mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-02-12T03:00:57.960645+00:00
This commit is contained in:
parent
10f199b403
commit
b12b73d26b
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0142",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2025-02-12T00:15:08.423",
|
||||
"lastModified": "2025-02-12T00:15:08.423",
|
||||
"lastModified": "2025-02-12T01:15:08.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
|
||||
"source": "psirt@nvidia.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2080",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-01xx/CVE-2024-0143.json
Normal file
60
CVE-2024/CVE-2024-01xx/CVE-2024-0143.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-0143",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2025-02-12T01:15:08.347",
|
||||
"lastModified": "2025-02-12T02:15:09.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
|
||||
"source": "psirt@nvidia.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2095",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-01xx/CVE-2024-0144.json
Normal file
60
CVE-2024/CVE-2024-01xx/CVE-2024-0144.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-0144",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2025-02-12T01:15:08.483",
|
||||
"lastModified": "2025-02-12T02:15:10.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
|
||||
"source": "psirt@nvidia.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2113",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-01xx/CVE-2024-0145.json
Normal file
60
CVE-2024/CVE-2024-01xx/CVE-2024-0145.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-0145",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2025-02-12T01:15:08.630",
|
||||
"lastModified": "2025-02-12T02:15:10.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a heap-based buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
|
||||
"source": "psirt@nvidia.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2108",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12085",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-01-14T18:15:25.123",
|
||||
"lastModified": "2025-02-11T12:15:34.047",
|
||||
"lastModified": "2025-02-12T01:15:08.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -100,6 +100,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1120",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1123",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-12085",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1702",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-21T17:15:08.583",
|
||||
"lastModified": "2024-11-21T08:51:07.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:01:24.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.254390",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.254390",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.254390",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.254390",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1706",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-21T18:15:51.057",
|
||||
"lastModified": "2024-11-21T08:51:07.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:03:35.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zkteco:zkbio_access_ivs:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.3.2",
|
||||
"matchCriteriaId": "3F72FFB6-F055-42A3-8048-79CDAC6D9374"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/whiteman007/8d3a09991de4ef336937ba91c07b7856/raw/adc00538d7a8c3c54bde4797a10d9b6af393711d/gistfile1.txt",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.254396",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.254396",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/whiteman007/8d3a09991de4ef336937ba91c07b7856/raw/adc00538d7a8c3c54bde4797a10d9b6af393711d/gistfile1.txt",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.254396",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.254396",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1707",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-21T19:15:08.453",
|
||||
"lastModified": "2024-11-21T08:51:08.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:21:17.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,93 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:garo:wallbox_glb\\+_t2ev7_firmware:0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46BAEB34-C2A0-443C-8F88-B276448A14BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:garo:wallbox_glb\\+_t2ev7:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A66DE61-F5E2-4C07-B79B-F04E3AA49A36"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1spsElvU8rgCs4gUxc662SCBjTI9VAqth/view",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.254397",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.254397",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1spsElvU8rgCs4gUxc662SCBjTI9VAqth/view",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.254397",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.254397",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T18:15:51.820",
|
||||
