Auto-Update: 2025-01-31T15:00:40.693004+00:00

This commit is contained in:
cad-safe-bot 2025-01-31 15:04:08 +00:00
parent a09421b141
commit b86cdd2791
64 changed files with 2906 additions and 280 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45349",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-25T12:15:08.503",
"lastModified": "2024-11-21T07:29:04.747",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:12:19.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "26.6.1",
"matchCriteriaId": "CC6A1EDA-DD28-48B8-BCFB-1E2FFDECC6FE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-4?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-4?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45351",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-25T12:15:08.803",
"lastModified": "2024-11-21T07:29:05.063",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:27:22.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "26.6.1",
"matchCriteriaId": "CC6A1EDA-DD28-48B8-BCFB-1E2FFDECC6FE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-5?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-5?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45352",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-25T12:15:09.010",
"lastModified": "2024-11-21T07:29:05.190",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:25:34.883",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "26.6.3",
"matchCriteriaId": "A319AF09-480F-47AA-9F89-B625548B97BE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-2?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45356",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-25T12:15:09.210",
"lastModified": "2024-11-21T07:29:05.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:23:40.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "26.6.3",
"matchCriteriaId": "A319AF09-480F-47AA-9F89-B625548B97BE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-3?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-6-1-broken-access-control-vulnerability-3?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21111",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.950",
"lastModified": "2024-11-21T07:42:11.000",
"lastModified": "2025-01-31T14:15:27.333",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21117",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.067",
"lastModified": "2024-11-21T07:42:11.813",
"lastModified": "2025-01-31T14:15:28.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21118",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.107",
"lastModified": "2024-11-21T07:42:11.923",
"lastModified": "2025-01-31T14:15:28.207",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23304",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T20:15:09.573",
"lastModified": "2024-11-21T07:45:58.540",
"lastModified": "2025-01-31T14:15:28.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23305",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T20:15:09.627",
"lastModified": "2024-11-21T07:45:58.683",
"lastModified": "2025-01-31T14:15:28.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
@ -80,6 +110,10 @@
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/poc/GRMN-06.prg",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23306",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T20:15:09.677",
"lastModified": "2024-11-21T07:45:58.820",
"lastModified": "2025-01-31T14:15:28.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23545",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.230",
"lastModified": "2024-11-21T07:46:23.433",
"lastModified": "2025-01-31T14:15:28.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-306"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23556",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2023-05-18T22:15:09.487",
"lastModified": "2024-11-21T07:46:24.870",
"lastModified": "2025-01-31T14:15:29.200",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25440",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:09.727",
"lastModified": "2024-11-21T07:49:31.093",
"lastModified": "2025-01-31T14:15:29.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25946",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.273",
"lastModified": "2024-11-21T07:50:29.723",
"lastModified": "2025-01-31T14:15:29.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27066",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T17:15:09.347",
"lastModified": "2024-11-21T07:52:15.473",
"lastModified": "2025-01-31T14:15:29.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27067",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T19:15:09.960",
"lastModified": "2024-11-21T07:52:15.643",
"lastModified": "2025-01-31T14:15:29.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27388",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.527",
"lastModified": "2024-11-21T07:52:48.430",
"lastModified": "2025-01-31T14:15:30.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27397",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.570",
"lastModified": "2024-11-21T07:52:49.913",
"lastModified": "2025-01-31T14:15:30.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27507",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.610",
"lastModified": "2024-11-21T07:53:02.993",
"lastModified": "2025-01-31T14:15:30.557",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27521",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.787",
"lastModified": "2024-11-21T07:53:05.317",
"lastModified": "2025-01-31T14:15:30.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27920",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.827",
"lastModified": "2024-11-21T07:53:42.113",
"lastModified": "2025-01-31T14:15:30.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27921",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.867",
"lastModified": "2024-11-21T07:53:42.243",
"lastModified": "2025-01-31T14:15:31.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28409",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:10.257",
"lastModified": "2024-11-21T07:55:00.603",
"lastModified": "2025-01-31T14:15:31.303",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28413",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:10.293",
"lastModified": "2024-11-21T07:55:01.097",
"lastModified": "2025-01-31T14:15:31.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29629",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T21:15:10.687",
"lastModified": "2024-11-21T07:57:20.987",
"lastModified": "2025-01-31T14:15:31.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29630",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T21:15:10.760",
"lastModified": "2024-11-21T07:57:21.130",
"lastModified": "2025-01-31T14:15:31.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29631",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T21:15:10.827",
"lastModified": "2024-11-21T07:57:21.267",
"lastModified": "2025-01-31T14:15:32.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29746",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T04:15:49.923",
"lastModified": "2024-11-21T07:57:28.020",
"lastModified": "2025-01-31T14:15:32.257",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31457",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:09.977",
"lastModified": "2024-11-21T08:01:54.470",
"lastModified": "2025-01-31T14:15:32.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31458",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.520",
"lastModified": "2024-11-21T08:01:54.617",
"lastModified": "2025-01-31T14:15:32.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31459",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.033",
"lastModified": "2024-11-21T08:01:54.753",
"lastModified": "2025-01-31T14:15:32.890",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-640"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31460",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.093",
"lastModified": "2024-11-21T08:01:54.890",
"lastModified": "2025-01-31T14:15:33.087",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31518",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T20:15:09.947",
"lastModified": "2024-11-21T08:01:59.950",
"lastModified": "2025-01-31T14:15:33.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31595",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.150",
"lastModified": "2024-11-21T08:02:03.823",
"lastModified": "2025-01-31T14:15:33.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31614",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T15:15:11.913",
"lastModified": "2024-11-21T08:02:05.280",
"lastModified": "2025-01-31T14:15:33.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T15:15:11.963",
"lastModified": "2024-11-21T08:02:05.430",
"lastModified": "2025-01-31T14:15:33.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39998",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-19T13:15:54.633",
"lastModified": "2024-11-21T08:16:12.323",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:22:08.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 5.3
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "27.1.2",
"matchCriteriaId": "B835A272-4BD1-434C-8A38-3D5FFDD1FA07"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-27-1-1-author-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-27-1-1-author-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-48677",
"sourceIdentifier": "security@acronis.com",
"published": "2023-12-12T09:15:08.383",
"lastModified": "2024-11-21T08:32:14.527",
"lastModified": "2025-01-31T13:15:26.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901."
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
},
{
"lang": "es",
@ -64,7 +64,7 @@
