Auto-Update: 2025-01-14T23:00:25.636204+00:00

This commit is contained in:
cad-safe-bot 2025-01-14 23:03:51 +00:00
parent baee059964
commit 9f01fd3f37
40 changed files with 1742 additions and 390 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0034",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-13T15:15:20.163",
"lastModified": "2024-11-21T07:36:26.037",
"lastModified": "2025-01-14T22:15:25.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33439",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-26T16:15:09.597",
"lastModified": "2024-11-21T08:05:34.980",
"lastModified": "2025-01-14T21:15:07.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33440",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-26T16:15:10.713",
"lastModified": "2024-11-21T08:05:35.123",
"lastModified": "2025-01-14T21:15:08.377",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47709",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-14T13:56:43.827",
"lastModified": "2024-11-21T08:30:43.043",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:03:07.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,22 +71,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBEB866D-1959-41C9-858F-24C05D20E332"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B9329F08-2AA4-4126-9A7F-1EEBB25A6C1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F327AB-9F53-402C-9BFA-F66F20A83B40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271524",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150840",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271524",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150840",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47711",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-14T13:56:44.533",
"lastModified": "2024-11-21T08:30:43.290",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:06:23.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,22 +71,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBEB866D-1959-41C9-858F-24C05D20E332"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B9329F08-2AA4-4126-9A7F-1EEBB25A6C1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F327AB-9F53-402C-9BFA-F66F20A83B40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271526",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150840",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271526",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150840",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47712",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-14T13:56:45.143",
"lastModified": "2024-11-21T08:30:43.420",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:06:54.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBEB866D-1959-41C9-858F-24C05D20E332"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B9329F08-2AA4-4126-9A7F-1EEBB25A6C1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F327AB-9F53-402C-9BFA-F66F20A83B40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58C5F3EF-C0F7-4CC9-9A31-5D0DDFA068F3"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271524",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150840",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271524",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150840",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-10253",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-01-14T22:15:25.920",
"lastModified": "2025-01-14T22:15:25.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A potential TOCTOU vulnerability was reported in PC Manager, Lenovo Browser, and Lenovo App Store that could allow a local attacker to cause a system crash."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/425367",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-10254",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-01-14T22:15:26.110",
"lastModified": "2025-01-14T22:15:26.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A potential buffer overflow vulnerability was reported in PC Manager, Lenovo Browser, and Lenovo App Store that could allow a local attacker to cause a system crash."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/425367",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11868",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-10T13:15:15.973",
"lastModified": "2024-12-10T13:15:15.973",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:36:35.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,50 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.2.7.4",
"matchCriteriaId": "5A66E6DC-D4F1-4FA9-B8AC-A52905904E3B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3200780/learnpress",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7bd43980-9193-4a63-adba-720dd1b11699?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12085",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.123",
"lastModified": "2025-01-14T18:15:25.123",
"vulnStatus": "Received",
"lastModified": "2025-01-14T22:15:26.263",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330539",
"source": "secalert@redhat.com"
},
{
"url": "https://kb.cert.org/vuls/id/952657",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12086",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.297",
"lastModified": "2025-01-14T18:15:25.297",
"vulnStatus": "Received",
"lastModified": "2025-01-14T22:15:26.370",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330577",
"source": "secalert@redhat.com"
},
{
"url": "https://kb.cert.org/vuls/id/952657",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12087",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.467",
"lastModified": "2025-01-14T18:15:25.467",
"vulnStatus": "Received",
"lastModified": "2025-01-14T22:15:26.503",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330672",
"source": "secalert@redhat.com"
},
{
"url": "https://kb.cert.org/vuls/id/952657",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12088",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.643",
"lastModified": "2025-01-14T18:15:25.643",
"vulnStatus": "Received",
"lastModified": "2025-01-14T22:15:26.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330676",
"source": "secalert@redhat.com"
},
{
"url": "https://kb.cert.org/vuls/id/952657",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12747",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.830",
"lastModified": "2025-01-14T18:15:25.830",
"vulnStatus": "Received",
"lastModified": "2025-01-14T22:15:26.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332968",
"source": "secalert@redhat.com"
},
{
"url": "https://kb.cert.org/vuls/id/952657",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22343",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-14T14:57:44.927",
"lastModified": "2024-11-21T08:56:05.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:09:37.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
@ -49,24 +69,63 @@
