000
CVE-2023-33508,0,0,eefee40d15da825ff91a58514af3667b807a8d58fe173d0d65d33f631700d05f,2024-11-21T08:05:39.370000
CVE-2023-33509,0,0,7c087a342d0e252ecbe0a47b1cafba10b65eb1c2aefbfbfaa10685cf24ed5b5c,2024-11-21T08:05:39.520000
CVE-2023-33507,0,1,503f767595170702c6b6cddfaf1994ac1e80c4c335399ea90eaf9e13cd293d47,2025-01-10T16:15:26.803000
CVE-2023-33508,0,1,364c0210bffe6fba4f2e160795ddbd2217d72478877e68024443859012bd02df,2025-01-10T16:15:26.990000
CVE-2023-33509,0,1,141c1f6990ef2fa453ce42dca73b8780ba29da9a50c0824de4eee6d0da2aecd1,2025-01-10T16:15:27.183000
CVE-2023-3351,0,0,f64258e34e1f6e2c3debe6ab542c8550e84fbbc69c1d8f132c263991d8bde067,2023-11-07T04:18:34.703000
CVE-2023-33510,0,0,2fdbca3ef3ec1beb92f8e78ca0e200b48de108215e8c467acd4f2362be303f38,2025-01-07T16:15:30.803000
CVE-2023-33515,0,0,365a9a5f6a7f4c9eca56bb36b50c44f896d0d4286fd9bf91ea545127cf4cb344,2025-01-06T18:15:14.737000
@ -226147,25 +226147,25 @@ CVE-2023-33623,0,0,6455600110e4dcbb0922b8deb7d421ed330b02bb6075f9e25d0fc1f97eec9
CVE-2023-33624,0,0,ea5f6a3d86c994e49df31e3de97fa56defcb04db68de8ad17e9b70eae94318c1,2023-11-07T04:15:06.037000
CVE-2023-33625,0,0,42fcb579d30fa37d008144acb921c2831e0fc4b840f14180371e2d4f3d6930cd,2024-11-21T08:05:46.353000
CVE-2023-33626,0,0,fd7e0127483e6e57ed2ebb541002c87885b82d73d879e76a74cb519be578f2a0,2024-11-21T08:05:46.510000
CVE-2023-33627,0,0,e0135225bee9704a4b2b4f86005bfafeb7dd3fd095d45218483c0b5b106cd71c,2024-11-21T08:05:46.667000
CVE-2023-33628,0,0,41f9f8ab02d858402f37bd428a9c1c26e42354c05a61fae9e1b7c22bc5e67abe,2024-11-21T08:05:46.803000
CVE-2023-33629,0,0,078d29129222041262fea7807ecd855f7a8e967e808188c44c86d14ad4bdff4e,2024-11-21T08:05:46.937000
CVE-2023-33627,0,1,be69c89dc294dbf9c769fed8e46c6aecbf568ff1de268341ff1a2d8341f0b7c2,2025-01-10T15:15:08.680000
CVE-2023-33628,0,1,ac0ff5ac3b1bb26a74a42053a2c69732360ee2bbee04a7bf611f172a86b04147,2025-01-10T16:15:27.373000
CVE-2023-33629,0,1,93dea99aff728d795b0357478ffa248335a6bc2e8e1ab2f8cf218fd2ed827769,2025-01-10T16:15:27.567000
CVE-2023-3363,0,0,fe7d397d3228326c17a4febf68655d5fdd11656c07da049d9e44d3cfb189eb2a,2024-11-21T08:17:06.270000
CVE-2023-33630,0,0,9a849b4f41d11456da97d275c17734d98e0658a334d37ca714d534afd67b9d6c,2024-11-21T08:05:47.090000
CVE-2023-33631,0,0,f67cfba77b0f6081c8593589334c5ca95d1bfc0a0833570f0393e3e55aed3681,2024-11-21T08:05:47.223000
CVE-2023-33632,0,0,3184280d9e4429d9a99e019e9e29b3c1ec1cc97320754568b8f2ac48e3ca8898,2024-11-21T08:05:47.360000
CVE-2023-33633,0,0,10a4826e250a1db42e4946f11c44eac88753dab10cb65bde94b759f05d09cf24,2024-11-21T08:05:47.503000
CVE-2023-33634,0,0,712133790f66debae1b5a2cd40a75ebc971302a96d27509c07bcbc93b206e3ad,2024-11-21T08:05:47.640000
CVE-2023-33635,0,0,0c59a98448f4bc86cd8cc2175c4449f5099bd637544fd7182a8370858692a8b3,2024-11-21T08:05:47.780000
CVE-2023-33636,0,0,588d1114fd23f3dfd8b67985307a8eb121ec4719b2aa1f35ffd8d2802b47b66c,2024-11-21T08:05:47.930000
CVE-2023-33637,0,0,5377a365eb711f26e4efb43e9234a70cb71939fd5d42ebd54d463469a48edde1,2024-11-21T08:05:48.090000
CVE-2023-33638,0,0,0fbd5c0dc9c70e3fe9d8f0447932fa4a3694cd75ba8903e858e50eff2054e464,2024-11-21T08:05:48.253000
CVE-2023-33639,0,0,cfff5181cf7ffe4aab925df1970244d781fadbde4c8836de75ae1a083e8dab11,2024-11-21T08:05:48.390000
CVE-2023-33631,0,1,ecc7f39e617bdf40c30c1b9d5ad99f944eaf9ca4b2d9b480ce2e2c9368539d23,2025-01-10T16:15:27.760000
CVE-2023-33632,0,1,64a9cecfbba10a0c6104c4f0ea405cf3bbc8d7e17951e2be33a000ad1e259da1,2025-01-10T16:15:27.947000
CVE-2023-33633,0,1,a0f29d13cb5a212e15d7020741e7dd04135a7dd79d3d08b231949e87da17c86a,2025-01-10T16:15:28.133000
CVE-2023-33634,0,1,f95bfa64d9460080095ddd1930f83eb0d80cd319a21f5b606c16950b3ec8147f,2025-01-10T15:15:10.230000
CVE-2023-33635,0,1,1489c38cac277fbb753cd04f016ca8d1a6971704d153d265e390bc3004a9bb21,2025-01-10T15:15:10.527000
CVE-2023-33636,0,1,d2dd4d3c8c9f417529aa6fbb47c3f413e8736210d1839f39c46632da79a60546,2025-01-10T15:15:10.753000
CVE-2023-33637,0,1,2d6cfaa38cd1eb1874a6fdfffc8291636b12a787faea1b83fbb5de787a732e09,2025-01-10T15:15:10.977000
CVE-2023-33638,0,1,f6b0a658c8181730af78937e2061a5f42be34c7d355a85b51f07de422d9452a5,2025-01-10T15:15:11.200000
CVE-2023-33639,0,1,ab02d899115553f3f72b3302d0bb8837ac3d97d6872aaa90377d132ef8eaaf88,2025-01-10T15:15:11.423000
CVE-2023-3364,0,0,8cd56a5cf175f844fde48d3b070ee8a250279dd8dea08468de1b5d00c5eacee6,2024-11-21T08:17:06.413000
CVE-2023-33640,0,0,4fd2c899d57968224f7bd7af231eb4e8e9930cb72d948627354dd42dd19307bb,2024-11-21T08:05:48.540000
CVE-2023-33641,0,0,f03645ac245a8f94feb8bc719b44cbed0a82d7ac85219a35a7fd8118532bc8ac,2024-11-21T08:05:48.690000
CVE-2023-33642,0,0,04dd767e88b758a5773a1bba9a726357784023bb5c9cdadfada68b1396bb4386,2024-11-21T08:05:48.833000
CVE-2023-33643,0,0,c2d82c119ec082a2dbaea2b12716ef3e6d07633c431b4b6e7c31fb70fdc265d6,2024-11-21T08:05:48.980000
CVE-2023-33640,0,1,622587edbdb403c9196f310560213f375b6414e0299b3791d019146fe4443a57,2025-01-10T15:15:11.637000
CVE-2023-33641,0,1,a38933db6b9a0d3e9b27d8c6e0958bdf77a6f13a45056074abdf192a7da003f4,2025-01-10T15:15:11.847000
CVE-2023-33642,0,1,94eb291b3f6bcb753c3e3bf21d79085f4ce81fe74bc8b2c0c7a1551acb51a761,2025-01-10T15:15:12.060000
CVE-2023-33643,0,1,9501c9d90d252ff370d7fbe50d71e66b3cbd4e1fe969b606ec24fedf228ecf24,2025-01-10T15:15:12.290000
CVE-2023-3365,0,0,3c6ece96e7b8e48be4d0b382be3132b3ae9a7d62f4846918d141d5fa6144fec5,2024-11-21T08:17:06.573000
CVE-2023-33651,0,0,04442e4d32da362d0447a37d19d86b2dfe398bea552278956f8e38739076a7d9,2025-01-08T17:15:12.777000
CVE-2023-33652,0,0,ed9c3fb2e1c23280631042dd046f2119a625b5cee5c68333d1e4645820a489d2,2025-01-08T15:15:13.540000
@ -226202,20 +226202,20 @@ CVE-2023-3371,0,0,df34f309dbb56ab4c9e10189049735675c625cabb2e1178e461a2d83b4b454
CVE-2023-33715,0,0,70f8ea39909ccc7d7fedfea0a5651610ab41bdd10d186bbb572c059a14a3b869,2023-11-07T04:15:24.220000
CVE-2023-33716,0,0,4db99c9c1621fc404197baa253ff070fe3c15ce45b5a77db9ce4d83a97546dcc,2025-01-09T18:15:26.273000
CVE-2023-33717,0,0,0cc9e8551affca6d31d9fa047b600ffdb3ddc33ab5b125ddf432d7a93b0fcd71,2025-01-08T21:15:11
CVE-2023-33718,0,0,1586778d15355ffee6648b131924ae371a3d2019604b5073fe93a8180e3a40a7,2024-11-21T08:05:53.770000
CVE-2023-33718,0,1,e17ef3eae98a08ee20b6dbfb83fde61d3de29b5af9b61140cf2321f4043e9cc4,2025-01-10T15:15:12.577000
CVE-2023-33719,0,0,d00c5f95efb97cdb3bff500a13a96570ea04e4dcdf87867c9053c065db4b5e7b,2025-01-09T18:15:26.460000
CVE-2023-3372,0,0,84f21b60d2b56cb6d011b3c76313017d3ef2b1ee20e683414c273e919f5c98c6,2024-11-21T08:17:07.493000
CVE-2023-33720,0,0,49c5977ed0f3bfeda29a066cdc9aaf5213c67aeca9e267720e129fdb485032f6,2024-11-21T08:05:54.077000
CVE-2023-33722,0,0,577f04a66dba80af8edcb620e449171536c8a33547fdb2eb1e16f5993cabc42b,2024-11-21T08:05:54.217000
CVE-2023-33722,0,1,4677e3bcd640e1d4d95045066e120e888974a48886cdda6ef1bfa1a1ced1a723,2025-01-10T15:15:12.993000
CVE-2023-33725,0,0,501441fd8c0850dda7db2b5cbc4c50d99063609270f88ed8b5e1f563ad958019,2024-12-06T18:15:21.850000
CVE-2023-3373,0,0,712fcfc5ec5d5a5858a7c6e82af9f759f31c8a9579462cec2a389020ad3d6bec,2024-11-21T08:17:07.620000
CVE-2023-33730,0,0,6310f4453161d8845f3526a345e65c3e7de103266213728ef16d591864176147,2024-11-21T08:05:54.510000
CVE-2023-33730,0,1,b4f23543b9c138108da75a03508191752c590ba0289d2c4b2b741b2755c62b46,2025-01-10T15:15:13.270000
CVE-2023-33731,0,0,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000
CVE-2023-33732,0,0,73e7254c99574e9b7803aa6d2e5a20146b7a53e5b864dd18f03405306d64d8a1,2024-11-21T08:05:54.810000
CVE-2023-33732,0,1,f39138533032e7e2087c74032650fabd9d1ddfad70653d6ef193b7fe677ec10a,2025-01-10T15:15:13.520000