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1380",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:20.903",
"lastModified": "2024-11-21T08:50:27.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T13:26:51.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.22.1",
"matchCriteriaId": "DCF85846-7EC3-4290-9B04-9BA18A59F3F2"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3033880%40relevanssi&new=3033880%40relevanssi&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2a3b17-0551-4e02-8e6a-ae8d46da0ef8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3033880%40relevanssi&new=3033880%40relevanssi&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2a3b17-0551-4e02-8e6a-ae8d46da0ef8?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1668",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:25.510",
"lastModified": "2024-11-21T08:51:02.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T13:48:12.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.11.6",
"matchCriteriaId": "0DBAB261-B343-4EF4-8A9E-3A393ABC7E24"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd224169-ae51-4af8-b6de-706ed580ff8d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd224169-ae51-4af8-b6de-706ed580ff8d?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25708",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:13.070",
"lastModified": "2025-01-23T18:27:58.827",
"lastModified": "2025-01-31T13:27:06.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -42,19 +42,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25709",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:13.340",
"lastModified": "2025-01-23T16:17:02.767",
"lastModified": "2025-01-31T14:35:45.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -42,19 +42,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5031",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-22T09:15:13.350",
"lastModified": "2024-11-21T09:46:48.853",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-31T14:18:23.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:caseproof:memberpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.11.30",
"matchCriteriaId": "7CACFDC8-C125-4E12-AB8F-0F7E80C30EAA"
}
]
}
]
}
],
"references": [
{
"url": "https://memberpress.com/change-log/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/80064e3b-6996-49eb-a475-0ffe0e894f9e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://memberpress.com/change-log/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/80064e3b-6996-49eb-a475-0ffe0e894f9e?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5165",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-05-23T10:15:10.183",
"lastModified": "2024-11-21T09:47:06.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:46:11.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,72 +69,179 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eclipse:ditto:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.5.6",
"matchCriteriaId": "6F6F2718-0B15-4655-B194-48D978E66BFA"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/23",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/23",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52555",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-11-15T16:15:38.340",
"lastModified": "2024-11-18T17:11:56.587",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:37:51.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,12 +69,43 @@
"value": "CWE-349"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "7B96E2A6-9D64-4F5E-86B5-C4076E9FC009"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54153",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-12-04T12:15:19.853",
"lastModified": "2024-12-04T12:15:19.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:43:01.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,76 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.51866",
"matchCriteriaId": "E9FFB896-4C06-4428-97B3-AFFB943D60D7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54154",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-12-04T12:15:20.047",
"lastModified": "2024-12-04T12:15:20.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:51:35.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,12 +69,43 @@
"value": "CWE-23"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.51866",
"matchCriteriaId": "E9FFB896-4C06-4428-97B3-AFFB943D60D7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54155",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-12-04T12:15:20.190",
"lastModified": "2024-12-04T12:15:20.190",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-31T14:53:39.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,76 @@
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.51866",
"matchCriteriaId": "E9FFB896-4C06-4428-97B3-AFFB943D60D7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0929",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-31T14:15:34.130",
"lastModified": "2025-01-31T14:15:34.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in TeamCal Neo, version 3.8.2. This could allow an attacker to retrieve, update and delete all database information by injecting a malicious SQL statement via the \u2018abs\u2019 parameter in \u2018/teamcal/src/index.php\u2019."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0930",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-31T14:15:34.293",
"lastModified": "2025-01-31T14:15:34.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-Site Scripting (XSS) in TeamCal Neo, version 3.8.2. This allows an attacker to execute malicious JavaScript code, after injecting code via the \u2018abs\u2019 parameter in \u2018/teamcal/src/index.php\u2019."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,28 +2,111 @@
"id": "CVE-2025-24114",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:16.620",
"lastModified": "2025-01-27T22:15:16.620",
"vulnStatus": "Received",
"lastModified": "2025-01-31T14:51:05.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.3",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122070",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,28 +2,111 @@
"id": "CVE-2025-24116",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:16.803",
"lastModified": "2025-01-27T22:15:16.803",
"vulnStatus": "Received",
"lastModified": "2025-01-31T14:44:25.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de acceso con restricciones de la sandbox adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.3",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122070",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24117",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:16.900",
"lastModified": "2025-01-29T17:15:29.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-31T14:40:21.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,26 +81,95 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.4",
"matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0",
"versionEndExcluding": "18.3",
"matchCriteriaId": "AD29C5E9-9427-4C41-873F-C29493B892E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3",
"matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.3",
"matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122066",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122067",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122071",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122073",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,28 +2,111 @@
"id": "CVE-2025-24120",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.140",
"lastModified": "2025-01-27T22:15:17.140",
"vulnStatus": "Received",
"lastModified": "2025-01-31T14:42:41.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by improved management of object lifetimes. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An attacker may be able to cause unexpected app termination."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de la duraci\u00f3n de los objetos. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Un atacante podr\u00eda provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.3",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122070",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,44 +2,174 @@
"id": "CVE-2025-24127",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.703",
"lastModified": "2025-01-27T22:15:17.703",
"vulnStatus": "Received",
"lastModified": "2025-01-31T14:42:12.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de una aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.4",
"matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0",
"versionEndExcluding": "18.3",
"matchCriteriaId": "AD29C5E9-9427-4C41-873F-C29493B892E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.3",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3",
"matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122067",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122070",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122072",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122073",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,28 +2,115 @@
"id": "CVE-2025-24128",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.793",
"lastModified": "2025-01-27T22:15:17.793",
"vulnStatus": "Received",
"lastModified": "2025-01-31T14:41:42.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Visiting a malicious website may lead to address bar spoofing."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 agregando l\u00f3gica adicional. Este problema se solucion\u00f3 en macOS Sequoia 15.3, Safari 18.3, iOS 18.3 y iPadOS 18.3. Visitar un sitio web malicioso puede provocar la suplantaci\u00f3n de la barra de direcciones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "0384B3A1-9447-4020-A798-38CB2348F67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122074",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,36 +2,143 @@