"value": "CWE-525"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:txseries_for_multiplatform:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB032B5B-3B05-4809-8BF2-E08255E19475"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280190",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150667",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280190",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150667",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22344",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-14T14:57:45.397",
"lastModified": "2024-11-21T08:56:05.580",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:11:47.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,86 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:txseries_for_multiplatform:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB032B5B-3B05-4809-8BF2-E08255E19475"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280191",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150667",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280191",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150667",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22345",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-14T14:57:45.770",
"lastModified": "2024-11-21T08:56:05.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:19:31.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -51,22 +71,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:txseries_for_multiplatform:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB032B5B-3B05-4809-8BF2-E08255E19475"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280192",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150667",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280192",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7150667",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29230",
"sourceIdentifier": "security@synology.com",
"published": "2024-03-28T07:16:03.380",
"lastModified": "2024-11-21T09:07:51.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-14T21:21:46.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,83 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-9289",
"matchCriteriaId": "187A263E-E3AE-4800-90E7-D3090E736C9E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-11289",
"matchCriteriaId": "F59B6F9A-253C-43C6-B88D-BB18242A1EA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10C4B055-D99B-4D58-811C-DD323A68A890"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C262042-304B-49DC-BB4B-655C5C36D88C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29231",
"sourceIdentifier": "security@synology.com",
"published": "2024-03-28T07:16:04.170",
"lastModified": "2024-11-21T09:07:51.830",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-14T21:23:00.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,83 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-9289",
"matchCriteriaId": "187A263E-E3AE-4800-90E7-D3090E736C9E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-11289",
"matchCriteriaId": "F59B6F9A-253C-43C6-B88D-BB18242A1EA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10C4B055-D99B-4D58-811C-DD323A68A890"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C262042-304B-49DC-BB4B-655C5C36D88C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29240",
"sourceIdentifier": "security@synology.com",
"published": "2024-03-28T07:16:11.083",
"lastModified": "2024-11-21T09:07:52.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-14T21:24:20.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,14 +71,83 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-9289",
"matchCriteriaId": "187A263E-E3AE-4800-90E7-D3090E736C9E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-11289",
"matchCriteriaId": "F59B6F9A-253C-43C6-B88D-BB18242A1EA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10C4B055-D99B-4D58-811C-DD323A68A890"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C262042-304B-49DC-BB4B-655C5C36D88C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29241",
"sourceIdentifier": "security@synology.com",
"published": "2024-03-28T07:16:12.177",
"lastModified": "2024-11-21T09:07:53.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-14T21:24:52.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,83 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-9289",
"matchCriteriaId": "187A263E-E3AE-4800-90E7-D3090E736C9E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.0-11289",
"matchCriteriaId": "F59B6F9A-253C-43C6-B88D-BB18242A1EA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10C4B055-D99B-4D58-811C-DD323A68A890"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:synology:diskstation_manager:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C262042-304B-49DC-BB4B-655C5C36D88C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4444",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:43:46.507",
"lastModified": "2024-11-21T09:42:50.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-14T21:40:27.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,41 +36,115 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.2.6.6",
"matchCriteriaId": "CA0A1657-143B-466C-B5BE-B54F5AC945ED"
}
]
}
]
}
],
"references": [
{
"url": "https://inky-knuckle-2c2.notion.site/Improper-Authentication-in-checkout-leads-privilege-escalation-of-unauthenticated-to-create-accoun-09da24a043884219a891dd1a0fc01af6",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.5/inc/class-lp-checkout.php#L79",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3082204/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9e1410f-10c9-4654-8b61-cfcdde696da7?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://inky-knuckle-2c2.notion.site/Improper-Authentication-in-checkout-leads-privilege-escalation-of-unauthenticated-to-create-accoun-09da24a043884219a891dd1a0fc01af6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.5/inc/class-lp-checkout.php#L79",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3082204/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9e1410f-10c9-4654-8b61-cfcdde696da7?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45102",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2025-01-14T22:15:26.820",
"lastModified": "2025-01-14T22:15:26.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability was discovered that could allow a valid, authenticated LXCA user to escalate their permissions for a connected XCC instance when using LXCA as a Single Sign On (SSO) provider for XCC instances."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-154748",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48760",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:26.963",
"lastModified": "2025-01-14T22:15:26.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in GestiolP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution."
