mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-01-04T03:00:19.556938+00:00
This commit is contained in:
parent
399cb89b03
commit
a8441e565f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3393",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-12-27T10:15:17.270",
|
||||
"lastModified": "2024-12-31T02:00:01.807",
|
||||
"lastModified": "2025-01-04T02:00:01.597",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -64,7 +64,7 @@
|
||||
"cisaExploitAdd": "2024-12-30",
|
||||
"cisaActionDue": "2025-01-20",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-8066",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-28T09:15:05.547",
|
||||
"lastModified": "2024-11-28T09:15:05.547",
|
||||
"lastModified": "2025-01-04T02:15:06.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
"value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
33
CVE-2025/CVE-2025-223xx/CVE-2025-22383.json
Normal file
33
CVE-2025/CVE-2025-223xx/CVE-2025-22383.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-22383",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:06.797",
|
||||
"lastModified": "2025-01-04T02:15:06.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity input validation issue exists in the Commerce B2B application, affecting the Contact Us functionality. This allows visitors to send e-mail messages that could contain unfiltered HTML markup in specific scenarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/32694923652493-Configured-Commerce-Security-Advisory-COM-2024-03",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-223xx/CVE-2025-22384.json
Normal file
33
CVE-2025/CVE-2025-223xx/CVE-2025-22384.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-22384",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:06.937",
|
||||
"lastModified": "2025-01-04T02:15:06.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue concerning business logic exists in the Commerce B2B application, which allows storefront visitors to purchase discontinued products in specific scenarios where requests are altered before reaching the server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-472"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/32694560473741-Configured-Commerce-Security-Advisory-COM-2024-02",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-223xx/CVE-2025-22385.json
Normal file
33
CVE-2025/CVE-2025-223xx/CVE-2025-22385.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-22385",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:07.080",
|
||||
"lastModified": "2025-01-04T02:15:07.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/32695419706637-Configured-Commerce-Security-Advisory-COM-2024-05",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-223xx/CVE-2025-22386.json
Normal file
21
CVE-2025/CVE-2025-223xx/CVE-2025-22386.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22386",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:07.230",
|
||||
"lastModified": "2025-01-04T02:15:07.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-223xx/CVE-2025-22387.json
Normal file
21
CVE-2025/CVE-2025-223xx/CVE-2025-22387.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22387",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:07.343",
|
||||
"lastModified": "2025-01-04T02:15:07.343",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/32695551034893-Configured-Commerce-Security-Advisory-COM-2024-06",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-223xx/CVE-2025-22388.json
Normal file
21
CVE-2025/CVE-2025-223xx/CVE-2025-22388.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:07.480",
|
||||
"lastModified": "2025-01-04T02:15:07.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/33182047260557-Content-Management-System-CMS-Security-Advisory-CMS-2025-01",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-223xx/CVE-2025-22389.json
Normal file
21
CVE-2025/CVE-2025-223xx/CVE-2025-22389.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22389",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:07.600",
|
||||
"lastModified": "2025-01-04T02:15:07.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-223xx/CVE-2025-22390.json
Normal file
21
CVE-2025/CVE-2025-223xx/CVE-2025-22390.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22390",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-04T02:15:07.747",
|
||||
"lastModified": "2025-01-04T02:15:07.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.optimizely.com/hc/en-us/articles/33182255281293-Content-Management-System-CMS-Security-Advisory-CMS-2025-02",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-04T00:55:19.776186+00:00
|
||||
2025-01-04T03:00:19.556938+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-04T00:15:06.207000+00:00
|
||||
2025-01-04T02:15:07.747000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,46 +27,35 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-01-03T01:00:04.355427+00:00