"id": "CVE-2025-24129",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.887",
"lastModified": "2025-01-27T22:15:17.887",
"vulnStatus": "Received",
"lastModified": "2025-01-31T14:40:49.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected app termination."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos con comprobaciones mejoradas. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Un atacante remoto puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3",
"matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.3",
"matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122071",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122072",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122073",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24827",
"sourceIdentifier": "security@acronis.com",
"published": "2025-01-31T13:15:27.553",
"lastModified": "2025-01-31T13:15:27.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7841",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24828",
"sourceIdentifier": "security@acronis.com",
"published": "2025-01-31T13:15:27.727",
"lastModified": "2025-01-31T13:15:27.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7842",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24829",
"sourceIdentifier": "security@acronis.com",
"published": "2025-01-31T13:15:27.870",
"lastModified": "2025-01-31T13:15:27.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7839",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24830",
"sourceIdentifier": "security@acronis.com",
"published": "2025-01-31T13:15:28.000",
"lastModified": "2025-01-31T13:15:28.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7829",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24831",
"sourceIdentifier": "security@acronis.com",
"published": "2025-01-31T13:15:28.130",
"lastModified": "2025-01-31T13:15:28.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to unquoted search path vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-6153",
"source": "security@acronis.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-31T13:00:22.733490+00:00
2025-01-31T15:00:40.693004+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-31T12:15:29.460000+00:00
2025-01-31T14:53:39.930000+00:00
```
### Last Data Feed Release
@ -33,47 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279679
279686
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `7`
- [CVE-2024-12037](CVE-2024/CVE-2024-120xx/CVE-2024-12037.json) (`2025-01-31T11:15:08.517`)
- [CVE-2024-12267](CVE-2024/CVE-2024-122xx/CVE-2024-12267.json) (`2025-01-31T11:15:09.473`)
- [CVE-2024-12415](CVE-2024/CVE-2024-124xx/CVE-2024-12415.json) (`2025-01-31T11:15:09.657`)
- [CVE-2024-13662](CVE-2024/CVE-2024-136xx/CVE-2024-13662.json) (`2025-01-31T11:15:09.830`)
- [CVE-2024-57948](CVE-2024/CVE-2024-579xx/CVE-2024-57948.json) (`2025-01-31T12:15:27.070`)
- [CVE-2025-21665](CVE-2025/CVE-2025-216xx/CVE-2025-21665.json) (`2025-01-31T12:15:27.633`)
- [CVE-2025-21666](CVE-2025/CVE-2025-216xx/CVE-2025-21666.json) (`2025-01-31T12:15:27.763`)
- [CVE-2025-21667](CVE-2025/CVE-2025-216xx/CVE-2025-21667.json) (`2025-01-31T12:15:27.863`)
- [CVE-2025-21668](CVE-2025/CVE-2025-216xx/CVE-2025-21668.json) (`2025-01-31T12:15:27.960`)
- [CVE-2025-21669](CVE-2025/CVE-2025-216xx/CVE-2025-21669.json) (`2025-01-31T12:15:28.053`)
- [CVE-2025-21670](CVE-2025/CVE-2025-216xx/CVE-2025-21670.json) (`2025-01-31T12:15:28.160`)
- [CVE-2025-21671](CVE-2025/CVE-2025-216xx/CVE-2025-21671.json) (`2025-01-31T12:15:28.263`)
- [CVE-2025-21672](CVE-2025/CVE-2025-216xx/CVE-2025-21672.json) (`2025-01-31T12:15:28.360`)
- [CVE-2025-21673](CVE-2025/CVE-2025-216xx/CVE-2025-21673.json) (`2025-01-31T12:15:28.463`)
- [CVE-2025-21674](CVE-2025/CVE-2025-216xx/CVE-2025-21674.json) (`2025-01-31T12:15:28.560`)
- [CVE-2025-21675](CVE-2025/CVE-2025-216xx/CVE-2025-21675.json) (`2025-01-31T12:15:28.677`)
- [CVE-2025-21676](CVE-2025/CVE-2025-216xx/CVE-2025-21676.json) (`2025-01-31T12:15:28.780`)
- [CVE-2025-21677](CVE-2025/CVE-2025-216xx/CVE-2025-21677.json) (`2025-01-31T12:15:28.877`)
- [CVE-2025-21678](CVE-2025/CVE-2025-216xx/CVE-2025-21678.json) (`2025-01-31T12:15:28.970`)
- [CVE-2025-21679](CVE-2025/CVE-2025-216xx/CVE-2025-21679.json) (`2025-01-31T12:15:29.070`)
- [CVE-2025-21680](CVE-2025/CVE-2025-216xx/CVE-2025-21680.json) (`2025-01-31T12:15:29.160`)
- [CVE-2025-21681](CVE-2025/CVE-2025-216xx/CVE-2025-21681.json) (`2025-01-31T12:15:29.260`)
- [CVE-2025-21682](CVE-2025/CVE-2025-216xx/CVE-2025-21682.json) (`2025-01-31T12:15:29.363`)
- [CVE-2025-21683](CVE-2025/CVE-2025-216xx/CVE-2025-21683.json) (`2025-01-31T12:15:29.460`)
- [CVE-2025-0929](CVE-2025/CVE-2025-09xx/CVE-2025-0929.json) (`2025-01-31T14:15:34.130`)
- [CVE-2025-0930](CVE-2025/CVE-2025-09xx/CVE-2025-0930.json) (`2025-01-31T14:15:34.293`)
- [CVE-2025-24827](CVE-2025/CVE-2025-248xx/CVE-2025-24827.json) (`2025-01-31T13:15:27.553`)
- [CVE-2025-24828](CVE-2025/CVE-2025-248xx/CVE-2025-24828.json) (`2025-01-31T13:15:27.727`)
- [CVE-2025-24829](CVE-2025/CVE-2025-248xx/CVE-2025-24829.json) (`2025-01-31T13:15:27.870`)
- [CVE-2025-24830](CVE-2025/CVE-2025-248xx/CVE-2025-24830.json) (`2025-01-31T13:15:28.000`)
- [CVE-2025-24831](CVE-2025/CVE-2025-248xx/CVE-2025-24831.json) (`2025-01-31T13:15:28.130`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `55`
- [CVE-2024-1626](CVE-2024/CVE-2024-16xx/CVE-2024-1626.json) (`2025-01-31T11:15:10.037`)
- [CVE-2024-1741](CVE-2024/CVE-2024-17xx/CVE-2024-1741.json) (`2025-01-31T11:15:10.397`)
- [CVE-2024-4151](CVE-2024/CVE-2024-41xx/CVE-2024-4151.json) (`2025-01-31T11:15:10.620`)
- [CVE-2024-4154](CVE-2024/CVE-2024-41xx/CVE-2024-4154.json) (`2025-01-31T11:15:10.843`)
- [CVE-2023-31459](CVE-2023/CVE-2023-314xx/CVE-2023-31459.json) (`2025-01-31T14:15:32.890`)
- [CVE-2023-31460](CVE-2023/CVE-2023-314xx/CVE-2023-31460.json) (`2025-01-31T14:15:33.087`)
- [CVE-2023-31518](CVE-2023/CVE-2023-315xx/CVE-2023-31518.json) (`2025-01-31T14:15:33.290`)
- [CVE-2023-31595](CVE-2023/CVE-2023-315xx/CVE-2023-31595.json) (`2025-01-31T14:15:33.500`)
- [CVE-2023-31614](CVE-2023/CVE-2023-316xx/CVE-2023-31614.json) (`2025-01-31T14:15:33.710`)
- [CVE-2023-31615](CVE-2023/CVE-2023-316xx/CVE-2023-31615.json) (`2025-01-31T14:15:33.920`)
- [CVE-2023-39998](CVE-2023/CVE-2023-399xx/CVE-2023-39998.json) (`2025-01-31T14:22:08.727`)
- [CVE-2023-48677](CVE-2023/CVE-2023-486xx/CVE-2023-48677.json) (`2025-01-31T13:15:26.723`)
- [CVE-2024-1380](CVE-2024/CVE-2024-13xx/CVE-2024-1380.json) (`2025-01-31T13:26:51.163`)
- [CVE-2024-1668](CVE-2024/CVE-2024-16xx/CVE-2024-1668.json) (`2025-01-31T13:48:12.577`)
- [CVE-2024-25708](CVE-2024/CVE-2024-257xx/CVE-2024-25708.json) (`2025-01-31T13:27:06.877`)
- [CVE-2024-25709](CVE-2024/CVE-2024-257xx/CVE-2024-25709.json) (`2025-01-31T14:35:45.990`)
- [CVE-2024-5031](CVE-2024/CVE-2024-50xx/CVE-2024-5031.json) (`2025-01-31T14:18:23.003`)
- [CVE-2024-5165](CVE-2024/CVE-2024-51xx/CVE-2024-5165.json) (`2025-01-31T14:46:11.070`)
- [CVE-2024-52555](CVE-2024/CVE-2024-525xx/CVE-2024-52555.json) (`2025-01-31T14:37:51.653`)
- [CVE-2024-54153](CVE-2024/CVE-2024-541xx/CVE-2024-54153.json) (`2025-01-31T14:43:01.333`)
- [CVE-2024-54154](CVE-2024/CVE-2024-541xx/CVE-2024-54154.json) (`2025-01-31T14:51:35.733`)
- [CVE-2024-54155](CVE-2024/CVE-2024-541xx/CVE-2024-54155.json) (`2025-01-31T14:53:39.930`)
- [CVE-2025-24114](CVE-2025/CVE-2025-241xx/CVE-2025-24114.json) (`2025-01-31T14:51:05.633`)
- [CVE-2025-24116](CVE-2025/CVE-2025-241xx/CVE-2025-24116.json) (`2025-01-31T14:44:25.387`)
- [CVE-2025-24117](CVE-2025/CVE-2025-241xx/CVE-2025-24117.json) (`2025-01-31T14:40:21.463`)
- [CVE-2025-24120](CVE-2025/CVE-2025-241xx/CVE-2025-24120.json) (`2025-01-31T14:42:41.767`)
- [CVE-2025-24127](CVE-2025/CVE-2025-241xx/CVE-2025-24127.json) (`2025-01-31T14:42:12.703`)
- [CVE-2025-24128](CVE-2025/CVE-2025-241xx/CVE-2025-24128.json) (`2025-01-31T14:41:42.797`)
- [CVE-2025-24129](CVE-2025/CVE-2025-241xx/CVE-2025-24129.json) (`2025-01-31T14:40:49.027`)
## Download and Usage

View File

@ -210381,14 +210381,14 @@ CVE-2022-4534,0,0,10ac5e4e38bf0db79267e08c8540866daa17ecccba8c0df0aec808714bcf6f
CVE-2022-45343,0,0,03d2845968461eadd481aaf67d3d62e476c804d916077074d0449ed7db812563,2024-11-21T07:29:04.330000
CVE-2022-45347,0,0,9ea2605e2756adc54ce5b6127b9e49fb327820e63183ede1040be3a5aadfbd60,2024-11-21T07:29:04.487000
CVE-2022-45348,0,0,a37746ea18bd23fb385965a3f2fa66930a840a6647e3bd4ceababc8d9f5fd7e8,2024-11-21T07:29:04.610000
CVE-2022-45349,0,0,51a6b1ae15338cf5f0076cbc68f43087abbb6acfd68e0d37eaa885a16edbe1c3,2024-11-21T07:29:04.747000
CVE-2022-45349,0,1,6a3b0e21a6f0f955d474df1f278c2ee4e0b71e898487dfde7482affa0c49000d,2025-01-31T14:12:19.927000
CVE-2022-45350,0,0,f0554a4b0faf9f0d2f04513ab80292f3306b98228fe13d1b922b9fc83dadc371,2024-11-21T07:29:04.867000
CVE-2022-45351,0,0,28a8243aee94da6a29eb1c17c96fa93efc0f1aec597df9ae5b182e3b08161323,2024-11-21T07:29:05.063000
CVE-2022-45352,0,0,976a70e64dc71f5dd7cf6f1ba506b62259f67df9850b58dd728f64f02b274e2d,2024-11-21T07:29:05.190000
CVE-2022-45351,0,1,4dd7deb1f1afbc6de399a394f8805c88fcf63735c70677cbac007c7d23e46f3a,2025-01-31T14:27:22.100000
CVE-2022-45352,0,1,b6097e2e8a0b3478a2147c48bf62a50ffeebe6e733bc87e78975cff077c985d4,2025-01-31T14:25:34.883000
CVE-2022-45353,0,0,e3bead299d0ae59c8d23da6a08f270b3050e20710bf245fdf4bfc79467865341,2024-11-21T07:29:05.317000
CVE-2022-45354,0,0,f10b2c66235936fe82d58449fbabf8a0d29aa2f5469c5ca6a8be92742280fc8b,2024-11-21T07:29:05.453000
CVE-2022-45355,0,0,c3018cb8ec48ee8b3bc7e2941c5f4b269b902da7a34de71801c28185ee8b5a6a,2024-11-21T07:29:05.617000