CVE-2023-33733,0,0,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000
CVE-2023-33734,0,0,ce9b6222e7c051206355de817b0fb42912304fcb66294482b08488625c37fe80,2024-11-21T08:05:55.107000
CVE-2023-33735,0,0,342b6457f0ac3ac330051be3ab4ddae4481c406cc9b4868529f56e89a4ea2f7b,2024-11-21T08:05:55.260000
CVE-2023-33736,0,0,b465ae61bb3875ca7c41d8d8e67e22e0b88bcb8c1b5473a310e3d9926c5d0a80,2024-11-21T08:05:55.420000
CVE-2023-33735,0,1,82b8398515bddfd6dac3ee1878395a0fd126fa44bed3eddd90cbd91370e7dcc6,2025-01-10T15:15:13.740000
CVE-2023-33736,0,1,a0b290d78fb1dca7aabc3685aefd378b4a38110eea512d324625e6a3d4a5bc11,2025-01-10T15:15:13.960000
CVE-2023-3374,0,0,72d42166146b7c96e033d869d5f45174a0fbde987009f9ab5e93284a1e30de9b,2024-11-21T08:17:07.770000
CVE-2023-33740,0,0,3287cf2115588e74c8c406328378b87e047ead84082398c251fb05d1f6c6a091,2024-11-21T08:05:55.560000
CVE-2023-33741,0,0,32c5b64c05e138266539951bcf4d9734e53f50d8838681dcaa7b5c3c51629ec2,2024-11-21T08:05:55.710000
@ -226692,7 +226692,7 @@ CVE-2023-34253,0,0,7fa9d9b4a8331571eaa196a0b4846212c60f701a59352f250ed22a6a06a79
CVE-2023-34254,0,0,28bc1c030aea3f52ac42aea5cabfb0b2c4b8caf27bbf30b675459c6d8263c10e,2024-11-21T08:06:52.180000
CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a6f7,2023-11-07T04:15:33.133000
CVE-2023-34256,0,0,691415f2f013332d745607532da3b4ac21fbf0bcec117633be38405c94853d0c,2024-11-21T08:06:52.333000
CVE-2023-34257,0,0,d15b21c49281aac125543c6218a20e8e3fee27b0d9235eb7e685e0ccee8cd0cc,2024-11-21T08:06:52.500000
CVE-2023-34257,0,1,9f794a27940ab7963e721dba620365ce2ab3173ff58e0a8914d6146ac5d4b9cd,2025-01-10T15:15:14.193000
CVE-2023-34258,0,0,fcdb643155db51246493eace9830d7f00f9ad9f8e9c26b5f3acf2452f9cf252a,2025-01-08T22:15:28.060000
CVE-2023-34259,0,0,a17ffd4a41a9842f96ee8008d3ec22fa6d3e74baa3727d6c80193a1cef77d2d8,2024-11-21T08:06:52.813000
CVE-2023-3426,0,0,ae2c21d78db765200c0b63c28eb0fffcbdbf50884f08013f5098219b8325bff9,2024-11-21T08:17:14.497000
@ -227508,7 +227508,7 @@ CVE-2023-35681,0,0,c42efe9d1b23f7d568247348629915a9358c10de92db94ec496fd3dcc3d6c
CVE-2023-35682,0,0,28695289346c2b274f4a836b69c29ecf5fcd5a29c6894ee240f9a190ed31038f,2024-11-21T08:08:30.047000
CVE-2023-35683,0,0,4682530b1253e33dab4999034179170390350e9eb70d1f95eff49244af957e59,2024-11-21T08:08:30.173000
CVE-2023-35684,0,0,4ef12327b13c58353e4148a940740cb3154e8b085b8775b37446242a3afee205,2024-11-21T08:08:30.320000
CVE-2023-35685,0,0,6669021a4dd417455e4ad0b12d7f630091120938be0fe7cd04d3dbcb85764e18,2025-01-08T18:15:15.033000
CVE-2023-35685,0,1,31903078e6bb16fa43a88c9d64fcf64b103c07fbaa6238baadf02fa4ccc442b0,2025-01-10T15:30:48.627000
CVE-2023-35686,0,0,94a3cc8276f357cbdff431b3862f270310ce0b551c6f4cfe07a8422aec983ac0,2024-11-20T17:35:20.610000
CVE-2023-35687,0,0,61f15144cec0e6a248ce6f7a5bc882bcb7f347d62bd5d2c60fbc964844504f23,2024-11-21T08:08:30.577000
CVE-2023-35689,0,0,72d5c9654a341ce9c819d4654dce7c0d875c94774f8f7d751ae90bae784ac3c9,2024-11-21T08:08:30.710000
@ -242779,7 +242779,7 @@ CVE-2024-0546,0,0,f5fb8a143fe42cbbbc59b4db5a1c445445622d8768d5fb886941a0859d468a
CVE-2024-0547,0,0,acdf7429bd2a8e4ffb2eba3a58ce97308993aa35cf10e231618cc925655b3389,2024-11-21T08:46:50.653000
CVE-2024-0548,0,0,7339da5c871dd9c3dde4fd1f71a397a1ee8b50f50947dd5273374eb9d6615a92,2024-11-21T08:46:50.803000
CVE-2024-0549,0,0,cc96a4390d8e86a1f1759399f91a685c83665e265ae9ab97e0238641ab816e82,2024-11-21T08:46:50.990000
CVE-2024-0550,0,0,2f6d59f4b0f9be4ccb1f2ab50b424b40f4c952a23f59aacdab48654f693ca2ec,2024-11-21T08:46:51.127000
CVE-2024-0550,0,1,cf66f5d426f4732d6d5e859a65b202b54f97a6046ca6eb70c9b2f823e39166d9,2025-01-10T15:22:26.327000
CVE-2024-0551,0,0,a558a10069146a65a3d9896f02dee9945c10f79a15a10b28b0ef97dc7cad9c93,2024-11-21T08:46:51.247000
CVE-2024-0552,0,0,c26b1c609bfcd4fe299be1c0ec993046f357cbd73ad3f5ab06c2ddafe3ab56d8,2024-11-21T08:46:51.370000
CVE-2024-0553,0,0,987e9a4a2c3b1fc25d14af5316d4e93ca2ad5d357637fbcb0cf6b975b15d1c20,2024-11-21T08:46:51.507000
@ -243205,8 +243205,8 @@ CVE-2024-10000,0,0,5e9faf3a8582966d0617ff0bfc738adf353e4bf143cb2e221a315b99482bb
CVE-2024-10002,0,0,5c691c4a49203474796aabd6e9efcaabae6ff9dc1c736726998728d7e8cf645f,2024-10-25T21:20:39.167000
CVE-2024-10003,0,0,8b9c472d9982deca9020bf02b2566867a0fbcfbb043b63feef8aaf6db3c162f7,2024-10-25T21:19:19.743000
CVE-2024-10004,0,0,323a4c37d15c2bd1f1dc5dcc9cfc7064e954100eace59851a26a4ba42c28adcd,2024-10-16T20:35:08.850000
CVE-2024-10005,0,1,78ffba26a833e534d1e625308e59cb7c869e5dd5e6d7d6bc50d06a38f40a9d8d,2025-01-10T13:15:08.223000
CVE-2024-10006,0,1,2fffefdb7dd7179eb39d6f0b72be9bdde10944b1e2aaf06c528994dab68c5860,2025-01-10T13:15:08.440000
CVE-2024-10005,0,0,78ffba26a833e534d1e625308e59cb7c869e5dd5e6d7d6bc50d06a38f40a9d8d,2025-01-10T13:15:08.223000
CVE-2024-10006,0,0,2fffefdb7dd7179eb39d6f0b72be9bdde10944b1e2aaf06c528994dab68c5860,2025-01-10T13:15:08.440000
CVE-2024-10007,0,0,5a98677089507e4ecf1ec14273f8d80bb2daca8326b345056cd5d8837dde3034,2024-11-08T19:01:03.880000
CVE-2024-10008,0,0,430e5c41cd163f95f6d041350798011748203d8006a8933be6815e52fc33eb56,2024-10-29T14:34:04.427000
CVE-2024-1001,0,0,140fc173e33ae8fa7b986d187129f7b01af76bf1cd74c6ed57f4103bfb5a0ff3,2024-11-21T08:49:33.840000
@ -243263,7 +243263,7 @@ CVE-2024-10080,0,0,43a1f7f93e056c92c1c639ac172ae8b144e833cbd5a522d58f1f49f7054a8
CVE-2024-10081,0,0,5c422073043efca649bdbf0235dee597da99b355edaf2c92bc7ed3dcfa93a042,2024-11-06T18:17:17.287000
CVE-2024-10082,0,0,06415cdb965ac64636892c496f9de214d59f82f169c648183613af8a98253c78,2024-11-06T18:17:17.287000
CVE-2024-10084,0,0,aa7524ac6f9ff0a4b9d5665381cefd3535aab2cd20f5b5573266707557de2a8a,2024-11-06T18:17:17.287000
CVE-2024-10086,0,1,c34575f938553fa7d7ae7ba88022934e50d186981e616c6c9f4320956c07bcc0,2025-01-10T13:15:08.623000
CVE-2024-10086,0,0,c34575f938553fa7d7ae7ba88022934e50d186981e616c6c9f4320956c07bcc0,2025-01-10T13:15:08.623000
CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9f2,2024-11-21T08:49:35.077000
CVE-2024-10091,0,0,244835544befc14a0ba664699f50b681fca0c5387af75b0db99291b956c48b1d,2024-10-28T13:58:09.230000
CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000
@ -244016,7 +244016,7 @@ CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d8
CVE-2024-10976,0,0,74ddf3e112f382a760946f483990fa0747a570c018c9e28cec5188371748074d,2024-11-15T13:58:08.913000
CVE-2024-10977,0,0,e54cdfcf4a6415150b7b9a534f3117ac0a47dcbb5949b9162862d5471ded9bdf,2024-11-15T13:58:08.913000
CVE-2024-10978,0,0,a9a3fbaed2064a9cfc13aac9855e4de7204f4fc549701a42d57df44ad9ce8b58,2024-11-21T22:15:07.033000
CVE-2024-10979,0,1,238a17f741a01c51e929552d1e43d64a91da7a0f20e680ccce13d6408b6b68c1,2025-01-10T13:15:08.790000
CVE-2024-10979,0,0,238a17f741a01c51e929552d1e43d64a91da7a0f20e680ccce13d6408b6b68c1,2025-01-10T13:15:08.790000
CVE-2024-1098,0,0,975a882834838eb3bf48c2f536f6d321931f066d182e2d3421deafc25dfc3b5d,2024-11-21T08:49:47.500000
CVE-2024-10980,0,0,21985ec12d369d83f43992fef14c6cbc6da6c1d5ef9577ac04d2bad895eff395,2024-11-29T15:15:15.903000
CVE-2024-10987,0,0,60170223611ac96676d666e2f77b526bf5d828a3c3087a51d79a1e83dd1f61ac,2024-11-13T00:58:55.400000
@ -245666,8 +245666,8 @@ CVE-2024-13111,0,0,111a0995b810edb3a95164b3ad0483dc838f87262c9575afeeb4b85a996b2
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
CVE-2024-13129,0,0,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000
CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000
CVE-2024-13130,0,1,11faf417785d12b2b829d9b6bcccc37fdbc1730d9810cb9c4f93c832649c2012,2025-01-10T14:15:27.740000
CVE-2024-13131,0,1,b2e61750ac10a0f0335a98de23f2a0f4134c4b67b2d954e7edfaed8137694b3e,2025-01-10T14:15:28.793000