|
||||
2025-01-04T01:00:04.341651+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
275678
|
||||
275686
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-11733](CVE-2024/CVE-2024-117xx/CVE-2024-11733.json) (`2025-01-03T23:15:06.313`)
|
||||
- [CVE-2024-12237](CVE-2024/CVE-2024-122xx/CVE-2024-12237.json) (`2025-01-03T23:15:06.473`)
|
||||
- [CVE-2024-55896](CVE-2024/CVE-2024-558xx/CVE-2024-55896.json) (`2025-01-03T23:15:08.437`)
|
||||
- [CVE-2024-55897](CVE-2024/CVE-2024-558xx/CVE-2024-55897.json) (`2025-01-03T23:15:08.573`)
|
||||
- [CVE-2025-0199](CVE-2025/CVE-2025-01xx/CVE-2025-0199.json) (`2025-01-03T23:15:08.707`)
|
||||
- [CVE-2025-22383](CVE-2025/CVE-2025-223xx/CVE-2025-22383.json) (`2025-01-04T02:15:06.797`)
|
||||
- [CVE-2025-22384](CVE-2025/CVE-2025-223xx/CVE-2025-22384.json) (`2025-01-04T02:15:06.937`)
|
||||
- [CVE-2025-22385](CVE-2025/CVE-2025-223xx/CVE-2025-22385.json) (`2025-01-04T02:15:07.080`)
|
||||
- [CVE-2025-22386](CVE-2025/CVE-2025-223xx/CVE-2025-22386.json) (`2025-01-04T02:15:07.230`)
|
||||
- [CVE-2025-22387](CVE-2025/CVE-2025-223xx/CVE-2025-22387.json) (`2025-01-04T02:15:07.343`)
|
||||
- [CVE-2025-22388](CVE-2025/CVE-2025-223xx/CVE-2025-22388.json) (`2025-01-04T02:15:07.480`)
|
||||
- [CVE-2025-22389](CVE-2025/CVE-2025-223xx/CVE-2025-22389.json) (`2025-01-04T02:15:07.600`)
|
||||
- [CVE-2025-22390](CVE-2025/CVE-2025-223xx/CVE-2025-22390.json) (`2025-01-04T02:15:07.747`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `16`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2023-32221](CVE-2023/CVE-2023-322xx/CVE-2023-32221.json) (`2025-01-04T00:15:06.207`)
|
||||
- [CVE-2024-11624](CVE-2024/CVE-2024-116xx/CVE-2024-11624.json) (`2025-01-03T23:15:06.157`)
|
||||
- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-01-03T23:15:06.627`)
|
||||
- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-01-03T23:15:06.767`)
|
||||
- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-01-03T23:15:06.903`)
|
||||
- [CVE-2024-47032](CVE-2024/CVE-2024-470xx/CVE-2024-47032.json) (`2025-01-03T23:15:07.047`)
|
||||
- [CVE-2024-53834](CVE-2024/CVE-2024-538xx/CVE-2024-53834.json) (`2025-01-03T23:15:07.190`)
|
||||
- [CVE-2024-53835](CVE-2024/CVE-2024-538xx/CVE-2024-53835.json) (`2025-01-03T23:15:07.333`)
|
||||
- [CVE-2024-53836](CVE-2024/CVE-2024-538xx/CVE-2024-53836.json) (`2025-01-03T23:15:07.470`)
|
||||
- [CVE-2024-53837](CVE-2024/CVE-2024-538xx/CVE-2024-53837.json) (`2025-01-03T23:15:07.620`)
|
||||
- [CVE-2024-53838](CVE-2024/CVE-2024-538xx/CVE-2024-53838.json) (`2025-01-03T23:15:07.747`)
|
||||
- [CVE-2024-53839](CVE-2024/CVE-2024-538xx/CVE-2024-53839.json) (`2025-01-03T23:15:07.883`)
|
||||
- [CVE-2024-53840](CVE-2024/CVE-2024-538xx/CVE-2024-53840.json) (`2025-01-03T23:15:08.020`)
|
||||
- [CVE-2024-53841](CVE-2024/CVE-2024-538xx/CVE-2024-53841.json) (`2025-01-03T23:15:08.153`)
|
||||
- [CVE-2024-53842](CVE-2024/CVE-2024-538xx/CVE-2024-53842.json) (`2025-01-03T23:15:08.293`)
|
||||
- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T23:15:08.897`)
|
||||
- [CVE-2024-3393](CVE-2024/CVE-2024-33xx/CVE-2024-3393.json) (`2025-01-04T02:00:01.597`)
|
||||
- [CVE-2024-8066](CVE-2024/CVE-2024-80xx/CVE-2024-8066.json) (`2025-01-04T02:15:06.670`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
54
_state.csv
54
_state.csv
@ -224921,7 +224921,7 @@ CVE-2023-32218,0,0,f4668f6dec2ad787cba45f10fd52cbffde113c4295d5e52527a0a3bed9829
|
||||
CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000
|
||||
CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000
|
||||
CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000
|
||||
CVE-2023-32221,0,1,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000
|
||||
CVE-2023-32221,0,0,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000
|
||||
CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000
|
||||
CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000
|
||||
CVE-2023-32224,0,0,7c5c385f9388cab92c949ae1ed149caba7d8c92dca8e737241ce6522dad13863,2024-11-21T08:02:56.113000
|
||||
@ -244502,7 +244502,7 @@ CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee
|
||||
CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000
|
||||
CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000
|
||||
CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000
|
||||
CVE-2024-11624,0,1,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000
|
||||
CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000
|
||||
CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000
|
||||
CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000
|
||||
CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000
|
||||
@ -244602,7 +244602,7 @@ CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f4
|
||||
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
|
||||
CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000
|
||||
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