CVE-2022-45356,0,0,b37a1451b5fa7ffabfdeb4ab700dd63bc1316543f89f45abbe0da64bfaee032e,2024-11-21T07:29:05.737000
CVE-2022-45356,0,1,03d63c3a60b22e29a351064c357d1e16de444f3339c5b9e5bbf06f5683c13d83,2025-01-31T14:23:40.960000
CVE-2022-45357,0,0,7d9d2dbb9eca8c7d55336eca93eeb7cd5447837b42de615f9d9587e1e482e2dd,2024-11-21T07:29:05.847000
CVE-2022-45358,0,0,112834b36b54552a6eb48a055278d38a408bd29acc5a2aa38258a45b2eeb17a6,2024-11-21T07:29:06.067000
CVE-2022-45359,0,0,b21737c38b498bdb223b476ecad40d71366eee10f34f1a35016c5565bf6d1494,2024-11-21T07:29:06.207000
@ -215977,14 +215977,14 @@ CVE-2023-21108,0,0,aa471174704ea3fdb9f8b2106a5be8827cbb290a00c1eb662144d17620a7e
CVE-2023-21109,0,0,604447f954e139f9191bf5e1289232fe508636391eea9bd91609d198c4db2690,2025-01-24T18:15:30.957000
CVE-2023-2111,0,0,6a9640260aa91563af780e2010a0c6c0acb0d185fdafa584ccb0db7edce84d06,2025-01-10T17:15:11.043000
CVE-2023-21110,0,0,0b4b736e103bdaa50e37209c44fa0a9e35d32b615b19ae7e57860a2003079c40,2025-01-24T18:15:31.133000
CVE-2023-21111,0,0,a9228ee60075f73227629f6cd77e27f676d0edb5135fe71db50c6e10f3d1393f,2024-11-21T07:42:11
CVE-2023-21111,0,1,f4e7d43e615f06e070b3253ad1ad49047614071e3ce2fdc84a0b7f03e6a45774,2025-01-31T14:15:27.333000
CVE-2023-21112,0,0,8f032a593c5483bc4f7b3834871ad08de86f2ddb01c05d63111f70ea9ef7db61,2025-01-24T17:15:10.117000
CVE-2023-21113,0,0,31e1212d8efecb910800eecacc301137f8379e91cd70784a0252f8c3d5ee2583,2024-12-17T16:58:29.983000
CVE-2023-21114,0,0,fa32db5c147ae6a7a528a1bc56976da826ae48513e9e13398dd1022162fdf60f,2024-12-17T16:55:34.213000
CVE-2023-21115,0,0,d7e4c2025519fe78f076fc7aa3fd4a605d2590b8acba5d765081b08ac5bbd196,2024-11-21T07:42:11.600000
CVE-2023-21116,0,0,f36d1d9895ca6fa6cf75804df5dd1e5e8731c79ef1371e6b2a54b5eb9ac49188,2025-01-24T17:15:10.293000
CVE-2023-21117,0,0,f0124ef076dc79a4e01262a8b1df4548fa0485e051c0d1617c6886216a48de33,2024-11-21T07:42:11.813000
CVE-2023-21118,0,0,71bb5efb77659c4025ee924a86e0b6dfd68c36cf41f64b4a9e78eb742b30f14c,2024-11-21T07:42:11.923000
CVE-2023-21117,0,1,cd6c44f567cdfd1c7cb6ca1718f1e5785755ff5e418bdb8c7c6a826b1c8a2e95,2025-01-31T14:15:28.037000
CVE-2023-21118,0,1,f90fee1c3a700d2d37df811edc9bd32b275e7e164c1e792cb7d99284a7c84064,2025-01-31T14:15:28.207000
CVE-2023-2112,0,0,ea9a0d098479ca4a7653e7953d9458eaeb6beaee2899a894eed45d07c80dc3a1,2024-11-21T07:57:57.813000
CVE-2023-21120,0,0,c2c2aaa2f6a5e2c8c1d0966aad23f562c60788b6a40219ba7187972deaeaec21,2024-11-21T07:42:12.023000
CVE-2023-21121,0,0,022b56c640272a767e8e9742390d468db874241dd7d27967433c8e37cb6a61ac,2024-12-18T19:15:09.290000
@ -217842,9 +217842,9 @@ CVE-2023-23300,0,0,ab9a8d5aa584b4143bf9047b1196fe0483a882346be932afaf3a1e2465d28
CVE-2023-23301,0,0,8143a28fe9f3a3357ce5c71ba22f54c3ab49828321a09d10c89c2fae1e227b3f,2024-11-21T07:45:58.113000
CVE-2023-23302,0,0,11a103ced102bb38cc67107adad674f68d1b7f7c42e468b287cceee716549568,2024-11-21T07:45:58.253000
CVE-2023-23303,0,0,9e844104efa5cb3441b1511a7b644adaea5e4f0aba8c36850a6762a9e45f174c,2024-11-21T07:45:58.397000
CVE-2023-23304,0,0,f5bd403f547297c7c37e296db45ec6bafa2c05b400b312cdcc053d98a8d2ef1e,2024-11-21T07:45:58.540000
CVE-2023-23305,0,0,76483b6c6e401a6e34a6fd1b40fd29669d8b2ab8a4305248fa938e7149d7a6f5,2024-11-21T07:45:58.683000
CVE-2023-23306,0,0,4c07f3fa9fa98066e916906e548c28374a0ca5ee70ba6016545db45feaf8d790,2024-11-21T07:45:58.820000
CVE-2023-23304,0,1,a05e299daf0bc4c5856f511bb40c36b26587f6169fbb6209dae939d3d89703b5,2025-01-31T14:15:28.383000
CVE-2023-23305,0,1,ff17ec9af4062b97397cee611c9685514d35dba9f51128bc58a054c71e77f188,2025-01-31T14:15:28.603000
CVE-2023-23306,0,1,014d2967b491cf39d3d136cce38fda47905e7e3919118ff4237b7c6c0104db7f,2025-01-31T14:15:28.793000
CVE-2023-2331,0,0,7350bf9c3fc1604ca4a1b4da0dbc3bce3b57a1f51947ccfab63c30c1d8075b0d,2024-11-21T07:58:24.147000
CVE-2023-23313,0,0,f8ec11bb48f2f9fb538d3943f3d45ed11223fcc4635f2314b87dd441f19816d9,2024-11-21T07:45:58.963000
CVE-2023-23314,0,0,c2a2dfdd71bcbe7884c465cfc2e67185e3890b73a95126224cb787a55733f2fa,2024-11-21T07:45:59.203000
@ -218058,7 +218058,7 @@ CVE-2023-23540,0,0,a4c765a478ea11981d2de2f93a1d4a9b6b0f919565ab91777d85f12de1263
CVE-2023-23541,0,0,41f7817056d602cfde39436ccd8d8d364aaba9c064864a8ef02cc2b69ad0a1ae,2025-01-29T16:15:37.917000
CVE-2023-23542,0,0,19906902a9abf6faf963708022276bc415635a7cd352bf61c2640c249f3877de,2025-01-29T16:15:38.107000
CVE-2023-23543,0,0,549b944b78e3af184a3bdddd45bdfa0d0f455a31fbc992c43d26b22a20a6610a,2025-01-29T16:15:38.270000
CVE-2023-23545,0,0,395a72dbd579a904febe20904b87f5ee489ccb3c5b1113f3a20b24726099a779,2024-11-21T07:46:23.433000
CVE-2023-23545,0,1,106313d6e9caf9080da229346a4f0c55b52e368d5e9492b19e1fc69490ff33eb,2025-01-31T14:15:28.990000
CVE-2023-23546,0,0,c7d3461413b8fbac3b8271b1b0739fb409ff42e18de813df51f912a9ce95f6db,2024-11-21T07:46:23.550000
CVE-2023-23547,0,0,f1c5d488082112b1dfa8fd371d997ed0cb4fc3f37113dc2fd7e8a783f9e22019,2024-11-21T07:46:23.680000
CVE-2023-23548,0,0,3bcab6bc704ca4407e32ee8528635468154a210f5213a669c69f0ee02b8fe115,2024-11-21T07:46:23.807000
@ -218070,7 +218070,7 @@ CVE-2023-23552,0,0,a58eaae02053549fd1cb717e43d94c5953ea0937dbd36a072ef7b28dca47a
CVE-2023-23553,0,0,41cded4a1482a0786080eab0481338f108027ab66f80124dfb6babb83584e00e,2024-11-21T07:46:24.490000
CVE-2023-23554,0,0,cdeeea6fa8a39bb19ef3ac9abcdae90c7ce3d8ab9b32c36d105840857787e9d4,2024-11-21T07:46:24.613000
CVE-2023-23555,0,0,e30d8f18c2d1a132d0df67f1b70fedf2fdf02ee2d11321d043b7f29747bdcc77,2024-11-21T07:46:24.737000
CVE-2023-23556,0,0,72a4ec30662336892f406fe3fe92e8ddb005953c8f34526f83ddbf04f86ddc5d,2024-11-21T07:46:24.870000
CVE-2023-23556,0,1,503b06a1aaa56659575f9dd82d5ace1280a0ef2eacc1b1c261cbb1016e608859,2025-01-31T14:15:29.200000
CVE-2023-23557,0,0,965eacda3f7071dc643df400155fecca58ae64b391e9f8b1c0621ee7e1d2c780,2025-01-21T22:15:09.520000
CVE-2023-23558,0,0,73d94d2e7e16051f49092358a50b5f985693a9d2a56b81f762a592fd090b2912,2024-11-21T07:46:25.087000
CVE-2023-23559,0,0,0d0a8639017e706f347745a4f800ad4602b44bfdc4e207515cbbb02acfae63cd,2024-11-21T07:46:25.230000
@ -219613,7 +219613,7 @@ CVE-2023-25437,0,0,579707dc4163779f73eb8be843597db5569b95fa17661e9431cfbfb44ee78
CVE-2023-25438,0,0,022c14738b52a710e105d77862022d9e37a8aaea203e4e7c47332be8ca22aeb9,2025-01-29T21:15:14.683000
CVE-2023-25439,0,0,e1897a22d54b32d4273530ebd6a2402cb5c3dd7527500f54f656d48ccc1162bf,2025-01-16T16:15:28.260000
CVE-2023-2544,0,0,3e6f71417b7fd5712bbf5830a9286997d01676002f94afef4a78fab56273abf0,2024-11-21T07:58:48.017000
CVE-2023-25440,0,0,84135d7551fc94f2345267f61ab4cb8f882a96388010887af4f4c75d28d91356,2024-11-21T07:49:31.093000
CVE-2023-25440,0,1,d06bd8a792814c0da5494b1744359a2dc70e5e76484f608fb79d512754711205,2025-01-31T14:15:29.387000
CVE-2023-25442,0,0,417405e3974ae7e8eaefe5cacf9231e32e7a2051ed7386007618cfaab05cae83,2024-11-21T07:49:31.227000
CVE-2023-25443,0,0,ff0611e6be20518fba769b93d52af97b8eb7468708917d65b19235e3a2aad938,2024-11-21T07:49:31.353000
CVE-2023-25444,0,0,cb37ac626f410eefd1de9cde593f52c77bde70039ba911df998b0777703619b5,2024-11-21T07:49:31.480000
@ -220099,7 +220099,7 @@ CVE-2023-25941,0,0,d73acf3fb4fbd94ad850ca5fb4c327c1e01f8ba3741d77352a3d4fd90e72e
CVE-2023-25942,0,0,3d48e398148d5b3adef05f5e4be42e818d6c9a84589e9162f7eff7fa2a8e6c69,2024-11-21T07:50:29.363000
CVE-2023-25944,0,0,948e27e8f66770e31a05861f685e1e5b73512d70d8917442b7088d1b1272d30e,2024-11-21T07:50:29.477000
CVE-2023-25945,0,0,03aceaaf9719fc5baa9feeb988fa961c1e85ddfe65791f5b7f16df6f35214c4b,2024-11-21T07:50:29.597000
CVE-2023-25946,0,0,94930cde711f23ac25ef8230524dd03df5745332b4ef1d5a2bf77ca5a4568c33,2024-11-21T07:50:29.723000
CVE-2023-25946,0,1,ceacba09b33213c3aaef95480ff1c8b82b01e9ac55180b3b9345605f810d7684,2025-01-31T14:15:29.607000
CVE-2023-25947,0,0,58b9238b3e410a48c247199d134cc462991077e1b32f3bd363d4f136681d1317,2024-11-21T07:50:29.843000
CVE-2023-25948,0,0,7dfd99d3f9eee6767d559cfb10833c10768ce388a02c45b73015ad744bceb343,2024-11-21T07:50:29.967000
CVE-2023-25949,0,0,4ed44103266cb7859bf57bdc797692ef26867b63498aa4a3621413e4079c7f59,2024-11-21T07:50:30.100000
@ -220913,8 +220913,8 @@ CVE-2023-27062,0,0,1f308f3ffbd86d90c8e821892d9ddd8d315f03e9e0867c83dde311bc0f2a2
CVE-2023-27063,0,0,74da4df8f33f0caa802007aa7235baaee68c1342174a91b93f62a47feda096a1,2024-11-21T07:52:15.007000
CVE-2023-27064,0,0,84dcabec60ecb51741ccb71be255c1eb38d7412ee2497e4430750bb66d90de6a,2024-11-21T07:52:15.150000
CVE-2023-27065,0,0,c864d7df0e01b8823f27778776948581c70924ef2f7cd7b3bd9435b90973bdc7,2024-11-21T07:52:15.303000
CVE-2023-27066,0,0,dca412f5520041c4370cf9bb62ea0c840781590f5f91b138c5bfcd9fa1e7e00f,2024-11-21T07:52:15.473000
CVE-2023-27067,0,0,f0cda4f6cb0fd1040b85f34c738af3f40a303de3d0c5182d614046237ebcb0f5,2024-11-21T07:52:15.643000
CVE-2023-27066,0,1,60df964c87154e4f6768c23006848a519d08e0f7d8710c749061d5e733ed1d31,2025-01-31T14:15:29.787000
CVE-2023-27067,0,1,f36270d0e6b8a42da033e1bd3bba8a027c28883ffb03b777722d4120ea30a2c6,2025-01-31T14:15:29.990000
CVE-2023-27068,0,0,e431ed6fb399fc4497dda9a53200e774963211d0ed3f66b4fe98479433e88230,2025-01-28T21:15:13.647000
CVE-2023-27069,0,0,49ac387c47e6c2c01b238e1e71d94da751da2a76c545730445adad06ce8d8dc0,2024-11-21T07:52:15.947000
CVE-2023-2707,0,0,962e941311c97157758bc3df446195a5bfb2263a2f9839390441282872836d76,2024-11-21T07:59:07.690000
@ -221168,7 +221168,7 @@ CVE-2023-27384,0,0,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0
CVE-2023-27385,0,0,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000
CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000
CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000
CVE-2023-27388,0,0,babade5ee72b4a62433a15e67cf1834c920450228e834f6e3e9898e20dbeffa8,2024-11-21T07:52:48.430000
CVE-2023-27388,0,1,9fc8dfb4b99fbf6c74ce01cae82bff4b1d4460ab8d43825ee021da82eeb2252c,2025-01-31T14:15:30.180000
CVE-2023-27389,0,0,7a9021d0b7ad2de0864e485d3405c52f414e6c7ff04a9300ff546d3206cb02c4,2024-11-21T07:52:48.573000