CVE-2024-13130,0,0,11faf417785d12b2b829d9b6bcccc37fdbc1730d9810cb9c4f93c832649c2012,2025-01-10T14:15:27.740000
CVE-2024-13131,0,0,b2e61750ac10a0f0335a98de23f2a0f4134c4b67b2d954e7edfaed8137694b3e,2025-01-10T14:15:28.793000
CVE-2024-13132,0,0,21d2d0a056783edb04baa7102838e18985529312e228439b1f29de893d6c8fa8,2025-01-05T05:15:06.400000
CVE-2024-13133,0,0,9785e69379d6a0c25057df0e85fe2b0fda922cd10a604d201c02ee6ff38b912f,2025-01-05T05:15:07.507000
CVE-2024-13134,0,0,bf32841e8233339434384501225db38253b29750f711b67f74a58aecb9e0610e,2025-01-05T08:15:05.443000
@ -245711,7 +245711,7 @@ CVE-2024-13201,0,0,98f9e9029ecdad1b3085258c9d21a620f38d90ac00edbfea61330f3072ab2
CVE-2024-13202,0,0,669843cd2767e1362c6888d90dc9775472fa50b6493947d53887c22e9cf3d3bf,2025-01-09T17:15:12.110000
CVE-2024-13203,0,0,c75812e8b13f4399ae4b97d3cdeab90eed4085ec212b5b871ccc90cb2595bb55,2025-01-09T17:15:12.280000
CVE-2024-13204,0,0,29b356ed8e68b4bf4c454a187403ce827799c9b4a8c71e1fb3c28ca6727e9acb,2025-01-09T03:15:24.603000
CVE-2024-13205,0,1,9464f2ec9efe376869968fe98439f4ee92c2be5d685bfc791c3582f593a3a139,2025-01-10T13:15:09.097000
CVE-2024-13205,0,0,9464f2ec9efe376869968fe98439f4ee92c2be5d685bfc791c3582f593a3a139,2025-01-10T13:15:09.097000
CVE-2024-13206,0,0,3592680ac4f9d21850041d74074be88a605be70d439b1229b27538d812be260a,2025-01-09T04:15:10.990000
CVE-2024-13209,0,0,ba59362766f93c6d18b5a8987b5e8a847432c789f656b7315b541fc0de12a958,2025-01-09T04:15:11.683000
CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000
@ -245777,7 +245777,7 @@ CVE-2024-13284,0,0,f29f36578b65f269a33c81fe5d9c1a986550d143312eff439e25779bf7934
CVE-2024-13285,0,0,3c2d960e80255c947cc21bff2fc9b9887bd9cbe7f247c7db73500733b093f1ff,2025-01-09T20:15:37.470000
CVE-2024-13286,0,0,2be87bdad97df7101a80c97396cb7342869f882ce1accf2c5cfe477e3e869a95,2025-01-09T20:15:37.563000
CVE-2024-13287,0,0,7906a094e70f1303f9491230307f037ede132ecb2ea5fcc4199e68a3c197f43b,2025-01-09T20:15:37.687000
CVE-2024-13288,0,0,f59ed336371644b5bb49dfbb3e2567c8b97d5d1d9bafbbf25266517469693eff,2025-01-09T21:15:26.220000
CVE-2024-13288,0,1,484b285fe67627f0a3814c7f4cb93516543dbe556954b79bc457882560b64019,2025-01-10T15:15:14.787000
CVE-2024-13289,0,0,48e222bf785072e755d3929ae6762a5fcf3fb418f435b7a0b8cf782cd891dfda,2025-01-09T21:15:26.340000
CVE-2024-1329,0,0,81b4a64d5bb53c5c7897dd1baf274bad80194678ff3074e25c9eae4cebc9cdd9,2024-11-21T08:50:20.753000
CVE-2024-13290,0,0,4ee56e82e95c0dc9b1b1f342245311de34c2e667cc820779f982a033cf27cc79,2025-01-09T21:15:26.447000
@ -246076,7 +246076,7 @@ CVE-2024-1622,0,0,641704d79708c5027cc525cdcdef74d012d3f37e9becbffc2cb36bf8a804f9
CVE-2024-1623,0,0,9237c655c57b57297f9d4e4236790c55b53a9289ac0a8c9d29baec29f36f1ab5,2024-11-21T08:50:56.787000
CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000
CVE-2024-1625,0,0,a3c7b4228295e9fdc1f0f0703e1d7098f9618bfe3ecc3707e6c876bbb21a68f5,2025-01-08T18:58:39.100000
CVE-2024-1626,0,1,8db5e9a7288598c466eba03561bceefa6719998255d5bf571d808455a162f36c,2025-01-10T14:32:09.173000
CVE-2024-1626,0,0,8db5e9a7288598c466eba03561bceefa6719998255d5bf571d808455a162f36c,2025-01-10T14:32:09.173000
CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fbda,2024-11-21T08:50:57.333000
CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000
CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000
@ -246114,7 +246114,7 @@ CVE-2024-1661,0,0,57419dfac19fc8b1117ab03280b3c2a88810749b66775f5fc9b43a910e481c
CVE-2024-1662,0,0,147b493f649bc748f75384551192827ffc56f17812a25b829b7ebf0a1ed43a45,2024-11-21T08:51:01.957000
CVE-2024-1664,0,0,fc796a5cda9ab945ac2e01ad0d3d81c8417c6e40e09dc13c67abc31672246faf,2024-11-21T08:51:02.093000
CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000
CVE-2024-1666,0,1,0da5ef87cd368b0872991f1fa468b53ecfc325b14531868e2cd66d4ef2d9951e,2025-01-10T14:34:01.473000
CVE-2024-1666,0,0,0da5ef87cd368b0872991f1fa468b53ecfc325b14531868e2cd66d4ef2d9951e,2025-01-10T14:34:01.473000
CVE-2024-1668,0,0,c554786f14197afea48fe5d32ecff02cb5a486b44d4745ad9f0f7814f93d7c93,2024-11-21T08:51:02.413000
CVE-2024-1669,0,0,67b8eec966ddacedd4e70201d9e33c690767f007ef44b6e221a074947960a93a,2024-12-19T17:32:13.720000
CVE-2024-1670,0,0,e643325c520a7a851aaa6d5c5034d3498bbfacaad698e63e558de9d2308fc412,2024-12-19T17:33:44.580000
@ -246183,10 +246183,10 @@ CVE-2024-1733,0,0,6508d2b5fb32c2573644403b0a9c315289a80afcfecac1317ebb718d1a2bbd
CVE-2024-1735,0,0,7db5b578f50f68036d47590d9fa7513610b67146b451cc0887c1e730aba3dd20,2024-11-21T08:51:11.510000
CVE-2024-1736,0,0,8844706a3e68d2dcbf3764ca91f6b5acfccaa7343cfd31da9dab0ed1924920fe,2024-11-21T08:51:11.693000
CVE-2024-1737,0,0,593418afa5de4602eb69dd941b0e02c901b4d4739e447e76ddfa6cfa85dbabe0,2024-11-21T08:51:11.837000
CVE-2024-1738,0,1,f780707e5e3eb6bbfad32e3b36dde215a430d1659d4f0c7523a3d6b02b4d6779,2025-01-10T14:35:21.370000
CVE-2024-1738,0,0,f780707e5e3eb6bbfad32e3b36dde215a430d1659d4f0c7523a3d6b02b4d6779,2025-01-10T14:35:21.370000
CVE-2024-1739,0,0,8995e9874fb16405155b50a06edf1894c83d5f5c9bffbfd0a7dc87a3d52987fc,2024-11-21T08:51:12.100000
CVE-2024-1740,0,1,fdf35329d7e6282f8cd0bf5fff4badc7e73faa74613bd17a2ce0aea294cf76e3,2025-01-10T14:21:52.317000
CVE-2024-1741,0,1,90ee076cc24227c4915928fa20105cd66d2a8582eaf01885e4170c37a6850366,2025-01-10T14:27:57.287000
CVE-2024-1740,0,0,fdf35329d7e6282f8cd0bf5fff4badc7e73faa74613bd17a2ce0aea294cf76e3,2025-01-10T14:21:52.317000
CVE-2024-1741,0,0,90ee076cc24227c4915928fa20105cd66d2a8582eaf01885e4170c37a6850366,2025-01-10T14:27:57.287000
CVE-2024-1742,0,0,542c2c34f16f6008fa22df8f55e52bcadfd55af05e5a0a313be70cc620f28193,2024-12-04T16:50:05.197000
CVE-2024-1743,0,0,bfffd3e6d4c6d98b5de5cbd7060f38603701b2f85ddbd4f81f5c93adc8294983,2024-11-21T08:51:12.680000
CVE-2024-1744,0,0,e57e89c1c38c1b4f16fac07cd4c094af44c29de3b59f0a0effddbbf171558f72,2024-09-13T20:30:09.373000
@ -246332,7 +246332,7 @@ CVE-2024-1888,0,0,686d9dfa2f61081fcb36c9d67a30cbcb804ac5568ad19af5f4e97270f289a5
CVE-2024-1889,0,0,bbec90f94e410af96ec1a71c20825f6011a10d67397b8e33b7d0ea3552f52308,2024-11-21T08:51:31.993000
CVE-2024-1890,0,0,c5f46dc2a333094435e2b609540134b0c26e8e3f3e7e75cc9ac13010af4ec50b,2024-11-21T08:51:32.120000
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
CVE-2024-1892,0,1,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000
CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000
CVE-2024-1893,0,0,96630d900c1dbdfc80604705c4d7ee070ff5059b8755b1cc663c0560706f43d2,2024-11-21T08:51:32.537000
CVE-2024-1894,0,0,5f7debca258de63a030f43b257eea3885330ce9bec9f619efd4d0e0a45be4e24,2024-11-21T08:51:32.663000
CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000
@ -246342,7 +246342,7 @@ CVE-2024-1898,0,0,df4569290047ddaac8150c6cb06f413d4a3171d5a8bfff553407a0020dd889
CVE-2024-1899,0,0,40fb5e76195a966ed2f9c2f9f806f40458f96148e21a41dc2acf991f4cece812,2024-11-21T08:51:33.317000
CVE-2024-1900,0,0,f881fab7684a20d971b8a8aa44c738635846f8721e30624ba500440528156b1c,2024-11-21T08:51:33.443000
CVE-2024-1901,0,0,7c912c9d925cface47b3667a73bd4854a08825c4b20741b5a200d0c51e0913f0,2024-11-21T08:51:33.640000
CVE-2024-1902,0,1,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000
CVE-2024-1902,0,0,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000
CVE-2024-1904,0,0,4cf346fe8c9ae0848df8fe773f1344813fcc2d51af2b435997026eba4ffc0e52,2024-11-21T08:51:33.987000
CVE-2024-1905,0,0,9438b0be2531bbc1baec0a545feda53b61cecb9096148dc315dd330c5967f3c0,2024-11-21T08:51:34.117000
CVE-2024-1906,0,0,585b2a5ddfa9da688ccc05c3adce2c6e116818c5e5c9fa6b8b8e48d0db1d5628,2025-01-07T14:34:56.787000