"lastModified": "2024-11-21T09:01:32.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:12:54.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad XSS en la funcionalidad ChurchCRM v.5.5.0, edite su evento, donde se puede insertar c\u00f3digo JS o HTML malicioso en el campo Event Sermon en EventEditor.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:churchcrm:churchcrm:5.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FEB8DD0-3ADC-4C06-84DF-9296533BFBD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/6851",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/6851",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-291xx/CVE-2024-29171.json
Normal file
56
CVE-2024/CVE-2024-291xx/CVE-2024-29171.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-29171",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-02-12T02:15:10.363",
|
||||
"lastModified": "2025-02-12T02:15:10.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell BSAFE SSL-J contains an Improper certificate verification vulnerability. A remote attacker could potentially exploit this vulnerability, leading to information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-291xx/CVE-2024-29172.json
Normal file
56
CVE-2024/CVE-2024-291xx/CVE-2024-29172.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-29172",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-02-12T02:15:10.500",
|
||||
"lastModified": "2025-02-12T02:15:10.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell BSAFE SSL-J contains a deadlock vulnerability. A remote attacker could potentially exploit this vulnerability, leading to a Denial of Service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-833"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29793",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-27T13:15:50.637",
|
||||
"lastModified": "2024-11-21T09:08:20.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:24:37.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mailmunch:mailchimp_forms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.2.3",
|
||||
"matchCriteriaId": "3EA10CAE-BAD7-41C3-AA46-71D9AA71AB83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31349",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-07T18:15:13.240",
|
||||
"lastModified": "2024-11-21T09:13:20.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:27:43.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mailmunch:mailmunch:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.1.7",
|
||||
"matchCriteriaId": "C93CA6A5-4DE5-4179-AF22-5132B04B8292"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34566",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-05-08T11:15:24.930",
|
||||
"lastModified": "2024-11-21T09:18:57.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:40:13.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.1",
|
||||
"matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3459",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-05-14T15:41:12.060",
|
||||
"lastModified": "2024-11-21T09:29:38.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-12T01:48:00.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,32 +69,78 @@
|
||||
"value": "CWE-424"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*",
|
||||
"versionEndIncluding": "8.34",
|
||||
"matchCriteriaId": "08120DB6-BEF8-4C1E-B969-3F661CB25C70"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
|
||||
"source": "cvd@cert.pl"
|
||||
"source": "cvd@cert.pl",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
|
||||
"source": "cvd@cert.pl"
|
||||
"source": "cvd@cert.pl",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kioware.com/",
|
||||
"source": "cvd@cert.pl"
|
||||
"source": "cvd@cert.pl",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kioware.com/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40890",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2025-02-04T10:15:08.717",
|
||||
"lastModified": "2025-02-04T10:15:08.717",
|
||||
"lastModified": "2025-02-12T02:00:01.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -46,6 +46,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-11",
|
||||
"cisaActionDue": "2025-03-04",
|
||||
"cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",
|
||||
"cisaVulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40891",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2025-02-04T10:15:08.920",
|
||||
"lastModified": "2025-02-04T10:15:08.920",
|
||||
"lastModified": "2025-02-12T02:00:01.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -46,6 +46,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-11",
|
||||
"cisaActionDue": "2025-03-04",
|
||||
"cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",
|
||||
"cisaVulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
|
56
CVE-2024/CVE-2024-538xx/CVE-2024-53880.json
Normal file
56
CVE-2024/CVE-2024-538xx/CVE-2024-53880.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53880",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2025-02-12T01:15:08.940",
|
||||
"lastModified": "2025-02-12T01:15:08.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5612",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-12xx/CVE-2025-1243.json
Normal file
82
CVE-2025/CVE-2025-12xx/CVE-2025-1243.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-1243",
|
||||
"sourceIdentifier": "security@temporal.io",
|
||||
"published": "2025-02-12T01:15:09.073",
|
||||
"lastModified": "2025-02-12T01:15:09.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in\u00a0information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@temporal.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.0,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@temporal.io",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/temporalio/api-go/releases/tag/v1.44.1",