CVE-2023-2739,0,0,314e8f9f01604f1252e2c692e4adec3af9e77c11df72cefedab058a57e8cd1b3,2024-11-21T07:59:12.120000
CVE-2023-27390,0,0,ccab13211c867ddd6691a99893ec22b9d17c8b28d8bcf6e4c7c2d5e6e6c3a577,2024-11-21T07:52:48.740000
@ -221177,7 +221177,7 @@ CVE-2023-27392,0,0,0aa1704c2266c622e2a37cf4d35e4872f27b881a617eb1f4ce75d30bf0c82
CVE-2023-27394,0,0,d8ef7d5311db9668c64ea1cf9b5b4402c0ba1fb48f418040e96aed763f47e426,2024-11-21T07:52:49.157000
CVE-2023-27395,0,0,fce5752ad35b2d4f801635e0d4ca6c78092b2c44003871e82837df71b3161dd9,2024-11-21T07:52:49.277000
CVE-2023-27396,0,0,b53667b34fa555b760f98721a9c7a99d71fe60a165abf981d61285ae1c9e3941,2024-12-24T17:15:06.360000
CVE-2023-27397,0,0,2f22259a73d98aa65da071200ce60f7ce038fb29af29bfe59a5f13c693e3d30d,2024-11-21T07:52:49.913000
CVE-2023-27397,0,1,cbf0aa9c74eb9dd9da097ccfcb0a6c3f4d99d52875c3159752c38c287b8bc589,2025-01-31T14:15:30.370000
CVE-2023-27398,0,0,72104b93f4f30928f22739d21854548e6ff653a12291db21d09e2d03a00ca10a,2024-11-21T07:52:50.030000
CVE-2023-27399,0,0,8adbd08eb07c84bf15cd4c2035045c5d56013cfbb010855bff4e0e37a91a5b35,2024-11-21T07:52:50.140000
CVE-2023-2740,0,0,2f49889204884336457537554fa3bb9a0a42b21a9a3c1337d4d665a623d7e244,2024-11-21T07:59:12.250000
@ -221291,7 +221291,7 @@ CVE-2023-27502,0,0,62d304ee74e63cdee6da6c5707476476c54cd7e6e4e0378e60186632e4931
CVE-2023-27504,0,0,07e134aead6bc351d0095ded5af13d5c181df8071e08cc240dc20179a67a9084,2024-11-21T07:53:02.603000
CVE-2023-27505,0,0,e9414eedc226150fb0bc76b73ea09cad96b9cad41e53e5a14174bcec3a9716e3,2024-11-21T07:53:02.737000
CVE-2023-27506,0,0,c67ffbc0a2ef6d9e4c781ab5d0b1f865bcbb541bfbbb1a3e6167bba2babb0c19,2024-11-21T07:53:02.857000
CVE-2023-27507,0,0,d212027721cbcd9742fad26a49808d345c2144b49a36319d4ac08fd0d29b7cb7,2024-11-21T07:53:02.993000
CVE-2023-27507,0,1,8c195aa3bd934ce2c6a79e611b6ac22672a50068153711c59772f7d9e4809ff7,2025-01-31T14:15:30.557000
CVE-2023-27509,0,0,cfa719798081e3abb1671501052e27fd46f2e54b1f87245801600aadd7df048d,2024-11-21T07:53:03.743000
CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160b9,2024-12-12T01:20:40.913000
CVE-2023-27510,0,0,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000
@ -221305,7 +221305,7 @@ CVE-2023-27518,0,0,1336121000afba2fcd0427de2f2a33f12efa4a8111611d15a1ed835db5a53
CVE-2023-27519,0,0,717790a336c8f9e5a77a95e0bd0274d8d47193d1a8993a7207854ff0bd8ab7ac,2024-11-21T07:53:04.963000
CVE-2023-2752,0,0,6d790d550f8804fc5c5478d21ae5ee8d7bd1da5991dfa9817023711eac8596b0,2024-11-21T07:59:13.467000
CVE-2023-27520,0,0,02e59e854f52cc0e22ef031dee4680c0801338d4363502fce976ee67609b56fc,2024-11-21T07:53:05.093000
CVE-2023-27521,0,0,696866f9b1aac1863ae8349139d657f039152fb37a9e92d15737f77304887bc9,2024-11-21T07:53:05.317000
CVE-2023-27521,0,1,d0280668b2ed638e8d9575be3ed07dc6ecc1f654fb45c40d020a2f9c3b5a2217,2025-01-31T14:15:30.730000
CVE-2023-27522,0,0,eaca2140a62fba8df2b8f29dd1b998137ea30a24bd498ea413ad516222acffab,2024-11-21T07:53:05.440000
CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829c64,2024-11-21T07:53:05.643000
CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000
@ -221609,8 +221609,8 @@ CVE-2023-27917,0,0,e4a363a32ef8b88330f6c16266601884466bfd5aab7614c5da0c75aaed4c6
CVE-2023-27918,0,0,dcc8f902b8aa8fe1dfaa440bf695dbd03f595a68fdd64c883a2c739bd8a4c4da,2025-01-27T21:15:10.247000
CVE-2023-27919,0,0,f8b7a06ed27edf07766b664c05581c51d81df8e97c866dbb6ba7ca4bcd9fe9fc,2025-01-27T21:15:10.433000
CVE-2023-2792,0,0,fef13f732773d0e431073564ea7df3b9b2f07f8206a8b84cf0ecccbd55e32b26,2024-11-21T07:59:17.977000
CVE-2023-27920,0,0,9d81864437507c8b8a361728c9a02b9737429af055acb54d59da6c86619da664,2024-11-21T07:53:42.113000
CVE-2023-27921,0,0,0085c6f81f0b41ea4c17a31a5a9e61d59be8e76b29f5ff83e41d87884f7ef722,2024-11-21T07:53:42.243000
CVE-2023-27920,0,1,9d948f274953c7b1c290334de4cf27edae3349f09364b6d024669dcfb7b6c885,2025-01-31T14:15:30.920000
CVE-2023-27921,0,1,2d7a159ce4f89abf275410aa3206b09ac02e7869c6ae26e3945d22fe00bff5ea,2025-01-31T14:15:31.123000
CVE-2023-27922,0,0,ac0158270331d35cb0b6ab82df6120fd3e141fc0060add4828d4a13f54eea95f,2024-11-21T07:53:42.360000
CVE-2023-27923,0,0,dfc2af0be88940f681e2754002453c6d1a65077412d9597e5c65f3d7a904f33f,2025-01-17T19:15:26.870000
CVE-2023-27925,0,0,d2d5f164a571dc49cd31a6f0b6b6032d3bf875ef3eb1471e532be0eba1903b26,2025-01-17T19:15:27.060000
@ -222096,12 +222096,12 @@ CVE-2023-28405,0,0,eb07a7c8bb3f0a504569a93d84e1a79e2aba3c46584783ae4f7cb3c9a6d9a
CVE-2023-28406,0,0,551653fb8dc6910553ae3a28d97b601eb1c980f7dcbaa1b5e098debe28505262,2024-11-21T07:55:00.243000
CVE-2023-28407,0,0,199205300f4f0e14a26b03c1c8f7c07f60c835a3558153d1547344007813055e,2024-11-21T07:55:00.380000
CVE-2023-28408,0,0,62e24e047076cef91429bde7ba9f00808a813e368271a169e7e2ee6573bf088c,2025-01-17T19:15:28.050000
CVE-2023-28409,0,0,05ef2028d153b92b090be4ae3fc5be09764f1611b8ab1280c421e9eac3952df6,2024-11-21T07:55:00.603000
CVE-2023-28409,0,1,e9af78694604db735abcc7e4e1a04b9e3095f7bd78a0f01d6b3f6c372f30902e,2025-01-31T14:15:31.303000
CVE-2023-2841,0,0,65e0123fc1c15f5180846b067709d76a1cfee713e1fec37f8cb236ae2ab617ba,2024-11-21T07:59:23.790000
CVE-2023-28410,0,0,115b868a646d0d217870b219c7e1a1d30d699f9bf5975c779a55555499229b77,2024-11-21T07:55:00.717000
CVE-2023-28411,0,0,81d8cd6d0bdebc25f16f894dc45c0f0e9fa54b52409d26842b8ebb095467e513,2024-11-21T07:55:00.837000
CVE-2023-28412,0,0,018c981340f217bbbfc219bbec1d653c50b130d19003aaaf23a15f7a99344779,2024-11-21T07:55:00.973000
CVE-2023-28413,0,0,12778e00125ecb388ad0d1f211f0e2642299095042a0935910390dd6d28cde80,2024-11-21T07:55:01.097000
CVE-2023-28413,0,1,66ad27d7fd45c4a35b3ee9dc2a531f3be5397dd19755bf9797874e85cf997d38,2025-01-31T14:15:31.500000
CVE-2023-28414,0,0,ed9c50cf06565fea502217062c9d86be98d2f031807699129c5bf2f7c6deaf20,2024-11-21T07:55:01.200000
CVE-2023-28415,0,0,4c61ab93510113184adce7b77d42b578f16ed36c5e8c43366f7b4f538a953949,2024-11-21T07:55:01.313000
CVE-2023-28416,0,0,ff655693dbef5eb095646cd57eb38d86f25582491691748d3e6441dd3ee75d71,2024-12-09T13:15:25.837000
@ -223198,10 +223198,10 @@ CVE-2023-29623,0,0,bf2b7995c402b6ef4f33e1ea33e435b83abb4e1e818b11d853ef96c0b5bf6
CVE-2023-29625,0,0,c1960a78d04e7f16c0bca3b50471618fcb40cab6f439d20aad2836995d98426e,2024-11-21T07:57:20.580000
CVE-2023-29626,0,0,216f70963b217572c3997c14bce23d984a25d0ddc98ce383f774ec1aaab76d91,2024-11-21T07:57:20.713000
CVE-2023-29627,0,0,312b5a2161fc9dda14dd5988ffb3430258c7de21e2aab81f4a474190069ee63d,2024-11-21T07:57:20.837000
CVE-2023-29629,0,0,b02a28fe2dd06005d8e06b91cf12cd20311cc92df5a97c8e9862ac8fd7ca7e0e,2024-11-21T07:57:20.987000
CVE-2023-29629,0,1,9da67d975338429a6b4918a4493ac34e38f18ed5b4723f692d4a1950680f3a23,2025-01-31T14:15:31.707000
CVE-2023-2963,0,0,266977fd81eb76df86a94950c6ce356b1acc14c89419381d9fbf9984f3e043e0,2024-11-21T07:59:39.490000
CVE-2023-29630,0,0,bd5103b8d6affd7b6057d96cf1d3822608702bfbeefb4449d0fd0a250622538f,2024-11-21T07:57:21.130000
CVE-2023-29631,0,0,2659b771eea3055fcdb233fec3da0f347d37f8b93ed35de7b55a432987ffddaf,2024-11-21T07:57:21.267000
CVE-2023-29630,0,1,7bda7821b22d069bf3df4288566a356ed5914ca30056e53e92f19aefec387472,2025-01-31T14:15:31.920000
CVE-2023-29631,0,1,c912bd6568f1f58c3e7ba5a622458eb5fdf341f26728218ddf472a804f3b908e,2025-01-31T14:15:32.093000
CVE-2023-29632,0,0,a819f7ba82dd60316f6011478658c8d2f82534d1215aecfaacb0b5334d3105fa,2025-01-08T16:15:28.220000
CVE-2023-29635,0,0,7b7e122f0d8c9b413f472665250e3516b44a5ecfd295ecf840be5aaed663e1db,2025-01-30T17:15:14.053000
CVE-2023-29636,0,0,4b9a9a6e898f80609b34c7e02aaa5b4343653cad5f96db32b805d904ca44b12f,2025-01-30T17:15:14.333000
@ -223257,7 +223257,7 @@ CVE-2023-29741,0,0,da8cd93821fcd7f31be831168ed236b6c1bec0b3a6ff5670ef55dbf51bdd8
CVE-2023-29742,0,0,294528a5fa84fbde00943edcf289b39883c14e536f9cd2c171a7bcc57f88054f,2025-01-14T17:15:11.017000
CVE-2023-29743,0,0,fe49ba136bbdeffcb69460027f9568da7b00a21cac299a3fbec238c4c61241bc,2025-01-13T20:15:25.387000
CVE-2023-29745,0,0,c542af407c0b2a537989cfcde55db8adff6b748cb69e035f86394be8cd6af792,2025-01-13T20:15:26.130000
CVE-2023-29746,0,0,133c031c39348c96f95d9e43b02a0f81b2e172f555bea6970e402c248a23e4a6,2024-11-21T07:57:28.020000
CVE-2023-29746,0,1,c4c009910060ce25a1239315d99c2c6f87ec6ea0043feba5bc6abbbbe48b93b9,2025-01-31T14:15:32.257000
CVE-2023-29747,0,0,88c4138c3c6db30341461853ba2d3a74af8d00bd54721efb094fd003d9030bfb,2025-01-09T22:15:27.130000
CVE-2023-29748,0,0,3bb616611a42918b2d8d55bbdc2fe5b94fea76d10f8313180c5224af166ba7e2,2025-01-09T18:15:25.667000
CVE-2023-29749,0,0,bee435745394068e96f0cb8168118acb0d5340cb0881d4dd204dc44457c341ca,2025-01-06T18:15:13.163000
@ -224471,11 +224471,11 @@ CVE-2023-31453,0,0,c0a15f5981026664dda8df3607ae04677c95f400d3ba55dae989b78937847
CVE-2023-31454,0,0,5558c4d8374596c4a3ddc94d7925e332d24f25e970b453c9685e50eba392a7ea,2024-11-21T08:01:53.933000
CVE-2023-31455,0,0,43a6cd2ee943ebe980b5604e85dfa2c0405a2de50e45db7d0411bed512752dbd,2024-11-21T08:01:54.110000
CVE-2023-31456,0,0,892307a3b7639df38c20750833e789e54a7f2f4bbee234336f7c493f0c0940de,2024-11-21T08:01:54.257000
CVE-2023-31457,0,0,2b251c880336c6093faf9909dba8c58fdae16e92dc2272b6eb6205de262dc5db,2024-11-21T08:01:54.470000
CVE-2023-31458,0,0,dfc535bb718206d398073185d2b975dd7533a72634a7fb2f8807860d1b14ea19,2024-11-21T08:01:54.617000
CVE-2023-31459,0,0,35434c2ae11f2c2b799d4afa374588220bf9cc1ce4de0437083f2021568f49c5,2024-11-21T08:01:54.753000
CVE-2023-31457,0,1,14019b67767311576904367a9a09a12ba912fd39be81b53a2e8e90c5016f0021,2025-01-31T14:15:32.490000
CVE-2023-31458,0,1,9a4bc419e6f5589fc2653b2a6511a554aeb930ddd46b628e771b89b62a839c7f,2025-01-31T14:15:32.707000
CVE-2023-31459,0,1,56722a72067aa7e0e5049522abc5ab3aefe0b87f6214968439cd5ea775f32124,2025-01-31T14:15:32.890000
CVE-2023-3146,0,0,a92412cd988aa6ff0bc3b0898c63e001cf6fb14dd9ed650fbe1c4739e2be77ad,2024-11-21T08:16:33.593000