|
||||
CVE-2024-11733,1,1,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000
|
||||
CVE-2024-11733,0,0,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000
|
||||
CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000
|
||||
CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000
|
||||
CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000
|
||||
@ -244941,7 +244941,7 @@ CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a5589
|
||||
CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
|
||||
CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000
|
||||
CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000
|
||||
CVE-2024-12237,1,1,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000
|
||||
CVE-2024-12237,0,0,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000
|
||||
CVE-2024-12238,0,0,4bf6bf8d9d561e93dab20ec932a5f35fe4b6b4442d292c9962ed57407d619434,2024-12-29T06:15:05.487000
|
||||
CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000
|
||||
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
||||
@ -256661,7 +256661,7 @@ CVE-2024-33926,0,0,ba3b0b5d452557f451f073e7051635f20935a7d4b0bf1e31891232c3b0d24
|
||||
CVE-2024-33927,0,0,47a33c5c8d9c813c7e0792969b9d2c7f5a02e1e804addbde5e0fd6efc0070e34,2024-11-21T09:17:45.063000
|
||||
CVE-2024-33928,0,0,5485d29b9f1f54b48807c0a7fab77f8660a3f6f005966e3d555ef2b3d42ff3b8,2024-11-21T09:17:45.170000
|
||||
CVE-2024-33929,0,0,9250b6acc401d14df60daf091a118dd6e90efe6072ae5814267d257083c00a7c,2024-11-21T09:17:45.277000
|
||||
CVE-2024-3393,0,0,b48542ef6904dd8c7115e5c27bb4a2e96704783642e34a95b81a006de0382425,2024-12-31T02:00:01.807000
|
||||
CVE-2024-3393,0,1,82cdef2f436f428aba3983cae5ad6f97d68af7fb27faba094e0b6f6eebad4246,2025-01-04T02:00:01.597000
|
||||
CVE-2024-33930,0,0,352e81bce8bffcdd250f3e4cc8b8032938f93f842babfe72361bc9938c4c9ff9,2024-11-21T09:17:45.387000
|
||||
CVE-2024-33931,0,0,02797798e9c898cf0c4c463d6fab582aa710f3a0cf7c63a98df878120217d686,2024-11-21T09:17:45.490000
|
||||
CVE-2024-33932,0,0,a959ef4dc107f5a5fd9667e1036684cdb3d2d4571d8d1f2cc49022d8aa2387fc,2024-11-21T09:17:45.610000
|
||||
@ -264013,9 +264013,9 @@ CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9
|
||||
CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000
|
||||
CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
|
||||
CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
|
||||
CVE-2024-43767,0,1,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000
|
||||
CVE-2024-43768,0,1,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000
|
||||
CVE-2024-43769,0,1,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000
|
||||
CVE-2024-43767,0,0,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000
|
||||
CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000
|
||||
CVE-2024-43769,0,0,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000
|
||||
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
|
||||
CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000
|
||||
CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000
|
||||
@ -266099,7 +266099,7 @@ CVE-2024-47029,0,0,dee30063661ea67866801cfb2ecb7654f2218f2ce68d1de08a24516b75279
|
||||
CVE-2024-4703,0,0,8dae3b499efe136db7f398d4c41a1bfd4bf3b9aac5a043a02f530bb618a966e5,2024-11-21T09:43:24.660000
|
||||
CVE-2024-47030,0,0,2dfbd4a7868cc0b2ce9fa4921a019a022ddf4de093912df68c067097e504d63d,2024-10-28T20:35:16.973000
|
||||
CVE-2024-47031,0,0,9f628d7d133c819b06ff3de82f92bb7205005b4a410eced9d57c7a79d43f1b1d,2024-10-28T20:35:17.223000
|
||||
CVE-2024-47032,0,1,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000
|
||||
CVE-2024-47032,0,0,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000
|
||||
CVE-2024-47033,0,0,55edc3ae29717e555bfd0e3e7b6b8889d14495fe139b3a950485b7473e7a9dca,2024-10-28T17:57:30.110000
|
||||
CVE-2024-47034,0,0,25c2ef9ecb4e73ca1fa8dabb5e685185efaa515e35621fde72c2d30b8491c723,2024-10-28T17:56:51.787000
|
||||
CVE-2024-47035,0,0,a7a178fa9ebc80aea368dd0425eaa85245240ba008a832e23a0cba77ab278738,2024-10-31T00:05:18.113000
|
||||
@ -270629,16 +270629,16 @@ CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b
|
||||
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
|
||||
CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000
|
||||
CVE-2024-53833,0,0,83c2cd6c738c3b63237afc3b0a6973df3ebd3dd1be66df5ff62c4687f53f40a1,2025-01-03T04:15:06.227000
|
||||
CVE-2024-53834,0,1,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000
|
||||
CVE-2024-53835,0,1,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000
|
||||
CVE-2024-53836,0,1,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000
|
||||
CVE-2024-53837,0,1,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000
|
||||
CVE-2024-53838,0,1,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000
|
||||
CVE-2024-53839,0,1,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000
|
||||