}
],
"metrics": {},
"references": [
{
"url": "http://www.gestioip.net/index.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/maxibelino/CVEs/tree/main/CVE-2024-48760",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/muebel/gestioip-docker-compose",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-49530",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T20:15:18.107",
"lastModified": "2025-01-10T17:07:37.007",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-14T22:15:27.087",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
"value": "Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and be tricked in to interacting with it in a specific manner, increasing the attack complexity."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-50857",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:27.200",
"lastModified": "2025-01-14T22:15:27.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ip_do_job request in GestiolP v3.5.7 is vulnerable to Cross-Site Scripting (XSS). It allows data exfiltration and enables CSRF attacks. The vulnerability requires specific user permissions within the application to exploit successfully."
}
],
"metrics": {},
"references": [
{
"url": "http://www.gestioip.net",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50857",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/muebel/gestioip-docker-compose",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-50858",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:27.330",
"lastModified": "2025-01-14T22:15:27.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple endpoints in GestiolP v3.5.7 are vulnerable to Cross-Site Request Forgery (CSRF). An attacker can execute actions via the admin's browser by hosting a malicious URL, leading to data modification, deletion, or exfiltration."
}
],
"metrics": {},
"references": [
{
"url": "http://www.gestioip.net",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50858",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/muebel/gestioip-docker-compose",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-50859",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:27.453",
"lastModified": "2025-01-14T22:15:27.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ip_import_acl_csv request in GestiolP v3.5.7 is vulnerable to Reflected XSS. When a user uploads an improperly formatted file, the content may be reflected in the HTML response, allowing the attacker to execute malicious scripts or exfiltrate data."
}
],
"metrics": {},
"references": [
{
"url": "http://www.gestioip.net",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50859",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/muebel/gestioip-docker-compose",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-50861",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:27.577",
"lastModified": "2025-01-14T22:15:27.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ip_mod_dns_key_form.cgi request in GestiolP v3.5.7 is vulnerable to Stored XSS. An attacker can inject malicious code into the \"TSIG Key\" field, which is saved in the database and triggers XSS when viewed, enabling data exfiltration and CSRF attacks."
}
],
"metrics": {},
"references": [
{
"url": "http://www.gestioip.net",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50861",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/muebel/gestioip-docker-compose",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-54032",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:20.690",
"lastModified": "2024-12-19T19:03:15.563",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-14T22:15:27.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field."
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-54034",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:20.817",
"lastModified": "2024-12-19T19:03:03.917",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-14T22:15:27.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser."
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. This attack is dependent on the victim opening the malicious URL with a specific browser, increasing the attack complexity."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-54036",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:20.947",
"lastModified": "2024-12-19T19:02:47.713",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-14T22:15:27.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field."
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high."
},
{
"lang": "es",
@ -19,27 +19,27 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
"impactScore": 5.8
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-54037",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.080",
"lastModified": "2024-12-18T14:40:29.303",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-14T22:15:28.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form."