|
||||
"source": "security@temporal.io"
|
||||
},
|
||||
{
|
||||
"url": "https://temporal.io/blog/announcing-a-new-operation-workflow-update",
|
||||
"source": "security@temporal.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21391",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:37.723",
|
||||
"lastModified": "2025-02-11T18:15:37.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-12T02:00:01.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-11",
|
||||
"cisaActionDue": "2025-03-04",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Storage Link Following Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21418",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:40.023",
|
||||
"lastModified": "2025-02-11T18:15:40.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-12T02:00:01.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-11",
|
||||
"cisaActionDue": "2025-03-04",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
|
56
CVE-2025/CVE-2025-233xx/CVE-2025-23359.json
Normal file
56
CVE-2025/CVE-2025-233xx/CVE-2025-23359.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23359",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2025-02-12T01:15:09.230",
|
||||
"lastModified": "2025-02-12T01:15:09.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5616",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
53
README.md
53
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-12T00:56:43.013705+00:00
|
||||
2025-02-12T03:00:57.960645+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-12T00:54:22.470000+00:00
|
||||
2025-02-12T02:15:10.500000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,44 +27,47 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-02-11T01:00:04.373607+00:00
|
||||
2025-02-12T01:00:04.376896+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
280919
|
||||
280927
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2020-3432](CVE-2020/CVE-2020-34xx/CVE-2020-3432.json) (`2025-02-12T00:15:07.670`)
|
||||
- [CVE-2022-37660](CVE-2022/CVE-2022-376xx/CVE-2022-37660.json) (`2025-02-11T23:15:08.140`)
|
||||
- [CVE-2023-20508](CVE-2023/CVE-2023-205xx/CVE-2023-20508.json) (`2025-02-12T00:15:07.850`)
|
||||
- [CVE-2023-31342](CVE-2023/CVE-2023-313xx/CVE-2023-31342.json) (`2025-02-11T23:15:08.277`)
|
||||
- [CVE-2023-31343](CVE-2023/CVE-2023-313xx/CVE-2023-31343.json) (`2025-02-11T23:15:08.407`)
|
||||
- [CVE-2023-31345](CVE-2023/CVE-2023-313xx/CVE-2023-31345.json) (`2025-02-12T00:15:08.003`)
|
||||
- [CVE-2023-31352](CVE-2023/CVE-2023-313xx/CVE-2023-31352.json) (`2025-02-11T23:15:08.537`)
|
||||
- [CVE-2024-0112](CVE-2024/CVE-2024-01xx/CVE-2024-0112.json) (`2025-02-12T00:15:08.263`)
|
||||
- [CVE-2024-0142](CVE-2024/CVE-2024-01xx/CVE-2024-0142.json) (`2025-02-12T00:15:08.423`)
|
||||
- [CVE-2024-21971](CVE-2024/CVE-2024-219xx/CVE-2024-21971.json) (`2025-02-12T00:15:08.750`)
|
||||
- [CVE-2024-33469](CVE-2024/CVE-2024-334xx/CVE-2024-33469.json) (`2025-02-11T23:15:08.903`)
|
||||
- [CVE-2024-44336](CVE-2024/CVE-2024-443xx/CVE-2024-44336.json) (`2025-02-11T23:15:09.020`)
|
||||
- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-02-11T23:15:09.117`)
|
||||
- [CVE-2024-54916](CVE-2024/CVE-2024-549xx/CVE-2024-54916.json) (`2025-02-11T23:15:09.227`)
|
||||
- [CVE-2024-57000](CVE-2024/CVE-2024-570xx/CVE-2024-57000.json) (`2025-02-11T23:15:09.337`)
|
||||
- [CVE-2025-25203](CVE-2025/CVE-2025-252xx/CVE-2025-25203.json) (`2025-02-11T23:15:09.450`)
|
||||
- [CVE-2024-0143](CVE-2024/CVE-2024-01xx/CVE-2024-0143.json) (`2025-02-12T01:15:08.347`)
|
||||
- [CVE-2024-0144](CVE-2024/CVE-2024-01xx/CVE-2024-0144.json) (`2025-02-12T01:15:08.483`)
|
||||
- [CVE-2024-0145](CVE-2024/CVE-2024-01xx/CVE-2024-0145.json) (`2025-02-12T01:15:08.630`)
|
||||
- [CVE-2024-29171](CVE-2024/CVE-2024-291xx/CVE-2024-29171.json) (`2025-02-12T02:15:10.363`)
|
||||
- [CVE-2024-29172](CVE-2024/CVE-2024-291xx/CVE-2024-29172.json) (`2025-02-12T02:15:10.500`)
|
||||
- [CVE-2024-53880](CVE-2024/CVE-2024-538xx/CVE-2024-53880.json) (`2025-02-12T01:15:08.940`)
|
||||
- [CVE-2025-1243](CVE-2025/CVE-2025-12xx/CVE-2025-1243.json) (`2025-02-12T01:15:09.073`)
|
||||
- [CVE-2025-23359](CVE-2025/CVE-2025-233xx/CVE-2025-23359.json) (`2025-02-12T01:15:09.230`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
- [CVE-2023-31356](CVE-2023/CVE-2023-313xx/CVE-2023-31356.json) (`2025-02-11T23:15:08.640`)
|
||||
- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-11T23:15:08.807`)
|
||||
- [CVE-2024-1705](CVE-2024/CVE-2024-17xx/CVE-2024-1705.json) (`2025-02-12T00:54:22.470`)
|
||||
- [CVE-2024-0142](CVE-2024/CVE-2024-01xx/CVE-2024-0142.json) (`2025-02-12T01:15:08.230`)
|
||||
- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-02-12T01:15:08.777`)
|
||||
- [CVE-2024-1702](CVE-2024/CVE-2024-17xx/CVE-2024-1702.json) (`2025-02-12T01:01:24.223`)
|
||||
- [CVE-2024-1706](CVE-2024/CVE-2024-17xx/CVE-2024-1706.json) (`2025-02-12T01:03:35.347`)
|
||||
- [CVE-2024-1707](CVE-2024/CVE-2024-17xx/CVE-2024-1707.json) (`2025-02-12T01:21:17.617`)
|
||||
- [CVE-2024-25898](CVE-2024/CVE-2024-258xx/CVE-2024-25898.json) (`2025-02-12T01:12:54.453`)
|
||||
- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2025-02-12T01:24:37.180`)
|
||||