CVE-2024-53834,0,0,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000
|
||||
CVE-2024-53835,0,0,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000
|
||||
CVE-2024-53836,0,0,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000
|
||||
CVE-2024-53837,0,0,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000
|
||||
CVE-2024-53838,0,0,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000
|
||||
CVE-2024-53839,0,0,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000
|
||||
CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000
|
||||
CVE-2024-53840,0,1,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000
|
||||
CVE-2024-53841,0,1,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000
|
||||
CVE-2024-53842,0,1,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000
|
||||
CVE-2024-53840,0,0,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000
|
||||
CVE-2024-53841,0,0,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000
|
||||
CVE-2024-53842,0,0,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000
|
||||
CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000
|
||||
CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000
|
||||
CVE-2024-53845,0,0,6016d80f197703cecce3c68f8c667ba88f504a297b5ec5a264d36bac2815592b,2024-12-12T02:15:29.087000
|
||||
@ -271414,8 +271414,8 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3
|
||||
CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000
|
||||
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
|
||||
CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000
|
||||
CVE-2024-55896,1,1,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000
|
||||
CVE-2024-55897,1,1,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000
|
||||
CVE-2024-55896,0,0,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000
|
||||
CVE-2024-55897,0,0,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000
|
||||
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
|
||||
CVE-2024-5591,0,0,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000
|
||||
CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000
|
||||
@ -274086,7 +274086,7 @@ CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670d
|
||||
CVE-2024-8058,0,0,6f6e6d86a899b2d6ecf84c7bb695389cf6cd8969a74da9d0894bff6a25056e1b,2024-12-16T18:15:12.540000
|
||||
CVE-2024-8059,0,0,1cb4facf7c91a3d9a97ccb8a1f3191711112656d77de35de0353c495e40da8b5,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000
|
||||
CVE-2024-8066,0,0,23914c4c07a72976bf77323f8c8c88f9f1b5c360164b6197b2a6c72e85e345f6,2024-11-28T09:15:05.547000
|
||||
CVE-2024-8066,0,1,86e49e9ca40f562dbb4349de8b035fa3bdbe2dc1ec58956bfe10f073117de36c,2025-01-04T02:15:06.670000
|
||||
CVE-2024-8067,0,0,9a8e02c70e3cf1101161df0e8347c65b1eb92673227d1760f0da98254917cf93,2024-11-21T17:15:25.793000
|
||||
CVE-2024-8068,0,0,33e344edbab124895a17cddeaed3b528914de950dbd4d2b9e3d629e050b587d5,2024-11-22T16:15:34.680000
|
||||
CVE-2024-8069,0,0,5c41f789c536dcfcd2017a15e49ab4ab636220d759c413ecaaf2045ac3fb4188,2024-11-13T17:01:16.850000
|
||||
@ -275671,9 +275671,17 @@ CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8
|
||||
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
|
||||
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
|
||||
CVE-2025-0198,0,0,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000
|
||||
CVE-2025-0199,1,1,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000
|
||||
CVE-2025-0199,0,0,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000
|
||||
CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000
|
||||
CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000
|
||||
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000
|
||||
CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000
|
||||
CVE-2025-22376,0,1,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000
|
||||
CVE-2025-22376,0,0,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000
|
||||
CVE-2025-22383,1,1,727a6fbe61cca6de96af4712e67ef7192921a2b367f0ec5a2db18fdf8d56a82e,2025-01-04T02:15:06.797000
|
||||
CVE-2025-22384,1,1,a34785f0ea77d1051462b06f3ba284ff30a622cd8e76e1c21ab8185ab758455f,2025-01-04T02:15:06.937000
|
||||
CVE-2025-22385,1,1,aff43c38155cb74cf81c638cfbc47b94018f167ea3f906c5fd31515dc6bc6d9e,2025-01-04T02:15:07.080000
|
||||
CVE-2025-22386,1,1,bbd7d8fc803c2934a2149fbb2deed4c9778625ec10cb1d2872244e9e5659fbeb,2025-01-04T02:15:07.230000
|
||||
CVE-2025-22387,1,1,b838244d0996dc03ebb8dffc9dabf702184ba4e49a7a5c57230e9efc416d9467,2025-01-04T02:15:07.343000
|
||||
CVE-2025-22388,1,1,9a8402292ef769e12d5885e75d6e64bf98efa2678784b842f9e9e7cbfb0895ec,2025-01-04T02:15:07.480000
|
||||
CVE-2025-22389,1,1,20998ea8161eeddffb076f7aaa13e80cc68375bfd9b91c246ad1e89981e76302,2025-01-04T02:15:07.600000
|
||||
CVE-2025-22390,1,1,9330b7c3a49d9fbd80ec7f6397cf44e8e49827d6961d879ecb2fb7c19857a86c,2025-01-04T02:15:07.747000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user