"value": "Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the high-privileged attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. This attack is dependent on the victim allowing all popups, increasing the attack complexity."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56828",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-06T18:15:23.467",
"lastModified": "2025-01-06T18:15:23.467",
"lastModified": "2025-01-14T21:15:11.817",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de carga de archivos en ChestnutCMS hasta la versi\u00f3n 1.5.0. Seg\u00fan el an\u00e1lisis del c\u00f3digo, se determin\u00f3 que el endpoint de la API /api/member/avatar recibe una cadena base64 como entrada. Esta cadena se pasa luego al m\u00e9todo memberService.uploadAvatarByBase64 para su procesamiento. Dentro del servicio, se analiza la imagen codificada en base64. Por ejemplo, dada una cadena como: data:image/html;base64,PGh0bWw+PGltZyBzcmM9eCBvbmVycm9yPWFsZXJ0KDEpPjwvaHRtbD4= el contenido despu\u00e9s de la coma se extrae y se decodifica utilizando Base64.getDecoder().decode(). La subcadena desde el und\u00e9cimo car\u00e1cter hasta la primera aparici\u00f3n de un punto y coma (;) se asigna a la variable de sufijo (que representa la extensi\u00f3n del archivo). Luego, el contenido decodificado se escribe en un archivo. Sin embargo, la extensi\u00f3n del archivo no est\u00e1 validada y, dado que esta funcionalidad est\u00e1 expuesta al frontend, plantea riesgos de seguridad importantes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://gitee.com/liweiyi/ChestnutCMS",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57471",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:28.250",
"lastModified": "2025-01-14T22:15:28.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the 2.4G wireless network processing function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs."
}
],
"metrics": {},
"references": [
{
"url": "http://h3c.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/XiaoCurry/88a43c9a68694941221eb7592da39d4c",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57479",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:28.377",
"lastModified": "2025-01-14T22:15:28.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the mac address update function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs."
}
],
"metrics": {},
"references": [
{
"url": "http://h3c.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/XiaoCurry/c7214be67a44a4a8858c5138ecd05984",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57480",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:28.510",
"lastModified": "2025-01-14T22:15:28.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the AP configuration function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs."
}
],
"metrics": {},
"references": [
{
"url": "http://h3c.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/XiaoCurry/16213a4d68f95f17cd0fc2cd07e78a90",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57482",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T22:15:28.627",