- [CVE-2024-31349](CVE-2024/CVE-2024-313xx/CVE-2024-31349.json) (`2025-02-12T01:27:43.223`)
|
||||
- [CVE-2024-34566](CVE-2024/CVE-2024-345xx/CVE-2024-34566.json) (`2025-02-12T01:40:13.093`)
|
||||
- [CVE-2024-3459](CVE-2024/CVE-2024-34xx/CVE-2024-3459.json) (`2025-02-12T01:48:00.043`)
|
||||
- [CVE-2024-40890](CVE-2024/CVE-2024-408xx/CVE-2024-40890.json) (`2025-02-12T02:00:01.980`)
|
||||
- [CVE-2024-40891](CVE-2024/CVE-2024-408xx/CVE-2024-40891.json) (`2025-02-12T02:00:01.980`)
|
||||
- [CVE-2025-21391](CVE-2025/CVE-2025-213xx/CVE-2025-21391.json) (`2025-02-12T02:00:01.980`)
|
||||
- [CVE-2025-21418](CVE-2025/CVE-2025-214xx/CVE-2025-21418.json) (`2025-02-12T02:00:01.980`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
72
_state.csv
72
_state.csv
@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9
|
||||
CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000
|
||||
CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000
|
||||
CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000
|
||||
CVE-2020-3432,1,1,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000
|
||||
CVE-2020-3432,0,0,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000
|
||||
CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000
|
||||
CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000
|
||||
CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000
|
||||
@ -204650,7 +204650,7 @@ CVE-2022-3763,0,0,c2299b9c134ab1c6cdc29ea9bb0d35812068c7827af0b605982e68cbb64811
|
||||
CVE-2022-3764,0,0,ec247594a5e83915ba6098faf7bda0926c3802dc302b6ea5fc586fe275d41890,2024-11-21T07:20:12.047000
|
||||
CVE-2022-3765,0,0,55d4910aeb7e21447906423f7a9ff627183c7bc0e9d3c6b6eb67cc428a00617d,2024-11-21T07:20:12.173000
|
||||
CVE-2022-3766,0,0,632191e742f432ebfc8c7e158ebc5aec2e0cf696db2bc4f54bff144bc238f89c,2024-11-21T07:20:12.303000
|
||||
CVE-2022-37660,1,1,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000
|
||||
CVE-2022-37660,0,0,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000
|
||||
CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000
|
||||
CVE-2022-3767,0,0,4e5d8fb3c9ad7d92e363d8284cf09f4ef86f4da536880a591d9b22149d210ced,2024-11-21T07:20:12.433000
|
||||
CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000
|
||||
@ -215413,7 +215413,7 @@ CVE-2023-2048,0,0,a3fd93a0062ac104ab7685f0c38c5fdd726a12306b1269a975bd7db45101d5
|
||||
CVE-2023-2049,0,0,a8c5ed7acd162068a2a9410c64cd0f59bf4dff352a99ca706b6abf6f7afe2aab,2024-11-21T07:57:50.160000
|
||||
CVE-2023-2050,0,0,0f2d06f2759566b1898e0808f1100f70849c771723b910ff4d0d791d8bbccaed,2024-11-21T07:57:50.287000
|
||||
CVE-2023-20507,0,0,5fed0288869bdcd6c0eeefc00d71017461fdff4b91e72fc9217d348444cdc77e,2025-02-11T21:15:10.620000
|
||||
CVE-2023-20508,1,1,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000
|
||||
CVE-2023-20508,0,0,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000
|
||||
CVE-2023-20509,0,0,134094f09fd2dc07b9b6920005f6ed24e5bf76664c20df20b585bc7031e48136,2024-11-04T18:35:02.490000
|
||||
CVE-2023-2051,0,0,e835721eb03a78486652d47f32bc2d564aae9456947669d05b669f8ccff34422,2024-11-21T07:57:50.417000
|
||||
CVE-2023-20510,0,0,a6c482788f115b3798feb6c0849d19428006a08ae6d7047f8994f722afc3ac01,2024-12-12T20:28:55.010000
|
||||
@ -224430,17 +224430,17 @@ CVE-2023-31331,0,0,e046140d99705d1ececd3a0382c331bc7f6e3f9774e2e662b44c32bf8207d
|
||||
CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000
|
||||
CVE-2023-3134,0,0,b41055d7bc0dc4c054369608e6a2b8131a42873b85a487dd8d397c15935034b8,2024-11-21T08:16:32.053000
|
||||
CVE-2023-31341,0,0,4d30d8bcca3cc5a6fb3cb512a407b048c8089f2e2668f1d6af1cd5e924a75c8b,2024-12-13T16:22:04.967000
|
||||
CVE-2023-31342,1,1,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000
|
||||
CVE-2023-31343,1,1,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000
|
||||
CVE-2023-31345,1,1,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000
|
||||
CVE-2023-31342,0,0,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000
|
||||
CVE-2023-31343,0,0,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000
|
||||
CVE-2023-31345,0,0,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000
|
||||
CVE-2023-31346,0,0,0f3aef9cb82d734f42dadff61934c6e7356f408812c277f7c7dc139cdf72f4ea,2024-11-21T08:01:46.650000
|
||||
CVE-2023-31347,0,0,40bd095adcf20e32bd278c5ac69186bfbd901c6c106b24da3be411afb7fb0f7e,2024-11-21T08:01:46.837000
|
||||
CVE-2023-31348,0,0,36de6f4439a3c352fc026755e75a90df41c385c2a4dc4700523138475af8101f,2024-12-12T01:21:40.110000
|
||||
CVE-2023-31349,0,0,71bf4a5703aad3a9f91fdab88a68f528b7c5cf5a77563430c2326a8beb20b035,2024-12-12T01:21:40.263000
|
||||
CVE-2023-3135,0,0,5525abaed0951618afc57f6ab0cf7d86c246aa704e41354313c6c2430b9e4078,2024-11-21T08:16:32.173000
|
||||
CVE-2023-31352,1,1,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000
|
||||
CVE-2023-31352,0,0,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000
|
||||
CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000
|
||||
CVE-2023-31356,0,1,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000
|
||||
CVE-2023-31356,0,0,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000
|
||||
CVE-2023-3136,0,0,0082a969c34110c3bc77819ecd8198dbee6358cca1ed9acd2e0be2b757fea739,2024-11-21T08:16:32.297000
|
||||
CVE-2023-31360,0,0,e7f92144bd68f5fb73c54ecfe395f6f555bcbb0068d8a55734c120f7f108127d,2025-02-11T20:15:32.950000
|
||||