CVE-2023-31460,0,0,b6ded9aaa9b5343f632144cbc08802f39e8476208924783a191b1d187731e234,2024-11-21T08:01:54.890000
CVE-2023-31460,0,1,399f5194158468eea7684d6c87f39de09e9b06a69db2ecb2f5dd7a188aee61eb,2025-01-31T14:15:33.087000
CVE-2023-31461,0,0,76df74b6505af362ebc51bb5a9e2770dbaa3a2fe4e8cafa6fac973092b0d9382,2024-11-21T08:01:55.023000
CVE-2023-31462,0,0,14f80d56a444f41364bc20af86bdcdd07269a9e998effdebd639b3f353b9419a,2024-11-21T08:01:55.170000
CVE-2023-31465,0,0,71fe12fdfc0d0c937345c630b551c2368788e8aae322c6ff59cd75655d39e8c8,2024-11-21T08:01:55.330000
@ -224512,7 +224512,7 @@ CVE-2023-31506,0,0,b69783c256e9b2fe4d3fd0bc3adaf237cfca0b69092218bcd86c0a612bc7a
CVE-2023-31508,0,0,383f087cc1c90d8f094ea0cb33f3780c04e928cedb43e11082afe0e7450127cb,2023-11-07T04:14:20.410000
CVE-2023-3151,0,0,ec3a941d8fbbf001a7ac2ad14d4443a7e83b4134046b1c2fcc557d2dee9ee35e,2024-11-21T08:16:34.370000
CVE-2023-31517,0,0,1d8d4dc687680917486b8f83f7d514574a637d13656773f6e6ed3f56dbf3dade,2024-11-21T08:01:59.810000
CVE-2023-31518,0,0,ed080de9ed280cf8671dee882339f98414ba288254d444d891e460bac10d9372,2024-11-21T08:01:59.950000
CVE-2023-31518,0,1,6c5df094f55220c6e5736afa5fa7490334ace814ec6c9e37f8976d1638abd3bf,2025-01-31T14:15:33.290000
CVE-2023-31519,0,0,c7c3e2dd6ac487f6491ccfb052103ea5ca9da1ab6078826fb082db918527b824,2025-01-23T18:15:27.823000
CVE-2023-3152,0,0,76258561f7bdc822eccdbeeafbc62142c30393010515b59bd36d13db3dfea256,2024-11-21T08:16:34.520000
CVE-2023-31528,0,0,5e0ac407c171e6d79543330153807b12dd0b8b88f1a16b3ec03f9b6d19f8fb2b,2025-01-27T17:15:13.867000
@ -224546,7 +224546,7 @@ CVE-2023-31584,0,0,155b0a30f3f11e374bef299243e3e412dc9503a1a14d09c73b4f154638003
CVE-2023-31587,0,0,eab98a15477b46dffea0ff6b9fd4ecc54241f32fc558dbe6e5a09776dece0b71,2025-01-27T21:15:10.623000
CVE-2023-3159,0,0,9807e6d823aeb3a21864e69407a3985c2540754f15da81cf40cfb1f6730d0a44,2024-11-21T08:16:35.373000
CVE-2023-31594,0,0,2ce3e386965dea1f61dddc297872812c537c7c3578bf01ba97d20e1959ccf4a0,2025-01-16T15:15:10.397000
CVE-2023-31595,0,0,2026436fcd8bf62d8ba7fed6d43e84eb30b5d83d2404d7bba01566f62966490b,2024-11-21T08:02:03.823000
CVE-2023-31595,0,1,7ea34e3059111652044f34064a0cfc823995c2f493d616b500da925eb89d89dc,2025-01-31T14:15:33.500000
CVE-2023-31597,0,0,1f8bdd9d0a309d5ec76ed85b4521636202eecaa199c66cd085c2481943451f84,2025-01-22T15:15:08.770000
CVE-2023-3160,0,0,3706adbaff758c87939153381553b204ed7dad56f061b584bcec323680f304d6,2024-11-21T08:16:35.520000
CVE-2023-31606,0,0,566928f240e95aed16a3c3742b1ad454864df53f0c03b37939832a70716ca961,2024-11-21T08:02:04.130000
@ -224558,8 +224558,8 @@ CVE-2023-31610,0,0,4635c8d6131c4b4c122038805363b2d666290afd290352c3b42f3a755aa19
CVE-2023-31611,0,0,7d49566bf2b65a83f8da17cf49d5899b27094e60dd447a97224d6c0c8c7656f7,2025-01-23T17:15:11.503000
CVE-2023-31612,0,0,776f8b729d141f0dbbf1994fdb1bf5856b52d64ad6cf8da4800ef2964c166227,2025-01-23T17:15:11.660000
CVE-2023-31613,0,0,dc3bc24966fcb2f8b19ed3778b36b32d0e22aaaacc0ef0b444c0a986eb49f75d,2025-01-23T17:15:11.843000
CVE-2023-31614,0,0,cac7870b524a6213f4456b450f01d98b860768ae9c8129fe5dc1d12e5b99ad73,2024-11-21T08:02:05.280000
CVE-2023-31615,0,0,febe50b4026c3ea138f24df1a3698d981043d9580285e2632bfa571eb671d727,2024-11-21T08:02:05.430000
CVE-2023-31614,0,1,a2457435244a6c66dc724015f53a9d94fead75bcac97c4e861da1779fc556bfe,2025-01-31T14:15:33.710000
CVE-2023-31615,0,1,a06fb201d5f59c9a412437c57a0a257d5f1fef9c4ec3468e2e423346d524c1c7,2025-01-31T14:15:33.920000
CVE-2023-31616,0,0,ca90d2794d3bc5f0fa73e79c853d40712773f874d9a3d547424a158b18c588a3,2025-01-23T20:15:28.237000
CVE-2023-31617,0,0,5bf96898d5156077c55068ebeba29f15ccd9f29832abf7f06adbac536987a4f9,2025-01-24T17:15:13.593000
CVE-2023-31618,0,0,161cd99f3e19d37b29ee4734c9a141582307f130ef057994e00b167062cc61f5,2025-01-24T17:15:13.817000
@ -231069,7 +231069,7 @@ CVE-2023-39994,0,0,87a029e29660aeb8f1b2be7e27e623b955ac0289fc3112ecce957361865e0
CVE-2023-39995,0,0,fdf718e8170352e73d81bc89750099463548f40b6d848c31e93139491cdf59de,2024-12-13T15:15:20.463000
CVE-2023-39996,0,0,71428c1f3fd5b060dcf82814bdd5e8525657311120b2e5984c8f3d370d4d382c,2024-12-13T15:15:20.607000
CVE-2023-39997,0,0,aa06a653665769d5e8129c0b7a18b14cfb9beea457ce915a4168aed4b4b27fe5,2024-12-13T15:15:20.737000
CVE-2023-39998,0,0,01a4481ccbc66f0e9564b9841221034405e12fa5b97784310ec6de7d357d03ab,2024-11-21T08:16:12.323000
CVE-2023-39998,0,1,fd68a8e02068d57036d2baca19291ec770398514abae2edb537954ee2c2a2183,2025-01-31T14:22:08.727000
CVE-2023-39999,0,0,82b82212a0025fead4708054dd0afb247ed047894644e263dcde31faebf34331,2024-11-21T08:16:12.447000
CVE-2023-4000,0,0,39f91b713d4713b662aa8e3a2c23ad21a9a5b27c7f23cc18f70c42a560e4fe8b,2024-11-21T08:34:11.757000
CVE-2023-40000,0,0,d3e4ddf6a7e46064a403e9603b9905d91e7fb5ab64821a503e2d034743ef9ade,2024-11-21T08:18:30.070000
@ -237500,7 +237500,7 @@ CVE-2023-48670,0,0,6f4cc5b5de5229c8bb05013d5edbac14ec0a884ab45e4cc6bc7bd50449d79
CVE-2023-48671,0,0,2f437585f3a00482df05947e0c48edd8a2c5aebf95af07e2736401eec5b7b38d,2024-11-21T08:32:14.137000
CVE-2023-48674,0,0,0b09475b70ea443f842aea8510b1f9b08b2b614a57130009157700e65422f67a,2024-11-21T08:32:14.280000
CVE-2023-48676,0,0,9c5d3a9ffc5aaeea1307334c05fa3be3a7f2bf98a32a0f0fb54e55e33367bfb5,2024-11-21T08:32:14.397000
CVE-2023-48677,0,0,9e17c22e8ab04e388e5a00c2e3d71bd63a8ff7130dbb626efa03a8523fb31314,2024-11-21T08:32:14.527000
CVE-2023-48677,0,1,8c94b6fd1378f6ef9e0d14ce5838a0b9850dc4fa408cb8d9b5b871944590c0d8,2025-01-31T13:15:26.723000
CVE-2023-48678,0,0,49f57621b3d2c07703231e51a3b46f56c8901d3f230d45d8218734c882985ce4,2024-11-21T08:32:14.673000
CVE-2023-48679,0,0,e04f44a6e579062f82cd46f310b468dd09012a87e78c22f821b6fc11034d077d,2024-11-21T08:32:14.800000
CVE-2023-4868,0,0,c2acac2bf88db4693840f7ab4da28a4cd2078c2be67ff810e629e855f632a880,2024-11-21T08:36:09.060000
@ -245175,7 +245175,7 @@ CVE-2024-12031,0,0,d30b745c703c186af9776c88e8d0d222bab220bbc78efc5ddb772b6e524ac
CVE-2024-12032,0,0,d28549d87ab7a1da8c8e60b219695b8c0bac78074e1f07aa186ddc87bdbbdb60,2024-12-25T04:15:05.497000
CVE-2024-12033,0,0,5cda97496640b0b6aed202f7b1c5b5c1b99afbb11db7e6b9c1179f2506c52c5c,2025-01-22T17:16:45.530000
CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4e3e,2024-12-24T06:15:32.553000
CVE-2024-12037,1,1,555d7dd12e66a0d13f5e4a7a1c20cbb2a135c4dc6d0e90ff76b843d01e574bd7,2025-01-31T11:15:08.517000
CVE-2024-12037,0,0,555d7dd12e66a0d13f5e4a7a1c20cbb2a135c4dc6d0e90ff76b843d01e574bd7,2025-01-31T11:15:08.517000
CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000
CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000
CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000
@ -245364,7 +245364,7 @@ CVE-2024-12263,0,0,183574df079ffbee27d57051711c108d812463b16a94004cdf52784fa08d4
CVE-2024-12264,0,0,e129c73367ffc6e13d3dd51e083cadc63c28a6ddf76a9744461af75a10c38dd6,2025-01-07T05:15:17.047000
CVE-2024-12265,0,0,4ecaf6258b9c646985803002f662a35d37ddc850eb892429f8568423d5e8ff62,2024-12-12T06:15:24.143000
CVE-2024-12266,0,0,909ac121710013990590ae1f8a6d6364fd581e2e3e734e8055f1296c676eb281,2024-12-24T05:15:06.433000
CVE-2024-12267,1,1,4fe2f2840e91890fcea2957b7d9dd61fe19a354e4ba5966000f52400ebb2c936,2025-01-31T11:15:09.473000
CVE-2024-12267,0,0,4fe2f2840e91890fcea2957b7d9dd61fe19a354e4ba5966000f52400ebb2c936,2025-01-31T11:15:09.473000
CVE-2024-12268,0,0,57b1dbc34c4fad3378e18637f11a9af5fae95800fe2a5a30ffdcb7012568a613,2024-12-24T11:15:07.623000
CVE-2024-12269,0,0,3dacabee7f0840c8bb97b1b0f83aa1d1097c1a4d6e6d5a87c2ba0c49bbf47e5d,2025-01-30T14:15:31.857000
CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000
@ -245486,7 +245486,7 @@ CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430
CVE-2024-12412,0,0,73803094a00fe18ec7862bec4f3d5df80208f9d752aff4dcb1f7ac4bf52a33cb,2025-01-11T08:15:25.320000
CVE-2024-12413,0,0,fdd057a05387c9ace72d4ba4316c6065bf29813d0f1c7f4a169e0a5a81de204b,2024-12-25T04:15:06.607000
CVE-2024-12414,0,0,ecf25a2c3f536085b4d44f95471b078e2b7cb6ad454e7c12c9e7d103ff4fa2bb,2024-12-13T09:15:08.070000
CVE-2024-12415,1,1,d86c5c990a5451fe8e0e28fba4dce983fa5ad54561bcf19228f5c29c3e5e0715,2025-01-31T11:15:09.657000
CVE-2024-12415,0,0,d86c5c990a5451fe8e0e28fba4dce983fa5ad54561bcf19228f5c29c3e5e0715,2025-01-31T11:15:09.657000
CVE-2024-12416,0,0,133a91588ad725ea1676e171a1de9f146794e8ea11542e637f25e6fdb4eea6e8,2025-01-07T04:15:08.143000
CVE-2024-12417,0,0,bd175c91ae947c344e10a61ee40da01cd87015ebf65316b1689d31a703a65c78,2024-12-13T09:15:08.353000
CVE-2024-12419,0,0,7f21353d0e082b12ae89c9faf26ba33e60d1cfa14523601ab098bdfff89a786a,2025-01-07T04:15:08.337000
@ -246361,7 +246361,7 @@ CVE-2024-13652,0,0,fe24ee8610e9ff652bc87b947e016c0eff2007c8f9f9d6eca3a867bb541f4
CVE-2024-13659,0,0,2ab949cac371b153f030d675a94a51cc0bb444218e14414679e2bc62713fba54,2025-01-24T06:15:26.557000
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
CVE-2024-13661,0,0,a45266cda63aebd8d8843fbb6b7a71ae38505222510e18ba03648c96ddb771a8,2025-01-30T14:15:35.233000
CVE-2024-13662,1,1,c49b788a9913632f24ba7a49f0ac22c8d93d1bb72edff40d229a016b258d058e,2025-01-31T11:15:09.830000
CVE-2024-13662,0,0,c49b788a9913632f24ba7a49f0ac22c8d93d1bb72edff40d229a016b258d058e,2025-01-31T11:15:09.830000
CVE-2024-13664,0,0,1eb9745d2330cb71866e989696204f297a40dcfb7ab8eb64b8a0bd3e1386b8c3,2025-01-30T14:15:35.390000
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-13670,0,0,736bf589d2a58d3a8565630672ac5a05df76c82710b1026bd5ab4ad798894ce9,2025-01-30T14:15:35.550000
@ -246396,7 +246396,7 @@ CVE-2024-13767,0,0,637f964cc18d2f02c2957e6987a03c02d6a99ae90fe95c08f63815c95a4ae
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
CVE-2024-1380,0,0,5e58429e812779e5b01ebfe83f389083ec54823fd1aa2e429e923f21c4d1de2d,2024-11-21T08:50:27.317000
CVE-2024-1380,0,1,32754257dbe0d08bc78fbf9b54e12b7a4d3239b3c88ea55da38aca571da65692,2025-01-31T13:26:51.163000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