"lastModified": "2025-01-14T22:15:28.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the 5G wireless network processing function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs."
}
],
"metrics": {},
"references": [
{
"url": "http://h3c.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/XiaoCurry/d39f76a025df8b78a5f9e1aa48c16d18",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-14T21:00:32.488240+00:00
2025-01-14T23:00:25.636204+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-14T20:56:44.643000+00:00
2025-01-14T22:15:28.627000+00:00
```
### Last Data Feed Release
@ -33,69 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
277380
277392
```
### CVEs added in the last Commit
Recently added CVEs: `44`
Recently added CVEs: `12`
- [CVE-2024-55924](CVE-2024/CVE-2024-559xx/CVE-2024-55924.json) (`2025-01-14T20:15:30.367`)
- [CVE-2024-55945](CVE-2024/CVE-2024-559xx/CVE-2024-55945.json) (`2025-01-14T20:15:30.527`)
- [CVE-2024-56374](CVE-2024/CVE-2024-563xx/CVE-2024-56374.json) (`2025-01-14T19:15:32.510`)
- [CVE-2025-0474](CVE-2025/CVE-2025-04xx/CVE-2025-0474.json) (`2025-01-14T19:15:32.930`)
- [CVE-2025-21122](CVE-2025/CVE-2025-211xx/CVE-2025-21122.json) (`2025-01-14T19:15:33.070`)
- [CVE-2025-21127](CVE-2025/CVE-2025-211xx/CVE-2025-21127.json) (`2025-01-14T19:15:33.230`)
- [CVE-2025-21128](CVE-2025/CVE-2025-211xx/CVE-2025-21128.json) (`2025-01-14T19:15:33.387`)
- [CVE-2025-21129](CVE-2025/CVE-2025-211xx/CVE-2025-21129.json) (`2025-01-14T19:15:33.550`)
- [CVE-2025-21130](CVE-2025/CVE-2025-211xx/CVE-2025-21130.json) (`2025-01-14T19:15:33.723`)
- [CVE-2025-21131](CVE-2025/CVE-2025-211xx/CVE-2025-21131.json) (`2025-01-14T19:15:33.897`)
- [CVE-2025-21132](CVE-2025/CVE-2025-211xx/CVE-2025-21132.json) (`2025-01-14T19:15:34.047`)
- [CVE-2025-21133](CVE-2025/CVE-2025-211xx/CVE-2025-21133.json) (`2025-01-14T19:15:34.187`)
- [CVE-2025-21134](CVE-2025/CVE-2025-211xx/CVE-2025-21134.json) (`2025-01-14T19:15:34.337`)
- [CVE-2025-21135](CVE-2025/CVE-2025-211xx/CVE-2025-21135.json) (`2025-01-14T20:15:30.853`)
- [CVE-2025-21136](CVE-2025/CVE-2025-211xx/CVE-2025-21136.json) (`2025-01-14T20:15:31.007`)
- [CVE-2025-21137](CVE-2025/CVE-2025-211xx/CVE-2025-21137.json) (`2025-01-14T20:15:31.157`)
- [CVE-2025-21138](CVE-2025/CVE-2025-211xx/CVE-2025-21138.json) (`2025-01-14T20:15:31.300`)
- [CVE-2025-21139](CVE-2025/CVE-2025-211xx/CVE-2025-21139.json) (`2025-01-14T20:15:31.457`)
- [CVE-2025-23018](CVE-2025/CVE-2025-230xx/CVE-2025-23018.json) (`2025-01-14T20:15:32.440`)
- [CVE-2025-23019](CVE-2025/CVE-2025-230xx/CVE-2025-23019.json) (`2025-01-14T20:15:32.577`)
- [CVE-2025-23041](CVE-2025/CVE-2025-230xx/CVE-2025-23041.json) (`2025-01-14T19:15:44.713`)
- [CVE-2025-23042](CVE-2025/CVE-2025-230xx/CVE-2025-23042.json) (`2025-01-14T19:15:44.863`)
- [CVE-2025-23072](CVE-2025/CVE-2025-230xx/CVE-2025-23072.json) (`2025-01-14T19:15:45.007`)