@ -246370,7 +246370,7 @@ CVE-2024-1928,0,0,831df8a037e58b0dc6307f13520381be26c994d0bf2071b8173aeb591ebee8
CVE-2024-1929,0,0,66be880166e4ec1807686bf782b92499d984f95d0cb3506835484b1d8d6dd831,2024-11-21T08:51:37.297000
CVE-2024-1930,0,0,4e0ea797e3bcfbe6df93f1e664d676ae5be49ce3d01faca149c7e20b46d8fb7c,2024-11-21T08:51:37.427000
CVE-2024-1931,0,0,db484bcf3fe471ed684baac919e3006a76f44b1624ec62ec54d0a30f78125057,2024-12-17T16:56:50.630000
CVE-2024-1932,0,1,33e4b6e7f852d6fa68534d5a1d41766e9f9788bc5e9241b0efb3c2f27d1eddac,2025-01-10T14:55:25.830000
CVE-2024-1932,0,0,33e4b6e7f852d6fa68534d5a1d41766e9f9788bc5e9241b0efb3c2f27d1eddac,2025-01-10T14:55:25.830000
CVE-2024-1933,0,0,ec2acdb0cb128d6d2e4e087e8a75f4db01db65f33280945e832ec822f7e9b472,2024-11-21T08:51:37.853000
CVE-2024-1934,0,0,67d0b46c0c7d874343f5536356cb6ea32a08b1ee91ce9868fb168e6a1ff7f380,2024-11-21T08:51:37.983000
CVE-2024-1935,0,0,7e29f8870d182b73d0c15e13ea8561d34771d6a0f8dd33b0c27960c094edef9c,2024-11-21T08:51:38.110000
@ -246926,7 +246926,7 @@ CVE-2024-20655,0,0,2e96939f7096b6bf97cd3cc6db38fcc5b32adc9c020b471d109239588553e
CVE-2024-20656,0,0,99437998cdb6b7af888da30de953a81e60594e6ff8cbd6599cc93767d14a7396,2024-11-21T08:52:51.190000
CVE-2024-20657,0,0,89fb5cb0c3c9a565f02e075a0587c96b4a2faee8569c837121c5ebec25a20faa,2024-11-21T08:52:51.330000
CVE-2024-20658,0,0,b39cfdc9da88331f6e350618d7e638c8c88b8d4aee601fe478f7bc234f70e050,2024-11-21T08:52:51.487000
CVE-2024-20659,0,0,b19df5a22462437cdfeff7e62454671fe0b01022792e07337421cb0c631b63b9,2024-10-10T12:56:30.817000
CVE-2024-20659,0,1,fd402873858ccf6dfab4223947612c92241be23bf7b09a1215d709be9f7f5424,2025-01-10T15:26:59.787000
CVE-2024-2066,0,0,037c499f3e012a9997068e72fc08d1a93e6383033f9bd4e4f09138fe51a30e00,2024-12-17T20:22:01.370000
CVE-2024-20660,0,0,62eab3f0977cb409429db0b6d382c512aaf0086ae7a71cc738b9cb3e4da3c6d0,2024-11-21T08:52:51.727000
CVE-2024-20661,0,0,30e543c400437abc7f96e3109a6c30132015ba4b260c75c12935ac357f961878,2024-12-31T19:15:09.523000
@ -249289,7 +249289,7 @@ CVE-2024-23489,0,0,2f1c7040c28578859cc62c33e9def7324caefd81ec04dd9ba2fec25d07880
CVE-2024-2349,0,0,8c63339920fc156162d73ba58fde151c2cb3e8522b28748cc2e7252c0bc45137,2024-11-21T09:09:34.150000
CVE-2024-23491,0,0,fc3a3c05294904d030f2fb1ecc0d204d3cdfa4b0ec09d0724dfa8542ba2b38d0,2024-08-31T03:37:08.710000
CVE-2024-23492,0,0,72b93e9a584dbde5d8ab0fb7df4a6ec3063f70ded2f2a29640b63af1909058c4,2024-11-21T08:57:49.363000
CVE-2024-23493,0,0,7f53e9e90aef98586fe707ae49b244557aec56943b34aa77fcf3945fd2fc671a,2024-11-21T08:57:49.490000
CVE-2024-23493,0,1,f23dc0829aa555a40c0195eac98a1683b3d99281b1fe3b5c0b60764820081f10,2025-01-10T15:34:43.287000
CVE-2024-23494,0,0,78a0143ef70eeda681b16e5dbaf59dfc105374fb144f18ff2a49707e216b0991,2024-11-21T08:57:49.617000
CVE-2024-23495,0,0,784641c99d1c05ee8a67e1f9360adfbc5835008a814a7ce6cd17ffbf39eccba7,2024-08-31T03:38:43.080000
CVE-2024-23496,0,0,51615d0b1eb611f158a0b5f983b8931eb0421d85bb78165a91df251e6b029a8f,2024-11-21T08:57:49.887000
@ -250311,7 +250311,7 @@ CVE-2024-24983,0,0,c8352764a63f6e980b98bc6bfe6dc0ec87ab71f61ab608de76d184597d527
CVE-2024-24984,0,0,567c9bd096a581925e3572e03ea5eeb0f022b51699fa71ede6b70b03cbba44ab,2024-11-15T14:00:09.720000
CVE-2024-24985,0,0,094cf98cc2834beed20248e4007d784f8f54307826d7d129d410921b97d6ed81,2024-11-15T14:00:09.720000
CVE-2024-24986,0,0,b3a0aebd140b4a87042d6dd637f5da69c8a05632aba7bbfe41c00120f8cc0218,2024-09-06T20:23:48.690000
CVE-2024-24988,0,0,c0b35bc7b196ac4c4a07abde162a557909026a442c012cbe61e3e1318d343936,2024-11-21T09:00:05.530000
CVE-2024-24988,0,1,74b8e9b9bae0b532768d5857c0d83160975e281bd61a0e187400101505fbc03f,2025-01-10T15:38:05.187000
CVE-2024-24989,0,0,47235b2a829b48983692a66465ee23949950254e8806e809055cb12909af6df1,2024-11-21T09:00:05.640000
CVE-2024-2499,0,0,58df8167ded63ef11aaf8fbfc99b0704fcf662a903d318b087b95eac1c8b0467,2024-11-21T09:09:53.297000
CVE-2024-24990,0,0,2e71c7b065f4e6a1008eadb9235e495f55c4b8557060386a7a771ac2cc1951ab,2024-11-21T09:00:05.750000
@ -250572,6 +250572,7 @@ CVE-2024-25360,0,0,e089036b5b01d137197b9a6e98d6b65bdfd97c49cd47a370e756821b6a4c1
CVE-2024-25366,0,0,bf9f988e5beaaf7037d5fc5d41f1eb493cdf15de69761504441d1ea806f128cd,2024-11-21T09:00:41.110000
CVE-2024-25369,0,0,1a5279686e5277f0474570d04c1907565b1c826db6e265d9d5232bbf5aaaad58,2024-11-21T09:00:41.330000
CVE-2024-2537,0,0,245581af9cb0004fabdffbfca72e0fda0e6cf99c56b5dfae5408c1dd2468d6fa,2024-11-21T09:09:58.103000
CVE-2024-25371,1,1,fb84c66c03160fc9b17e39e699a17d3cfacd952a2f9116bb27e43b73b377c32c,2025-01-10T16:15:28.387000
CVE-2024-25373,0,0,d4bb0f33d1aeb2a5a53c5ed2764be7945bf1d210aae7d091cb88bf312c0ab5f9,2024-11-21T09:00:41.553000
CVE-2024-25376,0,0,b9162f08a32a4213913d51b909fda1191d4711871cec0062f7a25dc6ad917cb9,2024-11-21T09:00:41.780000
CVE-2024-2538,0,0,18ba10814d39428e8d5577752d8b03a64068541821e5f9329f304872357fbfde,2024-11-21T09:09:58.220000
@ -252890,7 +252891,7 @@ CVE-2024-28182,0,0,36cc5d7b3bc1aeb665e26b64252bf571693be9481e520c82c88e8eddbab3b
CVE-2024-28183,0,0,9555513c15c6dd9baed3e2d069779762ef7c565391599ac1fbeee74892cf2eba,2024-11-21T09:05:58.690000
CVE-2024-28184,0,0,370084a8e90495469345d406c602827577c8b094ab0a15533bd01353c221406e,2024-11-21T09:05:58.833000
CVE-2024-28185,0,0,a1eeaa960835511bd15f7ed3bbb03116366af2e2e6ed485d3595923119625447,2024-11-21T09:05:58.963000
CVE-2024-28186,0,0,2c370fa0c40f14a8a634c3908f5d363b14ec7a5e47fdb015163fe145e9d0f6b1,2024-11-21T09:05:59.110000
CVE-2024-28186,0,1,dbe644f0d73db6e0c226eafd6a70e1fbbab0d471fc2640cee55ffd8ab6efd5d3,2025-01-10T15:01:40.657000
CVE-2024-28187,0,0,0a3450f5073be1d4240c0ef0f2f407d6b15b5cea6d54b8a4ffe80e8263924365,2024-11-21T09:05:59.240000
CVE-2024-28188,0,0,e75215c635ecc7d09582fbef46324329d57c09d369f24af90d98772bf8f316aa,2024-11-21T09:05:59.380000
CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da9b1,2024-11-21T09:05:59.537000
@ -253563,8 +253564,8 @@ CVE-2024-29180,0,0,116b696fe96a4565704c86f1098f1218e060f9688c96251259ff2087a89c9
CVE-2024-29181,0,0,787534a49fdc63ee4e12d4639da0074229100df572eea4d1a3a06db8df3f16a1,2024-11-21T09:07:44.597000
CVE-2024-29182,0,0,84fab37a55923e968892a68e297c3b6f80fcae95a1591c1201e406df4067b079,2024-11-21T09:07:44.747000
CVE-2024-29183,0,0,fd0ed0c4879d280da07373a65b78a91f8c034277bf95de7ba491dfc4f846768f,2024-11-21T09:07:44.867000
CVE-2024-29184,0,0,655e97fa6fa84cb831256db5f00bca541673f1ceb770767b95224690cd97136d,2024-11-21T09:07:44.997000
CVE-2024-29185,0,0,8d99e9ed779c67e1dc67b7dae535d5bd6340aeedde0bf0738b1e354608e49f30,2024-11-21T09:07:45.130000
CVE-2024-29184,0,1,cc65e3d93843e698f34dcfd4021ec3a71c46ea7698e543f80cf7a5818fa6fcb9,2025-01-10T15:06:59.540000
CVE-2024-29185,0,1,3677eebb5221d77a41e368233c9b66f78ae2e952643d71ecc6a19499cbdbc620,2025-01-10T15:03:50.393000
CVE-2024-29186,0,0,a98190bd4833d9a7540522d19ecc93c48a15f6bfeecb4ecf44d533ba21b5c73b,2024-11-21T09:07:45.250000
CVE-2024-29187,0,0,46c93c5bd7e9b9bfb1abedefc75f2564d7d5632cc362c6b5882375457f77367a,2024-11-21T09:07:45.380000
CVE-2024-29188,0,0,55fa3922ebc7a9242bb7d8d0170873a959d0b6087d9b4ca3064a532a0081beab,2024-11-21T09:07:45.513000
@ -254026,6 +254027,8 @@ CVE-2024-29967,0,0,d82ebad11dfb5d1cfca5a40a54c1664eab6b2c7049d86eaeba6d5832308b0
CVE-2024-29968,0,0,95773ad208e1e4b128f66738a28ba326d5e907ec8172642086a5ae899f98380d,2024-11-21T09:08:43.297000
CVE-2024-29969,0,0,a88342fd00c5b13b444b2dc3a9c41d7d06d0bb130b74314a54468c2ede3b5437,2024-11-21T09:08:43.420000
CVE-2024-2997,0,0,34d2a19b9ff69df27205fef4532b986a51bd9c34f866ab6910f03b0cf9556b07,2024-11-21T09:11:01.173000