CVE-2023-31361,0,0,3f53f70de9580819e880ee58267a5a944926e79c159bf78735edbe5c8a56f4e4,2025-02-11T21:15:12.160000
|
||||
@ -242619,7 +242619,7 @@ CVE-2024-0108,0,0,6439b357fa8fa1da14854e67071d1b4030b146adfc75863fd5dbfa76b8b638
|
||||
CVE-2024-0109,0,0,4e3c7f891f30f73ffea8812d68ca13e592b4af5ffbdce626b768e60669e5b0c4,2024-09-18T15:18:06.117000
|
||||
CVE-2024-0110,0,0,f27210557f0c26fcfbedc193e4d0a41f340a75f32164d31e726fe652317f285c,2024-09-18T15:16:37.990000
|
||||
CVE-2024-0111,0,0,bdef68470cbe972dbf78a48ee8c036044ad45c278e474af19b34bfbde7237a38,2024-09-18T15:22:14.727000
|
||||
CVE-2024-0112,1,1,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000
|
||||
CVE-2024-0112,0,0,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000
|
||||
CVE-2024-0113,0,0,ddc72489479f075436bf2bede7a3c83b1b0eed041894108c913ed6a4245e286a,2024-12-26T19:21:52.380000
|
||||
CVE-2024-0115,0,0,04fb8f6e5724a3bbcfb8807084f7db88a3df8dcc171391e4ae1eeafce22d77c1,2024-12-26T19:21:45.613000
|
||||
CVE-2024-0116,0,0,7e098634cd96469f401e47ab7ff401cb9f2ab3f597905b45f057f27f5d24a16b,2024-10-04T13:51:25.567000
|
||||
@ -242647,7 +242647,10 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7
|
||||
CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000
|
||||
CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000
|
||||
CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000
|
||||
CVE-2024-0142,1,1,5a0886fa1cc35a8f3ebd456d261a655f0296ebae692baed5cb7342468b73179c,2025-02-12T00:15:08.423000
|
||||
CVE-2024-0142,0,1,261b501d3b1c6d9204171cc97a2b9eaa15dd08e26ef75f2cf5f87385800414ae,2025-02-12T01:15:08.230000
|
||||
CVE-2024-0143,1,1,2d6a775a99432800a0b296cde8d2dfd26489facfd8334a2df675b06faf561ec6,2025-02-12T02:15:09.253000
|
||||
CVE-2024-0144,1,1,bdb76e9bda487a77b5d7e400acce3daa73596d4ac300f78220fb30f99715119d,2025-02-12T02:15:10.163000
|
||||
CVE-2024-0145,1,1,3e1a5d12b12b13ee22f1d69fc3c32f9b40b092eb936e7c0e22e0dfa65e26aa4b,2025-02-12T02:15:10.263000
|
||||
CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000
|
||||
CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000
|
||||
CVE-2024-0149,0,0,57c8b5d113e1d5b272dcbe1421dbea4404017873433aea02126d802ef03cb727,2025-01-28T04:15:09.733000
|
||||
@ -245317,7 +245320,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
|
||||
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
||||
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
|
||||
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
|
||||
CVE-2024-12085,0,0,a1a2583f6c82a273a7bdf431f022975e9740d33314ad6c5f1864990651c9e5a2,2025-02-11T12:15:34.047000
|
||||
CVE-2024-12085,0,1,4b4eeb835cd84654fb59f6e8ed766dfa536d170d944378d12098517e4998c73d,2025-02-12T01:15:08.777000
|
||||
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
|
||||
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
|
||||
CVE-2024-12088,0,0,43a2123ff1daddac120d556957600405449568b28a84ca944004ee72fa7fff31,2025-02-10T12:15:28.537000
|
||||
@ -245915,7 +245918,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a
|
||||
CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000
|
||||
CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000
|
||||
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
|
||||
CVE-2024-12797,0,1,37278789a176c7094e2d1358902e5b1073a52e129a2399d6b9e3c257451d319f,2025-02-11T23:15:08.807000
|
||||
CVE-2024-12797,0,0,37278789a176c7094e2d1358902e5b1073a52e129a2399d6b9e3c257451d319f,2025-02-11T23:15:08.807000
|
||||
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
|
||||
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
|
||||
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
|
||||
@ -246894,12 +246897,12 @@ CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c
|
||||
CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000
|
||||
CVE-2024-1700,0,0,c890221edc7d723da200984cd50788ad3f9477e6671e40a4826dd37ab78bdf87,2024-11-21T08:51:06.933000
|
||||
CVE-2024-1701,0,0,999a1855aff758dd3bea1c889c669b741d70388f4ca26ec930896a676a7eec80,2024-11-21T08:51:07.080000
|
||||
CVE-2024-1702,0,0,b6175d9dc80a18f6f7cfdc8d7ccd672b051b17d818dc95fbcd9de4275081d0be,2024-11-21T08:51:07.220000
|
||||
CVE-2024-1702,0,1,6bdc90b2a17f9cc720ccacf951a7c6fa4bbea546083aa1d1c8d973e97e935554,2025-02-12T01:01:24.223000
|
||||
CVE-2024-1703,0,0,967f5b800879b74b8a5834ee2ca69d6ccd277ef7fdf67155513b4a3e4c5c9375,2025-01-03T19:11:33.877000
|
||||
CVE-2024-1704,0,0,ade83be8825a88be560eefedd4a80ce29b73b997a3bc381116fac086a8487d74,2025-01-03T19:11:28.830000
|
||||
CVE-2024-1705,0,1,af7b09e99e734f63ef2ea7268ab25172e3aeb4f4332770b78a46d2b1534caf79,2025-02-12T00:54:22.470000
|
||||
CVE-2024-1706,0,0,bb2fa26be71c93f252750ad503aa5f22cf00468ca8b87351c6c26fbbe19a743a,2024-11-21T08:51:07.893000
|
||||
CVE-2024-1707,0,0,a9020d35f22c4489f7cfd2297cfe28080eadd0f70b288122f51ccc5023ec8af1,2024-11-21T08:51:08.030000
|
||||
CVE-2024-1705,0,0,af7b09e99e734f63ef2ea7268ab25172e3aeb4f4332770b78a46d2b1534caf79,2025-02-12T00:54:22.470000
|
||||
CVE-2024-1706,0,1,71fc36de238f0366dd55cbea7bcd8880ece128b41623b8bba05a9729ba48f898,2025-02-12T01:03:35.347000
|
||||
CVE-2024-1707,0,1,386296f7b2d2f93198c912dd937a6be54a5c06c07c6e4c13ded38903cb47478e,2025-02-12T01:21:17.617000
|
||||
CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe65,2024-11-21T08:51:08.173000
|
||||
CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000
|
||||