CVE-2024-1382,0,0,065d5a502095560d09e225f241029e6e7787474027d13ed90041c25b81cd3dbf,2025-01-21T17:04:33.737000
@ -246621,7 +246621,7 @@ CVE-2024-1622,0,0,641704d79708c5027cc525cdcdef74d012d3f37e9becbffc2cb36bf8a804f9
CVE-2024-1623,0,0,11acc09d0781037d56051debbc6de791211a8b87ba326c3093f5bc85aad229af,2025-01-23T18:10:39.310000
CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000
CVE-2024-1625,0,0,36cda0a7b3481cf41435ed5b0227a3fcad5024561ee555ea020abf68435e7cfb,2025-01-30T13:15:09.420000
CVE-2024-1626,0,1,6a34033fff49465ea11ce0b8c18846bf6d5e9b2f1145addeedecba4b2ea1cd93,2025-01-31T11:15:10.037000
CVE-2024-1626,0,0,6a34033fff49465ea11ce0b8c18846bf6d5e9b2f1145addeedecba4b2ea1cd93,2025-01-31T11:15:10.037000
CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fbda,2024-11-21T08:50:57.333000
CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000
CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000
@ -246660,7 +246660,7 @@ CVE-2024-1662,0,0,147b493f649bc748f75384551192827ffc56f17812a25b829b7ebf0a1ed43a
CVE-2024-1664,0,0,fc796a5cda9ab945ac2e01ad0d3d81c8417c6e40e09dc13c67abc31672246faf,2024-11-21T08:51:02.093000
CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000
CVE-2024-1666,0,0,0da5ef87cd368b0872991f1fa468b53ecfc325b14531868e2cd66d4ef2d9951e,2025-01-10T14:34:01.473000
CVE-2024-1668,0,0,c554786f14197afea48fe5d32ecff02cb5a486b44d4745ad9f0f7814f93d7c93,2024-11-21T08:51:02.413000
CVE-2024-1668,0,1,d0cbb8893e43799bf0498d231349678d5a1a4f5501696896ca3ef710166f911f,2025-01-31T13:48:12.577000
CVE-2024-1669,0,0,67b8eec966ddacedd4e70201d9e33c690767f007ef44b6e221a074947960a93a,2024-12-19T17:32:13.720000
CVE-2024-1670,0,0,e643325c520a7a851aaa6d5c5034d3498bbfacaad698e63e558de9d2308fc412,2024-12-19T17:33:44.580000
CVE-2024-1671,0,0,6fd857ed8e49d57c866ab67a431487c43ed38119f3b000302a23833074e59abd,2024-12-06T14:28:01.590000
@ -246731,7 +246731,7 @@ CVE-2024-1737,0,0,593418afa5de4602eb69dd941b0e02c901b4d4739e447e76ddfa6cfa85dbab
CVE-2024-1738,0,0,f780707e5e3eb6bbfad32e3b36dde215a430d1659d4f0c7523a3d6b02b4d6779,2025-01-10T14:35:21.370000
CVE-2024-1739,0,0,8995e9874fb16405155b50a06edf1894c83d5f5c9bffbfd0a7dc87a3d52987fc,2024-11-21T08:51:12.100000
CVE-2024-1740,0,0,fdf35329d7e6282f8cd0bf5fff4badc7e73faa74613bd17a2ce0aea294cf76e3,2025-01-10T14:21:52.317000
CVE-2024-1741,0,1,d9b4a2d88099ffdc9a064bf1352aa0bb3b6e67d21da15c446eb8f21f247cbbcc,2025-01-31T11:15:10.397000
CVE-2024-1741,0,0,d9b4a2d88099ffdc9a064bf1352aa0bb3b6e67d21da15c446eb8f21f247cbbcc,2025-01-31T11:15:10.397000
CVE-2024-1742,0,0,542c2c34f16f6008fa22df8f55e52bcadfd55af05e5a0a313be70cc620f28193,2024-12-04T16:50:05.197000
CVE-2024-1743,0,0,bfffd3e6d4c6d98b5de5cbd7060f38603701b2f85ddbd4f81f5c93adc8294983,2024-11-21T08:51:12.680000
CVE-2024-1744,0,0,e57e89c1c38c1b4f16fac07cd4c094af44c29de3b59f0a0effddbbf171558f72,2024-09-13T20:30:09.373000
@ -251399,8 +251399,8 @@ CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64
CVE-2024-25705,0,0,9a2e1e8760ef10c25bc8bdd61bcca108ac124e06272934d80d0a1be5be3ebc2e,2025-01-30T16:21:48.907000
CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000
CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000
CVE-2024-25708,0,0,a2958d3769e146c03c05682b4b008d9ff8709a1d2a61e12cc9267215854777c9,2025-01-23T18:27:58.827000
CVE-2024-25709,0,0,1caf189688863a19d13310c016372e976d3e3a6ca37059cd900da4213fb3c1fd,2025-01-23T16:17:02.767000
CVE-2024-25708,0,1,c169d9f12e5c83634b5ad6fd76892e5d4c412c0f5e491ade778100b826ccc3a8,2025-01-31T13:27:06.877000
CVE-2024-25709,0,1,e4b0ec44272d6a266af0f61140023cf74e93b905fc1b38dc4d3a6cfeb46aa3ed,2025-01-31T14:35:45.990000
CVE-2024-2571,0,0,b29b266277adb21ced6590b6766850aaf4a1b8696efe1124ac983a0d3d7a3e6f,2024-11-21T09:10:02.260000
CVE-2024-25710,0,0,14c488f94704110bccb0ebc194fb3de52b81c1368723fbc1d3df69c3748109e4,2024-11-21T09:01:15.113000
CVE-2024-25711,0,0,6b07db62ade2bc0114f28a2e5cc5709d9d183c15244fc22f9067859e0e6f014d,2024-11-21T09:01:15.250000
@ -263388,7 +263388,7 @@ CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84
CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000
CVE-2024-41492,0,0,d4569622d2ded7aa848fdcf6b8717deae380d497519daf4660cbe4b6bde4ae2b,2024-11-21T09:32:43.510000
CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000
CVE-2024-4151,0,1,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000
CVE-2024-4151,0,0,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000
CVE-2024-41511,0,0,bb04702719f78dbe27bfde7789933fae7dea1190d0ea2966cfe5a76ebec1292b,2024-10-07T19:37:09.727000
CVE-2024-41512,0,0,8ed9894a2356fc8a5e33ac367f8ff5afc2f0f1518d8c76c3254841044c9619e7,2024-10-07T19:37:09.920000
CVE-2024-41513,0,0,f407b983e55d5d0baada892820380826649691acec248a40ab1d73cdbfc4717d,2024-10-07T19:37:10.700000
@ -263400,7 +263400,7 @@ CVE-2024-41518,0,0,1ed7f15d8888711cfc8dfa60685f79422941af7f636f475ed56a27dec5bcb
CVE-2024-41519,0,0,c197bf43e86578e11d62635cdf40f99a7f891ca24b9bc97ad62c816f7aa038fa,2024-10-29T21:35:12.703000
CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1ec,2024-06-07T17:15:51.580000
CVE-2024-4153,0,0,3fae78b221751422ac040502ea12520d7ce5149857852489782ffbd186ca2e2d,2024-06-07T17:15:51.640000
CVE-2024-4154,0,1,2e90f40f16be1871952799d2f5b1c96bc22aa8ff6140b8fefddc88a07596b767,2025-01-31T11:15:10.843000
CVE-2024-4154,0,0,2e90f40f16be1871952799d2f5b1c96bc22aa8ff6140b8fefddc88a07596b767,2025-01-31T11:15:10.843000
CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a867,2024-06-11T10:15:13.260000
CVE-2024-41550,0,0,f550993cd5b5dc9cc85253f185c4436ed9356e5f718dbcaa508d382b497c985f,2024-11-21T09:32:45.557000
CVE-2024-41551,0,0,e1d018116726b59a859c54c726d033d68adc85dd274a77d026bca8345fe434d1,2024-11-21T09:32:45.760000
@ -269825,7 +269825,7 @@ CVE-2024-50304,0,0,ab4ac6c83c5fcd0daa3f28b1fef9d12686959148cc70f8acad5f569d84c52
CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000
CVE-2024-50306,0,0,36f7f15ac3ae08b343967b7d5c928ca662bb204683930d546d92959a7101fb2c,2024-11-15T13:58:08.913000
CVE-2024-50307,0,0,effd6ec5b86bf22e86b034cf0d56aa80ef1054d58eddf4f4569fd5216a21181b,2024-10-28T13:58:09.230000
CVE-2024-5031,0,0,85c2d27a50beb5d77ca4d835b8018ece4707a3bb8e9611fc3c827a96a420e7d7,2024-11-21T09:46:48.853000
CVE-2024-5031,0,1,c2122d739677bd0d04b7d795c26d96ab35b035940f3233702cc95bfab80b9911,2025-01-31T14:18:23.003000
CVE-2024-50310,0,0,0aa8bf92cb0c2ce72d2591b8a623d6ab248b2abe4cf7e33609877fe3cb7813d1,2024-11-13T23:15:38.657000
CVE-2024-50311,0,0,b0292ba610dd96aa55991ae2b3d8d9a3245ae7b245c406d2ccd4b978c4c63f18,2024-12-04T08:15:06.993000
CVE-2024-50312,0,0,2be41509e07c89050ede37502a909bec30a9be1d7ef2b7b17d3eaae24f61baa1,2025-01-15T02:15:26.067000
@ -270657,7 +270657,7 @@ CVE-2024-51646,0,0,3825d92ca5d0d6c103d25f58b41b22c61b7e40e9d411a67db2b16440edf0d
CVE-2024-51647,0,0,0324321535da7d43ca4deac4fdb3c1e7d74c19d7383440bb5b1349d55f97e233,2024-11-12T13:56:24.513000
CVE-2024-51648,0,0,dbb0968afe4034eda92af49d97342dc91c1ea36f66d8dfaf80e8afd706de0c57,2024-11-19T21:57:32.967000
CVE-2024-51649,0,0,c81969392142cf30b442ca2488ba5a508853d5d91fdf922f672d341833d4b7a4,2024-11-19T21:57:32.967000
CVE-2024-5165,0,0,bdb54bdc8b0d6f572d2785be548dcdb1e79f91fcf53f5df7d21dd9b71f61f720,2024-11-21T09:47:06.567000
CVE-2024-5165,0,1,068477f58d1d76dc6439c4cddf96cd825538c3d63cff6e942d1a8fc1ba5fe609,2025-01-31T14:46:11.070000
CVE-2024-51650,0,0,04ef9455e8937238fe000c9cf2db59bb61cb5e35b0918868474c600631188fd1,2024-11-19T21:57:32.967000
CVE-2024-51651,0,0,1728d260074e5bfcd449e5668d18c53a5f2f462f3263d9ad96d2f345aa27db40,2025-01-07T11:15:08.113000
CVE-2024-51652,0,0,73549f75abf3f3baf03afe523dcecfd729118fe687d340792e7f45a9660fb08b,2024-11-19T21:57:32.967000
@ -271347,7 +271347,7 @@ CVE-2024-52551,0,0,fd84c59464bcaa1dd00e2516d59a92cc0265d28e8393a771da9c0bf11455f
CVE-2024-52552,0,0,bc0159e371132975473cc81aa904379bb4cfab199a9e5a229563c4c9ecb5eb90,2024-11-15T14:00:09.720000
CVE-2024-52553,0,0,af509be1bcf65a5a333897272b35220fe44b3f8ab3b2aae24b5d0ab116a46c57,2024-11-15T14:00:09.720000
CVE-2024-52554,0,0,6c54306f2e6d9fb6f74be49581a8d7a732bed7e140bab05d7cfce43a22fc305b,2024-11-15T13:58:08.913000
CVE-2024-52555,0,0,a3eb976a723323be3c4248982b8a2d466355a617b040f2b336f011db865bd67c,2024-11-18T17:11:56.587000
CVE-2024-52555,0,1,0e7650262da77965578e51615ed2e240e4965fb0467279926cec95693ddd0fcd,2025-01-31T14:37:51.653000
CVE-2024-52558,0,0,fa32c6dd3f7f7069c5222cac92732c751cdcd8c311d81175627dacc022aec1da,2024-12-06T18:15:26.007000
CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000
CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000
@ -272353,9 +272353,9 @@ CVE-2024-5415,0,0,74eb25978de9e4a46066392a5c5808fd8612c02bf2d68d6ca3b049d5a2727b
CVE-2024-54150,0,0,bdc877ddde3b0db1921133313a7661f100f303794a2ec1f20620588ab9873b9e,2024-12-20T18:15:29.847000
CVE-2024-54151,0,0,783d6d59d625f0bdd386ea3afbe7da13ff4dd113b20f53b68a2b065516a078c2,2024-12-10T18:15:42.663000
CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9529,2024-12-10T16:15:23.947000
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000
CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000
CVE-2024-54153,0,1,df081c925d20476a1831139f4beb0bee8c30c74c482e783f47c9f1ce35bc6bf0,2025-01-31T14:43:01.333000
CVE-2024-54154,0,1,6623645edcc0dfb10975996a12b0e70ecc24ffbedbba5f4f84e9abce2d69832c,2025-01-31T14:51:35.733000
CVE-2024-54155,0,1,d9acd2d6cdccef464f602ea13553ee91e8ed9f1735b49e875d232d0d9e03367d,2025-01-31T14:53:39.930000
CVE-2024-54156,0,0,81c21f4d51f2ebbd7641443638ae29350bc0d803dc7655de8082c14d2dcfa440,2025-01-30T21:46:25.813000
CVE-2024-54157,0,0,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e217ee,2025-01-30T21:47:10.683000
CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000
@ -274209,7 +274209,7 @@ CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5