CVE-2024-29970,1,1,6eee5d9c35e9989cca65c85ec9b1b6e0715d4347724078113bd083e8254c451a,2025-01-10T16:15:28.513000
CVE-2024-29971,1,1,858eb64991edd224e0c51c73f20652d0ae6dc02a2218256d2f6c24a1ee6b53c1,2025-01-10T16:15:28.630000
CVE-2024-29972,0,0,6789dec1505bc16fc7487fc6a6563ee2c036e2b2e7990ce846671e51abc497fe,2024-11-21T09:08:43.547000
CVE-2024-29973,0,0,c0179d9591ff9c8c3a58f725811618cb79cf3b8dc534dd890d6f1abf11fc38e6,2024-11-21T09:08:43.707000
CVE-2024-29974,0,0,6c9561e4b7e476227460e4afb5bc9a6fb1a67ccafcf602ee9861291d337fb70e,2024-11-21T09:08:43.847000
@ -254155,7 +254158,7 @@ CVE-2024-30089,0,0,df39b47ac758d568fc39f205f46b5582f7b3a3e6793b2c8ae50dda60747f5
CVE-2024-3009,0,0,0f23fa38cd3191090e42a61ddd71dd843c4e5519806a72880bf73cfc944c509a,2024-11-21T09:28:40.150000
CVE-2024-30090,0,0,1a438b6683135c5d5936ba9f8ae1910116ade7a49c0196448f2e2521e486cfc3,2024-11-21T09:11:14.603000
CVE-2024-30091,0,0,8018d9b9b4f1bb12fc1908369f01eba5691d488aac9f67806789ed99b6457617,2024-11-21T09:11:14.757000
CVE-2024-30092,0,0,07019dfe3c56ad632f8044a437cd52f315415ad17f2038336ca09e1520c54f9d,2024-10-10T12:56:30.817000
CVE-2024-30092,0,1,3fe3e4798d3a5ff9f34c92f69a4683da6aab7136aa94c378cac5231a24f485ef,2025-01-10T15:24:32.377000
CVE-2024-30093,0,0,4327ccf40494724e2d65bcc23049518066e89626afdc825354ab14354891e92b,2024-11-21T09:11:15.003000
CVE-2024-30094,0,0,f0bd6b759be29dbd3e0837577f419891032336b1fde726d2f8a867367a3754d2,2024-11-21T09:11:15.153000
CVE-2024-30095,0,0,189963df6ca6958ce9c0454cf6367e649d4f5b9d1cc7840f7da6d6a2d71caeb3,2024-11-21T09:11:15.307000
@ -256499,15 +256502,15 @@ CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b
CVE-2024-33055,0,0,bf23714a88a34d953acad88be0163778517e670dd4538435308364f84bac9dd5,2025-01-06T11:15:08.310000
CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000
CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000
CVE-2024-33059,0,0,f061aacd21fb2658c82f91356f41645818a6b5e092df8a0cba9bd3f1b5cedb57,2025-01-06T11:15:08.470000
CVE-2024-33059,0,1,b9157366e9b41bb8006e58246e65f5bdeba75ea2269f83b299649471535ea483,2025-01-10T16:53:02.590000
CVE-2024-3306,0,0,093d5328c842e15a972b71e278c2d0dbdec8004a861bda133bd4338bd1cf6d54,2024-09-19T14:43:51.830000
CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000
CVE-2024-33061,0,0,a45b1e729ebb5b9bb038b7fafb5c5028a4fbcb6b9643409dfc42bc0664669b94,2025-01-06T11:15:08.617000
CVE-2024-33061,0,1,b0627241cbc4503bd4dd0966c9f67f04028229894bb9dd55ef35e59ac1ae6e81,2025-01-10T16:49:42.207000
CVE-2024-33063,0,0,653997ca09ab3cc513e42e57788b4aeaeb606731b2b1f5440bf511b2642493be,2024-12-12T15:26:19.350000
CVE-2024-33064,0,0,02367680089235514c560f68b202c9e04de82b07dbfb786741881f3459cd7935,2024-10-16T19:52:54.483000
CVE-2024-33065,0,0,820aeb82046c04074680c0efb639ca176e5bd0cb7e0d09e06a9618e10b57f782,2024-10-16T19:50:45.190000
CVE-2024-33066,0,0,323275c133034cf4224fb00037d116cf25466127dfeb2577a4ca56f8f20e540b,2024-10-16T19:49:40.333000
CVE-2024-33067,0,0,fb59dae36a5bf0ad8508db8803a155df789fe3e6c3caa06195243c275d307002,2025-01-06T11:15:08.770000
CVE-2024-33067,0,1,638bc9109794811420c30f35ea11d5d4e8d641b82ad31ae2a8a04e02b6bda35c,2025-01-10T15:39:01.290000
CVE-2024-33068,0,0,1d4eb491ffd27751b128ddbcdd27665d885fb6c0654a60e64c8908848b5f2e57,2024-11-07T20:07:29.220000
CVE-2024-33069,0,0,4a5a5f18faff9786c7e7eff1069eadfad4725803a4dd186adcecf1b88d434afa,2024-10-16T19:48:32.207000
CVE-2024-3307,0,0,5392e910a9f18aa74f00667d7fa40ed94d60062bc5e8b43b55756ba9f0da5e3e,2024-11-21T09:29:21.743000
@ -257685,8 +257688,8 @@ CVE-2024-34693,0,0,5e26a75b531c261758bb69584d01cb7c6a22c22bfa35618492dd170ce7b74
CVE-2024-34694,0,0,bc478e1cb3cef55f138c14a79f645a7a56983c1fadb530aed636f18f23a41dca,2024-11-21T09:19:12.763000
CVE-2024-34695,0,0,afc37488c0d6ae499bfb3d5b9c868d2e37d54cb3af8723df0057c2a97f603691,2024-11-21T09:19:12.883000
CVE-2024-34696,0,0,7de1ab1a2a15f5cbaea207d7e482cd9333e5dbe492f22efecad7b6b996264e90,2024-11-21T09:19:13.003000
CVE-2024-34697,0,0,a8dac2b6c4d67b23f35d31e4be0e35b017c11fb15f544f2b7fad48c728f0312b,2024-11-21T09:19:13.150000
CVE-2024-34698,0,0,9991296971c06dff282f595b1c64541a73f2253d2e8aa8a8223b184f4916b474,2024-11-21T09:19:13.273000
CVE-2024-34697,0,1,779f633bb4b10c3bc63aa51148c16564d841fe0f3ab8737695127af93202447a,2025-01-10T15:13:34.317000
CVE-2024-34698,0,1,d16d932c57ad4b2d91df60543fa72d1b97f7aa404bdcb38e3db0aaf3f9bca1c5,2025-01-10T15:11:33.890000
CVE-2024-34699,0,0,38533533762e08dccaea1b8c7f6bdc3b4fda758c2a0012503ee49919d894e26d,2024-11-21T09:19:13.403000
CVE-2024-3470,0,0,e10909db1b74aa98ab6314be87d5f3c8373cbbf0b1a1ef8de0c9c1af2feece59,2024-11-21T09:29:40.203000
CVE-2024-34701,0,0,6c7d3163cd614b28633e4d24e971c2d33bd2d8dac885a280380eb170ecee9510,2024-11-21T09:19:13.540000
@ -259938,7 +259941,7 @@ CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e1
CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000
CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000
CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000
CVE-2024-3761,0,1,358bde8f45adfdb9ff52864766059c64ad48fe6ae71748f7258d8d7c971864c2,2025-01-10T14:36:20.713000
CVE-2024-3761,0,0,358bde8f45adfdb9ff52864766059c64ad48fe6ae71748f7258d8d7c971864c2,2025-01-10T14:36:20.713000
CVE-2024-37619,0,0,b796fecf90674fedbf0dfe40b1af68e953925893a23f847b6b6ad0964ef79609,2024-11-21T09:24:06.573000
CVE-2024-3762,0,0,f84784cde49ad68443bd52d39ce140212ad4caaf950a282855e24c7ecf25b082,2024-11-21T09:30:20.680000
CVE-2024-37620,0,0,12c0b8595c5be5a1ef85589c8d5e49e1582f49b44015f171ee6e485fd8ddc4ad,2024-11-21T09:24:06.853000
@ -260098,7 +260101,7 @@ CVE-2024-37897,0,0,395eb6e878dc08633c01647412c82e7154278b39adc62052dc129918deb24
CVE-2024-37898,0,0,ceb51e6817d849296a71d497367f9c03102417b6b660ee927a2bb10bd7f1cc00,2024-09-06T21:16:55.600000
CVE-2024-37899,0,0,421fe35be82f59e75d7086a8e0bc77fd4a7d98143288181a21837e7eab4afda2,2024-11-21T09:24:29.807000
CVE-2024-3790,0,0,1683f69dce5f099820935ed3e085f418d40c3062d6a224e08a8b5ce3f61d7945,2024-11-21T09:30:24.420000
CVE-2024-37900,0,0,3be2df5aa30f354066f5ba92d148088e88e84687d69f1c057a4c3e104106e88d,2024-09-06T21:06:34.223000
CVE-2024-37900,0,1,71db7ce42b670bcfc80f61eb84d259055a053561c3204238aa43a0ced619d3ae,2025-01-10T16:54:03.820000
CVE-2024-37901,0,0,878c4a6a346bdf9361411abb10af3cf8a835e99c7a497cde963a683f3319ac14,2024-09-06T20:54:20.857000
CVE-2024-37902,0,0,d606c54ec49963dae75df14960ec3ebc5b06ce69f013e9eb9199335103f5ad62,2024-11-21T09:24:30.200000
CVE-2024-37903,0,0,ac28b821cf5d49d042613ed82e844b155151e9f3b20f26d94cc98ea876980fbf,2024-11-21T09:24:30.310000
@ -260980,7 +260983,7 @@ CVE-2024-38815,0,0,c2f3d96806ad2c957e6f1813738eb63c778dd5bcfc2ca0fb6ff008ef1226a
CVE-2024-38816,0,0,65fd0cf5f0fe6505681fcc328b56e581fddf781c33094976bd261108a87a06bd,2024-12-27T16:15:24.313000
CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000
CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000
CVE-2024-38819,0,1,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000
CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000
CVE-2024-3882,0,0,d37dc3616c740393b4e1b16d38d2bd3ccee2a1af91c97d5fbd3f6f75e095d7d6,2024-11-21T09:30:37.540000
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
CVE-2024-38821,0,0,0618f1513f6bbf25c713d315a6dad9b1bf80204f6b7dc5d1e77e053b31592951,2024-10-28T13:58:09.230000
@ -261202,7 +261205,7 @@ CVE-2024-39276,0,0,dd977f122c99547ae4b07eb5192e163e6e3e61789006652d41f5a5fbe512a
CVE-2024-39277,0,0,26080347ae1771d5f6c59abbd813475f28a4e34b16949734c9b3cb30c815c0b6,2024-11-21T09:27:23.317000