- [CVE-2025-23073](CVE-2025/CVE-2025-230xx/CVE-2025-23073.json) (`2025-01-14T19:15:45.120`)
- [CVE-2025-23074](CVE-2025/CVE-2025-230xx/CVE-2025-23074.json) (`2025-01-14T19:15:45.223`)
- [CVE-2024-10253](CVE-2024/CVE-2024-102xx/CVE-2024-10253.json) (`2025-01-14T22:15:25.920`)
- [CVE-2024-10254](CVE-2024/CVE-2024-102xx/CVE-2024-10254.json) (`2025-01-14T22:15:26.110`)
- [CVE-2024-45102](CVE-2024/CVE-2024-451xx/CVE-2024-45102.json) (`2025-01-14T22:15:26.820`)
- [CVE-2024-48760](CVE-2024/CVE-2024-487xx/CVE-2024-48760.json) (`2025-01-14T22:15:26.963`)
- [CVE-2024-50857](CVE-2024/CVE-2024-508xx/CVE-2024-50857.json) (`2025-01-14T22:15:27.200`)
- [CVE-2024-50858](CVE-2024/CVE-2024-508xx/CVE-2024-50858.json) (`2025-01-14T22:15:27.330`)
- [CVE-2024-50859](CVE-2024/CVE-2024-508xx/CVE-2024-50859.json) (`2025-01-14T22:15:27.453`)
- [CVE-2024-50861](CVE-2024/CVE-2024-508xx/CVE-2024-50861.json) (`2025-01-14T22:15:27.577`)
- [CVE-2024-57471](CVE-2024/CVE-2024-574xx/CVE-2024-57471.json) (`2025-01-14T22:15:28.250`)
- [CVE-2024-57479](CVE-2024/CVE-2024-574xx/CVE-2024-57479.json) (`2025-01-14T22:15:28.377`)
- [CVE-2024-57480](CVE-2024/CVE-2024-574xx/CVE-2024-57480.json) (`2025-01-14T22:15:28.510`)
- [CVE-2024-57482](CVE-2024/CVE-2024-574xx/CVE-2024-57482.json) (`2025-01-14T22:15:28.627`)
### CVEs modified in the last Commit
Recently modified CVEs: `147`
Recently modified CVEs: `26`
- [CVE-2024-28929](CVE-2024/CVE-2024-289xx/CVE-2024-28929.json) (`2025-01-14T20:47:41.253`)
- [CVE-2024-28930](CVE-2024/CVE-2024-289xx/CVE-2024-28930.json) (`2025-01-14T20:48:06.263`)
- [CVE-2024-28931](CVE-2024/CVE-2024-289xx/CVE-2024-28931.json) (`2025-01-14T20:52:05.480`)
- [CVE-2024-28932](CVE-2024/CVE-2024-289xx/CVE-2024-28932.json) (`2025-01-14T20:48:30.367`)
- [CVE-2024-28933](CVE-2024/CVE-2024-289xx/CVE-2024-28933.json) (`2025-01-14T20:48:53.627`)
- [CVE-2024-28934](CVE-2024/CVE-2024-289xx/CVE-2024-28934.json) (`2025-01-14T20:49:24.090`)
- [CVE-2024-28935](CVE-2024/CVE-2024-289xx/CVE-2024-28935.json) (`2025-01-14T20:49:46.410`)
- [CVE-2024-28936](CVE-2024/CVE-2024-289xx/CVE-2024-28936.json) (`2025-01-14T20:50:19.147`)
- [CVE-2024-28937](CVE-2024/CVE-2024-289xx/CVE-2024-28937.json) (`2025-01-14T20:50:38.043`)
- [CVE-2024-28938](CVE-2024/CVE-2024-289xx/CVE-2024-28938.json) (`2025-01-14T20:51:01.370`)
- [CVE-2024-28941](CVE-2024/CVE-2024-289xx/CVE-2024-28941.json) (`2025-01-14T20:51:28.040`)
- [CVE-2024-29227](CVE-2024/CVE-2024-292xx/CVE-2024-29227.json) (`2025-01-14T20:13:16.757`)
- [CVE-2024-29228](CVE-2024/CVE-2024-292xx/CVE-2024-29228.json) (`2025-01-14T20:11:42.487`)
- [CVE-2024-29229](CVE-2024/CVE-2024-292xx/CVE-2024-29229.json) (`2025-01-14T20:12:23.290`)
- [CVE-2024-29232](CVE-2024/CVE-2024-292xx/CVE-2024-29232.json) (`2025-01-14T20:22:05.363`)
- [CVE-2024-29233](CVE-2024/CVE-2024-292xx/CVE-2024-29233.json) (`2025-01-14T20:22:59.083`)
- [CVE-2024-29234](CVE-2024/CVE-2024-292xx/CVE-2024-29234.json) (`2025-01-14T20:24:22.027`)
- [CVE-2024-29235](CVE-2024/CVE-2024-292xx/CVE-2024-29235.json) (`2025-01-14T19:29:55.853`)