CVE-2024-1710,0,0,1e40e71747a8b12de39d769c827824fe24840a5de6160030b181cc2a6ca82e52,2024-11-21T08:51:08.487000
|
||||
@ -248945,7 +248948,7 @@ CVE-2024-21958,0,0,e5206ffa0444f8572c1e9e167d9a12d914a6e0246055c05b0d98e9036149b
|
||||
CVE-2024-2196,0,0,b69b6a180eaa2677dec83ce612fd6894dd1a1d839791fdc8c079145ded6dd346,2024-11-21T09:09:14.183000
|
||||
CVE-2024-21966,0,0,95a7f244be612e572f7740e2431610bd1fd7003e288efea01d1c8140b03e252a,2025-02-11T20:15:34.210000
|
||||
CVE-2024-2197,0,0,a2f883967a50a9a8d4e6369039be76593be79f2ff1288beb4c800f9afb124cb4,2024-11-21T09:09:14.310000
|
||||
CVE-2024-21971,1,1,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000
|
||||
CVE-2024-21971,0,0,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000
|
||||
CVE-2024-21972,0,0,39505a9051e09d87e478fcc5f7515870aabb113eb6e35a2873ad7cf108e230e1,2024-11-21T08:55:18.060000
|
||||
CVE-2024-21974,0,0,23f4ca1528e717237fe841fef4e4a6ef8c37c85aafce9b5c42cec363da075a34,2024-11-15T19:20:09.980000
|
||||
CVE-2024-21975,0,0,85139c939620bb495fd621b698ae8c235d9f4ec5c4743aa119dda8b2c0db20fc,2024-11-15T19:15:18.770000
|
||||
@ -251721,7 +251724,7 @@ CVE-2024-25894,0,0,cb4e57455d9b80e2e8f11d1a23185865c70db5ef798e325cb010e2b0b6d33
|
||||
CVE-2024-25895,0,0,ea845c5a4bfac820a7d6804261ac8359407017ef5c604fa51deecedebeb1f020,2024-11-21T09:01:31.480000
|
||||
CVE-2024-25896,0,0,27e7ea1636a151061689223212aece2065c7f69b7c98d93f82bbadf54d10c93c,2024-11-21T21:15:19.023000
|
||||
CVE-2024-25897,0,0,234d7bc3ad5db294358ea8462de8ed3775160c86133962c3d1daeea643b0d5f6,2024-11-21T09:01:31.853000
|
||||
CVE-2024-25898,0,0,6347051ac44c0ca971bdaf6528e1d0976bd821a3938179893f95e9c94967e810,2024-11-21T09:01:32.087000
|
||||
CVE-2024-25898,0,1,86006dde909e57a7bb647fd23ecf23a25c1344653211bfc4f446ecc8f96a3aa0,2025-02-12T01:12:54.453000
|
||||
CVE-2024-2590,0,0,60a3bdaafc99a02849a3826c8a92974160c52fb0a8b38349972ea2276121fa28,2024-11-21T09:10:04.693000
|
||||
CVE-2024-25902,0,0,50baecac8959a69ff064266e41b61821003e4b15caea11793c8b90ccdbd36bb5,2024-11-21T09:01:32.237000
|
||||
CVE-2024-25903,0,0,510043d77f476a7b8dd893b0aa41ef8c44bea446cf82cb2f0af241f86238cb7c,2024-11-21T09:01:32.363000
|
||||
@ -254384,6 +254387,8 @@ CVE-2024-29168,0,0,76da846afbf9a55737b5d5153c7075fb50544a452bceda1dfcbdd4dbae96e
|
||||
CVE-2024-29169,0,0,d2a39941096d1cea2fb67256e6d405f7dadbfc7f6cf149bb994f4d72fa9e7ae2,2025-02-04T17:21:08.633000
|
||||
CVE-2024-2917,0,0,b5f4311ed824c628747b6d6d6b66642d4215c934be667bd71791c2a5029b2dec,2024-11-21T09:10:50.053000
|
||||
CVE-2024-29170,0,0,370cd60a5ddffa88cf8f7934c452c63f52b7ba07af57e96fdb32da3666fff09f,2025-01-08T16:25:58.207000
|
||||
CVE-2024-29171,1,1,3c82c3ed083bb886f21ca548be00ba108a1c61e9fb5593f79f450724196c7bab,2025-02-12T02:15:10.363000
|
||||
CVE-2024-29172,1,1,32298838eaebc5d1ea2496c4582652366c07713ae35bfafa61ac679d92cf6fb8,2025-02-12T02:15:10.500000
|
||||
CVE-2024-29173,0,0,8f66bdd18b6f7192b1d98e3f67c2fa7b88807a5fecb3bffa3f651ea2750e1735,2025-02-03T15:08:59.513000
|
||||
CVE-2024-29174,0,0,65010050e670e870e2ab6c488596f4f6fc1385fbeba243078e77aa3e825c9f1d,2024-11-21T09:07:43.507000
|
||||
CVE-2024-29175,0,0,1a7114481e9b20c8eff6bf81f7575050706de007b87f7c2ddbf4ca9624c9a616,2024-11-21T09:07:43.653000
|
||||
@ -254678,7 +254683,7 @@ CVE-2024-2979,0,0,169364e1b852ff19eb4d89578c5260ea1664b46f15655b4e30fc73711f61d6
|
||||
CVE-2024-29790,0,0,4ffc45027b2f086e430b392874a445504ac1e7739db800cb2ffc6c260cdab45e,2024-11-21T09:08:20.387000
|
||||
CVE-2024-29791,0,0,85a4d58c4a829257279f8d65f2f235a00f3ee6099db60d44f44693f14d788eea,2024-11-21T09:08:20.517000
|
||||
CVE-2024-29792,0,0,34e590205d2f418692ebf9014a875d8e00e620d9fce1b035a6741819f3890f75,2025-02-05T15:40:41.777000
|
||||
CVE-2024-29793,0,0,b83bf35d70ed5fefa81aa917a86052a2cab25d1fd31eb4ba1db86890386b59d2,2024-11-21T09:08:20.773000
|
||||
CVE-2024-29793,0,1,c5d9c74c41987492ebade1b57d87fdaf3bfd4d1a3de11698ad8abc8119120590,2025-02-12T01:24:37.180000
|
||||
CVE-2024-29794,0,0,70800983f55d41173548f798a538d577c2723effa998974108d8c11c876be532,2024-11-21T09:08:20.910000
|
||||
CVE-2024-29795,0,0,7cde9d85141c898a41540349f913ce42b8abc1f9285faa500037755a789a809f,2024-11-21T09:08:21.040000
|
||||
CVE-2024-29796,0,0,14e02f618887b491d5254cacc44f3e2a453bf69cb6f08ac2aea28174bd15e322,2024-11-21T09:08:21.173000
|
||||
@ -256005,7 +256010,7 @@ CVE-2024-31345,0,0,14c52f9c3da5bdb90298c2b06fd58a68d1c79361ab0ea506debd4e9a43a47
|
||||
CVE-2024-31346,0,0,b972a4a46a8f82aecb8e6a911642668b9c99df971421a9cdb94fecde63fc42f7,2024-11-21T09:13:20.400000
|
||||
CVE-2024-31347,0,0,fbe2b413b7eff6717602ddd334ae28e4d6a1bc4991f31ed08ca6e39c79a3eba8,2024-11-21T09:13:20.513000
|
||||
CVE-2024-31348,0,0,2e98ac178df5c221fd6690a2f1a2bc14e79e9523c14699479d5406069a39380a,2024-11-21T09:13:20.623000
|
||||
CVE-2024-31349,0,0,717aebb22adc3da84f95e90451aabf762069a5b289b6eaeb300c3179e06e25de,2024-11-21T09:13:20.733000
|
||||
CVE-2024-31349,0,1,16e17cf1acfc4a804075d3c2eac540c448394a1ef345218dffd55a47e0b455f5,2025-02-12T01:27:43.223000
|
||||
CVE-2024-3135,0,0,a8ab488dcb130f07beccc80a8f4ebc2149cdf0280a6b66ffe02a28c850b4d100,2024-11-21T09:28:58.417000
|
||||
CVE-2024-31350,0,0,d28e6c1f64725b53d92b4f35582c3333676898df2f97b9e93654a4411eeafad8,2024-11-21T09:13:20.840000
|
||||
CVE-2024-31351,0,0,92c50237d42e95d85681af7f04333b2484437293a310d18109874b28fa58170e,2024-11-21T09:13:20.970000
|
||||
@ -257535,7 +257540,7 @@ CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c