CVE-2024-39278,0,0,08afeea0ff66f11774d46076ab58f2f6cb47799fe9878a2833101dc3a7d96dd6,2024-10-04T14:36:35.340000
CVE-2024-3928,0,0,80eb80995ed734a4fd6c40cf49e2905ed9643c2a1a0d85ff1158531da5501ded,2024-11-21T09:30:43.180000
CVE-2024-39281,0,1,276b9ae8e8a9a0b79ee7952c2bd6307cb0cf6b8e0cfe907b0f872eb5eba37a27,2025-01-10T13:15:09.467000
CVE-2024-39281,0,0,276b9ae8e8a9a0b79ee7952c2bd6307cb0cf6b8e0cfe907b0f872eb5eba37a27,2025-01-10T13:15:09.467000
CVE-2024-39283,0,0,4522f3bbc438abcd81e221b08edda070f395b85d336b168a4b5ca1c5829a00dc,2024-09-12T19:15:46.390000
CVE-2024-39285,0,0,f0043fe58d02ea22fa80a21b1fba2440c49cfc1f78daf98e76e53f25d8a76df4,2024-11-15T14:00:09.720000
CVE-2024-39287,0,0,7582a54b2388a70164c9564ee1f85653aced547dff036f41aa22b6e50b81804d,2024-08-29T14:23:31.807000
@ -262644,7 +262647,7 @@ CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84
CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000
CVE-2024-41492,0,0,d4569622d2ded7aa848fdcf6b8717deae380d497519daf4660cbe4b6bde4ae2b,2024-11-21T09:32:43.510000
CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000
CVE-2024-4151,0,1,40503b11edc54633cb6aad039e4fabeeb5c37e4e3cde13a44cd662b8e5492839,2025-01-10T14:38:14.560000
CVE-2024-4151,0,0,40503b11edc54633cb6aad039e4fabeeb5c37e4e3cde13a44cd662b8e5492839,2025-01-10T14:38:14.560000
CVE-2024-41511,0,0,bb04702719f78dbe27bfde7789933fae7dea1190d0ea2966cfe5a76ebec1292b,2024-10-07T19:37:09.727000
CVE-2024-41512,0,0,8ed9894a2356fc8a5e33ac367f8ff5afc2f0f1518d8c76c3254841044c9619e7,2024-10-07T19:37:09.920000
CVE-2024-41513,0,0,f407b983e55d5d0baada892820380826649691acec248a40ab1d73cdbfc4717d,2024-10-07T19:37:10.700000
@ -262656,7 +262659,7 @@ CVE-2024-41518,0,0,1ed7f15d8888711cfc8dfa60685f79422941af7f636f475ed56a27dec5bcb
CVE-2024-41519,0,0,c197bf43e86578e11d62635cdf40f99a7f891ca24b9bc97ad62c816f7aa038fa,2024-10-29T21:35:12.703000
CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1ec,2024-06-07T17:15:51.580000
CVE-2024-4153,0,0,3fae78b221751422ac040502ea12520d7ce5149857852489782ffbd186ca2e2d,2024-06-07T17:15:51.640000
CVE-2024-4154,0,1,fb34dd0c7d323df94eb060fde65c643aaa01888a9fd44b01b2bd79ea1e8468cf,2025-01-10T14:40:50.697000
CVE-2024-4154,0,0,fb34dd0c7d323df94eb060fde65c643aaa01888a9fd44b01b2bd79ea1e8468cf,2025-01-10T14:40:50.697000
CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a867,2024-06-11T10:15:13.260000
CVE-2024-41550,0,0,f550993cd5b5dc9cc85253f185c4436ed9356e5f718dbcaa508d382b497c985f,2024-11-21T09:32:45.557000
CVE-2024-41551,0,0,e1d018116726b59a859c54c726d033d68adc85dd274a77d026bca8345fe434d1,2024-11-21T09:32:45.760000
@ -262835,7 +262838,7 @@ CVE-2024-41780,0,0,34abdef12cb5a33c0dd374033cc2182a979effd2cc3e3f1e7badf9b47d6ca
CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000
CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000
CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000
CVE-2024-41787,1,1,9cf90da249efeaaeb053bd9e9416dae318cf78c2e1359394d164d3d72a2ee7d3,2025-01-10T14:15:28.947000
CVE-2024-41787,0,0,9cf90da249efeaaeb053bd9e9416dae318cf78c2e1359394d164d3d72a2ee7d3,2025-01-10T14:15:28.947000
CVE-2024-41798,0,0,cc633ea407fdc391b71e57f24672a48cd6a94d6090c3348da6eb82d23699eb9f,2024-10-10T12:56:30.817000
CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000
CVE-2024-4180,0,0,64e0c8d8c66171063acccd720d31bd7075e5baef32bbca8d371983bbcc0987b5,2024-11-21T09:42:20.530000
@ -263781,7 +263784,7 @@ CVE-2024-43050,0,0,42271ce6ad3806c1a44b603d2bbc55cdacd28a664360bd8e0ae1272488c01
CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
CVE-2024-43063,0,0,612df8035a06126aab6f71180a90da3cf5da239f499f515f4fe2684622f6ceb1,2025-01-06T11:15:08.930000
CVE-2024-43063,0,1,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000
CVE-2024-43064,0,0,a66b7e3f07db805b059e4fc51b71eff2120fb28826686e53b5baccb1ae81e1f2,2025-01-06T11:15:09.073000
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
@ -264156,7 +264159,7 @@ CVE-2024-43464,0,0,e956921e38a84a5c847604fa2532b070d138ac8d4fc0f351cd86758d02e2c
CVE-2024-43465,0,0,7808daced93a4dc9e48f54bc21a107f7720867797c08a9472cd1dfd3709b11cd,2024-09-13T14:46:33.210000
CVE-2024-43466,0,0,4cbdd61898a1c0b3e67cf9a45330a014b585d18f3adbf14ff0b7e80d8da36454,2024-09-13T14:44:16.013000
CVE-2024-43467,0,0,c1cb9837db2f61a7bbf7764ff56110657012205375047365cd0573b499e44886,2024-09-17T16:06:44.170000
CVE-2024-43468,0,0,260ad8687be07be05807d456d8065833052b5857d4d6441e381eac38c551cc94,2024-10-10T12:56:30.817000
CVE-2024-43468,0,1,4e2470d64435366aff0a61a5e68dc714e88ea3bc645d716962363d97f2857528,2025-01-10T15:07:46.353000
CVE-2024-43469,0,0,75247ad0690e3ea6ea0a08b9d64faf2b2e5451a936ce8666801ac78b9855e921,2024-09-17T16:05:54.650000
CVE-2024-4347,0,0,914a1499327477b8f0d5c50c90bea6d9fba28df27349659abefe40d9866051aa,2024-11-21T09:42:40.347000
CVE-2024-43470,0,0,9a76034ad627badcc26378fb10d49799f03d939aface9e6b118044400f64ff6e,2024-09-17T17:35:02.157000
@ -264294,7 +264297,7 @@ CVE-2024-43607,0,0,177b707b3c03bc962c8aac04ddde5ed155a406d7972129b86a3e09a27930d
CVE-2024-43608,0,0,75fa80cbbca2584783cc832318883f4ef6d591cdbe417f665655ebd55f28b18c,2024-10-22T18:58:04.887000
CVE-2024-43609,0,0,ba7efbed5be9c886d14b380fdcac5b8a331d529611297a73ede304b8d72e0023,2024-10-17T21:18:58.113000
CVE-2024-4361,0,0,43aff6787a4479f38b03751f8b309978e2b7bd8011ebcb21afe8f9fe0204fc3b,2024-11-21T09:42:41.863000
CVE-2024-43610,0,1,531fee574a493d6d17cbcfcc8b12aee01a4bdae3496f2cb465e3c91e82deed46,2025-01-10T14:59:49.673000
CVE-2024-43610,0,0,531fee574a493d6d17cbcfcc8b12aee01a4bdae3496f2cb465e3c91e82deed46,2025-01-10T14:59:49.673000
CVE-2024-43611,0,0,70068d68bda071c9a5571ee7abb6c83fdd9b870395a94ed7f5071cbbc659a60b,2024-10-22T16:01:19.373000
CVE-2024-43612,0,0,812c826e3c16ba289dfbb62de4b281704dbf93c4d4b0a921ae535f6bffcdffc3,2024-10-21T20:48:02.050000
CVE-2024-43613,0,0,cc633dda43ef8b13ce69f0ec4a9b365544125d76676b641d4b82c2346a780a25,2025-01-07T16:20:13.437000
@ -264718,7 +264721,7 @@ CVE-2024-44036,0,0,42b810673415299c73e1fae6a98106dc9e1e321f6321539583b8b88261ddc
CVE-2024-44037,0,0,183f97a71d74fbe3346298a83b9bcba15064d730f8a4f627ee049d90e90f3ab3,2024-10-07T17:47:48.410000
CVE-2024-44038,0,0,fc85531cfb7572bc50f9f9e3bd676163bde1048572fc23dd26044a7da827b287,2024-11-08T21:26:02.140000
CVE-2024-44039,0,0,b7d8a14283c7069f663e48b18eca1d5d9ac219742ba66b0179a0ba1a8985e553,2024-10-07T17:47:48.410000
CVE-2024-4404,0,0,ca434baba883aeb192ece304888449cb1e1fe6f5e9caea5d25d81224499baf73,2024-11-21T09:42:46.560000
CVE-2024-4404,0,1,9b5efeaa7a431a271ce98955a661c1133eae643e8f59e37243cf043edf2fab54,2025-01-10T16:48:29.307000
CVE-2024-44040,0,0,74b42965e6e3986525fc77deeb0ef094e32ece4aff2cecb84f707822891abd80,2024-10-07T17:47:48.410000
CVE-2024-44041,0,0,40e1db2f65bd9a020f30713b0d9178a6e32ba90a0e086503a110d2a28adbf345,2024-10-07T17:47:48.410000
CVE-2024-44042,0,0,1d7bbe5f51b27e09708cc24f3986a913e72fd98931fb78d44a1cf4aa3f2fbbd6,2024-10-07T17:47:48.410000
@ -265494,7 +265497,7 @@ CVE-2024-45285,0,0,1a8765f7213f1fb898e384549cefc78327ce5fa0ab51c77ad2682d39d60fd
CVE-2024-45286,0,0,cecad0710ca01c7c45b024d379047ef2d61376e6316f66355928dbea19751b15,2024-09-10T12:09:50.377000
CVE-2024-45287,0,0,aec586f3da6bb55bc6e7ee3871c167a680c1f02219c71e36e1d1f86a0cb7c71d,2024-11-21T09:37:36.853000
CVE-2024-45288,0,0,704efe00271cbc0cbaf9f5d77db02208ad50107c65b8444aa65ee936bb010f6b,2024-11-21T09:37:37.057000
CVE-2024-45289,0,1,d31a3e4a36b107e8a8e404759b2708654eea754f2b61637eee7237099c25503e,2025-01-10T13:15:09.710000
CVE-2024-45289,0,0,d31a3e4a36b107e8a8e404759b2708654eea754f2b61637eee7237099c25503e,2025-01-10T13:15:09.710000