- [CVE-2024-29236](CVE-2024/CVE-2024-292xx/CVE-2024-29236.json) (`2025-01-14T19:29:55.853`)
- [CVE-2024-29237](CVE-2024/CVE-2024-292xx/CVE-2024-29237.json) (`2025-01-14T19:29:55.853`)
- [CVE-2024-29238](CVE-2024/CVE-2024-292xx/CVE-2024-29238.json) (`2025-01-14T19:29:55.853`)
- [CVE-2024-29239](CVE-2024/CVE-2024-292xx/CVE-2024-29239.json) (`2025-01-14T20:24:50.210`)
- [CVE-2024-51460](CVE-2024/CVE-2024-514xx/CVE-2024-51460.json) (`2025-01-14T19:40:36.670`)
- [CVE-2024-57623](CVE-2024/CVE-2024-576xx/CVE-2024-57623.json) (`2025-01-14T19:15:32.677`)
- [CVE-2025-21173](CVE-2025/CVE-2025-211xx/CVE-2025-21173.json) (`2025-01-14T19:15:34.583`)
- [CVE-2023-33439](CVE-2023/CVE-2023-334xx/CVE-2023-33439.json) (`2025-01-14T21:15:07.463`)
- [CVE-2023-33440](CVE-2023/CVE-2023-334xx/CVE-2023-33440.json) (`2025-01-14T21:15:08.377`)
- [CVE-2023-47709](CVE-2023/CVE-2023-477xx/CVE-2023-47709.json) (`2025-01-14T21:03:07.020`)
- [CVE-2023-47711](CVE-2023/CVE-2023-477xx/CVE-2023-47711.json) (`2025-01-14T21:06:23.587`)
- [CVE-2023-47712](CVE-2023/CVE-2023-477xx/CVE-2023-47712.json) (`2025-01-14T21:06:54.440`)
- [CVE-2024-11868](CVE-2024/CVE-2024-118xx/CVE-2024-11868.json) (`2025-01-14T21:36:35.760`)
- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-01-14T22:15:26.263`)
- [CVE-2024-12086](CVE-2024/CVE-2024-120xx/CVE-2024-12086.json) (`2025-01-14T22:15:26.370`)
- [CVE-2024-12087](CVE-2024/CVE-2024-120xx/CVE-2024-12087.json) (`2025-01-14T22:15:26.503`)
- [CVE-2024-12088](CVE-2024/CVE-2024-120xx/CVE-2024-12088.json) (`2025-01-14T22:15:26.600`)
- [CVE-2024-12747](CVE-2024/CVE-2024-127xx/CVE-2024-12747.json) (`2025-01-14T22:15:26.700`)
- [CVE-2024-22343](CVE-2024/CVE-2024-223xx/CVE-2024-22343.json) (`2025-01-14T21:09:37.513`)
- [CVE-2024-22344](CVE-2024/CVE-2024-223xx/CVE-2024-22344.json) (`2025-01-14T21:11:47.730`)
- [CVE-2024-22345](CVE-2024/CVE-2024-223xx/CVE-2024-22345.json) (`2025-01-14T21:19:31.517`)
- [CVE-2024-29230](CVE-2024/CVE-2024-292xx/CVE-2024-29230.json) (`2025-01-14T21:21:46.197`)
- [CVE-2024-29231](CVE-2024/CVE-2024-292xx/CVE-2024-29231.json) (`2025-01-14T21:23:00.793`)
- [CVE-2024-29240](CVE-2024/CVE-2024-292xx/CVE-2024-29240.json) (`2025-01-14T21:24:20.010`)
- [CVE-2024-29241](CVE-2024/CVE-2024-292xx/CVE-2024-29241.json) (`2025-01-14T21:24:52.060`)
- [CVE-2024-4444](CVE-2024/CVE-2024-44xx/CVE-2024-4444.json) (`2025-01-14T21:40:27.670`)
- [CVE-2024-49530](CVE-2024/CVE-2024-495xx/CVE-2024-49530.json) (`2025-01-14T22:15:27.087`)
- [CVE-2024-54032](CVE-2024/CVE-2024-540xx/CVE-2024-54032.json) (`2025-01-14T22:15:27.703`)
- [CVE-2024-54034](CVE-2024/CVE-2024-540xx/CVE-2024-54034.json) (`2025-01-14T22:15:27.833`)
- [CVE-2024-54036](CVE-2024/CVE-2024-540xx/CVE-2024-54036.json) (`2025-01-14T22:15:27.953`)
- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2025-01-14T22:15:28.120`)
- [CVE-2024-56828](CVE-2024/CVE-2024-568xx/CVE-2024-56828.json) (`2025-01-14T21:15:11.817`)
## Download and Usage

File diff suppressed because it is too large Load Diff