|
||||
CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000
|
||||
CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000
|
||||
CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000
|
||||
CVE-2024-33469,1,1,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000
|
||||
CVE-2024-33469,0,0,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000
|
||||
CVE-2024-3347,0,0,84580b9ac972f7e1b9b68290f45a4841524b704cb60fa893b96efa9e425529ef,2024-11-21T09:29:25.703000
|
||||
CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000
|
||||
CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000
|
||||
@ -258403,7 +258408,7 @@ CVE-2024-34562,0,0,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b68
|
||||
CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000
|
||||
CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000
|
||||
CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000
|
||||
CVE-2024-34566,0,0,2671e0b5139844bb2688036f565bfd7344554ba83df594d02643341f22296441,2024-11-21T09:18:57.020000
|
||||
CVE-2024-34566,0,1,551c9639368b69fc3a51ac711b9940c7917ef958d0e7556eb6b33c06b1a5e2a5,2025-02-12T01:40:13.093000
|
||||
CVE-2024-34567,0,0,2ab276be8a7d5ba54eff2226d21311c587c26eddbddaace14bc714e7d0243fe0,2024-11-21T09:18:57.143000
|
||||
CVE-2024-34568,0,0,e2a99021dbe034875bba53eef3b45ca37b51ca7526699e547fd5d14e77646bbc,2024-11-21T09:18:57.270000
|
||||
CVE-2024-34569,0,0,cd8352582a68c7f60aec609b227b4580a06f5f85d280b7f4cd9eabb100d8aa73,2024-11-21T09:18:57.397000
|
||||
@ -258427,7 +258432,7 @@ CVE-2024-34586,0,0,dd61ac39e080637c3d06cb160b51db7d6028a8ae3c7acedaea446e122ae60
|
||||
CVE-2024-34587,0,0,a1ea0c2bc61320f1c19b728274877a0035d53c1740b926a40db9be507484bd32,2024-11-21T09:18:59.630000
|
||||
CVE-2024-34588,0,0,7fd384a050a91a1492743c2c9bc72e1345a594b8c12774ff795ba64a2b6923f7,2024-11-21T09:18:59.783000
|
||||
CVE-2024-34589,0,0,6fef5e07338107638aef6817dbd0c411c0299c6afcc66be7b7eb8ff397efd304,2024-11-21T09:18:59.933000
|
||||
CVE-2024-3459,0,0,eb6950b6e6b398f4f248bb57e02e28661732e5479fa83345a1eead742c901f56,2024-11-21T09:29:38.633000
|
||||
CVE-2024-3459,0,1,edda0f4899447a7e6b858b8951f50319e74b549a64650bcda8c3f37500b4d328,2025-02-12T01:48:00.043000
|
||||
CVE-2024-34590,0,0,d172563a087c8cc3fc0f18ab9f59b7a38684c26fe9d7eb21c9f28503c3607b69,2024-11-21T09:19:00.083000
|
||||
CVE-2024-34591,0,0,38f4e77aa79e1fe352794c9dd648e5c24d0b6c108df771e74aa53e4a7f38804e,2024-11-21T09:19:01.973000
|
||||
CVE-2024-34592,0,0,2348be36c9bc2af83e1b7f1822c29ed34295e7b533f76caeff201627048bb319,2024-11-21T09:19:02.133000
|
||||
@ -263229,8 +263234,8 @@ CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6
|
||||
CVE-2024-40885,0,0,c819fb6dd4b0136231d7f32857f3d24a5008c3818051b19ae2000f42a9494ee6,2024-11-15T14:00:09.720000
|
||||
CVE-2024-40886,0,0,d6046df7f06d5f5712a2972118d791b3c29f6fc6001fad542f39cc79b75e1580,2024-08-23T16:09:31.887000
|
||||
CVE-2024-4089,0,0,7a035608d08862b8a3927991cbc7bcfd8e0cb13815d39b3b58eaf685ec21d6c5,2024-10-17T19:41:36.467000
|
||||
CVE-2024-40890,0,0,5268031b6b0c69c868b634e8d2dcc745299983ca826dbcb0aeb2308ae94d43c6,2025-02-04T10:15:08.717000
|
||||
CVE-2024-40891,0,0,efbfdb62d645eed67f121c1bccca906620c7719c0e0f11f26167858d6df188a2,2025-02-04T10:15:08.920000
|
||||
CVE-2024-40890,0,1,a2545f7bb3a1bbfdaf9948a013d36581b2d3b0971e991c0417acda97a4bb7112,2025-02-12T02:00:01.980000
|
||||
CVE-2024-40891,0,1,da753debbb056ccce6e92cb3a629df90a9c092073c1b0fbda1dae1b05e2f10de,2025-02-12T02:00:01.980000
|
||||
CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000
|
||||
CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000
|
||||
@ -266040,7 +266045,7 @@ CVE-2024-44331,0,0,42b00072d48078e0b9a060027e505c6c6396591a3a5817312b42a22a13dd2
|
||||
CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c22f,2024-09-09T21:35:11.347000
|
||||
CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000
|
||||
CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000
|
||||
CVE-2024-44336,1,1,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000
|
||||
CVE-2024-44336,0,0,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000
|
||||
CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000
|
||||
CVE-2024-4434,0,0,7c3e3d7c9744d63a28cc3bc3d3c440c5b3c9ccfe3f078d9d12a3b43c238ce6e4,2025-01-15T20:05:02.353000
|
||||
CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000
|
||||
@ -272562,6 +272567,7 @@ CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b
|
||||
CVE-2024-53869,0,0,c1261311436db2434e8425ca6c3b255cdf8ad346c162ecff4729cd3488762e70,2025-01-28T04:15:10.023000
|
||||
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
|
||||
CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000
|
||||
CVE-2024-53880,1,1,34183cceeecf9f65c439b51cd1afbc636f6139fbfbd07e606a43b81980ad32fb,2025-02-12T01:15:08.940000
|
||||
CVE-2024-53881,0,0,9961109f8d29619e875e57c963e9962bf41cbd2a63df9c973c97fd1f736a0a6c,2025-01-28T04:15:10.170000
|
||||
CVE-2024-5389,0,0,7b62c041501e93209780667aacd1d527276730dd1c9ab622b7a27b2efa3d1409,2024-11-21T09:47:33.420000
|
||||
CVE-2024-53899,0,0,6a1e5c5e75d5e15fff4f2ff3855d9c19b45498a7a802333e24ea4271ef180bd9,2025-02-10T18:12:06.107000
|
||||
@ -273167,7 +273173,7 @@ CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c6231
|
||||
CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000
|
||||
CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000