CVE-2024-4529,0,0,19a4b561c0dfb2c4c5ee51c74d6ef4dd1802fbdec551260281d22055a8f00c6b,2024-11-21T09:43:02.493000
CVE-2024-45290,0,0,5fec04f279aa2b7bef2db505872b58e2ca6543c1d2f496f9632044c158031133,2024-10-16T19:54:53.397000
CVE-2024-45291,0,0,db9f913cc87f43195dd179b7bba5ebd58dd0cc5f21f21ba4f27ee72528ead67f,2024-10-16T19:09:52.697000
@ -265998,6 +266001,7 @@ CVE-2024-4619,0,0,e13855d30b6945557dd4659b259b86ac4d456f730a52ea3bb1b91f51d4f585
CVE-2024-4620,0,0,ba6cb8b4b90a19279ffa16a083d9166077215ec27ed0288a47d1ce2ebcacc327,2024-11-21T09:43:13.923000
CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000
CVE-2024-4621,0,0,5b081f12feb85affecbce7e55cb325897bb9294ab5a34846e1b6b33436e2d24d,2024-11-21T09:43:14.093000
CVE-2024-46210,1,1,0ccb80736915868f80a8057949f6a84479dd796fd0f6866cb5bbebb1ac890924,2025-01-10T16:15:28.757000
CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43c74,2024-10-18T12:53:04.627000
CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000
CVE-2024-46215,0,0,fe5702e9b51c58e432fa7fecc93685ecce003d70c9e7155da8f03da1e9c41964,2024-10-15T21:35:30.590000
@ -269248,6 +269252,7 @@ CVE-2024-50801,0,0,0f7ef78ac6e5029b9e68f3bc3399077c7ee6d99e77b039e1291ceac3b70cf
CVE-2024-50802,0,0,6cca50e9c91b3d1d741efe1d890c96d518812e1b94ca55d7d9db2b13b507a6dd,2024-11-04T19:35:14.907000
CVE-2024-50803,0,0,9aa557fe66c0fa649c326f5a23339815733fb0e4c207617891e9147c81b2f767,2024-11-21T09:44:55.397000
CVE-2024-50804,0,0,21eef12522632cc6200c04fd0be5f19a3047fb28d5a76fe0dd4b691ab9b0874a,2024-11-19T21:57:32.967000
CVE-2024-50807,1,1,93e85ff789b708cc00691f90b0561856bdb23e18ed96e6b6cef22b48ebdc4be4,2025-01-10T16:15:28.883000
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
CVE-2024-50809,0,0,914ce698b44822ab37f48cd0281a75805aae4ad7652024103c7e3c2ee2c0d112,2024-11-18T14:35:04.110000
CVE-2024-5081,0,0,15c0bdf8294535879e508dfd26c86c4970d69b5008ecb1d47e8260494db448ad,2024-08-05T15:35:16.180000
@ -269380,7 +269385,7 @@ CVE-2024-51064,0,0,1c9653179af323f5fbe8d860c24f0767ba57e81cdf442595c8044480ddec5
CVE-2024-51065,0,0,1e24d281d1f7ae915ccec23ff88d1cdb54adb3bfc1306b17fec3bbb941874b6b,2024-11-01T16:35:29.133000
CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000
CVE-2024-5107,0,0,cfd74aa13a9fbc85357817a74c8babd68a8bc1d5dfe9424bcc7079ee3a2d17ae,2024-11-21T09:46:59.060000
CVE-2024-51072,0,0,d31050b6f86bd1474c576a9adbed44a1fd96845f76da230b11a2e0afed15fe64,2024-11-26T18:15:19.603000
CVE-2024-51072,0,1,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000
CVE-2024-51073,0,0,47550b86e87b9ad893be36bd036661bdba14fc9cfd111004954e770bf76aece7,2024-11-25T21:15:19.847000
CVE-2024-51074,0,0,5347cb1f0cf92dbf57bc95ee2581b58d2c08c673802ec81440eb1887778f199e,2025-01-06T14:15:08.603000
CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d87dc,2024-11-04T13:41:29.567000
@ -269436,7 +269441,7 @@ CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82
CVE-2024-51213,0,0,9adfd358b9932ff346f4f106c3a0a59f7da7194cdda6cc6df988dcfb4b1f0798,2024-11-12T18:35:33.433000
CVE-2024-5122,0,0,993a9d9be14b4dd49a6b8ad4fbddf9bc773e9d573fec873cd6de4321644b4370,2024-11-21T09:47:01.080000
CVE-2024-51228,0,0,294a28aa06aa347fc595d895098cf7c224edf806b9b37339527f928a6a82f84c,2024-11-29T20:15:20.430000
CVE-2024-51229,0,0,569fadbfb16a037357512c7fb67c8a1f59aa8587d194ace549b66bec87d3b18d,2025-01-09T22:15:29.027000
CVE-2024-51229,0,1,6286e5c464538b72cbfb5c9a108ead1b75bec25eb8711771684f31b28f1226b9,2025-01-10T16:15:29.010000
CVE-2024-5123,0,0,04c97b69017ace7b578a419665eb2e6c5f285b62f2087dd04ffcbd5fe5c95ece,2024-11-21T09:47:01.210000
CVE-2024-5124,0,0,01cdda408be4b4d9f2a212f490d7f835314d13182c2b374b8c21580151cb10ec,2024-11-21T09:47:01.353000
CVE-2024-51240,0,0,68f6aa8bf26fd4ecbcc3322cdef826250eb560ee0d6b12cc4f54b2bd04622345,2024-11-06T20:35:34.963000
@ -270542,8 +270547,8 @@ CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d8
CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000
CVE-2024-52891,0,0,c0501cc1266a2bd619aecd0020292b22c7b56165101d569b54e2d4a5e5ed8b8c,2025-01-07T12:15:25.010000
CVE-2024-52893,0,0,f8b9ccd71f76c6032a0fbd3777baf20a8d55e394e2ad7bc980c3b4247958cbfb,2025-01-07T12:15:25.153000
CVE-2024-52896,0,0,e4fbb864f7848e639fc1924ff6e3f9dbd32543077984aeb4db567e289d87688a,2024-12-19T17:15:09.797000
CVE-2024-52897,0,0,a95c21b621375142334fe37fe01c64626d608c334ccb17049cec65f4899cb6db,2024-12-19T18:15:23.357000
CVE-2024-52896,0,1,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000
CVE-2024-52897,0,1,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000
@ -271684,8 +271689,8 @@ CVE-2024-54749,0,0,2c9d895fdb5b90a3967a9403130c1863e1d8648bd0343f58138b0aee4bfec
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000
CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000
CVE-2024-54761,0,0,577bf6a343e45e314425936a90bf29acf2025172e3250c62a5c20c121e9cf26b,2025-01-09T22:15:29.233000
CVE-2024-54762,0,0,698303387a4f954b8287fe38edc65a0c04ff09f5c32c14507705fe6464310878,2025-01-09T20:15:39.140000
CVE-2024-54761,0,1,fb39517d0d10d8a3984368819e40bd7b75b522f13a59de64d1058184c9c0f22c,2025-01-10T16:15:29.163000
CVE-2024-54762,0,1,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c62314fd,2025-01-10T16:15:29.337000
CVE-2024-54763,0,0,a28abc0036bf5dd37db3abf51504ee9d8814d71bd02efc1ca179d108a93c5f59,2025-01-07T22:15:30.950000
CVE-2024-54764,0,0,a35d44940374d4d013f3417b0c39eadc28db9efc4fa6d67b447b188437088daa,2025-01-07T22:15:31.113000
CVE-2024-54767,0,0,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000
@ -272330,6 +272335,7 @@ CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa3
CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000
CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000
CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000
CVE-2024-56511,1,1,372c3149918ac629ac10a134aace0fbd7732ea1726a83cd3f44608028ce6db99,2025-01-10T16:15:29.510000
CVE-2024-56512,0,0,9c068b365c4512dce8c612c9c28583046961ffa6d0e903214500eeef2ace3ea0,2024-12-28T17:15:07.967000
CVE-2024-56513,0,0,ae84fb62a29eb1eed459a24e59d9b3a358d893fb40ba74119824346f8fb33b98,2025-01-03T17:15:08.840000
CVE-2024-56514,0,0,38c90b436388cd7b796bc13ab110fae94f3c90b5a74cceeae9ed4f091beb9c8c,2025-01-03T17:15:09.017000
@ -272544,7 +272550,7 @@ CVE-2024-56712,0,0,5b4b2cfbf10a7f1957aa2405de52e1416f37c32b46cc4476328392ec38eda
CVE-2024-56713,0,0,5020834a260519e2be6a95e6f4f1901adc3b751bc54eb22b967ecc861237a872,2024-12-29T09:15:06.377000
CVE-2024-56714,0,0,b3ce9d06b99ca38b43d3fc7ca241e57e4a1bb78055defdbd69f868bbfc41abea,2024-12-29T09:15:06.510000
CVE-2024-56715,0,0,c871af568cc13cfc36043e505f66a67055fb99524fa956bab4dbade56d02ea8c,2025-01-09T16:16:23.240000
CVE-2024-56716,0,0,6aa674312318253ed698928dc2c776b98db2725ca8b37ba053438507cc25eeed,2025-01-09T16:16:23.387000
CVE-2024-56716,0,1,027e473dc7c4ae74eed8869e2772b713b7231b06de2fb002e8e8623d04055d87,2025-01-10T15:52:00.177000
CVE-2024-56717,0,0,6f99c7e7110cdf00a886c02bba11dfcfd51ee3613588581ce948a32c1d2c0844,2024-12-29T09:15:06.907000
CVE-2024-56718,0,0,79ded20f7b176b2dcc95a692c7af31bc57850e5b2bca5f3ea071c18aa952ec66,2024-12-29T09:15:07.040000
CVE-2024-56719,0,0,1c27f9a03a384d5fd377e6dfe47d26fecb18e68ca15507a00581be407915c1a3,2025-01-09T20:10:50.880000
@ -272711,8 +272717,8 @@ CVE-2024-5765,0,0,e5003ba3f530e37b105db973fc0ab01852d52d4c3a3d40c99dc1f996aa54e2
CVE-2024-5766,0,0,cdfccc92ec2c159269346acd4c1a0ac28434fd31fc36fe70d66da845920ad03f,2024-11-21T09:48:18.263000
CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000
CVE-2024-5768,0,0,6c9ff2121591327d1892929b36d619819744c12030a51756837ec582065802b9,2024-11-21T09:48:18.613000