CVE-2024-57945,0,0,ba7b321eb8cd0d1e792a1582e6a8309da43ab8d76c6981c78527fc0b4c2a565b,2025-01-21T13:15:09.033000
CVE-2024-57946,0,0,7694bfd6f4bfcb27622fd33f724eed0c14a58bd72141bedb13eda08e23a02026,2025-01-21T13:15:09.137000
CVE-2024-57947,0,0,0f394f81965ff60be8ebf8ad0ab0612e0d5ea1bd9618d127584b4c77570cc2fc,2025-01-23T14:15:25.293000
CVE-2024-57948,1,1,ccfc14c3be6f8add68188203caf884895ea6e832132743554c183f12cb7025b0,2025-01-31T12:15:27.070000
CVE-2024-57948,0,0,ccfc14c3be6f8add68188203caf884895ea6e832132743554c183f12cb7025b0,2025-01-31T12:15:27.070000
CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000
CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022afe,2024-11-21T09:48:20.910000
CVE-2024-57965,0,0,d78dea09938cb8948799ad2306c3ac0ba007fa5ca7bad3555c987aecde2fbb19,2025-01-29T10:15:08.113000
@ -278192,6 +278192,8 @@ CVE-2025-0874,0,0,6da7a8f87f2786d1b42e4f0c31d8a24660ad2dce7cac8549bf8e2ee9e365d7
CVE-2025-0880,0,0,7ab5ca29a799a8fac267066c2eb589d01834fa921e902d70d4517ec3592f8581,2025-01-30T21:15:14.487000
CVE-2025-0881,0,0,f6d8aeab8275692b8ab74f77e788a17bc4f5e9922e816ca6e72b12616473f8e1,2025-01-30T22:15:09.950000
CVE-2025-0882,0,0,a4fc441f84f917a5c60004573d3c20412d06b968e92fa39cb0a0be846d1c9a39,2025-01-30T21:15:14.820000
CVE-2025-0929,1,1,ffaf780d1ad9f6bd5b422a6baa5a3c033dab993db1633cc62dfab8ec5e22c8e0,2025-01-31T14:15:34.130000
CVE-2025-0930,1,1,3208fbfb04878de0bb664bbdbe3c44e4e3f7a92268295009077cc2402da021f1,2025-01-31T14:15:34.293000
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
@ -278542,25 +278544,25 @@ CVE-2025-21661,0,0,0fa8c68f8e644a9e2944a5faceaf5fb67752dd573becbebbb71e40324bd4c
CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000
CVE-2025-21663,0,0,adf4d90fe890eb7047d924c99b97e4be605c879bb910a835e1b3e6e621f3836a,2025-01-21T13:15:09.947000
CVE-2025-21664,0,0,a03d1e78413d45883683b53d4573f14c457812f5c5d3f56140a4232f02a4012f,2025-01-23T17:15:26.457000
CVE-2025-21665,1,1,1dcb76c84c1c25410b34e9931b6ec4ccc3f74a17ffca33633dffdbca872b3406,2025-01-31T12:15:27.633000
CVE-2025-21666,1,1,183c365e3b59d08fff1d6b4521df1ab82b645112c5a52cc90dd711a5a18df74e,2025-01-31T12:15:27.763000
CVE-2025-21667,1,1,ec2541a87baa6719d6a8c1017239ab4d60f9835c55db0c8221bd968e466bdf71,2025-01-31T12:15:27.863000
CVE-2025-21668,1,1,8b20b97df5dd2ed7cbbba0cbf3d1ebbd67685e3ecc54b7dd3a7c5749df4931d3,2025-01-31T12:15:27.960000
CVE-2025-21669,1,1,cc18c474c600d9ecfd5f1543dfd9a875f566cf1af0cf9b32a375697bb9b05d0e,2025-01-31T12:15:28.053000
CVE-2025-21670,1,1,d12c9401cba1e8e9338731815f7b5e159255c5e225990eb8a1877fd4ffbecb00,2025-01-31T12:15:28.160000
CVE-2025-21671,1,1,82055684ba59cdb4ac3ab58ee2cb025fec2afdb765aa94af38cc1c0dc4207a2a,2025-01-31T12:15:28.263000
CVE-2025-21672,1,1,1fb6894817c2fdb5ca8472a1358b2437e3bb2a9de9e6459c58ad6f4ac43f122d,2025-01-31T12:15:28.360000
CVE-2025-21673,1,1,9e628820134e026486c4acee1bb676a96b70d1edf2eac2a3aa94349cc89905c5,2025-01-31T12:15:28.463000
CVE-2025-21674,1,1,69194298cd8940d45652dbb676d8c3f7403965bcf926595dfedefd4ad16e7c95,2025-01-31T12:15:28.560000
CVE-2025-21675,1,1,c3bd3ced751194a1431aa53c613e3e5b576f540db0c777b43a76ef120c168980,2025-01-31T12:15:28.677000
CVE-2025-21676,1,1,064284a3dbaf38fe834566f826bc3f11ae4fddcdbdf86300e5683c199decbcd1,2025-01-31T12:15:28.780000
CVE-2025-21677,1,1,70fa9dbb19be63f0e5ea80750777ba5aef07e7b8b2e923cb9bd850906eb4000c,2025-01-31T12:15:28.877000
CVE-2025-21678,1,1,d0e69f220b96d9714ec4fa1c38960a5a62667f664233c364663a762ad5f957a5,2025-01-31T12:15:28.970000
CVE-2025-21679,1,1,c0a036194b73d5170da4843624623a1fb4b9e085c3ba3466b8d8f2581a1bd77d,2025-01-31T12:15:29.070000
CVE-2025-21680,1,1,b3ddbaaa8dc622ecaf35025de804bcc4011af952e154dc87e5b861a81b1add98,2025-01-31T12:15:29.160000
CVE-2025-21681,1,1,33386cfbe1cd639dc40c49e4251fab4b0a535f237b027c151bda6b0c921455cb,2025-01-31T12:15:29.260000
CVE-2025-21682,1,1,af36b62ce352ba03944473d01a4afdd64cf998543119197419230273df44e036,2025-01-31T12:15:29.363000
CVE-2025-21683,1,1,b54d88e0850fc12392c10488bc1697e13177eba342fbaaa654cbf6f3c6db4465,2025-01-31T12:15:29.460000
CVE-2025-21665,0,0,1dcb76c84c1c25410b34e9931b6ec4ccc3f74a17ffca33633dffdbca872b3406,2025-01-31T12:15:27.633000
CVE-2025-21666,0,0,183c365e3b59d08fff1d6b4521df1ab82b645112c5a52cc90dd711a5a18df74e,2025-01-31T12:15:27.763000
CVE-2025-21667,0,0,ec2541a87baa6719d6a8c1017239ab4d60f9835c55db0c8221bd968e466bdf71,2025-01-31T12:15:27.863000
CVE-2025-21668,0,0,8b20b97df5dd2ed7cbbba0cbf3d1ebbd67685e3ecc54b7dd3a7c5749df4931d3,2025-01-31T12:15:27.960000
CVE-2025-21669,0,0,cc18c474c600d9ecfd5f1543dfd9a875f566cf1af0cf9b32a375697bb9b05d0e,2025-01-31T12:15:28.053000
CVE-2025-21670,0,0,d12c9401cba1e8e9338731815f7b5e159255c5e225990eb8a1877fd4ffbecb00,2025-01-31T12:15:28.160000
CVE-2025-21671,0,0,82055684ba59cdb4ac3ab58ee2cb025fec2afdb765aa94af38cc1c0dc4207a2a,2025-01-31T12:15:28.263000
CVE-2025-21672,0,0,1fb6894817c2fdb5ca8472a1358b2437e3bb2a9de9e6459c58ad6f4ac43f122d,2025-01-31T12:15:28.360000
CVE-2025-21673,0,0,9e628820134e026486c4acee1bb676a96b70d1edf2eac2a3aa94349cc89905c5,2025-01-31T12:15:28.463000
CVE-2025-21674,0,0,69194298cd8940d45652dbb676d8c3f7403965bcf926595dfedefd4ad16e7c95,2025-01-31T12:15:28.560000
CVE-2025-21675,0,0,c3bd3ced751194a1431aa53c613e3e5b576f540db0c777b43a76ef120c168980,2025-01-31T12:15:28.677000
CVE-2025-21676,0,0,064284a3dbaf38fe834566f826bc3f11ae4fddcdbdf86300e5683c199decbcd1,2025-01-31T12:15:28.780000
CVE-2025-21677,0,0,70fa9dbb19be63f0e5ea80750777ba5aef07e7b8b2e923cb9bd850906eb4000c,2025-01-31T12:15:28.877000
CVE-2025-21678,0,0,d0e69f220b96d9714ec4fa1c38960a5a62667f664233c364663a762ad5f957a5,2025-01-31T12:15:28.970000
CVE-2025-21679,0,0,c0a036194b73d5170da4843624623a1fb4b9e085c3ba3466b8d8f2581a1bd77d,2025-01-31T12:15:29.070000
CVE-2025-21680,0,0,b3ddbaaa8dc622ecaf35025de804bcc4011af952e154dc87e5b861a81b1add98,2025-01-31T12:15:29.160000
CVE-2025-21681,0,0,33386cfbe1cd639dc40c49e4251fab4b0a535f237b027c151bda6b0c921455cb,2025-01-31T12:15:29.260000
CVE-2025-21682,0,0,af36b62ce352ba03944473d01a4afdd64cf998543119197419230273df44e036,2025-01-31T12:15:29.363000
CVE-2025-21683,0,0,b54d88e0850fc12392c10488bc1697e13177eba342fbaaa654cbf6f3c6db4465,2025-01-31T12:15:29.460000
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
CVE-2025-22132,0,0,92f694afc6ce174171da36824da367c743ab8d73a418a3347309264d0570fa9a,2025-01-07T22:15:31.590000
@ -279410,20 +279412,20 @@ CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf5
CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000
CVE-2025-24112,0,0,73122401c6f0bff2db58ac2e4c8d3c7092fb0878620319286c89df67ac0aee54,2025-01-30T18:54:08.913000
CVE-2025-24113,0,0,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000
CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000
CVE-2025-24114,0,1,bf72f6816f7d3cb24d27a406af1dde843431cf25955aec6c1566bf3cbe168291,2025-01-31T14:51:05.633000
CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000
CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000
CVE-2025-24117,0,0,493a8c659f7cfd2be21bd3460455417a05b776e339f61cc53de5b9577df28acf,2025-01-29T17:15:29.690000
CVE-2025-24116,0,1,4257d6468fc333655b67e1c7ba73f14ae61a1686767ac591f9f687663e910757,2025-01-31T14:44:25.387000
CVE-2025-24117,0,1,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000
CVE-2025-24118,0,0,c4c7cf0ccae327f1e2910a4df7950a5f148425468f8ed5cf85ce2f00e56e9e3f,2025-01-28T16:15:42.293000
CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000
CVE-2025-24120,0,1,10b90d083aafc65dcfbeb6bd85c3c77690a9dc5d2ea95c91c24f1660e287604a,2025-01-31T14:42:41.767000
CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000
CVE-2025-24122,0,0,6ed5b273993a7b3b4299bccb505e9bef2efda8af378ad8c8de2092e788d49a9a,2025-01-28T16:15:42.447000
CVE-2025-24123,0,0,e83298a045ddc8c277bf247a5ae4429adb4e3443f8590ed105db055f85a1fa12,2025-01-28T16:15:42.590000
CVE-2025-24124,0,0,b35b4f4a6ad5026922ac33029fc25ada57ed2d60ab63b693c216ab6474dabd26,2025-01-28T17:15:26.753000
CVE-2025-24126,0,0,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000
CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000
CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000
CVE-2025-24129,0,0,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000
CVE-2025-24127,0,1,80927e84a50681c56c9f4101650ed6763c597c92bc684bdc38718ebd7a781791,2025-01-31T14:42:12.703000
CVE-2025-24128,0,1,4181eac55dc69e69846c84484aff8e6c1ba475b169d5aa7f1ce6ff3d879cc4fb,2025-01-31T14:41:42.797000
CVE-2025-24129,0,1,3bbe86718e6637abc025cb3d4100d1c7716fd3a99f05f06138b4459a1d4a0f81,2025-01-31T14:40:49.027000
CVE-2025-24130,0,0,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000
CVE-2025-24131,0,0,41c558898f74865f1fbde4b8bc99c0ad25f04d1af1a792ec11b446d2e24c8fcd,2025-01-30T17:58:19.953000
CVE-2025-24134,0,0,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000
@ -279672,6 +279674,11 @@ CVE-2025-24802,0,0,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6
CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000
CVE-2025-24827,1,1,24c46b9776ce5fc07c3d4d268e046e3452a338e116667384e069dc899857c6e6,2025-01-31T13:15:27.553000
CVE-2025-24828,1,1,5525ce023c25f3208ff0cdf27e9dd286ee501d20f684f36aba9dce5b81e23653,2025-01-31T13:15:27.727000
CVE-2025-24829,1,1,700d2cc31299e24d628845bd0a656410b94e04243d259307b3acf4691917dd10,2025-01-31T13:15:27.870000
CVE-2025-24830,1,1,94678da9941aa474af3d7379347d9bee62d7243bc4e342cf20d8533a0bebccd9,2025-01-31T13:15:28
CVE-2025-24831,1,1,61b413b2706a1591e9034da712e2420587ddd03fcd92eae026ba8caf0a323fff,2025-01-31T13:15:28.130000
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000
CVE-2025-24882,0,0,a23ce05efaa4af8c3630627536762c229213516f16a0fddf8927088c78e2a99f,2025-01-29T18:15:47.570000
CVE-2025-24883,0,0,e4977be39a4935cccc31d44b4babca335570d7230803a869c62284a8184b38eb,2025-01-30T16:15:31.947000

Can't render this file because it is too large.