|
||||
CVE-2024-54767,0,0,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000
|
||||
CVE-2024-54772,1,1,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000
|
||||
CVE-2024-54772,0,0,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000
|
||||
CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000
|
||||
CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000
|
||||
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
|
||||
@ -273207,7 +273213,7 @@ CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18
|
||||
CVE-2024-54909,0,0,73dbe9c0eacf924ee5d6ba5f8aea112f03b6c84bae4083891b6147c1b1e4a2ff,2025-02-11T22:15:28.733000
|
||||
CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000
|
||||
CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000
|
||||
CVE-2024-54916,1,1,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000
|
||||
CVE-2024-54916,0,0,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000
|
||||
CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000
|
||||
CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000
|
||||
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
|
||||
@ -274277,7 +274283,7 @@ CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6
|
||||
CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000
|
||||
CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000
|
||||
CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000
|
||||
CVE-2024-57000,1,1,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000
|
||||
CVE-2024-57000,0,0,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000
|
||||
CVE-2024-57004,0,0,f586a360af706a58378cf0329b6a642e0d827f8c0f318cf23dcc24fe8bb6abf1,2025-02-03T19:15:12.777000
|
||||
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
|
||||
CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000
|
||||
@ -278937,6 +278943,7 @@ CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3e
|
||||
CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000
|
||||
CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000
|
||||
CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000
|
||||
CVE-2025-1243,1,1,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
|
||||
@ -279255,7 +279262,7 @@ CVE-2025-21386,0,0,587925b9f51c6f3c61d2c5fdab169ea945b83965a4922958f2a0d4035a486
|
||||
CVE-2025-21387,0,0,45b75cfa0e3c3024e9e9758b140c1e6a57941eb5f03adacfbe13ff717267ca19,2025-02-11T18:15:37.337000
|
||||
CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
|
||||
CVE-2025-21390,0,0,14697f02c8baf4b55b17c007d56cdc55e364c61db4a64d4a3dca6609d3016329,2025-02-11T18:15:37.523000
|
||||
CVE-2025-21391,0,0,6e4fd4950bb5758240b222f52711872c75e6883808a4a98384b300fa35641d63,2025-02-11T18:15:37.723000
|
||||
CVE-2025-21391,0,1,0010a0d8103c312adae0e6ab52ff5b2f6efb1301caae82c7257918d8825b7799,2025-02-12T02:00:01.980000
|
||||
CVE-2025-21392,0,0,faf0d0e3f0fb591c7fa30ae6371bf66c37572648e7b14e075224882a96d4548d,2025-02-11T18:15:37.907000
|
||||
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
|
||||
CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000
|
||||
@ -279278,7 +279285,7 @@ CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec413
|
||||
CVE-2025-21414,0,0,3e2427e2ed7c2a71e7ca3cdd20bff3b54a00c32904d4ae8308a39097ff4a1289,2025-02-11T18:15:39.787000
|
||||
CVE-2025-21415,0,0,a73e69cb370d0dac47b98a4826a11694e5572b74f5784ab533acee4e37f95f59,2025-02-07T14:11:24.557000
|
||||
CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000
|
||||
CVE-2025-21418,0,0,80fc1ee196509b1d5b15447fb529df5ce42a9131defec74112587798a6a8394d,2025-02-11T18:15:40.023000
|
||||
CVE-2025-21418,0,1,3ae3c511b74f45afb2582057b40d6d6e504500f2e441f4a2e37971243dae5c45,2025-02-12T02:00:01.980000
|
||||
CVE-2025-21419,0,0,8d4a4ce1854ce64d5e9a1632a620dc74ee76e1214f2cab758271d527d93a2f57,2025-02-11T18:15:40.227000
|
||||
CVE-2025-21420,0,0,4b5efeb1f002453a12ea1479627a151320581653d00a87f90e1240101e9780c2,2025-02-11T18:15:40.427000
|
||||
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
|
||||
@ -279974,6 +279981,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe
|
||||
CVE-2025-23236,0,0,9ed63f7bfbe943272f760ab493d54bc59838c975bd594d259d2bee944c4c3a3d,2025-02-06T08:15:30.170000
|
||||
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
|
||||
CVE-2025-23239,0,0,7a585763d6c168ccfac8bf02954dc56c5ae9d7a095f70655a5a1ee00b3dbe979,2025-02-05T18:15:31.373000
|
||||
CVE-2025-23359,1,1,ca000ea1c09e6d84d7ca20124740a5199de0048ccb1fcc97aaaa4891bafa68b3,2025-02-12T01:15:09.230000
|
||||
CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000
|
||||
CVE-2025-23363,0,0,0a9aef70d0345148f50c8be1d50129f0d5255e87312c25a23579bd06a0945ffc,2025-02-11T11:15:16.250000
|
||||
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
|
||||
@ -280894,7 +280902,7 @@ CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06b
|
||||
CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000
|
||||
CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000
|
||||
CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000
|
||||
CVE-2025-25203,1,1,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000
|
||||
CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000
|
||||
CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000
|
||||
CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000
|
||||
CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user