CVE-2024-57686,1,1,8cbda3a3bb58cb805758ebccdcef42192560d0fbb854e64fe1f81bf36f2def7d,2025-01-10T14:15:29.140000
CVE-2024-57687,1,1,00b33443c49590eabd617d6b53860cfc5e517681ea67809fa8cf20e09979d42e,2025-01-10T14:15:29.280000
CVE-2024-57686,0,1,49648fcc7e0d475ee09aa80ae7bcffb690140ffe3e0dec1188ad436c735925f1,2025-01-10T15:15:16.003000
CVE-2024-57687,0,1,1fac24f111ce948aa649d677d5475281ca9e9effa31423b615dde7128b0c7319,2025-01-10T16:15:29.670000
CVE-2024-5769,0,0,8050ee07c9faa3b2614fde11774d0d6b1fdea284928125d18129fd88f30e7524,2025-01-09T11:15:16.127000
CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000
CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000
@ -272727,8 +272733,8 @@ CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46f
CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000
CVE-2024-5781,0,0,69395241527fa89308022b467956bfc8d570e92d8c337ad970260c71cef498ec,2024-06-12T08:15:51.363000
CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698b0,2024-06-12T08:15:51.423000
CVE-2024-57822,1,1,5af000c2f630f4d9b380cf23e5228d23255a2a23221b9cc984d56e8768524f14,2025-01-10T14:15:29.407000
CVE-2024-57823,1,1,21afd0eacab6b7e7ef4135daf3a3b6cb51e2cd31ed278b77a73ef52eb6b04624,2025-01-10T14:15:29.583000
CVE-2024-57822,0,1,728779986122bf377df0708440f7a4e3a11314ae8b64fec754f17faeca944b11,2025-01-10T15:15:16.337000
CVE-2024-57823,0,0,21afd0eacab6b7e7ef4135daf3a3b6cb51e2cd31ed278b77a73ef52eb6b04624,2025-01-10T14:15:29.583000
CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000
CVE-2024-5784,0,0,79d7c651de1735758dc5225e9f9f2125237472cf1705bb9d1ed95eddc5ac5820,2024-09-03T14:48:19.570000
CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000
@ -274180,7 +274186,7 @@ CVE-2024-7413,0,0,9ccf2fb78cc8a1098b920e13af44a75c99637778b99e94b2b910d51502c8b7
CVE-2024-7414,0,0,c5c4cb0c65e3e55baabccfbeda4173515b29b584f93eba40d8e5c699af91ce62,2024-08-12T13:41:36.517000
CVE-2024-7415,0,0,c3d340cb43f0894d646dacd50945832f9ca899172c2740ea86ecad0d435383d0,2024-09-30T17:46:46.473000
CVE-2024-7416,0,0,b6554ee6c1fd4623ffc512c4a1b058479bac48fea9104e8690ddad2816714b28,2024-08-12T13:41:36.517000
CVE-2024-7417,0,1,d2d8fa74c3e6fa5146a2c7764aced25ecd5540a92b8f38454b495c7cc31c6b0a,2025-01-10T14:32:16.143000
CVE-2024-7417,0,0,d2d8fa74c3e6fa5146a2c7764aced25ecd5540a92b8f38454b495c7cc31c6b0a,2025-01-10T14:32:16.143000
CVE-2024-7418,0,0,5b3ccdcae571dbfb594b5891ce579ddafc59ba401cc32bf9f76c3d50b89b1266,2024-10-04T16:01:06.077000
CVE-2024-7420,0,0,f4b7ed863d66be1f0d470a1abe10e9290149c7db3b059dfea41249a35c4c210b,2024-09-13T14:45:43.513000
CVE-2024-7421,0,0,404d03669e17b33230c466436e4bd8241e855e6647ca8418c58d45b13a0d46ac,2024-10-01T18:36:59.117000
@ -274337,7 +274343,7 @@ CVE-2024-7590,0,0,1533bedd8671f69add27338b97b679c389b63d7adf3d74a6b1d24d9f2d72c2
CVE-2024-7591,0,0,6acedbc9c4fc9143dc69c6763f675f903ea94c54c7b69e2e118e2d6e5e20e6cc,2024-10-16T15:15:17.913000
CVE-2024-7592,0,0,750b9484acd2fecc436198c41bd9f29c399647c7e181b0abac82d4ea529adc5a,2024-11-21T09:51:46.750000
CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000
CVE-2024-7594,0,1,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000
CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000
CVE-2024-7599,0,0,72cd50d41050beabf75c41eb70dc5180e8f76ad0927504bdf008f5b3f70870db,2024-09-26T16:45:58.507000
CVE-2024-7600,0,0,34b4914eedc647ff0a0d5a284f0b5d05eddd5cf8a511f0ca9df95820d310e297,2024-08-23T16:35:31.137000
CVE-2024-7601,0,0,3abc93709b908f4d7ee1f44c6b4ea7404a5a295ad0d93da10509fdc9a72448e0,2024-08-23T16:35:52.383000
@ -275457,8 +275463,8 @@ CVE-2024-8924,0,0,4a0ff8d9ee4d03c6f03c3cb6c1acbe5a349aa04f4e0360124e5a257cc40595
CVE-2024-8925,0,0,f7e1509fca5e698a08b058aad522a244df6ead7fb8a749808ce13b47db4465f6,2024-10-16T18:53:39.957000
CVE-2024-8926,0,0,0db6b70422e4c74e0e6e0922306ca8e484c13b8b2dbf5085c65680de40466219,2024-10-16T18:35:59.500000
CVE-2024-8927,0,0,398ba40b2dac2df1d3b4dc7fedaf27b8f5c73c4ff85196efcc0f8b1e826b9679,2024-10-16T18:28:34.573000
CVE-2024-8929,0,1,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000
CVE-2024-8932,0,1,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000
CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000
CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000
CVE-2024-8933,0,0,0187d79f8e2ba1e9dbc5a82b2521da6b87ff21132281438efc267a0501ddba9b,2024-11-13T17:01:16.850000
CVE-2024-8934,0,0,ef1f8f6984d6b9c4cfe47d2ed66bbef40367f32f9c9af452fc22ae5c4812c362,2024-11-01T12:57:03.417000
CVE-2024-8935,0,0,454187cab1f88f3554b3302c074a1cc9586d98821b75ff3eed082c4adeab65e7,2024-11-13T17:01:16.850000
@ -276447,6 +276453,7 @@ CVE-2025-22143,0,0,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e
CVE-2025-22145,0,0,a3e7e33eb43759950c0b6a9c304c03ed60cf76009fe03502e9b6e5d41248cec1,2025-01-08T21:15:13.480000
CVE-2025-22149,0,0,285a83f8462ddbb51760ea9329a665e948c6fc32ae5305a1fdb62a7b29cc1268,2025-01-09T18:15:30.233000
CVE-2025-22151,0,0,dec579b0934ef0dde3835c92d162b87ef5ec884c54087c34c713c42f457c974f,2025-01-09T19:15:20.410000
CVE-2025-22152,1,1,f6e16a6363f55c864692fd37f669ef41501d91a264daf32f0f68d6d46b264ef9,2025-01-10T16:15:29.910000
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000
CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000
@ -276597,6 +276604,11 @@ CVE-2025-22592,0,0,ff5fac2b9bc94ed835e8f9addacdb39fda9bbbe54c2e47c1826c43b63204e
CVE-2025-22593,0,0,2e2b9b257210673d1959179ba19f9ddffb24fc86c8f15dcc25f3759c772c6b90,2025-01-07T16:15:55.627000
CVE-2025-22594,0,0,b59b67bd9bb85bd779f5fd0d6e12fc0eac702434b104751a044120db7329e348,2025-01-09T16:16:28.983000
CVE-2025-22595,0,0,e3d65ba51248112d76081ce49c46e19c6f28b60b2f8104b6f8dd7cc03abb167b,2025-01-09T16:16:29.160000
CVE-2025-22596,1,1,a8207a0d155e70e84968981216ad5f3fc3a5b2db35fde4948f967fd396f31360,2025-01-10T16:15:30.143000
CVE-2025-22597,1,1,3722ca65d443dd89a5e8cc889025c17e79ade436f09d91535a0218ae72d1a4e6,2025-01-10T16:15:30.343000
CVE-2025-22598,1,1,e497fe58ac8675da7246094a2662199588779aa650b9c02699534f158225aba0,2025-01-10T16:15:30.540000
CVE-2025-22599,1,1,645942d1c7d2f7dd12d8618f2017edf7382a16a018a352b649288462de683267,2025-01-10T16:15:30.737000
CVE-2025-22600,1,1,5bcf7e241f56265340265c8ceca3bc4c44ef112e4d972ba43c49267d66196668,2025-01-10T16:15:30.940000
CVE-2025-22621,0,0,f36d0f70806d0c581838cce0fde67d4e521043699061f9e9337c84ae8de6806b,2025-01-07T17:15:35.710000
CVE-2025-22801,0,0,27b9082ce5d8d4b87ba9b6f23e4e15af84ad2fa4155031ac0ca54e2184d53397,2025-01-09T16:16:29.323000
CVE-2025-22802,0,0,214d68f351c2898ee2bd148b6eb25ed42195f00e8f204a7b64b1138105ff4132,2025-01-09T16:16:29.470000
@ -276623,4 +276635,7 @@ CVE-2025-22823,0,0,3cb7eb88e447de51bff31c745363425ef76d647ead034c7dcc7937c26e7a2
CVE-2025-22824,0,0,5fa10c72f2f35c9e6ef05d40ca4cfa4e3b7c835fa36365c8ed7a7e09e9b30683,2025-01-09T16:16:32.893000
CVE-2025-22826,0,0,332ad518891412cb4c6c16f7ba7d02f766b23d1581d77bb741cc4eabe620f85e,2025-01-09T16:16:33.047000
CVE-2025-22827,0,0,b5e1199d90422b236ce828e6fe5f814f4ca97d3be889a387ee962fd6e98a8505,2025-01-09T16:16:33.200000
CVE-2025-22946,1,1,cf12baf4e5b65ee512a854f2078359f1509439f6f159900a2a7997acf1a6ec8d,2025-01-10T15:15:16.710000
CVE-2025-22949,1,1,39d9572a05bfbbbc6c6a7518255a39870f82fdb4f4d926ef9b2339fd79f5588a,2025-01-10T16:15:31.137000
CVE-2025-23016,0,0,1c67a63f9a41740f8d4af81b34c85e6f74b5ff1f143c072a8b498d13d3f6a8c5,2025-01-10T12:15:25.480000
CVE-2025-23022,1,1,12b4268af4b5910f707f03dab9877afd2f72e34fc9d11a1b908b3e43ea4035dd,2025-01-10T16:15:31.250000

Can't render this file because it is too large.